Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperDecember 2024
Towards Efficient and Scalable Internet Cross-Layer Mapping
CoNEXT-SW '24: Proceedings of the CoNEXT on Student Workshop 2024Pages 11–12https://doi.org/10.1145/3694812.3699931Understanding the topology of the global Internet is crucial for advancements in network performance, resilience, and policy-making. Most existing mapping frameworks, focusing separately on logical or physical connectivity, provide fragmented insights ...
- posterNovember 2024
Poster: How much of the Web Cares about QUIC's Anti-ossification Features?
IMC '24: Proceedings of the 2024 ACM on Internet Measurement ConferencePages 773–774https://doi.org/10.1145/3646547.3689673QUICv2 and the "Greasing the QUIC Bit'' have features designed to prevent the ossification (aka slowed progress in evolution) of the QUIC protocol. Historically, network middleboxes can become reliant on, for example, specific values or uses of header ...
- posterNovember 2024
Poster: Twinkle, Twinkle, Streaming Star: Illuminating CDN Performance over Starlink
IMC '24: Proceedings of the 2024 ACM on Internet Measurement ConferencePages 759–760https://doi.org/10.1145/3646547.3689666Low-Earth-Orbit satellite networks (LSNs) are enabling low-latency high-bandwidth internet connectivity at a global scale. However, majority of the traffic on the Internet is currently handled by Content Delivery Networks (CDNs), which rely on ...
- abstractJune 2024
Who's Got My Back? Measuring the Adoption of an Internet-wide BGP RTBH Service
SIGMETRICS/PERFORMANCE '24: Abstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer SystemsPages 53–54https://doi.org/10.1145/3652963.3655090Distributed Denial-of-Service (DDoS) attacks continue to threaten the availability of Internet-based services. While countermeasures exist to decrease the impact of these attacks, not all operators have the resources or knowledge to deploy them. Unwanted ...
Also Published in:
ACM SIGMETRICS Performance Evaluation Review: Volume 52 Issue 1 A Multifaceted Look at Starlink Performance
- Nitinder Mohan,
- Andrew E. Ferguson,
- Hendrik Cech,
- Rohan Bose,
- Prakita Rayyan Renatin,
- Mahesh K. Marina,
- Jörg Ott
WWW '24: Proceedings of the ACM Web Conference 2024Pages 2723–2734https://doi.org/10.1145/3589334.3645328The Starlink network from SpaceX stands out as the only commercial LEO network with over 2M+ customers and more than 4000 operational satellites. In this paper, we conduct a first-of-its-kind extensive multi-faceted analysis of Starlink performance ...
-
- research-articleFebruary 2024
Who's Got My Back? Measuring the Adoption of an Internet-wide BGP RTBH Service
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 8, Issue 1Article No.: 3, Pages 1–25https://doi.org/10.1145/3639029Distributed Denial-of-Service (DDoS) attacks continue to threaten the availability of Internet-based services. While countermeasures exist to decrease the impact of these attacks, not all operators have the resources or knowledge to deploy them. ...
- research-articleNovember 2023
Dissecting the Performance of Satellite Network Operators
Proceedings of the ACM on Networking (PACMNET), Volume 1, Issue CoNEXT3Article No.: 15, Pages 1–25https://doi.org/10.1145/3629137The rapid growth of satellite network operators (SNOs) has revolutionized broadband communications, enabling global connectivity and bridging the digital divide. As these networks expand, it is important to evaluate their performance and efficiency. This ...
- short-paperOctober 2023
Does It Spin? On the Adoption and Use of QUIC's Spin Bit
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 554–560https://doi.org/10.1145/3618257.3624844Encrypted QUIC traffic complicates network management as traditional transport layer semantics can no longer be used for RTT or packet loss measurements. Addressing this challenge, QUIC includes an optional, carefully designed mechanism: the spin bit. ...
- research-articleApril 2023
Who Squats IPv4 Addresses?
ACM SIGCOMM Computer Communication Review (SIGCOMM-CCR), Volume 53, Issue 1Pages 48–72https://doi.org/10.1145/3594255.3594260To mitigate IPv4 exhaustion, IPv6 provides expanded address space, and NAT allows a single public IPv4 address to suffice for many devices assigned private IPv4 address space. Even though NAT has greatly extended the shelf-life of IPv4, some networks ...
- research-articleOctober 2022
Internet scale reverse traceroute
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferencePages 694–715https://doi.org/10.1145/3517745.3561422Knowledge of Internet paths allows operators and researchers to better understand the Internet and troubleshoot problems. Paths are often asymmetric, so measuring just the forward path only gives partial visibility. Despite the existence of Reverse ...
- research-articleMay 2022
Understanding the Security of Free Content Websites by Analyzing their SSL Certificates: A Comparative Study
CySSS '22: Proceedings of the 1st Workshop on Cybersecurity and Social SciencesPages 19–25https://doi.org/10.1145/3494108.3522769Online services that provide books, music, movies, etc., for free have existed on the Internet for decades. While there are some common beliefs and warnings that such online services may contain hidden security risks, many ordinary users still visit ...
- research-articleNovember 2021
Scan, Test, Execute: Adversarial Tactics in Amplification DDoS Attacks
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 940–954https://doi.org/10.1145/3460120.3484747Amplification attacks generate an enormous flood of unwanted traffic towards a victim and are generated with the help of open, unsecured services, to which an adversary sends spoofed service requests that trigger large answer volumes to a victim. ...
- research-articleNovember 2020
Pruning Edge Research with Latency Shears
HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in NetworksPages 182–189https://doi.org/10.1145/3422604.3425943Edge computing has gained attention from both academia and industry by pursuing two significant challenges: 1) moving latency critical services closer to the users, 2) saving network bandwidth by aggregating large flows before sending them to the cloud. ...
- extended-abstractJune 2019
Inferring Catchment in Internet Routing
SIGMETRICS '19: Abstracts of the 2019 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer SystemsPages 19–20https://doi.org/10.1145/3309697.3331493BGP is the de-facto Internet routing protocol for interconnecting Autonomous Systems (AS). Each AS selects its preferred routes based on its routing policies, which are typically not disclosed. Due to the distributed route selection and information ...
- research-articleJune 2019
Inferring Catchment in Internet Routing
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 3, Issue 2Article No.: 30, Pages 1–31https://doi.org/10.1145/3341617.3326145BGP is the de-facto Internet routing protocol for exchanging prefix reachability information between Autonomous Systems (AS). It is a dynamic, distributed, path-vector protocol that enables rich expressions of network policies (typically treated as ...
- research-articleFebruary 2019
The Dagstuhl beginners guide to reproducibility for experimental networking research
- Vaibhav Bajpai,
- Anna Brunstrom,
- Anja Feldmann,
- Wolfgang Kellerer,
- Aiko Pras,
- Henning Schulzrinne,
- Georgios Smaragdakis,
- Matthias Wählisch,
- Klaus Wehrle
ACM SIGCOMM Computer Communication Review (SIGCOMM-CCR), Volume 49, Issue 1Pages 24–30https://doi.org/10.1145/3314212.3314217Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on ...
- research-articleDecember 2017
Server Location Verification (SLV) and Server Location Pinning: Augmenting TLS Authentication
ACM Transactions on Privacy and Security (TOPS), Volume 21, Issue 1Article No.: 1, Pages 1–26https://doi.org/10.1145/3139294We introduce the first known mechanism providing realtime server location verification. Its uses include enhancing server authentication by enabling browsers to automatically interpret server location information. We describe the design of this new ...
- research-articleApril 2017
Accurate Manipulation of Delay-based Internet Geolocation
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications SecurityPages 887–898https://doi.org/10.1145/3052973.3052993Delay-based Internet geolocation techniques are repeatedly positioned as well suited for security-sensitive applications, e.g., location-based access control, and credit-card verification. We present new strategies enabling adversaries to accurately ...
- research-articleMay 2016
Global Measurements: Practice and Experience (Report on Dagstuhl Seminar #16012)
ACM SIGCOMM Computer Communication Review (SIGCOMM-CCR), Volume 46, Issue 2Pages 32–39https://doi.org/10.1145/2935634.2935641This article summarises a 2.5 day long Dagstuhl seminar on Global Measurements: Practice and Experience held in January 2016. This seminar was a followup of the seminar on Global Measurement Frameworks held in 2013, which focused on the development of ...
- research-articleDecember 2015
Socially-aware multimedia content delivery for the cloud
UCC '15: Proceedings of the 8th International Conference on Utility and Cloud ComputingPages 300–309Most Content Delivery Networks (CDNs) are operated as a Software as a Service (SaaS): Many cloud providers build their custom CDNs to benefit from content users, as well as reduce demand on their own telecommunications infrastructure. More importantly, ...