anonymization
Year | Author(s) | Title | Publication |
2008
|
M. Hansen |
Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology | Tech Report |
2008
|
C. Wright F. Monrose A. Keromytis M. Reiter |
Taming the Devil: Techniques for Evaluating Anonymized Network Data | NDSS |
2007
|
L. Getoor |
Preserving the Privacy of Sensitive Relationships in Graph Data | ACM SIGKDD Workshop on Privacy, Security, and Trust in KDD (PinKDD) |
2007
|
C. Woolam G. Hellings L. Khan B. Thuraisingham |
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs | ACM Computing Research Repository (CoRR) |
2007
|
P. Zejdl J. Halak |
Real-time anonymization in passive network monitoring | International Conference on Networking and Services (ICNS) |
2007
|
S. Petrovic |
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking | ARES |
2007
|
B. Greenstein R. Gummadi S. Seshan D. Wetherall |
802.11 user fingerprinting | ACM MobiCom |
2007
|
T. Li S. Venkatasubramanian |
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity | IEEE International Conference on Data Engineering (ICDE) |
2007
|
M. Gruteser H. Xiong A. Alrabady |
Preserving privacy in gps traces via uncertainty-aware path cloaking | ACM Conference on Computer and Communications Security (CCS) |
2007
|
M. Bishop B. Bhumiratana L. Clark K. Levitt |
Sanitization models and their limitations | New Security Paradigms Workshop (NSPW) |
2007
|
P.S. Yu |
On Anonymization of String Data | SDM |
2007
|
W. Chen G. Miklau D. Towsley |
Analyzing Privacy in Enterprise Packet Trace Anonymization | UMass Amherst |
2007
|
C. Wright F. Monrose M. Collins M. Reiter |
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces | NDSS |
2007
|
T. Wolf |
High-Speed Prefix-Preserving (IP) Address Anonymization for Passive Measurement Systems | IEEE/ACM Transactions on Networking |
2006
|
Xing Li |
An IP Address Anonymization Scheme with Multiple Access Levels | ICOIN |
2006
|
V. Shmatikov |
Large-scale collection and sanitization of network security data: risks and challenges | New Security Paradigms Workshop (NSPW) |
2006
|
M. Allman V. Paxson J. Lee |
The devil and packet trace anonymization | ACM SIGCOMM Computer Communication Review |
2006
|
M. Arlitt |
SC2D: an alternative to trace anonymization | ACM SIGCOMM MineNet |
2006
|
J. Gehrke D. Kifer M. Venkitasubramaniam |
l-Diversity: Privacy Beyond k-Anonymity. | IEEE International Conference on Data Engineering (ICDE) |
2006
|
S. Antonatos K.G. Anagnostakis |
On the Privacy Risks of Publishing Anonymized IP Network Traces. | Communications and Multimedia Security |
2006
|
J. Schonwalder |
Prefix- and Lexicographical-order-preserving IP Address Anonymization | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
2006
|
R. Crawford B. Bhumiratana L. Clark K. Levitt |
Some Problems in Sanitizing Network Data | IEEE WETICE |
2006
|
K. Lakkaraju K. Luo |
FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs | USENIX LISA |
2006
|
N. Borisov W. Yurcik |
Outsourcing Security Analysis with Anonymized Logs | Securecomm and Workshops |
2006
|
P. Ning |
A Flexible Approach to Intrusion Alert Anonymization and Correlation | Securecomm and Workshops |
2006
|
S. Antonatos D. Antoniades E.P. Markatos P. Trimintzios |
A Generic Anonymization Framework for Network Traffic | IEEE International Conference on Communications (ICC) |
2006
|
Y. Li C. Ermopoulos W. Yurcik A. Slagell |
Scrub-PA: A Multi-level, Multi-Dimensional Anonymization Tool for Process Accounting | Tech Report |
2005
|
Thoughts on how to mount an attack on tcpdpriv's '-a50' option | Tech Report | |
2005
|
T. Brekne A. Arnes |
Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. | CANS |
2005
|
TCPdPriv | Tech Report | |
2005
|
G. Bartlett Y. Pryadkin J. Heidemann C. Papadopoulos J. Bannister |
Experiences with a continuous network tracing infrastructure | ACM SIGCOMM MineNet |
2005
|
A. Arnes A. Oslebo |
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies. | Privacy Enhancing Technologies |
2005
|
Adam Slagell K. Luo W. Yurcik |
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security | International Conference on Telecommunication Systems, Modeling and Analysis |
2005
|
W. Yurcik |
Sharing computer network logs for security and privacy: a motivation for new methodologies of anonymization | Security and Privacy for Emerging Areas in Communication Networks |
2005
|
Y. Li A. Slagell W. Yurcik |
CANINE: A NetFlow Converter/Anonymizer Tool for Format Interoperability and Secure Sharing | FLOCON - Network Flow Analysis Workshop |
2004
|
P. Porras V. Shmatikov |
Privacy-Preserving Sharing and Correlation of Security Alerts | USENIX Security Symposium |
2004
|
J. Xu M. Ammar S. Moon |
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | Computer Networks |
2003
|
V. Paxson |
A high-level programming environment for packet trace anonymization and transformation | ACM SIGCOMM |
2002
|
G. Danezis |
Towards an Information Theoretic Metric for Anonymity | Privacy Enhancing Technologies |
2002
|
B. Seys J. Claessenss B. Preneel |
Towards Measuring Anonymity | Privacy Enhancing Technologies |
2002
|
J. Fan M. Ammar S. Moon |
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme | IEEE International Conference on Network Protocols (ICNP) |
1998
|
L. Sweeney |
Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression | Tech Report |
AS relationships
Year | Author(s) | Title | Publication |
2004
|
The Evolution of the U.S. Internet Peering Ecosystem | Equinix White Papers | |
2004
|
M. Faloutsos |
Analyzing BGP Policies: Methodology and Tool | IEEE INFOCOM |
2003
|
S. Jamin W. Willinger |
Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach | ACM SIGCOMM Workshop on MoMeTools |
2003
|
C. A. Ristuccia |
Estimating Market Power in the Internet Backbone Using Band-X data | Cambridge Working Papers in Economics |
2003
|
J. Tsitsiklis |
Routing and Peering in a Competitive Internet | MIT |
2002
|
S. Agarwal J. Rexford R. Katz |
Characterizing the Internet Hierarchy from Multiple Vantage Points | IEEE INFOCOM |
2001
|
Internet Service Providers and Peering | Equinix White Papers | |
2000
|
On inferring autonomous system relationships in the Internet | IEEE Global Internet Symposium |
atoms
Year | Author(s) | Title | Publication |
2002
|
O. Ben-Shalom A. Bremler-Barr |
On the Structure and Application of BGP Policy Atoms | ACM SIGCOMM Internet Measurement Workshop |
bandwidth estimation
Year | Author(s) | Title | Publication |
2003
|
R. Prasad M. Murray k. claffy |
Bandwidth estimation: metrics, measurement techniques, and tools | IEEE Network |
2001
|
P. Ramanathan D. Moore |
Packet Dispersion Techniques and Capacity Estimation | CAIDA |
2001
|
P. Ramanathan D. Moore |
What do packet dispersion techniques measure? | IEEE INFOCOM |
BGP
Year | Author(s) | Title | Publication |
2004
|
M. Faloutsos |
Analyzing BGP Policies: Methodology and Tool | IEEE INFOCOM |
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
2003
|
A. Broido k. claffy |
On Third-party Addresses in Traceroute Paths | Passive and Active Measurement Conference (PAM) |
2003
|
A. Broido k. claffy |
Traceroute and BGP AS Path Incongruities | CAIDA |
2002
|
D. Wetherall T. Anderson |
Understanding BGP Misconfiguration | ACM SIGCOMM |
2002
|
G. Wilfong |
On the Correctness of IBGP Configuration | ACM SIGCOMM |
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
2002
|
Enhancing the Security of Name Resolution and Inter-Domain Internet Routing | ISP BGPDNS WG | |
2000
|
On inferring autonomous system relationships in the Internet | IEEE Global Internet Symposium |
BGP beacons
Year | Author(s) | Title | Publication |
2002
|
First analysis of the Beacon data | IEPG meeting, Atlanta, GA |
BGP configuration
Year | Author(s) | Title | Publication |
2002
|
D. Wetherall T. Anderson |
Understanding BGP Misconfiguration | ACM SIGCOMM |
2002
|
G. Wilfong |
On the Correctness of IBGP Configuration | ACM SIGCOMM |
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
BGP convergence
Year | Author(s) | Title | Publication |
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
2002
|
First analysis of the Beacon data | IEPG meeting, Atlanta, GA | |
2002
|
R. Govindan G. Varghese R. H. Katz |
Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
2002
|
What is the Sound of One Route Flapping? | Dartmouth Summer Workshop | |
2002
|
X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang |
Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
2001
|
A. Ahuja R. Wattenhofer V. Srinivasan |
The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
2000
|
A. Ahuja A. Bose F. Jahanian |
An Experimental Study of Internet Routing Convergence | Microsoft Research |
1999
|
G. R. Malan F. Jahanian |
Origins of Internet Routing Instability | IEEE INFOCOM |
1998
|
G. R. Malan F. Jahanian |
Internet Routing Instability | IEEE/ACM Transactions on Networking |
BGP routing table
Year | Author(s) | Title | Publication |
2002
|
D. Wetherall T. Anderson |
Understanding BGP Misconfiguration | ACM SIGCOMM |
2001
|
Commentary on Inter-Domain Routing in the Internet, RFC 3221 | The Internet Society | |
2001
|
Analyzing the Internet's BGP Routing Table | The Internet Protocol Journal | |
1997
|
GSE - An Alternate Addressing Architecture for IPv6 | INTERNET DRAFT |
BGP updates
Year | Author(s) | Title | Publication |
2002
|
X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang |
Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
2002
|
First analysis of the Beacon data | IEPG meeting, Atlanta, GA | |
2002
|
J. Wang Z. Xiao Y. Zhang |
BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
2002
|
N. Feamster S. Bauer H. Balakrishnan |
Topology Inference from BGP Routing Dynamics | ACM SIGCOMM Internet Measurement Workshop |
2002
|
What is the Sound of One Route Flapping? | Dartmouth Summer Workshop | |
2001
|
A. Ahuja R. Wattenhofer V. Srinivasan |
The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
2000
|
A. Ahuja A. Bose F. Jahanian |
An Experimental Study of Internet Routing Convergence | Microsoft Research |
1999
|
G. R. Malan F. Jahanian |
Origins of Internet Routing Instability | IEEE INFOCOM |
1998
|
A. Ahuja F. Jahanian |
Experimental Study of Internet Stability and Wide-Area Backbone Failures | University of Michigan |
1998
|
G. R. Malan F. Jahanian |
Internet Routing Instability | IEEE/ACM Transactions on Networking |
caching
Year | Author(s) | Title | Publication |
2004
|
M. Fomenkov N. Brownlee k. claffy |
Measurements and Laboratory Simulations of the Upper DNS Hierarchy | Passive and Active Measurement Conference (PAM) |
1998
|
J. Jung E. Nemeth D. Wessels k. claffy |
Visualization of the growth and topology of the NLANR caching hierarchy | International WWW Caching Workshop |
1998
|
k. claffy |
ICP and the Squid web cache | CAIDA |
1997
|
k. claffy |
RFC 2187: Application of Internet Cache Protocol (ICP), version 2 | CAIDA |
1997
|
k. claffy |
RFC 2186: Internet Cache Protocol (ICP), version 2 | CAIDA |
1996
|
k. claffy |
Evolution of the NLANR cache hierarchy: Global configuration challenges | CAIDA |
1996
|
k. claffy |
Can WWW caches help to save the Internet? | Coordination and Administration of the Internet Workshop |
1994
|
k. claffy |
Web traffic characterization: an assessment of the impact of caching documents from the NCSA's web server | World Wide Web (WWW) Conference |
delay measurement
Year | Author(s) | Title | Publication |
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
distance
Year | Author(s) | Title | Publication |
2002
|
M. Fomenkov D. J. Plummer D. Moore k. claffy |
Distance Metrics in the Internet | IEEE International Telecommunications Symposium |
dns
Year | Author(s) | Title | Publication |
2004
|
M. Fomenkov N. Brownlee k. claffy |
Measurements and Laboratory Simulations of the Upper DNS Hierarchy | Passive and Active Measurement Conference (PAM) |
2003
|
E. Nemeth k. claffy |
Spectroscopy of DNS Update Traffic | ACM SIGMETRICS |
2003
|
E. Nemeth k. claffy |
Spectroscopy of Private DNS Update Sources | IEEE Workshop on Internet Applications (WIAPP) |
2003
|
M. Fomenkov k. claffy |
Wow, That's a lot of packets | Passive and Active Measurement Conference (PAM) |
2003
|
B. Huffaker M. Fomenkov k. claffy |
On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
2002
|
Enhancing the Security of Name Resolution and Inter-Domain Internet Routing | ISP BGPDNS WG | |
2002
|
I. Ziedins |
Response time distributions for global name servers | Passive and Active Measurement Conference (PAM) |
2001
|
k. claffy E. Nemeth |
DNS Root/gTLD Performance Measurements | USENIX LISA |
2001
|
k. claffy E. Nemeth |
DNS Measurements at a Root Server | IEEE GLOBECOM |
dns server
Year | Author(s) | Title | Publication |
2001
|
k. claffy B. Huffaker D. Moore |
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
dual-stack
Year | Author(s) | Title | Publication |
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
education
Year | Author(s) | Title | Publication |
2000
|
T. Ott K. Thompson k. claffy |
The Internet Engineering Curriculum Repository | International Networking Conference (INET) |
geolocation
Year | Author(s) | Title | Publication |
2013
|
R. Dey Y. Liu K.W. Ross |
Topology mapping and geolocating for China's Internet | IEEE Trans. On Parallel and Distributed Systems |
2013
|
F. Orucevic A. Tanovic |
Using Whois based geolocation and Google maps API for support cybercrime investigations | Recent Advances in Telecommunications and Circuits |
2013
|
Y. Shavitt N. Zilberman |
Improving AS relationship inference using PoPs | Traffic Monitoring and Analysis Workshop (TMA) |
2012
|
J. Heidemann Y. Pradkin |
Towards geolocation of millions of IP addresses | Proc. ACM Internet measurement conference (IMC) |
2012
|
S. Han, K. Shetty T. Rogers |
Enhancing the classification accuracy of IP geolocation | Military Communications Conf. (MILCOM) |
2012
|
P. Barford B. Maggs R. Nowak |
Posit: a lightweight approach for IP geolocation | ACM SIGMETRICS Performance Evaluation Review |
2012
|
Y. Shavitt N. Zilberman |
A structural approach for PoP geo-location | Computer Networks |
2012
|
R.D.W. Perera R. Chandramouli K.P. Subbalakshmi |
Network measurement based modeling and optimization for IP geolocation | Computer Networks |
2011
|
M. Fomenkov kc claffy |
Geocompare: a comparison of public and commercial geolocation databases | CAIDA |
2011
|
S. Uhlig M.A. Kaafar B. Donnet B. Gueye |
IP geolocation databases: unreliable? | ACM SIGCOMM Computer Communication Review |
2011
|
P. Matray P. Haga T. Sebok I. Csabai G. Vattay |
Spotter: A Model Based Active Geolocation Service | INFOCOM |
2011
|
D. Burgener M. Flores A. Kuzmanovic C. Huang |
Towards Street-Level Client-Independent IP Geolocation | Usenix |
2010
|
P. Matray P. Haga I. Csabai G. Vattay |
A Model Based Approach for Improving Router Geolocation | Computer Networks: The International Journal of Computer and Telecommunications Networking |
2010
|
S. Karunasekera S. Kulkarni |
GeoWeight: Internet Host Geolocation Based on a Probability Model for Latency Measurements | Australasian Conference on Computer Science (ASCS) |
2010
|
S. Karunasekera S. Kulkarni A. Gunatilaka B. Ristic |
Internet Host Geolocation Using Maximum Likelihood Estimation Technique | IEEE International Conference on Advanced Information Networking and Applications (AINA) |
2010
|
N. Magharei R. Rejaie W. Willinger |
Eyeball ASes: From Geography to Conectivity | Internet Measurement Conference (IMC) |
2010
|
Y. Ganjali B. Wong |
Dude, where's that IP? Circumventing measurement-based IP geolocation | Usenix Security Symposium |
2010
|
N. Zilberman |
A Study of Geolocation Databases | arXiv cs.NI/.5674v3 |
2010
|
P. Barford J. Sommers R. Nowak |
A Learning-Based Approach for IP Geolocation | PAM, LNCS Volume |
2010
|
D. Sadok |
Whois based geolocation: A strategy to geolocate Internet hosts | Advanced Information Networking and Applications (AINA) |
2009
|
B. L. Mark D. Richards |
Statistical geolocation of Internet hosts | International Conference on Computer Communications and Networks (ICCCN) |
2009
|
P. C. van Oorschot |
Internet Geolocation: Evasion and Counterevasion | ACM Computing Surveys |
2009
|
Y. Liu W. Shen H.J. Wang Q. Yu Y. Zhang |
Mining the Web and the Internet for Accurate IP Address Geolocations | IEEE Conference on Computer Communications (INFOCOM) |
2009
|
M.A. Kaafar P. Manils D. Perito |
Geolocalization of proxied services and its application to fast-flux hidden servers | IMC |
2009
|
J.R. Lorch |
Matchmaking for online games and other latency-sensitive P2P systems | Computer Communication Review |
2009
|
E. Katz-Bassett T. Anderson A. Krishnamurthy A. Venkataramani |
iPlane Nano: path prediction for peer-to-peer applications | Proc. USENIX symp. on Networked systems design and implementation (NSDI) |
2008
|
B. Gueye S. Uhlig |
Assessing the geographic resolution of exhaustive tabulation for geolocating internet hosts | Passive and Active Network Measurement Workshop (PAM) |
2007
|
S. Uhlig S. Fdida |
Investigating the Imprecision of IP Block-based Geolocation | Passive and Active Network Measurement Workshop (PAM) |
2007
|
IP Geolocation | Internet Measurement seminar | |
2007
|
I. Stoyanov E. Gun Sirer |
Octant: A Comprehensive Framework for the Geolocalization of Internet Hosts | Symposium on Networked System Design and Implementation (NSDI) |
2006
|
J. P. John A. Krishnamurthy D. Wetherall T. Anderson Y. Chawathe |
Towards IP geolocation using delay and topology measurements | Internet Measurement Conference (IMC) |
2006
|
S. Uhlig A. Ziviani S. Fdida |
Leveraging Buffering Delay Estimation for Geolocation of Internet Hosts | International Federation for Information Processing Technical Committee 6 (IFIP-TC6) Networking Conference |
2005
|
S. Fdida J. F. de Rezende O. C. M. B. Duarte |
Improving the accuracy of measurement-based geographic location of internet hosts | Computer Networks and ISDN Systems |
2005
|
M. Vutukuru N. Feamster H. Balakrishnan |
Geographic Locality of IP Prefixes | Internet Measurement Conference (IMC) |
2004
|
S. Fdida J. F. de Rezende O. Carlos M. B. Duarte |
Toward a measurement-based geographic location service | Passive and Active Network Measurement Workshop (PAM) |
2004
|
A. Ziviani M. Crovella S. Fdida |
Constraint-based Geolocation of Internet Hosts | IEEE/ACM Transactions on Networking |
2004
|
R. Cox F. Kaashoek R. Morris |
Vivaldi: A Decentralized Network Coordinate System | SIGCOMM |
2003
|
A. Vespignani |
Scale-free behavior of the Internet global performance | European Physical Journal B |
2003
|
S. Fdida J.F. de Rezende O.C.M.B. Duarte |
Demographic placement for Internet host location | GLOBECOM |
2003
|
M. Crovella |
Virtual Landmarks for the Internet | Internet Measurement Conference (IMC) |
2003
|
S. Fdida J.F. de Rezende O.C.M.B. Duarte |
Similarity models for Internet host location | ICON |
2003
|
J.W. Byers M. Crovella I. Matta |
On the geographic location of Internet resources | Selected Areas in Communications, Volume 21 |
2001
|
L. Subramanian |
An Investigation of Geographic Mapping Techniques for Internet Hosts | SIGCOMM |
2001
|
H. Zhang |
Predicting Internet Network Distance with Coordinates-Based Approaches | IEEE Conference on Computer Communications (INFOCOM) |
1999
|
E. Nemeth |
GTrace - A Graphical Traceroute Tool | Usenix LISA |
1996
|
P. Vixie T. Goodwin I. Dickinson |
A Means for Expressing Location Information in the Domain Name System | RFC Editor |
IBGP
Year | Author(s) | Title | Publication |
2002
|
G. Wilfong |
On the Correctness of IBGP Configuration | ACM SIGCOMM |
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
IGP convergence
Year | Author(s) | Title | Publication |
2002
|
C. Chuah R. Mortier S. Bhattacharyya C. Diot |
Analysis of link failures in an IP backbone | ACM SIGCOMM Internet Measurement Workshop |
internet
Year | Author(s) | Title | Publication |
2002
|
M. Fomenkov D. J. Plummer D. Moore k. claffy |
Distance Metrics in the Internet | IEEE International Telecommunications Symposium |
IPNG
Year | Author(s) | Title | Publication |
1997
|
GSE - An Alternate Addressing Architecture for IPv6 | INTERNET DRAFT |
IPv6
Year | Author(s) | Title | Publication |
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
legal and ethical issues
Year | Author(s) | Title | Publication |
2008
|
Conducting Cybersecurity Research Legally and Ethically | LEET | |
2007
|
P. Ohm D. Grunwald |
Legal issues surrounding monitoring during network research | ACM SIGCOMM IMC |
2007
|
V. Paxson |
Issues and etiquette concerning use of shared measurement data | ACM SIGCOMM IMC |
macroscopic topology
Year | Author(s) | Title | Publication |
2001
|
k. claffy B. Huffaker D. Moore |
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
measurement
Year | Author(s) | Title | Publication |
2007
|
A. Perrig V. Paxson S. Savage |
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | ACM Conference on Computer and Communications Security (CCS) |
2003
|
B. Huffaker M. Fomenkov k. claffy |
On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
multicase
Year | Author(s) | Title | Publication |
1999
|
k. claffy E. Nemeth |
Tools to Visualize the Internet Multicast Backbone | International Networking Conference (INET) |
network failure
Year | Author(s) | Title | Publication |
2003
|
D. G. Andersen H. Balakrishnan M. F. Kaashoek |
Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
2002
|
C. Chuah R. Mortier S. Bhattacharyya C. Diot |
Analysis of link failures in an IP backbone | ACM SIGCOMM Internet Measurement Workshop |
1998
|
A. Ahuja F. Jahanian |
Experimental Study of Internet Stability and Wide-Area Backbone Failures | University of Michigan |
network testbeds
Year | Author(s) | Title | Publication |
2002
|
Report of NSF Workshop on Network Research Testbeds | NSF Workshop |
otter
Year | Author(s) | Title | Publication |
1999
|
E. Nemeth k. claffy |
Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
overview
Year | Author(s) | Title | Publication |
2001
|
CAIDA: Visualizing the Internet | CAIDA | |
1999
|
S. McCreary |
Internet measurement and data analysis: passive and active measurement | American Statistical Association |
1999
|
Internet measurement and data analysis: topology, workload, performance and routing statistics | NAE Workshop |
path analysis
Year | Author(s) | Title | Publication |
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
path visualization
Year | Author(s) | Title | Publication |
2004
|
M. Luckie B. Huffaker |
Identifying IPv6 Network Problems in the Dual-Stack World | ACM SIGCOMM |
policy
Year | Author(s) | Title | Publication |
2001
|
G. Huntoon k. claffy |
Traffic dynamics testbed | Large Scale Networking (LSN) Workshop |
2000
|
Measuring the Internet | CAIDA | |
1999
|
T. Monk D. McRobb |
Internet Tomography | CAIDA |
1998
|
Comments by CAIDA concerning the FCC's review of the acquisition of MCI Communications Corp. by Worldcom, Inc. | CAIDA | |
1997
|
T. Monk |
What's next for Internet data analysis? Status and challenges facing the community | CAIDA |
1997
|
k. claffy |
Internet data acquisition and analysis: Status and next steps | CAIDA |
1996
|
k. claffy |
Geographic addressing reconsidered | Coordination and Administration of the Internet Workshop |
1996
|
k. claffy |
Address administration in IPv6 | IEEE Symposium on Information Visualization |
1996
|
Cooperative Association for Internet Data Analysis | CAIDA | |
1996
|
k. claffy |
Cooperation in Internet data acquisition and analysis | Coordination and Administration of the Internet Workshop |
1996
|
S. Bradner k. claffy |
In whose domain: name service in adolescence | Coordination and Administration of the Internet Workshop |
1996
|
T. Salo |
Internet Exchanges: Policy-Driven Evolution | Coordination and Administration of the Internet Workshop |
1996
|
'But some data is worse than others': Measurement of the global Internet | CAIDA | |
1995
|
H.-W. Braun |
Post-NSFNET statistics collection | International Networking Conference (INET) |
1994
|
H.-W. Braun k. claffy S. Wolff |
Mitigating the coming Internet crunch: multiple service levels via Precedence | CAIDA |
1994
|
B. Chinoy k. claffy |
Applied Network Research: 1994 annual status report | CAIDA |
1993
|
H.-W. Braun P. Ford |
NSF implementation plan for interim NREN | Journal on High Speed Networking |
1993
|
B. Chinoy k. claffy G. Polyzos |
1993 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
1993
|
H.-W. Braun G. Polyzos |
Long-term traffic aspects of the NSFNET | International Networking Conference (INET) |
1993
|
k. claffy |
Network analysis issues for a public Internet | Public Access to the Internet, A Harvard JFK School Workshop |
1993
|
k. claffy |
Network analysis in support of Internet policy requirements | International Networking Conference (INET) |
1992
|
B. Chinoy k. claffy G. Polyzos |
1992 annual report of the research progress of the Applied Network Research (ANR) group at SDSC | CAIDA |
reactive routing
Year | Author(s) | Title | Publication |
2003
|
D. G. Andersen H. Balakrishnan M. F. Kaashoek |
Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
route flap damping
Year | Author(s) | Title | Publication |
2002
|
R. Govindan G. Varghese R. H. Katz |
Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
route instability
Year | Author(s) | Title | Publication |
2002
|
J. Wang Z. Xiao Y. Zhang |
BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
1999
|
G. R. Malan F. Jahanian |
Origins of Internet Routing Instability | IEEE INFOCOM |
1998
|
G. R. Malan F. Jahanian |
Internet Routing Instability | IEEE/ACM Transactions on Networking |
router behavior
Year | Author(s) | Title | Publication |
2002
|
X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang |
Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
2001
|
R. Govindan J. Heidemann |
An Empirical Study of Router Response to Large BGP Routing Table Load | USC/Information Sciences Institute |
router performance
Year | Author(s) | Title | Publication |
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
2001
|
Internet Core Router Test | Light Reading |
routing
Year | Author(s) | Title | Publication |
2003
|
D. G. Andersen H. Balakrishnan M. F. Kaashoek |
Measuring the Effects of Internet Path Faults on Reactive Routing | ACM SIGMETRICS |
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
2003
|
A. Broido k. claffy |
On Third-party Addresses in Traceroute Paths | Passive and Active Measurement Conference (PAM) |
2003
|
A. Broido k. claffy |
Traceroute and BGP AS Path Incongruities | CAIDA |
2002
|
D. Wetherall T. Anderson |
Understanding BGP Misconfiguration | ACM SIGCOMM |
2002
|
G. Wilfong |
On the Correctness of IBGP Configuration | ACM SIGCOMM |
2002
|
G. Wilfong |
Analysis of the MED Oscillation Problem in BGP | IEEE International Conference on Network Protocols (ICNP) |
2002
|
X. Zhao D. Pei R. Bush D. Massey A. Mankin S. F. Wu L. Zhang |
Observation and Analysis of BGP Behavior Under Stress | ACM SIGCOMM Internet Measurement Workshop |
2002
|
First analysis of the Beacon data | IEPG meeting, Atlanta, GA | |
2002
|
J. Wang Z. Xiao Y. Zhang |
BGP Routing Stability of Popular Destinations | ACM SIGCOMM Internet Measurement Workshop |
2002
|
N. Feamster S. Bauer H. Balakrishnan |
Topology Inference from BGP Routing Dynamics | ACM SIGCOMM Internet Measurement Workshop |
2002
|
O. Ben-Shalom A. Bremler-Barr |
On the Structure and Application of BGP Policy Atoms | ACM SIGCOMM Internet Measurement Workshop |
2002
|
R. Mahajan D. Wetherall |
Measuring ISP Topologies with Rocketfuel | ACM SIGCOMM |
2002
|
R. Govindan G. Varghese R. H. Katz |
Route Flap Damping Exacerbates Internet Routing Convergence | ACM SIGCOMM |
2002
|
What is the Sound of One Route Flapping? | Dartmouth Summer Workshop | |
2002
|
X. Zhao L. Wang D. Massey A. Mankin S. Wu L. Zhang |
Improving BGP Convergence Through Consistency Assertions | IEEE INFOCOM |
2001
|
A. Ahuja R. Wattenhofer V. Srinivasan |
The Impact of Internet Policy and Topology on Delayed Routing Convergence | IEEE INFOCOM |
2000
|
A. Ahuja A. Bose F. Jahanian |
An Experimental Study of Internet Routing Convergence | Microsoft Research |
2000
|
On inferring autonomous system relationships in the Internet | IEEE Global Internet Symposium | |
1999
|
A. Bremler-Barr S. Har-Peled |
Routing with a Clue | ACM SIGCOMM |
1999
|
G. R. Malan F. Jahanian |
Origins of Internet Routing Instability | IEEE INFOCOM |
1998
|
G. R. Malan F. Jahanian |
Internet Routing Instability | IEEE/ACM Transactions on Networking |
1997
|
GSE - An Alternate Addressing Architecture for IPv6 | INTERNET DRAFT |
routing/topology
Year | Author(s) | Title | Publication |
2004
|
D. Johnson J. Rexford J. Wang R. Katz |
Scalable and Accurate Identification of AS-level Forwarding Paths | IEEE INFOCOM |
2003
|
J. Rexford J. Wang R. H. Katz |
Towards an Accurate AS-Level Traceroute Tool | ACM SIGCOMM |
2002
|
D. Plummer D. Moore k. claffy |
Topology discovery by active probing | Symposium on Applications and the Internet (SAINT) |
2002
|
k. claffy E. Nemeth |
Internet Expansion, Refinement, and Churn | European Transactions on Telecommunications |
2001
|
k. claffy |
Internet topology: connectivity of IP graphs | SPIE International symposium on Convergence of IT and Communication |
2001
|
k. claffy |
Complexity of global routing policies | CAIDA |
2001
|
k. claffy |
Analysis of RouteViews BGP data: policy atoms | Network Resource Data Management Workshop |
2000
|
ISMA Winter 2000 Workshop - Final Report | Internet Statistics and Metrics Analysis (ISMA) | |
2000
|
M. Fomenkov D. Moore E. Nemeth k. claffy |
Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
1993
|
H.-W. Braun G. Polyzos |
Measurement considerations for assessing unidirectional latencies | CAIDA |
1993
|
P. Ford Y. Rekhter |
CIDR and the evolution of the Internet | International Networking Conference (INET) |
1992
|
Dynamics of Internet routing information | CAIDA | |
1992
|
H.-W. Braun |
The National Science Foundation Network | CAIDA |
1992
|
Redesign and extension of multi-agency interconnection point | CAIDA | |
1992
|
B. Chinoy |
Injecting inter-autonomous system routes into intra-autonomous system routing: a performance analysis | CAIDA |
security
Year | Author(s) | Title | Publication |
2008
|
Toward a Culture of Cybersecurity Research | University of California, Berkeley | |
2007
|
A. Perrig V. Paxson S. Savage |
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants | ACM Conference on Computer and Communications Security (CCS) |
2006
|
Googling Considering Harmful | New Security Paradigms Workshop (NSPW) | |
2003
|
V. Paxson S. Savage C. Shannon S. Staniford N. Weaver |
Inside the Slammer Worm | IEEE Security and Privacy journal |
2003
|
S. W. Smith M. Zhao |
Efficient Security for BGP Route Announcements | Dartmouth College, Computer Science |
2003
|
C. Shannon G. Voelker S. Savage |
Internet Quarantine: Requirements for Containing Self-Propagating Code | IEEE INFOCOM |
2003
|
V. Paxson S. Savage C. Shannon S. Staniford N. Weaver |
The Spread of the Sapphire/Slammer Worm | CAIDA |
2002
|
C. Shannon J. Brown |
Code-Red: a case study on the spread and victims of an Internet worm | ACM SIGCOMM Internet Measurement Workshop |
2002
|
Enhancing the Security of Name Resolution and Inter-Domain Internet Routing | ISP BGPDNS WG | |
2001
|
G. Voelker S. Savage |
Inferring Internet Denial-of-Service Activity | USENIX Security Symposium |
1995
|
A Gross H.-W. Braun |
Measured interference of security mechanisms with network performance | International Networking Conference (INET) |
server placement
Year | Author(s) | Title | Publication |
2003
|
B. Huffaker M. Fomenkov k. claffy |
On the problem of optimization of DNS root servers' placement | Passive and Active Measurement Conference (PAM) |
skitter
Year | Author(s) | Title | Publication |
2001
|
k. claffy B. Huffaker D. Moore |
Macroscopic Internet Topology and Performance Measurements From the DNS Root Name Servers | USENIX LISA |
2001
|
M. Fomenkov D. Moore k. claffy |
Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance | Passive and Active Measurement Conference (PAM) |
2000
|
M. Fomenkov D. Moore E. Nemeth k. claffy |
Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
software/tools
Year | Author(s) | Title | Publication |
2003
|
N. Brownlee |
Integrating Active Methods and Flow Meters - an implementation using NeTraMet | Passive and Active Measurement Conference (PAM) |
2001
|
K. Keys R. Koga E. Lagache k. claffy |
CoralReef software suite as a tool for system and network administrators | USENIX LISA |
2001
|
Using NeTraMet for Production Traffic Measurement | Integrated Management Strategies for the New Millenium | |
2001
|
D. Moore R. Koga E. Lagache M. Tesch k. claffy |
The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
2001
|
D. Moore R. Koga E. Lagache M. Tesch k. claffy |
The Architecture of CoralReef: an Internet Traffic Monitoring Software Suite | Passive and Active Measurement Conference (PAM) |
2001
|
M. Murray |
Streams, Flows and Torrents | Passive and Active Measurement Conference (PAM) |
2000
|
R. Periakaruppan J. Donohoe k. claffy |
Where in the world is netgeo.caida.org? | International Networking Conference (INET) |
1999
|
E. Nemeth |
GTrace - A Graphical Traceroute Tool | USENIX LISA |
1999
|
E. Nemeth k. claffy |
Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
1999
|
k. claffy E. Nemeth |
Tools to visualize the Internet multicast backbone | International Networking Conference (INET) |
topology
Year | Author(s) | Title | Publication |
2003
|
S. Jamin W. Willinger |
Internet Connectivity at the AS-level: An Optimization-Driven Modeling Approach | ACM SIGCOMM Workshop on MoMeTools |
traceroute
Year | Author(s) | Title | Publication |
2004
|
D. Johnson J. Rexford J. Wang R. Katz |
Scalable and Accurate Identification of AS-level Forwarding Paths | IEEE INFOCOM |
2003
|
J. Rexford J. Wang R. H. Katz |
Towards an Accurate AS-Level Traceroute Tool | ACM SIGCOMM |
2003
|
A. Broido k. claffy |
On Third-party Addresses in Traceroute Paths | Passive and Active Measurement Conference (PAM) |
2003
|
A. Broido k. claffy |
Traceroute and BGP AS Path Incongruities | CAIDA |
traffic classification
Year | Author(s) | Title | Publication |
2009
|
W. de Donato A. Pescape G. Ventre |
TIE: a Community-oriented Traffic Classification Platform | International Workshop on Traffic Monitoring and Analysis (TMA) |
2009
|
J.-L. Costeux G. Urvoy-Keller T. En-Najjary |
Challenging Statistical Classification for Operational Usage: the ADSL Case | ACM SIGCOMM IMC |
2009
|
A. Feldmann V. Paxson M. Allman |
On Dominant Characteristics of Residential Broadband Internet Traffic | ACM SIGCOMM IMC |
2008
|
W. de Donato A. Pescape P. Salvo Rossi |
Classification of Network Traffic via Packet-Level Hidden Markov Models | IEEE GLOBECOM |
2008
|
K. Fukuda H. Esaki A. Kato |
Observing Slow Crustal Movement in Residential User Traffic | ACM CoNEXT |
2008
|
G. Armitage |
A Survey of Techniques for Internet Traffic Classification Using Machine Learning | IEEE Communications Surveys and Tutorials |
2008
|
S. Tafvelin |
Heuristics to Classify Internet Backbone Traffic based on Connection Patterns | International Conference on Information Networking (ICOIN) |
2008
|
M. Crotti F. Gringoli L. Salgarelli |
Tunnel Hunter: Detecting Application-Layer Tunnels with Statistical Fingerprinting | Computer Networks |
2008
|
P. Pappu M. Faloutsos |
Graption: Automated Detection of P2P Applications Using Traffic Dispersion Graphs | Tech Report |
2008
|
F. Gringoli L. Salgarelli |
A Preliminary Look at the Privacy of SSH Tunnels | IEEE International Conference on Communications (ICC) |
2008
|
D. Orincasy S. Malomsoky I. Szabo |
On the Validation of Traffic Classification Algorithms | Passive and Active Measurement Conference (PAM) |
2008
|
Y. Won M. Hong, J. Kim |
Towards Automated Application Signature Generation | IEEE/IFIP Network Operations and Management Symposium (NOMS) |
2008
|
T. Dang A. Gefferth S. Monlnar |
Flow Analysis of Internet Traffic: World Wide Web versus Peer-to-Peer | Systems and Computers in Japan |
2008
|
S. Tafvelin T. Olovsson |
Trends and Differneces in Connections Behavior within Classes of Internet Backbone Traffic | Passive and Active Measurement Conference (PAM) |
2007
|
P. Pappu M. Faloutsos M. Mitzenmacher S. Singh G. Varghese |
Network Traffic Analysis using Traffic Dispersion Graphs (TDGs): Techniques and Hardware Implementation | University of California, Riverside |
2007
|
J. Heidemann C. Papadopoulos J. Pepin |
Estimating P2P Traffic Volume at USC | USC/Information Sciences Institute |
2007
|
A. Manhanti M. Arlitt I. Cohen C. Williamson |
Offline/realitme Traffic Classification Using Semi-supervised Learning | Perform Eval |
2007
|
K. Claffy M. Fomenkova N. Browlee D. Barman M. Faloutsos |
Comparison of Internet Traffic Classification Tools | IMRG WACI |
2007
|
S. Tafvelin |
Analysis of Internet Backbone Traffic and Header Anomalies Observed | ACM SIGCOMM IMC |
2007
|
M. Reiter |
Hit-list worm detection and bot identification in large networks using protocol graphs | RAID |
2007
|
M. Dusi F. Gringoli L. Salgarelli |
Traffic Classification through Simple Statistical Fingerprinting | ACM SIGCOMM |
2007
|
M. Mellia M. Meo D. Rossi P. Tofanelli |
Revealing Skype Traffic: when randomness plays with you | ACM SIGCOMM |
2007
|
I. Szabo D. Orincasy |
Accurate Traffic Classification | WoWMoM |
2007
|
A. Manhanti M. Arlitt I. Cohen C. Williamson |
Identifying and Discrimination between Web and Peer-to-Peer Traffic in the Network Core | World Wide Web (WWW) Conference |
2007
|
J. Heidemann C. Papadopoulos |
Inherent Behaviors for On-Line Detection of Peer-to-Peer Sharing | IEEE Global Internet Symposium |
2007
|
K. Papgiannaki N. Taft M. Faloutso |
Profiling the End Host | Passive and Active Measurement Conference (PAM) |
2007
|
R. Teixeira |
Early Recognition of Encrypted Application | Passive and Active Measurement Conference (PAM) |
2006
|
F. Monrose G. Masson |
On Inferring Application Protocol Behaviors in Encrypted Network Traffic | Journal of Machine Learning Research |
2006
|
M. Polychronakis S. Antonatos E. Markatos S. Ubik |
Appmon: An Application for Accurate per Application Network Traffic Characterization | BroadBand Europe |
2006
|
A. Mahanti M. Arlitt |
Internet Traffic Identification using Machine Learning | IEEE GLOBECOM |
2006
|
K. Levchenko C. Kreibich S. Savage G. Voelker |
Unexpected Means of Protocol Inference | ACM SIGCOMM IMC |
2006
|
R. Teixeira . Akodjenou A. Soule K. Salamatian |
Traffic Classification on the fly | ACM SIGCOMM Computer Communication Review |
2006
|
C. Williamson |
A Longitudinal Study of P2P Traffic Classification | MASCOTS |
2006
|
S. Zander G. Armitage |
A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification | ACM SIGCOMM |
2006
|
M. Arlitt A. Mahanti |
Traffic Classification Using Clustering Algorithms | ACM SIGCOMM |
2006
|
P. Mavrommatiss |
Identifying Known and Unknown Peer-to-Peer Traffic | IEEE NCA |
2006
|
R. Teixeira K. Salamatian |
Early Application Identification | ACM CoNEXT |
2006
|
T. Dang A. Gefferth S. Monlnar |
Identification and Analysis of Peer-to-Peer Traffic | Journal of Communications |
2005
|
D. Zuev M. Crogan |
Discriminators for Use in Flow-based Classification | Intel Research, Cambridge |
2005
|
A. Soule M. Jeannin K. Salamatian |
Blind Application Recognition Through Behavioral Classification | Paris |
2005
|
Chang F. Chi Feng W. Walpole J. |
A Traffic Characterization of Popular on-line Games | IEEE/ACM Transactions on Networking |
2005
|
M. Crovella C. Diot |
Mining Anomalies Using Traffic Feature Distributions | ACM SIGCOMM |
2005
|
K. Papagiannaki M. Faloutsos |
BLINC Multilevel Traffic Classification in the Dark | ACM SIGCOMM |
2005
|
S. Sen O. Spatscheck D. Wang |
Acas: Automated Construction of Application Signatures | ACM SIGCOMM |
2005
|
Zuev D. |
Internet Traffic Classification Using Bayesian Analysis Techniques | ACM SIGMETRICS |
2005
|
T. Nguyen G. Armitage |
Self-learning IP Traffic Classification based on Statistical Flow Characteristics | Passive and Active Measurement Conference (PAM) |
2005
|
J. Costeux P. Brown |
Analysis of Peer-to-Peer Traffic on ADSL | Passive and Active Measurement Conference (PAM) |
2005
|
Moore A. |
Traffic Classification using a Statistical Approach | Passive and Active Measurement Conference (PAM) |
2004
|
A. Broido N. Brownless K. Claffy M. Faloutsos |
Is P2P Dying or Just Hiding | IEEE GLOBECOM |
2004
|
J. Wang |
Analyzing Peer-to-Peer Traffic across Large Networks | IEEE/ACM Transactions on Networking |
2004
|
O. Sen N. Duffield |
Class-of-service Mapping for QoS | ACM SIGCOMM IMC |
2004
|
Z. Zhang S. Bhattacharyya |
Profiling Internet Backbone Traffic: Behavior Models and Applications | ACM SIGCOMM |
2004
|
A. Broido M. Faloutsos K. Claffy |
Transport Layer Identification of P2p Traffic | ACM SIGCOMM |
2004
|
K. Salamatian N. Taft R. Emilion K. Papagiannaki |
Flow Classification by Histograms or How to Go on Safari in the Internet | ACM SIGMETRICS |
2004
|
O. Spatscheck D. Wang |
Accurate Scalable In-Network Identification of P2P Traffic | World Wide Web (WWW) Conference |
2004
|
M. Hall Brunskill J. Lorier P. |
Flow Clustering Using Machine Learning Techniques | Passive and Active Measurement Conference (PAM) |
2003
|
S. Savage G. Vargheses |
Automatically Inferring Patterns of Resources Consumption in Network Traffic | ACM SIGCOMM |
2003
|
A. Wichmann A. Feldmann |
An Analysis of Internet Chat Systems | ACM SIGCOMM |
2003
|
M. Poletto J. Guttag F. Kaashoek |
Role Classification of Hosts within Enterprise Networks based on Connection Patterns | USENIX |
2003
|
S. Moon B. Lyles C. Cotton M. Khan D. Moll R. Rockell T. Seely |
Packet-level Traffic Measurements from the Sprint IP Backbone | IEEE Network |
2003
|
L. Ertoz V. Kumar A. Ozgur J. Srirvastava |
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection | SIAM |
2002
|
S. Sen C. Kalmanek |
Streaming Video Traffic: Characterization and Network Impact | WCW |
2001
|
S. Floyd |
Identifying the TCP Behavior of Web Servers | ACM SIGCOMM |
2001
|
K Papagiannaki |
Toward the Accurate Identification of Network Applications | Passive and Active Measurement Conference (PAM) |
1999
|
Snort Lightweight Intrusion Detection for Networks | USENIX LISA |
traffic measurement
Year | Author(s) | Title | Publication |
2004
|
K. Keys D. Moore G. Varghese |
Building a Better NetFlow | ACM SIGCOMM |
2004
|
Y. Hyun R. Gao k. claffy |
Their share: diversity and disparity in IP traffic | Passive and Active Measurement Conference (PAM) |
2004
|
M. Molle M. Faloutsos A. Broido |
A Nonstationary Poisson View of Internet Traffic | IEEE INFOCOM |
2003
|
E. Nemeth k. claffy |
Spectroscopy of DNS Update Traffic | ACM SIGMETRICS |
2003
|
E. Nemeth k. claffy |
Spectroscopy of Private DNS Update Sources | IEEE Workshop on Internet Applications (WIAPP) |
2003
|
N. Brownlee |
Integrating Active Methods and Flow Meters - an implementation using NeTraMet | Passive and Active Measurement Conference (PAM) |
2003
|
K. Keys D. Moore k. claffy |
Longitudinal study of Internet traffic from 1998-2001: a view from 20 high performance sites | CAIDA |
2003
|
R. King E. Nemeth k. claffy |
Radon Spectroscopy of Inter-Packet Delay | IEEE High-Speeding Networking Workshop (HSN) |
2003
|
k. claffy |
Wide-Area IP Multicast Traffic Characterization | IEEE Network |
2002
|
D. Moore k. claffy |
Beyond Folklore: Observations on Fragmented Traffic | IEEE/ACM Transactions on Networking |
2002
|
k. claffy |
Understanding Internet Traffic Streams: Dragonflies and Tortoises | CAIDA |
2001
|
Using NeTraMet for Production Traffic Measurement | Integrated Management Strategies for the New Millenium | |
2001
|
k. claffy |
Measuring the Immeasurable: Global Internet Measurement Infrastructure | Passive and Active Measurement Conference (PAM) |
2001
|
k. claffy M. Murray E. Nemeth |
Methodology for passive analysis of a university Internet link | Passive and Active Measurement Conference (PAM) |
2000
|
K. Almeroth k. claffy |
A scalable architecture for monitoring and visualizing multicast statistics | Distributed Systems: Operations and Management |
2000
|
k. claffy |
Trends in wide area IP traffic patterns - A view from Ames Internet Exchange | ITC Specialist Seminar |
2000
|
R. Fulton |
Kawaihiko and the third-quartile day [traffic management] | CAIDA |
1999
|
k. claffy E. Nemeth |
Tools to visualize the Internet multicast backbone | International Networking Conference (INET) |
1999
|
ISMA passive measurement data and analysis, workshop report | Internet Statistics and Metrics Analysis (ISMA) | |
1998
|
G. Miller K. Thompson |
The nature of the beast: Recent traffic measurements from an Internet backbone | International Networking Conference (INET) |
1996
|
E. Hoffman k. claffy B. Fenner |
Visualizing the global topology of the MBone | IEEE Symposium on Information Visualization |
1996
|
k. claffy |
A survey of Internet statistics / metrics activities | CAIDA |
1995
|
H.-W. Braun G. Polyzos |
A parameterizable methodology for Internet traffic flow profiling | CAIDA |
1994
|
Internet traffic characterization. | University of California, San Diego | |
1994
|
G. Polyzos |
A Time-Series Model of Long-Term Traffic on the NSFNET Backbone | IEEE International Conference on Communications (ICC) |
1994
|
H.-W. Braun G. Polyzos |
Tracking long-term growth of the NSFNET | CAIDA |
1994
|
H.-W. Braun G. Polyzos |
Internet traffic flow profiling | CAIDA |
1993
|
k. claffy G. Polyzos |
A framework for flow-based accounting on the Internet | IEEE Singapore International Conference on Networks (SICON'93) |
1993
|
H.-W. Braun G. Polyzos |
Application of sampling methodologies to wide-area network traffic characterization | ACM SIGCOMM |
1993
|
H.-W. Braun G. Polyzos |
Traffic characteristics of the T1 NSFNET backbone | IEEE INFOCOM |
1992
|
k. claffy O. Nakamura J. Murai |
An analysis of international academic research network traffic between Japan and other nations | International Networking Conference (INET) |
visualization
Year | Author(s) | Title | Publication |
2001
|
k. claffy E. Nemeth |
DNS Root/gTLD Performance Measurements | USENIX LISA |
2001
|
M. Fomenkov D. Moore k. claffy |
Macroscopic analyses of the infrastructure: measurement and visualization of Internet connectivity and performance | Passive and Active Measurement Conference (PAM) |
2000
|
M. Fomenkov D. Moore E. Nemeth k. claffy |
Measurements of the Internet topology in the Asia-Pacific Region | International Networking Conference (INET) |
1999
|
E. Nemeth k. claffy |
Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
1999
|
E. Nemeth k. claffy |
Otter: A general-purpose network visualization tool | International Networking Conference (INET) |
1999
|
k. claffy E. Nemeth |
Tools to visualize the Internet multicast backbone | International Networking Conference (INET) |
1999
|
k. claffy E. Nemeth |
Tools to Visualize the Internet Multicast Backbone | International Networking Conference (INET) |
1999
|
Report from the ISMA Network Visualization Workshop | Internet Statistics and Metrics Analysis (ISMA) | |
1998
|
J. Jung E. Nemeth D. Wessels k. claffy |
Visualization of the growth and topology of the NLANR caching hierarchy | International WWW Caching Workshop |
1998
|
J. Jung D. Wessels k. claffy |
Visualization of the Growth and Topology of the NLANR Caching Hierarchy | International WWW Caching Workshop |
1996
|
E. Hoffman k. claffy B. Fenner |
Visualizing the global topology of the MBone | IEEE Symposium on Information Visualization |
www caching
Year | Author(s) | Title | Publication |
1998
|
J. Jung D. Wessels k. claffy |
Visualization of the Growth and Topology of the NLANR Caching Hierarchy | International WWW Caching Workshop |