The contents of this legacy page are no longer maintained nor supported, and are made available only for historical purposes.

Publications - Networking Bibliography

An annotated bibliography of papers and presentations in the wide-area networking literature.

Note: This effort ended in 2013, but remains for historical purposes.

Four main views of the the bibliography are available. Each view groups the entries according to a different attribute, such as date or author. Additionally, each view may be displayed with either abbreviated or complete citations.

Please select a view below:


Examples of topics covered are:

  • interdomain routing (specifically, BGP)
  • Internet topology analysis, modeling, and simulation
  • traffic characterization
  • active and passive measurement

Examples of topics not covered are:

  • local-area networks
  • design, implementation, or operation of networking equipment
  • software engineering of protocol stacks in operating systems


Additional Content

Annotated Bibliography of Networking Papers

An annotated bibliography of papers and presentations in the wide-area networking literature. This collection is not actively maintained and is incomplete. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for more recent papers. Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.

Annotated Bibliography of Networking Papers

An annotated bibliography of papers and presentations in the wide-area networking literature. This collection is not actively maintained and is incomplete. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for more recent papers. Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.

Bibliography Details

T. Ylonen, "Thoughts on how to mount an attack on tcpdpriv’s ‘-a50’ option" 2005.

Bibliography Details

Y. Afek, O. Ben-Shalom, and A. Bremler-Barr, "On the Structure and Application of BGP Policy Atoms", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Bibliography Details

Y. Afek, A. Bremler-Barr, and S. Har-Peled, "Routing with a Clue", in ACM SIGCOMM, 1999.

Bibliography Details

S. Agarwal and J.R. Lorch, "Matchmaking for online games and other latency-sensitive P2P systems", Computer Communication Review, vol. 39, no. 4, pp. 315-326, Oct 2009.

Bibliography Details

C.C. Aggarwal and P.S. Yu, "On Anonymization of String Data", in SDM, 2007.

Bibliography Details

B. Aiken, H.-W. Braun, and P. Ford, "NSF implementation plan for interim NREN", 1993.

Bibliography Details

M. Allman and V. Paxson, "Issues and etiquette concerning use of shared measurement data", in ACM SIGCOMM IMC, 2007.

Bibliography Details

D.G. Andersen, N. Feamster, S. Bauer, and H. Balakrishnan, "Topology Inference from BGP Routing Dynamics", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Bibliography Details

D. Antoniades, M. Polychronakis, S. Antonatos, E. Markatos, and S. Ubik, "Appmon: An Application for Accurate per Application Network Traffic Characterization", in BroadBand Europe 2006, Dec 2006.

Bibliography Details

M.J. Arif, S. Karunasekera, and S. Kulkarni, "GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements", in Australasian Conference on Computer Science (ASCS), Darlinghurst, Australia, Australia, 2010, pp. 89-98, Australian Computer Society, Inc.

Bibliography Details

M.J. Arif, S. Karunasekera, S. Kulkarni, A. Gunatilaka, and B. Ristic, "Internet Host Geolocation Using Maximum Likelihood Estimation Technique", in IEEE International Conference on Advanced Information Networking and Applications (AINA), Washington, DC, USA, 2010, pp. 422-429, IEEE Computer Society.

Bibliography Details

T. Asaba, k. claffy, O. Nakamura, and J. Murai, "An analysis of international academic research network traffic between Japan and other nations", in International Networking Conference (INET) ‘92, Jan 1992.

Bibliography Details

M. Beiro, J. Alvarez-Hamelin, and J. Busch, "A low complexity visualization tool that helps to perform complex systems analysis", New Journal of Physics, vol. 10, no. 12, pp. 125003, Dec 2008.

Bibliography Details

G. Bartlett, J. Heidemann, C. Papadopoulos, and J. Pepin, "Estimating P2P Traffic Volume at USC", Tech. rep., USC/Information Sciences Institute, 2007.

Bibliography Details

G. Bartlett, J. Heidemann, and C. Papadopoulos, "Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing", in IEEE Global Internet Symposium 2007, May 2007.

Bibliography Details

L. Bernaille, A. Soule, M. Jeannin, and K. Salamatian, "Blind Application Recognition Through Behavioral Classification", Tech. rep., Paris 2005, 2005.

Bibliography Details

L. Bernaille, R. Teixeira, and K. Salamatian, "Early Application Identification", in ACM CoNEXT 2006, Jul 2006.

Bibliography Details

L. Bernaille, R. Teixeira, . Akodjenou, A. Soule, and K. Salamatian, "Traffic Classification on the fly", in ACM SIGCOMM Computer Communication Review, Oct 2006.

Bibliography Details

L. Bernaille and R. Teixeira, "Early Recognition of Encrypted Application", in Passive and Active Measurement Conference (PAM), Apr 2007.

Bibliography Details

R. Beverly and k. claffy, "Wide-Area IP Multicast Traffic Characterization", IEEE Network, Jan 2003.

Bibliography Details

isp bgpdnswg@nicwg.org, "Enhancing the Security of Name Resolution and Inter-Domain Internet Routing" May 2002.

Bibliography Details

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) 2000, July 2000.

Bibliography Details

Huffaker B., J. Jung, D. Wessels, and k. claffy, "Visualization of the Growth and Topology of the NLANR Caching Hierarchy", in International WWW Caching Workshop 1998, June 1998.

Bibliography Details

M. Fomenkov, k. claffy, B. Huffaker, and D. Moore, "Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers", in USENIX LISA, Dec 2001.

Bibliography Details

B. Huffaker, M. Fomenkov, D. Moore, and k. claffy, "Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance", in Passive and Active Measurement Conference (PAM), Apr 2001.

Bibliography Details

B. Huffaker, M. Fomenkov, D.~J. Plummer, D. Moore, and k. claffy, "Distance Metrics in the Internet", in IEEE International Telecommunications Symposium, Sep 2002.

Bibliography Details

T. Lee, B. Huffaker, M. Fomenkov, and k. claffy, "On the problem of optimization of DNS root servers' placement", in Passive and Active Measurement Conference (PAM), Mar 2003.

Bibliography Details

B. Huffaker, k. claffy, and E. Nemeth, "Tools to Visualize the Internet Multicast Backbone", in International Networking Conference (INET) 1999, June 1999.

Bibliography Details

B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) 1999, June 1999.

Bibliography Details

M. Bishop, R. Crawford, B. Bhumiratana, L. Clark, and K. Levitt, "Some Problems in Sanitizing Network Data", in IEEE WETICE, 2006.

Bibliography Details

R. Bohn, H.-W. Braun, k. claffy, and S. Wolff, "Mitigating the coming Internet crunch: multiple service levels via Precedence", Tech. rep., CAIDA, Nov 1994.

Bibliography Details

D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli, "Revealing Skype Traffic: when randomness plays with you", in ACM SIGCOMM 2007, Aug 2007.

Bibliography Details

H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1992.

Bibliography Details

H.-W. Braun, B. Chinoy, k. claffy, and G. Polyzos, "1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC", Tech. rep., CAIDA, Dec 1993.

Bibliography Details

H.-W. Braun, P. Ford, and Y. Rekhter, "CIDR and the evolution of the Internet", in International Networking Conference (INET) ‘93, May 1993.

Bibliography Details

H.-W. Braun, k. claffy, and G. Polyzos, "A framework for flow-based accounting on the Internet", in IEEE Singapore International Conference on Networks'93 (SICON'93), Sep 1993.

Bibliography Details

H.-W. Braun and k. claffy, "Network analysis issues for a public Internet", in Public Access to the Internet, A Harvard JFK School Workshop, May 1993.

Bibliography Details

H.-W. Braun and k. claffy, "Network analysis in support of Internet policy requirements", in International Networking Conference (INET) ‘93, May 1993.

Bibliography Details

H.-W. Braun, B. Chinoy, and k. claffy, "Applied Network Research: 1994 annual status report", Tech. rep., CAIDA, Apr 1994.

Bibliography Details

H.-W. Braun and k. claffy, "Web traffic characterization: an assessment of the impact of caching documents from the NCSA’s web server", in World Wide Web (WWW) Conference, Oct 1994.

Bibliography Details

T. Brekne, A. Arnes, and A. Oslebo, "Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies.", in Privacy Enhancing Technologies, 2005.

Bibliography Details

A. Broido and k. claffy, "Analysis of RouteViews BGP data: policy atoms", in Network Resource Data Management Workshop, May 2001.

Bibliography Details

A. Broido and k. claffy, "Complexity of global routing policies", Tech. rep., CAIDA, Jul 2001.

Bibliography Details

A. Broido and k. claffy, "Internet topology: connectivity of IP graphs", in SPIE International symposium on Convergence of IT and Communication, Aug 2001.

Bibliography Details

A. Broido, k. claffy, and E. Nemeth, "Internet Expansion, Refinement, and Churn", European Transactions on Telecommunications, Jan 2002.

Bibliography Details

A. Broido, R. King, E. Nemeth, and k. claffy, "Radon Spectroscopy of Inter-Packet Delay", in IEEE High-Speeding Networking Workshop (HSN), March 2003.

Bibliography Details

A. Broido, E. Nemeth, and k. claffy, "Spectroscopy of DNS Update Traffic", in ACM SIGMETRICS 2003, June 2003.

Bibliography Details

A. Broido, E. Nemeth, and k. claffy, "Spectroscopy of Private DNS Update Sources", in IEEE Workshop on Internet Applications (WIAPP), June 2003.

Bibliography Details

A. Broido, Y. Hyun, R. Gao, and k. claffy, "Their share: diversity and disparity in IP traffic", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).

Bibliography Details

N. Brownlee and R. Fulton, "Kawaihiko and the third-quartile day [traffic management]", Aug 2000.

Bibliography Details

N. Brownlee, k. claffy, and E. Nemeth, "DNS Root/gTLD Performance Measurements", in USENIX LISA, Dec 2001.

Bibliography Details

N. Brownlee, k. claffy, and E. Nemeth, "DNS Measurements at a Root Server", in IEEE GLOBECOM. Nov 2001, IEEE GLOBECOM.

Bibliography Details

N. Brownlee, "Using NeTraMet for Production Traffic Measurement", in Integrated Management Strategies for the New Millenium, May 2001.

Bibliography Details

N. Brownlee, k. claffy, M. Murray, and E. Nemeth, "Methodology for passive analysis of a university Internet link", in Passive and Active Measurement Conference (PAM), Apr 2001.

Bibliography Details

N. Brownlee and M. Murray, "Streams, Flows and Torrents", in Passive and Active Measurement Conference (PAM), Apr 2001.

Bibliography Details

N. Brownlee and I. Ziedins, "Response time distributions for global name servers", in Passive and Active Measurement Conference (PAM) 2002, Mar 2002.

Bibliography Details

N. Brownlee and k. claffy, "Understanding Internet Traffic Streams: Dragonflies and Tortoises", Jul 2002.

Bibliography Details

A. Burstein, "Toward a Culture of Cybersecurity Research", in University of California, Berkeley, 2008.

Bibliography Details

A. Burstein, "Conducting Cybersecurity Research Legally and Ethically", in LEET ‘08, 2008.

Bibliography Details

A. Butkovic, F. Orucevic, and A. Tanovic, "Using Whois based geolocation and Google maps API for support cybercrime investigations", pp. 194-200, Jun 2013.

Bibliography Details

CAIDA, "ISMA Winter 2000 Workshop - Final Report", in Internet Statistics and Metrics Analysis (ISMA), Dec 2000.

Bibliography Details

CAIDA, "ISMA passive measurement data and analysis, workshop report", in Internet Statistics and Metrics Analysis (ISMA), Jan 1999.

Bibliography Details

CAIDA, "Cooperative Association for Internet Data Analysis", Tech. rep., CAIDA, Oct 1996.

Bibliography Details

CAIDA, "Comments by CAIDA concerning the FCC’s review of the acquisition of MCI Communications Corp. by Worldcom, Inc.", Tech. rep., CAIDA, Apr 1998.

Bibliography Details

CAIDA, "Report from the ISMA Network Visualization Workshop", in Internet Statistics and Metrics Analysis (ISMA), Apr 1999.

Bibliography Details

C. Castelluccia, M.A. Kaafar, P. Manils, and D. Perito, "Geolocalization of proxied services and its application to fast-flux hidden servers", in IMC, 2009.

Bibliography Details

R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, and K. Levitt, "Sanitization models and their limitations", in New Security Paradigms Workshop (NSPW), 2007.

Bibliography Details

D. Chang, R. Govindan, and J. Heidemann, "An Empirical Study of Router Response to Large BGP Routing Table Load", Tech. Rep. ISI-TR-2001-552, USC/Information Sciences Institute, December 2001.

Bibliography Details

H. Chang, S. Jamin, and W. Willinger, "Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach", in ACM SIGCOMM Workshop on MoMeTools, August 2003.

Bibliography Details

Chang~Feng W., Chang F., Chi~Feng W., and Walpole J., "A Traffic Characterization of Popular on-line Games", in IEEE/ACM Transactions on Networking 2005, Oct 2005.

Bibliography Details

B. Chinoy, "Dynamics of Internet routing information", Oct 1992.

Bibliography Details

B. Chinoy and H.-W. Braun, "The National Science Foundation Network", Tech. rep., CAIDA, Sep 1992.

Bibliography Details

B. Chinoy and T. Salo, "Internet Exchanges: Policy-Driven Evolution", in Coordination and Administration of the Internet Workshop, Sep 1996.

Bibliography Details

K. Cho, M. Luckie, and B. Huffaker, "Identifying IPv6 Network Problems in the Dual-Stack World", in ACM SIGCOMM, Aug 2004.

Bibliography Details

K. Cho, K. Fukuda, H. Esaki, and A. Kato, "Observing Slow Crustal Movement in Residential User Traffic", in ACM CoNEXT 2008, Dec 2008.

Bibliography Details

k. claffy, "Measuring the Internet", Jan 2000.

Bibliography Details

k. claffy, "CAIDA: Visualizing the Internet", Jan 2001.

Bibliography Details

k. claffy, H.-W. Braun, and G. Polyzos, "Application of sampling methodologies to wide-area network traffic characterization", in ACM SIGCOMM ‘93, May 1993.

Bibliography Details

k. claffy, H.-W. Braun, and G. Polyzos, "Long-term traffic aspects of the NSFNET", in International Networking Conference (INET) ‘93, May 1993.

Bibliography Details

k. claffy, H.-W. Braun, and G. Polyzos, "Measurement considerations for assessing unidirectional latencies", Sep 1993.

Bibliography Details

k. claffy, H.-W. Braun, and G. Polyzos, "Traffic characteristics of the T1 NSFNET backbone", in IEEE INFOCOM, Jan 1993.

Bibliography Details

k. claffy, Internet traffic characterization., Ph.D. thesis, University of California, San Diego, 1994.

Bibliography Details

k. claffy, H.-W. Braun, and G. Polyzos, "Internet traffic flow profiling", Tech. rep., CAIDA, Mar 1994.

Bibliography Details

k. claffy, H.-W. Braun, and G. Polyzos, "Tracking long-term growth of the NSFNET", Mar 1994.

Bibliography Details

k. claffy, A Gross, and H.-W. Braun, "Measured interference of security mechanisms with network performance", in International Networking Conference (INET) ‘95, Jun 1995.

Bibliography Details

k. claffy, H.-W. Braun, and G. Polyzos, "A parameterizable methodology for Internet traffic flow profiling", Mar 1995.

Bibliography Details

k. claffy and H.-W. Braun, "Post-NSFNET statistics collection", in International Networking Conference (INET) ‘95, Jun 1995.

Bibliography Details

k. claffy, "‘But some data is worse than others’: Measurement of the global Internet", Tech. rep., CAIDA, Aug 1996.

Bibliography Details

k. claffy and T. Monk, "What’s next for Internet data analysis? Status and challenges facing the community", Oct 1997.

Bibliography Details

k. claffy, G. Miller, and K. Thompson, "The nature of the beast: Recent traffic measurements from an Internet backbone", in International Networking Conference (INET) ‘98, Jul 1998.

Bibliography Details

k. claffy and S. McCreary, "Internet measurement and data analysis: passive and active measurement", in American Statistical Association, Aug 1999.

Bibliography Details

k. claffy, T. Monk, and D. McRobb, "Internet Tomography", Jan 1999.

Bibliography Details

k. claffy, "Internet measurement and data analysis: topology, workload, performance and routing statistics", in NAE ‘99 Workshop, Mar 1999.

Bibliography Details

M. Collins and M. Reiter, "Hit-list worm detection and bot identification in large networks using protocol graphs", in RAID 2007, Sep 2007.

Bibliography Details

F. Constantinou and P. Mavrommatiss, "Identifying Known and Unknown Peer-to-Peer Traffic", in IEEE NCA 2006, Aug 2006.

Bibliography Details

G. Conti, "Googling Considering Harmful", in New Security Paradigms Workshop (NSPW), 2006.

Bibliography Details

S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil’s Advocate: Inferring Sensitive Information from Anonymized Network Traces", in NDSS, feb 2007.

Bibliography Details

S. Coull, C. Wright, F. Monrose, A. Keromytis, and M. Reiter, "Taming the Devil: Techniques for Evaluating Anonymized Network Data", in NDSS, feb 2008.

Bibliography Details

M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic Classification through Simple Statistical Fingerprinting", in ACM SIGCOMM 2007, Aug 2007.

Bibliography Details

F. Dabek, R. Cox, F. Kaashoek, and R. Morris, "Vivaldi: A Decentralized Network Coordinate System", in SIGCOMM, Portland, Oregon, Aug 2004.

Bibliography Details

A. Dainotti, W. de Donato, A. Pescape, and P. Salvo~Rossi, "Classification of Network Traffic via Packet-Level Hidden Markov Models", in IEEE GLOBECOM, 2008.

Bibliography Details

A. Dainotti, W. de Donato, A. Pescape, and G. Ventre, "TIE: a Community-oriented Traffic Classification Platform", in International Workshop on Traffic Monitoring and Analysis (TMA), 2009.

Bibliography Details

D.~M. Nicol, S.~W. Smith, and M. Zhao, "Efficient Security for BGP Route Announcements", Tech. Rep. TR2003-440, Dartmouth College, Computer Science, Hanover, NH, May 2003.

Bibliography Details

C. Davis, P. Vixie, T. Goodwin, and I. Dickinson, "A Means for Expressing Location Information in the Domain Name System", RFC Editor, 1996.

Bibliography Details

C. Dewes, A. Wichmann, and A. Feldmann, "An Analysis of Internet Chat Systems", in ACM SIGCOMM 2003, Aug 2003.

Bibliography Details

C. Diaz, B. Seys, J. Claessenss, and B. Preneel, "Towards Measuring Anonymity", in Privacy Enhancing Technologies, 2002.

Bibliography Details

Z. Dong, R.D.W. Perera, R. Chandramouli, and K.P. Subbalakshmi, "Network measurement based modeling and optimization for IP geolocation", Computer Networks, vol. 56, no. 1, pp. 85-98, Jan 2012.

Bibliography Details

C. Dovrolis, P. Ramanathan, and D. Moore, "Packet Dispersion Techniques and Capacity Estimation", July 2001.

Bibliography Details

C. Dovrolis, P. Ramanathan, and D. Moore, "What do packet dispersion techniques measure?", in IEEE INFOCOM, Jan 2001.

Bibliography Details

C. Dovrolis, R. Prasad, M. Murray, and k. claffy, "Bandwidth estimation: metrics, measurement techniques, and tools", IEEE Network, Nov 2003.

Bibliography Details

M. Dusi, F. Gringoli, and L. Salgarelli, "A Preliminary Look at the Privacy of SSH Tunnels", in IEEE International Conference on Communications (ICC) 2008, May 2008.

Bibliography Details

M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli, "Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting", in Computer Networks 2008, Sep 2008.

Bibliography Details

P.T. Endo and D. Sadok, "Whois based geolocation: A strategy to geolocate Internet hosts", pp. 408-413, Apr 2010.

Bibliography Details

B. Eriksson, P. Barford, J. Sommers, and R. Nowak, "A Learning-Based Approach for IP Geolocation", in PAM, LNCS Volume 6032, Apr 2010, pp. 171-180.

Bibliography Details

B. Eriksson, P. Barford, B. Maggs, and R. Nowak, "Posit: a lightweight approach for IP geolocation", ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 2, pp. 2-11, Sep 2012.

Bibliography Details

J. Erman, A. Mahanti, and M. Arlitt, "Internet Traffic Identification using Machine Learning", in IEEE GLOBECOM 2006, Nov 2006.

Bibliography Details

J. Erman, M. Arlitt, and A. Mahanti, "Traffic Classification Using Clustering Algorithms", in ACM SIGCOMM 2006, Aug 2006.

Bibliography Details

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core", in World Wide Web (WWW) Conference 2007, May 2007.

Bibliography Details

J. Erman, A. Manhanti, M. Arlitt, I. Cohen, and C. Williamson, "Offline/realitme Traffic Classification Using Semi-supervised Learning", in Perform Eval 2007, Nov 2007.

Bibliography Details

C. Estan, S. Savage, and G. Vargheses, "Automatically Inferring Patterns of Resources Consumption in Network Traffic", in ACM SIGCOMM 2003, Aug 2003.

Bibliography Details

C. Estan, K. Keys, D. Moore, and G. Varghese, "Building a Better NetFlow", in ACM SIGCOMM, Sept 2004.

Bibliography Details

J. Fan, J. Xu, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", Computer Networks, 2004.

Bibliography Details

N. Feamster, D.~G. Andersen, H. Balakrishnan, and M.~F. Kaashoek, "Measuring the Effects of Internet Path Faults on Reactive Routing", in ACM SIGMETRICS, Jun 2003.

Bibliography Details

D. Feldman, Y. Shavitt, and N. Zilberman, "A structural approach for PoP geo-location", Computer Networks, vol. 56, no. 3, pp. 1029-1040, Feb 2012.

Bibliography Details

M. Fomenkov, K. Keys, D. Moore, and k. claffy, "Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites", Tech. rep., CAIDA, Apr 2003.

Bibliography Details

C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, and T. Seely, "Packet-level Traffic Measurements from the Sprint IP Backbone", in IEEE Network 2003, Jun 2003.

Bibliography Details

J. Franklin, A. Perrig, V. Paxson, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants", in ACM Conference on Computer and Communications Security (CCS), 2007.

Bibliography Details

M.~J. Freedman, M. Vutukuru, N. Feamster, and H. Balakrishnan, "Geographic Locality of IP Prefixes", in Internet Measurement Conference (IMC), Berkeley, CA, USA, 2005, p. 13, USENIX Association.

Bibliography Details

L. Gao, "On inferring autonomous system relationships in the Internet", in IEEE Global Internet Symposium, nov 2000.

Bibliography Details

P. Gill, Y. Ganjali, and B. Wong, "Dude, where’s that IP? Circumventing measurement-based IP geolocation", in Usenix Security Symposium, Aug 2010.

Bibliography Details

E. Giovannetti and C.~A. Ristuccia, "Estimating Market Power in the Internet Backbone Using Band-X data" June 2003.

Bibliography Details

T. Griffin and G. Wilfong, "Analysis of the MED Oscillation Problem in BGP", in IEEE International Conference on Network Protocols (ICNP), 2002.

Bibliography Details

T. Griffin and G. Wilfong, "On the Correctness of IBGP Configuration", in ACM SIGCOMM, 2002.

Bibliography Details

T.~G. Griffin, "What is the Sound of One Route Flapping?" July 2002.

Bibliography Details

N. Groschwitz and G. Polyzos, "A Time-Series Model of Long-Term Traffic on the NSFNET Backbone", in IEEE International Conference on Communications (ICC), May 1994.

Bibliography Details

B. Gueye, A. Ziviani, M. Crovella, and S. Fdida, "Constraint-based Geolocation of Internet Hosts", IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 288-293, 2004.

Bibliography Details

B. Gueye, S. Uhlig, A. Ziviani, and S. Fdida, "Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts" 2006.

Bibliography Details

B. Gueye, S. Uhlig, and S. Fdida, "Investigating the Imprecision of IP Block-based Geolocation", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2007, pp. 237-240, Springer-Verlag.

Bibliography Details

C. Guo, Y. Liu, W. Shen, H.J. Wang, Q. Yu, and Y. Zhang, "Mining the Web and the Internet for Accurate IP Address Geolocations", in IEEE Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009, pp. 2841-2845, IEEE Computer Society.

Bibliography Details

P. Haffner, S. Sen, O. Spatscheck, and D. Wang, "Acas: Automated Construction of Application Signatures", in ACM SIGCOMM 2005, Aug 2005.

Bibliography Details

M. Harvan and J. Schonwalder, "Prefix- and Lexicographical-order-preserving IP Address Anonymization", IEEE/IFIP Network Operations and Management Symposium (NOMS), 2006.

Bibliography Details

E. Hoffman and k. claffy, "Address administration in IPv6", in 1996 IEEE Symposium on Information Visualization, Oct 1996.

Bibliography Details

E. Hoffman and k. claffy, "Geographic addressing reconsidered", 1996.

Bibliography Details

B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in gps traces via uncertainty-aware path cloaking", in ACM Conference on Computer and Communications Security (CCS), 2007.

Bibliography Details

F. Holzhauer, "IP Geolocation", Internet Measurement seminar, Jul 2007.

Bibliography Details

Z. Hu, J. Heidemann, and Y. Pradkin, "Towards geolocation of millions of IP addresses", pp. 123-130, Nov 2012.

Bibliography Details

B. Huffaker, M. Fomenkov, D. Moore, E. Nemeth, and k. claffy, "Measurements of the Internet topology in the Asia-Pacific Region", in International Networking Conference (INET) ‘00, July 2000.

Bibliography Details

B. Huffaker, D. Plummer, D. Moore, and k. claffy, "Topology discovery by active probing", in Symposium on Applications and the Internet (SAINT), Jan 2002.

Bibliography Details

B. Huffaker, M. Fomenkov, and kc claffy, "Geocompare: a comparison of public and commercial geolocation databases", Tech. rep., CAIDA, May 2011.

Bibliography Details

B. Huffaker, J. Jung, E. Nemeth, D. Wessels, and k. claffy, "Visualization of the growth and topology of the NLANR caching hierarchy", in 3rd International WWW Caching Workshop, Jun 1998.

Bibliography Details

B. Huffaker, E. Nemeth, and k. claffy, "Otter: A general-purpose network visualization tool", in International Networking Conference (INET) ‘99, Jun 1999.

Bibliography Details

B. Huffaker, k. claffy, and E. Nemeth, "Tools to visualize the Internet multicast backbone", in International Networking Conference (INET) ‘99, Jun 1999.

Bibliography Details

A. Hussain, G. Bartlett, Y. Pryadkin, J. Heidemann, C. Papadopoulos, and J. Bannister, "Experiences with a continuous network tracing infrastructure", in ACM SIGCOMM MineNet, 2005.

Bibliography Details

G. Huston, "Analyzing the Internet’s BGP Routing Table", The Internet Protocol Journal, vol. 4, no. 1, Mar 2001.

Bibliography Details

G. Huston, "Commentary on Inter-Domain Routing in the Internet, RFC 3221" Dec 2001.

Bibliography Details

Y. Hyun, A. Broido, and k. claffy, "Traceroute and BGP AS Path Incongruities", Tech. rep., CAIDA, Mar 2003.

Bibliography Details

Y. Hyun, A. Broido, and k. claffy, "On Third-party Addresses in Traceroute Paths", in Passive and Active Measurement Conference (PAM), Apr 2003.

Bibliography Details

G. Iannaccone, C. Chuah, R. Mortier, S. Bhattacharyya, and C. Diot, "Analysis of link failures in an IP backbone", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Bibliography Details

M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese, "Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation", Tech. rep., University of California, Riverside, 2007.

Bibliography Details

M. Iliofotou, P. Pappu, and M. Faloutsos, "Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs", in Tech Report 2008, Jun 2008.

Bibliography Details

R. Johari and J. Tsitsiklis, "Routing and Peering in a Competitive Internet" January 2003.

Bibliography Details

W. John and S. Tafvelin, "Analysis of Internet Backbone Traffic and Header Anomalies Observed", in ACM SIGCOMM IMC, Oct 2007.

Bibliography Details

W. John and S. Tafvelin, "Heuristics to Classify Internet Backbone Traffic based on Connection Patterns", in International Conference on Information Networking (ICOIN), Sept 2008.

Bibliography Details

W. John, S. Tafvelin, and T. Olovsson, "Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic", in Passive and Active Measurement Conference (PAM), Mar 2008.

Bibliography Details

T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, "A Nonstationary Poisson View of Internet Traffic", in IEEE INFOCOM. March 2004, IEEE INFOCOM.

Bibliography Details

T. Karagiannis, A. Broido, N. Brownless, K. Claffy, and M. Faloutsos, "Is P2P Dying or Just Hiding", in IEEE GLOBECOM, Nov 2004.

Bibliography Details

T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy, "Transport Layer Identification of P2p Traffic", in ACM SIGCOMM 2004, Aug 2004.

Bibliography Details

T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC Multilevel Traffic Classification in the Dark", in ACM SIGCOMM 2005, Aug 2005.

Bibliography Details

T. Karagiannis, K. Papgiannaki, N. Taft, and M. Faloutso, "Profiling the End Host", in Passive and Active Measurement Conference (PAM), Apr 2007.

Bibliography Details

E. Katz-Bassett, J.~P. John, A. Krishnamurthy, D. Wetherall, T. Anderson, and Y. Chawathe, "Towards IP geolocation using delay and topology measurements", in Internet Measurement Conference (IMC), New York, NY, USA, 2006, pp. 71-84, ACM.

Bibliography Details

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

Bibliography Details

K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and k. claffy, "The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite", in Passive and Active Measurement Conference (PAM), Apr 2001.

Bibliography Details

H. Kim, K. Claffy, M. Fomenkova, N. Browlee, D. Barman, and M. Faloutsos, "Comparison of Internet Traffic Classification Tools", in IMRG WACI 2007, Oct 2007.

Bibliography Details

D. Koukis, S. Antonatos, D. Antoniades, E.P. Markatos, and P. Trimintzios, "A Generic Anonymization Framework for Network Traffic", in IEEE International Conference on Communications (ICC), jun 2006.

Bibliography Details

D. Koukis, S. Antonatos, and K.G. Anagnostakis, "On the Privacy Risks of Publishing Anonymized IP Network Traces.", in Communications and Multimedia Security, 2006.

Bibliography Details

C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, "An Experimental Study of Internet Routing Convergence", Tech. Rep. MSR-TR-2000-08, Microsoft Research, 2000.

Bibliography Details

C. Labovitz, A. Ahuja, R. Wattenhofer, and V. Srinivasan, "The Impact of Internet Policy and Topology on Delayed Routing Convergence", in IEEE INFOCOM, Apr 2001, pp. 537-546.

Bibliography Details

C. Labovitz, A. Ahuja, and F. Jahanian, "Experimental Study of Internet Stability and Wide-Area Backbone Failures", Tech. Rep. CSE-TR-382-98, University of Michigan, 1998.

Bibliography Details

C. Labovitz, G.~R. Malan, and F. Jahanian, "Internet Routing Instability", IEEE/ACM Transactions on Networking, vol. 6, no. 5, pp. 515-528, 1998.

Bibliography Details

C. Labovitz, G.~R. Malan, and F. Jahanian, "Origins of Internet Routing Instability", in IEEE INFOCOM, Mar 1999.

Bibliography Details

A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distributions", in ACM SIGCOMM 2005, Aug 2005.

Bibliography Details

A. Lakhina, J.W. Byers, M. Crovella, and I. Matta, "On the geographic location of Internet resources", in Selected Areas in Communications, Volume 21, Aug 2003, pp. 934-948.

Bibliography Details

S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay, "A Model Based Approach for Improving Router Geolocation", Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 54, no. 9, pp. 1490-1501, 2010.

Bibliography Details

S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, and G. Vattay, "Spotter: A Model Based Active Geolocation Service", in INFOCOM, Apr 2011.

Bibliography Details

A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srirvastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection", in SIAM 2003, May 2003.

Bibliography Details

Y. Li, Adam Slagell, K. Luo, and W. Yurcik, "CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security", in International Conference on Telecommunication Systems, Modeling and Analysis, nov 2005.

Bibliography Details

N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity", in IEEE International Conference on Data Engineering (ICDE), 2007.

Bibliography Details

P. Lincoln, P. Porras, and V. Shmatikov, "Privacy-Preserving Sharing and Correlation of Security Alerts", in USENIX Security Symposium, 2004.

Bibliography Details

T. Lindh and N. Brownlee, "Integrating Active Methods and Flow Meters - an implementation using NeTraMet", in Passive and Active Measurement Conference (PAM) 2003, Apr 2003.

Bibliography Details

K. Luo, Y. Li, A. Slagell, and W. Yurcik, "CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing", in FLOCON - Network Flow Analysis Workshop, sep 2005.

Bibliography Details

K. Luo, Y. Li, C. Ermopoulos, W. Yurcik, and A. Slagell, "Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting", Tech. rep., ACM Computing Research Repository (CoRR), jan 2006.

Bibliography Details

J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. Voelker, "Unexpected Means of Protocol Inference", in ACM SIGCOMM IMC, Oct 2006.

Bibliography Details

A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-Diversity: Privacy Beyond k-Anonymity.", in IEEE International Conference on Data Engineering (ICDE), 2006.

Bibliography Details

A. Madhukar and C. Williamson, "A Longitudinal Study of P2P Traffic Classification", in MASCOTS 2006, Sep 2006.

Bibliography Details

H.V. Madhyasth, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani, "iPlane Nano: path prediction for peer-to-peer applications", pp. 137-152, Apr 2009.

Bibliography Details

R. Mahajan, D. Wetherall, and T. Anderson, "Understanding BGP Misconfiguration", in ACM SIGCOMM, 2002.

Bibliography Details

G. Maier, A. Feldmann, V. Paxson, and M. Allman, "On Dominant Characteristics of Residential Broadband Internet Traffic", in ACM SIGCOMM IMC, Nov 2009.

Bibliography Details

Z. Mao, R. Govindan, G. Varghese, and R.~H. Katz, "Route Flap Damping Exacerbates Internet Routing Convergence", in ACM SIGCOMM, Aug 2002.

Bibliography Details

Z. Mao, J. Rexford, J. Wang, and R.~H. Katz, "Towards an Accurate AS-Level Traceroute Tool", in ACM SIGCOMM, August 2003.

Bibliography Details

Z. Mao, D. Johnson, J. Rexford, J. Wang, and R. Katz, "Scalable and Accurate Identification of AS-level Forwarding Paths", in IEEE INFOCOM, March 2004.

Bibliography Details

M. Mathis, G. Huntoon, and k. claffy, "Traffic dynamics testbed", in Large Scale Networking (LSN) Workshop, Mar 2001.

Bibliography Details

H. Maziku, K. Shetty, S.~Han, and T. Rogers, "Enhancing the classification accuracy of IP geolocation", pp. 1-6, Oct 2012.

Bibliography Details

S. McCreary and k. claffy, "Trends in wide area IP traffic patterns - A view from Ames Internet Exchange", in ITC Specialist Seminar, Sep 2000.

Bibliography Details

A. McGregor, M. Hall, Brunskill J., and Lorier P., "Flow Clustering Using Machine Learning Techniques", in Passive and Active Measurement Conference (PAM), Apr 2004.

Bibliography Details

J. Merwe, S. Sen, and C. Kalmanek, "Streaming Video Traffic: Characterization and Network Impact", in WCW 2002, Aug 2002.

Bibliography Details

D. Mitchell, S. Bradner, and k. claffy, "In whose domain: name service in adolescence", Sept 1996.

Bibliography Details

J. Mogul and M. Arlitt, "SC2D: an alternative to trace anonymization", in ACM SIGCOMM MineNet, 2006.

Bibliography Details

T. Monk and k. claffy, "Cooperation in Internet data acquisition and analysis", Sept 1996.

Bibliography Details

T. Monk and k. claffy, "A survey of Internet statistics / metrics activities", Tech. rep., CAIDA, Jun 1996.

Bibliography Details

T. Monk and k. claffy, "Internet data acquisition and analysis: Status and next steps", Tech. rep., CAIDA, Mar 1997.

Bibliography Details

D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET) ‘00, Jul 2000.

Bibliography Details

D. Moore, K. Keys, R. Koga, E. Lagache, and k. claffy, "CoralReef software suite as a tool for system and network administrators", in USENIX LISA, Dec 2001.

Bibliography Details

D. Moore, G. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity", in USENIX Security Symposium, Aug 2001.

Bibliography Details

A. Moore and K Papagiannaki, "Toward the Accurate Identification of Network Applications", in Passive and Active Measurement Conference (PAM), Mar 2001.

Bibliography Details

D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop 2002, Nov 2002.

Bibliography Details

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm", IEEE Security and Privacy journal, Aug 2003.

Bibliography Details

D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, April 2003.

Bibliography Details

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire/Slammer Worm", Tech. rep., CAIDA, Jan 2003.

Bibliography Details

A. Moore, D. Zuev, and M. Crogan, "Discriminators for Use in Flow-based Classification", Tech. rep., Intel Research, Cambridge, 2005.

Bibliography Details

A. Moore and Zuev D., "Internet Traffic Classification Using Bayesian Analysis Techniques", in ACM SIGMETRICS 2005, Jun 2005.

Bibliography Details

D. Moore, R. Periakaruppan, J. Donohoe, and k. claffy, "Where in the world is netgeo.caida.org?", in International Networking Conference (INET), Yokohama, Japan, 18-21 Jul 2000, The Internet Society.

Bibliography Details

D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm", in ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov 2002, ACM SIGCOMM/USENIX Internet Measurement Workshop.

Bibliography Details

D. Moore, C. Shannon, G.~M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code", in IEEE INFOCOM, San Francisco, CA, April 2003, IEEE INFOCOM.

Bibliography Details

J. Muir and P.~C. van Oorschot, "Internet Geolocation: Evasion and Counterevasion", ACM Computing Surveys, vol. 42, no. 1, 2009.

Bibliography Details

T. Munzner, E. Hoffman, k. claffy, and B. Fenner, "Visualizing the global topology of the MBone", in IEEE Symposium on Information Visualization, Oct 1996.

Bibliography Details

M. Murray and k. claffy, "Measuring the Immeasurable: Global Internet Measurement Infrastructure", in Passive and Active Measurement Conference (PAM), Apr 2001.

Bibliography Details

D. Moore, G.~M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity", in USENIX Security Symposium, Washington, D.C., Aug 2001.

Bibliography Details

E. Nemeth, T. Ott, K. Thompson, and k. claffy, "The Internet Engineering Curriculum Repository", in International Networking Conference (INET) ‘00, Jul 2000.

Bibliography Details

L. Neudorfer, Y. Shavitt, and N. Zilberman, "Improving AS relationship inference using PoPs", pp. 459-464, Apr 2013.

Bibliography Details

D. Newman, "Internet Core Router Test" Mar 2001.

Bibliography Details

T.~S.~E. Ng and H. Zhang, "Predicting Internet Network Distance with Coordinates-Based Approaches", in IEEE Conference on Computer Communications (INFOCOM), 2001, pp. 170-179.

Bibliography Details

Nguyen T. and G. Armitage, "A Survey of Techniques for Internet Traffic Classification Using Machine Learning", in IEEE Communications Surveys and Tutorials 2008, Oct 2008.

Bibliography Details

NLANR, "Redesign and extension of multi-agency interconnection point", Tech. rep., CAIDA, Jun 1992.

Bibliography Details

W.~B. Norton, "The Evolution of the U.S. Internet Peering Ecosystem" 2004.

Bibliography Details

W.~B. Norton, "Internet Service Providers and Peering" 2001.

Bibliography Details

NSF Workshop, "Report of NSF Workshop on Network Research Testbeds" Oct 2002.

Bibliography Details

L. Overlier, T. Brekne, and A. Arnes, "Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring.", in CANS, 2005.

Bibliography Details

M. O’Dell, "GSE - An Alternate Addressing Architecture for IPv6" 1997.

Bibliography Details

J. Padhye and S. Floyd, "Identifying the TCP Behavior of Web Servers", in ACM SIGCOMM, 2001.

Bibliography Details

V.~N. Padmanabhan and L. Subramanian, "An Investigation of Geographic Mapping Techniques for Internet Hosts", in SIGCOMM, New York, NY, USA, 2001, pp. 173-185, ACM.

Bibliography Details

R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization", ACM SIGCOMM Computer Communication Review, 2006.

Bibliography Details

J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall, "802.11 user fingerprinting", in ACM MobiCom, 2007.

Bibliography Details

R. Pang and V. Paxson, "A high-level programming environment for packet trace anonymization and transformation", in ACM SIGCOMM, 2003.

Bibliography Details

B. Park, Y. Won, and J. Kim, M.~Hong, "Towards Automated Application Signature Generation", in IEEE/IFIP Network Operations and Management Symposium (NOMS), Apr 2008.

Bibliography Details

V. Paxson, "End-to-end routing behavior in the Internet", IEEE/ACM Transactions on Networking, vol. 5, no. 5, pp. 601-615, 1997.

Bibliography Details

D. Pei, X. Zhao, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang, "Improving BGP Convergence Through Consistency Assertions", in IEEE INFOCOM, New York, NY, Jun 2002.

Bibliography Details

R. Percacci and A. Vespignani, "Scale-free behavior of the Internet global performance", European Physical Journal B, vol. 32, pp. 411-414, 2003.

Bibliography Details

M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer", in Systems and Computers in Japan 2008, Mar 2008.

Bibliography Details

M. Perenyi, T. Dang, A. Gefferth, and S. Monlnar, "Identification and Analysis of Peer-to-Peer Traffic", in Journal of Communications 2006, Mar 2006.

Bibliography Details

R. Periakaruppan and E. Nemeth, "GTrace - A Graphical Traceroute Tool", in Usenix LISA, Berkeley, CA, US, 1999, pp. 69-78, USENIX Association.

Bibliography Details

R. Periakaruppan and E. Nemeth, "GTrace - A Graphical Traceroute Tool", in USENIX LISA, Nov 1999.

Bibliography Details

A. Pfitzmann and M. Hansen, "Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology" February 2008.

Bibliography Details

M. Pietrzyk, J.-L. Costeux, G. Urvoy-Keller, and T. En-Najjary, "Challenging Statistical Classification for Operational Usage: the ADSL Case", in ACM SIGCOMM IMC, Nov 2009.

Bibliography Details

L. Plissonneau, J. Costeux, and P. Brown, "Analysis of Peer-to-Peer Traffic on ADSL", in Passive and Active Measurement Conference (PAM), Mar 2005.

Bibliography Details

I. Poese, S. Uhlig, M.A. Kaafar, B. Donnet, and B. Gueye, "IP geolocation databases: unreliable?", ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 53-56, Apr 2011.

Bibliography Details

P. Porras and V. Shmatikov, "Large-scale collection and sanitization of network security data: risks and challenges", in New Security Paradigms Workshop (NSPW), 2006.

Bibliography Details

P. Rajvaidya, K. Almeroth, and k. claffy, "A scalable architecture for monitoring and visualizing multicast statistics", in Distributed Systems: Operations and Management, Dec 2000.

Bibliography Details

R. Ramaswamy and T. Wolf, "High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement Systems", IEEE/ACM Transactions on Networking, jan 2007.

Bibliography Details

A. Rasti, N. Magharei, R. Rejaie, and W. Willinger, "Eyeball ASes: From Geography to Conectivity", in Internet Measurement Conference (IMC), Nov 2010, pp. 192-198.

Bibliography Details

Y. Rekhter and B. Chinoy, "Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysis", Jan 1992.

Bibliography Details

J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, "BGP Routing Stability of Popular Destinations", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Bibliography Details

B. Ribeiro, W. Chen, G. Miklau, and D. Towsley, "Analyzing Privacy in Enterprise Packet Trace Anonymization", Tech. Rep. 48-07, UMass Amherst, September 2007.

Bibliography Details

M. Roesch, "Snort Lightweight Intrusion Detection for Networks", in USENIX LISA 1999, Nov 1999.

Bibliography Details

S. Roughan, O. Sen, and N. Duffield, "Class-of-service Mapping for QoS", in ACM SIGCOMM IMC, Oct 2004.

Bibliography Details

P. Samarati and L. Sweeney, "Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression", Tech. rep., Computer Science Laboratory, (SRI) International, 1998.

Bibliography Details

V. Seeberg and S. Petrovic, "A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking", in ARES, 2007.

Bibliography Details

S. Sen, O. Spatscheck, and D. Wang, "Accurate Scalable In-Network Identification of P2P Traffic", in World Wide Web (WWW) Conference, May 2004.

Bibliography Details

S. Sen and J. Wang, "Analyzing Peer-to-Peer Traffic across Large Networks", in IEEE/ACM Transactions on Networking 2004, Oct 2004.

Bibliography Details

A. Serjantov and G. Danezis, "Towards an Information Theoretic Metric for Anonymity", in Privacy Enhancing Technologies, 2002.

Bibliography Details

C. Shannon, D. Moore, and k. claffy, "Beyond Folklore: Observations on Fragmented Traffic", IEEE/ACM Transactions on Networking, Dec 2002.

Bibliography Details

Y. Shavitt and N. Zilberman, "A Study of Geolocation Databases", arXiv cs.NI/1005.5674v3, May 2010.

Bibliography Details

D. Sicker, P. Ohm, and D. Grunwald, "Legal issues surrounding monitoring during network research", in ACM SIGCOMM IMC, 2007.

Bibliography Details

G. Siganos and M. Faloutsos, "Analyzing BGP Policies: Methodology and Tool", in IEEE INFOCOM, March 2004.

Bibliography Details

S.~S. Siwpersad, B. Gueye, and S. Uhlig, "Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts", in Passive and Active Network Measurement Workshop (PAM), Berlin, Heidelberg, 2008, pp. 11-20, Springer-Verlag.

Bibliography Details

A. Slagell, K. Lakkaraju, and K. Luo, "FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs", in USENIX LISA, dec 2006.

Bibliography Details

A. Slagell and W. Yurcik, "Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization", Security and Privacy for Emerging Areas in Communication Networks, sep 2005.

Bibliography Details

C. Shannon, D. Moore, and k. claffy, "Characteristics of fragmented IP traffic on Internet links", in Passive and Active Measurement Conference (PAM), Amsterdam, Netherlands, Apr 2001, RIPE NCC.

Bibliography Details

C. Shannon, D. Moore, and k. claffy, "Characteristics of Fragmented Traffic on Internet Links", in ACM SIGCOMM Internet Measurement Workshop 2001. Nov 2001, ACM SIGCOMM.

Bibliography Details

C. Shannon, D. Moore, and k. claffy, "Beyond Folklore: Observations on Fragmented Traffic", IEEE/ACM Transactions on Networking, Dec 2002.

Bibliography Details

A. Soule, K. Salamatian, N. Taft, R. Emilion, and K. Papagiannaki, "Flow Classification by Histograms or How to Go on Safari in the Internet", in ACM SIGMETRICS 2004, Jun 2004.

Bibliography Details

D. Spring, R. Mahajan, and D. Wetherall, "Measuring ISP Topologies with Rocketfuel", in ACM SIGCOMM, Aug 2002.

Bibliography Details

L. Subramanian, S. Agarwal, J. Rexford, and R. Katz, "Characterizing the Internet Hierarchy from Multiple Vantage Points", in IEEE INFOCOM, Jun 2002.

Bibliography Details

G. Szabo, I. Szabo, and D. Orincasy, "Accurate Traffic Classification", in WoWMoM 2007, Jun 2007.

Bibliography Details

G. Szabo, D. Orincasy, S. Malomsoky, and I. Szabo, "On the Validation of Traffic Classification Algorithms", in Passive and Active Measurement Conference (PAM), Apr 2008.

Bibliography Details

G. Tan, M. Poletto, J. Guttag, and F. Kaashoek, "Role Classification of Hosts within Enterprise Networks based on Connection Patterns", in USENIX 2003, Jun 2003.

Bibliography Details

L. Tang and M. Crovella, "Virtual Landmarks for the Internet", in Internet Measurement Conference (IMC), Oct 2003, pp. 143-152.

Bibliography Details

G. Minshall, "TCPdPriv" 2005.

Bibliography Details

Y. Tian, R. Dey, Y. Liu, and K.W. Ross, "Topology mapping and geolocating for China’s Internet", IEEE Trans. On Parallel and Distributed Systems, vol. 24, no. 9, pp. 1908-1917, Sep 2013.

Bibliography Details

S. Ubik, P. Zejdl, and J. Halak, "Real-time anonymization in passive network monitoring", in International Conference on Networking and Services (ICNS), 2007.

Bibliography Details

H. Uijterwaal, "First analysis of the Beacon data" Nov 2002.

Bibliography Details

P. Verkaik, A. Broido, k. claffy, R. Gao, Y. Hyun, and R. van~der Pol, "Beyond CIDR Aggregation", Tech. rep., CAIDA, Feb 2004.

Bibliography Details

L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S.~F. Wu, and L. Zhang, "Observation and Analysis of BGP Behavior Under Stress", in ACM SIGCOMM Internet Measurement Workshop, Nov 2002.

Bibliography Details

Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang, "Towards Street-Level Client-Independent IP Geolocation", in Usenix, Mar 2011.

Bibliography Details

D. Wessels, M. Fomenkov, and k. claffy, "Wow, That’s a lot of packets", in Passive and Active Measurement Conference (PAM) 2003, Apr 2003.

Bibliography Details

D. Wessels, M. Fomenkov, N. Brownlee, and k. claffy, "Measurements and Laboratory Simulations of the Upper DNS Hierarchy", in Passive and Active Measurement Conference (PAM). Apr 2004, Passive and Active Measurement Conference (PAM).

Bibliography Details

D. Wessels and k. claffy, "Evolution of the NLANR cache hierarchy: Global configuration challenges", Tech. rep., CAIDA, Nov 1996.

Bibliography Details

D. Wessels and k. claffy, "Can WWW caches help to save the Internet?", in Coordination and Administration of the Internet Workshop, Sep 1996.

Bibliography Details

D. Wessels and k. claffy, "RFC 2186: Internet Cache Protocol (ICP), version 2" Sept 1997.

Bibliography Details

D. Wessels and k. claffy, "RFC 2187: Application of Internet Cache Protocol (ICP), version 2" Sept 1997.

Bibliography Details

D. Wessels and k. claffy, "ICP and the Squid web cache", Mar 1998.

Bibliography Details

N. Williams, S. Zander, and G. Armitage, "A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification", in ACM SIGCOMM 2006, Aug 2006.

Bibliography Details

B. Wong, I. Stoyanov, and E. Gun~Sirer, "Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts", in Symposium on Networked System Design and Implementation (NSDI), Cambridge, MA, USA, Apr 2007.

Bibliography Details

C. Wright, F. Monrose, and G. Masson, "On Inferring Application Protocol Behaviors in Encrypted Network Traffic", in Journal of Machine Learning Research 2006, Dec 2006.

Bibliography Details

K. Xu, Z. Zhang, and S. Bhattacharyya, "Profiling Internet Backbone Traffic: Behavior Models and Applications", in ACM SIGCOMM 2005, Aug 2004.

Bibliography Details

J. Xu, J. Fan, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme", IEEE International Conference on Network Protocols (ICNP), nov 2002.

Bibliography Details

D. Xu and P. Ning, "A Flexible Approach to Intrusion Alert Anonymization and Correlation", Securecomm and Workshops, aug 2006.

Bibliography Details

J. Xu, J. Fan, M. Ammar, and S. Moon, "On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization", in ACM SIGCOMM IMC, 2001.

Bibliography Details

I. Youn, B.~L. Mark, and D. Richards, "Statistical geolocation of Internet hosts", International Conference on Computer Communications and Networks (ICCCN), vol. 0, pp. 1-6, 2009.

Bibliography Details

W. Yurcik, C. Woolam, G. Hellings, L. Khan, and B. Thuraisingham, "Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs", ACM Computing Research Repository (CoRR), 2007.

Bibliography Details

S. Zander, T. Nguyen, and G. Armitage, "Self-learning IP Traffic Classification based on Statistical Flow Characteristics", in Passive and Active Measurement Conference (PAM), Mar 2005.

Bibliography Details

J. Zhang, N. Borisov, and W. Yurcik, "Outsourcing Security Analysis with Anonymized Logs", Securecomm and Workshops, aug 2006.

Bibliography Details

Qianli Zhang and Xing Li, "An IP Address Anonymization Scheme with Multiple Access Levels", in ICOIN, 2006.

Bibliography Details

E. Zheleva and L. Getoor, "Preserving the Privacy of Sensitive Relationships in Graph Data", in ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD), 2007.

Bibliography Details

A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Demographic placement for Internet host location", in GLOBECOM, Dec 2003.

Bibliography Details

A. Ziviani, S. Fdida, J.F. de Rezende, and O.C.M.B. Duarte, "Similarity models for Internet host location", in ICON, Sep 2003.

Bibliography Details

A. Ziviani, S. Fdida, J.~F. de Rezende, O. Carlos, and M.~B. Duarte, "Toward a measurement-based geographic location service", in Passive and Active Network Measurement Workshop (PAM), 2004, pp. 43-52.

Bibliography Details

A. Ziviani, S. Fdida, J.~F. de Rezende, and O.~C. M.~B. Duarte, "Improving the accuracy of measurement-based geographic location of internet hosts", Computer Networks and ISDN Systems, vol. 47, no. 4, pp. 503-523, 2005.

Bibliography Details

Zuev D. and Moore A., "Traffic Classification using a Statistical Approach", in Passive and Active Measurement Conference (PAM), Mar 2005.

Published
Last Modified