{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:27:46Z","timestamp":1755998866344,"version":"3.41.0"},"reference-count":117,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2010,11,1]],"date-time":"2010-11-01T00:00:00Z","timestamp":1288569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2010,11]]},"abstract":"<jats:p>This article presents a survey of recent advancements in application-layer overlay networks. Some of the most important applications that have been proposed for overlays include multicast, QoS support, denial-of-service (DoS) defense, and resilient routing. We look at some of the important approaches proposed for these applications and compare the advantages and disadvantages of these approaches. We also examine some of the enhancements that have been proposed in overlay topology design, enhanced routing performance, failure resistance, and the issues related to coexistence of overlay and native layers in the Internet. We conclude the article with a comment on the purist vs pluralist argument of overlay networks that has received much debate recently. Finally, we propose a new deployment model for service overlays that seeks to interpose between these two approaches.<\/jats:p>","DOI":"10.1145\/1824795.1824800","type":"journal-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T15:03:23Z","timestamp":1291129403000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["A survey on the design, applications, and enhancements of application-layer overlay networks"],"prefix":"10.1145","volume":"43","author":[{"given":"Jinu","family":"Kurian","sequence":"first","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX"}]},{"given":"Kamil","family":"Sarac","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX"}]}],"member":"320","published-online":{"date-parts":[[2010,12,3]]},"reference":[{"volume-title":"Proc. of SPIE.","author":"Abad C.","key":"e_1_2_1_1_1","unstructured":"Abad , C. , Yurcik , W. , and Campbell , R. H . 2004. A survey and comparison of end-system overlay multicast solutions suitable for network centric warfare . Proc. of SPIE. Abad, C., Yurcik, W., and Campbell, R. H. 2004. A survey and comparison of end-system overlay multicast solutions suitable for network centric warfare. Proc. of SPIE."},{"key":"e_1_2_1_2_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology. Proceedings of ASIACRYPT","author":"Abe M.","unstructured":"Abe , M. 1999. Mix-networks on permutation networks . In Advances in Cryptology. Proceedings of ASIACRYPT . Lecture Notes in Computer Science , vol. 1716 , Springer , Berlin . DOI: 10.1007\/b72231. 10.1007\/b72231 Abe, M. 1999. Mix-networks on permutation networks. In Advances in Cryptology. Proceedings of ASIACRYPT. Lecture Notes in Computer Science, vol. 1716, Springer, Berlin. DOI: 10.1007\/b72231."},{"key":"e_1_2_1_3_1","unstructured":"Accelia. Accelia Durasite Technologies. http:\/\/www.accelia.net\/.  Accelia. Accelia Durasite Technologies. http:\/\/www.accelia.net\/."},{"volume-title":"Proceedings of the 2nd ACM HotNets Workshop. ACM","author":"Adkins D.","key":"e_1_2_1_4_1","unstructured":"Adkins , D. , Lakshminarayanan , K. , Perrig , A. , and Stoica , I . 2003. Taming IP packet flooding attacks . In Proceedings of the 2nd ACM HotNets Workshop. ACM , New York. Adkins, D., Lakshminarayanan, K., Perrig, A., and Stoica, I. 2003. Taming IP packet flooding attacks. In Proceedings of the 2nd ACM HotNets Workshop. ACM, New York."},{"volume-title":"Proceedings of the ACM HotNets IV Workshop. ACM","author":"Agarwal S.","key":"e_1_2_1_5_1","unstructured":"Agarwal , S. , Padmanabhan , V. N. , and Joseph , D. A . 2005. SureMail: Notification overlay for email reliability . In Proceedings of the ACM HotNets IV Workshop. ACM , New York. Agarwal, S., Padmanabhan, V. N., and Joseph, D. A. 2005. SureMail: Notification overlay for email reliability. In Proceedings of the ACM HotNets IV Workshop. ACM, New York."},{"key":"e_1_2_1_6_1","unstructured":"Akamai. Akamai sureroute for failover. http:\/\/www.akamai.com\/en\/html\/services\/sureroute for failover.html.  Akamai. Akamai sureroute for failover. http:\/\/www.akamai.com\/en\/html\/services\/sureroute for failover.html."},{"key":"e_1_2_1_7_1","unstructured":"Akamai. Akamai Technologies Inc. http:\/\/www.akamai.com.  Akamai. Akamai Technologies Inc. http:\/\/www.akamai.com."},{"key":"e_1_2_1_8_1","unstructured":"Akamai. Turbo-charging dynamic web sites with Akamai edgesuite. http:\/\/www.developer.akamai.com\/pdf\/WP TCD.pdf.  Akamai. Turbo-charging dynamic web sites with Akamai edgesuite. http:\/\/www.developer.akamai.com\/pdf\/WP TCD.pdf."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832257"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065983.1065997"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems. USENIX Association","author":"Andersen D.","year":"2003","unstructured":"Andersen , D. 2003 . Mayday: Distributed filtering for Internet services . In Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems. USENIX Association , Berkeley, CA. Andersen, D. 2003. Mayday: Distributed filtering for Internet services. In Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems. USENIX Association, Berkeley, CA."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502048"},{"volume-title":"Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI).","author":"Anderson D.G.","key":"e_1_2_1_13_1","unstructured":"Anderson , D.G. , Balakrishnan , H. , Kaashoek , M. F. , and Rao , R . 2005. Improving web availability for clients with MONET . In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI). Anderson, D.G., Balakrishnan, H., Kaashoek, M. F., and Rao, R. 2005. Improving web availability for clients with MONET. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948218"},{"volume-title":"Proceedings of the 2nd ACM HotNets Workshop. ACM","author":"Anderson T.","key":"e_1_2_1_15_1","unstructured":"Anderson , T. , Roscoe , T. , and Wetherall , D . 2003. Preventing Internet denial-of-service with capabilities . In Proceedings of the 2nd ACM HotNets Workshop. ACM , New York. Anderson, T., Roscoe, T., and Wetherall, D. 2003. Preventing Internet denial-of-service with capabilities. In Proceedings of the 2nd ACM HotNets Workshop. ACM, New York."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.748796"},{"key":"e_1_2_1_17_1","unstructured":"Anonymizer. Internet privacy and secuity solutions. http:\/\/www.anonymizer.com\/.  Anonymizer. Internet privacy and secuity solutions. http:\/\/www.anonymizer.com\/."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/258612.258631"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080127"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633045"},{"volume-title":"Proceedings of the IEEE INFOCOM. IEEE","author":"Baset S. A.","key":"e_1_2_1_21_1","unstructured":"Baset , S. A. and Schulzrinne , H. G . 2006. An analysis of the Skype peer-to-peer Internet telephony protocol . In Proceedings of the IEEE INFOCOM. IEEE , Los Alamitos, CA. Baset, S. A. and Schulzrinne, H. G. 2006. An analysis of the Skype peer-to-peer Internet telephony protocol. In Proceedings of the IEEE INFOCOM. IEEE, Los Alamitos, CA."},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Blake S. Black D. Carlson M. Davies E. Wang Z. and Weiss W. 1998. An architecture for differentiated services. Rfc2475.   Blake S. Black D. Carlson M. Davies E. Wang Z. and Weiss W. 1998. An architecture for differentiated services. Rfc2475.","DOI":"10.17487\/rfc2475"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/383034.383037"},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Braden R. Clark D. and Shenker S. 1994. Integrated services in the internet architecture: an overview. Rfc 1633.   Braden R. Clark D. and Shenker S. 1994. Integrated services in the internet architecture: an overview. Rfc 1633.","DOI":"10.17487\/rfc1633"},{"volume-title":"Proceedings of the IEEE INFOCOM. IEEE","author":"Breslau L.","key":"e_1_2_1_25_1","unstructured":"Breslau , L. , Cao , P. , Fan , L. , Phillips , G. , and Shenker , S . 1999. Web caching, and zipf-like distributions: Evidence, and implications . In Proceedings of the IEEE INFOCOM. IEEE , Los Alamitos, CA. Breslau, L., Cao, P., Fan, L., Phillips, G., and Shenker, S. 1999. Web caching, and zipf-like distributions: Evidence, and implications. In Proceedings of the IEEE INFOCOM. IEEE, Los Alamitos, CA."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2002.802000"},{"volume-title":"Proceedings of the 5th USENIX Symposium on Operation System Design and Implementation (OSDI). USENIX Association","author":"Castro M.","key":"e_1_2_1_27_1","unstructured":"Castro , M. , Druschel , P. , Ganesh , A. , Rowstron , A. , and Wallach , D . 2002. Secure routing for structured peer-to-peer overlay networks . In Proceedings of the 5th USENIX Symposium on Operation System Design and Implementation (OSDI). USENIX Association , Berkeley, CA. Castro, M., Druschel, P., Ganesh, A., Rowstron, A., and Wallach, D. 2002. Secure routing for structured peer-to-peer overlay networks. In Proceedings of the 5th USENIX Symposium on Operation System Design and Implementation (OSDI). USENIX Association, Berkeley, CA."},{"volume-title":"Proceedings of the 1st International Conference on Service Oriented Computing.","author":"Chandrashekar J.","key":"e_1_2_1_28_1","unstructured":"Chandrashekar , J. , Zhang , Z.-L. , Duan , Z. , and Hou , Y. T . 2003. Service oriented Internet . In Proceedings of the 1st International Conference on Service Oriented Computing. Chandrashekar, J., Zhang, Z.-L., Duan, Z., and Hou, Y. T. 2003. Service oriented Internet. In Proceedings of the 1st International Conference on Service Oriented Computing."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-002-0082-z"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015475"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339337"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_2_1_33_1","unstructured":"Codeen. CoDeeN: A CDN on PlanetLab. http:\/\/codeen.cs.princeton.edu\/.  Codeen. CoDeeN: A CDN on PlanetLab. http:\/\/codeen.cs.princeton.edu\/."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/944592.944594"},{"volume-title":"Proceedings of the 10th IEEE International Conference on Network Protocols. IEEE","author":"Cui W.","key":"e_1_2_1_35_1","unstructured":"Cui , W. , Stoica , I. , and Katz , R. H . 2002. Backup path allocation based on a correlated link failure probability model in overlay networks . In Proceedings of the 10th IEEE International Conference on Network Protocols. IEEE , Los Alamitos, CA. Cui, W., Stoica, I., and Katz, R. H. 2002. Backup path allocation based on a correlated link failure probability model in overlay networks. In Proceedings of the 10th IEEE International Conference on Network Protocols. IEEE, Los Alamitos, CA."},{"volume-title":"Proceedings of the USENIX Security Conference. USENIX Association","author":"Dingledine R.","key":"e_1_2_1_36_1","unstructured":"Dingledine , R. , Mathewson , N. , and Syverson , P . 2004. Tor: the second-generation Onion router . In Proceedings of the USENIX Security Conference. USENIX Association , Berkeley, CA. Dingledine, R., Mathewson, N., and Syverson, P. 2004. Tor: the second-generation Onion router. In Proceedings of the USENIX Security Conference. USENIX Association, Berkeley, CA."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.820436"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1232277"},{"key":"e_1_2_1_39_1","unstructured":"EdgeStream. Edgestream Videostreaming platform. http:\/\/www.edgestream.com\/.  EdgeStream. Edgestream Videostreaming platform. http:\/\/www.edgestream.com\/."},{"volume-title":"Proceedings of the IEEE INFOCOM, IEEE","author":"Fan J.","key":"e_1_2_1_40_1","unstructured":"Fan , J. and Ammar , M . 2006. Dynamic topology configuration in service overlay networks: A study of reconfiguration policies . In Proceedings of the IEEE INFOCOM, IEEE , Los Alamitos, CA. Fan, J. and Ammar, M. 2006. Dynamic topology configuration in service overlay networks: A study of reconfiguration policies. In Proceedings of the IEEE INFOCOM, IEEE, Los Alamitos, CA."},{"key":"e_1_2_1_41_1","unstructured":"Francis P. Yoid: Extending the internet multicast architecture. Unrefereed report. http:\/\/www.isi.edu\/div7\/yoid\/docs\/ycHtmlL\/htmlRoot.html.  Francis P. Yoid: Extending the internet multicast architecture. Unrefereed report. http:\/\/www.isi.edu\/div7\/yoid\/docs\/ycHtmlL\/htmlRoot.html."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.61"},{"volume-title":"Proceedings of the 3rd USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI).","author":"Freedman M. J.","key":"e_1_2_1_43_1","unstructured":"Freedman , M. J. , Lakshminarayanan , K. , and Mazires , D . 2006. OASIS: Anycast for any service . In Proceedings of the 3rd USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI). Freedman, M. J., Lakshminarayanan, K., and Mazires, D. 2006. OASIS: Anycast for any service. In Proceedings of the 3rd USENIX\/ACM Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_44_1","unstructured":"Freenet Project. The free network project: A distributed anonymous information storage and retrieval system. freenetproject.org.  Freenet Project. The free network project: A distributed anonymous information storage and retrieval system. freenetproject.org."},{"key":"e_1_2_1_45_1","unstructured":"Globule. Globule: the Open-Source Content Distribution Network. http:\/\/www.globule.org\/index.html.  Globule. Globule: the Open-Source Content Distribution Network. http:\/\/www.globule.org\/index.html."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293443"},{"volume-title":"Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI) USENIX Association","author":"Gummadi K.","key":"e_1_2_1_47_1","unstructured":"Gummadi , K. , Madhyastha , H. , Gribble , S. D. , Levy , H. M. , and Wetherall , D. J . 2004. Improving the reliability of internet paths with one-hop source routing . In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI) USENIX Association , Berkeley, CA. Gummadi, K., Madhyastha, H., Gribble, S. D., Levy, H. M., and Wetherall, D. J. 2004. Improving the reliability of internet paths with one-hop source routing. In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI) USENIX Association, Berkeley, CA."},{"volume-title":"Proceedings of the USENIX Technical Conference. USENIX Association","author":"Gwertzman J.","key":"e_1_2_1_48_1","unstructured":"Gwertzman , J. and Seltzer , M . 1996. World-wide web cache consistency . In Proceedings of the USENIX Technical Conference. USENIX Association , Berkeley, CA. Gwertzman, J. and Seltzer, M. 1996. World-wide web cache consistency. In Proceedings of the USENIX Technical Conference. USENIX Association, Berkeley, CA."},{"volume-title":"Proceedings of the IEEE INFOCOM. IEEE","author":"Han J.","key":"e_1_2_1_49_1","unstructured":"Han , J. , Watson , D. , and Jahanian , F . 2005. Topology aware overlay networks . In Proceedings of the IEEE INFOCOM. IEEE , Los Alamitos, CA. Han, J., Watson, D., and Jahanian, F. 2005. Topology aware overlay networks. In Proceedings of the IEEE INFOCOM. IEEE, Los Alamitos, CA."},{"key":"e_1_2_1_50_1","volume-title":"Proceedings of the 4th USENIX OSDI. USENIX Association","author":"Jannotti J.","year":"2000","unstructured":"Jannotti , J. , Gifford , D. , Johnson , K. , Kaashoek , M. , and O'Toole , J. 2000 . Overcast: Reliable multicasting with an overlay network . In Proceedings of the 4th USENIX OSDI. USENIX Association , Berkeley, CA, 197--212. Jannotti, J., Gifford, D., Johnson, K., Kaashoek, M., and O'Toole, J. 2000. Overcast: Reliable multicasting with an overlay network. In Proceedings of the 4th USENIX OSDI. USENIX Association, Berkeley, CA, 197--212."},{"key":"e_1_2_1_51_1","unstructured":"JAP. Jap: Java anonymous proxy. http:\/\/sourceforge.net\/projects\/anon\/.  JAP. Jap: Java anonymous proxy. http:\/\/sourceforge.net\/projects\/anon\/."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217937"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2005.9"},{"key":"e_1_2_1_54_1","unstructured":"Keralapura R. Taft N. Chuah C.-N. and Iannaccone G. 2004. Can ISPs take the heat from overlay networks&quest; In Proceedings of the ACM HotNets Workshop III. ACM NewYork.  Keralapura R. Taft N. Chuah C.-N. and Iannaccone G. 2004. Can ISPs take the heat from overlay networks&quest; In Proceedings of the ACM HotNets Workshop III. ACM NewYork."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945473"},{"key":"e_1_2_1_57_1","unstructured":"Kostic D. and Vahdat A. 2002. Latency versus cost optimizations in hierarchical overlay networks. Tech. rep. Duke University.  Kostic D. and Vahdat A. 2002. Latency versus cost optimizations in hierarchical overlay networks. Tech. rep. Duke University."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505224"},{"volume-title":"Proceedings of the IEEE Globecomm. IEEE","author":"Kurian J.","key":"e_1_2_1_59_1","unstructured":"Kurian , J. and Sarac , K . 2007. Provider provisioned overlay networks and their utility in DoS defense . In Proceedings of the IEEE Globecomm. IEEE , Los Alamitos, CA. Kurian, J. and Sarac, K. 2007. Provider provisioned overlay networks and their utility in DoS defense. In Proceedings of the IEEE Globecomm. IEEE, Los Alamitos, CA."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/507670.507688"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347428"},{"volume-title":"Proceedings of the IEEE INFOCOM IEEE","author":"Li Z.","key":"e_1_2_1_62_1","unstructured":"Li , Z. and Mohapatra , P . 2004a. The impact of topology on overlay routing service . In Proceedings of the IEEE INFOCOM IEEE , Los Alamitos, CA. Li, Z. and Mohapatra, P. 2004a. The impact of topology on overlay routing service. In Proceedings of the IEEE INFOCOM IEEE, Los Alamitos, CA."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818782"},{"volume-title":"Proceedings of the 2nd USENIX Workshop on Real, Large, Distributed Systems. USENIX Association","author":"Liang J.","key":"e_1_2_1_64_1","unstructured":"Liang , J. , Ko , S. , Gupta , I. , and Nahrstedt , K . 2005. Mon: On-demand overlays for distributed system management . In Proceedings of the 2nd USENIX Workshop on Real, Large, Distributed Systems. USENIX Association , Berkeley, CA. Liang, J., Ko, S., Gupta, I., and Nahrstedt, K. 2005. Mon: On-demand overlays for distributed system management. In Proceedings of the 2nd USENIX Workshop on Real, Large, Distributed Systems. USENIX Association, Berkeley, CA."},{"volume-title":"Proceedings of the IEEE INFOCOM. IEEE","author":"Liu Y.","key":"e_1_2_1_65_1","unstructured":"Liu , Y. , Zhang , H. , Gongy , W. , and Towsley , D . 2005. On the interaction between overlay routing and underlay routing . In Proceedings of the IEEE INFOCOM. IEEE , Los Alamitos, CA. Liu, Y., Zhang, H., Gongy, W., and Towsley, D. 2005. On the interaction between overlay routing and underlay routing. In Proceedings of the IEEE INFOCOM. IEEE, Los Alamitos, CA."},{"key":"e_1_2_1_66_1","first-page":"335","article-title":"A survey and comparison of peer-to-peer overlay network schemes","volume":"36","author":"Lua E. K.","year":"2004","unstructured":"Lua , E. K. , Crowcroft , J. , Pias , M. , Sharma , R. , and Lim , S. 2004 . A survey and comparison of peer-to-peer overlay network schemes . ACM Comput. Surv. 36 , 4, 335 -- 371 . Lua, E. K., Crowcroft, J., Pias, M., Sharma, R., and Lim, S. 2004. A survey and comparison of peer-to-peer overlay network schemes. ACM Comput. Surv. 36, 4, 335--371.","journal-title":"ACM Comput. Surv."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.274996"},{"volume-title":"Proceedings of the IEEE International Conference on Network Protocols. IEEE","author":"Mirkovic J.","key":"e_1_2_1_68_1","unstructured":"Mirkovic , J. , Prier , G. , and Reiher , P . 2002. Attacking DDoS at the source . In Proceedings of the IEEE International Conference on Network Protocols. IEEE , Los Alamitos, CA. Mirkovic, J., Prier, G., and Reiher, P. 2002. Attacking DDoS at the source. In Proceedings of the IEEE International Conference on Network Protocols. IEEE, Los Alamitos, CA."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.844495"},{"volume-title":"Proceedings of the USENIX Security Symposium. USENIX Association","author":"Moore D.","key":"e_1_2_1_70_1","unstructured":"Moore , D. , Voelker , G. , and Savage , S . 2001. Inferring internet denial-of-service activity . In Proceedings of the USENIX Security Symposium. USENIX Association , Berkeley, CA. Moore, D., Voelker, G., and Savage, S. 2001. Inferring internet denial-of-service activity. In Proceedings of the USENIX Security Symposium. USENIX Association, Berkeley, CA."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863958"},{"key":"e_1_2_1_72_1","unstructured":"Netli. Netli Application Delivery Network. http:\/\/www.netli.com\/.  Netli. Netli Application Delivery Network. http:\/\/www.netli.com\/."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511448"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.5"},{"volume-title":"Proceedings of the 6th Symposium on Operating Systems Design and Implementation.","author":"Park K.","key":"e_1_2_1_75_1","unstructured":"Park , K. , Pai , V. S. , Peterson , L. , and Wang , Z . 2004. Codns: Improving dns performance and reliability via cooperative lookups . In Proceedings of the 6th Symposium on Operating Systems Design and Implementation. Park, K., Pai, V. S., Peterson, L., and Wang, Z. 2004. Codns: Improving dns performance and reliability via cooperative lookups. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation."},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.649563"},{"volume-title":"Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems. USENIX Association","author":"Pendarakis D.","key":"e_1_2_1_77_1","unstructured":"Pendarakis , D. , Shi , S. , Verma , D. , and Waldvogel , M . 2001. ALMI: An application level multicast infrastructure . In Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems. USENIX Association , Berkeley, CA. Pendarakis, D., Shi, S., Verma, D., and Waldvogel, M. 2001. ALMI: An application level multicast infrastructure. In Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems. USENIX Association, Berkeley, CA."},{"volume-title":"Proceedings of the 3rd ACM Workshop on Hot Topics in Networks (HotNets-III). ACM","author":"Peterson L.","key":"e_1_2_1_78_1","unstructured":"Peterson , L. , Shenker , S. , and Turner , J . 2004. Overcoming the Internet impasse through virtualization . In Proceedings of the 3rd ACM Workshop on Hot Topics in Networks (HotNets-III). ACM , New York. Peterson, L., Shenker, S., and Turner, J. 2004. Overcoming the Internet impasse through virtualization. In Proceedings of the 3rd ACM Workshop on Hot Topics in Networks (HotNets-III). ACM, New York."},{"key":"e_1_2_1_79_1","unstructured":"Privoxy. Privoxy: A privacy enhancing http proxy. http:\/\/www.privoxy.org\/.  Privoxy. Privoxy: A privacy enhancing http proxy. http:\/\/www.privoxy.org\/."},{"key":"e_1_2_1_80_1","unstructured":"QBone. Qbone: A test bed for differentiated services. http:\/\/www.isoc.org\/inet99\/proceedings\/4f\/4f 1.htm.  QBone. Qbone: A test bed for differentiated services. http:\/\/www.isoc.org\/inet99\/proceedings\/4f\/4f 1.htm."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863974"},{"volume-title":"Proceedings of Passive and Active Measurement Conference (PAM).","author":"Rahul H.","key":"e_1_2_1_82_1","unstructured":"Rahul , H. , Kasbekar , M. , Sitaraman , R. , and Berger , A . 2006. Towards realizing performance and availability with a global overlay network . In Proceedings of Passive and Active Measurement Conference (PAM). Rahul, H., Kasbekar, M., Sitaraman, R., and Berger, A. 2006. Towards realizing performance and availability with a global overlay network. In Proceedings of Passive and Active Measurement Conference (PAM)."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383072"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080128"},{"volume-title":"Proceedings of the 5th Passive and Active Measurements Workshop (PAM).","author":"Rewaskar S.","key":"e_1_2_1_85_1","unstructured":"Rewaskar , S. and Kaur , J . 2004. Testing the scalability limits of overlay routing infrastructures . In Proceedings of the 5th Passive and Active Measurements Workshop (PAM). Rewaskar, S. and Kaur, J. 2004. Testing the scalability limits of overlay routing infrastructures. In Proceedings of the 5th Passive and Active Measurements Workshop (PAM)."},{"key":"e_1_2_1_86_1","unstructured":"6Bone: A testbed for deployment of IPv6. http:\/\/www.6bone.net\/old 6bone home page.html.  6Bone: A testbed for deployment of IPv6. http:\/\/www.6bone.net\/old 6bone home page.html."},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316233"},{"volume-title":"Proceedings of the IEEE INFOCOM","author":"Seetharaman S.","key":"e_1_2_1_88_1","unstructured":"Seetharaman , S. and Ammar , M . 2006. On the interaction between dynamic routing in the overlay and native layers . In Proceedings of the IEEE INFOCOM . Los Alamitos, CA. Seetharaman, S. and Ammar, M. 2006. On the interaction between dynamic routing in the overlay and native layers. In Proceedings of the IEEE INFOCOM. Los Alamitos, CA."},{"volume-title":"Proceedings of the IEEE INFOCOM","author":"Seetharaman S.","key":"e_1_2_1_89_1","unstructured":"Seetharaman , S. , Hilt , V. , Hoffman , M. , and Ammar , M . 2007. Preemptive strategies to improve routing performance of native and overlay layers . In Proceedings of the IEEE INFOCOM . Los Alamitos, CA. Seetharaman, S., Hilt, V., Hoffman, M., and Ammar, M. 2007. Preemptive strategies to improve routing performance of native and overlay layers. In Proceedings of the IEEE INFOCOM. Los Alamitos, CA."},{"key":"e_1_2_1_90_1","volume-title":"Overdose: A generic DDOS protection service using an overlay network. Tech. rep.","author":"Shi E.","year":"2006","unstructured":"Shi , E. , Stoica , I. , Andersen , D. , and Perrig , A . 2006 . Overdose: A generic DDOS protection service using an overlay network. Tech. rep. , Carnegie Mellon University . http:\/\/reports-archive. adm.cs.cmu.edu\/anon\/2006\/CMU-CS-06-114.pdf. Shi, E., Stoica, I., Andersen, D., and Perrig, A. 2006. Overdose: A generic DDOS protection service using an overlay network. Tech. rep., Carnegie Mellon University. http:\/\/reports-archive. adm.cs.cmu.edu\/anon\/2006\/CMU-CS-06-114.pdf."},{"key":"e_1_2_1_91_1","volume-title":"Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet.","volume":"2","author":"Shin Y.","unstructured":"Shin , Y. , Gupta , M. , and Henderson , R . 2006. Separating wheat from the chaff: A deployable approach to counter spam . In Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet. Vol. 2 . USENIX Association, Berkeley, CA. Shin, Y., Gupta, M., and Henderson, R. 2006. Separating wheat from the chaff: A deployable approach to counter spam. In Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet. Vol. 2. USENIX Association, Berkeley, CA."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133613"},{"volume-title":"Proceedings of the 1st International Workshop on Peer-To-Peer Systems.","author":"Sit E.","key":"e_1_2_1_93_1","unstructured":"Sit , E. and Morris , R . 2002. Security considerations for peer-to-peer distributed hash tables . In Proceedings of the 1st International Workshop on Peer-To-Peer Systems. Sit, E. and Morris, R. 2002. Security considerations for peer-to-peer distributed hash tables. In Proceedings of the 1st International Workshop on Peer-To-Peer Systems."},{"volume-title":"Proceedings of 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII).","author":"Snoeren A. C.","key":"e_1_2_1_94_1","unstructured":"Snoeren , A. C. , Balakrishnan , H. , and Kaashoek , M. F . 2001. Reconsidering internet mobility . In Proceedings of 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII). Snoeren, A. C., Balakrishnan, H., and Kaashoek, M. F. 2001. Reconsidering internet mobility. In Proceedings of 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII)."},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.005"},{"volume-title":"Proceeding of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS).","author":"Stavrou A.","key":"e_1_2_1_96_1","unstructured":"Stavrou , A. , Keromytis , A. , Nieh , J. , Misra , V. , and Rubenstein , D . 2005. Move: An end-to-end solution to network denial of service . In Proceeding of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS). Stavrou, A., Keromytis, A., Nieh, J., Misra, V., and Rubenstein, D. 2005. Move: An end-to-end solution to network denial of service. In Proceeding of the Internet Society (ISOC) Symposium on Network and Distributed Systems Security (SNDSS)."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102153"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"e_1_2_1_100_1","volume-title":"Proceedings of the 9th USENIX Security Symposium. USENIX Association","author":"Stone R.","year":"2000","unstructured":"Stone , R. 2000 . Centertrack: An IP overlay network for tracking dos floods . In Proceedings of the 9th USENIX Security Symposium. USENIX Association , Berkeley, CA. Stone, R. 2000. Centertrack: An IP overlay network for tracking dos floods. In Proceedings of the 9th USENIX Security Symposium. USENIX Association, Berkeley, CA."},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159962"},{"volume-title":"Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI).","author":"Subramanian L.","key":"e_1_2_1_102_1","unstructured":"Subramanian , L. , Stoica , I. , Balakrishnan , H. , and Katz , R . 2004. OverQoS: An overlay based architecture for enhancing Internet QoS . In Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI). Subramanian, L., Stoica, I., Balakrishnan, H., and Katz, R. 2004. OverQoS: An overlay based architecture for enhancing Internet QoS. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/TRIDNT.2005.2"},{"volume-title":"Proceedings of IEEE GLOBECOM. IEEE","author":"Turner J. S.","key":"e_1_2_1_104_1","unstructured":"Turner , J. S. and Taylor , D. E . 2005. Diversifying the Internet . In Proceedings of IEEE GLOBECOM. IEEE , Los Alamitos, CA. Turner, J. S. and Taylor, D. E. 2005. Diversifying the Internet. In Proceedings of IEEE GLOBECOM. IEEE, Los Alamitos, CA."},{"volume-title":"Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21)","author":"Urgaonkar B.","key":"e_1_2_1_105_1","unstructured":"Urgaonkar , B. , Ninan , A. , Raunak , P. S. M. , and Ramamritham , K . 2001. Maintaining mutual consistency for cached Web objects . In Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21) . Urgaonkar, B., Ninan, A., Raunak, P. S. M., and Ramamritham, K. 2001. Maintaining mutual consistency for cached Web objects. In Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS-21)."},{"key":"e_1_2_1_106_1","unstructured":"Venu J. 2002. Content delivery networks poised to take off. White paper for ITtoolbox Networking. http:\/\/networking.ittoolbox.com\/pub\/JB061502.pdf.  Venu J. 2002. Content delivery networks poised to take off. White paper for ITtoolbox Networking. http:\/\/networking.ittoolbox.com\/pub\/JB061502.pdf."},{"volume-title":"Proceedings of the 12th IEEE International Workshop on Quality of Service (IWQoS).","author":"Vieira S. L.","key":"e_1_2_1_107_1","unstructured":"Vieira , S. L. and Liebeherr , J . 2004a. Topology design for service overlay networks with bandwidth guarantees . In Proceedings of the 12th IEEE International Workshop on Quality of Service (IWQoS). Vieira, S. L. and Liebeherr, J. 2004a. Topology design for service overlay networks with bandwidth guarantees. In Proceedings of the 12th IEEE International Workshop on Quality of Service (IWQoS)."},{"volume-title":"Proceedings of the 12th IEEE International Workshop on Quality of Service (IWQoS).","author":"Vieira S. L.","key":"e_1_2_1_108_1","unstructured":"Vieira , S. L. and Liebeherr , J . 2004b. An algorithmic approach to topological design of service overlay networks . In Proceedings of the 12th IEEE International Workshop on Quality of Service (IWQoS). Vieira, S. L. and Liebeherr, J. 2004b. An algorithmic approach to topological design of service overlay networks. In Proceedings of the 12th IEEE International Workshop on Quality of Service (IWQoS)."},{"key":"e_1_2_1_109_1","unstructured":"Walters A. Bauer K. and Nita-Rotaru C. Towards robust overlay networks: Enhancing adaptivity mechanisms with Byzantine-resilience. http:\/\/www.homes.cerias.purdue.edu\/crisn\/papers\/adapt.pdf.  Walters A. Bauer K. and Nita-Rotaru C. Towards robust overlay networks: Enhancing adaptivity mechanisms with Byzantine-resilience. http:\/\/www.homes.cerias.purdue.edu\/crisn\/papers\/adapt.pdf."},{"volume-title":"Proceedings of the 14th ACM\/USENIX Security Symposium. ACM","author":"Wang J.","key":"e_1_2_1_111_1","unstructured":"Wang , J. , Liu , X. , and Chien , A. A . 2005. Empirical study of tolerating denial-of-service attacks with a proxy network . In Proceedings of the 14th ACM\/USENIX Security Symposium. ACM , New York. Wang, J., Liu, X., and Chien, A. A. 2005. Empirical study of tolerating denial-of-service attacks with a proxy network. In Proceedings of the 14th ACM\/USENIX Security Symposium. ACM, New York."},{"key":"e_1_2_1_112_1","volume-title":"-L","author":"Xu K.","year":"2005","unstructured":"Xu , K. and Zhang , Z . -L . 2005 . Reducing unwanted traffic in a backbone network. In Proceedings of the SRUTI. Xu, K. and Zhang, Z.-L. 2005. Reducing unwanted traffic in a backbone network. In Proceedings of the SRUTI."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316219"},{"key":"e_1_2_1_114_1","doi-asserted-by":"crossref","unstructured":"Zhang H. Kurose J. and Towsley D. 2006. Can an overlay compensate for a careless underlay&quest; In Proceedings of the IEEE INFOCOM. IEEE Los Alamitos CA.  Zhang H. Kurose J. and Towsley D. 2006. Can an overlay compensate for a careless underlay&quest; In Proceedings of the IEEE INFOCOM. IEEE Los Alamitos CA.","DOI":"10.1109\/INFOCOM.2006.323"},{"volume-title":"Proceedings of the 11th IEEE ICNP. IEEE","author":"Zhao B. Y.","key":"e_1_2_1_115_1","unstructured":"Zhao , B. Y. , Huang , L. , Stribling , J. , Joseph , A. D. , and Kubiatowicz , J. D . 2003. Exploiting routing redundancy via structured peer-to-peer overlays . In Proceedings of the 11th IEEE ICNP. IEEE , Los Alamitos, CA. Zhao, B. Y., Huang, L., Stribling, J., Joseph, A. D., and Kubiatowicz, J. D. 2003. Exploiting routing redundancy via structured peer-to-peer overlays. In Proceedings of the 11th IEEE ICNP. IEEE, Los Alamitos, CA."},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.818784"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.07.015"},{"volume-title":"Proceedings of the IEEE INFOCOM. IEEE","author":"Zhu Y.","key":"e_1_2_1_118_1","unstructured":"Zhu , Y. , Dovrolis , C. , and Ammar , M . 2007. Combining multihoming with overlay routing (or, how to be a better ISP without owning a network) . In Proceedings of the IEEE INFOCOM. IEEE , Los Alamitos, CA. Zhu, Y., Dovrolis, C., and Ammar, M. 2007. Combining multihoming with overlay routing (or, how to be a better ISP without owning a network). In Proceedings of the IEEE INFOCOM. IEEE, Los Alamitos, CA."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1824795.1824800","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1824795.1824800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:54Z","timestamp":1750246794000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1824795.1824800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11]]},"references-count":117,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["10.1145\/1824795.1824800"],"URL":"https:\/\/doi.org\/10.1145\/1824795.1824800","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"type":"print","value":"0360-0300"},{"type":"electronic","value":"1557-7341"}],"subject":[],"published":{"date-parts":[[2010,11]]},"assertion":[{"value":"2007-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}