Skip to main content

Showing 1–12 of 12 results for author: Apostolaki, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.07713  [pdf, ps, other

    cs.NI

    Routing Attacks in Ethereum PoS: A Systematic Exploration

    Authors: Constantine Doumanidis, Maria Apostolaki

    Abstract: With the promise of greater decentralization and sustainability, Ethereum transitioned from a Proof-of-Work (PoW) to a Proof-of-Stake (PoS) consensus mechanism. The new consensus protocol introduces novel vulnerabilities that warrant further investigation. The goal of this paper is to investigate the security of Ethereum's PoS system from an Internet routing perspective. To this end, this paper… ▽ More

    Submitted 12 May, 2025; originally announced May 2025.

    Comments: 15 pages, 16 figures

  2. arXiv:2409.04691  [pdf, other

    cs.CR cs.NI

    Robustifying ML-powered Network Classifiers with PANTS

    Authors: Minhao Jin, Maria Apostolaki

    Abstract: Multiple network management tasks, from resource allocation to intrusion detection, rely on some form of ML-based network traffic classification (MNC). Despite their potential, MNCs are vulnerable to adversarial inputs, which can lead to outages, poor decision-making, and security violations, among other issues. The goal of this paper is to help network operators assess and enhance the robustness… ▽ More

    Submitted 31 January, 2025; v1 submitted 6 September, 2024; originally announced September 2024.

  3. arXiv:2408.09622  [pdf, other

    cs.CR cs.NI

    Global BGP Attacks that Evade Route Monitoring

    Authors: Henry Birge-Lee, Maria Apostolaki, Jennifer Rexford

    Abstract: As the deployment of comprehensive Border Gateway Protocol (BGP) security measures is still in progress, BGP monitoring continues to play a critical role in protecting the Internet from routing attacks. Fundamentally, monitoring involves observing BGP feeds to detect suspicious announcements and taking defensive action. However, BGP monitoring relies on seeing the malicious BGP announcement in the… ▽ More

    Submitted 18 August, 2024; originally announced August 2024.

    Comments: 10 pages

  4. arXiv:2405.09442  [pdf, other

    cs.NI

    Network Function Capacity Reconnaissance by Remote Adversaries

    Authors: Aqsa Kashaf, Aidan Walsh, Maria Apostolaki, Vyas Sekar, Yuvraj Agarwal

    Abstract: There is anecdotal evidence that attackers use reconnaissance to learn the capacity of their victims before DDoS attacks to maximize their impact. The first step to mitigate capacity reconnaissance attacks is to understand their feasibility. However, the feasibility of capacity reconnaissance in network functions (NFs) (e.g., firewalls, NATs) is unknown. To this end, we formulate the problem of ne… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

  5. arXiv:2403.04165  [pdf, other

    cs.NI

    Super-resolution on network telemetry time series

    Authors: Fengchen Gong, Divya Raghunathan, Aarti Gupta, Maria Apostolaki

    Abstract: Fine-grained monitoring is crucial for multiple data-driven tasks such as debugging, provisioning, and securing networks. Yet, practical constraints in collecting, extracting, and storing data often force operators to use coarse-grained sampled monitoring, degrading the performance of the various tasks. In this work, we explore the feasibility of leveraging the correlations among coarse-grained ti… ▽ More

    Submitted 6 March, 2024; originally announced March 2024.

  6. arXiv:2310.18030  [pdf, other

    cs.NI

    Confucius: Achieving Consistent Low Latency with Practical Queue Management for Real-Time Communications

    Authors: Zili Meng, Nirav Atre, Mingwei Xu, Justine Sherry, Maria Apostolaki

    Abstract: Real-time communication applications require consistently low latency, which is often disrupted by latency spikes caused by competing flows, especially Web traffic. We identify the root cause of disruptions in such cases as the mismatch between the abrupt bandwidth allocation adjustment of queue scheduling and gradual congestion window adjustment of congestion control. For example, when a sudden b… ▽ More

    Submitted 7 February, 2024; v1 submitted 27 October, 2023; originally announced October 2023.

  7. arXiv:2301.05688  [pdf, other

    math.OC cs.NI eess.SY

    CANE: A Cascade-Control Approach for Network-Assisted Video QoE Management

    Authors: Mehdi Hosseinzadeh, Karthick Shankar, Maria Apostolaki, Jay Ramachandran, Steven Adams, Vyas Sekar, Bruno Sinopoli

    Abstract: Prior efforts have shown that network-assisted schemes can improve the Quality-of-Experience (QoE) and QoE fairness when multiple video players compete for bandwidth. However, realizing network-assisted schemes in practice is challenging, as: i) the network has limited visibility into the client players' internal state and actions; ii) players' actions may nullify or negate the network's actions;… ▽ More

    Submitted 13 January, 2023; originally announced January 2023.

  8. arXiv:2105.10553  [pdf, other

    cs.NI

    FB: A Flexible Buffer Management Scheme for Data Center Switches

    Authors: Maria Apostolaki, Vamsi Addanki, Manya Ghobadi, Laurent Vanbever

    Abstract: Today, network devices share buffer across priority queues to avoid drops during transient congestion. While cost-effective most of the time, this sharing can cause undesired interference among seemingly independent traffic. As a result, low-priority traffic can cause increased packet loss to high-priority traffic. Similarly, long flows can prevent the buffer from absorbing incoming bursts even if… ▽ More

    Submitted 21 May, 2021; originally announced May 2021.

  9. arXiv:2004.09063  [pdf, other

    cs.NI cs.CR

    Securing Internet Applications from Routing Attacks

    Authors: Yixin Sun, Maria Apostolaki, Henry Birge-Lee, Laurent Vanbever, Jennifer Rexford, Mung Chiang, Prateek Mittal

    Abstract: Attacks on Internet routing are typically viewed through the lens of availability and confidentiality, assuming an adversary that either discards traffic or performs eavesdropping. Yet, a strategic adversary can use routing attacks to compromise the security of critical Internet applications like Tor, certificate authorities, and the bitcoin network. In this paper, we survey such application-speci… ▽ More

    Submitted 11 August, 2020; v1 submitted 20 April, 2020; originally announced April 2020.

  10. arXiv:2001.07817  [pdf, other

    cs.NI cs.PF

    Performance-Driven Internet Path Selection

    Authors: Maria Apostolaki, Ankit Singla, Laurent Vanbever

    Abstract: Internet routing can often be sub-optimal, with the chosen routes providing worse performance than other available policy-compliant routes. This stems from the lack of visibility into route performance at the network layer. While this is an old problem, we argue that recent advances in programmable hardware finally open up the possibility of performance-aware routing in a deployable, BGP-compatibl… ▽ More

    Submitted 18 November, 2020; v1 submitted 21 January, 2020; originally announced January 2020.

  11. arXiv:1808.06254  [pdf, other

    cs.NI cs.CR

    SABRE: Protecting Bitcoin against Routing Attacks

    Authors: Maria Apostolaki, Gian Marti, Jan Müller, Laurent Vanbever

    Abstract: Routing attacks remain practically effective in the Internet today as existing countermeasures either fail to provide protection guarantees or are not easily deployable. Blockchain systems are particularly vulnerable to such attacks as they rely on Internet-wide communication to reach consensus. In particular, Bitcoin -the most widely-used cryptocurrency- can be split in half by any AS-level adver… ▽ More

    Submitted 19 August, 2018; originally announced August 2018.

  12. arXiv:1605.07524  [pdf, other

    cs.NI cs.CR

    Hijacking Bitcoin: Routing Attacks on Cryptocurrencies

    Authors: Maria Apostolaki, Aviv Zohar, Laurent Vanbever

    Abstract: As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for attackers. While many attack vectors have already been uncovered, one important vector has been left out though: attacking the currency via the Internet routing infrastructure itself. Indeed, by manipulating routing advertisements (BGP hijacks) or by naturally intercepting traffic, Autonomous Systems (ASes) c… ▽ More

    Submitted 24 March, 2017; v1 submitted 24 May, 2016; originally announced May 2016.

    Comments: To appear in the 38th IEEE Symposium on Security and Privacy, May 2017