Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperOctober 2013
D-mystifying the D-root address change
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 57–62https://doi.org/10.1145/2504730.2504772On January 3, 2013, the D-root DNS server hosted at the University of Maryland changed IP address. To avoid service disruption, the old address continues to answer queries. In this paper, we perform an initial investigation of the traffic at both the ...
- short-paperOctober 2013
Studying interdomain routing over long timescales
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 227–234https://doi.org/10.1145/2504730.2504771The dynamics of interdomain routing have traditionally been studied through the analysis of BGP update traffic. However, such studies tend to focus on the volume of BGP updates rather than their effects, and tend to be local rather than global in scope. ...
- short-paperOctober 2013
Understanding the super-sized traffic of the super bowl
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 353–360https://doi.org/10.1145/2504730.2504770Large events like the Super Bowl, where almost 75K attendees congegrate for several hours, poses a significant challenge in the planning, design and deployment of wireless networks. This was one of the first events where the LTE cellular network was ...
- short-paperOctober 2013
Growth analysis of a large ISP
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 347–352https://doi.org/10.1145/2504730.2504769We present a time-series analysis of Cogent's inter-continental network. The analysis is based on descriptions of Cogent's routers and their interfaces, collected each week for more than one year. These descriptions are collected from public reverse DNS ...
- short-paperOctober 2013
Exploring EDNS-client-subnet adopters in your free time
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 305–312https://doi.org/10.1145/2504730.2504767The recently proposed DNS extension, EDNS-Client-Subnet (ECS), has been quickly adopted by major Internet companies such as Google to better assign user requests to their servers and improve end-user experience. In this paper, we show that the adoption ...
-
- short-paperOctober 2013
A comparison of syslog and IS-IS for network failure analysis
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 433–440https://doi.org/10.1145/2504730.2504766Accurate reporting and analysis of network failures has historically required instrumentation (e.g., dedicated tracing of routing protocol state) that is rarely available in practice. In previous work, our group has proposed that a combination of common ...
- short-paperOctober 2013
From Paris to Tokyo: on the suitability of ping to measure latency
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 427–432https://doi.org/10.1145/2504730.2504765Monitoring Internet performance and measuring user quality of experience are drawing increased attention from both research and industry. To match this interest, large-scale measurement infrastructures have been constructed. We believe that this effort ...
- short-paperOctober 2013
RILAnalyzer: a comprehensive 3G monitor on your phone
- Narseo Vallina-Rodriguez,
- Andrius Auçinas,
- Mario Almeida,
- Yan Grunenberger,
- Konstantina Papagiannaki,
- Jon Crowcroft
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 257–264https://doi.org/10.1145/2504730.2504764The popularity of smartphones, cloud computing, and the app store model have led to cellular networks being used in a completely different way than what they were designed for. As a consequence, mobile applications impose new challenges in the design ...
- short-paperOctober 2013
A method for identifying and confirming the use of URL filtering products for censorship
- Jakub Dalek,
- Bennett Haselton,
- Helmi Noman,
- Adam Senft,
- Masashi Crete-Nishihata,
- Phillipa Gill,
- Ronald J. Deibert
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 23–30https://doi.org/10.1145/2504730.2504763Products used for managing network traffic and restricting access to Web content represent a dual-use technology. While they were designed to improve performance and protect users from inappropriate content, these products are also used to censor the ...
- short-paperOctober 2013
Benchmarking personal cloud storage
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 205–212https://doi.org/10.1145/2504730.2504762Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and more people. However, little is known about each service ...
- short-paperOctober 2013
Network fingerprinting: TTL-based router signatures
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 369–376https://doi.org/10.1145/2504730.2504761Fingerprinting networking equipment has many potential applications and benefits in network management and security. More generally, it is useful for the understanding of network structures and their behaviors. In this paper, we describe a simple ...
- short-paperOctober 2013
Appraising the delay accuracy in browser-based network measurement
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 361–368https://doi.org/10.1145/2504730.2504760Conducting network measurement in a web browser (e.g., speedtest and Netalyzr) enables end users to understand their network and application performance. However, very little is known about the (in)accuracy of the various methods used in these tools. In ...
- short-paperOctober 2013
Speedtrap: internet-scale IPv6 alias resolution
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 119–126https://doi.org/10.1145/2504730.2504759Impediments to resolving IPv6 router aliases have precluded understanding the emerging router-level IPv6 Internet topology. In this work, we design, implement, and validate the first Internet-scale alias resolution technique for IPv6. Our technique, ...
- short-paperOctober 2013
AS-level topology collection through looking glass servers
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 235–242https://doi.org/10.1145/2504730.2504758While accurate and complete modeling of the Internet topology at the Autonomous System (AS) level is critical for future protocol design, performance evaluation, simulation and analysis, still it remains a challenge to construct its accurate ...
- short-paperOctober 2013
Revealing middlebox interference with tracebox
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 1–8https://doi.org/10.1145/2504730.2504757Middleboxes such as firewalls, NAT, proxies, or Deep Packet Inspection play an increasingly important role in various types of IP networks, including enterprise and cellular networks. Recent studies have shed the light on their impact on real traffic ...
- short-paperOctober 2013
Indexing million of packets per second using GPUs
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 327–332https://doi.org/10.1145/2504730.2504756Network traffic recorders are devices that record massive volumes of network traffic for security applications, like retrospective forensic investigations. When deployed over very high-speed networks, traffic recorders must process and store millions of ...
- research-articleOctober 2013
Analysis of the HTTPS certificate ecosystem
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 291–304https://doi.org/10.1145/2504730.2504755We report the results of a large-scale measurement study of the HTTPS certificate ecosystem---the public-key infrastructure that underlies nearly all secure web communications. Using data collected by performing 110 Internet-wide scans over 14 months, ...
- research-articleOctober 2013
Mapping the expansion of Google's serving infrastructure
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 313–326https://doi.org/10.1145/2504730.2504754Modern content-distribution networks both provide bulk content and act as "serving infrastructure" for web services in order to reduce user-perceived latency. Serving infrastructures such as Google's are now critical to the online economy, making it ...
- research-articleOctober 2013
Understanding the domain registration behavior of spammers
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 63–76https://doi.org/10.1145/2504730.2504753Spammers register a tremendous number of domains to evade blacklisting and takedown efforts. Current techniques to detect such domains rely on crawling spam URLs or monitoring lookup traffic. Such detection techniques are only effective after the ...
- research-articleOctober 2013
Peer-assisted content distribution in Akamai netsession
- Mingchen Zhao,
- Paarijaat Aditya,
- Ang Chen,
- Yin Lin,
- Andreas Haeberlen,
- Peter Druschel,
- Bruce Maggs,
- Bill Wishon,
- Miroslav Ponec
IMC '13: Proceedings of the 2013 conference on Internet measurement conferencePages 31–42https://doi.org/10.1145/2504730.2504752Content distribution systems have traditionally adopted one of two architectures: infrastructure-based content delivery networks (CDNs), in which clients download content from dedicated, centrally managed servers, and peer-to-peer CDNs, in which clients ...