Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperOctober 2015
Are We One Hop Away from a Better Internet?
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 523–529https://doi.org/10.1145/2815675.2815719The Internet suffers from well-known performance, reliability, and security problems. However, proposed improvements have seen little adoption due to the difficulties of Internet-wide deployment. We observe that, instead of trying to solve these ...
- short-paperOctober 2015
In and Out of Cuba: Characterizing Cuba's Connectivity
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 487–493https://doi.org/10.1145/2815675.2815718The goal of our work is to characterize the current state of Cuba's access to the wider Internet. This work is motivated by recent improvements in connectivity to the island and the growing commercial interest following the ease of restrictions on ...
- short-paperOctober 2015
Analyzing the Performance of an Anycast CDN
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 531–537https://doi.org/10.1145/2815675.2815717Content delivery networks must balance a number of trade-offs when deciding how to direct a client to a CDN server. Whereas DNS-based redirection requires a complex global traffic manager, anycast depends on BGP to direct a client to a CDN front-end. ...
- short-paperOctober 2015
Is Explicit Congestion Notification usable with UDP?
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 63–69https://doi.org/10.1145/2815675.2815716We present initial measurements to determine if ECN is usable with UDP traffic in the public Internet. This is interesting because ECN is part of current IETF proposals for congestion control of UDP-based interactive multimedia, and due to the ...
- short-paperOctober 2015
Revisiting Network Energy Efficiency of Mobile Apps: Performance in the Wild
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 339–345https://doi.org/10.1145/2815675.2815713Energy consumption due to network traffic on mobile devices continues to be a significant concern. We examine a range of excessive energy consumption problems caused by background network traffic through a two-year user study, and also validate these ...
-
- short-paperOctober 2015
Investigating Interdomain Routing Policies in the Wild
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 71–77https://doi.org/10.1145/2815675.2815712Models of Internet routing are critical for studies of Internet security, reliability and evolution, which often rely on simulations of the Internet's routing system. Accurate models are difficult to build and suffer from a dearth of ground truth data, ...
- short-paperOctober 2015
Opportunities and Challenges in Crowdsourced Wardriving
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 267–273https://doi.org/10.1145/2815675.2815711Knowing the physical location of a mobile device is crucial for a number of context-aware applications. This information is usually obtained using the Global Positioning System (GPS), or by calculating the position based on proximity of WiFi access ...
- short-paperOctober 2015
Quantifying Interference between Measurements on the RIPE Atlas Platform
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 437–443https://doi.org/10.1145/2815675.2815710Public measurement platforms composed of low-end hardware devices such as RIPE Atlas have gained significant traction in the research community. Such platforms are indeed particularly interesting as they provide Internet-wide measurement capabilities ...
- short-paperOctober 2015
Is There WiFi Yet?: How Aggressive Probe Requests Deteriorate Energy and Throughput
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 317–323https://doi.org/10.1145/2815675.2815709WiFi offloading has emerged as a key component of cellular operator strategy to meet the rich data needs of modern mobile devices. Hence, mobile devices tend to aggressively seek out WiFi in order to provide improved user Quality of Experience (QoE) and ...
- research-articleOctober 2015
The Dark Menace: Characterizing Network-based Attacks in the Cloud
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 169–182https://doi.org/10.1145/2815675.2815707As the cloud computing market continues to grow, the cloud platform is becoming an attractive target for attackers to disrupt services and steal data, and to compromise resources to launch attacks. In this paper, using three months of NetFlow data in ...
- research-articleOctober 2015
Detecting Malicious Activity with DNS Backscatter
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 197–210https://doi.org/10.1145/2815675.2815706Network-wide activity is when one computer (the originator) touches many others (the targets). Motives for activity may be benign (mailing lists, CDNs, and research scanning), malicious (spammers and scanners for security vulnerabilities), or perhaps ...
- research-articleOctober 2015
Annoyed Users: Ads and Ad-Block Usage in the Wild
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 93–106https://doi.org/10.1145/2815675.2815705Content and services which are offered for free on the Internet are primarily monetized through online advertisement. This business model relies on the implicit agreement between content providers and users where viewing ads is the price for the "free" ...
- research-articleOctober 2015
Timeouts: Beware Surprisingly High Delay
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 303–316https://doi.org/10.1145/2815675.2815704Active probing techniques, such as ping, have been used to detect outages. When a previously responsive end host fails to respond to a probe, studies sometimes attempt to confirm the outage by retrying the ping or attempt to identify the location of the ...
- research-articleOctober 2015
Leveraging Internet Background Radiation for Opportunistic Network Analysis
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 423–436https://doi.org/10.1145/2815675.2815702For more than a decade, unsolicited traffic sent to unused regions of the address space has provided valuable insight into malicious Internet activities. In this paper, we explore the utility of this traffic, known as Internet Background Radiation (IBR),...
- research-articleOctober 2015
Ting: Measuring and Exploiting Latencies Between All Tor Nodes
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 289–302https://doi.org/10.1145/2815675.2815701Tor is a peer-to-peer overlay routing network that achieves unlinkable communication between source and destination.Unlike traditional mix-nets, Tor seeks to balance anonymity and performance, particularly with respect to providing low-latency ...
- research-articleOctober 2015
PerfSight: Performance Diagnosis for Software Dataplanes
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 409–421https://doi.org/10.1145/2815675.2815698The advent of network functions virtualization (NFV) means that data planes are no longer simply composed of routers and switches. Instead they are very complex and involve a variety of sophisticated packet processing elements that reside on the OSes ...
- research-articleOctober 2015
Tracking the Evolution and Diversity in Network Usage of Smartphones
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 253–266https://doi.org/10.1145/2815675.2815697We analyze the evolution of smartphone usage from a dataset obtained from three, 15-day-long, user-side, measurements with over 1500 recruited smartphone users in the Greater Tokyo area from 2013 to 2015. This dataset shows users across a diverse range ...
- research-articleOctober 2015
From .academy to .zone: An Analysis of the New TLD Land Rush
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 381–394https://doi.org/10.1145/2815675.2815696The com, net, and org TLDs contain roughly 150 million registered domains, and domain registrants often have a difficult time finding a desirable and available name. In 2013, ICANN began delegation of a new wave of TLDs into the Domain Name System with ...
- research-articleOctober 2015
Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security
- Zakir Durumeric,
- David Adrian,
- Ariana Mirian,
- James Kasten,
- Elie Bursztein,
- Nicolas Lidzborski,
- Kurt Thomas,
- Vijay Eranti,
- Michael Bailey,
- J. Alex Halderman
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 27–39https://doi.org/10.1145/2815675.2815695The SMTP protocol is responsible for carrying some of users' most intimate communication, but like other Internet protocols, authentication and confidentiality were added only as an afterthought. In this work, we present the first report on global ...
- research-articleOctober 2015
Who is .com?: Learning to Parse WHOIS Records
IMC '15: Proceedings of the 2015 Internet Measurement ConferencePages 369–380https://doi.org/10.1145/2815675.2815693WHOIS is a long-established protocol for querying information about the 280M+ registered domain names on the Internet. Unfortunately, while such records are accessible in a ``human-readable'' format, they do not follow any consistent schema and thus are ...