Projects
This page lists some of my projects
Validating APNIC’s User Estimates
Geopolitics of the Internet
Inspired by my grandfather, a political activist who took refuge in France, I developed a strong interest in political science. His dream of sparking an intellectual renaissance in a nation shaped by ancient civilization and the pursuit of freedom deeply resonated with me. This led me to mathematical modeling as an efficient tool for abstract reasoning, which became the focus of my first five years at university.
During my undergraduate studies in mathematics, I maintained an interest in the political dynamics of Iran, Russia, and the Black Sea region. A pivotal moment came during a research internship in South Korea, where I discovered the potential of network analysis in understanding political phenomena. This realization shaped my future research: viewing political events through the lens of networks and mathematics.
Mapping Russian Influence on Twitter
Collaborators:
- Colin Gerard (Geode/French Institute of Geopolitics)
- Guillhem Marotte (Geode/French Institute of Geopolitics)
In 2019-2020, I analyzed Russia’s influence on Twitter, developing tools that provided quantitative evidence to support or refute political science hypotheses. I also helped create a standardized methodology for representing graphs, now part of the master of geopolitics program at the University of Paris VIII. Our research revealed instances where Russian influences were erroneously cited in previous French controversies.

Presentations and conferences:
APSA 2020 - Virtual
Understanding how Iranian Internet evolved to become fully independent and the impact on Iranian’s life
Collaborators:
- Kevin Limonier (Geode/French Institute of Geopolitics)
- Louis Petiniaud (Geode)
- Frederick Douzet (Geode/French Institute of Geopolitics)
- Kave Salamatian (University of Savoy)
In this project, we show that Iran has leveraged BGP to achieve three specific strategic goals: 1) the pursuit of a self-sustaining national Internet with controlled borders as seemed to have been used in the current events 2) the desire to set up an Iranian Intranet to facilitate censorship which is a passive consequence from the architecture 3) the leverage of connectivity as a tool of regional influence through BGP dependencies. We show that the evolution of the Iranian AS landscape has happened along with a bigger governmental control. We also note that the Iranian government has been using BGP-tampering for the past few years with increasingly high firepower.

The complete shutdown we observe in November 2019 and again in September 2022 are the latest and most massive event of a larger set of BGP related events that Iran that has been witnessed has been for now more than 10 years. We observe that Iran has been able to develop a BGP strategy that enables it to fully control its network without reducing its resilience. We finally note that the Iranian network is connected to the rest of the world through a very number of limited ASes. This leads us to our conclusion that Iran has the potential to completely isolate its network from the rest of the world. This research has led to a paper at the Journal of Cybersecurity and the technical contributions have led to a new approach to perform intelligence through protocol data currently taught at the French Institute of Geopolitics in Paris.
References in the press:
Le Monde
TV5 Monde
Grants:
RIPE RACI Grants x 2
Papers:
Measuring the fragmentation of the Internet: the case of the Border Gateway Protocol (BGP) during the Ukrainian crisis
The geopolitics behind the routes data travel: a case study of Iran
Mapping the routes of the Internet for geopolitics: the case of Eastern Ukraine
Le rôle de la topologie d’Internet dans les territoires en conflit en Ukraine, une approche géopolitique du routage des données
Geopolitics of Routing
Novel ways of measuring topology of the Internet
Building a manifold representation of private backbones
Collaborators:
- Scott Anderson (University of Wisconsin-Madison)
- Joshua Matthews (University of Wisconsin-Madison)
- Stephen Jasina (University of Wisconsin-Madison)
- Paul Barford (University of Wisconsin-Madison)
- Mark Crovella (Boston University)
- Walter Willinger (Niksun Inc.)
You can’t see it, but when you enter something in the search bar, there is a whole network of connections that happens. We typically don’t think about the Internet having a map, but I likened this work to figuring out what the map of the Internet is.
Gradually, cloud and content providers that dominate most of the web have started to build their own networks straight to the user instead of going through multiple different service providers (like Sprint, AT&T, and Verizon) to get to the user. This means most pathways are obscured from being seen. The reasons that service providers obscure their pathways are to protect their equipment, like where their routers are located and what they’re doing, which could open up a host of problems. It also brings a competitive advantage to hiding the relationship between Google and another site, which can be determined through the amount of traffic going from Google to a site.
With these private backbone infrastructures, the standard mapping tool (called traceroute) can no longer be used to evaluate network connectivity on the public web. Companies are able to manipulate traceroute so the information that it’s giving is not completely accurate. Other providers have disallowed traceroute in their networks.
Without traceroute, it’s harder to obtain useful insight into network structures. There is nothing holding companies accountable– they are able to make claims about the performance of their networks without verification from outside sources. It’s also harder for researchers to see what the maps of the internet look like. In order to get around this problem, we came up with a light-weight measurements combined with heavy-weight mathematical analysis tools.
A light-weight analysis tool would be measuring the end-to-end round trip delay (RTT) of information going through the network. RTT can then be augmented in the form of geolocation and path endpoints. Through triangulation, we are able to measure the distance between a user and the router on the map by taking data points that are emitted from different locations. This meant he could geolocate where a router was in the world.
However, there’s not a simple relationship between points on the map and the latency that takes between those points, meaning the distance is not directly predictable by the amount of time it takes to go from one point to another. This means that if a packet (data) is going from a user in Chicago to Denmark, the packet isn’t necessarily going the most direct route.
In addition to this, routes can be curved. What might appear to be a straight line from one node to another may actually be curved– similar to how standing on Earth appears flat, but in reality, is a sphere.
We made an analogy to Einstein’s theory of relativity to come to the conclusion that the distance between nodes might be curved. In order to determine the distance, we used Riemannian geometry– a heavy-weight analysis tool that deals with continuous surfaces. However, most computer science deals with graphs.
Using this mathematical toolkit, we were able to see the paths that packets were taking in different cloud service providers (AWS, Azure, and Amazon). Using the resulting manifold view, we turned the graphs of packets into a map of the world represented with elevation. The points of elevation on the graph show that there are multiple different paths a packet can take. The deeper the valley, the more limited the paths are between two locations.

We were able to identify that deep valleys between Europe and Asia are because the Red Sea is a choke point for data traffic since cables have to go underwater. Some cloud providers are able to find better routes that go around this chokepoint, such as AWS.
Our research can also help companies determine where to place new infrastructure to help with connectivity issues as was illustrated in our paper. Recently, we were invited to present to the Google Networking group.

Presentations and conferences:
Google WAN Lab
ACM Sigmetrics 2022 - Virtual
Papers:
Curvature-based Analysis of Network Connectivity in Private Backbone Infrastructures
A Manifold View of Connectivity in the Private Backbone Networks of Hyperscalers - in Communications of ACM in August 2023
Matisse: Visualizing Measured Internet Latencies as Manifolds - Under Submission