scispace - formally typeset
V

Vasileios Kotronis

Researcher at ETH Zurich

Publications -  46
Citations -  1119

Vasileios Kotronis is an academic researcher from ETH Zurich. The author has contributed to research in topics: The Internet & Software-defined networking. The author has an hindex of 15, co-authored 46 publications receiving 945 citations. Previous affiliations of Vasileios Kotronis include Foundation for Research & Technology – Hellas.

Papers
More filters
Proceedings ArticleDOI

OpenFlow: A security analysis

TL;DR: This work performs a security analysis of OpenFlow using STRIDE and attack tree modeling methods, and proposes appropriate counter-measures that can potentially mitigate the security issues associated with OpenFlow networks.
Proceedings ArticleDOI

Outsourcing the routing control logic: better internet routing based on SDN principles

TL;DR: A new, backwards-compatible routing model which is based on outsourcing and logically centralizing the routing control plane is described and it is claimed that outsourcing enables enhanced inter-domain routing.
Journal ArticleDOI

Design and implementation of the OFELIA FP7 facility: The European OpenFlow testbed

TL;DR: The OFELIA testbed as discussed by the authors is a multi-layer, multi-technology and geographically distributed Future Internet testbed facility, where the network itself is precisely controlled and programmed by the experimenter using the emerging OpenFlow technology.
Proceedings ArticleDOI

A novel framework for modeling and mitigating distributed link flooding attacks

TL;DR: The key idea is to continuously re-route traffic in a manner that makes persistent participation to link-flooding events highly improbable for any benign source, so that bots are forced to adopt a suspicious behavior to remain effective and reveal their presence.
Journal ArticleDOI

ARTEMIS: Neutralizing BGP Hijacking Within a Minute

TL;DR: ARTEMIS is proposed, a defense approach based on accurate and fast detection operated by the autonomous system itself, leveraging the pervasiveness of publicly available BGP monitoring services and their recent shift towards real-time streaming, enabling flexible and fast mitigation of hijacking events.