Cristel Pelsser
Cristel Pelsser
Home
Awards
Publications
Talks
Activities
Tools
Jobs
Contact
Light
Dark
Automatic
International Conferences
A System to Detect Forged-Origin Hijacks
Despite global efforts to secure Internet routing, attackers still successfully exploit the lack of strong BGP security mechanisms. …
Thomas Holterbach
,
Thomas Alfroy
,
Amreesh D. Phokeer
,
Alberto Dainotti
,
Cristel Pelsser
PDF
Cite
Internet Science Moonshot: Expanding BGP Data Horizons
Dramatic growth in Internet connectivity poses a challenge for the resource-constrained data collection efforts that support scientific …
Thomas Alfroy
,
Thomas Holterbach
,
Thomas Krenc
,
KC Claffy
,
Cristel Pelsser
PDF
Cite
DOI
URL
Fault-adaptive Scheduling for Data Acquisition Networks
Supporting such an all-to-all traffic matrix is chal- lenging as it can easily lead to congestion. Scheduling pat- terns are designed …
Eloise Noelle Stein
,
Quentin Bramas
,
Tommaso Colombo
,
Cristel Pelsser
PDF
Cite
URL
RPKI Time-of-Flight: Tracking Delays in the Management, Control, and Data Planes
As RPKI is becoming part of ISPs’ daily operations and Route Origin Validation is getting widely deployed, one wonders how long …
Romain Fontugne
,
Amreesh Phokeer
,
Cristel Pelsser
,
Kevin Vermeulen
,
Randy Bush
PDF
Cite
Video
A First Measurement with BGP Egress Peer Engineering
This paper reports on measuring the effect of engineering egress traffic to peering ASes using Segment Routing, called BGP-EPE. BGP-EPE …
Ryo Nakamura
,
Kazuki Shimizu
,
Teppei Kamata
,
Cristel Pelsser
Cite
URL
Fair Delegation of Digital Services Without Third Parties
The software architecture of most applications is more and more fragmented, and relying on micro-services. Moreover, some parts may be …
A. Guillot
,
F. Theoleyre
,
C. Pelsser
PDF
Cite
URL
Revisiting Recommended BGP Route Flap Damping Configurations
BGP Route Flap Damping (RFD) is recommended to suppress BGP churn. Current configuration recommendations for RFD, however, are based on …
M. Clemens
,
R. Bush
,
C. Pelsser
,
T. Schmidt
,
M. Wählisch
PDF
Cite
URL
Artifacts
Towards Secure and Leak-Free Workflows Using Microservice Isolation
Data leaks and breaches are on the rise. They result in huge losses of money for businesses like the movie industry, as well as a loss …
L. Miller
,
P. Merindol
,
A. Gallais
,
C. Pelsser
PDF
Cite
URL
A Fast-Convergence Routing of the Hot-Potato
Interactions between the intra- and inter-domain routing protocols received little attention despite playing an important role in …
Jean-Romain Luttringer
,
Quentin Bramas
,
Cristel Pelsser
,
Pascal Mérindol
PDF
Cite
URL
Verification of Cloud Security Policies
Companies like Netflix increasingly use the cloud to deploy their business processes. Those processes often involve partnerships with …
L. Miller
,
P. Merindol
,
A. Gallais
,
C. Pelsser
PDF
Cite
URL
»
Cite
×