ebook img

Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings PDF

376 Pages·2015·20.464 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Passive and Active Measurement: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings

Jelena Mirkovic Yong Liu (Eds.) 5 Passive and Active 9 9 8 S Measurement C N L 16th International Conference, PAM 2015 New York, NY, USA, March 19–20, 2015 Proceedings 123 Lecture Notes in Computer Science 8995 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, Lancaster, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Zürich, Switzerland John C. Mitchell Stanford University, Stanford, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Dortmund, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbrücken, Germany More information about this series at http://www.springer.com/series/7411 Jelena Mirkovic Yong Liu (Eds.) (cid:129) Passive and Active Measurement 16th International Conference, PAM 2015 – New York, NY, USA, March 19 20, 2015 Proceedings 123 Editors Jelena Mirkovic Yong Liu InformationSciences Institute New YorkUniversity Universityof SouthernCalifornia New York, NY Marina DelRey, CA USA USA ISSN 0302-9743 ISSN 1611-3349 (electronic) Lecture Notesin ComputerScience ISBN 978-3-319-15508-1 ISBN 978-3-319-15509-8 (eBook) DOI 10.1007/978-3-319-15509-8 LibraryofCongressControlNumber:2015931068 SpringerChamHeidelbergNewYorkDordrechtLondon ©SpringerInternationalPublishingSwitzerland2015 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade. Printedonacid-freepaper SpringerInternationalPublishingAGSwitzerlandispartofSpringerScience+BusinessMedia (www.springer.com) Preface We are excited to welcome you to the Passive and Active Measurement Conference (PAM) 2015 in New York, NY, USA. PAM seeks to bring together the network research and operations communities, to consider network measurement and analysis techniques, particularly those in the earlier stages of research. PAM’s focus is on research and practical applications of network measurement, measurement of networked applications, content distribution networks, online social networks,overlaynetworks,andmore.Measurementtechnologyisneededatalllayers of the stack: for power profiling of hardware components; at the MAC/network/ transportlayers;aswellasupthestackforapplicationprofilingandeventocollectuser feedback. Measurement technologies are being designed for the digital home, resi- dential access networks, wireless and mobile access, enterprise, ISP, and data center networks. PAM encourages a broad range of submissions across these recently important topics. We aim to understand the role that measurement techniques can play in net- workedenvironmentsandapplications,acrossdifferentlayers,andhowtheycanserve ascriticalbuildingblocksforbroadermeasurementneeds.Atthesametime,PAMalso continues with its original goal, to expand the techniques, tools, and practical uses of network measurement technology. Submission Statistics This year, PAM has received 100 submissions. Each submission was reviewed by at least three reviewers, judging its technical content, intellectual merit, and clarity of writing. After the initial review process, the reviewers discussed all submissions until they reached consensus to accept or reject. There were 27 accepted papers. March 2015 Jelena Mirkovic Yong Liu Organization PAM 2015 was organized and supported by the following committees. Conference Organizers Yong Liu (General Chair) New York University, USA Jelena Mirkovic University of Southern California/Information (Program Chair) Sciences Institute, USA Anyi Wang (Publicity Chair) New York University, USA Steering Committee Nevil Brownlee University of Auckland, New Zealand Rocky K.C. Chang Hong Kong Polytechnic University, Hong Kong Michalis Faloutsos University of New Mexico, USA Aleksandar Kuzmanovic Northwestern University, USA Fabio Ricciato University of Salento, Italy Matthew Roughan University of Adelaide, Australia Nina Taft Google, USA Program Committee Emile Aben RIPE NCC, The Netherlands Pere Barlet-Ros UPC BarcelonaTech/Talaia Networks, Spain Genevieve Bartlett University of Southern California/Information Sciences Institute, USA Robert Beverly Naval Postgraduate School, USA Rocky K.C. Chang Hong Kong Polytechnic University, Hong Kong Italo Cunha Universidade Federal de Minas Gerais, Brazil Alberto Dainotti CAIDA,UniversityofCalifornia,SanDiego,USA Alessandro D'Alconzo Forschungszentrum Telekommunikation Wien, Austria Xenofontas Dimitropoulos FORTH, Greece and ETH Zurich, Switzerland Kensuke Fukuda National Institute of Informatics, Japan Dongsu Han KAIST, Korea Gentian Jakllari University of Toulouse, France Thomas Karagiannakis MSR, UK Ethan Katz-Bassett University of Southern California, USA Amir Khakpour Verizon EdgeCast, USA Youngseok Lee Chungnam National University, Korea Richard Nelson The University of Waikato, New Zealand Maria Papadopouli University of Crete and FORTH, Greece Gyan Ranjan Narus, Inc. USA VIII Organization Dario Rossi Télécom ParisTech, France Subhabrata Sen AT&T Labs Research, USA Affan Syed FAST-NU, Pakistan Xuetao Wei University of Cincinnati, USA Udi Weinsberg Facebook, USA Contents DNS and Routing (cid:1)Open Resolvers: Understanding the Origins of Anomalous Open DNS Resolvers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Andrew J. Kaizer and Minaxi Gupta CharacterizingOptimalDNSAmplificationAttacksandEffectiveMitigation ... 15 Douglas C. MacFarland, Craig A. Shue, and Andrew J. Kalafut Measuring BGP Route Origin Registration and Validation . . . . . . . . . . . . . . 28 Daniele Iamartino, Cristel Pelsser, and Randy Bush On the Diversity of Interdomain Routing in Africa . . . . . . . . . . . . . . . . . . . 41 Rodérick Fanou, Pierre Francois, and Emile Aben Mobile and Cellular AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Stanislav Miskovic, Gene Moo Lee, Yong Liao, and Mario Baldi Uncovering the Footprints of Malicious Traffic in Cellular Data Networks. . . 70 Arun Raghuramu, Hui Zang, and Chen-Nee Chuah Characterizing Instant Messaging Apps on Smartphones . . . . . . . . . . . . . . . 83 Li Zhang, Chao Xu, Parth H. Pathak, and Prasant Mohapatra Do Mobile Data Plans Affect Usage? Results from a Pricing Trial with ISP Customers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Carlee Joe-Wong, Sangtae Ha, Soumya Sen, and Mung Chiang IPv6 IPv6 AS Relationships, Cliques, and Congruence . . . . . . . . . . . . . . . . . . . . 111 Vasileios Giotsas, Matthew Luckie, Bradley Huffaker, and Kc Claffy Measuring and Characterizing IPv6 Router Availability. . . . . . . . . . . . . . . . 123 Robert Beverly, Matthew Luckie, Lorenza Mosley, and Kc Claffy UAv6: Alias Resolution in IPv6 Using Unused Addresses . . . . . . . . . . . . . . 136 Ramakrishna Padmanabhan, Zhihao Li, Dave Levin, and Neil Spring X Contents Server Siblings: Identifying Shared IPv4/IPv6 Infrastructure Via Active Fingerprinting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 Robert Beverly and Arthur Berger Internet-Wide On the Power and Limitations of Detecting Network Filtering via Passive Observation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Matthew Sargent, Jakub Czyz, Mark Allman, and Michael Bailey Distilling the Internet’s Application Mix from Packet-Sampled Traffic. . . . . . 179 Philipp Richter, Nikolaos Chatzis, Georgios Smaragdakis, Anja Feldmann, and Walter Willinger Enabling Internet-Wide Deployment of Explicit Congestion Notification . . . . 193 Brian Trammell, Mirja Kühlewind, Damiano Boppart, Iain Learmonth, Gorry Fairhurst, and Richard Scheffenegger Internet Outages, the Eyewitness Accounts: Analysis of the Outages Mailing List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206 Ritwik Banerjee, Abbas Razaghpanah, Luis Chiang, Akassh Mishra, Vyas Sekar, Yejin Choi, and Phillipa Gill Transparent Estimation of Internet Penetration from NetworkObservations. . . . 220 Suso Benitez-Baleato, Nils B. Weidmann, Petros Gigis, Xenofontas Dimitropoulos, Eduard Glatz, and Brian Trammell Web and Peer-to-Peer A Quantitative Study of Video Duplicate Levels in YouTube. . . . . . . . . . . . 235 Yao Liu, Sam Blasiak, Weijun Xiao, Zhenhua Li, and Songqing Chen Measuring YouTube from Dual-Stacked Hosts . . . . . . . . . . . . . . . . . . . . . . 249 Saba Ahsan, Vaibhav Bajpai, Jörg Ott, and Jürgen Schönwälder Investigating Transparent Web Proxies in Cellular Networks . . . . . . . . . . . . 262 Xing Xu, Yurong Jiang, Tobias Flach, Ethan Katz-Bassett, David Choffnes, and Ramesh Govindan TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers . . . 277 Tai-Ching Li, Huy Hang, Michalis Faloutsos, and Petros Efstathopoulos Exploring Miner Evolution in Bitcoin Network. . . . . . . . . . . . . . . . . . . . . . 290 Luqin Wang and Yong Liu

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.