No abstract available.
Proceeding Downloads
Hunting BGP zombies in the wild
As the key component of Internet's inter-domain routing, BGP is expected to work flawlessly. However, a recent study has revealed the presence of BGP zombies: Withdrawn prefixes that are still active in routing tables and that can cause routing issues. ...
Meta-peering: towards automated ISP peer selection
We introduce meta-peering, a term that encompasses the set of tools needed to ease and automate the Internet Service Provider (ISP) peering process; starting with identifying a list of ISPs that are likely to peer, generating respective BGP ...
Towards cross-layer telemetry
This paper introduces Cross-Layer Telemetry (Clt), a way to combine in-band telemetry (based on In-Situ Oam) and Application Performance Management (APM, based on distributed tracing) into a single monitoring tool providing a full network stack ...
L, Q, R, and T: which spin bit cousin is here to stay?
Network operators utilize traffic monitoring to locate and fix faults or performance bottlenecks. This often relies on intrinsic protocol semantics, e.g., sequence numbers, that many protocols share implicitly through their packet headers. The arrival of ...
On the evolution of internet flow characteristics
The ongoing evolution of technologies and network services on the Internet indicates ongoing changes in traffic and flow characteristics. Since the analysis of flow characteristics, like duration, size, and rate, has been a frequently studied topic ...
Detecting consumer IoT devices through the lens of an ISP
- Said Jawad Saidi,
- Anna Maria Mandalari,
- Hamed Haddadi,
- Daniel J. Dubois,
- David Choffnes,
- Georgios Smaragdakis,
- Anja Feldmann
Internet of Things (IoT) devices are becoming increasingly popular and offer a wide range of services and functionality to their users. However, there are significant privacy and security risks associated with these devices. IoT devices can infringe ...
Adaptive cheapest path first scheduling in a transport-layer multi-path tunnel context
Bundling multiple access technologies increases capacity, resiliency and robustness of network connections. Multi-access is currently being standardized in the ATSSS framework in 3GPP, supporting different access bundling strategies. Within ATSSS, a ...
Leveraging the 0-RTT convert protocol to improve wi-fi/cellular convergence
Mobile data usage is increasing and mobile network operators are looking to move some of this traffic onto Wi-Fi networks. MPTCP and the 0-RTT TCP Convert protocol can help these operators by enabling a convergence of cellular and Wi-Fi networks. We ...
Cooperative performance enhancement using QUIC tunneling in 5G cellular networks
Multiplexed Application Substrate over QUIC Encryption (MASQUE) is a new protocol mechanism that is currenty under standardization in the IETF. MASQUE defines an extension to the HTTP CONNECT method in order to support QUIC-based tunneling and forwarding ...
CCID5: an implementation of the BBR congestion control algorithm for DCCP and its impact over multi-path scenarios
Providing multi-connectivity services is an important goal for next generation wireless networks, where multiple access networks are available and need to be integrated into a coherent solution that efficiently supports both reliable and non reliable ...
Toward greater scavenger congestion control deployment: implementations and interfaces
Heterogeneous applications and restricted bandwidth on the Internet have motivated recent works on scavenger congestion control, which yields bandwidth to competing primary traffic for increased network-wide utility. Although potential use cases are ...
Encryption without centralization: distributing DNS queries across recursive resolvers
Emerging protocols such as DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) improve the privacy of DNS queries and responses. While this trend towards encryption is positive, deployment of these protocols has in some cases resulted in further centralization ...
Institutional privacy risks in sharing DNS data
The Domain Name System (DNS) is used in every website visit and e-mail transmission, so privacy is an obvious concern. In DNS, users ask recursive resolvers (or "recursives") to make queries on their behalf. Prior analysis of DNS privacy focused on ...
DNS-over-TCP considered vulnerable
The research and operational communities believe that TCP provides protection against IP fragmentation attacks and recommend that servers avoid sending DNS responses over UDP but use TCP instead.
In this work we show that IP fragmentation attacks also ...
Manus manum lavat: media clients and servers cooperating with common media client/server data
The newly rectified CTA standard --- Common Media Client Data (CMCD) --- allows content providers to get insights into the performance of their large-scale streaming operations. Its sister standard --- Common Media Server Data (CMSD) --- is in the works ...
Tools for disambiguating RFCs
For decades, drafting Internet protocols has taken significant amounts of human supervision due to the fundamental ambiguity of natural language. Given such ambiguity, it is also not surprising that protocol implementations have long exhibited bugs. This ...