Passive and Active Measurement [[electronic resource] ] : 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings / / edited by Mohamed Ali Kaafar, Steve Uhlig, Johanna Amann |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 284 p. 134 illus.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer system failures
Computer communication systems Special purpose computers Application software Computer security Coding theory Information theory System Performance and Evaluation Computer Communication Networks Special Purpose and Application-Based Systems Information Systems Applications (incl. Internet) Systems and Data Security Coding and Information Theory |
ISBN | 3-319-54328-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- IPv6 -- Understanding the Share of IPv6 Traffic in a Dual-Stack ISP -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Measuring IPv6 Connectivity -- 3.2 From IPv6 Connectivity to IPv6 Usage -- 4 Dataset -- 5 A Dual-Stack ISP Perspective on IPv6 Traffic -- 5.1 The Subscribers' Side -- 5.2 The Service Providers' Side -- 5.3 IP Traffic: Barriers and Intent for IPv6 -- 5.4 Case Studies -- 6 Discussion -- 7 Conclusion -- References -- On the Potential of IPv6 Open Resolvers for DDoS Attacks -- 1 Introduction -- 2 Background -- 2.1 Using DNS to Traverse from IPv4 to IPv6 -- 2.2 Possible Resolving Setups -- 3 Methodology -- 3.1 Finding IPv4 Open Resolvers -- 3.2 Measurement Setup -- 3.3 Determining IPv6 Connectivity -- 3.4 Distinguishing Dual-Stack and Infrastructural Setups -- 3.5 Comparison of Response Sizes for IPv4 and IPv6 -- 4 Results -- 4.1 What Share of the Resolvers Generate IPv6 Traffic? -- 4.2 Caching Characteristics -- 4.3 Amplification Factor -- 4.4 Distribution of Open Resolvers per Network -- 4.5 Interface Identifier Analysis -- 5 Discussion -- 5.1 Ethical Considerations -- 5.2 Pitfalls in Scanning/Great Firewall of China -- 5.3 Response Size Difference -- 6 Related Work -- 7 Conclusions -- References -- Something from Nothing (There): Collecting Global IPv6 Datasets from DNS -- 1 Introduction -- 2 Previous Work -- 3 DNS Enumeration Techniques -- 4 Methodology and Algorithmic Implementation -- 5 Evaluation -- 6 Case-Study -- 7 Conclusion -- References -- Web and Applications -- The Web, the Users, and the MOS: Influence of HTTP/2 on User Experience -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Page Catalog -- 3.2 Testbed Engineering -- 3.3 Scenarios and MOS Dataset Collection -- 4 MOS on the Toy Page -- 5 MOS on Real Pages -- 5.1 Subjective MOS Differences.
5.2 Impact of Page Sharding -- 5.3 Impact of Latency Diversity -- 6 Objective Metrics on Real Pages -- 7 Conclusions -- References -- Internet Scale User-Generated Live Video Streaming: The Twitch Case -- 1 Introduction -- 2 Measurement Methodology -- 3 Geographic Deployment of Twitch Infrastructure -- 4 Stream Hosting Strategy -- 4.1 How Important Is Channel Popularity? -- 4.2 Scaling of Servers Across Continents -- 5 Client Redirection and Traffic Localisation -- 6 Related Work -- 7 Conclusion -- References -- Internet Access for All: Assessing a Crowdsourced Web Proxy Service in a Community Network -- 1 Introduction -- 2 The guifi.net Proxy Service -- 3 Service Usage Viewpoint -- 4 The Proxy Viewpoint -- 5 The Local Network Viewpoint -- 6 Related Work -- 7 Summary of Lessons Learned -- References -- Security -- A First Look at the CT Landscape: Certificate Transparency Logs in Practice -- 1 Introduction -- 2 Certificate Transparency -- 3 Methodology and Datasets -- 4 Analysis of Logs -- 4.1 Basic Log Properties and Operational Measures -- 4.2 Certificate Analysis -- 4.3 Cross-Log Publication -- 4.4 Temporal Analysis -- 5 Popularity-Based Analysis -- 6 Related Work -- 7 Conclusions -- References -- Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts -- 1 Introduction -- 2 Background -- 3 Methodology and Implementation -- 4 Observations -- 5 Related Work -- 6 Conclusion -- References -- Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State -- 1 Introduction -- 2 Data Sets and Their Processing -- 2.1 Curated Data -- 3 Analysis of User Behavior and Its Security Implications -- 3.1 Modeling a User's Patching Delay -- 3.2 Vulnerability State -- 3.3 Susceptibility to Vulnerability Exploits -- 3.4 Factors that Impact User Behavior. 4 Related Work -- 5 Conclusions -- References -- Performance -- Application Bandwidth and Flow Rates from 3 Trillion Flows Across 45 Carrier Networks -- 1 Introduction -- 2 Methodology -- 3 Understanding Bandwidth Consumption -- 4 Peak Versus Off Peak Bandwidth -- 5 Peak Flow Rates -- 5.1 Peak Flow Rates by Application -- 6 Related Work -- 7 Conclusions -- References -- Measuring What is Not Ours: A Tale of 3rd Party Performance -- 1 Introduction -- 2 Data Collection -- 3 Exposing Characteristics of 3P Assets -- 4 Third Party Trailing Ratio -- 5 Selecting Third Party Objects for Optimization -- 6 Third Party Content Acceleration via URL Rewriting -- 7 Discussion -- 8 Conclusions -- References -- The Utility Argument -- Making a Case for Broadband SLAs -- 1 Introduction -- 2 Metrics for a Broadband SLA -- 3 Supporting SLA Today -- 3.1 Dataset -- 3.2 Throughput -- 3.3 Latency -- 3.4 Packet Loss -- 3.5 Applying an SLA -- 4 Personalized SLAs -- 5 Discussion -- 6 Conclusion -- References -- Latency -- Why Is the Internet so Slow?! -- 1 Introduction -- 2 The Internet Is Too Slow -- 3 Why Is the Internet so Slow? -- 3.1 Methodology -- 3.2 Overview of Results -- 3.3 Impact of IP Geolocation Errors -- 3.4 Results Across Page Sizes -- 3.5 Results Across Geographies -- 3.6 The Role of Congestion -- 3.7 End-User Measurements -- 4 Infrastructural Latency -- 5 Related Work -- 6 Discussion and Conclusion -- References -- Anycast Latency: How Many Sites Are Enough? -- 1 Introduction -- 2 Measurement Methodology -- 3 Observation and Findings -- 3.1 Does Anycast Give Good Absolute Performance? -- 3.2 Do Users Get the Closest Anycast Site? -- 3.3 Effects of Anycast Location on Latency and Observation Bias -- 3.4 How Much Do ``Many Sites'' Help? -- 3.5 Do Local Anycast Policies Hurt Performance? -- 3.6 How Many Sites? -- 4 Related Work -- 5 Conclusions -- References. Where Has My Time Gone? -- 1 Introduction -- 1.1 Motivation -- 2 Experiments -- 2.1 Tests Setup -- 2.2 In-Host Latency -- 2.3 Client-Server Latency (6) -- 2.4 Network Latency -- 3 Latency Results -- 4 Tail Latency Results -- 5 Discussion -- 5.1 The Good, the Bad and the Ugly -- 5.2 Limitations -- 6 Conclusion -- References -- Characterization and Troubleshooting -- Mind the Gap Between HTTP and HTTPS in Mobile Networks -- 1 Introduction -- 2 Background -- 3 Dataset -- 3.1 Dataset Curation -- 4 Overall Volumes -- 5 Spatial and Temporal Analysis -- 6 Conclusions -- References -- Using Loops Observed in Traceroute to Infer the Ability to Spoof -- 1 Introduction -- 2 Background on Ingress Filtering -- 3 Related Work -- 4 Motivation of Ingress ACLs -- 5 Inferring Absence of Ingress Filtering Using Traceroute -- 5.1 Input Data -- 5.2 Construction of Topology -- 5.3 Algorithm to Infer Absence of Ingress Filtering from Loops -- 5.4 Finding Needles in a Haystack -- 5.5 Persistence of Loops -- 6 Validation by Network Providers -- 7 Results -- 8 Conclusion -- References -- A Characterization of Load Balancing on the IPv6 Internet -- 1 Introduction -- 2 Load Balancing -- 3 IPv6 Load Balancing and Measurement Methodology -- 4 Dataset -- 5 Results -- 5.1 Load Balancing Prevalence -- 5.2 Classes of Load Balancing Behavior -- 5.3 Diamond Characteristics -- 5.4 Confounding Factors -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Wireless -- Enhancing WiFi Throughput with PLC Extenders: A Measurement Study -- 1 Introduction -- 2 PLC Background and Related Work -- 3 The Influence of Power Line Configurations -- 4 Single-User Studies -- 4.1 Throughputs with PLC Extenders -- 4.2 Impact of Distance -- 4.3 Can More Extenders Help? -- 5 Multi-user Studies -- 5.1 Sharing PLC Backhaul -- 5.2 Can More Extenders Help? -- 6 Applications -- 7 Conclusions. References -- Cutting Internet Access Costs Through HTTPS Caching: A Measurement Study -- 1 Introduction -- 2 Related Work -- 3 Client-Side Web Caching on Smartphones -- 3.1 Data Collection and Properties -- 3.2 Dataset Analysis -- 3.3 Bandwidth Savings -- 4 Infrastructure-Side Web Caching -- 4.1 Dataset Analysis -- 4.2 Caching HTTPS Traffic: YouTube as a Case Study -- 4.3 Evaluation of Bandwidth Savings -- 5 Conclusion -- References -- Author Index. |
Record Nr. | UNISA-996466077803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Passive and Active Measurement : 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings / / edited by Mohamed Ali Kaafar, Steve Uhlig, Johanna Amann |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 284 p. 134 illus.) |
Disciplina | 004.6 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer system failures
Computer communication systems Special purpose computers Application software Computer security Coding theory Information theory System Performance and Evaluation Computer Communication Networks Special Purpose and Application-Based Systems Information Systems Applications (incl. Internet) Systems and Data Security Coding and Information Theory |
ISBN | 3-319-54328-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- IPv6 -- Understanding the Share of IPv6 Traffic in a Dual-Stack ISP -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Measuring IPv6 Connectivity -- 3.2 From IPv6 Connectivity to IPv6 Usage -- 4 Dataset -- 5 A Dual-Stack ISP Perspective on IPv6 Traffic -- 5.1 The Subscribers' Side -- 5.2 The Service Providers' Side -- 5.3 IP Traffic: Barriers and Intent for IPv6 -- 5.4 Case Studies -- 6 Discussion -- 7 Conclusion -- References -- On the Potential of IPv6 Open Resolvers for DDoS Attacks -- 1 Introduction -- 2 Background -- 2.1 Using DNS to Traverse from IPv4 to IPv6 -- 2.2 Possible Resolving Setups -- 3 Methodology -- 3.1 Finding IPv4 Open Resolvers -- 3.2 Measurement Setup -- 3.3 Determining IPv6 Connectivity -- 3.4 Distinguishing Dual-Stack and Infrastructural Setups -- 3.5 Comparison of Response Sizes for IPv4 and IPv6 -- 4 Results -- 4.1 What Share of the Resolvers Generate IPv6 Traffic? -- 4.2 Caching Characteristics -- 4.3 Amplification Factor -- 4.4 Distribution of Open Resolvers per Network -- 4.5 Interface Identifier Analysis -- 5 Discussion -- 5.1 Ethical Considerations -- 5.2 Pitfalls in Scanning/Great Firewall of China -- 5.3 Response Size Difference -- 6 Related Work -- 7 Conclusions -- References -- Something from Nothing (There): Collecting Global IPv6 Datasets from DNS -- 1 Introduction -- 2 Previous Work -- 3 DNS Enumeration Techniques -- 4 Methodology and Algorithmic Implementation -- 5 Evaluation -- 6 Case-Study -- 7 Conclusion -- References -- Web and Applications -- The Web, the Users, and the MOS: Influence of HTTP/2 on User Experience -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Page Catalog -- 3.2 Testbed Engineering -- 3.3 Scenarios and MOS Dataset Collection -- 4 MOS on the Toy Page -- 5 MOS on Real Pages -- 5.1 Subjective MOS Differences.
5.2 Impact of Page Sharding -- 5.3 Impact of Latency Diversity -- 6 Objective Metrics on Real Pages -- 7 Conclusions -- References -- Internet Scale User-Generated Live Video Streaming: The Twitch Case -- 1 Introduction -- 2 Measurement Methodology -- 3 Geographic Deployment of Twitch Infrastructure -- 4 Stream Hosting Strategy -- 4.1 How Important Is Channel Popularity? -- 4.2 Scaling of Servers Across Continents -- 5 Client Redirection and Traffic Localisation -- 6 Related Work -- 7 Conclusion -- References -- Internet Access for All: Assessing a Crowdsourced Web Proxy Service in a Community Network -- 1 Introduction -- 2 The guifi.net Proxy Service -- 3 Service Usage Viewpoint -- 4 The Proxy Viewpoint -- 5 The Local Network Viewpoint -- 6 Related Work -- 7 Summary of Lessons Learned -- References -- Security -- A First Look at the CT Landscape: Certificate Transparency Logs in Practice -- 1 Introduction -- 2 Certificate Transparency -- 3 Methodology and Datasets -- 4 Analysis of Logs -- 4.1 Basic Log Properties and Operational Measures -- 4.2 Certificate Analysis -- 4.3 Cross-Log Publication -- 4.4 Temporal Analysis -- 5 Popularity-Based Analysis -- 6 Related Work -- 7 Conclusions -- References -- Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts -- 1 Introduction -- 2 Background -- 3 Methodology and Implementation -- 4 Observations -- 5 Related Work -- 6 Conclusion -- References -- Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State -- 1 Introduction -- 2 Data Sets and Their Processing -- 2.1 Curated Data -- 3 Analysis of User Behavior and Its Security Implications -- 3.1 Modeling a User's Patching Delay -- 3.2 Vulnerability State -- 3.3 Susceptibility to Vulnerability Exploits -- 3.4 Factors that Impact User Behavior. 4 Related Work -- 5 Conclusions -- References -- Performance -- Application Bandwidth and Flow Rates from 3 Trillion Flows Across 45 Carrier Networks -- 1 Introduction -- 2 Methodology -- 3 Understanding Bandwidth Consumption -- 4 Peak Versus Off Peak Bandwidth -- 5 Peak Flow Rates -- 5.1 Peak Flow Rates by Application -- 6 Related Work -- 7 Conclusions -- References -- Measuring What is Not Ours: A Tale of 3rd Party Performance -- 1 Introduction -- 2 Data Collection -- 3 Exposing Characteristics of 3P Assets -- 4 Third Party Trailing Ratio -- 5 Selecting Third Party Objects for Optimization -- 6 Third Party Content Acceleration via URL Rewriting -- 7 Discussion -- 8 Conclusions -- References -- The Utility Argument -- Making a Case for Broadband SLAs -- 1 Introduction -- 2 Metrics for a Broadband SLA -- 3 Supporting SLA Today -- 3.1 Dataset -- 3.2 Throughput -- 3.3 Latency -- 3.4 Packet Loss -- 3.5 Applying an SLA -- 4 Personalized SLAs -- 5 Discussion -- 6 Conclusion -- References -- Latency -- Why Is the Internet so Slow?! -- 1 Introduction -- 2 The Internet Is Too Slow -- 3 Why Is the Internet so Slow? -- 3.1 Methodology -- 3.2 Overview of Results -- 3.3 Impact of IP Geolocation Errors -- 3.4 Results Across Page Sizes -- 3.5 Results Across Geographies -- 3.6 The Role of Congestion -- 3.7 End-User Measurements -- 4 Infrastructural Latency -- 5 Related Work -- 6 Discussion and Conclusion -- References -- Anycast Latency: How Many Sites Are Enough? -- 1 Introduction -- 2 Measurement Methodology -- 3 Observation and Findings -- 3.1 Does Anycast Give Good Absolute Performance? -- 3.2 Do Users Get the Closest Anycast Site? -- 3.3 Effects of Anycast Location on Latency and Observation Bias -- 3.4 How Much Do ``Many Sites'' Help? -- 3.5 Do Local Anycast Policies Hurt Performance? -- 3.6 How Many Sites? -- 4 Related Work -- 5 Conclusions -- References. Where Has My Time Gone? -- 1 Introduction -- 1.1 Motivation -- 2 Experiments -- 2.1 Tests Setup -- 2.2 In-Host Latency -- 2.3 Client-Server Latency (6) -- 2.4 Network Latency -- 3 Latency Results -- 4 Tail Latency Results -- 5 Discussion -- 5.1 The Good, the Bad and the Ugly -- 5.2 Limitations -- 6 Conclusion -- References -- Characterization and Troubleshooting -- Mind the Gap Between HTTP and HTTPS in Mobile Networks -- 1 Introduction -- 2 Background -- 3 Dataset -- 3.1 Dataset Curation -- 4 Overall Volumes -- 5 Spatial and Temporal Analysis -- 6 Conclusions -- References -- Using Loops Observed in Traceroute to Infer the Ability to Spoof -- 1 Introduction -- 2 Background on Ingress Filtering -- 3 Related Work -- 4 Motivation of Ingress ACLs -- 5 Inferring Absence of Ingress Filtering Using Traceroute -- 5.1 Input Data -- 5.2 Construction of Topology -- 5.3 Algorithm to Infer Absence of Ingress Filtering from Loops -- 5.4 Finding Needles in a Haystack -- 5.5 Persistence of Loops -- 6 Validation by Network Providers -- 7 Results -- 8 Conclusion -- References -- A Characterization of Load Balancing on the IPv6 Internet -- 1 Introduction -- 2 Load Balancing -- 3 IPv6 Load Balancing and Measurement Methodology -- 4 Dataset -- 5 Results -- 5.1 Load Balancing Prevalence -- 5.2 Classes of Load Balancing Behavior -- 5.3 Diamond Characteristics -- 5.4 Confounding Factors -- 6 Related Work -- 7 Conclusions and Future Work -- References -- Wireless -- Enhancing WiFi Throughput with PLC Extenders: A Measurement Study -- 1 Introduction -- 2 PLC Background and Related Work -- 3 The Influence of Power Line Configurations -- 4 Single-User Studies -- 4.1 Throughputs with PLC Extenders -- 4.2 Impact of Distance -- 4.3 Can More Extenders Help? -- 5 Multi-user Studies -- 5.1 Sharing PLC Backhaul -- 5.2 Can More Extenders Help? -- 6 Applications -- 7 Conclusions. References -- Cutting Internet Access Costs Through HTTPS Caching: A Measurement Study -- 1 Introduction -- 2 Related Work -- 3 Client-Side Web Caching on Smartphones -- 3.1 Data Collection and Properties -- 3.2 Dataset Analysis -- 3.3 Bandwidth Savings -- 4 Infrastructure-Side Web Caching -- 4.1 Dataset Analysis -- 4.2 Caching HTTPS Traffic: YouTube as a Case Study -- 4.3 Evaluation of Bandwidth Savings -- 5 Conclusion -- References -- Author Index. |
Record Nr. | UNINA-9910483121803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|