top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Passive and Active Measurement [[electronic resource] ] : 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings / / edited by Mohamed Ali Kaafar, Steve Uhlig, Johanna Amann
Passive and Active Measurement [[electronic resource] ] : 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings / / edited by Mohamed Ali Kaafar, Steve Uhlig, Johanna Amann
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 284 p. 134 illus.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer system failures
Computer communication systems
Special purpose computers
Application software
Computer security
Coding theory
Information theory
System Performance and Evaluation
Computer Communication Networks
Special Purpose and Application-Based Systems
Information Systems Applications (incl. Internet)
Systems and Data Security
Coding and Information Theory
ISBN 3-319-54328-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- IPv6 -- Understanding the Share of IPv6 Traffic in a Dual-Stack ISP -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Measuring IPv6 Connectivity -- 3.2 From IPv6 Connectivity to IPv6 Usage -- 4 Dataset -- 5 A Dual-Stack ISP Perspective on IPv6 Traffic -- 5.1 The Subscribers' Side -- 5.2 The Service Providers' Side -- 5.3 IP Traffic: Barriers and Intent for IPv6 -- 5.4 Case Studies -- 6 Discussion -- 7 Conclusion -- References -- On the Potential of IPv6 Open Resolvers for DDoS Attacks -- 1 Introduction -- 2 Background -- 2.1 Using DNS to Traverse from IPv4 to IPv6 -- 2.2 Possible Resolving Setups -- 3 Methodology -- 3.1 Finding IPv4 Open Resolvers -- 3.2 Measurement Setup -- 3.3 Determining IPv6 Connectivity -- 3.4 Distinguishing Dual-Stack and Infrastructural Setups -- 3.5 Comparison of Response Sizes for IPv4 and IPv6 -- 4 Results -- 4.1 What Share of the Resolvers Generate IPv6 Traffic? -- 4.2 Caching Characteristics -- 4.3 Amplification Factor -- 4.4 Distribution of Open Resolvers per Network -- 4.5 Interface Identifier Analysis -- 5 Discussion -- 5.1 Ethical Considerations -- 5.2 Pitfalls in Scanning/Great Firewall of China -- 5.3 Response Size Difference -- 6 Related Work -- 7 Conclusions -- References -- Something from Nothing (There): Collecting Global IPv6 Datasets from DNS -- 1 Introduction -- 2 Previous Work -- 3 DNS Enumeration Techniques -- 4 Methodology and Algorithmic Implementation -- 5 Evaluation -- 6 Case-Study -- 7 Conclusion -- References -- Web and Applications -- The Web, the Users, and the MOS: Influence of HTTP/2 on User Experience -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Page Catalog -- 3.2 Testbed Engineering -- 3.3 Scenarios and MOS Dataset Collection -- 4 MOS on the Toy Page -- 5 MOS on Real Pages -- 5.1 Subjective MOS Differences.
5.2 Impact of Page Sharding -- 5.3 Impact of Latency Diversity -- 6 Objective Metrics on Real Pages -- 7 Conclusions -- References -- Internet Scale User-Generated Live Video Streaming: The Twitch Case -- 1 Introduction -- 2 Measurement Methodology -- 3 Geographic Deployment of Twitch Infrastructure -- 4 Stream Hosting Strategy -- 4.1 How Important Is Channel Popularity? -- 4.2 Scaling of Servers Across Continents -- 5 Client Redirection and Traffic Localisation -- 6 Related Work -- 7 Conclusion -- References -- Internet Access for All: Assessing a Crowdsourced Web Proxy Service in a Community Network -- 1 Introduction -- 2 The guifi.net Proxy Service -- 3 Service Usage Viewpoint -- 4 The Proxy Viewpoint -- 5 The Local Network Viewpoint -- 6 Related Work -- 7 Summary of Lessons Learned -- References -- Security -- A First Look at the CT Landscape: Certificate Transparency Logs in Practice -- 1 Introduction -- 2 Certificate Transparency -- 3 Methodology and Datasets -- 4 Analysis of Logs -- 4.1 Basic Log Properties and Operational Measures -- 4.2 Certificate Analysis -- 4.3 Cross-Log Publication -- 4.4 Temporal Analysis -- 5 Popularity-Based Analysis -- 6 Related Work -- 7 Conclusions -- References -- Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts -- 1 Introduction -- 2 Background -- 3 Methodology and Implementation -- 4 Observations -- 5 Related Work -- 6 Conclusion -- References -- Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State -- 1 Introduction -- 2 Data Sets and Their Processing -- 2.1 Curated Data -- 3 Analysis of User Behavior and Its Security Implications -- 3.1 Modeling a User's Patching Delay -- 3.2 Vulnerability State -- 3.3 Susceptibility to Vulnerability Exploits -- 3.4 Factors that Impact User Behavior.
4 Related Work -- 5 Conclusions -- References -- Performance -- Application Bandwidth and Flow Rates from 3 Trillion Flows Across 45 Carrier Networks -- 1 Introduction -- 2 Methodology -- 3 Understanding Bandwidth Consumption -- 4 Peak Versus Off Peak Bandwidth -- 5 Peak Flow Rates -- 5.1 Peak Flow Rates by Application -- 6 Related Work -- 7 Conclusions -- References -- Measuring What is Not Ours: A Tale of 3rd Party Performance -- 1 Introduction -- 2 Data Collection -- 3 Exposing Characteristics of 3P Assets -- 4 Third Party Trailing Ratio -- 5 Selecting Third Party Objects for Optimization -- 6 Third Party Content Acceleration via URL Rewriting -- 7 Discussion -- 8 Conclusions -- References -- The Utility Argument -- Making a Case for Broadband SLAs -- 1 Introduction -- 2 Metrics for a Broadband SLA -- 3 Supporting SLA Today -- 3.1 Dataset -- 3.2 Throughput -- 3.3 Latency -- 3.4 Packet Loss -- 3.5 Applying an SLA -- 4 Personalized SLAs -- 5 Discussion -- 6 Conclusion -- References -- Latency -- Why Is the Internet so Slow?! -- 1 Introduction -- 2 The Internet Is Too Slow -- 3 Why Is the Internet so Slow? -- 3.1 Methodology -- 3.2 Overview of Results -- 3.3 Impact of IP Geolocation Errors -- 3.4 Results Across Page Sizes -- 3.5 Results Across Geographies -- 3.6 The Role of Congestion -- 3.7 End-User Measurements -- 4 Infrastructural Latency -- 5 Related Work -- 6 Discussion and Conclusion -- References -- Anycast Latency: How Many Sites Are Enough? -- 1 Introduction -- 2 Measurement Methodology -- 3 Observation and Findings -- 3.1 Does Anycast Give Good Absolute Performance? -- 3.2 Do Users Get the Closest Anycast Site? -- 3.3 Effects of Anycast Location on Latency and Observation Bias -- 3.4 How Much Do ``Many Sites'' Help? -- 3.5 Do Local Anycast Policies Hurt Performance? -- 3.6 How Many Sites? -- 4 Related Work -- 5 Conclusions -- References.
Where Has My Time Gone? -- 1 Introduction -- 1.1 Motivation -- 2 Experiments -- 2.1 Tests Setup -- 2.2 In-Host Latency -- 2.3 Client-Server Latency (6) -- 2.4 Network Latency -- 3 Latency Results -- 4 Tail Latency Results -- 5 Discussion -- 5.1 The Good, the Bad and the Ugly -- 5.2 Limitations -- 6 Conclusion -- References -- Characterization and Troubleshooting -- Mind the Gap Between HTTP and HTTPS in Mobile Networks -- 1 Introduction -- 2 Background -- 3 Dataset -- 3.1 Dataset Curation -- 4 Overall Volumes -- 5 Spatial and Temporal Analysis -- 6 Conclusions -- References -- Using Loops Observed in Traceroute to Infer the Ability to Spoof -- 1 Introduction -- 2 Background on Ingress Filtering -- 3 Related Work -- 4 Motivation of Ingress ACLs -- 5 Inferring Absence of Ingress Filtering Using Traceroute -- 5.1 Input Data -- 5.2 Construction of Topology -- 5.3 Algorithm to Infer Absence of Ingress Filtering from Loops -- 5.4 Finding Needles in a Haystack -- 5.5 Persistence of Loops -- 6 Validation by Network Providers -- 7 Results -- 8 Conclusion -- References -- A Characterization of Load Balancing on the IPv6 Internet -- 1 Introduction -- 2 Load Balancing -- 3 IPv6 Load Balancing and Measurement Methodology -- 4 Dataset -- 5 Results -- 5.1 Load Balancing Prevalence -- 5.2 Classes of Load Balancing Behavior -- 5.3 Diamond Characteristics -- 5.4 Confounding Factors -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Wireless -- Enhancing WiFi Throughput with PLC Extenders: A Measurement Study -- 1 Introduction -- 2 PLC Background and Related Work -- 3 The Influence of Power Line Configurations -- 4 Single-User Studies -- 4.1 Throughputs with PLC Extenders -- 4.2 Impact of Distance -- 4.3 Can More Extenders Help? -- 5 Multi-user Studies -- 5.1 Sharing PLC Backhaul -- 5.2 Can More Extenders Help? -- 6 Applications -- 7 Conclusions.
References -- Cutting Internet Access Costs Through HTTPS Caching: A Measurement Study -- 1 Introduction -- 2 Related Work -- 3 Client-Side Web Caching on Smartphones -- 3.1 Data Collection and Properties -- 3.2 Dataset Analysis -- 3.3 Bandwidth Savings -- 4 Infrastructure-Side Web Caching -- 4.1 Dataset Analysis -- 4.2 Caching HTTPS Traffic: YouTube as a Case Study -- 4.3 Evaluation of Bandwidth Savings -- 5 Conclusion -- References -- Author Index.
Record Nr. UNISA-996466077803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Passive and Active Measurement : 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings / / edited by Mohamed Ali Kaafar, Steve Uhlig, Johanna Amann
Passive and Active Measurement : 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings / / edited by Mohamed Ali Kaafar, Steve Uhlig, Johanna Amann
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 284 p. 134 illus.)
Disciplina 004.6
Collana Computer Communication Networks and Telecommunications
Soggetto topico Computer system failures
Computer communication systems
Special purpose computers
Application software
Computer security
Coding theory
Information theory
System Performance and Evaluation
Computer Communication Networks
Special Purpose and Application-Based Systems
Information Systems Applications (incl. Internet)
Systems and Data Security
Coding and Information Theory
ISBN 3-319-54328-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- IPv6 -- Understanding the Share of IPv6 Traffic in a Dual-Stack ISP -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Measuring IPv6 Connectivity -- 3.2 From IPv6 Connectivity to IPv6 Usage -- 4 Dataset -- 5 A Dual-Stack ISP Perspective on IPv6 Traffic -- 5.1 The Subscribers' Side -- 5.2 The Service Providers' Side -- 5.3 IP Traffic: Barriers and Intent for IPv6 -- 5.4 Case Studies -- 6 Discussion -- 7 Conclusion -- References -- On the Potential of IPv6 Open Resolvers for DDoS Attacks -- 1 Introduction -- 2 Background -- 2.1 Using DNS to Traverse from IPv4 to IPv6 -- 2.2 Possible Resolving Setups -- 3 Methodology -- 3.1 Finding IPv4 Open Resolvers -- 3.2 Measurement Setup -- 3.3 Determining IPv6 Connectivity -- 3.4 Distinguishing Dual-Stack and Infrastructural Setups -- 3.5 Comparison of Response Sizes for IPv4 and IPv6 -- 4 Results -- 4.1 What Share of the Resolvers Generate IPv6 Traffic? -- 4.2 Caching Characteristics -- 4.3 Amplification Factor -- 4.4 Distribution of Open Resolvers per Network -- 4.5 Interface Identifier Analysis -- 5 Discussion -- 5.1 Ethical Considerations -- 5.2 Pitfalls in Scanning/Great Firewall of China -- 5.3 Response Size Difference -- 6 Related Work -- 7 Conclusions -- References -- Something from Nothing (There): Collecting Global IPv6 Datasets from DNS -- 1 Introduction -- 2 Previous Work -- 3 DNS Enumeration Techniques -- 4 Methodology and Algorithmic Implementation -- 5 Evaluation -- 6 Case-Study -- 7 Conclusion -- References -- Web and Applications -- The Web, the Users, and the MOS: Influence of HTTP/2 on User Experience -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Page Catalog -- 3.2 Testbed Engineering -- 3.3 Scenarios and MOS Dataset Collection -- 4 MOS on the Toy Page -- 5 MOS on Real Pages -- 5.1 Subjective MOS Differences.
5.2 Impact of Page Sharding -- 5.3 Impact of Latency Diversity -- 6 Objective Metrics on Real Pages -- 7 Conclusions -- References -- Internet Scale User-Generated Live Video Streaming: The Twitch Case -- 1 Introduction -- 2 Measurement Methodology -- 3 Geographic Deployment of Twitch Infrastructure -- 4 Stream Hosting Strategy -- 4.1 How Important Is Channel Popularity? -- 4.2 Scaling of Servers Across Continents -- 5 Client Redirection and Traffic Localisation -- 6 Related Work -- 7 Conclusion -- References -- Internet Access for All: Assessing a Crowdsourced Web Proxy Service in a Community Network -- 1 Introduction -- 2 The guifi.net Proxy Service -- 3 Service Usage Viewpoint -- 4 The Proxy Viewpoint -- 5 The Local Network Viewpoint -- 6 Related Work -- 7 Summary of Lessons Learned -- References -- Security -- A First Look at the CT Landscape: Certificate Transparency Logs in Practice -- 1 Introduction -- 2 Certificate Transparency -- 3 Methodology and Datasets -- 4 Analysis of Logs -- 4.1 Basic Log Properties and Operational Measures -- 4.2 Certificate Analysis -- 4.3 Cross-Log Publication -- 4.4 Temporal Analysis -- 5 Popularity-Based Analysis -- 6 Related Work -- 7 Conclusions -- References -- Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts -- 1 Introduction -- 2 Background -- 3 Methodology and Implementation -- 4 Observations -- 5 Related Work -- 6 Conclusion -- References -- Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State -- 1 Introduction -- 2 Data Sets and Their Processing -- 2.1 Curated Data -- 3 Analysis of User Behavior and Its Security Implications -- 3.1 Modeling a User's Patching Delay -- 3.2 Vulnerability State -- 3.3 Susceptibility to Vulnerability Exploits -- 3.4 Factors that Impact User Behavior.
4 Related Work -- 5 Conclusions -- References -- Performance -- Application Bandwidth and Flow Rates from 3 Trillion Flows Across 45 Carrier Networks -- 1 Introduction -- 2 Methodology -- 3 Understanding Bandwidth Consumption -- 4 Peak Versus Off Peak Bandwidth -- 5 Peak Flow Rates -- 5.1 Peak Flow Rates by Application -- 6 Related Work -- 7 Conclusions -- References -- Measuring What is Not Ours: A Tale of 3rd Party Performance -- 1 Introduction -- 2 Data Collection -- 3 Exposing Characteristics of 3P Assets -- 4 Third Party Trailing Ratio -- 5 Selecting Third Party Objects for Optimization -- 6 Third Party Content Acceleration via URL Rewriting -- 7 Discussion -- 8 Conclusions -- References -- The Utility Argument -- Making a Case for Broadband SLAs -- 1 Introduction -- 2 Metrics for a Broadband SLA -- 3 Supporting SLA Today -- 3.1 Dataset -- 3.2 Throughput -- 3.3 Latency -- 3.4 Packet Loss -- 3.5 Applying an SLA -- 4 Personalized SLAs -- 5 Discussion -- 6 Conclusion -- References -- Latency -- Why Is the Internet so Slow?! -- 1 Introduction -- 2 The Internet Is Too Slow -- 3 Why Is the Internet so Slow? -- 3.1 Methodology -- 3.2 Overview of Results -- 3.3 Impact of IP Geolocation Errors -- 3.4 Results Across Page Sizes -- 3.5 Results Across Geographies -- 3.6 The Role of Congestion -- 3.7 End-User Measurements -- 4 Infrastructural Latency -- 5 Related Work -- 6 Discussion and Conclusion -- References -- Anycast Latency: How Many Sites Are Enough? -- 1 Introduction -- 2 Measurement Methodology -- 3 Observation and Findings -- 3.1 Does Anycast Give Good Absolute Performance? -- 3.2 Do Users Get the Closest Anycast Site? -- 3.3 Effects of Anycast Location on Latency and Observation Bias -- 3.4 How Much Do ``Many Sites'' Help? -- 3.5 Do Local Anycast Policies Hurt Performance? -- 3.6 How Many Sites? -- 4 Related Work -- 5 Conclusions -- References.
Where Has My Time Gone? -- 1 Introduction -- 1.1 Motivation -- 2 Experiments -- 2.1 Tests Setup -- 2.2 In-Host Latency -- 2.3 Client-Server Latency (6) -- 2.4 Network Latency -- 3 Latency Results -- 4 Tail Latency Results -- 5 Discussion -- 5.1 The Good, the Bad and the Ugly -- 5.2 Limitations -- 6 Conclusion -- References -- Characterization and Troubleshooting -- Mind the Gap Between HTTP and HTTPS in Mobile Networks -- 1 Introduction -- 2 Background -- 3 Dataset -- 3.1 Dataset Curation -- 4 Overall Volumes -- 5 Spatial and Temporal Analysis -- 6 Conclusions -- References -- Using Loops Observed in Traceroute to Infer the Ability to Spoof -- 1 Introduction -- 2 Background on Ingress Filtering -- 3 Related Work -- 4 Motivation of Ingress ACLs -- 5 Inferring Absence of Ingress Filtering Using Traceroute -- 5.1 Input Data -- 5.2 Construction of Topology -- 5.3 Algorithm to Infer Absence of Ingress Filtering from Loops -- 5.4 Finding Needles in a Haystack -- 5.5 Persistence of Loops -- 6 Validation by Network Providers -- 7 Results -- 8 Conclusion -- References -- A Characterization of Load Balancing on the IPv6 Internet -- 1 Introduction -- 2 Load Balancing -- 3 IPv6 Load Balancing and Measurement Methodology -- 4 Dataset -- 5 Results -- 5.1 Load Balancing Prevalence -- 5.2 Classes of Load Balancing Behavior -- 5.3 Diamond Characteristics -- 5.4 Confounding Factors -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Wireless -- Enhancing WiFi Throughput with PLC Extenders: A Measurement Study -- 1 Introduction -- 2 PLC Background and Related Work -- 3 The Influence of Power Line Configurations -- 4 Single-User Studies -- 4.1 Throughputs with PLC Extenders -- 4.2 Impact of Distance -- 4.3 Can More Extenders Help? -- 5 Multi-user Studies -- 5.1 Sharing PLC Backhaul -- 5.2 Can More Extenders Help? -- 6 Applications -- 7 Conclusions.
References -- Cutting Internet Access Costs Through HTTPS Caching: A Measurement Study -- 1 Introduction -- 2 Related Work -- 3 Client-Side Web Caching on Smartphones -- 3.1 Data Collection and Properties -- 3.2 Dataset Analysis -- 3.3 Bandwidth Savings -- 4 Infrastructure-Side Web Caching -- 4.1 Dataset Analysis -- 4.2 Caching HTTPS Traffic: YouTube as a Case Study -- 4.3 Evaluation of Bandwidth Savings -- 5 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910483121803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui