2019 Network Traffic Measurement and Analysis Conference (TMA)最新文献

筛选
英文 中文
MultipathTester: Comparing MPTCP and MPQUIC in Mobile Environments MultipathTester:比较MPTCP和MPQUIC在移动环境
2019 Network Traffic Measurement and Analysis Conference (TMA) Pub Date : 2019-06-01 DOI: 10.23919/TMA.2019.8784653
Q. D. Coninck, O. Bonaventure
{"title":"MultipathTester: Comparing MPTCP and MPQUIC in Mobile Environments","authors":"Q. D. Coninck, O. Bonaventure","doi":"10.23919/TMA.2019.8784653","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784653","url":null,"abstract":"With the adoption of Multipath TCP by Apple for its iPhones, there is a growing interest in using multipath transport to seamlessly support different network interfaces on mobile devices. In parallel, the IETF is actively developing the QUIC protocol which could replace TCP for some types of applications and multipath extensions for QUIC have already been proposed. We design and implement MultipathTester, an iOS application that enables researchers to compare the performance of different multipath protocols on popular smartphones. Specifically, our application compares the performance of iOS Multipath TCP with Multipath QUIC with various traffic types and conditions.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114398385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Filtering the Noise to Reveal Inter-Domain Lies 过滤噪声以揭示域间谎言
2019 Network Traffic Measurement and Analysis Conference (TMA) Pub Date : 2019-06-01 DOI: 10.23919/TMA.2019.8784618
J. M. D. Fiore, P. Mérindol, V. Persico, C. Pelsser, A. Pescapé
{"title":"Filtering the Noise to Reveal Inter-Domain Lies","authors":"J. M. D. Fiore, P. Mérindol, V. Persico, C. Pelsser, A. Pescapé","doi":"10.23919/TMA.2019.8784618","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784618","url":null,"abstract":"On the Internet, routers of Autonomous Systems (ASes) have to determine their preferred inter-domain route, i.e. control path (CP), for each IP prefix. The traffic is then forwarded AS after AS, following a data path (DP) that should match the CP for the same prefix. The underlying implicit trust that ASes advertise the paths they use for packet forwarding may be misplaced. Network operators may tweak CPs and DPs to carry out inter-domain lies that are visible when the two paths differ. Lies can be either unintended, due to misconfigurations or technical limitations, or deliberate, e.g. for economical gain. While lies globally mitigate the ability to troubleshoot and understand the root cause of connectivity issues, detecting them is not a trivial task as the ground data is noisy.In this paper, we propose a modular framework to measure and correctly quantify the discrepancies between CPs and DPs. We define several rules to overcome specific sources of noise inducing mismatches (MMs), e.g., incomplete traces, sibling ASes, IXPs or third-party addresses in general. We leverage the Peering testbed to conduct a measurement campaign at a scale never achieved before, and conclude that, while the upper bound of lies is significant, the lower bound is not negligible. This suggests that the noise interfering with collected traces is not the sole culprit for the MMs between CPs and DPs.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114526043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ReMon: A Resilient Flow Monitoring Framework ReMon:弹性流量监测框架
2019 Network Traffic Measurement and Analysis Conference (TMA) Pub Date : 2019-06-01 DOI: 10.23919/TMA.2019.8784521
Fangye Tang, I. Haque
{"title":"ReMon: A Resilient Flow Monitoring Framework","authors":"Fangye Tang, I. Haque","doi":"10.23919/TMA.2019.8784521","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784521","url":null,"abstract":"Network measurement and monitoring are essential for learning the current network state and act accordingly. Recent trends in network programmability and the Software-Defined Networking (SDN) architecture make measurement and monitoring more flexible and dynamic. However, monitoring tools may suffer from reduced accuracy when collecting measurement data in the presence of link failures. Therefore, in this paper, we propose a resilient monitoring framework, called ReMon, that can efficiently recover from link failures. ReMon combines active measurement along with state aggregation at the data plane switches to furthermore improve the measurement cost. We evaluate its performance in Mininet considering two real-world network topologies. The results confirm that ReMon can provide timely and accurate measurements even in the presence of link failures. It furthermore reduces 50% link failure recovery time compared to its counterparts.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129551170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Unveiling Radio Resource Utilization Dynamics of Mobile Traffic through Unsupervised Learning 通过无监督学习揭示移动通信的无线电资源利用动态
2019 Network Traffic Measurement and Analysis Conference (TMA) Pub Date : 2019-06-01 DOI: 10.23919/TMA.2019.8784692
Arcangela Rago, G. Piro, H. D. Trinh, G. Boggia, P. Dini
{"title":"Unveiling Radio Resource Utilization Dynamics of Mobile Traffic through Unsupervised Learning","authors":"Arcangela Rago, G. Piro, H. D. Trinh, G. Boggia, P. Dini","doi":"10.23919/TMA.2019.8784692","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784692","url":null,"abstract":"Understanding mobile traffic dynamics is a key issue to properly manage the radio resources in next generation mobile networks and meet the stringent requirements of emerging heterogeneous services, such as enhanced mobile broadband, autonomous driving, and extended reality (just to name a few). However, radio resource utilization patterns of real mobile applications are mostly unknown. This paper aims at filling this gap by tailoring an unsupervised learning methodology (i.e. K-means), able to identify similar radio resource utilization patterns of mobile traffic from an operating mobile network. Our analysis is based on datasets referring to residential and campus areas and containing wireless link level information (e.g., scheduling, channel conditions, transmission settings, and duration) with a very precise level of granularity (e.g., 1 ms). Obtained results reveal the properties of groups of sessions with similar characteristics, expressed in terms of bandwidth demands and application level requirements.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131278996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Characterizing the Effects of Rapid LTE Deployment: A Data-Driven Analysis 表征快速LTE部署的影响:数据驱动的分析
2019 Network Traffic Measurement and Analysis Conference (TMA) Pub Date : 2019-06-01 DOI: 10.23919/TMA.2019.8784522
Kareem Abdullah, N. Korany, Ayman Khalafallah, Ahmed Saeed, Ayman Gaber
{"title":"Characterizing the Effects of Rapid LTE Deployment: A Data-Driven Analysis","authors":"Kareem Abdullah, N. Korany, Ayman Khalafallah, Ahmed Saeed, Ayman Gaber","doi":"10.23919/TMA.2019.8784522","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784522","url":null,"abstract":"The deployment of LTE, while old news to developed countries, is ongoing in developing countries with some starting LTE deployments only a year ago. LTE is essential for developing countries where broadband access is mostly available through wireless connection. The process of LTE deployment is costly and time consuming. Network operators attempt to minimize both overheads. With the current challenges facing network operators to acquire new sites, 4G deployment always depends on reusing the already existing 2G/3G macro layer. In this paper, we study the approach of rapid 4G deployment by analyzing data from a major network operator in a developing country. In particular, we look at network measurements from a single large cluster right after LTE deployment. We analyze the impact of the deployment approach on user throughput and find that LTE throughput could be improved further for the majority of LTE users in more than 50% of the studied cells by improving either interference or coverage. We find that this is mainly because the LTE system is more sensitive to interference when compared to 3G. Finally, we show a data-driven approach to detect the affected cells and mitigate the issue through physical optimization, this approach balances employed LTE transition best practices with cost efficiency and rapid deployment.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127052700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Measuring the Feasibility of Teleoperated Driving in Mobile Networks 移动网络中遥控驾驶的可行性测量
2019 Network Traffic Measurement and Analysis Conference (TMA) Pub Date : 2019-06-01 DOI: 10.23919/TMA.2019.8784466
S. Neumeier, Ermias Andargie Walelgne, Vaibhav Bajpai, J. Ott, Christian Facchi
{"title":"Measuring the Feasibility of Teleoperated Driving in Mobile Networks","authors":"S. Neumeier, Ermias Andargie Walelgne, Vaibhav Bajpai, J. Ott, Christian Facchi","doi":"10.23919/TMA.2019.8784466","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784466","url":null,"abstract":"Teleoperated Driving is the remote control driving of a vehicle by a human driver. The concept of Teleoperated Driving requires the use of mobile networks, which typically experience variable throughput, variable latency and uneven network coverage. To investigate whether Teleoperated Driving can be possible with contemporary mobile networks, we have conducted measurements while driving with vehicles in the real world. We used complementary measurement setups to obtain results that can be compared. The dataset consists of about 5200 km (4660 minutes) driving measurements. Results show that Teleoperated Driving could be possible, but the high variance of network parameters makes it difficult to use the system at all times. It appears that the speed of the vehicle and the distance to the base station may not influence Teleoperated Driving, while handover with changed radio technology, signal strength and distance to the teleoperation station may have an impact. Possible mitigations to overcome these problems along with a basic whitelisting approach is discussed.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132513123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A Residential Client-side Perspective on SSL Certificates SSL证书的驻留客户端视角
2019 Network Traffic Measurement and Analysis Conference (TMA) Pub Date : 2019-06-01 DOI: 10.23919/TMA.2019.8784633
Edward Oakes, Jeffery Kline, Aaron Cahn, Keith Funkhouser, P. Barford
{"title":"A Residential Client-side Perspective on SSL Certificates","authors":"Edward Oakes, Jeffery Kline, Aaron Cahn, Keith Funkhouser, P. Barford","doi":"10.23919/TMA.2019.8784633","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784633","url":null,"abstract":"SSL certificates are a core component of the public key infrastructure that underpins encrypted communication in the Internet. In this paper, we report the results of a longitudinal study of the characteristics of SSL certificate chains presented to clients during secure web (HTTPS) connection setup. Our data set consists of 23B SSL certificate chains collected from a global panel consisting of over 2M residential client machines over a period of 6 months. The data informing our analyses provide perspective on the entire chain of trust, including root certificates, across a wide distribution of client machines. We identify over 35M unique certificate chains with diverse relationships at all levels of the PKI hierarchy. We report on the characteristics of valid certificates, which make up 99.7% of the total corpus. We also examine invalid certificate chains, finding that 93% of them contain an untrusted root certificate and we find they have shorter average chain length than their valid counterparts. Finally, we examine two unintended but prevalent behaviors in our data: the deprecation of root certificates and secure traffic interception. Our results support aspects of prior, scan-based studies on certificate characteristics but contradict other findings, highlighting the importance of the residential client-side perspective.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129201187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The ODDness of Webpages 网页的奇异性
2019 Network Traffic Measurement and Analysis Conference (TMA) Pub Date : 2019-06-01 DOI: 10.23919/TMA.2019.8784552
M. Furtak, Mike P. Wittie
{"title":"The ODDness of Webpages","authors":"M. Furtak, Mike P. Wittie","doi":"10.23919/TMA.2019.8784552","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784552","url":null,"abstract":"Users and content providers want websites to load quickly. A widely used web performance metric that rewards both the early appearance of content and the timely completion of page load is the Speed Index (SI). Lower SI values correspond to higher user satisfaction, which makes reducing page SI an important goal.In this paper, we observe that all images on a webpage are not created equal and indeed vary considerably along a metric we dub image density, or the ratio of byte weight to pixel size. Variation in image density creates opportunities to prioritize lower density images to reduce page SI by displaying more pixels sooner for every loaded byte. We define Object Density Distribution (ODD) – a new webpage characterization metric. To understand the potential for image prioritization, we characterize ODD of existing webpages, their ODDness if you will, and show that ODD skewness and kurtosis indicate meaningful prioritization opportunities. To understand the effectiveness of image prioritization, we propose a URL-based prioritization mechanism and measure its performance across 20 test pages loaded from the Apache, NGINX, and Caddy servers. Our results show SI improvement over 40% in some cases and mean improvement of 5.7%. These SI improvements and the simplicity of our prioritization method create a compelling case for the adoption of our method by content distribution networks (CDNs) and future browser implementations.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131309790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hic Sunt Proxies: Unveiling Proxy Phenomena in Mobile Networks hsun代理:揭示移动网络中的代理现象
2019 Network Traffic Measurement and Analysis Conference (TMA) Pub Date : 2019-06-01 DOI: 10.23919/TMA.2019.8784678
R. Zullo, A. Pescapé, Korian Edeline, B. Donnet
{"title":"Hic Sunt Proxies: Unveiling Proxy Phenomena in Mobile Networks","authors":"R. Zullo, A. Pescapé, Korian Edeline, B. Donnet","doi":"10.23919/TMA.2019.8784678","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784678","url":null,"abstract":"Over the years middleboxes have established themselves as a solution to a wide range of networking issues, progressively changing network landscape and turning the end-to-end principle into a reminder of an Arcadian age of the Internet. Among them, proxies have found breeding ground especially in mobile networks that, moreover, have become the most popular way to access the Internet.In this paper, we present Mobile Tracebox, an Android measurement tool, and describe how its methodology, coping with the lack of privileges of mobile devices, can not only detect proxies but also characterize different facets, from their transport layer behavior to their location inside the network. Data collected from a crowdsourced deployment over more than 90 carriers and 350 Wi-Fi networks contributes to describe the potential of the tool and to draw a panorama of proxies across mobile networks. Our study confirms their prevalence and reveals that their scope is not limited to HTTP but can include several TCP services and even non standard ports. We detail the different implementations observed and delve into specific aspects of their configuration, like the initial Receive Window, the Window Scale factor or the set of Options supported, to understand how proxies can affect performance or obstruct extensions. Finally, we focus on fingerprinting and attempt to draw a dividing line between packet modifications performed by proxies and those performed by other classes of middleboxes.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131915647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Effective Analysis of Secure Web Response Time 安全Web响应时间的有效分析
2019 Network Traffic Measurement and Analysis Conference (TMA) Pub Date : 2019-06-01 DOI: 10.23919/TMA.2019.8784652
Carlos López, D. Morató, E. Magaña, M. Izal
{"title":"Effective Analysis of Secure Web Response Time","authors":"Carlos López, D. Morató, E. Magaña, M. Izal","doi":"10.23919/TMA.2019.8784652","DOIUrl":"https://doi.org/10.23919/TMA.2019.8784652","url":null,"abstract":"The measurement of response time in web based applications is a common task for the evaluation of service responsiveness and the detection of network or server problems. Traffic analysis is the most common strategy for obtaining response time measurements. However, when the traffic is encrypted, the analysis tools cannot provide these measurement results. In this paper we propose a methodology for measuring the response time in HTTPS traffic based on the flow of data in each direction. We have validated the tool with real traffic and with a worst case scenario created in a testbed. When pipelining is present in the encrypted HTTP 1.1 traffic, it results in a small error in the measurement (between 5% and 15% of error for the 99.9 percentile of the real response time). However, pipelining support has almost disappeared from modern web browsers; this makes the estimation provided by this methodology very accurate in real traffic measurements, even for low probability response times. More than 98.8% of the over 8.6 million request-response times we measured in our campus Internet link were obtained without any error.","PeriodicalId":241672,"journal":{"name":"2019 Network Traffic Measurement and Analysis Conference (TMA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132116554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信