Recent distributed denial-of-service attacks on the Internet have been exploiting necessarily open protocols, such as DNS. The Spamhaus attack is one of the largest ever examples o...
A number of projects deploy Linux-based embedded systems to carry out large-scale active network measurement and network experiments. Due to resource constrains and the increase of...
Abstract. BGP, the de-facto inter-domain routing protocol, was designed without considering security. Recently, network operators have experienced hijacks of their network prefixe...
Abstract. There is rapid growth in the number of IPv6 users and IPv6 compliant services on the Internet. However, few measurement studies exist about the quality of user experience...
Abstract. We present, validate, and apply an active measurement technique that ascertains whether candidate IPv4 and IPv6 server addresses are “siblings,” i.e., assigned to the...
The International Telecommunications Union (ITU) and the Organization for Economic Cooperation and Development (OECD) provide Internet penetration statistics, which are collected f...
Suso Benitez-Baleato, Nils B. Weidmann, Petros Gig...
SDN deployments rely on switches that come from various vendors and differ in terms of performance and available features. Understanding these differences and performance charact...
The popularity of video sharing services has increased exponentially in recent years, but this popularity is accompanied by challenges associated with the tremendous scale of user ...
Yao Liu, Sam Blasiak, Weijun Xiao, Zhenhua Li, Son...
Users increasingly use mobile devices as their primary means to access the Internet. While it is well known that cellular network operators employ middleboxes, the details of thei...
Abstract. We consider the problem of inferring IPv6 router uninterrupted system availability, or uptime, from a remote vantage point without privileged access. Uptime inference is ...
Robert Beverly, Matthew J. Luckie, Lorenza Mosley,...