The contents of this legacy page are no longer maintained nor supported, and are made available only for historical purposes.
Annotated Bibliography of Networking Papers
An annotated bibliography of papers and presentations in the wide-area networking literature.
This collection is not actively maintained and is incomplete. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for more recent papers.
Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.
anonymization
| Year | Author(s) | Title | Publication |
|
2008
|
M. Hansen |
Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology | Tech Report |
|
2008
|
C. Wright F. Monrose A. Keromytis M. Reiter |
Taming the Devil: Techniques for Evaluating Anonymized Network Data | NDSS |
|
2007
|
L. Getoor |
Preserving the Privacy of Sensitive Relationships in Graph Data | ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD) |
|
2007
|
C. Woolam G. Hellings L. Khan B. Thuraisingham |
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs | ACM Computing Research Repository (CoRR) |
|
2007
|
P. Zejdl J. Halak |
Real-time anonymization in passive network monitoring | International Conference on Networking and Services (ICNS) |
|
2007
|
S. Petrovic |
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking | ARES |
|
2007
|
B. Greenstein R. Gummadi S. Seshan D. Wetherall |
802.11 user fingerprinting | ACM MobiCom |
|
2007
|
T. Li S. Venkatasubramanian |
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity | IEEE International Conference on Data Engineering (ICDE) |
|
2007
|
M. Gruteser H. Xiong A. Alrabady |
Preserving privacy in gps traces via uncertainty-aware path cloaking | ACM Conference on Computer and Communications Security (CCS) |
|
2007
|
M. Bishop B. Bhumiratana L. Clark K. Levitt |
Sanitization models and their limitations | New Security Paradigms Workshop (NSPW) |
|
2007
|
P.S. Yu |
On Anonymization of String Data | SDM |
|
2007
|
W. Chen G. Miklau D. Towsley |
Analyzing Privacy in Enterprise Packet Trace Anonymization | UMass Amherst |
|
2007
|
C. Wright F. Monrose M. Collins M. Reiter |
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces | NDSS |
|
2007
|
T. Wolf |
High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement Systems | IEEE/ACM Transactions on Networking |
|
2006
|
Xing Li |
An IP Address Anonymization Scheme with Multiple Access Levels | ICOIN |
|
2006
|
V. Shmatikov |
Large-scale collection and sanitization of network security data: risks and challenges | New Security Paradigms Workshop (NSPW) |
|
2006
|
M. Allman V. Paxson J. Lee |
The devil and packet trace anonymization | ACM SIGCOMM Computer Communication Review |
|
2006
|
M. Arlitt |
SC2D: an alternative to trace anonymization | ACM SIGCOMM MineNet |
|
2006
|
J. Gehrke D. Kifer M. Venkitasubramaniam |
l-Diversity: Privacy Beyond k-Anonymity. | IEEE International Conference on Data Engineering (ICDE) |
|
2006
|
S. Antonatos K.G. Anagnostakis |
On the Privacy Risks of Publishing Anonymized IP Network Traces. | Communications and Multimedia Security |
|
2006
|
J. Schonwalder |
Prefix- and Lexicographical-order-preserving IP Address Anonymization | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
|
2006
|
R. Crawford B. Bhumiratana L. Clark K. Levitt |
Some Problems in Sanitizing Network Data | IEEE WETICE |
|
2006
|
K. Lakkaraju K. Luo |
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs | USENIX LISA |
|
2006
|
N. Borisov W. Yurcik |
Outsourcing Security Analysis with Anonymized Logs | Securecomm and Workshops |
|
2006
|
P. Ning |
A Flexible Approach to Intrusion Alert Anonymization and Correlation | Securecomm and Workshops |
|
2006
|
S. Antonatos D. Antoniades E.P. Markatos P. Trimintzios |
A Generic Anonymization Framework for Network Traffic | IEEE International Conference on Communications (ICC) |
|
2006
|
Y. Li C. Ermopoulos W. Yurcik A. Slagell |
Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting | Tech Report |
|
2005
|
Thoughts on how to mount an attack on tcpdpriv's '-a50' option | Tech Report | |
|
2005
|
T. Brekne A. Arnes |
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. | CANS |
|
2005
|
TCPdPriv | Tech Report | |
|
2005
|
G. Bartlett Y. Pryadkin J. Heidemann C. Papadopoulos J. Bannister |
Experiences with a continuous network tracing infrastructure | ACM SIGCOMM MineNet |
|
2005
|
A. Arnes A. Oslebo |
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies. | Privacy Enhancing Technologies |
|
2005
|
Adam Slagell K. Luo W. Yurcik |
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security | International Conference on Telecommunication Systems, Modeling and Analysis |
|
2005
|
W. Yurcik |
Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization | Security and Privacy for Emerging Areas in Communication Networks |
|
2005
|
Y. Li A. Slagell W. Yurcik |
CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing | FLOCON - Network Flow Analysis Workshop |
|
2004
|
P. Porras V. Shmatikov |
Privacy-Preserving Sharing and Correlation of Security Alerts | USENIX Security Symposium |
|
2004
|
J. Xu M. Ammar S. Moon |
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | Computer Networks |
|
2003
|
V. Paxson |
A high-level programming environment for packet trace anonymization and transformation | ACM SIGCOMM |
|
2002
|
G. Danezis |
Towards an Information Theoretic Metric for Anonymity | Privacy Enhancing Technologies |
|
2002
|
B. Seys J. Claessenss B. Preneel |
Towards Measuring Anonymity | Privacy Enhancing Technologies |
|
2002
|
J. Fan M. Ammar S. Moon |
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | IEEE International Conference on Network Protocols (ICNP) |
|
1998
|
L. Sweeney |
Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression | Tech Report |
AS relationships
| Year | Author(s) | Title | Publication |
|
2004
|
The Evolution of the U.S. Internet Peering Ecosystem | Equinix White Papers | |
|
2004
|
M. Faloutsos |
Analyzing BGP Policies: Methodology and Tool | IEEE INFOCOM |
|
2003
|
S. Jamin W. Willinger |
Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach | ACM SIGCOMM Workshop on MoMeTools |
|
2003
|
C. A. Ristuccia |
Estimating Market Power in the Internet Backbone Using Band-X data | Cambridge Working Papers in Economics |
|
2003
|
J. Tsitsiklis |
Routing and Peering in a Competitive Internet | MIT |
|
2002
|
S. Agarwal J. Rexford R. Katz |
Characterizing the Internet Hierarchy from Multiple Vantage Points | IEEE INFOCOM |
|
2001
|
Internet Service Providers and Peering | Equinix White Papers | |
|
2000
|
On inferring autonomous system relationships in the Internet | IEEE Global Internet Symposium |
atoms
| Year | Author(s) | Title | Publication |
|
2002
|
O. Ben-Shalom A. Bremler-Barr |
On the Structure and Application of BGP Policy Atoms | ACM SIGCOMM Internet Measurement Workshop |
bandwidth estimation
| Year | Author(s) | Title | Publication |
|
2003
|
R. Prasad M. Murray k. claffy |
Bandwidth estimation: metrics, measurement techniques, and tools | IEEE Network |
|
2001
|
P. Ramanathan D. Moore |
Packet Dispersion Techniques and Capacity Estimation | CAIDA |
|
2001
|
P. Ramanathan D. Moore |
What do packet dispersion techniques measure? | IEEE INFOCOM |
BGP
| Year | Author(s) | Title | Publication |
|
2004
|
M. Faloutsos |
Analyzing BGP Policies: Methodology and Tool | IEEE INFOCOM |
|
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
|
2003
|
A. Broido k. claffy |
On Third-party Addresses in Traceroute Paths | Passive and Active Measurement Conference (PAM) |
|
2003
|
A. Broido k. claffy |
Traceroute and BGP AS Path Incongruities | CAIDA |
|
2002
|
D. Wetherall T. Anderson |
Understanding BGP Misconfiguration | ACM SIGCOMM |
|
2002
|
G. Wilfong |
On the Correctness of IBGP Configuration | ACM SIGCOMM |
|
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
|
2002
|
Enhancing the Security of Name Resolution and Inter-Domain Internet Routing | ISP BGPDNS WG | |
|
2000
|
On inferring autonomous system relationships in the Internet | IEEE Global Internet Symposium |
BGP beacons
| Year | Author(s) | Title | Publication |
|
2002
|
First analysis of the Beacon data | IEPG meeting, Atlanta, GA |
BGP configuration
| Year | Author(s) | Title | Publication |
|
2002
|
D. Wetherall T. Anderson |
Understanding BGP Misconfiguration | ACM SIGCOMM |
|
2002
|
G. Wilfong |
On the Correctness of IBGP Configuration | ACM SIGCOMM |
|
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
BGP convergence
| Year | Author(s) | Title | Publication |
|
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
|
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
|
2002
|
First analysis of the Beacon data | IEPG meeting, Atlanta, GA | |
|
2002
|
R. Govindan G. Varghese R. H. Katz |
Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
|
2002
|
What is the Sound of One Route Flapping? | Dartmouth Summer Workshop | |
|
2002
|
X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang |
Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
|
2001
|
A. Ahuja R. Wattenhofer V. Srinivasan |
The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
|
2000
|
A. Ahuja A. Bose F. Jahanian |
An Experimental Study of Internet Routing Convergence | Microsoft Research |
|
1999
|
G. R. Malan F. Jahanian |
Origins of Internet Routing Instability | IEEE INFOCOM |
|
1998
|
G. R. Malan F. Jahanian |
Internet Routing Instability | IEEE/ACM Transactions on Networking |
BGP routing table
| Year | Author(s) | Title | Publication |
|
2002
|
D. Wetherall T. Anderson |
Understanding BGP Misconfiguration | ACM SIGCOMM |
|
2001
|
Commentary on Inter-Domain Routing in the Internet, RFC 3221 | The Internet Society | |
|
2001
|
Analyzing the Internet's BGP Routing Table | The Internet Protocol Journal | |
|
1997
|
GSE - An Alternate Addressing Architecture for IPv6 | INTERNET DRAFT |
BGP updates
| Year | Author(s) | Title | Publication |
|
2002
|
X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang |
Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
First analysis of the Beacon data | IEPG meeting, Atlanta, GA | |
|
2002
|
J. Wang Z. Xiao Y. Zhang |
BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
N. Feamster S. Bauer H. Balakrishnan |
Topology Inference from BGP Routing Dynamics | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
What is the Sound of One Route Flapping? | Dartmouth Summer Workshop | |
|
2001
|
A. Ahuja R. Wattenhofer V. Srinivasan |
The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
|
2000
|
A. Ahuja A. Bose F. Jahanian |
An Experimental Study of Internet Routing Convergence | Microsoft Research |
|
1999
|
G. R. Malan F. Jahanian |
Origins of Internet Routing Instability | IEEE INFOCOM |
|
1998
|
A. Ahuja F. Jahanian |
Experimental Study of Internet Stability and Wide-Area Backbone Failures | University of Michigan |
|
1998
|
G. R. Malan F. Jahanian |
Internet Routing Instability | IEEE/ACM Transactions on Networking |
caching
| Year | Author(s) | Title | Publication |
|
2004
|
M. Fomenkov N. Brownlee k. claffy |
Measurements and Laboratory Simulations of the Upper DNS Hierarchy | Passive and Active Measurement Conference (PAM) |
|
1998
|
J. Jung E. Nemeth D. Wessels k. claffy |
Visualization of the growth and topology of the NLANR caching hierarchy | International WWW Caching Workshop |
|
1998
|
k. claffy |
ICP and the Squid web cache | CAIDA |
|
1997
|
k. claffy |
RFC 2187: Application of Internet Cache Protocol (ICP), version 2 | CAIDA |
|
1997
|
k. claffy |
RFC 2186: Internet Cache Protocol (ICP), version 2 | CAIDA |
|
1996
|
k. claffy |
Evolution of the NLANR cache hierarchy: Global configuration challenges | CAIDA |
|
1996
|
k. claffy |
Can WWW caches help to save the Internet? | Coordination and Administration of the Internet Workshop |
|
1994
|
k. claffy |
Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web server | World Wide Web (WWW) Conference |
delay measurement
| Year | Author(s) | Title | Publication |
|
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
distance
| Year | Author(s) | Title | Publication |
|
2002
|
M. Fomenkov D. J. Plummer D. Moore k. claffy |
Distance Metrics in the Internet | IEEE International Telecommunications Symposium |
dns
| Year | Author(s) | Title | Publication |
|
2004
|
M. Fomenkov N. Brownlee k. claffy |
Measurements and Laboratory Simulations of the Upper DNS Hierarchy | Passive and Active Measurement Conference (PAM) |
|
2003
|
E. Nemeth k. claffy |
Spectroscopy of DNS Update Traffic | ACM SIGMETRICS |
|
2003
|
E. Nemeth k. claffy |
Spectroscopy of Private DNS Update Sources | IEEE Workshop on Internet Applications (WIAPP) |
|
2003
|
M. Fomenkov k. claffy |
Wow, That's a lot of packets | Passive and Active Measurement Conference (PAM) |
|
2003
|
B. Huffaker M. Fomenkov k. claffy |
On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
|
2002
|
Enhancing the Security of Name Resolution and Inter-Domain Internet Routing | ISP BGPDNS WG | |
|
2002
|
I. Ziedins |
Response time distributions for global name servers | Passive and Active Measurement Conference (PAM) |
|
2001
|
k. claffy E. Nemeth |
DNS Root/gTLD Performance Measurements | USENIX LISA |
|
2001
|
k. claffy E. Nemeth |
DNS Measurements at a Root Server | IEEE GLOBECOM |
dns server
| Year | Author(s) | Title | Publication |
|
2001
|
k. claffy B. Huffaker D. Moore |
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
dual-stack
| Year | Author(s) | Title | Publication |
|
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
education
| Year | Author(s) | Title | Publication |
|
2000
|
T. Ott K. Thompson k. claffy |
The Internet Engineering Curriculum Repository | International Networking Conference (INET) |
geolocation
| Year | Author(s) | Title | Publication |
|
2013
|
R. Dey Y. Liu K.W. Ross |
Topology mapping and geolocating for China's Internet | IEEE Trans. On Parallel and Distributed Systems |
|
2013
|
F. Orucevic A. Tanovic |
Using Whois based geolocation and Google maps API for support cybercrime investigations | Recent Advances in Telecommunications and Circuits |
|
2013
|
Y. Shavitt N. Zilberman |
Improving AS relationship inference using PoPs | Traffic Monitoring and Analysis Workshop (TMA) |
|
2012
|
J. Heidemann Y. Pradkin |
Towards geolocation of millions of IP addresses | Proc. ACM Internet measurement conference (IMC) |
|
2012
|
S. Han, K. Shetty T. Rogers |
Enhancing the classification accuracy of IP geolocation | Military Communications Conf. (MILCOM) |
|
2012
|
P. Barford B. Maggs R. Nowak |
Posit: a lightweight approach for IP geolocation | ACM SIGMETRICS Performance Evaluation Review |
|
2012
|
Y. Shavitt N. Zilberman |
A structural approach for PoP geo-location | Computer Networks |
|
2012
|
R.D.W. Perera R. Chandramouli K.P. Subbalakshmi |
Network measurement based modeling and optimization for IP geolocation | Computer Networks |
|
2011
|
M. Fomenkov kc claffy |
Geocompare: a comparison of public and commercial geolocation databases | CAIDA |
|
2011
|
S. Uhlig M.A. Kaafar B. Donnet B. Gueye |
IP geolocation databases: unreliable? | ACM SIGCOMM Computer Communication Review |
|
2011
|
P. Matray P. Haga T. Sebok I. Csabai G. Vattay |
Spotter: A Model Based Active Geolocation Service | INFOCOM |
|
2011
|
D. Burgener M. Flores A. Kuzmanovic C. Huang |
Towards Street-Level Client-Independent IP Geolocation | Usenix |
|
2010
|
P. Matray P. Haga I. Csabai G. Vattay |
A Model Based Approach for Improving Router Geolocation | Computer Networks: The International Journal of Computer and Telecommunications Networking |
|
2010
|
S. Karunasekera S. Kulkarni |
GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements | Australasian Conference on Computer Science (ASCS) |
|
2010
|
S. Karunasekera S. Kulkarni A. Gunatilaka B. Ristic |
Internet Host Geolocation Using Maximum Likelihood Estimation Technique | IEEE International Conference on Advanced Information Networking and Applications (AINA) |
|
2010
|
N. Magharei R. Rejaie W. Willinger |
Eyeball ASes: From Geography to Conectivity | Internet Measurement Conference (IMC) |
|
2010
|
Y. Ganjali B. Wong |
Dude, where's that IP? Circumventing measurement-based IP geolocation | Usenix Security Symposium |
|
2010
|
N. Zilberman |
A Study of Geolocation Databases | arXiv cs.NI/.5674v3 |
|
2010
|
P. Barford J. Sommers R. Nowak |
A Learning-Based Approach for IP Geolocation | PAM, LNCS Volume |
|
2010
|
D. Sadok |
Whois based geolocation: A strategy to geolocate Internet hosts | Advanced Information Networking and Applications (AINA) |
|
2009
|
B. L. Mark D. Richards |
Statistical geolocation of Internet hosts | International Conference on Computer Communications and Networks (ICCCN) |
|
2009
|
P. C. van Oorschot |
Internet Geolocation: Evasion and Counterevasion | ACM Computing Surveys |
|
2009
|
Y. Liu W. Shen H.J. Wang Q. Yu Y. Zhang |
Mining the Web and the Internet for Accurate IP Address Geolocations | IEEE Conference on Computer Communications (INFOCOM) |
|
2009
|
M.A. Kaafar P. Manils D. Perito |
Geolocalization of proxied services and its application to fast-flux hidden servers | IMC |
|
2009
|
J.R. Lorch |
Matchmaking for online games and other latency-sensitive P2P systems | Computer Communication Review |
|
2009
|
E. Katz-Bassett T. Anderson A. Krishnamurthy A. Venkataramani |
iPlane Nano: path prediction for peer-to-peer applications | Proc. USENIX symp. on Networked systems design and implementation (NSDI) |
|
2008
|
B. Gueye S. Uhlig |
Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts | Passive and Active Network Measurement Workshop (PAM) |
|
2007
|
S. Uhlig S. Fdida |
Investigating the Imprecision of IP Block-based Geolocation | Passive and Active Network Measurement Workshop (PAM) |
|
2007
|
IP Geolocation | Internet Measurement seminar | |
|
2007
|
I. Stoyanov E. Gun Sirer |
Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts | Symposium on Networked System Design and Implementation (NSDI) |
|
2006
|
J. P. John A. Krishnamurthy D. Wetherall T. Anderson Y. Chawathe |
Towards IP geolocation using delay and topology measurements | Internet Measurement Conference (IMC) |
|
2006
|
S. Uhlig A. Ziviani S. Fdida |
Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts | International Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference |
|
2005
|
S. Fdida J. F. de Rezende O. C. M. B. Duarte |
Improving the accuracy of measurement-based geographic location of internet hosts | Computer Networks and ISDN Systems |
|
2005
|
M. Vutukuru N. Feamster H. Balakrishnan |
Geographic Locality of IP Prefixes | Internet Measurement Conference (IMC) |
|
2004
|
S. Fdida J. F. de Rezende O. Carlos M. B. Duarte |
Toward a measurement-based geographic location service | Passive and Active Network Measurement Workshop (PAM) |
|
2004
|
A. Ziviani M. Crovella S. Fdida |
Constraint-based Geolocation of Internet Hosts | IEEE/ACM Transactions on Networking |
|
2004
|
R. Cox F. Kaashoek R. Morris |
Vivaldi: A Decentralized Network Coordinate System | SIGCOMM |
|
2003
|
A. Vespignani |
Scale-free behavior of the Internet global performance | European Physical Journal B |
|
2003
|
S. Fdida J.F. de Rezende O.C.M.B. Duarte |
Demographic placement for Internet host location | GLOBECOM |
|
2003
|
M. Crovella |
Virtual Landmarks for the Internet | Internet Measurement Conference (IMC) |
|
2003
|
S. Fdida J.F. de Rezende O.C.M.B. Duarte |
Similarity models for Internet host location | ICON |
|
2003
|
J.W. Byers M. Crovella I. Matta |
On the geographic location of Internet resources | Selected Areas in Communications, Volume 21 |
|
2001
|
L. Subramanian |
An Investigation of Geographic Mapping Techniques for Internet Hosts | SIGCOMM |
|
2001
|
H. Zhang |
Predicting Internet Network Distance with Coordinates-Based Approaches | IEEE Conference on Computer Communications (INFOCOM) |
|
1999
|
E. Nemeth |
GTrace - A Graphical Traceroute Tool | Usenix LISA |
|
1996
|
P. Vixie T. Goodwin I. Dickinson |
A Means for Expressing Location Information in the Domain Name System | RFC Editor |
IBGP
| Year | Author(s) | Title | Publication |
|
2002
|
G. Wilfong |
On the Correctness of IBGP Configuration | ACM SIGCOMM |
|
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
IGP convergence
| Year | Author(s) | Title | Publication |
|
2002
|
C. Chuah R. Mortier S. Bhattacharyya C. Diot |
Analysis of link failures in an IP backbone | ACM SIGCOMM Internet Measurement Workshop |
internet
| Year | Author(s) | Title | Publication |
|
2002
|
M. Fomenkov D. J. Plummer D. Moore k. claffy |
Distance Metrics in the Internet | IEEE International Telecommunications Symposium |
IPNG
| Year | Author(s) | Title | Publication |
|
1997
|
GSE - An Alternate Addressing Architecture for IPv6 | INTERNET DRAFT |
IPv6
| Year | Author(s) | Title | Publication |
|
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
legal and ethical issues
| Year | Author(s) | Title | Publication |
|
2008
|
Conducting Cybersecurity Research Legally and Ethically | LEET | |
|
2007
|
P. Ohm D. Grunwald |
Legal issues surrounding monitoring during network research | ACM SIGCOMM IMC |
|
2007
|
V. Paxson |
Issues and etiquette concerning use of shared measurement data | ACM SIGCOMM IMC |
macroscopic topology
| Year | Author(s) | Title | Publication |
|
2001
|
k. claffy B. Huffaker D. Moore |
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
measurement
| Year | Author(s) | Title | Publication |
|
2007
|
A. Perrig V. Paxson S. Savage |
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | ACM Conference on Computer and Communications Security (CCS) |
|
2003
|
B. Huffaker M. Fomenkov k. claffy |
On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
multicase
| Year | Author(s) | Title | Publication |
|
1999
|
k. claffy E. Nemeth |
Tools to Visualize the Internet Multicast Backbone | International Networking Conference (INET) |
network failure
| Year | Author(s) | Title | Publication |
|
2003
|
D. G. Andersen H. Balakrishnan M. F. Kaashoek |
Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
|
2002
|
C. Chuah R. Mortier S. Bhattacharyya C. Diot |
Analysis of link failures in an IP backbone | ACM SIGCOMM Internet Measurement Workshop |
|
1998
|
A. Ahuja F. Jahanian |
Experimental Study of Internet Stability and Wide-Area Backbone Failures | University of Michigan |
network testbeds
| Year | Author(s) | Title | Publication |
|
2002
|
Report of NSF Workshop on Network Research Testbeds | NSF Workshop |
otter
| Year | Author(s) | Title | Publication |
|
1999
|
E. Nemeth k. claffy |
Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
overview
| Year | Author(s) | Title | Publication |
|
2001
|
CAIDA: Visualizing the Internet | CAIDA | |
|
1999
|
S. McCreary |
Internet measurement and data analysis: passive and active measurement | American Statistical Association |
|
1999
|
Internet measurement and data analysis: topology, workload, performance and routing statistics | NAE Workshop |
path analysis
| Year | Author(s) | Title | Publication |
|
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
path visualization
| Year | Author(s) | Title | Publication |
|
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
policy
| Year | Author(s) | Title | Publication |
|
2001
|
G. Huntoon k. claffy |
Traffic dynamics testbed | Large Scale Networking (LSN) Workshop |
|
2000
|
Measuring the Internet | CAIDA | |
|
1999
|
T. Monk D. McRobb |
Internet Tomography | CAIDA |
|
1998
|
Comments by CAIDA concerning the FCC's review of the acquisition of MCI Communications Corp. by Worldcom, Inc. | CAIDA | |
|
1997
|
T. Monk |
What's next for Internet data analysis? Status and challenges facing the community | CAIDA |
|
1997
|
k. claffy |
Internet data acquisition and analysis: Status and next steps | CAIDA |
|
1996
|
k. claffy |
Geographic addressing reconsidered | Coordination and Administration of the Internet Workshop |
|
1996
|
k. claffy |
Address administration in IPv6 | IEEE Symposium on Information Visualization |
|
1996
|
Cooperative Association for Internet Data Analysis | CAIDA | |
|
1996
|
k. claffy |
Cooperation in Internet data acquisition and analysis | Coordination and Administration of the Internet Workshop |
|
1996
|
S. Bradner k. claffy |
In whose domain: name service in adolescence | Coordination and Administration of the Internet Workshop |
|
1996
|
T. Salo |
Internet Exchanges: Policy-Driven Evolution | Coordination and Administration of the Internet Workshop |
|
1996
|
'But some data is worse than others': Measurement of the global Internet | CAIDA | |
|
1995
|
H.-W. Braun |
Post-NSFNET statistics collection | International Networking Conference (INET) |
|
1994
|
H.-W. Braun k. claffy S. Wolff |
Mitigating the coming Internet crunch: multiple service levels via Precedence | CAIDA |
|
1994
|
B. Chinoy k. claffy |
Applied Network Research: 1994 annual status report | CAIDA |
|
1993
|
H.-W. Braun P. Ford |
NSF implementation plan for interim NREN | Journal on High Speed Networking |
|
1993
|
B. Chinoy k. claffy G. Polyzos |
1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
|
1993
|
H.-W. Braun G. Polyzos |
Long-term traffic aspects of the NSFNET | International Networking Conference (INET) |
|
1993
|
k. claffy |
Network analysis issues for a public Internet | Public Access to the Internet, A Harvard JFK School Workshop |
|
1993
|
k. claffy |
Network analysis in support of Internet policy requirements | International Networking Conference (INET) |
|
1992
|
B. Chinoy k. claffy G. Polyzos |
1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
reactive routing
| Year | Author(s) | Title | Publication |
|
2003
|
D. G. Andersen H. Balakrishnan M. F. Kaashoek |
Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
route flap damping
| Year | Author(s) | Title | Publication |
|
2002
|
R. Govindan G. Varghese R. H. Katz |
Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
route instability
| Year | Author(s) | Title | Publication |
|
2002
|
J. Wang Z. Xiao Y. Zhang |
BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
|
1999
|
G. R. Malan F. Jahanian |
Origins of Internet Routing Instability | IEEE INFOCOM |
|
1998
|
G. R. Malan F. Jahanian |
Internet Routing Instability | IEEE/ACM Transactions on Networking |
router behavior
| Year | Author(s) | Title | Publication |
|
2002
|
X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang |
Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
|
2001
|
R. Govindan J. Heidemann |
An Empirical Study of Router Response to Large BGP Routing Table Load | USC/Information Sciences Institute |
router performance
| Year | Author(s) | Title | Publication |
|
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
|
2001
|
Internet Core Router Test | Light Reading |
routing
| Year | Author(s) | Title | Publication |
|
2003
|
D. G. Andersen H. Balakrishnan M. F. Kaashoek |
Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
|
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
|
2003
|
A. Broido k. claffy |
On Third-party Addresses in Traceroute Paths | Passive and Active Measurement Conference (PAM) |
|
2003
|
A. Broido k. claffy |
Traceroute and BGP AS Path Incongruities | CAIDA |
|
2002
|
D. Wetherall T. Anderson |
Understanding BGP Misconfiguration | ACM SIGCOMM |
|
2002
|
G. Wilfong |
On the Correctness of IBGP Configuration | ACM SIGCOMM |
|
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
|
2002
|
X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang |
Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
First analysis of the Beacon data | IEPG meeting, Atlanta, GA | |
|
2002
|
J. Wang Z. Xiao Y. Zhang |
BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
N. Feamster S. Bauer H. Balakrishnan |
Topology Inference from BGP Routing Dynamics | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
O. Ben-Shalom A. Bremler-Barr |
On the Structure and Application of BGP Policy Atoms | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
R. Mahajan D. Wetherall |
Measuring ISP Topologies with Rocketfuel | ACM SIGCOMM |
|
2002
|
R. Govindan G. Varghese R. H. Katz |
Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
|
2002
|
What is the Sound of One Route Flapping? | Dartmouth Summer Workshop | |
|
2002
|
X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang |
Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
|
2001
|
A. Ahuja R. Wattenhofer V. Srinivasan |
The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
|
2000
|
A. Ahuja A. Bose F. Jahanian |
An Experimental Study of Internet Routing Convergence | Microsoft Research |
|
2000
|
On inferring autonomous system relationships in the Internet | IEEE Global Internet Symposium | |
|
1999
|
A. Bremler-Barr S. Har-Peled |
Routing with a Clue | ACM SIGCOMM |
|
1999
|
G. R. Malan F. Jahanian |
Origins of Internet Routing Instability | IEEE INFOCOM |
|
1998
|
G. R. Malan F. Jahanian |
Internet Routing Instability | IEEE/ACM Transactions on Networking |
|
1997
|
GSE - An Alternate Addressing Architecture for IPv6 | INTERNET DRAFT |
routing/topology
| Year | Author(s) | Title | Publication |
|
2004
|
D. Johnson J. Rexford J. Wang R. Katz |
Scalable and Accurate Identification of AS-level Forwarding Paths | IEEE INFOCOM |
|
2003
|
J. Rexford J. Wang R. H. Katz |
Towards an Accurate AS-Level Traceroute Tool | ACM SIGCOMM |
|
2002
|
D. Plummer D. Moore k. claffy |
Topology discovery by active probing | Symposium on Applications and the Internet (SAINT) |
|
2002
|
k. claffy E. Nemeth |
Internet Expansion, Refinement, and Churn | European Transactions on Telecommunications |
|
2001
|
k. claffy |
Internet topology: connectivity of IP graphs | SPIE International symposium on Convergence of IT and Communication |
|
2001
|
k. claffy |
Complexity of global routing policies | CAIDA |
|
2001
|
k. claffy |
Analysis of RouteViews BGP data: policy atoms | Network Resource Data Management Workshop |
|
2000
|
ISMA Winter 2000 Workshop - Final Report | Internet Statistics and Metrics Analysis (ISMA) | |
|
2000
|
M. Fomenkov D. Moore E. Nemeth k. claffy |
Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
|
1993
|
H.-W. Braun G. Polyzos |
Measurement considerations for assessing unidirectional latencies | CAIDA |
|
1993
|
P. Ford Y. Rekhter |
CIDR and the evolution of the Internet | International Networking Conference (INET) |
|
1992
|
Dynamics of Internet routing information | CAIDA | |
|
1992
|
H.-W. Braun |
The National Science Foundation Network | CAIDA |
|
1992
|
Redesign and extension of multi-agency interconnection point | CAIDA | |
|
1992
|
B. Chinoy |
Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysis | CAIDA |
security
| Year | Author(s) | Title | Publication |
|
2008
|
Toward a Culture of Cybersecurity Research | University of California, Berkeley | |
|
2007
|
A. Perrig V. Paxson S. Savage |
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | ACM Conference on Computer and Communications Security (CCS) |
|
2006
|
Googling Considering Harmful | New Security Paradigms Workshop (NSPW) | |
|
2003
|
V. Paxson S. Savage C. Shannon S. Staniford N. Weaver |
Inside the Slammer Worm | IEEE Security and Privacy journal |
|
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
|
2003
|
C. Shannon G. Voelker S. Savage |
Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
|
2003
|
V. Paxson S. Savage C. Shannon S. Staniford N. Weaver |
The Spread of the Sapphire/Slammer Worm | CAIDA |
|
2002
|
C. Shannon J. Brown |
Code-Red: a case study on the spread and victims of an Internet worm | ACM SIGCOMM Internet Measurement Workshop |
|
2002
|
Enhancing the Security of Name Resolution and Inter-Domain Internet Routing | ISP BGPDNS WG | |
|
2001
|
G. Voelker S. Savage |
Inferring Internet Denial-of-Service Activity | USENIX Security Symposium |
|
1995
|
A Gross H.-W. Braun |
Measured interference of security mechanisms with network performance | International Networking Conference (INET) |
server placement
| Year | Author(s) | Title | Publication |
|
2003
|
B. Huffaker M. Fomenkov k. claffy |
On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
skitter
| Year | Author(s) | Title | Publication |
|
2001
|
k. claffy B. Huffaker D. Moore |
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
|
2001
|
M. Fomenkov D. Moore k. claffy |
Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance | Passive and Active Measurement Conference (PAM) |
|
2000
|
M. Fomenkov D. Moore E. Nemeth k. claffy |
Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
software/tools
| Year | Author(s) | Title | Publication |
|
2003
|
N. Brownlee |
Integrating Active Methods and Flow Meters - an implementation using NeTraMet | Passive and Active Measurement Conference (PAM) |
|
2001
|
K. Keys R. Koga E. Lagache k. claffy |
CoralReef software suite as a tool for system and network administrators | USENIX LISA |
|
2001
|
Using NeTraMet for Production Traffic Measurement | Integrated Management Strategies for the New Millenium | |
|
2001
|
D. Moore R. Koga E. Lagache M. Tesch k. claffy |
The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
|
2001
|
D. Moore R. Koga E. Lagache M. Tesch k. claffy |
The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
|
2001
|
M. Murray |
Streams, Flows and Torrents | Passive and Active Measurement Conference (PAM) |
|
2000
|
R. Periakaruppan J. Donohoe k. claffy |
Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
|
1999
|
E. Nemeth |
GTrace - A Graphical Traceroute Tool | USENIX LISA |
|
1999
|
E. Nemeth k. claffy |
Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
|
1999
|
k. claffy E. Nemeth |
Tools to visualize the Internet multicast backbone | International Networking Conference (INET) |
topology
| Year | Author(s) | Title | Publication |
|
2003
|
S. Jamin W. Willinger |
Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach | ACM SIGCOMM Workshop on MoMeTools |
traceroute
| Year | Author(s) | Title | Publication |
|
2004
|
D. Johnson J. Rexford J. Wang R. Katz |
Scalable and Accurate Identification of AS-level Forwarding Paths | IEEE INFOCOM |
|
2003
|
J. Rexford J. Wang R. H. Katz |
Towards an Accurate AS-Level Traceroute Tool | ACM SIGCOMM |
|
2003
|
A. Broido k. claffy |
On Third-party Addresses in Traceroute Paths | Passive and Active Measurement Conference (PAM) |
|
2003
|
A. Broido k. claffy |
Traceroute and BGP AS Path Incongruities | CAIDA |
traffic classification
| Year | Author(s) | Title | Publication |
|
2009
|
W. de Donato A. Pescape G. Ventre |
TIE: a Community-oriented Traffic Classification Platform | International Workshop on Traffic Monitoring and Analysis (TMA) |
|
2009
|
J.-L. Costeux G. Urvoy-Keller T. En-Najjary |
Challenging Statistical Classification for Operational Usage: the ADSL Case | ACM SIGCOMM IMC |
|
2009
|
A. Feldmann V. Paxson M. Allman |
On Dominant Characteristics of Residential Broadband Internet Traffic | ACM SIGCOMM IMC |
|
2008
|
W. de Donato A. Pescape P. Salvo Rossi |
Classification of Network Traffic via Packet-Level Hidden Markov Models | IEEE GLOBECOM |
|
2008
|
K. Fukuda H. Esaki A. Kato |
Observing Slow Crustal Movement in Residential User Traffic | ACM CoNEXT |
|
2008
|
G. Armitage |
A Survey of Techniques for Internet Traffic Classification Using Machine Learning | IEEE Communications Surveys and Tutorials |
|
2008
|
S. Tafvelin |
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns | International Conference on Information Networking (ICOIN) |
|
2008
|
M. Crotti F. Gringoli L. Salgarelli |
Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting | Computer Networks |
|
2008
|
P. Pappu M. Faloutsos |
Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs | Tech Report |
|
2008
|
F. Gringoli L. Salgarelli |
A Preliminary Look at the Privacy of SSH Tunnels | IEEE International Conference on Communications (ICC) |
|
2008
|
D. Orincasy S. Malomsoky I. Szabo |
On the Validation of Traffic Classification Algorithms | Passive and Active Measurement Conference (PAM) |
|
2008
|
Y. Won M. Hong, J. Kim |
Towards Automated Application Signature Generation | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
|
2008
|
T. Dang A. Gefferth S. Monlnar |
Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer | Systems and Computers in Japan |
|
2008
|
S. Tafvelin T. Olovsson |
Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic | Passive and Active Measurement Conference (PAM) |
|
2007
|
P. Pappu M. Faloutsos M. Mitzenmacher S. Singh G. Varghese |
Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation | University of California, Riverside |
|
2007
|
J. Heidemann C. Papadopoulos J. Pepin |
Estimating P2P Traffic Volume at USC | USC/Information Sciences Institute |
|
2007
|
A. Manhanti M. Arlitt I. Cohen C. Williamson |
Offline/realitme Traffic Classification Using Semi-supervised Learning | Perform Eval |
|
2007
|
K. Claffy M. Fomenkova N. Browlee D. Barman M. Faloutsos |
Comparison of Internet Traffic Classification Tools | IMRG WACI |
|
2007
|
S. Tafvelin |
Analysis of Internet Backbone Traffic and Header Anomalies Observed | ACM SIGCOMM IMC |
|
2007
|
M. Reiter |
Hit-list worm detection and bot identification in large networks using protocol graphs | RAID |
|
2007
|
M. Dusi F. Gringoli L. Salgarelli |
Traffic Classification through Simple Statistical Fingerprinting | ACM SIGCOMM |
|
2007
|
M. Mellia M. Meo D. Rossi P. Tofanelli |
Revealing Skype Traffic: when randomness plays with you | ACM SIGCOMM |
|
2007
|
I. Szabo D. Orincasy |
Accurate Traffic Classification | WoWMoM |
|
2007
|
A. Manhanti M. Arlitt I. Cohen C. Williamson |
Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core | World Wide Web (WWW) Conference |
|
2007
|
J. Heidemann C. Papadopoulos |
Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing | IEEE Global Internet Symposium |
|
2007
|
K. Papgiannaki N. Taft M. Faloutso |
Profiling the End Host | Passive and Active Measurement Conference (PAM) |
|
2007
|
R. Teixeira |
Early Recognition of Encrypted Application | Passive and Active Measurement Conference (PAM) |
|
2006
|
F. Monrose G. Masson |
On Inferring Application Protocol Behaviors in Encrypted Network Traffic | Journal of Machine Learning Research |
|
2006
|
M. Polychronakis S. Antonatos E. Markatos S. Ubik |
Appmon: An Application for Accurate per Application Network Traffic Characterization | BroadBand Europe |
|
2006
|
A. Mahanti M. Arlitt |
Internet Traffic Identification using Machine Learning | IEEE GLOBECOM |
|
2006
|
K. Levchenko C. Kreibich S. Savage G. Voelker |
Unexpected Means of Protocol Inference | ACM SIGCOMM IMC |
|
2006
|
R. Teixeira . Akodjenou A. Soule K. Salamatian |
Traffic Classification on the fly | ACM SIGCOMM Computer Communication Review |
|
2006
|
C. Williamson |
A Longitudinal Study of P2P Traffic Classification | MASCOTS |
|
2006
|
S. Zander G. Armitage |
A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification | ACM SIGCOMM |
|
2006
|
M. Arlitt A. Mahanti |
Traffic Classification Using Clustering Algorithms | ACM SIGCOMM |
|
2006
|
P. Mavrommatiss |
Identifying Known and Unknown Peer-to-Peer Traffic | IEEE NCA |
|
2006
|
R. Teixeira K. Salamatian |
Early Application Identification | ACM CoNEXT |
|
2006
|
T. Dang A. Gefferth S. Monlnar |
Identification and Analysis of Peer-to-Peer Traffic | Journal of Communications |
|
2005
|
D. Zuev M. Crogan |
Discriminators for Use in Flow-based Classification | Intel Research, Cambridge |
|
2005
|
A. Soule M. Jeannin K. Salamatian |
Blind Application Recognition Through Behavioral Classification | Paris |
|
2005
|
Chang F. Chi Feng W. Walpole J. |
A Traffic Characterization of Popular on-line Games | IEEE/ACM Transactions on Networking |
|
2005
|
M. Crovella C. Diot |
Mining Anomalies Using Traffic Feature Distributions | ACM SIGCOMM |
|
2005
|
K. Papagiannaki M. Faloutsos |
BLINC Multilevel Traffic Classification in the Dark | ACM SIGCOMM |
|
2005
|
S. Sen O. Spatscheck D. Wang |
Acas: Automated Construction of Application Signatures | ACM SIGCOMM |
|
2005
|
Zuev D. |
Internet Traffic Classification Using Bayesian Analysis Techniques | ACM SIGMETRICS |
|
2005
|
T. Nguyen G. Armitage |
Self-learning IP Traffic Classification based on Statistical Flow Characteristics | Passive and Active Measurement Conference (PAM) |
|
2005
|
J. Costeux P. Brown |
Analysis of Peer-to-Peer Traffic on ADSL | Passive and Active Measurement Conference (PAM) |
|
2005
|
Moore A. |
Traffic Classification using a Statistical Approach | Passive and Active Measurement Conference (PAM) |
|
2004
|
A. Broido N. Brownless K. Claffy M. Faloutsos |
Is P2P Dying or Just Hiding | IEEE GLOBECOM |
|
2004
|
J. Wang |
Analyzing Peer-to-Peer Traffic across Large Networks | IEEE/ACM Transactions on Networking |
|
2004
|
O. Sen N. Duffield |
Class-of-service Mapping for QoS | ACM SIGCOMM IMC |
|
2004
|
Z. Zhang S. Bhattacharyya |
Profiling Internet Backbone Traffic: Behavior Models and Applications | ACM SIGCOMM |
|
2004
|
A. Broido M. Faloutsos K. Claffy |
Transport Layer Identification of P2p Traffic | ACM SIGCOMM |
|
2004
|
K. Salamatian N. Taft R. Emilion K. Papagiannaki |
Flow Classification by Histograms or How to Go on Safari in the Internet | ACM SIGMETRICS |
|
2004
|
O. Spatscheck D. Wang |
Accurate Scalable In-Network Identification of P2P Traffic | World Wide Web (WWW) Conference |
|
2004
|
M. Hall Brunskill J. Lorier P. |
Flow Clustering Using Machine Learning Techniques | Passive and Active Measurement Conference (PAM) |
|
2003
|
S. Savage G. Vargheses |
Automatically Inferring Patterns of Resources Consumption in Network Traffic | ACM SIGCOMM |
|
2003
|
A. Wichmann A. Feldmann |
An Analysis of Internet Chat Systems | ACM SIGCOMM |
|
2003
|
M. Poletto J. Guttag F. Kaashoek |
Role Classification of Hosts within Enterprise Networks based on Connection Patterns | USENIX |
|
2003
|
S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely |
Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
|
2003
|
L. Ertoz V. Kumar A. Ozgur J. Srirvastava |
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection | SIAM |
|
2002
|
S. Sen C. Kalmanek |
Streaming Video Traffic: Characterization and Network Impact | WCW |
|
2001
|
S. Floyd |
Identifying the TCP Behavior of Web Servers | ACM SIGCOMM |
|
2001
|
K Papagiannaki |
Toward the Accurate Identification of Network Applications | Passive and Active Measurement Conference (PAM) |
|
1999
|
Snort Lightweight Intrusion Detection for Networks | USENIX LISA |
traffic measurement
| Year | Author(s) | Title | Publication |
|
2004
|
K. Keys D. Moore G. Varghese |
Building a Better NetFlow | ACM SIGCOMM |
|
2004
|
Y. Hyun R. Gao k. claffy |
Their share: diversity and disparity in IP traffic | Passive and Active Measurement Conference (PAM) |
|
2004
|
M. Molle M. Faloutsos A. Broido |
A Nonstationary Poisson View of Internet Traffic | IEEE INFOCOM |
|
2003
|
E. Nemeth k. claffy |
Spectroscopy of DNS Update Traffic | ACM SIGMETRICS |
|
2003
|
E. Nemeth k. claffy |
Spectroscopy of Private DNS Update Sources | IEEE Workshop on Internet Applications (WIAPP) |
|
2003
|
N. Brownlee |
Integrating Active Methods and Flow Meters - an implementation using NeTraMet | Passive and Active Measurement Conference (PAM) |
|
2003
|
K. Keys D. Moore k. claffy |
Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites | CAIDA |
|
2003
|
R. King E. Nemeth k. claffy |
Radon Spectroscopy of Inter-Packet Delay | IEEE High-Speeding Networking Workshop (HSN) |
|
2003
|
k. claffy |
Wide-Area IP Multicast Traffic Characterization | IEEE Network |
|
2002
|
D. Moore k. claffy |
Beyond Folklore: Observations on Fragmented Traffic | IEEE/ACM Transactions on Networking |
|
2002
|
k. claffy |
Understanding Internet Traffic Streams: Dragonflies and Tortoises | CAIDA |
|
2001
|
Using NeTraMet for Production Traffic Measurement | Integrated Management Strategies for the New Millenium | |
|
2001
|
k. claffy |
Measuring the Immeasurable: Global Internet Measurement Infrastructure | Passive and Active Measurement Conference (PAM) |
|
2001
|
k. claffy M. Murray E. Nemeth |
Methodology for passive analysis of a university Internet link | Passive and Active Measurement Conference (PAM) |
|
2000
|
K. Almeroth k. claffy |
A scalable architecture for monitoring and visualizing multicast statistics | Distributed Systems: Operations and Management |
|
2000
|
k. claffy |
Trends in wide area IP traffic patterns - A view from Ames Internet Exchange | ITC Specialist Seminar |
|
2000
|
R. Fulton |
Kawaihiko and the third-quartile day [traffic management] | CAIDA |
|
1999
|
k. claffy E. Nemeth |
Tools to visualize the Internet multicast backbone | International Networking Conference (INET) |
|
1999
|
ISMA passive measurement data and analysis, workshop report | Internet Statistics and Metrics Analysis (ISMA) | |
|
1998
|
G. Miller K. Thompson |
The nature of the beast: Recent traffic measurements from an Internet backbone | International Networking Conference (INET) |
|
1996
|
E. Hoffman k. claffy B. Fenner |
Visualizing the global topology of the MBone | IEEE Symposium on Information Visualization |
|
1996
|
k. claffy |
A survey of Internet statistics / metrics activities | CAIDA |
|
1995
|
H.-W. Braun G. Polyzos |
A parameterizable methodology for Internet traffic flow profiling | CAIDA |
|
1994
|
Internet traffic characterization. | University of California, San Diego | |
|
1994
|
G. Polyzos |
A Time-Series Model of Long-Term Traffic on the NSFNET Backbone | IEEE International Conference on Communications (ICC) |
|
1994
|
H.-W. Braun G. Polyzos |
Tracking long-term growth of the NSFNET | CAIDA |
|
1994
|
H.-W. Braun G. Polyzos |
Internet traffic flow profiling | CAIDA |
|
1993
|
k. claffy G. Polyzos |
A framework for flow-based accounting on the Internet | IEEE Singapore International Conference on Networks (SICON'93) |
|
1993
|
H.-W. Braun G. Polyzos |
Application of sampling methodologies to wide-area network traffic characterization | ACM SIGCOMM |
|
1993
|
H.-W. Braun G. Polyzos |
Traffic characteristics of the T1 NSFNET backbone | IEEE INFOCOM |
|
1992
|
k. claffy O. Nakamura J. Murai |
An analysis of international academic research network traffic between Japan and other nations | International Networking Conference (INET) |
visualization
| Year | Author(s) | Title | Publication |
|
2001
|
k. claffy E. Nemeth |
DNS Root/gTLD Performance Measurements | USENIX LISA |
|
2001
|
M. Fomenkov D. Moore k. claffy |
Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance | Passive and Active Measurement Conference (PAM) |
|
2000
|
M. Fomenkov D. Moore E. Nemeth k. claffy |
Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
|
1999
|
E. Nemeth k. claffy |
Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
|
1999
|
E. Nemeth k. claffy |
Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
|
1999
|
k. claffy E. Nemeth |
Tools to visualize the Internet multicast backbone | International Networking Conference (INET) |
|
1999
|
k. claffy E. Nemeth |
Tools to Visualize the Internet Multicast Backbone | International Networking Conference (INET) |
|
1999
|
Report from the ISMA Network Visualization Workshop | Internet Statistics and Metrics Analysis (ISMA) | |
|
1998
|
J. Jung E. Nemeth D. Wessels k. claffy |
Visualization of the growth and topology of the NLANR caching hierarchy | International WWW Caching Workshop |
|
1998
|
J. Jung D. Wessels k. claffy |
Visualization of the Growth and Topology of the NLANR Caching Hierarchy | International WWW Caching Workshop |
|
1996
|
E. Hoffman k. claffy B. Fenner |
Visualizing the global topology of the MBone | IEEE Symposium on Information Visualization |
www caching
| Year | Author(s) | Title | Publication |
|
1998
|
J. Jung D. Wessels k. claffy |
Visualization of the Growth and Topology of the NLANR Caching Hierarchy | International WWW Caching Workshop |
Additional Content
Annotated Bibliography of Networking Papers
An annotated bibliography of papers and presentations in the wide-area networking literature. See the CAIDA Papers page as well as Non-CAIDA Publications using CAIDA Data page for recent papers. Note: This annotated bibliography effort ended in 2013, but remains for historical purposes.

