{"title":"Measuring mobile performance in the Tor network with OnionPerf","authors":"A. Custura, Iain R. Learmonth, G. Fairhurst","doi":"10.23919/TMA.2019.8784601","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784601","url":null,"abstract":"The Tor network is the largest public deployed anonymity network using the Internet. While there has been a longitudinal study into the performance of the network in progress since 2009, it has only used vantage points in data centre networks. In this paper we propose modifications to the performance measurement tool, OnionPerf, to enable its use for measuring performance from a mobile end-user’s perspective. We provide initial findings on simulated mobile networks, using two types of emulated links, using both the public Tor network and in a private test Tor network.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133551135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thomas Kobber Panum, René Rydhof Hansen, J. Pedersen
{"title":"Kraaler: A User-Perspective Web Crawler","authors":"Thomas Kobber Panum, René Rydhof Hansen, J. Pedersen","doi":"10.23919/TMA.2019.8784660","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784660","url":null,"abstract":"Adaption of technologies being used on the web is changing frequently, requiring applications that interact with the web to continuously change their ability to parse it. This has led most web crawlers to either inherent simplistic parsing capabilities, differentiating from web browsers, or use a web browser with high-level interactions that restricts observable information. We introduce Kraaler, an open source universal web crawler that uses the Chrome Debugging Protocol, enabling the use of the Blink browser engine for parsing, while obtaining protocol-level information. The crawler stores information in a database and on the file system and the implementation has been evaluated in a predictable environment to ensure correctness in the collected data. Additionally, it has been evaluated in a real-world scenario, demonstrating the impact of the parsing capabilities for data collection.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revisiting Subnet Inference WISE-ly","authors":"J. Grailet, B. Donnet","doi":"10.23919/TMA.2019.8784582","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784582","url":null,"abstract":"Since the late 90’s, the Internet topology discovery has been an attractive and important research topic, leading, among others, to multiple probing and data analysis tools developed by the research community. This paper looks at the particular problem of discovering subnets (i.e., a set of devices that are located on the same connection medium and that can communicate directly with each other at the link layer).In this paper, we first show that the use of traffic engineering policies may increase the difficulty of subnet inference. We carefully characterize those difficulties and quantify their prevalence in the wild. Next, we introduce WISE (Wide and lInear Subnet inferencE), a novel tool for subnet inference designed to deal with those issues and able to discover subnets on wide ranges of IP addresses in a linear time. Using two groundtruth networks, we demonstrate that WISE performs better than state-of-the-art tools while being competitive in terms of subnet accuracy. We also show, through large-scale measurements, that the selection of vantage point with WISE does not matter in terms of subnet accuracy. Finally, all our code (WISE, data processing, results plotting) and collected data are freely available.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121688762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud Provider’s View of EDNS Client-Subnet Adoption","authors":"Matt Calder, Xun Fan, Liang Zhu","doi":"10.23919/TMA.2019.8784530","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784530","url":null,"abstract":"Directing users to a nearby, high-performing front-end is core to the business of content delivery networks (CDNs). CDNs which use DNS to direct users to servers face the challenge of making decisions based at the LDNS-level, not based on the client’s IP address, and, in many cases, an LDNS is not representative of the clients it serves. The EDNS Client Subnet specification provides a solution by embedding a portion of the client’s IP address in the DNS query to help CDNs make better redirection decisions, but both the LDNS and authoritative resolver (CDN side) must support the standard. While there has been well-publicized adoption of Client Subnet by authoritative CDN resolvers, adoption rates across LDNSes are unknown.In this work, we examine Client Subnet adoption in LDNSes. We analyze DNS queries captured over one month from Mi-crosoft’s Azure Cloud platform. We find that adoption on the Internet is very low across ISPs but query volume is relatively high due to the popularity of public DNS services. We discover high network adoption rates in China and reveal that Chinese public DNS services deploy LDNSes deep into end-user networks.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Maier, P. Dorfinger, J. Du, Sven Gschweitl, Johannes Lusak
{"title":"Reducing Consumed Data Volume in Bandwidth Measurements via a Machine Learning Approach","authors":"Christian Maier, P. Dorfinger, J. Du, Sven Gschweitl, Johannes Lusak","doi":"10.23919/TMA.2019.8784575","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784575","url":null,"abstract":"Measurements that determine the available download and upload bandwidth of an end-user Internet connection (so-called speed tests) are typically performed by maximizing the utilization of the connection for a fixed time interval. Especially in broadband connections, such tests consume a huge amount of data volume during their execution. As a result, only a few tests can be performed per month on mobile connections with limited data volumes, since otherwise a significant portion of the volume is used for tests or additional costs are incurred. To reduce the required average data volume of these tests, we present a novel approach with a dynamic test duration based on a machine learning model. We train this model via a supervised learning process, using the recorded data of real speed tests executed by end-users in cellular 4G networks. The evaluation of the resulting method suggests that the amount of saved data volume is significant, while the deviation of the determined bandwidth (compared to a usual test with fixed duration) is negligible.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121117985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giuseppe Aceto, D. Ciuonzo, Antonio Montieri, V. Persico, A. Pescapé
{"title":"Know your Big Data Trade-offs when Classifying Encrypted Mobile Traffic with Deep Learning","authors":"Giuseppe Aceto, D. Ciuonzo, Antonio Montieri, V. Persico, A. Pescapé","doi":"10.23919/TMA.2019.8784565","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784565","url":null,"abstract":"The spread of handheld devices has led to the unprecedented growth of traffic volumes traversing both local networks and the Internet, appointing mobile traffic classification as a key tool for gathering highly-valuable profiling information, other than traffic engineering and service management. However, the nature of mobile traffic severely challenges state-of-art Machine-Learning (ML) approaches, since the quickly evolving and expanding set of apps generating traffic hinders ML-based approaches, that require domain-expert design. Deep Learning (DL) represents a promising solution to this issue, but results in higher completion times, in turn suggesting the application of the Big-Data (BD) paradigm. In this paper, we investigate for the first time BD-enabled classification of encrypted mobile traffic using DL from a general standpoint, (a) defining general design guidelines, (b) leveraging a public-cloud platform, and (c) resorting to a realistic experimental setup. We found that, while BD represents a transparent accelerator for some tasks, this is not the case for the training phase of DL architectures for traffic classification, requiring a specific BD-informed design. The experimental setup is built upon a three-dimensional investigation path in the BD adoption, namely: (i) completion time, (ii) deployment costs, and (iii) classification performance, highlighting relevant non-trivial trade-offs.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114699970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomous IoT Device Identification Prototype","authors":"Nesrine Ammar, L. Noirie, S. Tixeuil","doi":"10.23919/TMA.2019.8784517","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784517","url":null,"abstract":"In this paper, we demonstrate a prototype implementation to help identifying the types of IoT devices being connected to a home network. Our solution is based on a supervised classification algorithm (decision tree) trained on 33 IoT devices using relevant information extracted from network traffic. Our demo shows that our proposal is effective to automatically identify the types of IoT devices.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131545449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarah Wassermann, Michael Seufert, P. Casas, Li Gang, Kuang Li
{"title":"Let me Decrypt your Beauty: Real-time Prediction of Video Resolution and Bitrate for Encrypted Video Streaming","authors":"Sarah Wassermann, Michael Seufert, P. Casas, Li Gang, Kuang Li","doi":"10.23919/TMA.2019.8784589","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784589","url":null,"abstract":"The dynamic adaptation of the video quality induced by HTTP Adaptive Streaming (HAS) technology introduces new Quality of Experience (QoE) metrics beyond re-buffering. In this work we address the problem of real-time QoE monitoring of HAS, focusing on the continuous prediction of video resolution and average video bitrate, for the particular case of YouTube. Through empirical evaluations over a large video dataset, we demonstrate that it is possible to accurately predict the specific video resolution, as well as the average video bitrate, both in real time, and using a time granularity as small as one new prediction every second, not achieved by other proposals in the literature.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"30 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131575280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gioacchino Tangari, Diego Perino, A. Finamore, M. Charalambides, G. Pavlou
{"title":"Tackling Mobile Traffic Critical Path Analysis With Passive and Active Measurements","authors":"Gioacchino Tangari, Diego Perino, A. Finamore, M. Charalambides, G. Pavlou","doi":"10.23919/TMA.2019.8784636","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784636","url":null,"abstract":"Critical Path Analysis (CPA) studies the delivery of webpages to identify page resources, their interrelations, as well as their impact on the page loading latency. Despite CPA being a generic methodology, its mechanisms have been applied only to browsers and web traffic, but those do not directly apply to study generic mobile apps. Likewise, web browsing represents only a small fraction of the overall mobile traffic. In this paper, we take a first step towards filling this gap by exploring how CPA can be performed for generic mobile applications. We propose Mobile Critical Path Analysis (MCPA), a methodology based on passive and active network measurements that is applicable to a broad set of apps to expose a fine-grained view of their traffic dynamics. We validate MCPA on popular apps across different categories and usage scenarios. We show that MCPA can identify user interactions with mobile apps only based on traffic monitoring, and the relevant network activities that are bottlenecks. Overall, we observe that apps spend 60% of time and 84% of bytes on critical traffic on average, corresponding to +22% time and +13% bytes than what observed for browsing.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125266800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quentin Jacquemart, Clément Pigout, G. Urvoy-Keller
{"title":"Inferring the Deployment of Top Domains over Public Clouds using DNS Data","authors":"Quentin Jacquemart, Clément Pigout, G. Urvoy-Keller","doi":"10.23919/TMA.2019.8784472","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784472","url":null,"abstract":"Cloud technologies are becoming pervasive and available for private companies or public institutions in different flavors, mostly public cloud or private clouds. Our focus in this work is on the usage of public cloud technologies by the most popular sites in the Internet. While some studies have described the nascent landscape of public cloud computing 5 years ago, surprising little effort has been put to study the recent evolution of this domain.Using DNS data that enables us to map domains (e.g., netflix.com) and their subdomains (e.g., api.netflix.com) with the cloud providers actually used, we refresh our understanding of this ecosystem. We focus on the dominant four cloud providers, namely Amazon Web Services, Microsoft Azure, Google Cloud Computing and IBM Bluemix. We demonstrate that cloud penetration has clearly increased since 2013, reaching almost 50% of the top 1000 domains, from the Alexa list. Furthermore, a significant fraction of domains use multiple cloud providers simultaneously. Still, domain owenrs remain cautious when it comes to choose which subdomain is actually hosted in the cloud and only 17.8% on average of the subdomains are actually hosted in the cloud. In terms of performance, preliminary results indicate that hosting a subdomain in the cloud pays off as compared to private hosting with a decrease of application level latency of 28%.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115097149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}