The contents of this legacy page are no longer maintained nor supported, and are made available only for historical purposes.
Annotated Bibliography of Networking Papers
An annotated bibliography of papers and presentations in the wide-area networking literature.
This collection is not actively maintained and is incomplete. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for more recent papers.
Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.
2013
| Year | Author(s) | Title | Publication |
|
2013
|
R. Dey Y. Liu K.W. Ross |
Topology mapping and geolocating for China's Internet | IEEE Trans. On Parallel and Distributed Systems |
|
2013
|
F. Orucevic A. Tanovic |
Using Whois based geolocation and Google maps API for support cybercrime investigations | Recent Advances in Telecommunications and Circuits |
|
2013
|
Y. Shavitt N. Zilberman |
Improving AS relationship inference using PoPs | Traffic Monitoring and Analysis Workshop (TMA) |
2012
| Year | Author(s) | Title | Publication |
|
2012
|
J. Heidemann Y. Pradkin |
Towards geolocation of millions of IP addresses | Proc. ACM Internet measurement conference (IMC) |
|
2012
|
S. Han, K. Shetty T. Rogers |
Enhancing the classification accuracy of IP geolocation | Military Communications Conf. (MILCOM) |
|
2012
|
P. Barford B. Maggs R. Nowak |
Posit: a lightweight approach for IP geolocation | ACM SIGMETRICS Performance Evaluation Review |
|
2012
|
Y. Shavitt N. Zilberman |
A structural approach for PoP geo-location | Computer Networks |
|
2012
|
R.D.W. Perera R. Chandramouli K.P. Subbalakshmi |
Network measurement based modeling and optimization for IP geolocation | Computer Networks |
2011
| Year | Author(s) | Title | Publication |
|
2011
|
M. Fomenkov kc claffy |
Geocompare: a comparison of public and commercial geolocation databases | CAIDA |
|
2011
|
S. Uhlig M.A. Kaafar B. Donnet B. Gueye |
IP geolocation databases: unreliable? | ACM SIGCOMM Computer Communication Review |
|
2011
|
P. Matray P. Haga T. Sebok I. Csabai G. Vattay |
Spotter: A Model Based Active Geolocation Service | INFOCOM |
|
2011
|
D. Burgener M. Flores A. Kuzmanovic C. Huang |
Towards Street-Level Client-Independent IP Geolocation | Usenix |
2010
| Year | Author(s) | Title | Publication |
|
2010
|
P. Matray P. Haga I. Csabai G. Vattay |
A Model Based Approach for Improving Router Geolocation | Computer Networks: The International Journal of Computer and Telecommunications Networking |
|
2010
|
S. Karunasekera S. Kulkarni |
GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements | Australasian Conference on Computer Science (ASCS) |
|
2010
|
S. Karunasekera S. Kulkarni A. Gunatilaka B. Ristic |
Internet Host Geolocation Using Maximum Likelihood Estimation Technique | IEEE International Conference on Advanced Information Networking and Applications (AINA) |
|
2010
|
N. Magharei R. Rejaie W. Willinger |
Eyeball ASes: From Geography to Conectivity | Internet Measurement Conference (IMC) |
|
2010
|
Y. Ganjali B. Wong |
Dude, where's that IP? Circumventing measurement-based IP geolocation | Usenix Security Symposium |
|
2010
|
N. Zilberman |
A Study of Geolocation Databases | arXiv cs.NI/.5674v3 |
|
2010
|
P. Barford J. Sommers R. Nowak |
A Learning-Based Approach for IP Geolocation | PAM, LNCS Volume |
|
2010
|
D. Sadok |
Whois based geolocation: A strategy to geolocate Internet hosts | Advanced Information Networking and Applications (AINA) |
2009
| Year | Author(s) | Title | Publication |
|
2009
|
B. L. Mark D. Richards |
Statistical geolocation of Internet hosts | International Conference on Computer Communications and Networks (ICCCN) |
|
2009
|
P. C. van Oorschot |
Internet Geolocation: Evasion and Counterevasion | ACM Computing Surveys |
|
2009
|
Y. Liu W. Shen H.J. Wang Q. Yu Y. Zhang |
Mining the Web and the Internet for Accurate IP Address Geolocations | IEEE Conference on Computer Communications (INFOCOM) |
|
2009
|
W. de Donato A. Pescape G. Ventre |
TIE: a Community-oriented Traffic Classification Platform | International Workshop on Traffic Monitoring and Analysis (TMA) |
|
2009
|
M.A. Kaafar P. Manils D. Perito |
Geolocalization of proxied services and its application to fast-flux hidden servers | IMC |
|
2009
|
J.-L. Costeux G. Urvoy-Keller T. En-Najjary |
Challenging Statistical Classification for Operational Usage: the ADSL Case | ACM SIGCOMM IMC |
|
2009
|
A. Feldmann V. Paxson M. Allman |
On Dominant Characteristics of Residential Broadband Internet Traffic | ACM SIGCOMM IMC |
|
2009
|
J.R. Lorch |
Matchmaking for online games and other latency-sensitive P2P systems | Computer Communication Review |
|
2009
|
E. Katz-Bassett T. Anderson A. Krishnamurthy A. Venkataramani |
iPlane Nano: path prediction for peer-to-peer applications | Proc. USENIX symp. on Networked systems design and implementation (NSDI) |
2008
| Year | Author(s) | Title | Publication |
|
2008
|
B. Gueye S. Uhlig |
Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts | Passive and Active Network Measurement Workshop (PAM) |
|
2008
|
W. de Donato A. Pescape P. Salvo Rossi |
Classification of Network Traffic via Packet-Level Hidden Markov Models | IEEE GLOBECOM |
|
2008
|
Conducting Cybersecurity Research Legally and Ethically | LEET | |
|
2008
|
Toward a Culture of Cybersecurity Research | University of California, Berkeley | |
|
2008
|
K. Fukuda H. Esaki A. Kato |
Observing Slow Crustal Movement in Residential User Traffic | ACM CoNEXT |
|
2008
|
J. Alvarez-Hamelin J. Busch |
A low complexity visualization tool that helps to perform complex systems analysis | New Journal of Physics |
|
2008
|
G. Armitage |
A Survey of Techniques for Internet Traffic Classification Using Machine Learning | IEEE Communications Surveys and Tutorials |
|
2008
|
S. Tafvelin |
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns | International Conference on Information Networking (ICOIN) |
|
2008
|
M. Crotti F. Gringoli L. Salgarelli |
Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting | Computer Networks |
|
2008
|
P. Pappu M. Faloutsos |
Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs | Tech Report |
|
2008
|
F. Gringoli L. Salgarelli |
A Preliminary Look at the Privacy of SSH Tunnels | IEEE International Conference on Communications (ICC) |
|
2008
|
D. Orincasy S. Malomsoky I. Szabo |
On the Validation of Traffic Classification Algorithms | Passive and Active Measurement Conference (PAM) |
|
2008
|
Y. Won M. Hong, J. Kim |
Towards Automated Application Signature Generation | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
|
2008
|
T. Dang A. Gefferth S. Monlnar |
Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer | Systems and Computers in Japan |
|
2008
|
S. Tafvelin T. Olovsson |
Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic | Passive and Active Measurement Conference (PAM) |
|
2008
|
M. Hansen |
Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology | Tech Report |
|
2008
|
C. Wright F. Monrose A. Keromytis M. Reiter |
Taming the Devil: Techniques for Evaluating Anonymized Network Data | NDSS |
2007
| Year | Author(s) | Title | Publication |
|
2007
|
L. Getoor |
Preserving the Privacy of Sensitive Relationships in Graph Data | ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD) |
|
2007
|
C. Woolam G. Hellings L. Khan B. Thuraisingham |
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs | ACM Computing Research Repository (CoRR) |
|
2007
|
P. Zejdl J. Halak |
Real-time anonymization in passive network monitoring | International Conference on Networking and Services (ICNS) |
|
2007
|
P. Ohm D. Grunwald |
Legal issues surrounding monitoring during network research | ACM SIGCOMM IMC |
|
2007
|
S. Petrovic |
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking | ARES |
|
2007
|
B. Greenstein R. Gummadi S. Seshan D. Wetherall |
802.11 user fingerprinting | ACM MobiCom |
|
2007
|
T. Li S. Venkatasubramanian |
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity | IEEE International Conference on Data Engineering (ICDE) |
|
2007
|
P. Pappu M. Faloutsos M. Mitzenmacher S. Singh G. Varghese |
Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation | University of California, Riverside |
|
2007
|
M. Gruteser H. Xiong A. Alrabady |
Preserving privacy in gps traces via uncertainty-aware path cloaking | ACM Conference on Computer and Communications Security (CCS) |
|
2007
|
S. Uhlig S. Fdida |
Investigating the Imprecision of IP Block-based Geolocation | Passive and Active Network Measurement Workshop (PAM) |
|
2007
|
A. Perrig V. Paxson S. Savage |
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | ACM Conference on Computer and Communications Security (CCS) |
|
2007
|
M. Bishop B. Bhumiratana L. Clark K. Levitt |
Sanitization models and their limitations | New Security Paradigms Workshop (NSPW) |
|
2007
|
J. Heidemann C. Papadopoulos J. Pepin |
Estimating P2P Traffic Volume at USC | USC/Information Sciences Institute |
|
2007
|
V. Paxson |
Issues and etiquette concerning use of shared measurement data | ACM SIGCOMM IMC |
|
2007
|
P.S. Yu |
On Anonymization of String Data | SDM |
|
2007
|
A. Manhanti M. Arlitt I. Cohen C. Williamson |
Offline/realitme Traffic Classification Using Semi-supervised Learning | Perform Eval |
|
2007
|
K. Claffy M. Fomenkova N. Browlee D. Barman M. Faloutsos |
Comparison of Internet Traffic Classification Tools | IMRG WACI |
|
2007
|
S. Tafvelin |
Analysis of Internet Backbone Traffic and Header Anomalies Observed | ACM SIGCOMM IMC |
|
2007
|
W. Chen G. Miklau D. Towsley |
Analyzing Privacy in Enterprise Packet Trace Anonymization | UMass Amherst |
|
2007
|
M. Reiter |
Hit-list worm detection and bot identification in large networks using protocol graphs | RAID |
|
2007
|
M. Dusi F. Gringoli L. Salgarelli |
Traffic Classification through Simple Statistical Fingerprinting | ACM SIGCOMM |
|
2007
|
M. Mellia M. Meo D. Rossi P. Tofanelli |
Revealing Skype Traffic: when randomness plays with you | ACM SIGCOMM |
|
2007
|
IP Geolocation | Internet Measurement seminar | |
|
2007
|
I. Szabo D. Orincasy |
Accurate Traffic Classification | WoWMoM |
|
2007
|
A. Manhanti M. Arlitt I. Cohen C. Williamson |
Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core | World Wide Web (WWW) Conference |
|
2007
|
J. Heidemann C. Papadopoulos |
Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing | IEEE Global Internet Symposium |
|
2007
|
I. Stoyanov E. Gun Sirer |
Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts | Symposium on Networked System Design and Implementation (NSDI) |
|
2007
|
K. Papgiannaki N. Taft M. Faloutso |
Profiling the End Host | Passive and Active Measurement Conference (PAM) |
|
2007
|
R. Teixeira |
Early Recognition of Encrypted Application | Passive and Active Measurement Conference (PAM) |
|
2007
|
C. Wright F. Monrose M. Collins M. Reiter |
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces | NDSS |
|
2007
|
T. Wolf |
High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement Systems | IEEE/ACM Transactions on Networking |
2006
| Year | Author(s) | Title | Publication |
|
2006
|
Xing Li |
An IP Address Anonymization Scheme with Multiple Access Levels | ICOIN |
|
2006
|
V. Shmatikov |
Large-scale collection and sanitization of network security data: risks and challenges | New Security Paradigms Workshop (NSPW) |
|
2006
|
M. Allman V. Paxson J. Lee |
The devil and packet trace anonymization | ACM SIGCOMM Computer Communication Review |
|
2006
|
M. Arlitt |
SC2D: an alternative to trace anonymization | ACM SIGCOMM MineNet |
|
2006
|
J. Gehrke D. Kifer M. Venkitasubramaniam |
l-Diversity: Privacy Beyond k-Anonymity. | IEEE International Conference on Data Engineering (ICDE) |
|
2006
|
S. Antonatos K.G. Anagnostakis |
On the Privacy Risks of Publishing Anonymized IP Network Traces. | Communications and Multimedia Security |
|
2006
|
J. P. John A. Krishnamurthy D. Wetherall T. Anderson Y. Chawathe |
Towards IP geolocation using delay and topology measurements | Internet Measurement Conference (IMC) |
|
2006
|
J. Schonwalder |
Prefix- and Lexicographical-order-preserving IP Address Anonymization | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
|
2006
|
S. Uhlig A. Ziviani S. Fdida |
Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts | International Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference |
|
2006
|
Googling Considering Harmful | New Security Paradigms Workshop (NSPW) | |
|
2006
|
R. Crawford B. Bhumiratana L. Clark K. Levitt |
Some Problems in Sanitizing Network Data | IEEE WETICE |
|
2006
|
F. Monrose G. Masson |
On Inferring Application Protocol Behaviors in Encrypted Network Traffic | Journal of Machine Learning Research |
|
2006
|
K. Lakkaraju K. Luo |
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs | USENIX LISA |
|
2006
|
M. Polychronakis S. Antonatos E. Markatos S. Ubik |
Appmon: An Application for Accurate per Application Network Traffic Characterization | BroadBand Europe |
|
2006
|
A. Mahanti M. Arlitt |
Internet Traffic Identification using Machine Learning | IEEE GLOBECOM |
|
2006
|
K. Levchenko C. Kreibich S. Savage G. Voelker |
Unexpected Means of Protocol Inference | ACM SIGCOMM IMC |
|
2006
|
R. Teixeira . Akodjenou A. Soule K. Salamatian |
Traffic Classification on the fly | ACM SIGCOMM Computer Communication Review |
|
2006
|
C. Williamson |
A Longitudinal Study of P2P Traffic Classification | MASCOTS |
|
2006
|
N. Borisov W. Yurcik |
Outsourcing Security Analysis with Anonymized Logs | Securecomm and Workshops |
|
2006
|
P. Ning |
A Flexible Approach to Intrusion Alert Anonymization and Correlation | Securecomm and Workshops |
|
2006
|
S. Zander G. Armitage |
A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification | ACM SIGCOMM |
|
2006
|
M. Arlitt A. Mahanti |
Traffic Classification Using Clustering Algorithms | ACM SIGCOMM |
|
2006
|
P. Mavrommatiss |
Identifying Known and Unknown Peer-to-Peer Traffic | IEEE NCA |
|
2006
|
R. Teixeira K. Salamatian |
Early Application Identification | ACM CoNEXT |
|
2006
|
S. Antonatos D. Antoniades E.P. Markatos P. Trimintzios |
A Generic Anonymization Framework for Network Traffic | IEEE International Conference on Communications (ICC) |
|
2006
|
T. Dang A. Gefferth S. Monlnar |
Identification and Analysis of Peer-to-Peer Traffic | Journal of Communications |
|
2006
|
Y. Li C. Ermopoulos W. Yurcik A. Slagell |
Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting | Tech Report |
2005
| Year | Author(s) | Title | Publication |
|
2005
|
S. Fdida J. F. de Rezende O. C. M. B. Duarte |
Improving the accuracy of measurement-based geographic location of internet hosts | Computer Networks and ISDN Systems |
|
2005
|
Thoughts on how to mount an attack on tcpdpriv's '-a50' option | Tech Report | |
|
2005
|
T. Brekne A. Arnes |
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. | CANS |
|
2005
|
D. Zuev M. Crogan |
Discriminators for Use in Flow-based Classification | Intel Research, Cambridge |
|
2005
|
TCPdPriv | Tech Report | |
|
2005
|
G. Bartlett Y. Pryadkin J. Heidemann C. Papadopoulos J. Bannister |
Experiences with a continuous network tracing infrastructure | ACM SIGCOMM MineNet |
|
2005
|
M. Vutukuru N. Feamster H. Balakrishnan |
Geographic Locality of IP Prefixes | Internet Measurement Conference (IMC) |
|
2005
|
A. Arnes A. Oslebo |
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies. | Privacy Enhancing Technologies |
|
2005
|
A. Soule M. Jeannin K. Salamatian |
Blind Application Recognition Through Behavioral Classification | Paris |
|
2005
|
Adam Slagell K. Luo W. Yurcik |
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security | International Conference on Telecommunication Systems, Modeling and Analysis |
|
2005
|
Chang F. Chi Feng W. Walpole J. |
A Traffic Characterization of Popular on-line Games | IEEE/ACM Transactions on Networking |
|
2005
|
W. Yurcik |
Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization | Security and Privacy for Emerging Areas in Communication Networks |
|
2005
|
Y. Li A. Slagell W. Yurcik |
CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing | FLOCON - Network Flow Analysis Workshop |
|
2005
|
M. Crovella C. Diot |
Mining Anomalies Using Traffic Feature Distributions | ACM SIGCOMM |
|
2005
|
K. Papagiannaki M. Faloutsos |
BLINC Multilevel Traffic Classification in the Dark | ACM SIGCOMM |
|
2005
|
S. Sen O. Spatscheck D. Wang |
Acas: Automated Construction of Application Signatures | ACM SIGCOMM |
|
2005
|
Zuev D. |
Internet Traffic Classification Using Bayesian Analysis Techniques | ACM SIGMETRICS |
|
2005
|
T. Nguyen G. Armitage |
Self-learning IP Traffic Classification based on Statistical Flow Characteristics | Passive and Active Measurement Conference (PAM) |
|
2005
|
J. Costeux P. Brown |
Analysis of Peer-to-Peer Traffic on ADSL | Passive and Active Measurement Conference (PAM) |
|
2005
|
Moore A. |
Traffic Classification using a Statistical Approach | Passive and Active Measurement Conference (PAM) |
2004
| Year | Author(s) | Title | Publication |
|
2004
|
S. Fdida J. F. de Rezende O. Carlos M. B. Duarte |
Toward a measurement-based geographic location service | Passive and Active Network Measurement Workshop (PAM) |
|
2004
|
The Evolution of the U.S. Internet Peering Ecosystem | Equinix White Papers | |
|
2004
|
P. Porras V. Shmatikov |
Privacy-Preserving Sharing and Correlation of Security Alerts | USENIX Security Symposium |
|
2004
|
A. Ziviani M. Crovella S. Fdida |
Constraint-based Geolocation of Internet Hosts | IEEE/ACM Transactions on Networking |
|
2004
|
J. Xu M. Ammar S. Moon |
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | Computer Networks |
|
2004
|
A. Broido N. Brownless K. Claffy M. Faloutsos |
Is P2P Dying or Just Hiding | IEEE GLOBECOM |
|
2004
|
J. Wang |
Analyzing Peer-to-Peer Traffic across Large Networks | IEEE/ACM Transactions on Networking |
|
2004
|
O. Sen N. Duffield |
Class-of-service Mapping for QoS | ACM SIGCOMM IMC |
|
2004
|
K. Keys D. Moore G. Varghese |
Building a Better NetFlow | ACM SIGCOMM |
|
2004
|
Z. Zhang S. Bhattacharyya |
Profiling Internet Backbone Traffic: Behavior Models and Applications | ACM SIGCOMM |
|
2004
|
A. Broido M. Faloutsos K. Claffy |
Transport Layer Identification of P2p Traffic | ACM SIGCOMM |
|
2004
|
R. Cox F. Kaashoek R. Morris |
Vivaldi: A Decentralized Network Coordinate System | SIGCOMM |
|
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
|
2004
|
K. Salamatian N. Taft R. Emilion K. Papagiannaki |
Flow Classification by Histograms or How to Go on Safari in the Internet | ACM SIGMETRICS |
|
2004
|
O. Spatscheck D. Wang |
Accurate Scalable In-Network Identification of P2P Traffic | World Wide Web (WWW) Conference |
|
2004
|
M. Fomenkov N. Brownlee k. claffy |
Measurements and Laboratory Simulations of the Upper DNS Hierarchy | Passive and Active Measurement Conference (PAM) |
|
2004
|
M. Hall Brunskill J. Lorier P. |
Flow Clustering Using Machine Learning Techniques | Passive and Active Measurement Conference (PAM) |
|
2004
|
Y. Hyun R. Gao k. claffy |
Their share: diversity and disparity in IP traffic | Passive and Active Measurement Conference (PAM) |
|
2004
|
M. Faloutsos |
Analyzing BGP Policies: Methodology and Tool | IEEE INFOCOM |
|
2004
|
D. Johnson J. Rexford J. Wang R. Katz |
Scalable and Accurate Identification of AS-level Forwarding Paths | IEEE INFOCOM |
|
2004
|
M. Molle M. Faloutsos A. Broido |
A Nonstationary Poisson View of Internet Traffic | IEEE INFOCOM |
|
2004
|
A. Broido k. claffy R. Gao Y. Hyun R. van der Pol |
Beyond CIDR Aggregation | CAIDA |
2003
| Year | Author(s) | Title | Publication |
|
2003
|
A. Vespignani |
Scale-free behavior of the Internet global performance | European Physical Journal B |
|
2003
|
V. Paxson |
A high-level programming environment for packet trace anonymization and transformation | ACM SIGCOMM |
|
2003
|
S. Fdida J.F. de Rezende O.C.M.B. Duarte |
Demographic placement for Internet host location | GLOBECOM |
|
2003
|
R. Prasad M. Murray k. claffy |
Bandwidth estimation: metrics, measurement techniques, and tools | IEEE Network |
|
2003
|
M. Crovella |
Virtual Landmarks for the Internet | Internet Measurement Conference (IMC) |
|
2003
|
S. Fdida J.F. de Rezende O.C.M.B. Duarte |
Similarity models for Internet host location | ICON |
|
2003
|
V. Paxson S. Savage C. Shannon S. Staniford N. Weaver |
Inside the Slammer Worm | IEEE Security and Privacy journal |
|
2003
|
J. Rexford J. Wang R. H. Katz |
Towards an Accurate AS-Level Traceroute Tool | ACM SIGCOMM |
|
2003
|
J.W. Byers M. Crovella I. Matta |
On the geographic location of Internet resources | Selected Areas in Communications, Volume 21 |
|
2003
|
S. Savage G. Vargheses |
Automatically Inferring Patterns of Resources Consumption in Network Traffic | ACM SIGCOMM |
|
2003
|
A. Wichmann A. Feldmann |
An Analysis of Internet Chat Systems | ACM SIGCOMM |
|
2003
|
S. Jamin W. Willinger |
Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach | ACM SIGCOMM Workshop on MoMeTools |
|
2003
|
M. Poletto J. Guttag F. Kaashoek |
Role Classification of Hosts within Enterprise Networks based on Connection Patterns | USENIX |
|
2003
|
C. A. Ristuccia |
Estimating Market Power in the Internet Backbone Using Band-X data | Cambridge Working Papers in Economics |
|
2003
|
S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely |
Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
|
2003
|
D. G. Andersen H. Balakrishnan M. F. Kaashoek |
Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
|
2003
|
E. Nemeth k. claffy |
Spectroscopy of DNS Update Traffic | ACM SIGMETRICS |
|
2003
|
E. Nemeth k. claffy |
Spectroscopy of Private DNS Update Sources | IEEE Workshop on Internet Applications (WIAPP) |
|
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
|
2003
|
L. Ertoz V. Kumar A. Ozgur J. Srirvastava |
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection | SIAM |
|
2003
|
M. Fomenkov k. claffy |
Wow, That's a lot of packets | Passive and Active Measurement Conference (PAM) |
|
2003
|
C. Shannon G. Voelker S. Savage |
Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
|
2003
|
C. Shannon G. M. Voelker S. Savage |
Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
|
2003
|
N. Brownlee |
Integrating Active Methods and Flow Meters - an implementation using NeTraMet | Passive and Active Measurement Conference (PAM) |
|
2003
|
A. Broido k. claffy |
On Third-party Addresses in Traceroute Paths | Passive and Active Measurement Conference (PAM) |
|
2003
|
K. Keys D. Moore k. claffy |
Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites | CAIDA |
|
2003
|
B. Huffaker M. Fomenkov k. claffy |
On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
|
2003
|
A. Broido k. claffy |
Traceroute and BGP AS Path Incongruities | CAIDA |
|
2003
|
R. King E. Nemeth k. claffy |
Radon Spectroscopy of Inter-Packet Delay | IEEE High-Speeding Networking Workshop (HSN) |
|
2003
|
V. Paxson S. Savage C. Shannon S. Staniford N. Weaver |
The Spread of the Sapphire/Slammer Worm | CAIDA |
|
2003
|
J. Tsitsiklis |
Routing and Peering in a Competitive Internet | MIT |
|
2003
|
k. claffy |
Wide-Area IP Multicast Traffic Characterization | IEEE Network |
2002
| Year | Author(s) | Title | Publication |
|
2002
|
G. Danezis |
Towards an Information Theoretic Metric for Anonymity | Privacy Enhancing Technologies |
|
2002
|
D. Wetherall T. Anderson |
Understanding BGP Misconfiguration | ACM SIGCOMM |
|
2002
|
G. Wilfong |
On the Correctness of IBGP Configuration | ACM SIGCOMM |
|
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
|
2002
|
B. Seys J. Claessenss B. Preneel |
Towards Measuring Anonymity | Privacy Enhancing Technologies |
|
2002
|
D. Moore k. claffy |
Beyond Folklore: Observations on Fragmented Traffic | IEEE/ACM Transactions on Networking |
|
2002
|
D. Moore k. claffy |
Beyond Folklore: Observations on Fragmented Traffic | IEEE/ACM Transactions on Networking |
|
2002
|
J. Fan M. Ammar S. Moon |
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | IEEE International Conference on Network Protocols (ICNP) |
|
2002
|
X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang |
Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
First analysis of the Beacon data | IEPG meeting, Atlanta, GA | |
|
2002
|
J. Wang Z. Xiao Y. Zhang |
BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
C. Shannon J. Brown |
Code-Red: a case study on the spread and victims of an Internet worm | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
C. Shannon J. Brown |
Code-Red: a case study on the spread and victims of an Internet worm | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
C. Chuah R. Mortier S. Bhattacharyya C. Diot |
Analysis of link failures in an IP backbone | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
N. Feamster S. Bauer H. Balakrishnan |
Topology Inference from BGP Routing Dynamics | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
O. Ben-Shalom A. Bremler-Barr |
On the Structure and Application of BGP Policy Atoms | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
Report of NSF Workshop on Network Research Testbeds | NSF Workshop | |
|
2002
|
M. Fomenkov D. J. Plummer D. Moore k. claffy |
Distance Metrics in the Internet | IEEE International Telecommunications Symposium |
|
2002
|
R. Mahajan D. Wetherall |
Measuring ISP Topologies with Rocketfuel | ACM SIGCOMM |
|
2002
|
S. Sen C. Kalmanek |
Streaming Video Traffic: Characterization and Network Impact | WCW |
|
2002
|
R. Govindan G. Varghese R. H. Katz |
Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
|
2002
|
What is the Sound of One Route Flapping? | Dartmouth Summer Workshop | |
|
2002
|
k. claffy |
Understanding Internet Traffic Streams: Dragonflies and Tortoises | CAIDA |
|
2002
|
S. Agarwal J. Rexford R. Katz |
Characterizing the Internet Hierarchy from Multiple Vantage Points | IEEE INFOCOM |
|
2002
|
X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang |
Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
|
2002
|
Enhancing the Security of Name Resolution and Inter-Domain Internet Routing | ISP BGPDNS WG | |
|
2002
|
I. Ziedins |
Response time distributions for global name servers | Passive and Active Measurement Conference (PAM) |
|
2002
|
D. Plummer D. Moore k. claffy |
Topology discovery by active probing | Symposium on Applications and the Internet (SAINT) |
|
2002
|
k. claffy E. Nemeth |
Internet Expansion, Refinement, and Churn | European Transactions on Telecommunications |
2001
| Year | Author(s) | Title | Publication |
|
2001
|
J. Fan M. Ammar S. Moon |
On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization | ACM SIGCOMM IMC |
|
2001
|
L. Subramanian |
An Investigation of Geographic Mapping Techniques for Internet Hosts | SIGCOMM |
|
2001
|
S. Floyd |
Identifying the TCP Behavior of Web Servers | ACM SIGCOMM |
|
2001
|
Internet Service Providers and Peering | Equinix White Papers | |
|
2001
|
H. Zhang |
Predicting Internet Network Distance with Coordinates-Based Approaches | IEEE Conference on Computer Communications (INFOCOM) |
|
2001
|
K. Keys R. Koga E. Lagache k. claffy |
CoralReef software suite as a tool for system and network administrators | USENIX LISA |
|
2001
|
Commentary on Inter-Domain Routing in the Internet, RFC 3221 | The Internet Society | |
|
2001
|
k. claffy B. Huffaker D. Moore |
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
|
2001
|
R. Govindan J. Heidemann |
An Empirical Study of Router Response to Large BGP Routing Table Load | USC/Information Sciences Institute |
|
2001
|
k. claffy E. Nemeth |
DNS Root/gTLD Performance Measurements | USENIX LISA |
|
2001
|
D. Moore k. claffy |
Characteristics of Fragmented Traffic on Internet Links | ACM SIGCOMM Internet Measurement Workshop |
|
2001
|
k. claffy E. Nemeth |
DNS Measurements at a Root Server | IEEE GLOBECOM |
|
2001
|
G. Voelker S. Savage |
Inferring Internet Denial-of-Service Activity | USENIX Security Symposium |
|
2001
|
G. M. Voelker S. Savage |
Inferring Internet Denial-of-Service Activity | USENIX Security Symposium |
|
2001
|
k. claffy |
Internet topology: connectivity of IP graphs | SPIE International symposium on Convergence of IT and Communication |
|
2001
|
P. Ramanathan D. Moore |
Packet Dispersion Techniques and Capacity Estimation | CAIDA |
|
2001
|
k. claffy |
Complexity of global routing policies | CAIDA |
|
2001
|
Using NeTraMet for Production Traffic Measurement | Integrated Management Strategies for the New Millenium | |
|
2001
|
k. claffy |
Analysis of RouteViews BGP data: policy atoms | Network Resource Data Management Workshop |
|
2001
|
D. Moore k. claffy |
Characteristics of fragmented IP traffic on Internet links | Passive and Active Measurement Conference (PAM) |
|
2001
|
k. claffy |
Measuring the Immeasurable: Global Internet Measurement Infrastructure | Passive and Active Measurement Conference (PAM) |
|
2001
|
A. Ahuja R. Wattenhofer V. Srinivasan |
The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
|
2001
|
D. Moore R. Koga E. Lagache M. Tesch k. claffy |
The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
|
2001
|
D. Moore R. Koga E. Lagache M. Tesch k. claffy |
The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
|
2001
|
M. Fomenkov D. Moore k. claffy |
Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance | Passive and Active Measurement Conference (PAM) |
|
2001
|
M. Murray |
Streams, Flows and Torrents | Passive and Active Measurement Conference (PAM) |
|
2001
|
k. claffy M. Murray E. Nemeth |
Methodology for passive analysis of a university Internet link | Passive and Active Measurement Conference (PAM) |
|
2001
|
Internet Core Router Test | Light Reading | |
|
2001
|
K Papagiannaki |
Toward the Accurate Identification of Network Applications | Passive and Active Measurement Conference (PAM) |
|
2001
|
G. Huntoon k. claffy |
Traffic dynamics testbed | Large Scale Networking (LSN) Workshop |
|
2001
|
Analyzing the Internet's BGP Routing Table | The Internet Protocol Journal | |
|
2001
|
P. Ramanathan D. Moore |
What do packet dispersion techniques measure? | IEEE INFOCOM |
|
2001
|
CAIDA: Visualizing the Internet | CAIDA |
2000
| Year | Author(s) | Title | Publication |
|
2000
|
A. Ahuja A. Bose F. Jahanian |
An Experimental Study of Internet Routing Convergence | Microsoft Research |
|
2000
|
K. Almeroth k. claffy |
A scalable architecture for monitoring and visualizing multicast statistics | Distributed Systems: Operations and Management |
|
2000
|
ISMA Winter 2000 Workshop - Final Report | Internet Statistics and Metrics Analysis (ISMA) | |
|
2000
|
On inferring autonomous system relationships in the Internet | IEEE Global Internet Symposium | |
|
2000
|
k. claffy |
Trends in wide area IP traffic patterns - A view from Ames Internet Exchange | ITC Specialist Seminar |
|
2000
|
R. Fulton |
Kawaihiko and the third-quartile day [traffic management] | CAIDA |
|
2000
|
T. Ott K. Thompson k. claffy |
The Internet Engineering Curriculum Repository | International Networking Conference (INET) |
|
2000
|
R. Periakaruppan J. Donohoe k. claffy |
Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
|
2000
|
M. Fomenkov D. Moore E. Nemeth k. claffy |
Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
|
2000
|
M. Fomenkov D. Moore E. Nemeth k. claffy |
Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
|
2000
|
R. Periakaruppan J. Donohoe k. claffy |
Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
|
2000
|
Measuring the Internet | CAIDA |
1999
| Year | Author(s) | Title | Publication |
|
1999
|
E. Nemeth |
GTrace - A Graphical Traceroute Tool | Usenix LISA |
|
1999
|
A. Bremler-Barr S. Har-Peled |
Routing with a Clue | ACM SIGCOMM |
|
1999
|
Snort Lightweight Intrusion Detection for Networks | USENIX LISA | |
|
1999
|
E. Nemeth |
GTrace - A Graphical Traceroute Tool | USENIX LISA |
|
1999
|
S. McCreary |
Internet measurement and data analysis: passive and active measurement | American Statistical Association |
|
1999
|
E. Nemeth k. claffy |
Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
|
1999
|
E. Nemeth k. claffy |
Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
|
1999
|
k. claffy E. Nemeth |
Tools to visualize the Internet multicast backbone | International Networking Conference (INET) |
|
1999
|
k. claffy E. Nemeth |
Tools to Visualize the Internet Multicast Backbone | International Networking Conference (INET) |
|
1999
|
Report from the ISMA Network Visualization Workshop | Internet Statistics and Metrics Analysis (ISMA) | |
|
1999
|
G. R. Malan F. Jahanian |
Origins of Internet Routing Instability | IEEE INFOCOM |
|
1999
|
Internet measurement and data analysis: topology, workload, performance and routing statistics | NAE Workshop | |
|
1999
|
T. Monk D. McRobb |
Internet Tomography | CAIDA |
|
1999
|
ISMA passive measurement data and analysis, workshop report | Internet Statistics and Metrics Analysis (ISMA) |
1998
1997
| Year | Author(s) | Title | Publication |
|
1997
|
End-to-end routing behavior in the Internet | IEEE/ACM Transactions on Networking | |
|
1997
|
GSE - An Alternate Addressing Architecture for IPv6 | INTERNET DRAFT | |
|
1997
|
T. Monk |
What's next for Internet data analysis? Status and challenges facing the community | CAIDA |
|
1997
|
k. claffy |
RFC 2187: Application of Internet Cache Protocol (ICP), version 2 | CAIDA |
|
1997
|
k. claffy |
RFC 2186: Internet Cache Protocol (ICP), version 2 | CAIDA |
|
1997
|
k. claffy |
Internet data acquisition and analysis: Status and next steps | CAIDA |
1996
| Year | Author(s) | Title | Publication |
|
1996
|
k. claffy |
Geographic addressing reconsidered | Coordination and Administration of the Internet Workshop |
|
1996
|
P. Vixie T. Goodwin I. Dickinson |
A Means for Expressing Location Information in the Domain Name System | RFC Editor |
|
1996
|
k. claffy |
Evolution of the NLANR cache hierarchy: Global configuration challenges | CAIDA |
|
1996
|
E. Hoffman k. claffy B. Fenner |
Visualizing the global topology of the MBone | IEEE Symposium on Information Visualization |
|
1996
|
k. claffy |
Address administration in IPv6 | IEEE Symposium on Information Visualization |
|
1996
|
Cooperative Association for Internet Data Analysis | CAIDA | |
|
1996
|
k. claffy |
Can WWW caches help to save the Internet? | Coordination and Administration of the Internet Workshop |
|
1996
|
k. claffy |
Cooperation in Internet data acquisition and analysis | Coordination and Administration of the Internet Workshop |
|
1996
|
S. Bradner k. claffy |
In whose domain: name service in adolescence | Coordination and Administration of the Internet Workshop |
|
1996
|
T. Salo |
Internet Exchanges: Policy-Driven Evolution | Coordination and Administration of the Internet Workshop |
|
1996
|
'But some data is worse than others': Measurement of the global Internet | CAIDA | |
|
1996
|
k. claffy |
A survey of Internet statistics / metrics activities | CAIDA |
1995
| Year | Author(s) | Title | Publication |
|
1995
|
H.-W. Braun |
Post-NSFNET statistics collection | International Networking Conference (INET) |
|
1995
|
A Gross H.-W. Braun |
Measured interference of security mechanisms with network performance | International Networking Conference (INET) |
|
1995
|
H.-W. Braun G. Polyzos |
A parameterizable methodology for Internet traffic flow profiling | CAIDA |
1994
| Year | Author(s) | Title | Publication |
|
1994
|
Internet traffic characterization. | University of California, San Diego | |
|
1994
|
H.-W. Braun k. claffy S. Wolff |
Mitigating the coming Internet crunch: multiple service levels via Precedence | CAIDA |
|
1994
|
k. claffy |
Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web server | World Wide Web (WWW) Conference |
|
1994
|
G. Polyzos |
A Time-Series Model of Long-Term Traffic on the NSFNET Backbone | IEEE International Conference on Communications (ICC) |
|
1994
|
B. Chinoy k. claffy |
Applied Network Research: 1994 annual status report | CAIDA |
|
1994
|
H.-W. Braun G. Polyzos |
Tracking long-term growth of the NSFNET | CAIDA |
|
1994
|
H.-W. Braun G. Polyzos |
Internet traffic flow profiling | CAIDA |
1993
| Year | Author(s) | Title | Publication |
|
1993
|
H.-W. Braun P. Ford |
NSF implementation plan for interim NREN | Journal on High Speed Networking |
|
1993
|
B. Chinoy k. claffy G. Polyzos |
1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
|
1993
|
H.-W. Braun G. Polyzos |
Measurement considerations for assessing unidirectional latencies | CAIDA |
|
1993
|
k. claffy G. Polyzos |
A framework for flow-based accounting on the Internet | IEEE Singapore International Conference on Networks (SICON'93) |
|
1993
|
H.-W. Braun G. Polyzos |
Long-term traffic aspects of the NSFNET | International Networking Conference (INET) |
|
1993
|
H.-W. Braun G. Polyzos |
Application of sampling methodologies to wide-area network traffic characterization | ACM SIGCOMM |
|
1993
|
P. Ford Y. Rekhter |
CIDR and the evolution of the Internet | International Networking Conference (INET) |
|
1993
|
k. claffy |
Network analysis issues for a public Internet | Public Access to the Internet, A Harvard JFK School Workshop |
|
1993
|
k. claffy |
Network analysis in support of Internet policy requirements | International Networking Conference (INET) |
|
1993
|
H.-W. Braun G. Polyzos |
Traffic characteristics of the T1 NSFNET backbone | IEEE INFOCOM |
1992
| Year | Author(s) | Title | Publication |
|
1992
|
B. Chinoy k. claffy G. Polyzos |
1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
|
1992
|
Dynamics of Internet routing information | CAIDA | |
|
1992
|
H.-W. Braun |
The National Science Foundation Network | CAIDA |
|
1992
|
Redesign and extension of multi-agency interconnection point | CAIDA | |
|
1992
|
B. Chinoy |
Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysis | CAIDA |
|
1992
|
k. claffy O. Nakamura J. Murai |
An analysis of international academic research network traffic between Japan and other nations | International Networking Conference (INET) |
Additional Content
Annotated Bibliography of Networking Papers
An annotated bibliography of papers and presentations in the wide-area networking literature. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for recent papers. Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.

