LEADER 11799nam 22008415 450 001 996466077803316 005 20200703063415.0 010 $a3-319-54328-8 024 7 $a10.1007/978-3-319-54328-4 035 $a(CKB)3710000001099868 035 $a(DE-He213)978-3-319-54328-4 035 $a(MiAaPQ)EBC6296608 035 $a(MiAaPQ)EBC5595510 035 $a(Au-PeEL)EBL5595510 035 $a(OCoLC)978347499 035 $a(PPN)199766649 035 $a(EXLCZ)993710000001099868 100 $a20170216d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPassive and Active Measurement$b[electronic resource] $e18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings /$fedited by Mohamed Ali Kaafar, Steve Uhlig, Johanna Amann 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XIII, 284 p. 134 illus.) 225 1 $aComputer Communication Networks and Telecommunications ;$v10176 311 $a3-319-54327-X 327 $aIntro -- Preface -- Organization -- Contents -- IPv6 -- Understanding the Share of IPv6 Traffic in a Dual-Stack ISP -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Measuring IPv6 Connectivity -- 3.2 From IPv6 Connectivity to IPv6 Usage -- 4 Dataset -- 5 A Dual-Stack ISP Perspective on IPv6 Traffic -- 5.1 The Subscribers' Side -- 5.2 The Service Providers' Side -- 5.3 IP Traffic: Barriers and Intent for IPv6 -- 5.4 Case Studies -- 6 Discussion -- 7 Conclusion -- References -- On the Potential of IPv6 Open Resolvers for DDoS Attacks -- 1 Introduction -- 2 Background -- 2.1 Using DNS to Traverse from IPv4 to IPv6 -- 2.2 Possible Resolving Setups -- 3 Methodology -- 3.1 Finding IPv4 Open Resolvers -- 3.2 Measurement Setup -- 3.3 Determining IPv6 Connectivity -- 3.4 Distinguishing Dual-Stack and Infrastructural Setups -- 3.5 Comparison of Response Sizes for IPv4 and IPv6 -- 4 Results -- 4.1 What Share of the Resolvers Generate IPv6 Traffic? -- 4.2 Caching Characteristics -- 4.3 Amplification Factor -- 4.4 Distribution of Open Resolvers per Network -- 4.5 Interface Identifier Analysis -- 5 Discussion -- 5.1 Ethical Considerations -- 5.2 Pitfalls in Scanning/Great Firewall of China -- 5.3 Response Size Difference -- 6 Related Work -- 7 Conclusions -- References -- Something from Nothing (There): Collecting Global IPv6 Datasets from DNS -- 1 Introduction -- 2 Previous Work -- 3 DNS Enumeration Techniques -- 4 Methodology and Algorithmic Implementation -- 5 Evaluation -- 6 Case-Study -- 7 Conclusion -- References -- Web and Applications -- The Web, the Users, and the MOS: Influence of HTTP/2 on User Experience -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Page Catalog -- 3.2 Testbed Engineering -- 3.3 Scenarios and MOS Dataset Collection -- 4 MOS on the Toy Page -- 5 MOS on Real Pages -- 5.1 Subjective MOS Differences. 327 $a5.2 Impact of Page Sharding -- 5.3 Impact of Latency Diversity -- 6 Objective Metrics on Real Pages -- 7 Conclusions -- References -- Internet Scale User-Generated Live Video Streaming: The Twitch Case -- 1 Introduction -- 2 Measurement Methodology -- 3 Geographic Deployment of Twitch Infrastructure -- 4 Stream Hosting Strategy -- 4.1 How Important Is Channel Popularity? -- 4.2 Scaling of Servers Across Continents -- 5 Client Redirection and Traffic Localisation -- 6 Related Work -- 7 Conclusion -- References -- Internet Access for All: Assessing a Crowdsourced Web Proxy Service in a Community Network -- 1 Introduction -- 2 The guifi.net Proxy Service -- 3 Service Usage Viewpoint -- 4 The Proxy Viewpoint -- 5 The Local Network Viewpoint -- 6 Related Work -- 7 Summary of Lessons Learned -- References -- Security -- A First Look at the CT Landscape: Certificate Transparency Logs in Practice -- 1 Introduction -- 2 Certificate Transparency -- 3 Methodology and Datasets -- 4 Analysis of Logs -- 4.1 Basic Log Properties and Operational Measures -- 4.2 Certificate Analysis -- 4.3 Cross-Log Publication -- 4.4 Temporal Analysis -- 5 Popularity-Based Analysis -- 6 Related Work -- 7 Conclusions -- References -- Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts -- 1 Introduction -- 2 Background -- 3 Methodology and Implementation -- 4 Observations -- 5 Related Work -- 6 Conclusion -- References -- Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State -- 1 Introduction -- 2 Data Sets and Their Processing -- 2.1 Curated Data -- 3 Analysis of User Behavior and Its Security Implications -- 3.1 Modeling a User's Patching Delay -- 3.2 Vulnerability State -- 3.3 Susceptibility to Vulnerability Exploits -- 3.4 Factors that Impact User Behavior. 327 $a4 Related Work -- 5 Conclusions -- References -- Performance -- Application Bandwidth and Flow Rates from 3 Trillion Flows Across 45 Carrier Networks -- 1 Introduction -- 2 Methodology -- 3 Understanding Bandwidth Consumption -- 4 Peak Versus Off Peak Bandwidth -- 5 Peak Flow Rates -- 5.1 Peak Flow Rates by Application -- 6 Related Work -- 7 Conclusions -- References -- Measuring What is Not Ours: A Tale of 3rd Party Performance -- 1 Introduction -- 2 Data Collection -- 3 Exposing Characteristics of 3P Assets -- 4 Third Party Trailing Ratio -- 5 Selecting Third Party Objects for Optimization -- 6 Third Party Content Acceleration via URL Rewriting -- 7 Discussion -- 8 Conclusions -- References -- The Utility Argument -- Making a Case for Broadband SLAs -- 1 Introduction -- 2 Metrics for a Broadband SLA -- 3 Supporting SLA Today -- 3.1 Dataset -- 3.2 Throughput -- 3.3 Latency -- 3.4 Packet Loss -- 3.5 Applying an SLA -- 4 Personalized SLAs -- 5 Discussion -- 6 Conclusion -- References -- Latency -- Why Is the Internet so Slow?! -- 1 Introduction -- 2 The Internet Is Too Slow -- 3 Why Is the Internet so Slow? -- 3.1 Methodology -- 3.2 Overview of Results -- 3.3 Impact of IP Geolocation Errors -- 3.4 Results Across Page Sizes -- 3.5 Results Across Geographies -- 3.6 The Role of Congestion -- 3.7 End-User Measurements -- 4 Infrastructural Latency -- 5 Related Work -- 6 Discussion and Conclusion -- References -- Anycast Latency: How Many Sites Are Enough? -- 1 Introduction -- 2 Measurement Methodology -- 3 Observation and Findings -- 3.1 Does Anycast Give Good Absolute Performance? -- 3.2 Do Users Get the Closest Anycast Site? -- 3.3 Effects of Anycast Location on Latency and Observation Bias -- 3.4 How Much Do ``Many Sites'' Help? -- 3.5 Do Local Anycast Policies Hurt Performance? -- 3.6 How Many Sites? -- 4 Related Work -- 5 Conclusions -- References. 327 $aWhere Has My Time Gone? -- 1 Introduction -- 1.1 Motivation -- 2 Experiments -- 2.1 Tests Setup -- 2.2 In-Host Latency -- 2.3 Client-Server Latency (6) -- 2.4 Network Latency -- 3 Latency Results -- 4 Tail Latency Results -- 5 Discussion -- 5.1 The Good, the Bad and the Ugly -- 5.2 Limitations -- 6 Conclusion -- References -- Characterization and Troubleshooting -- Mind the Gap Between HTTP and HTTPS in Mobile Networks -- 1 Introduction -- 2 Background -- 3 Dataset -- 3.1 Dataset Curation -- 4 Overall Volumes -- 5 Spatial and Temporal Analysis -- 6 Conclusions -- References -- Using Loops Observed in Traceroute to Infer the Ability to Spoof -- 1 Introduction -- 2 Background on Ingress Filtering -- 3 Related Work -- 4 Motivation of Ingress ACLs -- 5 Inferring Absence of Ingress Filtering Using Traceroute -- 5.1 Input Data -- 5.2 Construction of Topology -- 5.3 Algorithm to Infer Absence of Ingress Filtering from Loops -- 5.4 Finding Needles in a Haystack -- 5.5 Persistence of Loops -- 6 Validation by Network Providers -- 7 Results -- 8 Conclusion -- References -- A Characterization of Load Balancing on the IPv6 Internet -- 1 Introduction -- 2 Load Balancing -- 3 IPv6 Load Balancing and Measurement Methodology -- 4 Dataset -- 5 Results -- 5.1 Load Balancing Prevalence -- 5.2 Classes of Load Balancing Behavior -- 5.3 Diamond Characteristics -- 5.4 Confounding Factors -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Wireless -- Enhancing WiFi Throughput with PLC Extenders: A Measurement Study -- 1 Introduction -- 2 PLC Background and Related Work -- 3 The Influence of Power Line Configurations -- 4 Single-User Studies -- 4.1 Throughputs with PLC Extenders -- 4.2 Impact of Distance -- 4.3 Can More Extenders Help? -- 5 Multi-user Studies -- 5.1 Sharing PLC Backhaul -- 5.2 Can More Extenders Help? -- 6 Applications -- 7 Conclusions. 327 $aReferences -- Cutting Internet Access Costs Through HTTPS Caching: A Measurement Study -- 1 Introduction -- 2 Related Work -- 3 Client-Side Web Caching on Smartphones -- 3.1 Data Collection and Properties -- 3.2 Dataset Analysis -- 3.3 Bandwidth Savings -- 4 Infrastructure-Side Web Caching -- 4.1 Dataset Analysis -- 4.2 Caching HTTPS Traffic: YouTube as a Case Study -- 4.3 Evaluation of Bandwidth Savings -- 5 Conclusion -- References -- Author Index. 330 $aThis book constitutes the proceedings of the 18th International Conference on Passive and Active Measurement, PAM 2017, held in Sydney, Australia, in March 2017. The 20 full papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on IPv6, Web and applications, security, performance, latency, characterization and troubleshooting, and wireless. 410 0$aComputer Communication Networks and Telecommunications ;$v10176 606 $aComputer system failures 606 $aComputer communication systems 606 $aSpecial purpose computers 606 $aApplication software 606 $aComputer security 606 $aCoding theory 606 $aInformation theory 606 $aSystem Performance and Evaluation$3https://scigraph.springernature.com/ontologies/product-market-codes/I13049 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 615 0$aComputer system failures. 615 0$aComputer communication systems. 615 0$aSpecial purpose computers. 615 0$aApplication software. 615 0$aComputer security. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aSystem Performance and Evaluation. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aSystems and Data Security. 615 24$aCoding and Information Theory. 676 $a004.6 702 $aKaafar$b Mohamed Ali$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aUhlig$b Steve$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAmann$b Johanna$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466077803316 996 $aPassive and Active Measurement$92810597 997 $aUNISA