{"title":"Practical challenge-response for DNS","authors":"R. Al-Dalky, M. Rabinovich, M. Allman","doi":"10.1145/3276799.3276802","DOIUrl":"https://doi.org/10.1145/3276799.3276802","url":null,"abstract":"Authoritative DNS servers are susceptible to being leveraged in denial of service attacks in which the attacker sends DNS queries while masquerading as a victim---and hence causing the DNS server to send the responses to the victim. This reflection off innocent DNS servers hides the attackers identity and often allows the attackers to amplify their traffic by employing small requests to elicit large responses. Several challenge-response techniques have been proposed to establish a requester's identity before sending a full answer. However, none of these are practical in that they do not work in the face of \"resolver pools\"---or groups of DNS resolvers that work in concert to lookup records in the DNS. In these cases a challenge transmitted to some resolver R1 may be handled by a resolver R2, hence leaving an authoritative DNS server wondering whether R2 is in fact another resolver in the pool or a victim. We offer a practical challenge-response mechanism that uses challenge chains to establish identity in the face of resolver pools. We illustrate that the practical cost of our scheme in terms of added delay is small.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116335518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workshop on internet economics (WIE2017) final report","authors":"K. Claffy, G. Huston, D. Clark","doi":"10.1145/3276799.3276805","DOIUrl":"https://doi.org/10.1145/3276799.3276805","url":null,"abstract":"On December 13-14 2017, CAIDA hosted the 8th interdisciplinary Workshop on Internet Economics (WIE) at the UC San Diego's Supercomputer Center. This workshop series provides a forum for researchers, Internet facilities and service providers, technologists, economists, theorists, policy makers, and other stakeholders to exchange views on current and emerging regulatory and policy debates. The FCC's expected decision (released during the workshop, on 14 December 2017) - to repeal the 2015 classification of broadband Internet access service as a telecommunications (common carrier) service - set the stage for vigorous discussion on what type of data can inform debate, development, and empirical evaluation of public policies we will need for Internet services in the future.\u0000 http://www.caida.org/workshops/wie/1712/.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115301591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controlling queuing delays for real-time communication: the interplay of E2E and AQM algorithms","authors":"G. Carlucci, L. D. Cicco, S. Mascolo","doi":"10.1145/3243157.3243158","DOIUrl":"https://doi.org/10.1145/3243157.3243158","url":null,"abstract":"Real-time media communication requires not only congestion control, but also minimization of queuing delays to provide interactivity. In this work we consider the case of real-time communication between web browsers (WebRTC) and we focus on the interplay of an end-to-end delay-based congestion control algorithm, i.e. the Google congestion control (GCC), with two delay-based AQM algorithms, namely CoDel and PIE, and two flow queuing schedulers, i.e. SFQ and Fq_Codel. Experimental investigations show that, when only GCC flows are considered, the end-to-end algorithm is able to contain queuing delays without AQMs. Moreover the interplay of GCC flows with PIE or CoDel leads to higher packet losses with respect to the case of a DropTail queue. In the presence of concurrent TCP traffic, PIE and CoDel reduce the queuing delays with respect to DropTail at the cost of increased packet losses. In this scenario flow queuing schedulers offer a better solution.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"6 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The student mentoring column","authors":"Aditya Akella","doi":"10.1145/3243157.3243170","DOIUrl":"https://doi.org/10.1145/3243157.3243170","url":null,"abstract":"In this edition of the student mentoring column, we will cover three topics: the importance of journal and workshop papers, questions pertaining to giving/listening to talks, and two specific questions about jobs in networking.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126029972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Davids, V. Gurbani, Gaston Ormazabal, Andrew Rollins, Kundan Singh, R. State
{"title":"Research topics related to real-time communications over 5G networks","authors":"C. Davids, V. Gurbani, Gaston Ormazabal, Andrew Rollins, Kundan Singh, R. State","doi":"10.1145/3243157.3243165","DOIUrl":"https://doi.org/10.1145/3243157.3243165","url":null,"abstract":"In this article we describe the discussion and conclusions of the \"Roundtable on Real-Time Communications Research: 5G and Real-Time Communications --- Topics for Research\" held at the Illinois Institute of Technology's Real-Time Communications Conference and Expo, co-located with the IPT-Comm Conference, October 5--8, 2015.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116221432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workshop on internet economics (WIE2015) report","authors":"K. Claffy, D. Clark","doi":"10.1145/3243157.3243166","DOIUrl":"https://doi.org/10.1145/3243157.3243166","url":null,"abstract":"On December 16--17 2015, we hosted the 5th interdisciplinary Workshop on Internet Economics (WIE) at the UC San Diego's Supercomputer Center. This workshop series provides a forum for researchers, Internet facilities and service providers, technologists, economists, theorists, policy makers, and other stakeholders to inform current and emerging regulatory and policy debates.\u0000 The FCC's latest open Internet order ostensibly changes the landscape of regulation by using Title II as its basis. This year we discussed the implications of Title II (common-carrier-based) regulation for issues we have looked at in the past, or those shaping current policy conversations. Discussion topics included differentiated services on the public Internet, evolving approaches to interconnection across different segments of the ecosystem (e.g., content to access), QoE and QoS measurement techniques and their limitations, interconnection measurement and modeling challenges and opportunities, and transparency. The format was a series of focused sessions, where presenters prepared 10-minute talks on relevant issues, followed by in-depth discussions. This report highlights the discussions and presents relevant open research questions identified by participants.1","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129603195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What do parrots and BGP routers have in common?","authors":"David Hauweele, B. Quoitin, C. Pelsser, R. Bush","doi":"10.1145/3243157.3243159","DOIUrl":"https://doi.org/10.1145/3243157.3243159","url":null,"abstract":"The Border Gateway Protocol propagates routing information accross the Internet in an incremental manner. It only advertises to its peers changes in routing. However, as early as 1998, observations have been made of BGP announcing the same route multiple times, causing router CPU load, memory usage and convergence time higher than expected.\u0000 In this paper, by performing controlled experiments, we pinpoint multiple causes of duplicates, ranging from the lack of full RIB-Outs to the discrete processing of update messages. To mitigate these duplicates, we insert a cache at the output of the routers. We test it on public BGP traces and discuss the relation of the cache performance with the existence of bursts of updates in the trace.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New kid on the block: network functions visualization: from big boxes to carrier clouds","authors":"Leonhard Nobach, O. Hohlfeld, D. Hausheer","doi":"10.1145/3243157.3243164","DOIUrl":"https://doi.org/10.1145/3243157.3243164","url":null,"abstract":"Network management currently undergoes massive changes towards realizing more flexible management of complex networks. Recent efforts include slicing data plane resources by network (link) virtualization and applying operating system design principles to Software Defined Networking to rethink network management. Driven by network operators, network management principles are currently envisioned to be even further improved by virtualizing network (middlebox) functions. The resulting Network Functions Virtualization (NFV) paradigm abstracts network functions from dedicated hardware to virtual machines running on commodity hardware. This change in the design of carrier networks is inspired by the success of virtualization in the server market. By deploying NFV, network operators envision to achieve benefits similar to the server market and elastic cloud services, e.g., flexible and dynamic service provisioning, increased resource utilization, improved energy efficiency, and ultimately decreased operational costs. Despite these efforts, the ability of NFV to satisfy performance demands is often questioned. Tackling these challenges opens a set of research questions that felt short in the current discussion and are of particular relevance to the SIGCOMM community. In this position paper, we therefore provide an overview on the current state-of-the-art and open research questions.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131518373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The BGP hackathon 2016 report","authors":"A. Dainotti, Ethan Katz-Bassett, X. Dimitropoulos","doi":"10.1145/3243157.3243169","DOIUrl":"https://doi.org/10.1145/3243157.3243169","url":null,"abstract":"Internet routes - controlled by the Border Gateway Protocol (BGP) - carry our communication and our commerce, yet many aspects of routing are opaque to even network operators, and BGP is known to contribute to performance, reliability, and security problems. The research and operations communities have developed a set of tools and data sources for understanding and experimenting with BGP, and on February 2016 we organized the first BGP Hackathon, themed around live measurement and monitoring of Internet routing. The Hackathon included students, researchers, operators, providers, policymakers, and funding agencies, working together on projects to measure, visualize, and improve routing or the tools we use to study routing. This report describes the tools used at the Hackathon and presents an overview of the projects. The Hackathon was a success, and we look forward to future iterations.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121061573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and infrastructure challenges for applications and services in the year 2021","authors":"P. Calyam, Glenn Ricart","doi":"10.1145/3243157.3243168","DOIUrl":"https://doi.org/10.1145/3243157.3243168","url":null,"abstract":"The Applications and Services in the Year 2021 workshop was successfully organized on January 27--28, 2016 in Washington DC through funding support from the National Science Foundation (NSF). The goal of the workshop was to foster discussions that bring together applications researchers in multidisciplinary areas, and developers/operators of research infrastructures at both national, regional, university and city levels. Discussions were organized to identify grand challenge applications and obtain the community voice and consensus on the key issues relating to applications and services that might be delivered by advanced infrastructures in the decade beginning in 2020. The timing and organization for the workshop is significant because today's digital infrastructure is undergoing deep technological changes and new paradigms are rapidly taking shape in both the core and edge domains that pose fundamental challenges. The key outcomes of the discussions were targeted to enhance the quality of peoples' lives while addressing important national priorities, leveraging today's cutting edge applications such as the Internet of Things, Big Data Analytics, Robotics, The Industrial Internet, and Immersive Virtual/Augmented Reality. This report summarizes the workshop efforts to bring together diverse groups for delivering targeted short/long talks, sharing latest advances, and identifying gaps that exist in the community for 'research' and 'infrastructure' needs that require future NSF funding.","PeriodicalId":403234,"journal":{"name":"Comput. Commun. Rev.","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}