613 research outputs found
Radial Structure of the Internet
The structure of the Internet at the Autonomous System (AS) level has been
studied by both the Physics and Computer Science communities. We extend this
work to include features of the core and the periphery, taking a radial
perspective on AS network structure. New methods for plotting AS data are
described, and they are used to analyze data sets that have been extended to
contain edges missing from earlier collections. In particular, the average
distance from one vertex to the rest of the network is used as the baseline
metric for investigating radial structure. Common vertex-specific quantities
are plotted against this metric to reveal distinctive characteristics of
central and peripheral vertices. Two data sets are analyzed using these
measures as well as two common generative models (Barabasi-Albert and Inet). We
find a clear distinction between the highly connected core and a sparse
periphery. We also find that the periphery has a more complex structure than
that predicted by degree distribution or the two generative models
Modeling Internet-Scale Policies for Cleaning up Malware
An emerging consensus among policy makers is that interventions undertaken by
Internet Service Providers are the best way to counter the rising incidence of
malware. However, assessing the suitability of countermeasures at this scale is
hard. In this paper, we use an agent-based model, called ASIM, to investigate
the impact of policy interventions at the Autonomous System level of the
Internet. For instance, we find that coordinated intervention by the
0.2%-biggest ASes is more effective than uncoordinated efforts adopted by 30%
of all ASes. Furthermore, countermeasures that block malicious transit traffic
appear more effective than ones that block outgoing traffic. The model allows
us to quantify and compare positive externalities created by different
countermeasures. Our results give an initial indication of the types and levels
of intervention that are most cost-effective at large scale.Comment: 22 pages, 9 Figures, Presented at the Tenth Workshop on the Economics
of Information Security, Jun 201
Negative ternary set-sharing
The Set-Sharing domain has been widely used to infer at compiletime interesting properties of logic programs such as occurs-check reduction, automatic parallelization, and flnite-tree analysis. However, performing abstract uniflcation in this domain requires a closure operation that increases the number of sharing groups exponentially. Much attention has been given to mitigating this key inefflciency in this otherwise very useful domain. In this paper we present a novel approach to Set-Sharing: we define a new representation that leverages the complement (or negative) sharing relationships of the original sharing set,
without loss of accuracy. Intuitively, given an abstract state sh\> over the finite set of variables of interest V, its negative representation is p(V) \ shy. Using this encoding during analysis dramatically reduces the number of elements that need to be represented in the abstract states and during abstract uniflcation as the cardinality of the original set grows toward 2 . To further compress the number
of elements, we express the set-sharing relationships through a set of ternary strings that compacts the representation by eliminating redundancies among the sharing sets. Our experiments show that our approach can compress the number of relationships, reducing signiflcantly the memory usage and running time of all
abstract operations, including abstract uniflcation
- …
