Skip to main content

Showing 1–18 of 18 results for author: Shavitt, Y

.
  1. arXiv:2504.10299  [pdf, ps, other

    cs.NI

    IRR-Based AS Type of Relationship Inference

    Authors: Amit Zulan, Omer Miron, Tal Shapira, Yuval Shavitt

    Abstract: The Internet comprises tens of thousands of autonomous systems (ASes) whose commercial relationships are not publicly announced. The classification of the Type of Relationship (ToR) between ASes has been extensively studied over the past two decades due to its relevance in network routing management and security. This paper presents a new approach to ToR classification, leveraging publicly avail… ▽ More

    Submitted 14 April, 2025; originally announced April 2025.

    Comments: 19 pages, 7 figures

  2. arXiv:2412.14286  [pdf, other

    cs.CY

    Measuring DNS Censorship of Generative AI Platforms

    Authors: Harel Berger, Yuval Shavitt

    Abstract: Generative AI is an invaluable tool, however, in some parts of the world, this technology is censored due to political or societal issues. In this work, we monitor Generative AI censorship through the DNS protocol. We find China to be a leading country of Generative AI censorship. Interestingly, China does not censor all AI domain names. We also report censorship in Russia and find inconsistencies… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

  3. arXiv:2311.00335  [pdf, other

    cs.NI

    BGP Typo: A Longitudinal Study and Remedies

    Authors: Liron David, Yuval Shavitt

    Abstract: BGP is the protocol that keeps Internet connected. Operators use it by announcing Address Prefixes (APs), namely IP address blocks, that they own or that they agree to serve as transit for. BGP enables ISPs to devise complex policies to control what AP announcements to accept (import policy), the route selection, and what AP to announce and to whom (export policy). In addition, BGP is also used to… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

  4. arXiv:2302.02112  [pdf, other

    cs.CR cs.LG cs.SE

    Detecting Security Patches via Behavioral Data in Code Repositories

    Authors: Nitzan Farhi, Noam Koenigstein, Yuval Shavitt

    Abstract: The absolute majority of software today is developed collaboratively using collaborative version control tools such as Git. It is a common practice that once a vulnerability is detected and fixed, the developers behind the software issue a Common Vulnerabilities and Exposures or CVE record to alert the user community of the security hazard and urge them to integrate the security patch. However, so… ▽ More

    Submitted 4 February, 2023; originally announced February 2023.

  5. arXiv:1612.04096  [pdf, other

    cs.NI

    Setting the Foundations for PoP-Based Internet Evolution Models

    Authors: Noa Zilberman, Yuval Shavitt

    Abstract: Developing an evolution model of the Internet has been a long standing research challenge. Such a model can improve the design and placement of communication infrastructure, reducing costs and improving users' quality of experience. While communication infrastructure is tightly coupled to geographical locations, Internet modelling and forecasting in the last decade used network elements that are o… ▽ More

    Submitted 14 December, 2016; v1 submitted 13 December, 2016; originally announced December 2016.

  6. arXiv:1505.05033  [pdf, other

    cs.DC cs.NI

    Optimizing Dijkstra for real-world performance

    Authors: Nimrod Aviram, Yuval Shavitt

    Abstract: Using Dijkstra's algorithm to compute the shortest paths in a graph from a single source node to all other nodes is common practice in industry and academia. Although the original description of the algorithm advises using a Fibonacci Heap as its internal queue, it has been noted that in practice, a binary (or $d$-ary) heap implementation is significantly faster. This paper introduces an even fast… ▽ More

    Submitted 19 May, 2015; originally announced May 2015.

  7. arXiv:1503.02413  [pdf, other

    cs.DS cs.NI cs.PF

    Stochastic Service Placement

    Authors: Galia Shabtai, Danny Raz, Yuval Shavitt

    Abstract: Resource allocation for cloud services is a complex task due to the diversity of the services and the dynamic workloads. One way to address this is by overprovisioning which results in high cost due to the unutilized resources. A much more economical approach, relying on the stochastic nature of the demand, is to allocate just the right amount of resources and use additional more expensive mechani… ▽ More

    Submitted 9 March, 2015; originally announced March 2015.

    Comments: 27 pages, 4 figures

  8. arXiv:1306.0808  [pdf, other

    physics.soc-ph cond-mat.stat-mech cs.SI

    The Role of Trends in Evolving Networks

    Authors: Osnat Mokryn, Marcel Blattner, Yuval Shavitt

    Abstract: Modeling complex networks has been the focus of much research for over a decade. Preferential attachment (PA) is considered a common explanation to the self organization of evolving networks, suggesting that new nodes prefer to attach to more popular nodes. The PA model results in broad degree distributions, found in many networks, but cannot explain other common properties such as: The growth of… ▽ More

    Submitted 4 June, 2013; originally announced June 2013.

    Comments: 5 pages, 4 figures

  9. arXiv:1201.0834  [pdf, ps, other

    cs.NI

    Topological Trends of Internet Content Providers

    Authors: Yuval Shavitt, Udi Weinsberg

    Abstract: The Internet is constantly changing, and its hierarchy was recently shown to become flatter. Recent studies of inter-domain traffic showed that large content providers drive this change by bypassing tier-1 networks and reaching closer to their users, enabling them to save transit costs and reduce reliance of transit networks as new services are being deployed, and traffic shaping is becoming incre… ▽ More

    Submitted 4 January, 2012; originally announced January 2012.

  10. arXiv:1011.2324  [pdf, ps, other

    cs.NI

    On the Dynamics of IP Address Allocation and Availability of End-Hosts

    Authors: Oded Argon, Anat Bremler-Barr, Osnat Mokryn, Dvir Schirman, Yuval Shavitt, Udi Weinsberg

    Abstract: The availability of end-hosts and their assigned routable IP addresses has impact on the ability to fight spammers and attackers, and on peer-to-peer application performance. Previous works study the availability of hosts mostly by using either active pinging or by studying access to a mail service, both approaches suffer from inherent inaccuracies. We take a different approach by measuring the IP… ▽ More

    Submitted 10 November, 2010; originally announced November 2010.

  11. arXiv:1005.5674  [pdf, ps, other

    cs.NI

    A Study of Geolocation Databases

    Authors: Yuval Shavitt, Noa Zilberman

    Abstract: The geographical location of Internet IP addresses has an importance both for academic research and commercial applications. Thus, both commercial and academic databases and tools are available for mapping IP addresses to geographic locations. Evaluating the accuracy of these mapping services is complex since obtaining diverse large scale ground truth is very hard. In this work we evaluate mapping… ▽ More

    Submitted 1 July, 2010; v1 submitted 31 May, 2010; originally announced May 2010.

  12. arXiv:0908.0968  [pdf, ps, other

    cs.DS cs.DM

    Approximating the Statistics of various Properties in Randomly Weighted Graphs

    Authors: Yuval Emek, Amos Korman, Yuval Shavitt

    Abstract: Consider the setting of \emph{randomly weighted graphs}, namely, graphs whose edge weights are chosen independently according to probability distributions with finite support over the non-negative reals. Under this setting, properties of weighted graphs typically become random variables and we are interested in computing their statistical features. Unfortunately, this turns out to be computational… ▽ More

    Submitted 28 March, 2010; v1 submitted 7 August, 2009; originally announced August 2009.

    Comments: 22 pages (excluding the title page)

  13. arXiv:0807.3326  [pdf, ps, other

    cs.NI cs.CC

    An $O(\log n)$-approximation for the Set Cover Problem with Set Ownership

    Authors: Mira Gonen, Yuval Shavitt

    Abstract: In highly distributed Internet measurement systems distributed agents periodically measure the Internet using a tool called {\tt traceroute}, which discovers a path in the network graph. Each agent performs many traceroute measurement to a set of destinations in the network, and thus reveals a portion of the Internet graph as it is seen from the agent locations. In every period we need to check… ▽ More

    Submitted 21 July, 2008; originally announced July 2008.

  14. arXiv:0711.4562  [pdf, ps, other

    cs.NI

    Near-Deterministic Inference of AS Relationships

    Authors: Yuval Shavitt, Eran Shir, Udi Weinsberg

    Abstract: The discovery of Autonomous Systems (ASes) interconnections and the inference of their commercial Type-of-Relationships (ToR) has been extensively studied during the last few years. The main motivation is to accurately calculate AS-level paths and to provide better topological view of the Internet. An inherent problem in current algorithms is their extensive use of heuristics. Such heuristics in… ▽ More

    Submitted 28 November, 2007; originally announced November 2007.

  15. arXiv:cs/0607080  [pdf, ps, other

    cs.NI cond-mat.dis-nn

    New Model of Internet Topology Using k-shell Decomposition

    Authors: Shai Carmi, Shlomo Havlin, Scott Kirkpatrick, Yuval Shavitt, Eran Shir

    Abstract: We introduce and use k-shell decomposition to investigate the topology of the Internet at the AS level. Our analysis separates the Internet into three sub-components: (a) a nucleus which is a small (~100 nodes) very well connected globally distributed subgraph; (b) a fractal sub-component that is able to connect the bulk of the Internet without congesting the nucleus, with self similar propertie… ▽ More

    Submitted 17 July, 2006; originally announced July 2006.

    Comments: 4 pages, 4 figures

    Journal ref: PNAS 104, 11150-11154 (2007).

  16. arXiv:cond-mat/0601240  [pdf, ps, other

    cond-mat.dis-nn cond-mat.stat-mech physics.soc-ph

    MEDUSA - New Model of Internet Topology Using k-shell Decomposition

    Authors: Shai Carmi, Shlomo Havlin, Scott Kirkpatrick, Yuval Shavitt, Eran Shir

    Abstract: The k-shell decomposition of a random graph provides a different and more insightful separation of the roles of the different nodes in such a graph than does the usual analysis in terms of node degrees. We develop this approach in order to analyze the Internet's structure at a coarse level, that of the "Autonomous Systems" or ASes, the subnetworks out of which the Internet is assembled. We emplo… ▽ More

    Submitted 11 January, 2006; originally announced January 2006.

    Comments: 24 pages, 17 figures

    Journal ref: PNAS 104, 11150-11154 (2007).

  17. arXiv:cs/0506099  [pdf, ps, other

    cs.NI

    DIMES: Let the Internet Measure Itself

    Authors: Yuval Shavitt, Eran Shir

    Abstract: Today's Internet maps, which are all collected from a small number of vantage points, are falling short of being accurate. We suggest here a paradigm shift for this task. DIMES is a distributed measurement infrastructure for the Internet that is based on the deployment of thousands of light weight measurement agents around the globe. We describe the rationale behind DIMES deployment, discuss i… ▽ More

    Submitted 28 June, 2005; originally announced June 2005.

    Comments: 10 pages, 12 figures

  18. arXiv:cond-mat/0305582  [pdf, ps, other

    cond-mat cond-mat.dis-nn cs.NI

    On the Tomography of Networks and Multicast Trees

    Authors: R. Cohen, D. Dolev, S. Havlin, T. Kalisky, O. Mokryn, Y. Shavitt

    Abstract: In this paper we model the tomography of scale free networks by studying the structure of layers around an arbitrary network node. We find, both analytically and empirically, that the distance distribution of all nodes from a specific network node consists of two regimes. The first is characterized by rapid growth, and the second decays exponentially. We also show that the nodes degree distribut… ▽ More

    Submitted 25 May, 2003; originally announced May 2003.

    Report number: TR2002-49 HUJI (2002)