首页 > 最新文献

2018 Network Traffic Measurement and Analysis Conference (TMA)最新文献

英文 中文
Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer 使用众包市场进行网络测量:欺骗案例
Pub Date : 2018-06-01 DOI: 10.23919/TMA.2018.8506499
Qasim Lone, M. Luckie, Maciej Korczyński, H. Asghari, M. Javed, M. V. Eeten
Internet measurement tools are used to make inferences about network policies and practices across the Internet, such as censorship, traffic manipulation, bandwidth, and security measures. Some tools must be run from vantage points within individual networks, so are dependent on volunteer recruitment. A small pool of volunteers limits the impact of these tools. Crowdsourcing marketplaces can potentially recruit workers to run tools from networks not covered by the volunteer pool. We design an infrastructure to collect and synchronize measurements from five crowdsourcing platforms, and use that infrastructure to collect data on network source address validation policies for CAIDA's Spoofer project. In six weeks we increased the coverage of Spoofer measurements by recruiting 1519 workers from within 91 countries and 784 unique ASes for 2,000 Euro; 342 of these ASes were not previously covered, and represent a 15% increase in ASes over the prior 12 months. We describe lessons learned in recruiting and renumerating workers; in particular, strategies to address worker behavior when workers are screened because of overlap in the volunteer pool.
互联网测量工具用于推断互联网上的网络政策和实践,例如审查、流量操纵、带宽和安全措施。有些工具必须从个人网络的有利位置运行,因此依赖于志愿者招募。一小部分志愿者限制了这些工具的影响。众包市场可能会从志愿者库未覆盖的网络中招募工人来运行工具。我们设计了一个基础设施来收集和同步来自五个众包平台的测量数据,并使用该基础设施来收集CAIDA的Spoofer项目的网络源地址验证策略数据。在6周内,我们以2000欧元的价格招募了来自91个国家的1519名员工和784个独特的ASes,从而扩大了Spoofer测量的覆盖范围;其中有342例安全事件以前没有包括在内,比过去12个月增加了15%。我们描述了在招聘和给员工发工资方面的经验教训;特别是,当由于志愿者重叠而对员工进行筛选时,解决员工行为的策略。
{"title":"Using Crowdsourcing Marketplaces for Network Measurements: The Case of Spoofer","authors":"Qasim Lone, M. Luckie, Maciej Korczyński, H. Asghari, M. Javed, M. V. Eeten","doi":"10.23919/TMA.2018.8506499","DOIUrl":"https://doi.org/10.23919/TMA.2018.8506499","url":null,"abstract":"Internet measurement tools are used to make inferences about network policies and practices across the Internet, such as censorship, traffic manipulation, bandwidth, and security measures. Some tools must be run from vantage points within individual networks, so are dependent on volunteer recruitment. A small pool of volunteers limits the impact of these tools. Crowdsourcing marketplaces can potentially recruit workers to run tools from networks not covered by the volunteer pool. We design an infrastructure to collect and synchronize measurements from five crowdsourcing platforms, and use that infrastructure to collect data on network source address validation policies for CAIDA's Spoofer project. In six weeks we increased the coverage of Spoofer measurements by recruiting 1519 workers from within 91 countries and 784 unique ASes for 2,000 Euro; 342 of these ASes were not previously covered, and represent a 15% increase in ASes over the prior 12 months. We describe lessons learned in recruiting and renumerating workers; in particular, strategies to address worker behavior when workers are screened because of overlap in the volunteer pool.","PeriodicalId":6607,"journal":{"name":"2018 Network Traffic Measurement and Analysis Conference (TMA)","volume":"172 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84008328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Mobile Encrypted Traffic Classification Using Deep Learning 使用深度学习的移动加密流量分类
Pub Date : 2018-06-01 DOI: 10.23919/TMA.2018.8506558
Giuseppe Aceto, D. Ciuonzo, Antonio Montieri, A. Pescapé
The massive adoption of hand-held devices has led to the explosion of mobile traffic volumes traversing home and enterprise networks, as well as the Internet. Procedures for inferring (mobile) applications generating such traffic, known as Traffic Classification (TC), are the enabler for highly-valuable profiling information while certainly raise important privacy issues. The design of accurate classifiers is however exacerbated by the increasing adoption of encrypted protocols (such as TLS), hindering the applicability of highly-accurate approaches, such as deep packet inspection. Additionally, the (daily) expanding set of apps and the moving-target nature of mobile traffic makes design solutions with usual machine learning, based on manually-and expert-originated features, outdated. For these reasons, we suggest Deep Learning (DL) as a viable strategy to design traffic classifiers based on automatically-extracted features, reflecting the complex mobile-traffic patterns. To this end, different state-of-the-art DL techniques from TC are here reproduced, dissected, and set into a systematic framework for comparison, including also a performance evaluation workbench. Based on three datasets of real human users' activity, performance of these DL classifiers is critically investigated, highlighting pitfalls, design guidelines, and open issues of DL in mobile encrypted TC.
手持设备的大量采用导致了家庭和企业网络以及互联网上移动通信量的爆炸式增长。推断(移动)应用程序产生这种流量的过程,称为流量分类(TC),是高价值分析信息的推动者,同时肯定会引起重要的隐私问题。然而,越来越多地采用加密协议(如TLS)加剧了准确分类器的设计,阻碍了高度精确方法(如深度数据包检测)的适用性。此外,(每天)扩展的应用程序集和移动流量的移动目标特性使得基于手动和专家发起的功能的通常机器学习的设计解决方案已经过时。基于这些原因,我们建议深度学习(DL)作为一种可行的策略来设计基于自动提取特征的流量分类器,以反映复杂的移动流量模式。为此,本文对来自TC的不同的最先进的深度学习技术进行了再现、剖析,并将其设置为一个系统框架进行比较,其中还包括一个性能评估工作台。基于三个真实人类用户活动的数据集,对这些深度学习分类器的性能进行了严格的研究,突出了移动加密TC中深度学习的陷阱、设计指南和开放问题。
{"title":"Mobile Encrypted Traffic Classification Using Deep Learning","authors":"Giuseppe Aceto, D. Ciuonzo, Antonio Montieri, A. Pescapé","doi":"10.23919/TMA.2018.8506558","DOIUrl":"https://doi.org/10.23919/TMA.2018.8506558","url":null,"abstract":"The massive adoption of hand-held devices has led to the explosion of mobile traffic volumes traversing home and enterprise networks, as well as the Internet. Procedures for inferring (mobile) applications generating such traffic, known as Traffic Classification (TC), are the enabler for highly-valuable profiling information while certainly raise important privacy issues. The design of accurate classifiers is however exacerbated by the increasing adoption of encrypted protocols (such as TLS), hindering the applicability of highly-accurate approaches, such as deep packet inspection. Additionally, the (daily) expanding set of apps and the moving-target nature of mobile traffic makes design solutions with usual machine learning, based on manually-and expert-originated features, outdated. For these reasons, we suggest Deep Learning (DL) as a viable strategy to design traffic classifiers based on automatically-extracted features, reflecting the complex mobile-traffic patterns. To this end, different state-of-the-art DL techniques from TC are here reproduced, dissected, and set into a systematic framework for comparison, including also a performance evaluation workbench. Based on three datasets of real human users' activity, performance of these DL classifiers is critically investigated, highlighting pitfalls, design guidelines, and open issues of DL in mobile encrypted TC.","PeriodicalId":6607,"journal":{"name":"2018 Network Traffic Measurement and Analysis Conference (TMA)","volume":"108 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85265139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 118
An SDN-Based Approach for QoS and Reliability in Overlay Networks 一种基于sdn的覆盖网络QoS和可靠性方法
Pub Date : 2018-06-01 DOI: 10.23919/TMA.2018.8506581
Isabel Amigo, G. Sena, Marwa Chami, P. Belzarena
We propose an Overlay network architecture for reliable and QoS-aware interconnection between its nodes, without handling Internet routers and without tunneling overhead. The architecture is based on the SDN paradigm. We demonstrate the feasibility and challenges of such a system using mininet and pox controller.
我们提出了一种覆盖网络架构,在不处理互联网路由器和没有隧道开销的情况下,在节点之间实现可靠和qos感知的互连。该体系结构基于SDN范式。我们演示了使用mininet和pox控制器的这种系统的可行性和挑战。
{"title":"An SDN-Based Approach for QoS and Reliability in Overlay Networks","authors":"Isabel Amigo, G. Sena, Marwa Chami, P. Belzarena","doi":"10.23919/TMA.2018.8506581","DOIUrl":"https://doi.org/10.23919/TMA.2018.8506581","url":null,"abstract":"We propose an Overlay network architecture for reliable and QoS-aware interconnection between its nodes, without handling Internet routers and without tunneling overhead. The architecture is based on the SDN paradigm. We demonstrate the feasibility and challenges of such a system using mininet and pox controller.","PeriodicalId":6607,"journal":{"name":"2018 Network Traffic Measurement and Analysis Conference (TMA)","volume":"67 2 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85478304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Exploring Usable Path MTU in the Internet 探索可用的路径MTU在互联网上
Pub Date : 2018-04-24 DOI: 10.23919/TMA.2018.8506538
A. Custura, G. Fairhurst, Iain R. Learmonth
To optimise their transmission, Internet endpoints need to know the largest size of packet they can send across a specific Internet path, the Path Maximum Transmission Unit (PMTU). This paper explores the PMTU size experienced across the Internet core, wired and mobile edge networks. Our results show that MSS Clamping has been widely deployed in edge networks, and some webservers artificially reduce their advertised MSS, both of which we expect help avoid PMTUD failure for TCP. The maximum packet size used by a TCP connection is also constrained by the acMSS. MSS Clamping was observed in over 20% of edge networks tested. We find a significant proportion of webservers that advertise a low MSS can still be reached with a 1500 byte packet. We also find more than half of IPv6 webservers do not attempt PMTUD and clamp the MSS to 1280 bytes. Furthermore, we see evidence of black-hole detection mechanisms implemented by over a quarter of IPv6 webservers and almost 15% of IPv4 webservers. We also consider the implications for UDP - which necessarily can not utilise MSS Clamping. The paper provides useful input to the design of a robust PMTUD method that can be appropriate for the growing volume of UDP-based applications, by determining ICMP quotations can be used as to verify sender authenticity.
为了优化它们的传输,互联网端点需要知道它们可以通过特定互联网路径发送的最大数据包大小,即路径最大传输单元(PMTU)。本文探讨了在互联网核心、有线和移动边缘网络中所经历的PMTU尺寸。我们的研究结果表明,MSS夹紧已广泛部署在边缘网络中,一些web服务器人为地减少其广告MSS,我们期望这两种方法有助于避免TCP的PMTUD失败。TCP连接使用的最大数据包大小也受到acMSS的限制。在超过20%的边缘网络测试中观察到MSS夹紧。我们发现有相当大比例的web服务器仍然可以通过1500字节的数据包达到低MSS。我们还发现超过一半的IPv6网络服务器不尝试PMTUD,并将MSS箝制到1280字节。此外,我们看到超过四分之一的IPv6网络服务器和近15%的IPv4网络服务器实施了黑洞检测机制的证据。我们还考虑了UDP的影响-这必然不能利用MSS夹紧。本文为设计健壮的PMTUD方法提供了有用的输入,该方法可以通过确定ICMP引语来验证发送方的真实性,从而适用于基于udp的应用程序的不断增长的数量。
{"title":"Exploring Usable Path MTU in the Internet","authors":"A. Custura, G. Fairhurst, Iain R. Learmonth","doi":"10.23919/TMA.2018.8506538","DOIUrl":"https://doi.org/10.23919/TMA.2018.8506538","url":null,"abstract":"To optimise their transmission, Internet endpoints need to know the largest size of packet they can send across a specific Internet path, the Path Maximum Transmission Unit (PMTU). This paper explores the PMTU size experienced across the Internet core, wired and mobile edge networks. Our results show that MSS Clamping has been widely deployed in edge networks, and some webservers artificially reduce their advertised MSS, both of which we expect help avoid PMTUD failure for TCP. The maximum packet size used by a TCP connection is also constrained by the acMSS. MSS Clamping was observed in over 20% of edge networks tested. We find a significant proportion of webservers that advertise a low MSS can still be reached with a 1500 byte packet. We also find more than half of IPv6 webservers do not attempt PMTUD and clamp the MSS to 1280 bytes. Furthermore, we see evidence of black-hole detection mechanisms implemented by over a quarter of IPv6 webservers and almost 15% of IPv4 webservers. We also consider the implications for UDP - which necessarily can not utilise MSS Clamping. The paper provides useful input to the design of a robust PMTUD method that can be appropriate for the growing volume of UDP-based applications, by determining ICMP quotations can be used as to verify sender authenticity.","PeriodicalId":6607,"journal":{"name":"2018 Network Traffic Measurement and Analysis Conference (TMA)","volume":"15 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82752186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2018 Network Traffic Measurement and Analysis Conference (TMA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1