index - Traffic Monitoring and Analysis
   


Full Text Documents

16

Search


Table of Contents
Traffic Monitoring and Analysis
Moritz Steiner, Pere Barlet-Ros, Olivier Bonaventure (Eds.)
Front Matter

Measurement Tools and Methods


Youtube Revisited: On the Importance of Correct Measurement Methodology
Ossi Karkulahti, Jussi Kangasharju
17-30
Zen and the Art of Network Troubleshooting: A Hands on Experimental Study
François Espinet, Diana Joumblatt, Dario Rossi
31-45

Mobile and Wireless


Vivisecting WhatsApp in Cellular Networks: Servers, Flows, and Quality of Experience
Pierdomenico Fiadino, Mirko Schiavone, Pedro Casas
49-63
Device-Specific Traffic Characterization for Root Cause Analysis in Cellular Networks
Peter Romirer-Maierhofer, Mirko Schiavone, Alessandro D’alconzo
64-78
Tracking Middleboxes in the Mobile World with TraceboxAndroid
Valentin Thirion, Korian Edeline, Benoit Donnet
79-91

Web


Assessing Affinity Between Users and CDN Sites
Xun Fan, Ethan Katz-Bassett, John Heidemann
95-110
The Online Tracking Horde: A View from Passive Measurements
Hassan Metwalley, Stefano Traverso, Marco Mellia, Stanislav Miskovic, Mario Baldi
111-125
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs
Tatsuya Mori, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Keisuke Ishibashi, Shigeki Goto
126-139

Security


Monitoring Internet Censorship with UBICA
Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad Qaisar
143-157
How Dangerous Is Internet Scanning?
Elias Raftopoulos, Eduard Glatz, Xenofontas Dimitropoulos, Alberto Dainotti
158-172
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks
Johann Schlamp, Ralph Holz, Oliver Gasser, Andreas Korsten, Quentin Jacquemart, Georg Carle, Ernst Biersack
173-187
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire
Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas Schmidt, Georg Carle
188-201

New Protocols


DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks
Timm Böttger, Lothar Braun, Oliver Gasser, Felix Eye, Helmut Reiser, Georg Carle
205-218
Measuring DANE TLSA Deployment
Liang Zhu, Duane Wessels, Allison Mankin, John Heidemann
219-232
A First Look at Real Multipath TCP Traffic
Benjamin Hesmans, Hoang Tran-Viet, Ramin Sadre, Olivier Bonaventure
233-246

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/