Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
In the span of only a few years, the Internet has experienced an astronomical increase in the use of specialized content delivery systems, such as content delivery networks and pe...
Stefan Saroiu, P. Krishna Gummadi, Richard J. Dunn...
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
With reference to the General Packet Radio Service (GPRS), an extension of the Global System Mobile Communication (GSM) addressing packetoriented traffic, this paper contributes t...
Stefano Porcarelli, Felicita Di Giandomenico, Andr...
We focus in this paper on Internet flows, consider their contributions to the overall traffic per time unit or bin, and perform a multi-scale and multi-protocol analysis to explor...