Sciweavers

PAM
2009
Springer
14 years 7 months ago
Dynamics of Online Scam Hosting Infrastructure
This paper studies the dynamics of scam hosting infrastructure, with an emphasis on the role of fast-flux service networks. By monitoring changes in DNS records of over 350 distin...
Maria Konte, Nick Feamster, Jaeyeon Jung
PAM
2009
Springer
14 years 7 months ago
Clarified Recorder and Analyzer for Visual Drill Down Network Analysis
This paper presents the Clarified system for passive network . It is based on capturing complete packet history and abstracting it in form of different interactive high-level visua...
Jani Kenttälä, Joachim Viide, Timo Ojala...
PAM
2009
Springer
14 years 7 months ago
Triangle Inequality and Routing Policy Violations in the Internet
Triangle inequality violations (TIVs) are the effect of packets between two nodes being routed on the longer direct path between them when a shorter detour path through an intermed...
Cristian Lumezanu, Randolph Baden, Neil Spring, Bo...
PAM
2009
Springer
14 years 7 months ago
Monitoring the Bittorrent Monitors: A Bird's Eye View
Abstract. Detecting clients with deviant behavior in the Bittorrent network is a challenging task that has not received the deserved attention. Typically, this question is seen as ...
Georgos Siganos, Josep M. Pujol, Pablo Rodriguez
PAM
2009
Springer
14 years 7 months ago
Quantifying the Extent of IPv6 Deployment
Our understanding of IPv6 deployment is surprisingly limited. In fact, it is not even clear how we should quantify IPv6 deployment. In this paper, we collect and analyze a variety ...
Elliott Karpilovsky, Alexandre Gerber, Dan Pei, Je...
PAM
2009
Springer
14 years 7 months ago
Access Point Localization Using Local Signal Strength Gradient
Abstract. Many previous studies have examined the placement of access points (APs) to improve the community’s understanding of the deployment and behavioral characteristics of wi...
Dongsu Han, David G. Andersen, Michael Kaminsky, K...
PAM
2009
Springer
14 years 7 months ago
Inferring Spammers in the Network Core
Despite a large amount of effort devoted in the past years trying to limit unsolicited mail, spam is still a major global concern. Content-analysis techniques and blacklists, the m...
Dominik Schatzmann, Martin Burkhart, Thrasyvoulos ...
PAM
2009
Springer
14 years 7 months ago
Multi-layer Monitoring of Overlay Networks
Abstract. Monitoring end-to-end paths in an overlay network is essential for evaluating end-system performance and for troubleshooting anomalous behavior. However, conducting measu...
Mehmet Demirci, Samantha Lo, Srinivasan Seetharama...
PAM
2009
Springer
14 years 7 months ago
Measuring Mobile Peer-to-Peer Usage: Case Finland 2007
We study the development of mobile peer-to-peer (MP2P) traffic and the usage of MP2P applications in Finland during 2005-2007. Research data consists of 1) traffic traces measured ...
Mikko V. J. Heikkinen, Antero Kivi, Hannu Verkasal...
PAM
2009
Springer
14 years 7 months ago
Uncovering Artifacts of Flow Measurement Tools
This paper analyzes the performance of two implementations of J-Flow, the flow measurement tool deployed on most Juniper routers. Our work relies on both controlled experiments an...
Ítalo Cunha, Fernando Silveira, Ricardo Oli...