Anja Feldmann

Prof. Anja Feldmann, Ph.D.

Address
Max-Planck-Institut für Informatik
Saarland Informatics Campus
Campus E1 4
66123 Saarbrücken
Location
E1 4 - 501
Phone
+49 681 9325 3501
Fax
+49 681 9325 3599

Personal Information

I studied computer science at Universitaet Paderborn in Germany and received my degree in 1990. After that I continued my studies at Carnegie Mellon University, where I earned my M.Sc. in 1991 and, four years later, my Ph.D. The next four years I did postdoctoral work at AT&T Labs Research, before holding research positions at Saarland University and the Technical University Munich. Since 2006, I have been professor of Internet Network Architectures at Telekom Innovation Laboratories at Technische Universitaet Berlin. In May 2012, I was elected the first woman on the employer side of the Supervisory Board of SAP. Since the beginning of 2018 I am director at the Max Planck Institute for Informatics in Saarbruecken.

Recent Publications

2020
Feldmann, A., Gasser, O., Lichtblau, F., Pujol, E., Poese, I., Dietzel, C., … Smaragdakis, G. (2020a). The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic. In IMC’20, 20th ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3419394.3423658
Export
BibTeX
@inproceedings{Feldmann_IMC2020, TITLE = {The Lockdown Effect: Implications of the {COVID}-19 Pandemic on Internet Traffic}, AUTHOR = {Feldmann, Anja and Gasser, Oliver and Lichtblau, Franziska and Pujol, Enric and Poese, Ingmar and Dietzel, Christoph and Wagner, Daniel and Wichtlhuber, Matthias and Tapiador, Juan and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver and Smaragdakis, Georgios}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423658}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC'20, 20th ACM Internet Measurement Conference}, PAGES = {1--18}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Feldmann, Anja %A Gasser, Oliver %A Lichtblau, Franziska %A Pujol, Enric %A Poese, Ingmar %A Dietzel, Christoph %A Wagner, Daniel %A Wichtlhuber, Matthias %A Tapiador, Juan %A Vallina-Rodriguez, Narseo %A Hohlfeld, Oliver %A Smaragdakis, Georgios %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0641-9 %R 10.1145/3419394.3423658 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC'20 %P 1 - 18 %I ACM %@ 9-781-4503-8138-3 %U https://labs.ripe.net/Members/oliver_gasser/the-lockdown-effect-implications-of-the-covid-19-pandemic-on-internet-traffic
Maghsoudlou, A., Gasser, O., & Feldmann, A. (2020). Reserved: Dissecting Internet Traffic on Port 0. In Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020. Virtual Conference. Retrieved from http://arxiv.org/abs/2004.03653
(arXiv: 2004.03653)
Abstract
Transport protocols use port numbers to allow connection multiplexing on Internet hosts. TCP as well as UDP, the two most widely used transport protocols, have limitations on what constitutes a valid and invalid port number. One example of an invalid port number for these protocols is port 0. In this work, we present preliminary results from analyzing port 0 traffic at a large European IXP. In one week of traffic we find 74GB port 0 traffic. The vast majority of this traffic has both source and destination ports set to 0, suggesting scanning or reconnaissance as its root cause. Our analysis also shows that more than half of all port 0 traffic is targeted to just 18 ASes, whereas more than half of all traffic is originated by about 100 ASes, suggesting a more diverse set of source ASes.
Export
BibTeX
@inproceedings{Maghsoudlou_PAM2020, TITLE = {Reserved: {D}issecting Internet Traffic on Port 0}, AUTHOR = {Maghsoudlou, Aniss and Gasser, Oliver and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/2004.03653}, EPRINT = {2004.03653}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Transport protocols use port numbers to allow connection multiplexing on Internet hosts. TCP as well as UDP, the two most widely used transport protocols, have limitations on what constitutes a valid and invalid port number. One example of an invalid port number for these protocols is port 0. In this work, we present preliminary results from analyzing port 0 traffic at a large European IXP. In one week of traffic we find 74GB port 0 traffic. The vast majority of this traffic has both source and destination ports set to 0, suggesting scanning or reconnaissance as its root cause. Our analysis also shows that more than half of all port 0 traffic is targeted to just 18 ASes, whereas more than half of all traffic is originated by about 100 ASes, suggesting a more diverse set of source ASes.}, BOOKTITLE = {Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020}, ADDRESS = {Virtual Conference}, }
Endnote
%0 Conference Proceedings %A Maghsoudlou, Aniss %A Gasser, Oliver %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Reserved: Dissecting Internet Traffic on Port 0 : %G eng %U http://hdl.handle.net/21.11116/0000-0006-0D13-7 %U http://arxiv.org/abs/2004.03653 %D 2020 %B The Passive and Active Measurement Conference %Z date of event: 2020-03-30 - 2020-03-31 %C Virtual Conference %X Transport protocols use port numbers to allow connection multiplexing on Internet hosts. TCP as well as UDP, the two most widely used transport protocols, have limitations on what constitutes a valid and invalid port number. One example of an invalid port number for these protocols is port 0. In this work, we present preliminary results from analyzing port 0 traffic at a large European IXP. In one week of traffic we find 74GB port 0 traffic. The vast majority of this traffic has both source and destination ports set to 0, suggesting scanning or reconnaissance as its root cause. Our analysis also shows that more than half of all port 0 traffic is targeted to just 18 ASes, whereas more than half of all traffic is originated by about 100 ASes, suggesting a more diverse set of source ASes. %K Computer Science, Networking and Internet Architecture, cs.NI %B Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020
Shukla, A., Saidi, S. J., Schmid, S., Canini, M., Zinner, T., & Feldmann, A. (2020). Toward Consistent SDNs: A Case for Network State Fuzzing. IEEE Transactions on Network and Service Management, 17(2). doi:10.1109/TNSM.2019.2955790
Export
BibTeX
@article{Shukla2020, TITLE = {Toward Consistent {SDNs}: {A} Case for Network State Fuzzing}, AUTHOR = {Shukla, Apoorv and Saidi, S. Jawad and Schmid, Stefan and Canini, Marco and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2019.2955790}, PUBLISHER = {IEEE}, ADDRESS = {Piscataway, NJ}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, JOURNAL = {IEEE Transactions on Network and Service Management}, VOLUME = {17}, NUMBER = {2}, PAGES = {668--681}, }
Endnote
%0 Journal Article %A Shukla, Apoorv %A Saidi, S. Jawad %A Schmid, Stefan %A Canini, Marco %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Toward Consistent SDNs: A Case for Network State Fuzzing : %G eng %U http://hdl.handle.net/21.11116/0000-0006-DADE-B %R 10.1109/TNSM.2019.2955790 %7 2020 %D 2020 %J IEEE Transactions on Network and Service Management %V 17 %N 2 %& 668 %P 668 - 681 %I IEEE %C Piscataway, NJ %@ false
Semmler, N., Rost, M., Smaragdakis, G., & Feldmann, A. (2020). Edge Replication Strategies for Wide-Area Distributed Processing. In EdgeSys’20, Third ACM International Workshop on Edge Systems, Analytics and Networking. Heraklion, Greece: ACM. doi:10.1145/3378679.3394532
Export
BibTeX
@inproceedings{Semmler_EdgeSys2020, TITLE = {Edge Replication Strategies for Wide-Area Distributed Processing}, AUTHOR = {Semmler, Niklas and Rost, Matthias and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-7132-2}, DOI = {10.1145/3378679.3394532}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {EdgeSys'20, Third ACM International Workshop on Edge Systems, Analytics and Networking}, PAGES = {1--6}, ADDRESS = {Heraklion, Greece}, }
Endnote
%0 Conference Proceedings %A Semmler, Niklas %A Rost, Matthias %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Edge Replication Strategies for Wide-Area Distributed Processing : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0A9F-C %R 10.1145/3378679.3394532 %D 2020 %B Third ACM International Workshop on Edge Systems, Analytics and Networking %Z date of event: 2020-04-27 - 2020-04-27 %C Heraklion, Greece %B EdgeSys'20 %P 1 - 6 %I ACM %@ 978-1-4503-7132-2
Enghardt, T., Zinner, T., & Feldmann, A. (2020). Using Informed Access Network Selection to Improve HTTP Adaptive Streaming Performance. In MMSys’20, 11th ACM Multimedia Systems Conference. Istanbul, Turkey: ACM. doi:10.1145/3339825.3391865
Export
BibTeX
@inproceedings{Enghardt_MMSys2020, TITLE = {Using Informed Access Network Selection to Improve {HTTP} Adaptive Streaming Performance}, AUTHOR = {Enghardt, Theresa and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-6845-2}, DOI = {10.1145/3339825.3391865}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {MMSys'20, 11th ACM Multimedia Systems Conference}, PAGES = {126--140}, ADDRESS = {Istanbul, Turkey}, }
Endnote
%0 Conference Proceedings %A Enghardt, Theresa %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Using Informed Access Network Selection to Improve HTTP Adaptive Streaming Performance : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0AA5-4 %R 10.1145/3339825.3391865 %D 2020 %B 11th ACM Multimedia Systems Conference %Z date of event: 2020-06-08 - 2020-06-11 %C Istanbul, Turkey %B MMSys'20 %P 126 - 140 %I ACM %@ 978-1-4503-6845-2
Shukla, A., Hudemann, K., Vági, Z., Hügerich, L., Smaragdakis, G., Schmid, S., … Feldmann, A. (2020). Towards Runtime Verification of Programmable Switches. Retrieved from http://arxiv.org/abs/2004.10887
(arXiv: 2004.10887)
Abstract
Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time localization of bugs in P4 programs using software testing techniques like Tarantula. Once the bug in a P4 program is localized, the faulty code can be patched due to the programmable nature of P4. In addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest version), our observation is that as the programmable blocks increase, the patchability of P4 programs increases accordingly. To this end, we design, develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs in P4 programs with minimal human interaction. P6 tests P4 switch non-intrusively, i.e., requires no modification to the P4 program for detecting and localizing bugs. We used a P6 prototype to detect and patch seven existing bugs in eight publicly available P4 application programs deployed on two different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation shows that P6 significantly outperforms bug detection baselines while generating fewer packets and patches bugs in P4 programs such as switch.p4 without triggering any regressions.
Export
BibTeX
@online{Shukla_arXiv2004.10887, TITLE = {Towards Runtime Verification of Programmable Switches}, AUTHOR = {Shukla, Apoorv and Hudemann, Kevin and V{\'a}gi, Zsolt and H{\"u}gerich, Lily and Smaragdakis, Georgios and Schmid, Stefan and Hecker, Artur and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/2004.10887}, EPRINT = {2004.10887}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time localization of bugs in P4 programs using software testing techniques like Tarantula. Once the bug in a P4 program is localized, the faulty code can be patched due to the programmable nature of P4. In addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest version), our observation is that as the programmable blocks increase, the patchability of P4 programs increases accordingly. To this end, we design, develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs in P4 programs with minimal human interaction. P6 tests P4 switch non-intrusively, i.e., requires no modification to the P4 program for detecting and localizing bugs. We used a P6 prototype to detect and patch seven existing bugs in eight publicly available P4 application programs deployed on two different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation shows that P6 significantly outperforms bug detection baselines while generating fewer packets and patches bugs in P4 programs such as switch.p4 without triggering any regressions.}, }
Endnote
%0 Report %A Shukla, Apoorv %A Hudemann, Kevin %A Vági, Zsolt %A Hügerich, Lily %A Smaragdakis, Georgios %A Schmid, Stefan %A Hecker, Artur %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Towards Runtime Verification of Programmable Switches : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0AAD-C %U http://arxiv.org/abs/2004.10887 %D 2020 %X Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time localization of bugs in P4 programs using software testing techniques like Tarantula. Once the bug in a P4 program is localized, the faulty code can be patched due to the programmable nature of P4. In addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest version), our observation is that as the programmable blocks increase, the patchability of P4 programs increases accordingly. To this end, we design, develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs in P4 programs with minimal human interaction. P6 tests P4 switch non-intrusively, i.e., requires no modification to the P4 program for detecting and localizing bugs. We used a P6 prototype to detect and patch seven existing bugs in eight publicly available P4 application programs deployed on two different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation shows that P6 significantly outperforms bug detection baselines while generating fewer packets and patches bugs in P4 programs such as switch.p4 without triggering any regressions. %K Computer Science, Software Engineering, cs.SE,Computer Science, Learning, cs.LG,Computer Science, Networking and Internet Architecture, cs.NI
Feldmann, A., Gasser, O., Lichtblau, F., Pujol, E., Poese, I., Dietzel, C., … Smaragdakis, G. (2020b). A View of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic. In COVID-19 Network Impacts Workshop. Virtual Workshop: IAB. Retrieved from https://www.iab.org/activities/workshops/covid-19-network-impacts-workshop-2020/
Export
BibTeX
@inproceedings{Feldmann_IABWorkshop2020, TITLE = {A view of Internet Traffic Shifts at {ISP} and {IXPs} during the {COVID}-19 Pandemic}, AUTHOR = {Feldmann, Anja and Gasser, Oliver and Lichtblau, Franziska and Pujol, Enric and Poese, Ingmar and Dietzel, Christoph and Wagner, Daniel and Wichtlhuber, Matthias and Tapiador, Juan and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver and Smaragdakis, Georgios}, LANGUAGE = {eng}, URL = {https://www.iab.org/activities/workshops/covid-19-network-impacts-workshop-2020/}, PUBLISHER = {IAB}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {COVID-19 Network Impacts Workshop}, ADDRESS = {Virtual Workshop}, }
Endnote
%0 Conference Proceedings %A Feldmann, Anja %A Gasser, Oliver %A Lichtblau, Franziska %A Pujol, Enric %A Poese, Ingmar %A Dietzel, Christoph %A Wagner, Daniel %A Wichtlhuber, Matthias %A Tapiador, Juan %A Vallina-Rodriguez, Narseo %A Hohlfeld, Oliver %A Smaragdakis, Georgios %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T A View of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic : %G eng %U http://hdl.handle.net/21.11116/0000-0007-6FA5-3 %D 2020 %B COVID-19 Network Impacts Workshop %Z date of event: 2020-11-09 - 2020-11-13 %C Virtual Workshop %B COVID-19 Network Impacts Workshop %I IAB %U https://www.iab.org/activities/workshops/covid-19-network-impacts-workshop-2020/
Saidi, S. J., Mandalari, A. M., Kolcun, R., Haddadi, H., Dubois, D. J., Choffnes, D., … Feldmann, A. (2020). A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild. In IMC’20, 20th ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3419394.3423650
Export
BibTeX
@inproceedings{Saidi_IMC2020, TITLE = {A Haystack Full of Needles: {Scalable} Detection of {IoT} Devices in the Wild}, AUTHOR = {Saidi, Said Jawad and Mandalari, Anna Maria and Kolcun, Roman and Haddadi, Hamed and Dubois, Daniel J. and Choffnes, David and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423650}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC'20, 20th ACM Internet Measurement Conference}, PAGES = {87--100}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Saidi, Said Jawad %A Mandalari, Anna Maria %A Kolcun, Roman %A Haddadi, Hamed %A Dubois, Daniel J. %A Choffnes, David %A Smaragdakis, Georgios %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild : %G eng %U http://hdl.handle.net/21.11116/0000-0007-72B5-C %R 10.1145/3419394.3423650 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC'20 %P 87 - 100 %I ACM %@ 9-781-4503-8138-3 %U https://dl.acm.org/doi/10.1145/3419394.3423650
Saidi, S. J., Maghsoudlou, A., Foucard, D., Smaragdakis, G., Poese, I., & Feldmann, A. (2020a). Exploring Network-Wide Flow Data with Flowyager. IEEE Transactions on Network and Service Management, 17(4). doi:10.1109/TNSM.2020.3034278
Export
BibTeX
@article{Saidi_10.1109/TNSM.2020.3034278, TITLE = {Exploring Network-Wide Flow Data with {Flowyager}}, AUTHOR = {Saidi, Said Jawad and Maghsoudlou, Aniss and Foucard, Damien and Smaragdakis, Georgios and Poese, Ingmar and Feldmann, Anja}, LANGUAGE = {eng}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2020.3034278}, PUBLISHER = {IEEE}, ADDRESS = {Piscataway, NJ}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, JOURNAL = {IEEE Transactions on Network and Service Management}, VOLUME = {17}, NUMBER = {4}, PAGES = {1988--2006}, }
Endnote
%0 Journal Article %A Saidi, Said Jawad %A Maghsoudlou, Aniss %A Foucard, Damien %A Smaragdakis, Georgios %A Poese, Ingmar %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Exploring Network-Wide Flow Data with Flowyager : %G eng %U http://hdl.handle.net/21.11116/0000-0007-7295-0 %R 10.1109/TNSM.2020.3034278 %7 2020 %D 2020 %J IEEE Transactions on Network and Service Management %V 17 %N 4 %& 1988 %P 1988 - 2006 %I IEEE %C Piscataway, NJ %@ false
Prehn, L., Lichtblau, F., & Feldmann, A. (2020). When Wells Run Dry: The 2020 IPv4 Address Market. In CoNEXT’20, 16th International Conference on Emerging Networking Experiments And Technologies. Barcelona, Spain (Virtual Event): ACM. doi:10.1145/3386367.3431301
Export
BibTeX
@inproceedings{Prehn_CoNEXT2020, TITLE = {When wells run dry: the 2020 {IPv4} address market}, AUTHOR = {Prehn, Lars and Lichtblau, Franziska and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {9781450379489}, DOI = {10.1145/3386367.3431301}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {CoNEXT'20, 16th International Conference on Emerging Networking Experiments And Technologies}, EDITOR = {Han, Dongsu and Feldmann, Anja}, PAGES = {46--54}, ADDRESS = {Barcelona, Spain (Virtual Event)}, }
Endnote
%0 Conference Proceedings %A Prehn, Lars %A Lichtblau, Franziska %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T When Wells Run Dry: The 2020 IPv4 Address Market : %G eng %U http://hdl.handle.net/21.11116/0000-0007-853A-2 %R 10.1145/3386367.3431301 %D 2020 %B 16th International Conference on Emerging Networking Experiments And Technologies %Z date of event: 2020-12-01 - 2020-12-04 %C Barcelona, Spain (Virtual Event) %B CoNEXT'20 %E Han, Dongsu; Feldmann, Anja %P 46 - 54 %I ACM %@ 9781450379489
Marcos, P., Prehn, L., Leal, L., Dainotti, A., Feldmann, A., & Barcellos, M. (2020). AS-Path Prepending: There is No Rose without a Thorn. In IMC’20, 20th ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3419394.3423642
Export
BibTeX
@inproceedings{Marcos_IMC2020, TITLE = {{AS-Path Prepending}: {T}here is No Rose without a Thorn}, AUTHOR = {Marcos, Pedro and Prehn, Lars and Leal, Lucas and Dainotti, Alberto and Feldmann, Anja and Barcellos, Marinho}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423642}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC'20, 20th ACM Internet Measurement Conference}, PAGES = {506--520}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Marcos, Pedro %A Prehn, Lars %A Leal, Lucas %A Dainotti, Alberto %A Feldmann, Anja %A Barcellos, Marinho %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations %T AS-Path Prepending: There is No Rose without a Thorn : %G eng %U http://hdl.handle.net/21.11116/0000-0007-854C-E %R 10.1145/3419394.3423642 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC'20 %P 506 - 520 %I ACM %@ 9-781-4503-8138-3
Han, D., & Feldmann, A. (Eds.). (2020). CoNEXT’20 : Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies. Presented at the 16th International Conference on emerging Networking Experiments and Technologies, Barcelona, Spain (Virtual Event): ACM. doi:10.1145/3386367
Export
BibTeX
@proceedings{CoNEXT2020_Proc, TITLE = {CoNEXT'20 : Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies}, EDITOR = {Han, Dongsu and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-7948-9}, DOI = {10.1145/3386367}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ADDRESS = {Barcelona, Spain (Virtual Event)}, }
Endnote
%0 Conference Proceedings %E Han, Dongsu %E Feldmann, Anja %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T CoNEXT'20 : Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies : %G eng %U http://hdl.handle.net/21.11116/0000-0007-855E-A %R 10.1145/3386367 %@ 978-1-4503-7948-9 %I ACM %D 2020 %B 16th International Conference on emerging Networking Experiments and Technologies %Z date of event: 2020-12-01 - 2020-12-04 %D 2020 %C Barcelona, Spain (Virtual Event)
Hoseini, M., Melo, P., Júnior, M., Benevenuto, F., Chandrasekaran, B., Feldmann, A., & Zannettou, S. (2020). Demystifying the Messaging Platforms’ Ecosystem Through the Lens of Twitter. In IMC’20, 20th ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3419394.3423651
Export
BibTeX
@inproceedings{Hoseini_IMC2020, TITLE = {Demystifying the Messaging Platforms' Ecosystem Through the Lens of {Twitter}}, AUTHOR = {Hoseini, Mohamad and Melo, Philipe and J{\'u}nior, Manoel and Benevenuto, Fabr{\'i}cio and Chandrasekaran, Balakrishnan and Feldmann, Anja and Zannettou, Savvas}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423651}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC'20, 20th ACM Internet Measurement Conference}, PAGES = {345--359}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Hoseini, Mohamad %A Melo, Philipe %A Júnior, Manoel %A Benevenuto, Fabrício %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %A Zannettou, Savvas %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Demystifying the Messaging Platforms' Ecosystem Through the Lens of Twitter : %G eng %U http://hdl.handle.net/21.11116/0000-0007-8542-8 %R 10.1145/3419394.3423651 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC'20 %P 345 - 359 %I ACM %@ 9-781-4503-8138-3
Saidi, S. J., Maghsoudlou, A., Foucard, D., Smaragdakis, G., Poese, I., & Feldmann, A. (2020b). Exploring Network-Wide Flow Data with Flowyager. Retrieved from https://arxiv.org/abs/2010.13120
(arXiv: 2010.13120)
Abstract
Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this paper, we investigate how to improve the response time for a priori unknown network-wide queries. We present Flowyager, a system that is built on top of existing traffic capture utilities. Flowyager generates and analyzes tree data structures, that we call Flowtrees, which are succinct summaries of the raw flow data available by capture utilities. Flowtrees are self-adjusted data structures that drastically reduce space and transfer requirements, by 75% to 95%, compared to raw flow records. Flowyager manages the storage and transfers of Flowtrees, supports Flowtree operators, and provides a structured query language for answering flow queries across sites and time periods. By deploying a Flowyager prototype at both a large Internet Exchange Point and a Tier-1 Internet Service Provider, we showcase its capabilities for networks with hundreds of router interfaces. Our results show that the query response time can be reduced by an order of magnitude when compared with alternative data analytics platforms. Thus, Flowyager enables interactive network-wide queries and offers unprecedented drill-down capabilities to, e.g., identify DDoS culprits, pinpoint the involved sites, and determine the length of the attack.
Export
BibTeX
@online{Saidi_arXiv2010.13120, TITLE = {Exploring Network-Wide Flow Data with Flowyager}, AUTHOR = {Saidi, Said Jawad and Maghsoudlou, Aniss and Foucard, Damien and Smaragdakis, Georgios and Poese, Ingmar and Feldmann, Anja}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2010.13120}, EPRINT = {2010.13120}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this paper, we investigate how to improve the response time for a priori unknown network-wide queries. We present Flowyager, a system that is built on top of existing traffic capture utilities. Flowyager generates and analyzes tree data structures, that we call Flowtrees, which are succinct summaries of the raw flow data available by capture utilities. Flowtrees are self-adjusted data structures that drastically reduce space and transfer requirements, by 75% to 95%, compared to raw flow records. Flowyager manages the storage and transfers of Flowtrees, supports Flowtree operators, and provides a structured query language for answering flow queries across sites and time periods. By deploying a Flowyager prototype at both a large Internet Exchange Point and a Tier-1 Internet Service Provider, we showcase its capabilities for networks with hundreds of router interfaces. Our results show that the query response time can be reduced by an order of magnitude when compared with alternative data analytics platforms. Thus, Flowyager enables interactive network-wide queries and offers unprecedented drill-down capabilities to, e.g., identify DDoS culprits, pinpoint the involved sites, and determine the length of the attack.}, }
Endnote
%0 Report %A Saidi, Said Jawad %A Maghsoudlou, Aniss %A Foucard, Damien %A Smaragdakis, Georgios %A Poese, Ingmar %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Exploring Network-Wide Flow Data with Flowyager : %G eng %U http://hdl.handle.net/21.11116/0000-0007-8562-4 %U https://arxiv.org/abs/2010.13120 %D 2020 %X Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this paper, we investigate how to improve the response time for a priori unknown network-wide queries. We present Flowyager, a system that is built on top of existing traffic capture utilities. Flowyager generates and analyzes tree data structures, that we call Flowtrees, which are succinct summaries of the raw flow data available by capture utilities. Flowtrees are self-adjusted data structures that drastically reduce space and transfer requirements, by 75% to 95%, compared to raw flow records. Flowyager manages the storage and transfers of Flowtrees, supports Flowtree operators, and provides a structured query language for answering flow queries across sites and time periods. By deploying a Flowyager prototype at both a large Internet Exchange Point and a Tier-1 Internet Service Provider, we showcase its capabilities for networks with hundreds of router interfaces. Our results show that the query response time can be reduced by an order of magnitude when compared with alternative data analytics platforms. Thus, Flowyager enables interactive network-wide queries and offers unprecedented drill-down capabilities to, e.g., identify DDoS culprits, pinpoint the involved sites, and determine the length of the attack. %K Computer Science, Networking and Internet Architecture, cs.NI
Aqeel, W., Chandrasekaran, B., Feldmann, A., & Maggs, B. M. (2020). On Landing and Internal Web Pages. In IMC’20, 20th ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3419394.3423626
Export
BibTeX
@inproceedings{Aqeel_IMC2020, TITLE = {On Landing and Internal Web Pages}, AUTHOR = {Aqeel, Waqar and Chandrasekaran, Balakrishnan and Feldmann, Anja and Maggs, Bruce M.}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423626}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC'20, 20th ACM Internet Measurement Conference}, PAGES = {680--695}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Aqeel, Waqar %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %A Maggs, Bruce M. %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations %T On Landing and Internal Web Pages : %G eng %U http://hdl.handle.net/21.11116/0000-0007-8559-F %R 10.1145/3419394.3423626 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC'20 %P 680 - 695 %I ACM %@ 9-781-4503-8138-3

More Publications

More Publications can be found here:

Research Interests

  • Internet traffic analysis
  • Internet Modeling
  • Internet Routing

Honours and Awards

  • 2018: Schelling Prize
  • 2017: Scientific member of the Max Planck Society
  • 2013: Full member of the Academia Europaea
  • 2011: Gottfried Wilhelm Leibniz Prize
  • 2011: Berlin Science Prize
  • since March 2010: Member of AcademiaNet after nomination by Leopoldina and the German Research Foundation
  • since July 15, 2009: Member (Matricel-No. 7279) of the German Academy of Sciences Leopoldina

Teachings