Sciweavers

PAM
2015
Springer
8 years 7 months ago
~Open Resolvers: Understanding the Origins of Anomalous Open DNS Resolvers
Recent distributed denial-of-service attacks on the Internet have been exploiting necessarily open protocols, such as DNS. The Spamhaus attack is one of the largest ever examples o...
Andrew J. Kaizer, Minaxi Gupta
PAM
2015
Springer
8 years 7 months ago
Improving the Packet Send-Time Accuracy in Embedded Devices
A number of projects deploy Linux-based embedded systems to carry out large-scale active network measurement and network experiments. Due to resource constrains and the increase of...
Ricky K. P. Mok, Weichao Li, Rocky K. C. Chang
PAM
2015
Springer
8 years 7 months ago
Measuring BGP Route Origin Registration and Validation
Abstract. BGP, the de-facto inter-domain routing protocol, was designed without considering security. Recently, network operators have experienced hijacks of their network prefixe...
Daniele Iamartino, Cristel Pelsser, Randy Bush
PAM
2015
Springer
8 years 7 months ago
Measuring YouTube from Dual-Stacked Hosts
Abstract. There is rapid growth in the number of IPv6 users and IPv6 compliant services on the Internet. However, few measurement studies exist about the quality of user experience...
Saba Ahsan, Vaibhav Bajpai, Jörg Ott, Jü...
PAM
2015
Springer
8 years 7 months ago
Server Siblings: Identifying Shared IPv4/IPv6 Infrastructure Via Active Fingerprinting
Abstract. We present, validate, and apply an active measurement technique that ascertains whether candidate IPv4 and IPv6 server addresses are “siblings,” i.e., assigned to the...
Robert Beverly, Arthur W. Berger
PAM
2015
Springer
8 years 7 months ago
Transparent Estimation of Internet Penetration from Network Observations
The International Telecommunications Union (ITU) and the Organization for Economic Cooperation and Development (OECD) provide Internet penetration statistics, which are collected f...
Suso Benitez-Baleato, Nils B. Weidmann, Petros Gig...
PAM
2015
Springer
8 years 7 months ago
What You Need to Know About SDN Flow Tables
SDN deployments rely on switches that come from various vendors and differ in terms of performance and available features. Understanding these differences and performance charact...
Maciej Kuzniar, Peter Peresíni, Dejan Kosti...
PAM
2015
Springer
8 years 7 months ago
A Quantitative Study of Video Duplicate Levels in YouTube
The popularity of video sharing services has increased exponentially in recent years, but this popularity is accompanied by challenges associated with the tremendous scale of user ...
Yao Liu, Sam Blasiak, Weijun Xiao, Zhenhua Li, Son...
PAM
2015
Springer
8 years 7 months ago
Investigating Transparent Web Proxies in Cellular Networks
Users increasingly use mobile devices as their primary means to access the Internet. While it is well known that cellular network operators employ middleboxes, the details of thei...
Xing Xu, Yurong Jiang, Tobias Flach, Ethan Katz-Ba...
PAM
2015
Springer
8 years 7 months ago
Measuring and Characterizing IPv6 Router Availability
Abstract. We consider the problem of inferring IPv6 router uninterrupted system availability, or uptime, from a remote vantage point without privileged access. Uptime inference is ...
Robert Beverly, Matthew J. Luckie, Lorenza Mosley,...