An extended/updated version of our IMC paper "O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs", authored by Vasileios Giotsas et al., was accepted in ACM/IEEE Transactions on Networking! Early access: ieeexplore.ieee.org/document/…
We are also thrilled to announce our group at @FORTH_ITE secured a very competitive national fund (below 9% acceptance rate) called Research - Create - Innovate, which supports the collaboration of research and industry, with the goal of mature research ideas to reach the market
We are delighted to announce our research group will receive the @ripencc Community Projects Fund for 2019! More info on our project, and how the 7 in total funded projects contribute to the "good of the Internet": ripe.net/publications/n…
We collect and analyze data, like network topologies and traffic traces, to better understand various facets of the Internet ecosystem, like the behaviour of malware, the exhaustion of IP addresses, and the interconnections between Internet Service Providers (ISPs).
Software Defined Networks
We study how to exploit the rapidly emerging SDN paradigm to counter chronic problems of the Internet, including unpredictable network availability, lack of Quality of Service guarantees, and vulnerability to established and new types of Denial of Service (DoS) attacks.
Network Monitoring Systems
We design and build sophisticated network monitoring systems for efficiently processing, storing, and querying big network data, like traffic traces collected at line rates of 10Gbps and above.
P. Sermpezis and V. Kotronis, “Inferring Catchment in Internet Routing,” in ACM SIGMETRICS, 2019. [Bibtex]
@inproceedings{Sermpezis2019SIGMETRICS,
title = {{Inferring Catchment in Internet Routing}},
author = {Sermpezis, P. and Kotronis, V.},
booktitle = {ACM SIGMETRICS},
volume = {3},
number = {2},
month = jun,
year = {2019},
numpages = {31},
doi = {10.1145/3326145},
publisher = {ACM},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/paper_74_Sigmetrics_camera_ready.pdf}
}
A. Milolidakis, R. Fontugne, and X. Dimitropoulos, “Detecting Network Disruptions At Colocation Facilities,” in IEEE INFOCOM, 2019. [Bibtex]
@inproceedings{milolidakis2019INFOCOM,
title={{Detecting Network Disruptions At Colocation Facilities}},
author={Milolidakis, A. and Fontugne, R. and Dimitropoulos, X.},
booktitle={IEEE INFOCOM},
year={2019},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/milolidakis_infocom2019.pdf}
}
2018
G. Nomikos, V. Kotronis, P. Sermpezis, P. Gigis, L. Manassakis, C. Dietzel, S. Konstantaras, X. Dimitropoulos, and V. Giotsas, “O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs,” in ACM Internet Measurement Conference (IMC ’18), 2018. [Bibtex]
@InProceedings{nomikos2018IMC,
title = {{O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs}},
author = {Nomikos, G. and Kotronis, V. and Sermpezis, P. and Gigis, P. and Manassakis, L. and Dietzel, C. and Konstantaras, S. and Dimitropoulos, X. and Giotsas, V.},
booktitle = {ACM Internet Measurement Conference (IMC '18)},
year = {2018},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/uncovering_remote_peering_interconnections_v1.pdf}
}
S. Kastanakis, P. Sermpezis, V. Kotronis, and X. Dimitropoulos, “CABaRet: Leveraging Recommendation Systems for Mobile Edge Caching,” in ACM SIGCOMM Workshop on Mobile Edge Communications (MECOMM ’18), 2018. [Bibtex]
@InProceedings{kastanakis2018cabaret,
title={{CABaRet: Leveraging Recommendation Systems for Mobile Edge Caching}},
author={Kastanakis, Savvas and Sermpezis, Pavlos and Kotronis, Vasileios and Dimitropoulos, Xenofontas},
booktitle = {ACM SIGCOMM Workshop on Mobile Edge Communications (MECOMM '18)},
year={2018},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/KastanakisMECOMM18.pdf}
}
2017
E. Lakiotakis, C. Liaskos, and X. Dimitropoulos, “Application-Network Collaboration using SDN for Ultra-Low Delay Teleorchestras.,” in IEEE ISCC PEDISWESA Workshop, 2017. [Bibtex]
@inproceedings{lakiotakis2017PEDISWESA,
title={{Application-Network Collaboration using SDN for Ultra-Low Delay Teleorchestras.}},
author={Lakiotakis, E. and Liaskos, C. and Dimitropoulos, X.},
booktitle={IEEE ISCC PEDISWESA Workshop},
year={2017},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/LakiotakisPEDISWESA.pdf}
}
T. D. Assefa, R. Hoque, E. Tragos, and X. Dimitropoulos, “SDN-based local mobility management with X2-interface in femtocell networks,” in IEEE Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2017. [Bibtex]
@InProceedings{tewelde2017INFOCOM,
title = {{SDN-based local mobility management with X2-interface in femtocell networks}},
author = {Assefa, T. D. and Hoque, R. and Tragos, E. and Dimitropoulos, X.},
booktitle = {IEEE Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)},
year = {2017},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/Tewelde-CAMAD.pdf}
}
V. Kotronis, G. Nomikos, L. Manassakis, D. Mavrommatis, and X. Dimitropoulos, “Shortcuts through Colocation Facilities,” in ACM Internet Measurement Conference (IMC ’17), 2017. [Bibtex]
@InProceedings{kotronis2017IMC,
title = {{Shortcuts through Colocation Facilities}},
author = {Kotronis, V. and Nomikos, G. and Manassakis, L. and Mavrommatis, D. and Dimitropoulos, X.},
booktitle = {ACM Internet Measurement Conference (IMC '17)},
year = {2017},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/shortcuts-colocation-facilities.pdf}
}
P. Sermpezis and X. Dimitropoulos, “Can SDN Accelerate BGP Convergence? A Performance Analysis of Inter-domain Routing Centralization,” in 16th International IFIP TC6 Networking Conference, Networking 2017, 2017. [Bibtex]
@InProceedings{sermpezis2017can,
author = {P. Sermpezis and X. Dimitropoulos},
title = {{Can SDN Accelerate BGP Convergence? A Performance Analysis of Inter-domain Routing Centralization}},
booktitle = {16th International IFIP TC6 Networking Conference, Networking 2017},
year = {2017},
pdf={http://dl.ifip.org/db/conf/networking/networking2017/1570333176.pdf}
}
P. Sermpezis, G. Nomikos, and X. Dimitropoulos, “Re-mapping the Internet: Bring the IXPs into Play,” in IEEE NetSciCom workshop (INFOCOM workshops), 2017. [Bibtex]
@InProceedings{sermpezis2017Net,
title = {{Re-mapping the Internet: Bring the IXPs into Play}},
author = {Sermpezis, P. and Nomikos, G. and Dimitropoulos, X.},
booktitle = {IEEE NetSciCom workshop (INFOCOM workshops)},
year = {2017},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/PID4694481_pdf_to_submit.pdf}
}
2016
V. Kotronis, R. Kloeti, M. Rost, P. Georgopoulos, B. Ager, S. Schmidt, and X. Dimitropoulos, “Stitching Inter-Domain Paths over IXPs,” in 2nd Symposium on SDN Research (SOSR 2016), 2016. [Bibtex]
@inproceedings{SOSR.2016a,
title={{Stitching Inter-Domain Paths over IXPs}},
author={Kotronis, V. and Kloeti, R. and Rost, M. and Georgopoulos, P. and Ager, B. and Schmidt, S. and Dimitropoulos, X.},
booktitle={2nd Symposium on SDN Research (SOSR 2016)},
year={2016},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/sosr2016.pdf}
}
C. Liaskos, V. Kontronis, and X. Dimitropoulos, “A Novel Framework for Modeling and Mitigating Distributed Link Flooding Attacks,” in IEEE INFOCOM, 2016. [Bibtex]
@inproceedings{INFOCOM.2016a,
title={{A Novel Framework for Modeling and Mitigating Distributed Link Flooding Attacks}},
author={Liaskos, C. and Kontronis, V. and Dimitropoulos, X.},
booktitle={IEEE INFOCOM},
year={2016},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/INFOCOM16.pdf}
}
G. Nomikos and X. Dimitropoulos, “traIXroute: Detecting IXPs in traceroute paths,” in Passive and Active Measurement (PAM), 2016. [Bibtex]
@inproceedings{PAM.2016a,
title={{traIXroute: Detecting IXPs in traceroute paths}},
author={Nomikos, G. and Dimitropoulos, X.},
booktitle={Passive and Active Measurement (PAM)},
year={2016},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/PAM16.pdf}
}
2015
C. Liaskos, “A Lightweight, Non-Intrusive Approach for Orchestrating Autonomously-Managed Network Elements,” in IEEE ISCC, 2015. [Bibtex]
R. Kloti, V. Kotronis, B. Ager, and X. Dimitropoulos, “Policy-Compliant Path Diversity and Bisection Bandwidth,” in IEEE INFOCOM, 2015. [Bibtex]
@inproceedings{KlKoAgDi15a,
title = {Policy-Compliant Path Diversity and Bisection Bandwidth},
author = "R. Kloti and V. Kotronis and B. Ager and X. Dimitropoulos",
booktitle = {IEEE INFOCOM},
year = {2015},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/INFOCOM2015.pdf}
}
S. Baleato, N. Weidmann, P. Gigis, X. Dimitropoulos, E. Glatz, and B. Trammell, “Transparent Estimation of Internet Penetration from Network Observations,” in Springer Passive and Active Measurement Conference (PAM), 2015. [Bibtex]
@inproceedings{BeWeGiDiEdBr15,
title = {Transparent Estimation of Internet Penetration from Network Observations},
author = " S. Baleato and N. Weidmann and P. Gigis and X. Dimitropoulos and E. Glatz and B. Trammell",
booktitle = "Springer Passive and Active Measurement Conference (PAM)",
year = {2015},
pdf={http://wan.poly.edu/pam2015/papers/35.pdf}
}
2013
M. Djatmiko, D. Schatzmann, A. Friedman, X. Dimitropoulos, and R. Boreli, “Federated Flow-Based Approach for Privacy Preserving Connectivity Tracking,” in ACM SIGCOMM CoNext, 2013. [Bibtex]
@inproceedings{Dj13-2,
title = {Federated Flow-Based Approach for Privacy Preserving Connectivity Tracking},
author = "M. Djatmiko and D. Schatzmann and A. Friedman and X. Dimitropoulos and R. Boreli",
booktitle = {ACM SIGCOMM CoNext},
year = {2013},
pdf={http://conferences.sigcomm.org/co-next/2013/program/p429.pdf}
}
F. Fusco, M. Vlachos, X. Dimitropoulos, and L. Deri, “Indexing Million Of Packets Per Second Using GPUs,” in ACM SIGCOMM Internet Measurement Conference (IMC), 2013. [Bibtex]
@inproceedings{FuVlDiDe13,
title = {Indexing Million Of Packets Per Second Using {GPUs}},
author = "F. Fusco and M. Vlachos and X. Dimitropoulos and L. Deri",
booktitle = {ACM SIGCOMM Internet Measurement Conference (IMC)},
year = {2013},
pdf={http://conferences.sigcomm.org/imc/2013/papers/imc014s-fuscoA.pdf}
}
E. Raftopoulos and X. Dimitropoulos, “Understanding Network Forensics Analysis in an Operational Environment,” in IEEE Security & Privacy Symposium Workshop on Cyber Crime, 2013. [Bibtex]
@INPROCEEDINGS{RaDi13,
AUTHOR = "E. Raftopoulos and X. Dimitropoulos",
TITLE = "Understanding Network Forensics Analysis in an Operational Environment",
BOOKTITLE = "IEEE Security \& Privacy Symposium Workshop on Cyber Crime",
YEAR = "2013",
pdf={http://www.ieee-security.org/TC/SPW2013/papers/data/5017a111.pdf}
}
2012
V. Kotronis, X. Dimitropoulos, and B. Ager, “Outsourcing the routing control logic: better Internet routing based on SDN principles,” in ACM Hot Topics in Networks (HotNets), 2012. [Bibtex]
@inproceedings{KoDiAg12,
title = {Outsourcing the routing control logic: better Internet routing based on SDN principles},
author = "V. Kotronis and X. Dimitropoulos and B. Ager",
booktitle = {ACM Hot Topics in Networks (HotNets)},
year = {2012},
pdf={http://conferences.sigcomm.org/hotnets/2012/papers/hotnets12-final78.pdf}
}
E. Glatz, S. Mavromatidis, B. Ager, and X. Dimitropoulos, “Visualizing Big Network Traffic Data using Frequent Pattern Mining and Hypergraphs,” in IMC Workshop on Internet Visualization, 2012. [Bibtex]
@inproceedings{GlMaAgDi12,
title = {Visualizing Big Network Traffic Data using Frequent Pattern Mining and Hypergraphs},
author = "E. Glatz and S. Mavromatidis and B. Ager and X. Dimitropoulos",
booktitle = {IMC Workshop on Internet Visualization},
year = {2012}
}
F. Fusco, M. Vlachos, and X. Dimitropoulos, “RasterZIP: Compressing Network Monitoring Data with Support for Partial Decompression,” in ACM SIGCOMM Internet Measurement Conference (IMC), 2012. [Bibtex]
@inproceedings{FuVlDi12,
title = {{RasterZIP}: Compressing Network Monitoring Data with Support for Partial Decompression},
author = "F. Fusco and M. Vlachos and X. Dimitropoulos",
booktitle = {ACM SIGCOMM Internet Measurement Conference (IMC)},
year = {2012}
}
E. Glatz and X. Dimitropoulos, “Classifying Internet One-way Traffic,” in ACM SIGCOMM Internet Measurement Conference (IMC), 2012. [Bibtex]
@inproceedings{GlDi12,
author = {E. Glatz and X. Dimitropoulos},
title = {{Classifying Internet One-way Traffic}},
booktitle = {ACM SIGCOMM Internet Measurement Conference (IMC)},
year = {2012}
}
A. Abdelkefi, Y. Jiang, and X. Dimitropoulos, “K-Sparse Approximation for Traffic Histogram Dimensionality Reduction,” in International Conference on Network and Service Management (CNSM), 2012. [Bibtex]
@INPROCEEDINGS{AbJiDi12,
AUTHOR = "A. Abdelkefi and Y. Jiang and X. Dimitropoulos",
TITLE = "K-Sparse Approximation for Traffic Histogram Dimensionality Reduction",
BOOKTITLE = "International Conference on Network and Service Management (CNSM)",
YEAR = "2012"
}
E. Raftopoulos and X. Dimitropoulos, “Shedding Light on Log Correlation in Network Forensics Analysis,” in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2012. [Bibtex]
@INPROCEEDINGS{RaDi12,
AUTHOR = "E. Raftopoulos and X. Dimitropoulos",
TITLE = "Shedding Light on Log Correlation in Network Forensics Analysis",
BOOKTITLE = "International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)",
YEAR = "2012"
}
I. Paredes-Oliva, I. Castell-Uroz, P. Barlet-Ros, X. Dimitropoulos, and J. Sole-Pareta, “Practical Anomaly Detection based on Classifying Frequent Traffic Patterns,” in IEEE Global Internet Symposium, 2012. [Bibtex]
@INPROCEEDINGS{PaCaBaDiPa12,
AUTHOR = "I. Paredes-Oliva and I. Castell-Uroz and P. Barlet-Ros and X. Dimitropoulos and J. Sole-Pareta",
TITLE = "Practical Anomaly Detection based on Classifying Frequent Traffic Patterns",
BOOKTITLE = "IEEE Global Internet Symposium",
YEAR = "2012"
}
2011
E. Raftopoulos and X. Dimitropoulos, “Detecting, Validating and Characterizing Computer Infections in the Wild,” in ACM SIGCOMM Internet Measurement Conference (IMC), 2011. [Bibtex]
@inproceedings{RaDi11,
author = {E. Raftopoulos and X. Dimitropoulos},
title = {{Detecting, Validating and Characterizing Computer Infections in the Wild}},
booktitle = {ACM SIGCOMM Internet Measurement Conference (IMC)},
year = {2011}
}
2010
D. Schatzmann, W. Mulbauer, T. Spyropoulos, and X. Dimitropoulos, “Digging into HTTPS: Flow-Based Classification of Webmail Traffic,” in ACM SIGCOMM Internet Measurement Conference (IMC), 2010. [Bibtex]
@inproceedings{ScMuSpDi10,
author = {D. Schatzmann and W. Mulbauer and T. Spyropoulos and X. Dimitropoulos},
title = {{Digging into {HTTPS}: Flow-Based Classification of Webmail Traffic}},
booktitle = {ACM SIGCOMM Internet Measurement Conference (IMC)},
year = {2010}
}
M. Burkhart and X. Dimitropoulos, “Fast Privacy-Preserving Top-k Queries using Secret Sharing (invited),” in IEEE International Conference on Computer Communication and Networks (ICCCN), 2010. [Bibtex]
@inproceedings{BuDi10,
author = {M. Burkhart and X. Dimitropoulos},
title = {{Fast Privacy-Preserving Top-k Queries using Secret Sharing (invited)}},
booktitle = {IEEE International Conference on Computer Communication and Networks (ICCCN)},
year = {2010}
}
M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos, “SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics,” in USENIX Security Symposium, 2010. [Bibtex]
@inproceedings{BuStMaDi10,
author = {M. Burkhart and M. Strasser and D. Many and X. Dimitropoulos},
title = {{SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics}},
booktitle = {USENIX Security Symposium},
year = {2010}
}
2009
D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian, “Anomaly Extraction in Backbone Networks using Association Rules,” in ACM SIGCOMM Internet Measurement Conference (IMC), 2009. [Bibtex]
@inproceedings{BrDiWaSa09,
author = {D. Brauckhoff and X. Dimitropoulos and A. Wagner and K. Salamatian},
title = {{Anomaly Extraction in Backbone Networks using Association Rules}},
booktitle = {ACM SIGCOMM Internet Measurement Conference (IMC)},
year = {2009}
}
X. Dimitropoulos, P. Hurley, A. Kind, and M. Stoecklin, “On the 95-percentile Billing Method,” in Springer Passive and Active Measurement Conference (PAM), 2009. [Bibtex]
@INPROCEEDINGS{DiHuKiSt09,
AUTHOR = "X. Dimitropoulos and P. Hurley and A. Kind and M. Stoecklin",
TITLE = "On the 95-percentile Billing Method",
BOOKTITLE = "Springer Passive and Active Measurement Conference (PAM)",
YEAR = "2009"
}
2007
D. Dechouniotis, X. Dimitropoulos, A. Kind, and S. Denazis, “Dependency Detection Using a Fuzzy Inference Engine,” in IFIP/IEEE International Workshop on Distributed Systems, Operations and Management (DSOM), 2007. [Bibtex]
@INPROCEEDINGS{DeDiKiDe07,
AUTHOR = "D. Dechouniotis and X. Dimitropoulos and A. Kind and S. Denazis",
TITLE = "{Dependency Detection Using a Fuzzy Inference Engine}",
BOOKTITLE = "IFIP/IEEE International Workshop on Distributed Systems, Operations and Management (DSOM)",
YEAR = "2007"
}
2006
X. Dimitropoulos and G. Riley, “Modeling Autonomous-Systems Relationships,” in IEEE/ACM/SCS Principles of Advanced and Distributed Simulations (PADS), 2006. [Bibtex]
@INPROCEEDINGS{DiRi06,
AUTHOR = "X. Dimitropoulos and G. Riley",
TITLE = "{Modeling Autonomous-Systems Relationships}",
BOOKTITLE = "IEEE/ACM/SCS Principles of Advanced and Distributed Simulations (PADS)",
YEAR = "2006"
}
X. Dimitropoulos, D. Krioukov, G. Riley, and K. Claffy, “Revealing the Autonomous System Taxonomy: The Machine Learning Approach,” in Springer Passive and Active Measurement Conference (PAM), 2006. [Bibtex]
@INPROCEEDINGS{DiKrRi06,
AUTHOR = "X. Dimitropoulos and D. Krioukov and G. Riley and Kc Claffy",
TITLE = "{Revealing the {Autonomous System} Taxonomy: The Machine Learning Approach}",
BOOKTITLE = "Springer Passive and Active Measurement Conference (PAM)",
YEAR = "2006"
}
2005
X. Dimitropoulos, D. Krioukov, B. Huffaker, K. Claffy, and G. Riley, “Inferring AS Relationships: Dead End or Lively Beginning?,” in Springer Workshop on Experimental Algorithms (WEA), 2005. [Bibtex]
@INPROCEEDINGS{DiKrHuClRi05,
AUTHOR = "X. Dimitropoulos and D. Krioukov and B. Huffaker and Kc Claffy and G. Riley",
TITLE = "{Inferring {AS} Relationships: Dead End or Lively Beginning?}",
BOOKTITLE = "Springer Workshop on Experimental Algorithms (WEA)",
YEAR = "2005"
}
X. Dimitropoulos, D. Krioukov, and G. Riley, “Revisiting Internet AS-Level Topology Discovery,” in Springer Passive and Active Measurement Conference (PAM), 2005. [Bibtex]
@INPROCEEDINGS{DiKrRi05,
AUTHOR = "X. Dimitropoulos and D. Krioukov and G. Riley",
TITLE = "{Revisiting {Internet} {AS}-Level Topology Discovery}",
BOOKTITLE = "Springer Passive and Active Measurement Conference (PAM)",
YEAR = "2005"
}
2004
J. Kim, S. Ko, D. Nicol, X. Dimitropoulos, and G. Riley, “A BGP attack against traffic engineering,” in IEEE/ACM/SCS Winter Simulation Conference (WSC), 2004. [Bibtex]
@InProceedings{KiKoNiDiRi04,
author = {J. Kim and S. Ko and D. Nicol and X. Dimitropoulos and G. Riley},
title = {A {BGP} attack against traffic engineering},
booktitle = {IEEE/ACM/SCS Winter Simulation Conference (WSC)},
year = {2004}
}
X. Dimitropoulos and G. Riley, “Large-scale Simulation Models of BGP,” in IEEE Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2004. [Bibtex]
@InProceedings{DiRi04,
author = {X. Dimitropoulos and G. Riley},
title = {{Large-scale Simulation Models of {BGP}}},
booktitle = {IEEE Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)},
year = {2004}
}
2003
X. Dimitropoulos and G. Riley, “Creating Realistic BGP Models,” in IEEE Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), 2003. [Bibtex]
@InProceedings{DiRi03,
author = {X. Dimitropoulos and G. Riley},
title = {{Creating Realistic {BGP} Models}},
booktitle = {IEEE Conference on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)},
year = {2003}
}
E. Raftopoulos, E. Glatz, X. Dimitropoulos, and A. Dainotti, “How Dangerous is Internet Scanning? A Measurement Study of the Aftermath of an Internet-wide Scan,” in Springer Traffic Monitoring and Analysi, . [Bibtex]
@inproceedings{RaGlDiDa15,
title = {How Dangerous is Internet Scanning? A Measurement Study of the Aftermath of an Internet-wide Scan},
author = "E. Raftopoulos and E. Glatz and X. Dimitropoulos and A. Dainotti",
booktitle = "Springer Traffic Monitoring and Analysis}
Conference Short
2017
E. Lakiotakis, C. Liaskos, and X. Dimitropoulos, “Enabling Ultra-Low Delay Teleorchestras using Software-Defined Networking,” in Conext’17 (Student workshop), 2017, p. 1–3. [Bibtex]
@InProceedings{conext.2017,
pages = { 1--3 },
location = { Seoul, Korea },
year = { 2017 },
series = { Conext'17 },
booktitle = { Conext'17 (Student workshop) },
title = { Enabling Ultra-Low Delay Teleorchestras using Software-Defined Networking },
author = { Lakiotakis, Emmanouil and Liaskos, Christos and Dimitropoulos, Xenofontas },
pdf={https://www.inspire.edu.gr/wp-content/pdfs/conext17.pdf}
}
P. Gigis, V. Kotronis, E. Aben, S. D. Strowes, and X. Dimitropoulos, “Characterizing User-to-User Connectivity with RIPE Atlas,” in Applied Networking Research Workshop (ANRW ’17), 2017. [Bibtex]
@InProceedings{gigis2017ANRW,
title = {{Characterizing User-to-User Connectivity with RIPE Atlas}},
author = {Gigis, P. and Kotronis, V. and Aben, E. and Strowes, S. D. and Dimitropoulos, X.},
booktitle = {Applied Networking Research Workshop (ANRW '17)},
year = {2017},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/characterizing-user-user.pdf}
}
T. D. Assefa, R. Hoque, E. Tragos, and X. Dimitropoulos, “Poster Abstract: SDN-based Handover Managementin Enterprise Networked Femtocells with X2-Forwarding Scheme,” in IEEE INFOCOM 2017 workshop session, 2017. [Bibtex]
@InProceedings{tewelde2017Poster,
title = {{Poster Abstract: SDN-based Handover Managementin Enterprise Networked Femtocells with X2-Forwarding Scheme}},
author = {Assefa, T. D. and Hoque, R. and Tragos, E. and Dimitropoulos, X.},
booktitle = {IEEE INFOCOM 2017 workshop session},
year = {2017},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/Tewelde-INFOCOM2017.pdf}
}
2016
G. Chaviaras, P. Gigis, P. Sermpezis, and X. Dimitropoulos, “ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking (demo),” in ACM SIGCOMM, 2016. [Bibtex]
@InProceedings{PavlosSIGCOMM2016,
title = {ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking (demo)},
author = {Chaviaras, G. and Gigis, P. and Sermpezis, P. and Dimitropoulos, X.},
booktitle = {ACM SIGCOMM},
year = {2016},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/PavlosSIGCOMM2016.pdf}
}
P. Sermpezis and X. Dimitropoulos, “Inter-domain SDN: Analysing the Effects of Routing Centralization on BGP Convergence Time,” in MAMA workshop (ACM SIGMETRICS), 2016. [Bibtex]
@InProceedings{PavlosMAMA2016,
title = {Inter-domain SDN: Analysing the Effects of Routing Centralization on BGP Convergence Time},
author = {Sermpezis, P. and Dimitropoulos, X.},
booktitle = {MAMA workshop (ACM SIGMETRICS)},
year = {2016},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/PavlosMAMA2016.pdf}
}
2015
V. Kotronis, R. Kloti, M. Rost, P. Georgopoulos, B. Ager, S. Schmid, and (. X. Dimitropoulos, “Investigating the Potential of the Inter-IXP Multigraph for the Provisioning of Guaranteed End-to-End Services,” in ACM SIGMETRICS, 2015. [Bibtex]
@inproceedings{KotronisSIGM2015,
author = {Kotronis, V. and Kloti, R. and Rost, M. and Georgopoulos, P. and Ager, B. and Schmid, S. and Dimitropoulos, X. (poster)},
title = {Investigating the Potential of the Inter-IXP Multigraph for the Provisioning of Guaranteed End-to-End Services},
booktitle = {ACM SIGMETRICS},
year = {2015},
pdf = {https://www.inspire.edu.gr/wp-content/pdfs/KotronisPER2015.pdf}
}
2014
A. Gamperli, V. Kotronis, and X. Dimitropoulos, “Evaluating the Effect of Centralization on Routing Convergence on a Hybrid BGP-SDN Emulation Framework (demo),” in ACM SIGCOMM, 2014. [Bibtex]
@inproceedings{KoDiAg13,
title = {Evaluating the Effect of Centralization on Routing Convergence on a Hybrid BGP-SDN Emulation Framework (demo)},
author = "A. Gamperli and V. Kotronis and X. Dimitropoulos",
booktitle = {ACM SIGCOMM},
year = {2014},
pdf={https://www1.ethz.ch/csg/people/vkotroni/bgp_sdn_demo}
}
V. Kotronis, X. Dimitropoulos, R. Kloti, B. Ager, P. Georgopoulos, and S. Schmid, “Control Exchange Points: Providing QoS-enabled End-to-End Services via SDN-based Inter-domain Routing Orchestration,” in Open Networking Summit (ONS), 2014. [Bibtex]
@inproceedings{KoDiKlAgGeSc14,
title = {Control Exchange Points: Providing QoS-enabled End-to-End Services via SDN-based Inter-domain Routing Orchestration},
author = "V. Kotronis and X. Dimitropoulos and R. Kloti and B. Ager and P. Georgopoulos and S. Schmid",
booktitle = {Open Networking Summit (ONS)},
year = {2014},
pdf={https://www.usenix.org/system/files/conference/ons2014/ons2014-paper-kotronis.pdf}
}
2013
V. Kotronis, X. Dimitropoulos, and B. Ager, “Outsourcing Routing using SDN: The Case for a Multi-domain Routing Operating System (poster),” in Open Networking Summit, 2013. [Bibtex]
@inproceedings{KoDiAg13,
title = {Outsourcing Routing using SDN: The Case for a Multi-domain Routing Operating System (poster)},
author = "V. Kotronis and X. Dimitropoulos and B. Ager",
booktitle = {Open Networking Summit},
year = {2013},
pdf={http://www.1opennetsummit.org/pdf/2013/research_track/poster_papers/ons2013-final21.pdf}
}
I. Paredes-Oliva, P. Barlet-Ros, and X. Dimitropoulos, “FaRNet: Fast Recognition of High Multi-Dimensional Network Traffic Patterns (poster),” in ACM SIGMETRICS, 2013. [Bibtex]
@inproceedings{PaBaDi13,
author = {I. Paredes-Oliva and P. Barlet-Ros and X. Dimitropoulos},
title = {{FaRNet}: Fast Recognition of High Multi-Dimensional Network Traffic Patterns (poster)},
booktitle = {ACM SIGMETRICS},
year = {2013},
pdf={http://www.cba.upc.edu/downloads/category/11-articles?download=792:%5BARTICLE%5DFaRNet-_Fast_Recognition_of_High_Multi-Dimensional_Network_Traffic_Patterns.pdf&start=280}
}
M. Djatmiko, D. Schatzmann, A. Friedman, X. Dimitropoulos, and R. Boreli, “Privacy Preserving Distributed Network Outage Monitoring (poster),” in IEEE INFOCOM, 2013. [Bibtex]
@inproceedings{DjScFrDiBo13,
author = {M. Djatmiko and D. Schatzmann and A. Friedman and X. Dimitropoulos and R. Boreli},
title = {Privacy Preserving Distributed Network Outage Monitoring (poster)},
booktitle = {IEEE INFOCOM},
year = {2013},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/INFOCOM13.pdf}
}
2012
E. Glatz and X. Dimitropoulos, “Classifying Internet One-way Traffic (poster),” in ACM SIGMETRICS, 2012. [Bibtex]
@inproceedings{GlDi12,
author = {E. Glatz and X. Dimitropoulos},
title = {Classifying Internet One-way Traffic (poster)},
booktitle = {ACM SIGMETRICS},
year = {2012},
pdf={https://www1.ethz.ch/csg/people/dimitroc/papers/sig322-glatz.pdf}
}
2011
X. Dimitropoulos, “Research Roadmap on Security Measurements,” in SysSec Workshop, 2011. [Bibtex]
@inproceedings{Di11,
author = {X. Dimitropoulos},
title = {Research Roadmap on Security Measurements},
booktitle = {SysSec Workshop},
year = {2011}
}
2010
I. Paredes-Oliva, X. Dimitropoulos, M. Molina, P. Barlet-Ros, and D. Brauckhoff, “Automating Root-Cause Analysis of Network Anomalies using Frequent Itemset Mining (demo),” in ACM SIGCOMM, 2010. [Bibtex]
@INPROCEEDINGS{PaDiMoBaBr10,
AUTHOR = "I. Paredes-Oliva and X. Dimitropoulos and M. Molina and P. Barlet-Ros and D. Brauckhoff",
TITLE = "Automating Root-Cause Analysis of Network Anomalies using Frequent Itemset Mining (demo)",
BOOKTITLE = "ACM SIGCOMM",
YEAR = "2010"
}
M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos, “SEPIA: Aggregation of Network Measurements Using Multiparty Computation (poster),” in Springer Passive and Active Measurement Conference (PAM), 2010. [Bibtex]
@inproceedings{BuStMaDi10p,
author = {M. Burkhart and M. Strasser and D. Many and X. Dimitropoulos},
title = {{SEPIA}: Aggregation of Network Measurements Using Multiparty Computation (poster)},
booktitle = {Springer Passive and Active Measurement Conference (PAM)},
year = {2010}
}
D. Schatzmann, W. Mulbauer, T. Spyropoulos, X. Dimitropoulos, and B. Plattner, “The Internet Mail System from the Network’s Perspective (poster),” in Springer Passive and Active Measurement Conference (PAM), 2010. [Bibtex]
@inproceedings{ScMuSpDi10p,
author = {D. Schatzmann and W. Mulbauer and T. Spyropoulos and X. Dimitropoulos and Bernhard Plattner},
title = {The {Internet} Mail System from the Network's Perspective (poster)},
booktitle = {Springer Passive and Active Measurement Conference (PAM)},
year = {2010}
}
2008
X. Dimitropoulos and A. Kind, “Simplifying the Configuration of Network Monitoring Probes,” in CERT FloCon Conference, 2008. [Bibtex]
@INPROCEEDINGS{DiKi08,
AUTHOR = "X. Dimitropoulos and A. Kind",
TITLE = "Simplifying the Configuration of Network Monitoring Probes",
BOOKTITLE = "CERT FloCon Conference",
YEAR = "2008"
}
2005
X. Dimitropoulos, D. Krioukov, G. Riley, and K. Claffy, “Classifying the Types of Autonomous Systems in the Internet (poster),” in ACM SIGCOMM, 2005. [Bibtex]
@INPROCEEDINGS{DiKrRikc05,
AUTHOR = "X. Dimitropoulos and D. Krioukov and G. Riley and Kc Claffy",
TITLE = "Classifying the Types of {Autonomous Systems} in the {Internet} (poster)",
BOOKTITLE = "ACM SIGCOMM",
YEAR = "2005"
}
X. Dimitropoulos, G. Riley, D. Krioukov, and R. Sundaram, “Towards a Topology Generator Modeling AS Relationships (poster),” in IEEE International Conference on Network Protocols (ICNP), 2005. [Bibtex]
@INPROCEEDINGS{DiRiKrSu05,
AUTHOR = "X. Dimitropoulos and G. Riley and D. Krioukov and R. Sundaram",
TITLE = "Towards a Topology Generator Modeling {AS} Relationships (poster)",
BOOKTITLE = "IEEE International Conference on Network Protocols (ICNP)",
YEAR = "2005"
}
Journals
2018
P. Sermpezis, V. Kotronis, P. Gigis, X. Dimitropoulos, D. Cicalese, A. King, and A. Dainotti, “ARTEMIS: Neutralizing BGP Hijacking Within a Minute,” IEEE/ACM Transactions on Networking, vol. 26, iss. 6, 2018. [Bibtex]
@article{Sermpezis2018TON,
author = {Sermpezis, Pavlos and Kotronis, Vasileios and Gigis, Petros and Dimitropoulos, Xenofontas and Cicalese, Danilo and King, Alistair and Dainotti, Alberto},
title = {{ARTEMIS: Neutralizing BGP Hijacking Within a Minute}},
journal = {IEEE/ACM Transactions on Networking},
volume = {26},
number = {6},
month = oct,
year = {2018},
numpages = {16},
doi = {10.1109/TNET.2018.2869798},
publisher = {IEEE/ACM},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/artemis_TON2018.pdf}
}
P. Sermpezis, V. Kotronis, A. Dainotti, and X. Dimitropoulos, “A Survey Among Network Operators on BGP Prefix Hijacking,” Computer Communication Review, vol. 48, iss. 1, p. 64–69, 2018. [Bibtex]
@article{Sermpezis2018CCR,
author = {Sermpezis, Pavlos and Kotronis, Vasileios and Dainotti, Alberto and Dimitropoulos, Xenofontas},
title = {{A Survey Among Network Operators on BGP Prefix Hijacking}},
journal = {Computer Communication Review},
volume = {48},
number = {1},
month = apr,
year = {2018},
pages = {64--69},
numpages = {6},
doi = {10.1145/3211852.3211862},
publisher = {ACM SIGCOMM},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/hijacking_survey_CCR2018.pdf}
}
2016
A. Dainotti, E. Katz-Bassett, and X. Dimitropolous, “The BGP Hackathon 2016 Report,” Computer Communication Review, vol. 46, iss. 3, p. 12:1–12:6, 2016. [Bibtex]
@article{Dainotti2016CCR,
author = {Dainotti, Alberto and Katz-Bassett, Ethan and Dimitropolous, Xenofontas},
title = {{The BGP Hackathon 2016 Report}},
journal = {Computer Communication Review},
volume = {46},
number = {3},
month = jul,
year = {2016},
pages = {12:1--12:6},
articleno = {12},
numpages = {6},
url = {http://doi.acm.org/10.1145/3243157.3243169},
doi = {10.1145/3243157.3243169},
acmid = {3243169},
publisher = {ACM SIGCOMM},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/sigcomm-ccr-paper27.pdf}
}
A. Dainotti, K. Benson, A. King, B. Huffaker, E. Glatz, X. Dimitropoulos, P. Richter, A. Finamore, and A. Snoeren, “Lost in Space: Improving Inference of IPv4 Address Space Utilization,” IEEE Journal on Selected Areas in Communications (JSAC), vol. 34, iss. 6, pp. 1862-1876, 2016. [Bibtex]
@article{jsac2016,
author = {Dainotti, A. and Benson, K. and King, A. and Huffaker, B. and Glatz, E. and Dimitropoulos, X. and Richter, P. and Finamore, A. and Snoeren, A.},
title = {{Lost in Space: Improving Inference of IPv4 Address Space Utilization}},
journal = {IEEE Journal on Selected Areas in Communications (JSAC)},
volume = {34},
number = {6},
pages = {1862-1876},
Year = {2016},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/lost_in_space.pdf}
}
N. B. Weidmann, S. Benitez-Baleato, P. Hunziker, E. Glatz, and X. Dimitropoulos, “Digital discrimination: Political bias in Internet service provision across ethnic groups,” Science, vol. 353, iss. 6304, p. 1151–1155, 2016. [Bibtex]
@article{Weidmann.2016,
author = {Weidmann, Nils B. and Benitez-Baleato, Suso and Hunziker, Philipp and Glatz, Eduard and Dimitropoulos, Xenofontas},
year = {2016},
title = {{Digital discrimination: Political bias in Internet service provision across ethnic groups}},
pages = {1151--1155},
volume = {353},
number = {6304},
issn = {1095-9203},
journal = {{Science}},
pdf = {http://science.sciencemag.org/content/353/6304/1151}
}
D. Gkounis, V. Kotronis, C. Liaskos, and X. Dimitropoulos., “On the Interplay of Link-Flooding Attacks and Traffic Engineering,” Computer Communication Review, 2016. [Bibtex]
@ARTICLE{GKOUNISCCR16,
AUTHOR = {Gkounis, D. and Kotronis, V. and Liaskos, C. and Dimitropoulos., X.},
TITLE = {{On the Interplay of Link-Flooding Attacks and Traffic Engineering}},
journal= {Computer Communication Review},
year= {2016},
publisher={ACM SIGCOMM},
PDF = {http://www.tik.ee.ethz.ch/file/51f46592967de54d57e28d661fd9b0f8/ccr-final765.pdf}
}
C. Liaskos, A. Tsioliaridou, A. Pistillides, I. F. Akyildiz, N. Kantartzis, A. Lalas, X. Dimitropoulos, S. Ioannidis, M. Kafesaki, and C. Soukoulis, “Design and Development of Software Defined Metamaterials for Nanonetworks,” IEEE Circuits and Systems Magazine, 2016. [Bibtex]
@article{SDM.2016,
title={{Design and Development of Software Defined Metamaterials for Nanonetworks}},
author={Liaskos, C. and Tsioliaridou, A. and Pistillides, A. and Akyildiz, I.F. and Kantartzis, N. and Lalas, A. and Dimitropoulos, X. and Ioannidis, S. and Kafesaki, M. and Soukoulis, C.},
journal={IEEE Circuits and Systems Magazine},
pdf = {https://www.inspire.edu.gr/wp-content/pdfs/SDM1.pdf},
year={2016},
publisher={IEEE}
}
R. Kloeti, B. Ager, V. Kotronis, G. Nomikos, and X. Dimitropoulos, “A Comparative Look into Public IXP Datasets,” Computer Communication Review, 2016. [Bibtex]
@article{CCR.2016a,
title={{A Comparative Look into Public IXP Datasets}},
author={Kloeti, R. and Ager, B. and Kotronis, V. and Nomikos, G. and Dimitropoulos, X.},
journal={Computer Communication Review},
year={2016},
publisher={ACM SIGCOMM},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/kloticcr16.pdf}
}
2015
V. Kotronis, A. Gamperli, and X. Dimitropoulos, “Routing centralization across domains via SDN: A model and emulation framework for BGP evolution,” Computer Networks, 2015. [Bibtex]
@article{KotronisCOMNET2015,
author = {Kotronis, V. and Gamperli, A. and Dimitropoulos, X.},
title = {Routing centralization across domains via SDN: A model and emulation framework for BGP evolution},
journal = {Computer Networks},
year = {2015},
pdf = {https://www.inspire.edu.gr/wp-content/pdfs/KotronisCOMNET2015.pdf},
publisher = {Elsevier}
}
V. Kotronis, R. Kloti, M. Rost, P. Georgopoulos, B. Ager, S. Schmid, and X. Dimitropoulos, “Investigating the Potential of the Inter-IXP Multigraph for the Provisioning of Guaranteed End-to-End Services,” SIGMETRICS Performamce Evaluation Review, 2015. [Bibtex]
@article{KotronisPER2015,
author = {Kotronis, V. and Kloti, R. and Rost, M. and Georgopoulos, P. and Ager, B. and Schmid, S. and Dimitropoulos, X.},
title = {Investigating the Potential of the Inter-IXP Multigraph for the Provisioning of Guaranteed End-to-End Services},
journal = {SIGMETRICS Performamce Evaluation Review},
year = {2015},
pdf = {https://www.inspire.edu.gr/wp-content/pdfs/KotronisPER2015.pdf}
}
2014
A. Gamperli, V. Kotronis, and X. Dimitropoulos, “Evaluating the Effect of Centralization on Routing Convergence on a Hybrid BGP-SDN Emulation Framework,” Computer Communication Review, 2014. [Bibtex]
@article{Gamperli2014,
author = {Gamperli, A. and Kotronis, V. and Dimitropoulos, X.},
title = {Evaluating the Effect of Centralization on Routing Convergence on a Hybrid BGP-SDN Emulation Framework},
journal = {Computer Communication Review},
year = {2014},
pdf = {https://www.inspire.edu.gr/wp-content/pdfs/GAMPERLI14.pdf},
publisher = {ACM SIGCOMM}
}
E. Raftopoulos and X. Dimitropoulos, “IDS Alert Correlation in the Wild with EDGe,” IEEE Journal on Selected Areas on Communications (JSAC), 2014. [Bibtex]
@ARTICLE{RaDi13c,
AUTHOR = "E. Raftopoulos and X. Dimitropoulos",
TITLE = "IDS Alert Correlation in the Wild with EDGe",
journal = {IEEE Journal on Selected Areas on Communications (JSAC)},
YEAR = "2014",
pdf={https://www.inspire.edu.gr/wp-content/pdfs/raftopoulos2014.pdf}
}
A. Dainotti, K. Benson, A. King, K. Claffy, M. Kallitsis, E. Glatz, and X. Dimitropoulos, “Estimating Internet Address Space Usage Through Passive Measurements,” ACM SIGCOMM Computer Communication Review (CCR), vol. 44, iss. 1, 2014. [Bibtex]
@ARTICLE{DaBeKiClKaGlDi14,
TITLE = "Estimating Internet Address Space Usage Through Passive Measurements",
AUTHOR = "A. Dainotti and K. Benson and A. King and Kc Claffy and M. Kallitsis and E. Glatz and X. Dimitropoulos",
JOURNAL = "ACM SIGCOMM Computer Communication Review (CCR)",
YEAR = "2014",
volume = "44",
number = "1",
pdf={http://www.sigcomm.org/sites/default/files/ccr/papers/2014/January/2567561-2567568.pdf}
}
2013
I. Paredes-Oliva, P. Barlet-Ros, and X. Dimitropoulos, “FaRNet: Fast Recognition of High Multi-Dimensional Network Traffic Patterns,” Elsevier Computer Networks, vol. 41, iss. 1, 2013. [Bibtex]
@ARTICLE{PaBaDi13b,
author = {I. Paredes-Oliva and P. Barlet-Ros and X. Dimitropoulos},
title = {{FaRNet}: Fast Recognition of High Multi-Dimensional Network Traffic Patterns},
JOURNAL = "Elsevier Computer Networks",
year = {2013},
volume = "41",
number = "1",
pdf={http://www.cba.upc.edu/downloads/category/11-articles?download=792:%5BARTICLE%5DFaRNet-_Fast_Recognition_of_High_Multi-Dimensional_Network_Traffic_Patterns.pdf&start=280}
}
M. Djatmiko, D. Schatzmann, A. Friedman, X. Dimitropoulos, and R. Boreli, “Collaborative Network Outage Troubleshooting with Secure Multiparty Computation,” IEEE Communications Magazine, vol. 51, iss. 11, 2013. [Bibtex]
@ARTICLE{Dj13,
AUTHOR = "M. Djatmiko and D. Schatzmann and A. Friedman and X. Dimitropoulos and R. Boreli",
TITLE = "Collaborative Network Outage Troubleshooting with Secure Multiparty Computation",
JOURNAL = "IEEE Communications Magazine",
volume = "51",
number = "11",
YEAR = "2013",
pdf={https://www.inspire.edu.gr/wp-content/pdfs/djatmiko2013.pdf}
}
2012
D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian, “Anomaly Extraction in Backbone Networks using Association Rules,” IEEE/ACM Transactions on Networking (ToN), 2012. [Bibtex]
@ARTICLE{BrDiWaSa12,
author = {D. Brauckhoff and X. Dimitropoulos and A. Wagner and K. Salamatian},
title = {Anomaly Extraction in Backbone Networks using Association Rules},
journal = {IEEE/ACM Transactions on Networking (ToN) },
year = {2012}
}
F. Fusco, X. Dimitropoulos, M. Vlachos, and L. Deri, “pcapIndex: An Index for Network Packet Traces with Legacy Compatibility,” ACM SIGCOMM Computer Communication Review (CCR), vol. 42, iss. 1, 2012. [Bibtex]
@article{FuDiVlDe11,
title = {{pcapIndex}: An Index for Network Packet Traces with Legacy Compatibility},
author = "F. Fusco and X. Dimitropoulos and M. Vlachos and L. Deri",
journal = "ACM SIGCOMM Computer Communication Review (CCR)",
year = {2012},
volume = "42",
number = "1"
}
M. Burkhart and X. Dimitropoulos, “How to Protect Data Privacy in Collaborative Network Security,” ERCIM News, vol. 90, 2012. [Bibtex]
@ARTICLE{BuDi12,
author = {M. Burkhart and X. Dimitropoulos},
title = {How to Protect Data Privacy in Collaborative Network Security},
journal = {ERCIM News},
volume = {90},
year = {2012}
}
2011
M. Burkhart and X. Dimitropoulos, “Privacy-Preserving Distributed Network Troubleshooting – Bridging the Gap between Theory and Practice,” ACM Transactions on Information and Systems Security (TISS), vol. 14, iss. 4, 2011. [Bibtex]
@ARTICLE{BuDi10,
author = {M. Burkhart and X. Dimitropoulos},
title = {Privacy-Preserving Distributed Network Troubleshooting -- Bridging the Gap between Theory and Practice},
journal = {ACM Transactions on Information and Systems Security (TISS)},
volume = {14},
number = {4},
year = {2011}
}
2009
X. Dimitropoulos, D. Krioukov, G. Riley, and A. Vahdat, “Graph Annotations in Modeling Complex Network Topologies,” ACM Transactions on Modeling and Computer Simulation, vol. 19, iss. 4, 2009. [Bibtex]
@ARTICLE{DiKrRiVa09,
TITLE = "Graph Annotations in Modeling Complex Network Topologies",
AUTHOR = "X. Dimitropoulos and D. Krioukov and G. Riley and A. Vahdat",
JOURNAL = "ACM Transactions on Modeling and Computer Simulation",
volume = "19",
number = "4",
YEAR = "2009"
}
A. Kind, M. Stoecklin, and X. Dimitropoulos, “Histogram-based Traffic Anomaly Detection,” IEEE Transactions on Network and Service Management, vol. 6, iss. 2, 2009. [Bibtex]
@ARTICLE{KiStDi08,
TITLE = "Histogram-based Traffic Anomaly Detection",
AUTHOR = "A. Kind and M. Stoecklin and X. Dimitropoulos",
JOURNAL = "IEEE Transactions on Network and Service Management",
volume = "6",
number = "2",
YEAR = "2009"
}
D. Dechouniotis, N. Leontiou, X. Dimitropoulos, A. Kind, and S. Denazis, “Unveiling the underlying relationships over a network for monitoring purposes,” Wiley International Journal of Network Management, vol. 19, iss. 6, 2009. [Bibtex]
@ARTICLE{DeLeDiKiDe09,
author = {D. Dechouniotis and N. Leontiou and X. Dimitropoulos and A. Kind and S. Denazis},
title = {Unveiling the underlying relationships over a network for monitoring purposes},
journal = {Wiley International Journal of Network Management},
volume = {19},
number = {6},
year = {2009}
}
2008
X. Dimitropoulos, P. Hurley, and A. Kind, “Probabilistic Lossy Counting: An efficient algorithm for finding network traffic heavy hitters,” ACM SIGCOMM Computer Communication Review (CCR), vol. 38, iss. 1, 2008. [Bibtex]
@ARTICLE{DiHuKi08,
TITLE = "Probabilistic Lossy Counting: An efficient algorithm for finding network traffic heavy hitters",
AUTHOR = "X. Dimitropoulos and P. Hurley and A. Kind",
JOURNAL = "ACM SIGCOMM Computer Communication Review (CCR)",
YEAR = "2008",
volume = "38",
number = "1"
}
X. Dimitropoulos, Á. M. Serrano, and D. Krioukov, “On cycles in AS relationships,” ACM SIGCOMM Computer Communication Review (CCR), vol. 38, iss. 3, 2008. [Bibtex]
@article{DiSeKr08,
title = "On cycles in {AS} relationships",
author = "X. Dimitropoulos and M. \'{A}ngeles Serrano and D. Krioukov",
journal = "ACM SIGCOMM Computer Communication Review (CCR)",
volume = {38},
number = {3},
year = {2008}
}
X. Dimitropoulos, M. Stocklin, P. Hurley, and A. Kind, “The Eternal Sunshine of the Sketch Data Structure,” Elsevier Computer Networks, vol. 52, iss. 17, 2008. [Bibtex]
@ARTICLE{DiStHuKi08,
AUTHOR = "X. Dimitropoulos and M. Stocklin and P. Hurley and A. Kind",
TITLE = "The Eternal Sunshine of the Sketch Data Structure",
JOURNAL = "Elsevier Computer Networks",
volume = {52},
number = {17},
YEAR = "2008"
}
A. Kind, S. Denazis, X. Dimitropoulos, and B. Claise, “Advanced Network Monitoring Brings Life to the Awareness Plane,” IEEE Communications Magazine, vol. 46, iss. 10, 2008. [Bibtex]
@ARTICLE{KiDeDiCl09,
AUTHOR = "A. Kind and S. Denazis and X. Dimitropoulos and B. Claise",
TITLE = "Advanced Network Monitoring Brings Life to the Awareness Plane",
JOURNAL = "IEEE Communications Magazine",
volume = "46",
number = "10",
YEAR = "2008"
}
2007
X. Dimitropoulos, D. Krioukov, M. Fomenkov, B. Huffaker, Y. Hyun, K. Claffy, and G. Riley, “AS Relationships: Inference and Validation,” ACM SIGCOMM Computer Communication Review (CCR), vol. 37, iss. 1, 2007. [Bibtex]
@ARTICLE{DiKrFo07,
TITLE = "{AS} Relationships: Inference and Validation",
AUTHOR = "X. Dimitropoulos and D. Krioukov and M. Fomenkov and B. Huffaker and Y. Hyun and Kc Claffy and G. Riley",
JOURNAL = "ACM SIGCOMM Computer Communication Review (CCR)",
YEAR = "2007",
volume = "37",
number = "1"
}
2006
X. Dimitropoulos and G. Riley, “Efficient Large-Scale BGP Simulations,” Elsevier Computer Networks, Special Issue on Network Modeling and Simulation, vol. 50, iss. 12, 2006. [Bibtex]
@ARTICLE{DiRi05,
author = {X. Dimitropoulos and G. Riley},
title = {Efficient Large-Scale {BGP} Simulations},
PUBLISHER = "Elsevier Science Publishers",
JOURNAL = "Elsevier Computer Networks, Special Issue on Network Modeling and Simulation",
YEAR = "2006",
volume = "50",
number = "12"
}
P. Mahadevan, D. Krioukov, M. Fomenkov, B. Huffaker, X. Dimitropoulos, K. Claffy, and A. Vahdat, “The Internet AS-Level Topology: Three Data Sources and One Definitive Metric,” ACM SIGCOMM Computer Communication Review (CCR), vol. 36, iss. 1, 2006. [Bibtex]
@ARTICLE{MaKrFo06,
AUTHOR = "P. Mahadevan and D. Krioukov and M. Fomenkov and B. Huffaker and X. Dimitropoulos
and Kc Claffy and A. Vahdat",
TITLE = "The {Internet} {AS}-Level Topology: Three Data Sources and One Definitive Metric",
JOURNAL = "ACM SIGCOMM Computer Communication Review (CCR)",
YEAR = "2006",
volume = "36",
number = "1"
}
Tech Reports
2016
P. Sermpezis and X. Dimitropoulos, “Inter-domain SDN: Analysing the Effects of Routing Centralization on BGP Convergence Time,” 2016. [Bibtex]
@TECHREPORT{PavlosMAMA2016TR,
title = {Inter-domain SDN: Analysing the Effects of Routing Centralization on BGP Convergence Time},
author = {Sermpezis, P. and Dimitropoulos, X.},
booktitle = {arXiv:1605.08864 [cs.NI]},
year = {2016},
pdf={http://arxiv.org/abs/1605.08864}
}
2014
D. Gkounis, V. Kotronis, and X. Dimitropoulos, “Towards Defeating the Crossfire Attack using SDN,” , arXiv preprint arXiv:1412.2013, 2014. [Bibtex]
@TECHREPORT{gkounis2014towards,
TITLE = {Towards Defeating the Crossfire Attack using SDN},
AUTHOR = {Gkounis, Dimitrios and Kotronis, Vasileios and Dimitropoulos, Xenofontas},
YEAR = "2014",
type = "arXiv preprint",
number = "arXiv:1412.2013"
}
2012
E. Glatz and X. Dimitropoulos, “Classifying Internet One-way Traffic,” ETH, Technical Report 336, 2012. [Bibtex]
@TECHREPORT{GlDi12tech,
author = {E. Glatz and X. Dimitropoulos},
title = {Classifying Internet One-way Traffic},
INSTITUTION = "ETH",
type = "Technical Report",
number = "336",
YEAR = "2012"
}
E. Raftopoulos and X. Dimitropoulos, “Technical Report: Shedding Light on Data Correlation during Network Forensics Analysis,” ETH, Technical Report 346, 2012. [Bibtex]
@TECHREPORT{RaDi12b,
author = {E. Raftopoulos and X. Dimitropoulos},
title = {Technical Report: Shedding Light on Data Correlation during Network Forensics Analysis},
INSTITUTION = "ETH",
type = "Technical Report",
number = "346",
YEAR = "2012"
}
2011
E. Raftopoulos and X. Dimitropoulos, “Detecting, Validating and Characterizing Computer Infections from IDS Alerts,” ETH, Technical Report 337, 2011. [Bibtex]
@TECHREPORT{RaDi11a,
author = {E. Raftopoulos and X. Dimitropoulos},
title = {Detecting, Validating and Characterizing Computer Infections from {IDS} Alerts},
INSTITUTION = "ETH",
type = "Technical Report",
number = "337",
YEAR = "2011"
}
2009
M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos, “SEPIA: Security through Private Information Aggregation,” ETH, Technical Report 298, 2009. [Bibtex]
@TECHREPORT{BuStMaDi09,
AUTHOR = "M. Burkhart and M. Strasser and D. Many and X. Dimitropoulos",
TITLE = "{SEPIA}: Security through Private Information Aggregation",
INSTITUTION = "ETH",
type = "Technical Report",
number = "298",
YEAR = "2009"
}
2005
P. Mahadevan, D. Krioukov, M. Fomenkov, B. Huffaker, X. Dimitropoulos, K. Claffy, and A. Vahdat, “Lesson from Three Views of the Internet Topology,” CAIDA, Technical Report TR-2005-02, 2005. [Bibtex]
@TECHREPORT{MaKrFoHuDiKcVa05-tr,
AUTHOR = "P. Mahadevan and D. Krioukov and M. Fomenkov and B. Huffaker and X. Dimitropoulos and Kc Claffy and A. Vahdat",
TITLE = "Lesson from Three Views of the {Internet} Topology",
INSTITUTION = "CAIDA",
type = "Technical Report",
number = "TR-2005-02",
YEAR = "2005"
}
A. Milolidakis, R. Fontugne, and X. Dimitropoulos, “Detecting Network Disruptions At Colocation Facilities,” in IEEE INFOCOM, 2019. [Bibtex]
@inproceedings{milolidakis2019INFOCOM,
title={{Detecting Network Disruptions At Colocation Facilities}},
author={Milolidakis, A. and Fontugne, R. and Dimitropoulos, X.},
booktitle={IEEE INFOCOM},
year={2019},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/milolidakis_infocom2019.pdf}
}
P. Sermpezis and V. Kotronis, “Inferring Catchment in Internet Routing,” in ACM SIGMETRICS, 2019. [Bibtex]
@inproceedings{Sermpezis2019SIGMETRICS,
title = {{Inferring Catchment in Internet Routing}},
author = {Sermpezis, P. and Kotronis, V.},
booktitle = {ACM SIGMETRICS},
volume = {3},
number = {2},
month = jun,
year = {2019},
numpages = {31},
doi = {10.1145/3326145},
publisher = {ACM},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/paper_74_Sigmetrics_camera_ready.pdf}
}
P. Sermpezis, V. Kotronis, A. Dainotti, and X. Dimitropoulos, “A Survey Among Network Operators on BGP Prefix Hijacking,” Computer Communication Review, vol. 48, iss. 1, p. 64–69, 2018. [Bibtex]
@article{Sermpezis2018CCR,
author = {Sermpezis, Pavlos and Kotronis, Vasileios and Dainotti, Alberto and Dimitropoulos, Xenofontas},
title = {{A Survey Among Network Operators on BGP Prefix Hijacking}},
journal = {Computer Communication Review},
volume = {48},
number = {1},
month = apr,
year = {2018},
pages = {64--69},
numpages = {6},
doi = {10.1145/3211852.3211862},
publisher = {ACM SIGCOMM},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/hijacking_survey_CCR2018.pdf}
}
S. Kastanakis, P. Sermpezis, V. Kotronis, and X. Dimitropoulos, “CABaRet: Leveraging Recommendation Systems for Mobile Edge Caching,” in ACM SIGCOMM Workshop on Mobile Edge Communications (MECOMM ’18), 2018. [Bibtex]
@InProceedings{kastanakis2018cabaret,
title={{CABaRet: Leveraging Recommendation Systems for Mobile Edge Caching}},
author={Kastanakis, Savvas and Sermpezis, Pavlos and Kotronis, Vasileios and Dimitropoulos, Xenofontas},
booktitle = {ACM SIGCOMM Workshop on Mobile Edge Communications (MECOMM '18)},
year={2018},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/KastanakisMECOMM18.pdf}
}
P. Sermpezis, V. Kotronis, P. Gigis, X. Dimitropoulos, D. Cicalese, A. King, and A. Dainotti, “ARTEMIS: Neutralizing BGP Hijacking Within a Minute,” IEEE/ACM Transactions on Networking, vol. 26, iss. 6, 2018. [Bibtex]
@article{Sermpezis2018TON,
author = {Sermpezis, Pavlos and Kotronis, Vasileios and Gigis, Petros and Dimitropoulos, Xenofontas and Cicalese, Danilo and King, Alistair and Dainotti, Alberto},
title = {{ARTEMIS: Neutralizing BGP Hijacking Within a Minute}},
journal = {IEEE/ACM Transactions on Networking},
volume = {26},
number = {6},
month = oct,
year = {2018},
numpages = {16},
doi = {10.1109/TNET.2018.2869798},
publisher = {IEEE/ACM},
pdf={https://www.inspire.edu.gr/wp-content/pdfs/artemis_TON2018.pdf}
}
Patents
2011
D. Bauer, D. Dechouniotis, X. Dimitropoulos, and A. Kind, “Valley-free Shortest Path Method,” , 2011. [Bibtex]
@patent{DiKiBaDe07,
author = "D. Bauer and D. Dechouniotis and X. Dimitropoulos and A. Kind",
title = "Valley-free Shortest Path Method",
year = "2011",
yearfiled = "2007",
howpublished = {US Patent 7907596}
}
X. Dimitropoulos, A. Kind, B. Jansen, and J. Massar, “Determination of Network Topology Using Flow-Based Traffic Information,” , 2011. [Bibtex]
@patent{KiDiJaMa08,
author = "X. Dimitropoulos and A. Kind and B. Jansen and J. Massar",
title = "Determination of Network Topology Using Flow-Based Traffic Information",
year = "2011",
yearfiled = "2008",
howpublished = {US Patent 7864707}
}
X. Dimitropoulos, P. Hurley, A. Kind, and M. Stoecklin, “Probabilistic Lossy Counting,” , 2011. [Bibtex]
@patent{DiHuKiSt08,
author = "X. Dimitropoulos and P. Hurley and A. Kind and M. Stoecklin",
title = "Probabilistic Lossy Counting",
howpublished = {US Patent 7937388},
year = "2011",
yearfiled = "2008",
}
Foundation for Research and Technology - Hellas ,
Institute of Computer Science,
Telecommunications and Networks Laboratory,
Leoforos Plastira 100, GR-700 13 Heraklion, Crete, Greece.
Tel: +30 2810 391724 Fax: +30 2810 391601
University of Crete, Department of Computer Science. Office B-317, Heraklion Voutes Campus
GR-700 13 Heraklion, Crete, Greece.
Tel: +30 2810 393200 Fax: +30 2810 393202