D3
Internet Architecture

Anja Feldmann

Prof. Anja Feldmann, Ph.D.

Address
Max-Planck-Institut für Informatik
Saarland Informatics Campus
Campus E1 4
66123 Saarbrücken
Location
E1 4 - 501
Phone
+49 681 9325 3501
Fax
+49 681 9325 3599

Personal Information

I studied computer science at Universitaet Paderborn in Germany and received my degree in 1990. After that I continued my studies at Carnegie Mellon University, where I earned my M.Sc. in 1991 and, four years later, my Ph.D. The next four years I did postdoctoral work at AT&T Labs Research, before holding research positions at Saarland University and the Technical University Munich. Since 2006, I have been professor of Internet Network Architectures at Telekom Innovation Laboratories at Technische Universitaet Berlin. In May 2012, I was elected the first woman on the employer side of the Supervisory Board of SAP. Since the beginning of 2018 I am director at the Max Planck Institute for Informatics in Saarbruecken.

Publications

2022
Prehn, L., Lichtblau, F., Dietzel, C., & Feldmann, A. (2022). Peering Only? Analyzing the Reachability Benefits of Joining Large IXPs Today. In Passive and Active Measurement (PAM 2022). Virtual Event: Springer. doi:10.1007/978-3-030-98785-5_15
Export
BibTeX
@inproceedings{Prehn_PAM2022, TITLE = {Peering Only? {A}nalyzing the Reachability Benefits of Joining Large {IXP}s Today}, AUTHOR = {Prehn, Lars and Lichtblau, Franziska and Dietzel, Christoph and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-3-030-98784-8}, DOI = {10.1007/978-3-030-98785-5_15}, PUBLISHER = {Springer}, YEAR = {2022}, DATE = {2022}, BOOKTITLE = {Passive and Active Measurement (PAM 2022)}, EDITOR = {Hohlfeld, Oliver and Moura, Giovane and Pelsser, Cristel}, PAGES = {338--366}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {13210}, ADDRESS = {Virtual Event}, }
Endnote
%0 Conference Proceedings %A Prehn, Lars %A Lichtblau, Franziska %A Dietzel, Christoph %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Peering Only? Analyzing the Reachability Benefits of Joining Large IXPs Today : %G eng %U http://hdl.handle.net/21.11116/0000-000A-28C0-0 %R 10.1007/978-3-030-98785-5_15 %D 2022 %B 23rd Annual Passive and Active Measurement Conference %Z date of event: 2022-03-28 - 2022-03-30 %C Virtual Event %B Passive and Active Measurement %E Hohlfeld, Oliver; Moura, Giovane; Pelsser, Cristel %P 338 - 366 %I Springer %@ 978-3-030-98784-8 %B Lecture Notes in Computer Science %N 13210
2021
Maghsoudlou, A., Gasser, O., & Feldmann, A. (2021a). Zeroing in on Port 0 Traffic in the Wild. In Passive and Active Measurement (PAM 2021). Virtual Event: Springer. doi:10.1007/978-3-030-72582-2_32
Export
BibTeX
@inproceedings{Maghsoudlou_PAM21, TITLE = {Zeroing in on Port 0 Traffic in the Wild}, AUTHOR = {Maghsoudlou, Aniss and Gasser, Oliver and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-3-030-72581-5}, DOI = {10.1007/978-3-030-72582-2_32}, PUBLISHER = {Springer}, YEAR = {2021}, MARGINALMARK = {$\bullet$}, DATE = {2021}, BOOKTITLE = {Passive and Active Measurement (PAM 2021)}, EDITOR = {Hohlfeld, Oliver and Lutu, Andra and Levin, Dave}, PAGES = {547--563}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {12671}, ADDRESS = {Virtual Event}, }
Endnote
%0 Conference Proceedings %A Maghsoudlou, Aniss %A Gasser, Oliver %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Zeroing in on Port 0 Traffic in the Wild : %G eng %U http://hdl.handle.net/21.11116/0000-0008-4577-5 %R 10.1007/978-3-030-72582-2_32 %D 2021 %B 22nd International Passive and Active Measurement Conference %Z date of event: 2021-03-29 - 2021-04-01 %C Virtual Event %B Passive and Active Measurement %E Hohlfeld, Oliver; Lutu, Andra; Levin, Dave %P 547 - 563 %I Springer %@ 978-3-030-72581-5 %B Lecture Notes in Computer Science %N 12671
Shukla, A., Hudemann, K. N., Vági, Z., Hügerich, L., Smaragdakis, G., Hecker, A., … Feldmann, A. (2021). Fix with P6: Verifying Programmable Switches at Runtime. In IEEE INFOCOM 2021. Vancouver, Canada: IEEE. doi:10.1109/INFOCOM42981.2021.9488772
Export
BibTeX
@inproceedings{Shukla_INFOCOM21, TITLE = {Fix with {P6}: {V}erifying Programmable Switches at Runtime}, AUTHOR = {Shukla, Apoorv and Hudemann, Kevin Nico and V{\'a}gi, Zsolt and H{\"u}gerich, Lily and Smaragdakis, Georgios and Hecker, Artur and Schmid, Stefan and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-6654-0325-2}, DOI = {10.1109/INFOCOM42981.2021.9488772}, PUBLISHER = {IEEE}, YEAR = {2021}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {IEEE INFOCOM 2021}, PAGES = {1--10}, ADDRESS = {Vancouver, Canada}, }
Endnote
%0 Conference Proceedings %A Shukla, Apoorv %A Hudemann, Kevin Nico %A Vági, Zsolt %A Hügerich, Lily %A Smaragdakis, Georgios %A Hecker, Artur %A Schmid, Stefan %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Fix with P6: Verifying Programmable Switches at Runtime : %G eng %U http://hdl.handle.net/21.11116/0000-0009-7430-E %R 10.1109/INFOCOM42981.2021.9488772 %D 2021 %B IEEE Conference on Computer Communications %Z date of event: 2021-05-10 - 2021-05-13 %C Vancouver, Canada %B IEEE INFOCOM 2021 %P 1 - 10 %I IEEE %@ 978-1-6654-0325-2
Wagner, D., Kopp, D., Wichtlhuber, M., Dietzel, C., Hohlfeld, O., Smaragdakis, G., & Feldmann, A. (2021). United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale. In CCS ’21, ACM SIGSAC Conference on Computer and Communications Security. Virtual Event, Republic of Korea: ACM. doi:10.1145/3460120.3485385
Export
BibTeX
@inproceedings{Wagner_CCC2021, TITLE = {United We Stand: {C}ollaborative Detection and Mitigation of Amplification {DDoS} Attacks at Scale}, AUTHOR = {Wagner, Daniel and Kopp, Daniel and Wichtlhuber, Matthias and Dietzel, Christoph and Hohlfeld, Oliver and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-8454-4}, DOI = {10.1145/3460120.3485385}, PUBLISHER = {ACM}, YEAR = {2021}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {CCS '21, ACM SIGSAC Conference on Computer and Communications Security}, EDITOR = {Kim, Yongdae and Kim, Jong and Vigna, Giovanni and Shi, Elaine and Kim, Hyoungshick and Hong, Jin B.}, PAGES = {970--987}, ADDRESS = {Virtual Event, Republic of Korea}, }
Endnote
%0 Conference Proceedings %A Wagner, Daniel %A Kopp, Daniel %A Wichtlhuber, Matthias %A Dietzel, Christoph %A Hohlfeld, Oliver %A Smaragdakis, Georgios %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale : %G eng %U http://hdl.handle.net/21.11116/0000-0009-C6C3-B %R 10.1145/3460120.3485385 %D 2021 %B ACM SIGSAC Conference on Computer and Communications Security %Z date of event: 2021-11-15 - 2021-11-19 %C Virtual Event, Republic of Korea %B CCS '21 %E Kim, Yongdae; Kim, Jong; Vigna, Giovanni; Shi, Elaine; Kim, Hyoungshick; Hong, Jin B. %P 970 - 987 %I ACM %@ 978-1-4503-8454-4
Feldmann, A., Gasser, O., Lichtblau, F., Pujol, E., Poese, I., Dietzel, C., … Smaragdakis, G. (2021). A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic. Communications of the ACM, 64(7). doi:10.1145/3465212
Export
BibTeX
@article{FeldmannCACM2021, TITLE = {A year in lockdown: how the waves of {COVID}-19 impact internet traffic}, AUTHOR = {Feldmann, Anja and Gasser, Oliver and Lichtblau, Franziska and Pujol, Enric and Poese, Ingmar and Dietzel, Christoph and Wagner, Daniel and Wichtlhuber, Matthias and Tapiador, Juan and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver and Smaragdakis, Georgios}, LANGUAGE = {eng}, ISSN = {0001-0782}, DOI = {10.1145/3465212}, PUBLISHER = {ACM}, ADDRESS = {New York, NY}, YEAR = {2021}, MARGINALMARK = {$\bullet$}, JOURNAL = {Communications of the ACM}, VOLUME = {64}, NUMBER = {7}, PAGES = {101--108}, }
Endnote
%0 Journal Article %A Feldmann, Anja %A Gasser, Oliver %A Lichtblau, Franziska %A Pujol, Enric %A Poese, Ingmar %A Dietzel, Christoph %A Wagner, Daniel %A Wichtlhuber, Matthias %A Tapiador, Juan %A Vallina-Rodriguez, Narseo %A Hohlfeld, Oliver %A Smaragdakis, Georgios %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations %T A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic : %G eng %U http://hdl.handle.net/21.11116/0000-0008-E186-2 %R 10.1145/3465212 %7 2021 %D 2021 %J Communications of the ACM %V 64 %N 7 %& 101 %P 101 - 108 %I ACM %C New York, NY %@ false
Palmer, M., Appel, M., Spiteri, K., Chandrasekaran, B., Feldmann, A., & Sitaraman, R. K. (2021). VOXEL: Cross-Layer Optimization for Video Streaming with Imperfect Transmission. In CoNEXT ’21, 17th International Conference on Emerging Networking Experiments And Technologies. Virtual Event, Germany: ACM. doi:10.1145/3485983.3494864
Export
BibTeX
@inproceedings{Palmer_CoNEXT2021, TITLE = {{VOXEL}: {C}ross-Layer Optimization for Video Streaming with Imperfect Transmission}, AUTHOR = {Palmer, Mirko and Appel, Malte and Spiteri, Kevin and Chandrasekaran, Balakrishnan and Feldmann, Anja and Sitaraman, Ramesh K.}, LANGUAGE = {eng}, ISBN = {9781450390989}, DOI = {10.1145/3485983.3494864}, PUBLISHER = {ACM}, YEAR = {2021}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {CoNEXT '21, 17th International Conference on Emerging Networking Experiments And Technologies}, PAGES = {359--374}, ADDRESS = {Virtual Event, Germany}, }
Endnote
%0 Conference Proceedings %A Palmer, Mirko %A Appel, Malte %A Spiteri, Kevin %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %A Sitaraman, Ramesh K. %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Theory, Fritz Haber Institute, Max Planck Society Theory, Fritz Haber Institute, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Theory, Fritz Haber Institute, Max Planck Society %T VOXEL: Cross-Layer Optimization for Video Streaming with Imperfect Transmission : %G eng %U http://hdl.handle.net/21.11116/0000-000A-A0F8-9 %R 10.1145/3485983.3494864 %D 2021 %B 17th International Conference on Emerging Networking Experiments And Technologies %Z date of event: 2021-12-07 - 2021-12-10 %C Virtual Event, Germany %B CoNEXT '21 %P 359 - 374 %I ACM %@ 9781450390989
Saidi, S. J., Mandalari, A. M., Haddadi, H., Dubois, D. J., Choffnes, D. R., Smaragdakis, G., & Feldmann, A. (2021). Detecting Consumer IoT Devices through the Lens of an ISP. In ANRW ’21, Applied Networking Research Workshop. Virtual Event, USA: ACM. doi:10.1145/3472305.3472885
Export
BibTeX
@inproceedings{Saidi_ANRW21, TITLE = {Detecting Consumer {IoT} Devices through the Lens of an {ISP}}, AUTHOR = {Saidi, Said Jawad and Mandalari, Anna Maria and Haddadi, Hamed and Dubois, Daniel J. and Choffnes, David R. and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-8618-0}, DOI = {10.1145/3472305.3472885}, PUBLISHER = {ACM}, YEAR = {2021}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {ANRW '21, Applied Networking Research Workshop}, PAGES = {36--38}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Saidi, Said Jawad %A Mandalari, Anna Maria %A Haddadi, Hamed %A Dubois, Daniel J. %A Choffnes, David R. %A Smaragdakis, Georgios %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Detecting Consumer IoT Devices through the Lens of an ISP : %G eng %U http://hdl.handle.net/21.11116/0000-0009-741F-3 %R 10.1145/3472305.3472885 %D 2021 %B Applied Networking Research Workshop %Z date of event: 2021-06-24 - 2021-06-30 %C Virtual Event, USA %B ANRW '21 %P 36 - 38 %I ACM %@ 978-1-4503-8618-0
Prehn, L., & Feldmann, A. (2021). How Biased is our Validation (Data) for AS Relationships? In IMC ’21, ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3487552.3487825
Export
BibTeX
@inproceedings{Prehn_IMC21, TITLE = {How Biased is our Validation (Data) for {AS} Relationships?}, AUTHOR = {Prehn, Lars and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-9129-0}, DOI = {10.1145/3487552.3487825}, PUBLISHER = {ACM}, YEAR = {2021}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {IMC '21, ACM Internet Measurement Conference}, PAGES = {612--620}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Prehn, Lars %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T How Biased is our Validation (Data) for AS Relationships? : %G eng %U http://hdl.handle.net/21.11116/0000-0009-7426-A %R 10.1145/3487552.3487825 %D 2021 %B ACM Internet Measurement Conference %Z date of event: 2021-11-02 - 2021-11-04 %C Virtual Event, USA %B IMC '21 %P 612 - 620 %I ACM %@ 978-1-4503-9129-0
Hoseini, M., Melo, P., Benevenuto, F., Feldmann, A., & Zannettou, S. (2021). On the Globalization of the QAnon Conspiracy Theory Through Telegram. Retrieved from https://arxiv.org/abs/2105.13020
(arXiv: 2105.13020)
Abstract
QAnon is a far-right conspiracy theory that became popular and mainstream over the past few years. Worryingly, the QAnon conspiracy theory has implications in the real world, with supporters of the theory participating in real-world violent acts like the US capitol attack in 2021. At the same time, the QAnon theory started evolving into a global phenomenon by attracting followers across the globe and, in particular, in Europe. Therefore, it is imperative to understand how the QAnon theory became a worldwide phenomenon and how this dissemination has been happening in the online space. This paper performs a large-scale data analysis of QAnon through Telegram by collecting 4.5M messages posted in 161 QAnon groups/channels. Using Google's Perspective API, we analyze the toxicity of QAnon content across languages and over time. Also, using a BERT-based topic modeling approach, we analyze the QAnon discourse across multiple languages. Among other things, we find that the German language is prevalent in QAnon groups/channels on Telegram, even overshadowing English after 2020. Also, we find that content posted in German and Portuguese tends to be more toxic compared to English. Our topic modeling indicates that QAnon supporters discuss various topics of interest within far-right movements, including world politics, conspiracy theories, COVID-19, and the anti-vaccination movement. Taken all together, we perform the first multilingual study on QAnon through Telegram and paint a nuanced overview of the globalization of the QAnon theory.
Export
BibTeX
@online{, TITLE = {On the Globalization of the {QAnon} Conspiracy Theory Through {Telegram}}, AUTHOR = {Hoseini, Mohamad and Melo, Philipe and Benevenuto, Fabricio and Feldmann, Anja and Zannettou, Savvas}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2105.13020}, EPRINT = {2105.13020}, EPRINTTYPE = {arXiv}, YEAR = {2021}, MARGINALMARK = {$\bullet$}, ABSTRACT = {QAnon is a far-right conspiracy theory that became popular and mainstream over the past few years. Worryingly, the QAnon conspiracy theory has implications in the real world, with supporters of the theory participating in real-world violent acts like the US capitol attack in 2021. At the same time, the QAnon theory started evolving into a global phenomenon by attracting followers across the globe and, in particular, in Europe. Therefore, it is imperative to understand how the QAnon theory became a worldwide phenomenon and how this dissemination has been happening in the online space. This paper performs a large-scale data analysis of QAnon through Telegram by collecting 4.5M messages posted in 161 QAnon groups/channels. Using Google's Perspective API, we analyze the toxicity of QAnon content across languages and over time. Also, using a BERT-based topic modeling approach, we analyze the QAnon discourse across multiple languages. Among other things, we find that the German language is prevalent in QAnon groups/channels on Telegram, even overshadowing English after 2020. Also, we find that content posted in German and Portuguese tends to be more toxic compared to English. Our topic modeling indicates that QAnon supporters discuss various topics of interest within far-right movements, including world politics, conspiracy theories, COVID-19, and the anti-vaccination movement. Taken all together, we perform the first multilingual study on QAnon through Telegram and paint a nuanced overview of the globalization of the QAnon theory.}, }
Endnote
%0 Report %A Hoseini, Mohamad %A Melo, Philipe %A Benevenuto, Fabricio %A Feldmann, Anja %A Zannettou, Savvas %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T On the Globalization of the QAnon Conspiracy Theory Through Telegram : %G eng %U http://hdl.handle.net/21.11116/0000-0009-749D-4 %U https://arxiv.org/abs/2105.13020 %D 2021 %X QAnon is a far-right conspiracy theory that became popular and mainstream over the past few years. Worryingly, the QAnon conspiracy theory has implications in the real world, with supporters of the theory participating in real-world violent acts like the US capitol attack in 2021. At the same time, the QAnon theory started evolving into a global phenomenon by attracting followers across the globe and, in particular, in Europe. Therefore, it is imperative to understand how the QAnon theory became a worldwide phenomenon and how this dissemination has been happening in the online space. This paper performs a large-scale data analysis of QAnon through Telegram by collecting 4.5M messages posted in 161 QAnon groups/channels. Using Google's Perspective API, we analyze the toxicity of QAnon content across languages and over time. Also, using a BERT-based topic modeling approach, we analyze the QAnon discourse across multiple languages. Among other things, we find that the German language is prevalent in QAnon groups/channels on Telegram, even overshadowing English after 2020. Also, we find that content posted in German and Portuguese tends to be more toxic compared to English. Our topic modeling indicates that QAnon supporters discuss various topics of interest within far-right movements, including world politics, conspiracy theories, COVID-19, and the anti-vaccination movement. Taken all together, we perform the first multilingual study on QAnon through Telegram and paint a nuanced overview of the globalization of the QAnon theory. %K Computer Science, Computers and Society, cs.CY,cs.SI
Maghsoudlou, A., Gasser, O., & Feldmann, A. (2021b). Zeroing in on Port 0 Traffic in the Wild. Retrieved from https://arxiv.org/abs/2103.13055
(arXiv: 2103.13055)
Abstract
Internet services leverage transport protocol port numbers to specify the source and destination application layer protocols. While using port 0 is not allowed in most transport protocols, we see a non-negligible share of traffic using port 0 in the Internet. In this study, we dissect port 0 traffic to infer its possible origins and causes using five complementing flow-level and packet-level datasets. We observe 73 GB of port 0 traffic in one week of IXP traffic, most of which we identify as an artifact of packet fragmentation. In our packet-level datasets, most traffic is originated from a small number of hosts and while most of the packets have no payload, a major fraction of packets containing payload belong to the BitTorrent protocol. Moreover, we find unique traffic patterns commonly seen in scanning. In addition to analyzing passive traces, we also conduct an active measurement campaign to study how different networks react to port 0 traffic. We find an unexpectedly high response rate for TCP port 0 probes in IPv4, with very low response rates with other protocol types. Finally, we will be running continuous port 0 measurements and providing the results to the measurement community.
Export
BibTeX
@online{Maghsoudlou_2103.13055, TITLE = {Zeroing in on Port 0 Traffic in the Wild}, AUTHOR = {Maghsoudlou, Aniss and Gasser, Oliver and Feldmann, Anja}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2103.13055}, EPRINT = {2103.13055}, EPRINTTYPE = {arXiv}, YEAR = {2021}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Internet services leverage transport protocol port numbers to specify the source and destination application layer protocols. While using port 0 is not allowed in most transport protocols, we see a non-negligible share of traffic using port 0 in the Internet. In this study, we dissect port 0 traffic to infer its possible origins and causes using five complementing flow-level and packet-level datasets. We observe 73 GB of port 0 traffic in one week of IXP traffic, most of which we identify as an artifact of packet fragmentation. In our packet-level datasets, most traffic is originated from a small number of hosts and while most of the packets have no payload, a major fraction of packets containing payload belong to the BitTorrent protocol. Moreover, we find unique traffic patterns commonly seen in scanning. In addition to analyzing passive traces, we also conduct an active measurement campaign to study how different networks react to port 0 traffic. We find an unexpectedly high response rate for TCP port 0 probes in IPv4, with very low response rates with other protocol types. Finally, we will be running continuous port 0 measurements and providing the results to the measurement community.}, }
Endnote
%0 Report %A Maghsoudlou, Aniss %A Gasser, Oliver %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Zeroing in on Port 0 Traffic in the Wild : %G eng %U http://hdl.handle.net/21.11116/0000-0009-7436-8 %U https://arxiv.org/abs/2103.13055 %D 2021 %X Internet services leverage transport protocol port numbers to specify the source and destination application layer protocols. While using port 0 is not allowed in most transport protocols, we see a non-negligible share of traffic using port 0 in the Internet. In this study, we dissect port 0 traffic to infer its possible origins and causes using five complementing flow-level and packet-level datasets. We observe 73 GB of port 0 traffic in one week of IXP traffic, most of which we identify as an artifact of packet fragmentation. In our packet-level datasets, most traffic is originated from a small number of hosts and while most of the packets have no payload, a major fraction of packets containing payload belong to the BitTorrent protocol. Moreover, we find unique traffic patterns commonly seen in scanning. In addition to analyzing passive traces, we also conduct an active measurement campaign to study how different networks react to port 0 traffic. We find an unexpectedly high response rate for TCP port 0 probes in IPv4, with very low response rates with other protocol types. Finally, we will be running continuous port 0 measurements and providing the results to the measurement community. %K Computer Science, Networking and Internet Architecture, cs.NI
2020
Shukla, A., Hudemann, K., Vági, Z., Hügerich, L., Smaragdakis, G., Schmid, S., … Feldmann, A. (2020). Towards Runtime Verification of Programmable Switches. Retrieved from http://arxiv.org/abs/2004.10887
(arXiv: 2004.10887)
Abstract
Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time localization of bugs in P4 programs using software testing techniques like Tarantula. Once the bug in a P4 program is localized, the faulty code can be patched due to the programmable nature of P4. In addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest version), our observation is that as the programmable blocks increase, the patchability of P4 programs increases accordingly. To this end, we design, develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs in P4 programs with minimal human interaction. P6 tests P4 switch non-intrusively, i.e., requires no modification to the P4 program for detecting and localizing bugs. We used a P6 prototype to detect and patch seven existing bugs in eight publicly available P4 application programs deployed on two different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation shows that P6 significantly outperforms bug detection baselines while generating fewer packets and patches bugs in P4 programs such as switch.p4 without triggering any regressions.
Export
BibTeX
@online{Shukla_arXiv2004.10887, TITLE = {Towards Runtime Verification of Programmable Switches}, AUTHOR = {Shukla, Apoorv and Hudemann, Kevin and V{\'a}gi, Zsolt and H{\"u}gerich, Lily and Smaragdakis, Georgios and Schmid, Stefan and Hecker, Artur and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/2004.10887}, EPRINT = {2004.10887}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time localization of bugs in P4 programs using software testing techniques like Tarantula. Once the bug in a P4 program is localized, the faulty code can be patched due to the programmable nature of P4. In addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest version), our observation is that as the programmable blocks increase, the patchability of P4 programs increases accordingly. To this end, we design, develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs in P4 programs with minimal human interaction. P6 tests P4 switch non-intrusively, i.e., requires no modification to the P4 program for detecting and localizing bugs. We used a P6 prototype to detect and patch seven existing bugs in eight publicly available P4 application programs deployed on two different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation shows that P6 significantly outperforms bug detection baselines while generating fewer packets and patches bugs in P4 programs such as switch.p4 without triggering any regressions.}, }
Endnote
%0 Report %A Shukla, Apoorv %A Hudemann, Kevin %A Vági, Zsolt %A Hügerich, Lily %A Smaragdakis, Georgios %A Schmid, Stefan %A Hecker, Artur %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Towards Runtime Verification of Programmable Switches : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0AAD-C %U http://arxiv.org/abs/2004.10887 %D 2020 %X Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time localization of bugs in P4 programs using software testing techniques like Tarantula. Once the bug in a P4 program is localized, the faulty code can be patched due to the programmable nature of P4. In addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest version), our observation is that as the programmable blocks increase, the patchability of P4 programs increases accordingly. To this end, we design, develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs in P4 programs with minimal human interaction. P6 tests P4 switch non-intrusively, i.e., requires no modification to the P4 program for detecting and localizing bugs. We used a P6 prototype to detect and patch seven existing bugs in eight publicly available P4 application programs deployed on two different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation shows that P6 significantly outperforms bug detection baselines while generating fewer packets and patches bugs in P4 programs such as switch.p4 without triggering any regressions. %K Computer Science, Software Engineering, cs.SE,Computer Science, Learning, cs.LG,Computer Science, Networking and Internet Architecture, cs.NI
Feldmann, A., Gasser, O., Lichtblau, F., Pujol, E., Poese, I., Dietzel, C., … Smaragdakis, G. (2020a). The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic. In IMC ’20, 20th ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3419394.3423658
Export
BibTeX
@inproceedings{Feldmann_IMC2020, TITLE = {The Lockdown Effect: Implications of the {COVID}-19 Pandemic on Internet Traffic}, AUTHOR = {Feldmann, Anja and Gasser, Oliver and Lichtblau, Franziska and Pujol, Enric and Poese, Ingmar and Dietzel, Christoph and Wagner, Daniel and Wichtlhuber, Matthias and Tapiador, Juan and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver and Smaragdakis, Georgios}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423658}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference}, PAGES = {1--18}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Feldmann, Anja %A Gasser, Oliver %A Lichtblau, Franziska %A Pujol, Enric %A Poese, Ingmar %A Dietzel, Christoph %A Wagner, Daniel %A Wichtlhuber, Matthias %A Tapiador, Juan %A Vallina-Rodriguez, Narseo %A Hohlfeld, Oliver %A Smaragdakis, Georgios %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0641-9 %R 10.1145/3419394.3423658 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC '20 %P 1 - 18 %I ACM %@ 9-781-4503-8138-3 %U https://labs.ripe.net/Members/oliver_gasser/the-lockdown-effect-implications-of-the-covid-19-pandemic-on-internet-traffic
Aqeel, W., Chandrasekaran, B., Feldmann, A., & Maggs, B. M. (2020). On Landing and Internal Web Pages. In IMC ’20, 20th ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3419394.3423626
Export
BibTeX
@inproceedings{Aqeel_IMC2020, TITLE = {On Landing and Internal Web Pages}, AUTHOR = {Aqeel, Waqar and Chandrasekaran, Balakrishnan and Feldmann, Anja and Maggs, Bruce M.}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423626}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference}, PAGES = {680--695}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Aqeel, Waqar %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %A Maggs, Bruce M. %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations %T On Landing and Internal Web Pages : %G eng %U http://hdl.handle.net/21.11116/0000-0007-8559-F %R 10.1145/3419394.3423626 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC '20 %P 680 - 695 %I ACM %@ 9-781-4503-8138-3
Prehn, L., Lichtblau, F., & Feldmann, A. (2020). When Wells Run Dry: The 2020 IPv4 Address Market. In CoNEXT’20, 16th International Conference on Emerging Networking Experiments And Technologies. Barcelona, Spain (Virtual Event): ACM. doi:10.1145/3386367.3431301
Export
BibTeX
@inproceedings{Prehn_CoNEXT2020, TITLE = {When wells run dry: the 2020 {IPv4} address market}, AUTHOR = {Prehn, Lars and Lichtblau, Franziska and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {9781450379489}, DOI = {10.1145/3386367.3431301}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {CoNEXT'20, 16th International Conference on Emerging Networking Experiments And Technologies}, EDITOR = {Han, Dongsu and Feldmann, Anja}, PAGES = {46--54}, ADDRESS = {Barcelona, Spain (Virtual Event)}, }
Endnote
%0 Conference Proceedings %A Prehn, Lars %A Lichtblau, Franziska %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T When Wells Run Dry: The 2020 IPv4 Address Market : %G eng %U http://hdl.handle.net/21.11116/0000-0007-853A-2 %R 10.1145/3386367.3431301 %D 2020 %B 16th International Conference on Emerging Networking Experiments And Technologies %Z date of event: 2020-12-01 - 2020-12-04 %C Barcelona, Spain (Virtual Event) %B CoNEXT'20 %E Han, Dongsu; Feldmann, Anja %P 46 - 54 %I ACM %@ 9781450379489
Semmler, N., Rost, M., Smaragdakis, G., & Feldmann, A. (2020). Edge Replication Strategies for Wide-Area Distributed Processing. In EdgeSys ’20, Third ACM International Workshop on Edge Systems, Analytics and Networking. Heraklion, Greece: ACM. doi:10.1145/3378679.3394532
Export
BibTeX
@inproceedings{Semmler_EdgeSys2020, TITLE = {Edge Replication Strategies for Wide-Area Distributed Processing}, AUTHOR = {Semmler, Niklas and Rost, Matthias and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-7132-2}, DOI = {10.1145/3378679.3394532}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {EdgeSys '20, Third ACM International Workshop on Edge Systems, Analytics and Networking}, PAGES = {1--6}, ADDRESS = {Heraklion, Greece}, }
Endnote
%0 Conference Proceedings %A Semmler, Niklas %A Rost, Matthias %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Edge Replication Strategies for Wide-Area Distributed Processing : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0A9F-C %R 10.1145/3378679.3394532 %D 2020 %B Third ACM International Workshop on Edge Systems, Analytics and Networking %Z date of event: 2020-04-27 - 2020-04-27 %C Heraklion, Greece %B EdgeSys '20 %P 1 - 6 %I ACM %@ 978-1-4503-7132-2
Saidi, S. J., Mandalari, A. M., Kolcun, R., Haddadi, H., Dubois, D. J., Choffnes, D., … Feldmann, A. (2020). A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild. In IMC ’20, 20th ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3419394.3423650
Export
BibTeX
@inproceedings{Saidi_IMC2020, TITLE = {A Haystack Full of Needles: {Scalable} Detection of {IoT} Devices in the Wild}, AUTHOR = {Saidi, Said Jawad and Mandalari, Anna Maria and Kolcun, Roman and Haddadi, Hamed and Dubois, Daniel J. and Choffnes, David and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423650}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference}, PAGES = {87--100}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Saidi, Said Jawad %A Mandalari, Anna Maria %A Kolcun, Roman %A Haddadi, Hamed %A Dubois, Daniel J. %A Choffnes, David %A Smaragdakis, Georgios %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild : %G eng %U http://hdl.handle.net/21.11116/0000-0007-72B5-C %R 10.1145/3419394.3423650 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC '20 %P 87 - 100 %I ACM %@ 9-781-4503-8138-3 %U https://dl.acm.org/doi/10.1145/3419394.3423650
Marcos, P., Prehn, L., Leal, L., Dainotti, A., Feldmann, A., & Barcellos, M. (2020). AS-Path Prepending: There is No Rose without a Thorn. In IMC ’20, 20th ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3419394.3423642
Export
BibTeX
@inproceedings{Marcos_IMC2020, TITLE = {{AS-Path Prepending}: {T}here is No Rose without a Thorn}, AUTHOR = {Marcos, Pedro and Prehn, Lars and Leal, Lucas and Dainotti, Alberto and Feldmann, Anja and Barcellos, Marinho}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423642}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference}, PAGES = {506--520}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Marcos, Pedro %A Prehn, Lars %A Leal, Lucas %A Dainotti, Alberto %A Feldmann, Anja %A Barcellos, Marinho %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations %T AS-Path Prepending: There is No Rose without a Thorn : %G eng %U http://hdl.handle.net/21.11116/0000-0007-854C-E %R 10.1145/3419394.3423642 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC '20 %P 506 - 520 %I ACM %@ 9-781-4503-8138-3
Enghardt, T., Zinner, T., & Feldmann, A. (2020). Using Informed Access Network Selection to Improve HTTP Adaptive Streaming Performance. In MMSys ’20, 11th ACM Multimedia Systems Conference. Istanbul, Turkey: ACM. doi:10.1145/3339825.3391865
Export
BibTeX
@inproceedings{Enghardt_MMSys2020, TITLE = {Using Informed Access Network Selection to Improve {HTTP} Adaptive Streaming Performance}, AUTHOR = {Enghardt, Theresa and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-6845-2}, DOI = {10.1145/3339825.3391865}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {MMSys '20, 11th ACM Multimedia Systems Conference}, PAGES = {126--140}, ADDRESS = {Istanbul, Turkey}, }
Endnote
%0 Conference Proceedings %A Enghardt, Theresa %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Using Informed Access Network Selection to Improve HTTP Adaptive Streaming Performance : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0AA5-4 %R 10.1145/3339825.3391865 %D 2020 %B 11th ACM Multimedia Systems Conference %Z date of event: 2020-06-08 - 2020-06-11 %C Istanbul, Turkey %B MMSys '20 %P 126 - 140 %I ACM %@ 978-1-4503-6845-2
Shukla, A., Saidi, S. J., Schmid, S., Canini, M., Zinner, T., & Feldmann, A. (2020). Toward Consistent SDNs: A Case for Network State Fuzzing. IEEE Transactions on Network and Service Management, 17(2). doi:10.1109/TNSM.2019.2955790
Export
BibTeX
@article{Shukla2020, TITLE = {Toward Consistent {SDNs}: {A} Case for Network State Fuzzing}, AUTHOR = {Shukla, Apoorv and Saidi, S. Jawad and Schmid, Stefan and Canini, Marco and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2019.2955790}, PUBLISHER = {IEEE}, ADDRESS = {Piscataway, NJ}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, JOURNAL = {IEEE Transactions on Network and Service Management}, VOLUME = {17}, NUMBER = {2}, PAGES = {668--681}, }
Endnote
%0 Journal Article %A Shukla, Apoorv %A Saidi, S. Jawad %A Schmid, Stefan %A Canini, Marco %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Toward Consistent SDNs: A Case for Network State Fuzzing : %G eng %U http://hdl.handle.net/21.11116/0000-0006-DADE-B %R 10.1109/TNSM.2019.2955790 %7 2019 %D 2020 %J IEEE Transactions on Network and Service Management %V 17 %N 2 %& 668 %P 668 - 681 %I IEEE %C Piscataway, NJ %@ false
Saidi, S. J., Maghsoudlou, A., Foucard, D., Smaragdakis, G., Poese, I., & Feldmann, A. (2020a). Exploring Network-Wide Flow Data with Flowyager. IEEE Transactions on Network and Service Management, 17(4). doi:10.1109/TNSM.2020.3034278
Export
BibTeX
@article{Saidi_10.1109/TNSM.2020.3034278, TITLE = {Exploring Network-Wide Flow Data with {Flowyager}}, AUTHOR = {Saidi, Said Jawad and Maghsoudlou, Aniss and Foucard, Damien and Smaragdakis, Georgios and Poese, Ingmar and Feldmann, Anja}, LANGUAGE = {eng}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2020.3034278}, PUBLISHER = {IEEE}, ADDRESS = {Piscataway, NJ}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, JOURNAL = {IEEE Transactions on Network and Service Management}, VOLUME = {17}, NUMBER = {4}, PAGES = {1988--2006}, }
Endnote
%0 Journal Article %A Saidi, Said Jawad %A Maghsoudlou, Aniss %A Foucard, Damien %A Smaragdakis, Georgios %A Poese, Ingmar %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Exploring Network-Wide Flow Data with Flowyager : %G eng %U http://hdl.handle.net/21.11116/0000-0007-7295-0 %R 10.1109/TNSM.2020.3034278 %7 2020 %D 2020 %J IEEE Transactions on Network and Service Management %V 17 %N 4 %& 1988 %P 1988 - 2006 %I IEEE %C Piscataway, NJ %@ false
Saidi, S. J., Maghsoudlou, A., Foucard, D., Smaragdakis, G., Poese, I., & Feldmann, A. (2020b). Exploring Network-Wide Flow Data with Flowyager. Retrieved from https://arxiv.org/abs/2010.13120
(arXiv: 2010.13120)
Abstract
Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this paper, we investigate how to improve the response time for a priori unknown network-wide queries. We present Flowyager, a system that is built on top of existing traffic capture utilities. Flowyager generates and analyzes tree data structures, that we call Flowtrees, which are succinct summaries of the raw flow data available by capture utilities. Flowtrees are self-adjusted data structures that drastically reduce space and transfer requirements, by 75% to 95%, compared to raw flow records. Flowyager manages the storage and transfers of Flowtrees, supports Flowtree operators, and provides a structured query language for answering flow queries across sites and time periods. By deploying a Flowyager prototype at both a large Internet Exchange Point and a Tier-1 Internet Service Provider, we showcase its capabilities for networks with hundreds of router interfaces. Our results show that the query response time can be reduced by an order of magnitude when compared with alternative data analytics platforms. Thus, Flowyager enables interactive network-wide queries and offers unprecedented drill-down capabilities to, e.g., identify DDoS culprits, pinpoint the involved sites, and determine the length of the attack.
Export
BibTeX
@online{Saidi_arXiv2010.13120, TITLE = {Exploring Network-Wide Flow Data with Flowyager}, AUTHOR = {Saidi, Said Jawad and Maghsoudlou, Aniss and Foucard, Damien and Smaragdakis, Georgios and Poese, Ingmar and Feldmann, Anja}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2010.13120}, EPRINT = {2010.13120}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this paper, we investigate how to improve the response time for a priori unknown network-wide queries. We present Flowyager, a system that is built on top of existing traffic capture utilities. Flowyager generates and analyzes tree data structures, that we call Flowtrees, which are succinct summaries of the raw flow data available by capture utilities. Flowtrees are self-adjusted data structures that drastically reduce space and transfer requirements, by 75% to 95%, compared to raw flow records. Flowyager manages the storage and transfers of Flowtrees, supports Flowtree operators, and provides a structured query language for answering flow queries across sites and time periods. By deploying a Flowyager prototype at both a large Internet Exchange Point and a Tier-1 Internet Service Provider, we showcase its capabilities for networks with hundreds of router interfaces. Our results show that the query response time can be reduced by an order of magnitude when compared with alternative data analytics platforms. Thus, Flowyager enables interactive network-wide queries and offers unprecedented drill-down capabilities to, e.g., identify DDoS culprits, pinpoint the involved sites, and determine the length of the attack.}, }
Endnote
%0 Report %A Saidi, Said Jawad %A Maghsoudlou, Aniss %A Foucard, Damien %A Smaragdakis, Georgios %A Poese, Ingmar %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Exploring Network-Wide Flow Data with Flowyager : %G eng %U http://hdl.handle.net/21.11116/0000-0007-8562-4 %U https://arxiv.org/abs/2010.13120 %D 2020 %X Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this paper, we investigate how to improve the response time for a priori unknown network-wide queries. We present Flowyager, a system that is built on top of existing traffic capture utilities. Flowyager generates and analyzes tree data structures, that we call Flowtrees, which are succinct summaries of the raw flow data available by capture utilities. Flowtrees are self-adjusted data structures that drastically reduce space and transfer requirements, by 75% to 95%, compared to raw flow records. Flowyager manages the storage and transfers of Flowtrees, supports Flowtree operators, and provides a structured query language for answering flow queries across sites and time periods. By deploying a Flowyager prototype at both a large Internet Exchange Point and a Tier-1 Internet Service Provider, we showcase its capabilities for networks with hundreds of router interfaces. Our results show that the query response time can be reduced by an order of magnitude when compared with alternative data analytics platforms. Thus, Flowyager enables interactive network-wide queries and offers unprecedented drill-down capabilities to, e.g., identify DDoS culprits, pinpoint the involved sites, and determine the length of the attack. %K Computer Science, Networking and Internet Architecture, cs.NI
Feldmann, A., Gasser, O., Lichtblau, F., Pujol, E., Poese, I., Dietzel, C., … Smaragdakis, G. (2020b). A View of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic. In COVID-19 Network Impacts Workshop. Virtual Workshop: IAB. Retrieved from https://www.iab.org/activities/workshops/covid-19-network-impacts-workshop-2020/
Export
BibTeX
@inproceedings{Feldmann_IABWorkshop2020, TITLE = {A view of Internet Traffic Shifts at {ISP} and {IXPs} during the {COVID}-19 Pandemic}, AUTHOR = {Feldmann, Anja and Gasser, Oliver and Lichtblau, Franziska and Pujol, Enric and Poese, Ingmar and Dietzel, Christoph and Wagner, Daniel and Wichtlhuber, Matthias and Tapiador, Juan and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver and Smaragdakis, Georgios}, LANGUAGE = {eng}, URL = {https://www.iab.org/activities/workshops/covid-19-network-impacts-workshop-2020/}, PUBLISHER = {IAB}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {COVID-19 Network Impacts Workshop}, ADDRESS = {Virtual Workshop}, }
Endnote
%0 Conference Proceedings %A Feldmann, Anja %A Gasser, Oliver %A Lichtblau, Franziska %A Pujol, Enric %A Poese, Ingmar %A Dietzel, Christoph %A Wagner, Daniel %A Wichtlhuber, Matthias %A Tapiador, Juan %A Vallina-Rodriguez, Narseo %A Hohlfeld, Oliver %A Smaragdakis, Georgios %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T A View of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic : %G eng %U http://hdl.handle.net/21.11116/0000-0007-6FA5-3 %D 2020 %B COVID-19 Network Impacts Workshop %Z date of event: 2020-11-09 - 2020-11-13 %C Virtual Workshop %B COVID-19 Network Impacts Workshop %I IAB %U https://www.iab.org/activities/workshops/covid-19-network-impacts-workshop-2020/
Hoseini, M., Melo, P., Júnior, M., Benevenuto, F., Chandrasekaran, B., Feldmann, A., & Zannettou, S. (2020). Demystifying the Messaging Platforms’ Ecosystem Through the Lens of Twitter. In IMC ’20, 20th ACM Internet Measurement Conference. Virtual Event, USA: ACM. doi:10.1145/3419394.3423651
Export
BibTeX
@inproceedings{Hoseini_IMC2020, TITLE = {Demystifying the Messaging Platforms' Ecosystem Through the Lens of {Twitter}}, AUTHOR = {Hoseini, Mohamad and Melo, Philipe and J{\'u}nior, Manoel and Benevenuto, Fabr{\'i}cio and Chandrasekaran, Balakrishnan and Feldmann, Anja and Zannettou, Savvas}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423651}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference}, PAGES = {345--359}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Hoseini, Mohamad %A Melo, Philipe %A Júnior, Manoel %A Benevenuto, Fabrício %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %A Zannettou, Savvas %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Demystifying the Messaging Platforms' Ecosystem Through the Lens of Twitter : %G eng %U http://hdl.handle.net/21.11116/0000-0007-8542-8 %R 10.1145/3419394.3423651 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC '20 %P 345 - 359 %I ACM %@ 9-781-4503-8138-3
Maghsoudlou, A., Gasser, O., & Feldmann, A. (2020). Reserved: Dissecting Internet Traffic on Port 0. In Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020. Virtual Conference. Retrieved from http://arxiv.org/abs/2004.03653
(arXiv: 2004.03653)
Abstract
Transport protocols use port numbers to allow connection multiplexing on Internet hosts. TCP as well as UDP, the two most widely used transport protocols, have limitations on what constitutes a valid and invalid port number. One example of an invalid port number for these protocols is port 0. In this work, we present preliminary results from analyzing port 0 traffic at a large European IXP. In one week of traffic we find 74GB port 0 traffic. The vast majority of this traffic has both source and destination ports set to 0, suggesting scanning or reconnaissance as its root cause. Our analysis also shows that more than half of all port 0 traffic is targeted to just 18 ASes, whereas more than half of all traffic is originated by about 100 ASes, suggesting a more diverse set of source ASes.
Export
BibTeX
@inproceedings{Maghsoudlou_PAM2020, TITLE = {Reserved: {D}issecting Internet Traffic on Port 0}, AUTHOR = {Maghsoudlou, Aniss and Gasser, Oliver and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/2004.03653}, EPRINT = {2004.03653}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Transport protocols use port numbers to allow connection multiplexing on Internet hosts. TCP as well as UDP, the two most widely used transport protocols, have limitations on what constitutes a valid and invalid port number. One example of an invalid port number for these protocols is port 0. In this work, we present preliminary results from analyzing port 0 traffic at a large European IXP. In one week of traffic we find 74GB port 0 traffic. The vast majority of this traffic has both source and destination ports set to 0, suggesting scanning or reconnaissance as its root cause. Our analysis also shows that more than half of all port 0 traffic is targeted to just 18 ASes, whereas more than half of all traffic is originated by about 100 ASes, suggesting a more diverse set of source ASes.}, BOOKTITLE = {Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020}, ADDRESS = {Virtual Conference}, }
Endnote
%0 Conference Proceedings %A Maghsoudlou, Aniss %A Gasser, Oliver %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Reserved: Dissecting Internet Traffic on Port 0 : %G eng %U http://hdl.handle.net/21.11116/0000-0006-0D13-7 %U http://arxiv.org/abs/2004.03653 %D 2020 %B The Passive and Active Measurement Conference %Z date of event: 2020-03-30 - 2020-03-31 %C Virtual Conference %X Transport protocols use port numbers to allow connection multiplexing on Internet hosts. TCP as well as UDP, the two most widely used transport protocols, have limitations on what constitutes a valid and invalid port number. One example of an invalid port number for these protocols is port 0. In this work, we present preliminary results from analyzing port 0 traffic at a large European IXP. In one week of traffic we find 74GB port 0 traffic. The vast majority of this traffic has both source and destination ports set to 0, suggesting scanning or reconnaissance as its root cause. Our analysis also shows that more than half of all port 0 traffic is targeted to just 18 ASes, whereas more than half of all traffic is originated by about 100 ASes, suggesting a more diverse set of source ASes. %K Computer Science, Networking and Internet Architecture, cs.NI %B Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020
Han, D., & Feldmann, A. (Eds.). (2020). CoNEXT ’20 : Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies. Presented at the 16th International Conference on Emerging Networking Experiments and Technologies, Barcelona, Spain (Virtual Event): ACM. doi:10.1145/3386367
Export
BibTeX
@proceedings{CoNEXT2020_Proc, TITLE = {CoNEXT '20 : Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies}, EDITOR = {Han, Dongsu and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-7948-9}, DOI = {10.1145/3386367}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ADDRESS = {Barcelona, Spain (Virtual Event)}, }
Endnote
%0 Conference Proceedings %E Han, Dongsu %E Feldmann, Anja %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T CoNEXT '20 : Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies : %G eng %U http://hdl.handle.net/21.11116/0000-0007-855E-A %R 10.1145/3386367 %@ 978-1-4503-7948-9 %I ACM %D 2020 %B 16th International Conference on Emerging Networking Experiments and Technologies %Z date of event: 2020-12-01 - 2020-12-04 %D 2020 %C Barcelona, Spain (Virtual Event)
2019
Bajpai, V., Brunstrom, A., Feldmann, A., Kellerer, W., Pras, A., Schulzrinne, H., … Wehrle, K. (2019a). The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research. ACM SIGCOMM Computer Communication Review, 49(1). doi:10.1145/3314212.3314217
Export
BibTeX
@article{Bajpai2019, TITLE = {The {D}agstuhl Beginners Guide to Reproducibility for Experimental Networking Research}, AUTHOR = {Bajpai, Vaibhav and Brunstrom, Anna and Feldmann, Anja and Kellerer, Wolfgang and Pras, Aiko and Schulzrinne, Henning and Smaragdakis, Georgios and W{\"a}hlisch, Matthias and Wehrle, Klaus}, LANGUAGE = {eng}, ISSN = {0146-4833}, DOI = {10.1145/3314212.3314217}, PUBLISHER = {ACM}, ADDRESS = {New York, NY}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, DATE = {2019}, JOURNAL = {ACM SIGCOMM Computer Communication Review}, VOLUME = {49}, NUMBER = {1}, PAGES = {24--30}, }
Endnote
%0 Journal Article %A Bajpai, Vaibhav %A Brunstrom, Anna %A Feldmann, Anja %A Kellerer, Wolfgang %A Pras, Aiko %A Schulzrinne, Henning %A Smaragdakis, Georgios %A Wählisch, Matthias %A Wehrle, Klaus %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research : %G eng %U http://hdl.handle.net/21.11116/0000-0003-36CA-D %R 10.1145/3314212.3314217 %7 2019 %D 2019 %J ACM SIGCOMM Computer Communication Review %V 49 %N 1 %& 24 %P 24 - 30 %I ACM %C New York, NY %@ false
Shukla, A., Saidi, S. J., Schmid, S., Canini, M., Zinner, T., & Feldmann, A. (2019). Consistent SDNs through Network State Fuzzing. Retrieved from http://arxiv.org/abs/1904.08977
(arXiv: 1904.08977)
Abstract
The conventional wisdom is that a software-defined network (SDN) operates under the premise that the logically centralized control plane has an accurate representation of the actual data plane state. Nevertheless, bugs, misconfigurations, faults or attacks can introduce inconsistencies that undermine correct operation. Previous work in this area, however, lacks a holistic methodology to tackle this problem and thus, addresses only certain parts of the problem. Yet, the consistency of the overall system is only as good as its least consistent part. Motivated by an analogy of network consistency checking with program testing, we propose to add active probe-based network state fuzzing to our consistency check repertoire. Hereby, our system, PAZZ, combines production traffic with active probes to continuously test if the actual forwarding path and decision elements (on the data plane) correspond to the expected ones (on the control plane). Our insight is that active traffic covers the inconsistency cases beyond the ones identified by passive traffic. PAZZ prototype was built and evaluated on topologies of varying scale and complexity. Our results show that PAZZ requires minimal network resources to detect persistent data plane faults through fuzzing and localize them quickly.
Export
BibTeX
@online{Shukla_arXiv1904.08977, TITLE = {Consistent {SDNs} through Network State Fuzzing}, AUTHOR = {Shukla, Apoorv and Saidi, Said Jawad and Schmid, Stefan and Canini, Marco and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1904.08977}, EPRINT = {1904.08977}, EPRINTTYPE = {arXiv}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, ABSTRACT = {The conventional wisdom is that a software-defined network (SDN) operates under the premise that the logically centralized control plane has an accurate representation of the actual data plane state. Nevertheless, bugs, misconfigurations, faults or attacks can introduce inconsistencies that undermine correct operation. Previous work in this area, however, lacks a holistic methodology to tackle this problem and thus, addresses only certain parts of the problem. Yet, the consistency of the overall system is only as good as its least consistent part. Motivated by an analogy of network consistency checking with program testing, we propose to add active probe-based network state fuzzing to our consistency check repertoire. Hereby, our system, PAZZ, combines production traffic with active probes to continuously test if the actual forwarding path and decision elements (on the data plane) correspond to the expected ones (on the control plane). Our insight is that active traffic covers the inconsistency cases beyond the ones identified by passive traffic. PAZZ prototype was built and evaluated on topologies of varying scale and complexity. Our results show that PAZZ requires minimal network resources to detect persistent data plane faults through fuzzing and localize them quickly.}, }
Endnote
%0 Report %A Shukla, Apoorv %A Saidi, Said Jawad %A Schmid, Stefan %A Canini, Marco %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Consistent SDNs through Network State Fuzzing : %G eng %U http://hdl.handle.net/21.11116/0000-0003-F027-2 %U http://arxiv.org/abs/1904.08977 %D 2019 %X The conventional wisdom is that a software-defined network (SDN) operates under the premise that the logically centralized control plane has an accurate representation of the actual data plane state. Nevertheless, bugs, misconfigurations, faults or attacks can introduce inconsistencies that undermine correct operation. Previous work in this area, however, lacks a holistic methodology to tackle this problem and thus, addresses only certain parts of the problem. Yet, the consistency of the overall system is only as good as its least consistent part. Motivated by an analogy of network consistency checking with program testing, we propose to add active probe-based network state fuzzing to our consistency check repertoire. Hereby, our system, PAZZ, combines production traffic with active probes to continuously test if the actual forwarding path and decision elements (on the data plane) correspond to the expected ones (on the control plane). Our insight is that active traffic covers the inconsistency cases beyond the ones identified by passive traffic. PAZZ prototype was built and evaluated on topologies of varying scale and complexity. Our results show that PAZZ requires minimal network resources to detect persistent data plane faults through fuzzing and localize them quickly. %K Computer Science, Networking and Internet Architecture, cs.NI
Semmler, N., Smaragdakis, G., & Feldmann, A. (2019a). Distributed Mega-Datasets: The Need for Novel Computing Primitives. In 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019). Richardson, TX, USA: IEEE. doi:10.1109/ICDCS.2019.00167
Export
BibTeX
@inproceedings{Semmler_ICDCS2019, TITLE = {Distributed Mega-Datasets: {T}he Need for Novel Computing Primitives}, AUTHOR = {Semmler, Niklas and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-7281-2519-0}, DOI = {10.1109/ICDCS.2019.00167}, PUBLISHER = {IEEE}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, DATE = {2019}, BOOKTITLE = {39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)}, PAGES = {1684--1692}, ADDRESS = {Richardson, TX, USA}, }
Endnote
%0 Conference Proceedings %A Semmler, Niklas %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Distributed Mega-Datasets: The Need for Novel Computing Primitives : %G eng %U http://hdl.handle.net/21.11116/0000-0005-74CE-1 %R 10.1109/ICDCS.2019.00167 %D 2019 %B 39th IEEE International Conference on Distributed Computing Systems %Z date of event: 2019-07-07 - 2019-07-09 %C Richardson, TX, USA %B 39th IEEE International Conference on Distributed Computing Systems %P 1684 - 1692 %I IEEE %@ 978-1-7281-2519-0
Enghardt, T., Zinner, T., & Feldmann, A. (2019). Web Performance Pitfalls. In Passive and Active Measurement Conference (PAM 2019). Puerto Varas, Chile: Springer. doi:10.1007/978-3-030-15986-3_19
Export
BibTeX
@inproceedings{Engelhardt_PAM2019, TITLE = {Web Performance Pitfalls}, AUTHOR = {Enghardt, Theresa and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-3-030-15985-6}, DOI = {10.1007/978-3-030-15986-3_19}, PUBLISHER = {Springer}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, DATE = {2019}, BOOKTITLE = {Passive and Active Measurement Conference (PAM 2019)}, EDITOR = {Choffnes, David and Barcellos, Marinho}, PAGES = {286--303}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {11419}, ADDRESS = {Puerto Varas, Chile}, }
Endnote
%0 Conference Proceedings %A Enghardt, Theresa %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Web Performance Pitfalls : %G eng %U http://hdl.handle.net/21.11116/0000-0002-F657-7 %R 10.1007/978-3-030-15986-3_19 %D 2019 %B 20th Passive and Active Measurement Conference %Z date of event: 2019-03-27 - 2019-03-29 %C Puerto Varas, Chile %B Passive and Active Measurement Conference %E Choffnes, David; Barcellos, Marinho %P 286 - 303 %I Springer %@ 978-3-030-15985-6 %B Lecture Notes in Computer Science %N 11419
Bajpai, V., Brunstrom, A., Feldmann, A., Kellerer, W., Pras, A., Schulzrinne, H., … Wehrle, K. (2019b). The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research. Retrieved from http://arxiv.org/abs/1902.02165
(arXiv: 1902.02165)
Abstract
Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.
Export
BibTeX
@online{Bajpai_arXiv2019, TITLE = {The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research}, AUTHOR = {Bajpai, Vaibhav and Brunstrom, Anna and Feldmann, Anja and Kellerer, Wolfgang and Pras, Aiko and Schulzrinne, Henning and Smaragdakis, Georgios and W{\"a}hlisch, Matthias and Wehrle, Klaus}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1902.02165}, EPRINT = {1902.02165}, EPRINTTYPE = {arXiv}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.}, }
Endnote
%0 Report %A Bajpai, Vaibhav %A Brunstrom, Anna %A Feldmann, Anja %A Kellerer, Wolfgang %A Pras, Aiko %A Schulzrinne, Henning %A Smaragdakis, Georgios %A Wählisch, Matthias %A Wehrle, Klaus %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research : %G eng %U http://hdl.handle.net/21.11116/0000-0003-F012-9 %U http://arxiv.org/abs/1902.02165 %D 2019 %X Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others. %K Computer Science, Networking and Internet Architecture, cs.NI
Feldmann, A., Chandrasekaran, B., Fathalli, S., & Weyulu, E. N. (2019). P4-enabled Network-assisted Congestion Feedback: A Case for NACKs. In BS ’19, Workshop on Buffer Sizing. Palo Alto, CA, USA: ACM. doi:10.1145/3375235.3375238
Export
BibTeX
@inproceedings{Feldmann_BS19, TITLE = {P4-enabled Network-assisted Congestion Feedback: {A} Case for {NACKs}}, AUTHOR = {Feldmann, Anja and Chandrasekaran, Balakrishnan and Fathalli, Seifeddine and Weyulu, Emilia Ndilokelwa}, LANGUAGE = {eng}, ISBN = {9781450377454}, DOI = {10.1145/3375235.3375238}, PUBLISHER = {ACM}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {BS '19, Workshop on Buffer Sizing}, EID = {3}, ADDRESS = {Palo Alto, CA, USA}, }
Endnote
%0 Conference Proceedings %A Feldmann, Anja %A Chandrasekaran, Balakrishnan %A Fathalli, Seifeddine %A Weyulu, Emilia Ndilokelwa %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T P4-enabled Network-assisted Congestion Feedback: A Case for NACKs : %G eng %U http://hdl.handle.net/21.11116/0000-0008-4580-9 %R 10.1145/3375235.3375238 %D 2019 %B Workshop on Buffer Sizing %Z date of event: 2019-12-02 - 2019-12-03 %C Palo Alto, CA, USA %B BS '19 %Z sequence number: 3 %I ACM %@ 9781450377454
Pujol, E., Poese, I., Zerwas, J., Smaragdakis, G., & Feldmann, A. (2019). Steering Hyper-Giants’ Traffic at Scale. In CoNEXT ’19, 15th International Conference on Emerging Networking Experiments And Technologies. Orlando, FL, USA: ACM. doi:10.1145/3359989.3365430
Export
BibTeX
@inproceedings{Pujol_CoNEXT2019, TITLE = {Steering Hyper-Giants' Traffic at Scale}, AUTHOR = {Pujol, Enric and Poese, Ingmar and Zerwas, Johannes and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-6998-5}, DOI = {10.1145/3359989.3365430}, PUBLISHER = {ACM}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {CoNEXT '19, 15th International Conference on Emerging Networking Experiments And Technologies}, PAGES = {82--95}, ADDRESS = {Orlando, FL, USA}, }
Endnote
%0 Conference Proceedings %A Pujol, Enric %A Poese, Ingmar %A Zerwas, Johannes %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Steering Hyper-Giants' Traffic at Scale : %G eng %U http://hdl.handle.net/21.11116/0000-0005-74C6-9 %R 10.1145/3359989.3365430 %D 2019 %B 15th International Conference on Emerging Networking Experiments And Technologies %Z date of event: 2019-12-09 - 2019-12-12 %C Orlando, FL, USA %B CoNEXT '19 %P 82 - 95 %I ACM %@ 978-1-4503-6998-5
Enghardt, T., Tiesel, P. S., Zinner, T., & Feldmann, A. (2019). Informed Access Network Selection: The Benefits of Socket Intents for Web Performance. In 15th International Conference on Network and Service Management (CNSM 2019). Halifax, Canada: IEEE. doi:10.23919/CNSM46954.2019.9012714
Export
BibTeX
@inproceedings{Enghardt_CNSM2019, TITLE = {Informed Access Network Selection: {The} Benefits of Socket Intents for {Web} Performance}, AUTHOR = {Enghardt, Theresa and Tiesel, Philipp S. and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-3-903176-24-9}, DOI = {10.23919/CNSM46954.2019.9012714}, PUBLISHER = {IEEE}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {15th International Conference on Network and Service Management (CNSM 2019)}, PAGES = {1--9}, ADDRESS = {Halifax, Canada}, }
Endnote
%0 Conference Proceedings %A Enghardt, Theresa %A Tiesel, Philipp S. %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Informed Access Network Selection: The Benefits of Socket Intents for Web Performance : %G eng %U http://hdl.handle.net/21.11116/0000-0007-7300-7 %R 10.23919/CNSM46954.2019.9012714 %D 2019 %B 15th International Conference on Network and Service Management %Z date of event: 2019-10-21 - 2019-10-25 %C Halifax, Canada %B 15th International Conference on Network and Service Management %P 1 - 9 %I IEEE %@ 978-3-903176-24-9
Semmler, N., Smaragdakis, G., & Feldmann, A. (2019b). Online Replication Strategies for Distributed Data Stores. Open Journal of Internet Of Things, 5(1). Retrieved from urn:nbn:de:101:1-2019092919335387371884
Export
BibTeX
@article{Semmler2019, TITLE = {Online Replication Strategies for Distributed Data Stores}, AUTHOR = {Semmler, Niklas and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISSN = {2364-7108}, URL = {urn:nbn:de:101:1-2019092919335387371884}, PUBLISHER = {RonPub UG}, ADDRESS = {L{\"u}beck}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, JOURNAL = {Open Journal of Internet Of Things}, VOLUME = {5}, NUMBER = {1}, PAGES = {47--57}, }
Endnote
%0 Journal Article %A Semmler, Niklas %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Online Replication Strategies for Distributed Data Stores : %G eng %U http://hdl.handle.net/21.11116/0000-0005-74C1-E %U urn:nbn:de:101:1-2019092919335387371884 %F OTHER: GLN-LP 1195986211 %7 2019 %D 2019 %J Open Journal of Internet Of Things %O OJIOT %V 5 %N 1 %& 47 %P 47 - 57 %I RonPub UG %C Lübeck %@ false
2018
Streibelt, F., Lichtblau, F., Beverly, R., Feldmann, A., Pelsser, C., Smaragdakis, G., & Bush, R. (2018). BGP Communities: Even more Worms in the Routing Can. In IMC’18, Internet Measurement Conference. Boston, MA, USA: ACM. doi:10.1145/3278532.3278557
Export
BibTeX
@inproceedings{Streibelt_IMC2018, TITLE = {{BGP} Communities: {E}ven more Worms in the Routing Can}, AUTHOR = {Streibelt, Florian and Lichtblau, Franziska and Beverly, Robert and Feldmann, Anja and Pelsser, Cristel and Smaragdakis, Georgios and Bush, Randy}, LANGUAGE = {eng}, ISBN = {978-1-4503-5619-0}, DOI = {10.1145/3278532.3278557}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {IMC'18, Internet Measurement Conference}, PAGES = {279--292}, ADDRESS = {Boston, MA, USA}, }
Endnote
%0 Conference Proceedings %A Streibelt, Florian %A Lichtblau, Franziska %A Beverly, Robert %A Feldmann, Anja %A Pelsser, Cristel %A Smaragdakis, Georgios %A Bush, Randy %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations %T BGP Communities: Even more Worms in the Routing Can : %G eng %U http://hdl.handle.net/21.11116/0000-0002-BFC7-7 %R 10.1145/3278532.3278557 %D 2018 %B Internet Measurement Conference %Z date of event: 2018-10-31 - 2018-11-02 %C Boston, MA, USA %B IMC'18 %P 279 - 292 %I ACM %@ 978-1-4503-5619-0
Saidi, S. J., Foucard, D., Smaragdakis, G., & Feldmann, A. (2018). Flowtree: Enabling Distributed Flow Summarization at Scale. In SIGCOMM’18. Budapest, Hungary: ACM. doi:10.1145/3234200.3234225
Export
BibTeX
@inproceedings{Saidi_SIGCOMM2018, TITLE = {Flowtree: Enabling Distributed Flow Summarization at Scale}, AUTHOR = {Saidi, Said Jawad and Foucard, Damien and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-5915-3}, DOI = {10.1145/3234200.3234225}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {SIGCOMM'18}, PAGES = {30-32}, ADDRESS = {Budapest, Hungary}, }
Endnote
%0 Conference Proceedings %A Saidi, Said Jawad %A Foucard, Damien %A Smaragdakis, Georgios %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Flowtree: Enabling Distributed Flow Summarization at Scale : %G eng %U http://hdl.handle.net/21.11116/0000-0002-1577-1 %R 10.1145/3234200.3234225 %D 2018 %B SIGCOMM 2018 %Z date of event: 2018-08-20 - 2018-08-25 %C Budapest, Hungary %B SIGCOMM'18 %P 30-32 %I ACM %@ 978-1-4503-5915-3
Thimmaraju, K., Shastry, B., Fiebig, T., Hetzelt, F., Seifert, J.-P., Feldmann, A., & Schmid, S. (2018). Taking Control of SDN-based Cloud Systems via the Data Plane. In Proceedings of the Symposium on SDN Research (SOSR 2018). Los Angeles, CA, USA: ACM. doi:10.1145/3185467.3185468
Export
BibTeX
@inproceedings{ThimmarajuSOSR2018, TITLE = {Taking Control of {SDN}-based Cloud Systems via the Data Plane}, AUTHOR = {Thimmaraju, Kashyap and Shastry, Bhargava and Fiebig, Tobias and Hetzelt, Felicitas and Seifert, Jean-Pierre and Feldmann, Anja and Schmid, Stefan}, LANGUAGE = {eng}, ISBN = {978-1-4503-5664-0}, DOI = {10.1145/3185467.3185468}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {Proceedings of the Symposium on SDN Research (SOSR 2018)}, EID = {1}, ADDRESS = {Los Angeles, CA, USA}, }
Endnote
%0 Conference Proceedings %A Thimmaraju, Kashyap %A Shastry, Bhargava %A Fiebig, Tobias %A Hetzelt, Felicitas %A Seifert, Jean-Pierre %A Feldmann, Anja %A Schmid, Stefan %+ External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations %T Taking Control of SDN-based Cloud Systems via the Data Plane : %G eng %U http://hdl.handle.net/21.11116/0000-0001-3CB1-4 %R 10.1145/3185467.3185468 %D 2018 %B Symposium on SDN Research %Z date of event: 2018-03-28 - 2018-03-29 %C Los Angeles, CA, USA %B Proceedings of the Symposium on SDN Research %Z sequence number: 1 %I ACM %@ 978-1-4503-5664-0
Beverly, R., Smaragdakis, G., & Feldmann, A. (Eds.). (2018). Passive and Active Measurement. Lecture Notes in Computer Science (LNCS) (Vol. 10771). Berlin, Germany: Springer. doi:10.1007/978-3-319-76481-8
Export
BibTeX
@proceedings{PAM2018, TITLE = {Passive and Active Measurement (PAM 2018)}, EDITOR = {Beverly, Robert and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, DOI = {10.1007/978-3-319-76481-8}, PUBLISHER = {Springer}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {Lecture Notes in Computer Science (LNCS)}, VOLUME = {10771}, ADDRESS = {Berlin, Germany}, }
Endnote
%0 Conference Proceedings %E Beverly, Robert %E Smaragdakis, Georgios %E Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Passive and Active Measurement : 19th International Conference, PAM 2018 ; Berlin, Germany, March 26-27, 2018 ; Proceedings %G eng %U http://hdl.handle.net/21.11116/0000-0001-3CC6-D %R 10.1007/978-3-319-76481-8 %I Springer %D 2018 %B 19th International Passive and Active Measurement Conference %Z date of event: 2018-03-26 - 2018-03-27 %D 2018 %C Berlin, Germany %V 10771
Dietzel, C., Wichtlhuber, M., Smaragdakis, G., & Feldmann, A. (2018). Stellar: Network Attack Mitigation Using Advanced Blackholing. In CoNEXT’18, 14th International Conference on Emerging Networking Experiments and Technologies. Heraklion, Greece: ACM. doi:10.1145/3281411.3281413
Export
BibTeX
@inproceedings{Dietzel_CoNTEXT, TITLE = {Stellar: {N}etwork Attack Mitigation Using Advanced Blackholing}, AUTHOR = {Dietzel, Christoph and Wichtlhuber, Matthias and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-6080-7}, DOI = {10.1145/3281411.3281413}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {CoNEXT'18, 14th International Conference on Emerging Networking Experiments and Technologies}, PAGES = {152--164}, ADDRESS = {Heraklion, Greece}, }
Endnote
%0 Conference Proceedings %A Dietzel, Christoph %A Wichtlhuber, Matthias %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Stellar: Network Attack Mitigation Using Advanced Blackholing : %G eng %U http://hdl.handle.net/21.11116/0000-0002-D534-3 %R 10.1145/3281411.3281413 %D 2018 %B 14th International Conference on Emerging Networking Experiments and Technologies %Z date of event: 2018-12-04 - 2018-12-07 %C Heraklion, Greece %B CoNEXT'18 %P 152 - 164 %I ACM %@ 978-1-4503-6080-7
Tiesel, P. S., Enghardt, T., Palmer, M., & Feldmann, A. (2018). Socket Intents: OS Support for Using Multiple Access Networks and its Benefits for Web Browsing. Retrieved from http://arxiv.org/abs/1804.08484
(arXiv: 1804.08484)
Abstract
In today's Internet, mobile devices are connected to multiple access networks, e.g., WiFi/DSL and LTE. To take advantage of the networks' diverse paths characteristics (delay, bandwidth, and reliability) and aggregate bandwidth, we need smart strategies for choosing which interface(s) to use for what traffic. In this paper, we present an approach how to tackle this challenge as part of the Operating System (OS): With the concept of Socket Intents, applications can express what they know about their communication pattern and their preferences. Using our Socket Intents Prototype and our modified BSD Socket Interface, this information is used to choose the most appropriate path or path combination on a per message or per connection basis. We evaluate our system based on the use case of Web browsing: Using our prototype and a client-side proxy, we show the feasibility and benefits of our design. Using a flow-based simulator and a full factorial experimental design, we study a broad range of access network combinations (based on typical DSL and LTE scenarios) and real workloads (Alexa Top 100 and Top 1000 Web Sites). Our policies achieve performance benefits in more than 50% of the cases and speedups of more than factor two in 20% of the cases without adding overhead in the other cases.
Export
BibTeX
@online{Tiesel_arXiv1804.08484, TITLE = {Socket Intents: {OS} Support for Using Multiple Access Networks and its Benefits for Web Browsing}, AUTHOR = {Tiesel, Philipp S. and Enghardt, Theresa and Palmer, Mirko and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1804.08484}, EPRINT = {1804.08484}, EPRINTTYPE = {arXiv}, YEAR = {2018}, ABSTRACT = {In today's Internet, mobile devices are connected to multiple access networks, e.g., WiFi/DSL and LTE. To take advantage of the networks' diverse paths characteristics (delay, bandwidth, and reliability) and aggregate bandwidth, we need smart strategies for choosing which interface(s) to use for what traffic. In this paper, we present an approach how to tackle this challenge as part of the Operating System (OS): With the concept of Socket Intents, applications can express what they know about their communication pattern and their preferences. Using our Socket Intents Prototype and our modified BSD Socket Interface, this information is used to choose the most appropriate path or path combination on a per message or per connection basis. We evaluate our system based on the use case of Web browsing: Using our prototype and a client-side proxy, we show the feasibility and benefits of our design. Using a flow-based simulator and a full factorial experimental design, we study a broad range of access network combinations (based on typical DSL and LTE scenarios) and real workloads (Alexa Top 100 and Top 1000 Web Sites). Our policies achieve performance benefits in more than 50% of the cases and speedups of more than factor two in 20% of the cases without adding overhead in the other cases.}, }
Endnote
%0 Report %A Tiesel, Philipp S. %A Enghardt, Theresa %A Palmer, Mirko %A Feldmann, Anja %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Socket Intents: OS Support for Using Multiple Access Networks and its Benefits for Web Browsing : %G eng %U http://hdl.handle.net/21.11116/0000-0002-158A-B %U http://arxiv.org/abs/1804.08484 %D 2018 %X In today's Internet, mobile devices are connected to multiple access networks, e.g., WiFi/DSL and LTE. To take advantage of the networks' diverse paths characteristics (delay, bandwidth, and reliability) and aggregate bandwidth, we need smart strategies for choosing which interface(s) to use for what traffic. In this paper, we present an approach how to tackle this challenge as part of the Operating System (OS): With the concept of Socket Intents, applications can express what they know about their communication pattern and their preferences. Using our Socket Intents Prototype and our modified BSD Socket Interface, this information is used to choose the most appropriate path or path combination on a per message or per connection basis. We evaluate our system based on the use case of Web browsing: Using our prototype and a client-side proxy, we show the feasibility and benefits of our design. Using a flow-based simulator and a full factorial experimental design, we study a broad range of access network combinations (based on typical DSL and LTE scenarios) and real workloads (Alexa Top 100 and Top 1000 Web Sites). Our policies achieve performance benefits in more than 50% of the cases and speedups of more than factor two in 20% of the cases without adding overhead in the other cases. %K Computer Science, Networking and Internet Architecture, cs.NI
Fiebig, T., Borgolte, K., Hao, S., Kruegel, C., Vigna, G., & Feldmann, A. (2018). In rDNS We Trust: Revisiting a Common Data-Source’s Reliability. In Lecture Notes in Computer Science (LNCS) (Vol. 10771). Berlin, Germany: Springer. doi:10.1007/978-3-319-76481-8_10
Export
BibTeX
@inproceedings{FiebigPAM2018, TITLE = {In {rDNS} We Trust: {R}evisiting a Common Data-Source's Reliability}, AUTHOR = {Fiebig, Tobias and Borgolte, Kevin and Hao, Shuang and Kruegel, Christopher and Vigna, Giovanni and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-3-319-76480-1}, DOI = {10.1007/978-3-319-76481-8_10}, PUBLISHER = {Springer}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {Passive and Active Measurement (PAM 2018)}, EDITOR = {Beverly, Robert and Smaragdakis, Giorgios and Feldmann, Anja}, PAGES = {131--145}, BOOKTITLE = {Lecture Notes in Computer Science (LNCS)}, VOLUME = {10771}, ADDRESS = {Berlin, Germany}, }
Endnote
%0 Conference Proceedings %A Fiebig, Tobias %A Borgolte, Kevin %A Hao, Shuang %A Kruegel, Christopher %A Vigna, Giovanni %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T In rDNS We Trust: Revisiting a Common Data-Source's Reliability : %G eng %U http://hdl.handle.net/21.11116/0000-0001-3CBD-8 %R 10.1007/978-3-319-76481-8_10 %D 2018 %B 19th International Passive and Active Measurement Conference %Z date of event: 2018-03-26 - 2018-03-27 %C Berlin, Germany %B Passive and Active Measurement %E Beverly, Robert; Smaragdakis, Giorgios; Feldmann, Anja %P 131 - 145 %I Springer %@ 978-3-319-76480-1 %B Lecture Notes in Computer Science %V 10771
Palmer, M., Krüger, T., Chandrasekaran, B., & Feldmann, A. (2018a). The QUIC Fix for Optimal Video Streaming. In EPIQ’18, Workshop on the Evolution, Performance, and Interoperability of QUIC. Heraklion, Greece: ACM. doi:10.1145/3284850.3284857
Export
BibTeX
@inproceedings{Palmer_EPIQ18, TITLE = {The {QUIC} Fix for Optimal Video Streaming}, AUTHOR = {Palmer, Mirko and Kr{\"u}ger, Thorben and Chandrasekaran, Balakrishnan and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-6082-1}, DOI = {10.1145/3284850.3284857}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {EPIQ'18, Workshop on the Evolution, Performance, and Interoperability of QUIC}, PAGES = {43--49}, ADDRESS = {Heraklion, Greece}, }
Endnote
%0 Conference Proceedings %A Palmer, Mirko %A Krüger, Thorben %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T The QUIC Fix for Optimal Video Streaming : %G eng %U http://hdl.handle.net/21.11116/0000-0002-BED7-6 %R 10.1145/3284850.3284857 %D 2018 %B Workshop on the Evolution, Performance, and Interoperability of QUIC %Z date of event: 2018-12-04 - 2018-12-04 %C Heraklion, Greece %B EPIQ'18 %P 43 - 49 %I ACM %@ 978-1-4503-6082-1
Palmer, M., Krüger, T., Chandrasekaran, B., & Feldmann, A. (2018b). The QUIC Fix for Optimal Video Streaming. Retrieved from http://arxiv.org/abs/1809.10270
(arXiv: 1809.10270)
Abstract
Within a few years of its introduction, QUIC has gained traction: a significant chunk of traffic is now delivered over QUIC. The networking community is actively engaged in debating the fairness, performance, and applicability of QUIC for various use cases, but these debates are centered around a narrow, common theme: how does the new reliable transport built on top of UDP fare in different scenarios? Support for unreliable delivery in QUIC remains largely unexplored. The option for delivering content unreliably, as in a best-effort model, deserves the QUIC designers' and community's attention. We propose extending QUIC to support unreliable streams and present a simple approach for implementation. We discuss a simple use case of video streaming---an application that dominates the overall Internet traffic---that can leverage the unreliable streams and potentially bring immense benefits to network operators and content providers. To this end, we present a prototype implementation that, by using both the reliable and unreliable streams in QUIC, outperforms both TCP and QUIC in our evaluations.
Export
BibTeX
@online{Palmer_arXiv1809.10270, TITLE = {The {QUIC} Fix for Optimal Video Streaming}, AUTHOR = {Palmer, Mirko and Kr{\"u}ger, Thorben and Chandrasekaran, Balakrishnan and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1809.10270}, EPRINT = {1809.10270}, EPRINTTYPE = {arXiv}, YEAR = {2018}, ABSTRACT = {Within a few years of its introduction, QUIC has gained traction: a significant chunk of traffic is now delivered over QUIC. The networking community is actively engaged in debating the fairness, performance, and applicability of QUIC for various use cases, but these debates are centered around a narrow, common theme: how does the new reliable transport built on top of UDP fare in different scenarios? Support for unreliable delivery in QUIC remains largely unexplored. The option for delivering content unreliably, as in a best-effort model, deserves the QUIC designers' and community's attention. We propose extending QUIC to support unreliable streams and present a simple approach for implementation. We discuss a simple use case of video streaming---an application that dominates the overall Internet traffic---that can leverage the unreliable streams and potentially bring immense benefits to network operators and content providers. To this end, we present a prototype implementation that, by using both the reliable and unreliable streams in QUIC, outperforms both TCP and QUIC in our evaluations.}, }
Endnote
%0 Report %A Palmer, Mirko %A Krüger, Thorben %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T The QUIC Fix for Optimal Video Streaming : %G eng %U http://hdl.handle.net/21.11116/0000-0002-BFC0-E %U http://arxiv.org/abs/1809.10270 %D 2018 %X Within a few years of its introduction, QUIC has gained traction: a significant chunk of traffic is now delivered over QUIC. The networking community is actively engaged in debating the fairness, performance, and applicability of QUIC for various use cases, but these debates are centered around a narrow, common theme: how does the new reliable transport built on top of UDP fare in different scenarios? Support for unreliable delivery in QUIC remains largely unexplored. The option for delivering content unreliably, as in a best-effort model, deserves the QUIC designers' and community's attention. We propose extending QUIC to support unreliable streams and present a simple approach for implementation. We discuss a simple use case of video streaming---an application that dominates the overall Internet traffic---that can leverage the unreliable streams and potentially bring immense benefits to network operators and content providers. To this end, we present a prototype implementation that, by using both the reliable and unreliable streams in QUIC, outperforms both TCP and QUIC in our evaluations. %K Computer Science, Networking and Internet Architecture, cs.NI
Enghardt, T., Tiesel, P. S., & Feldmann, A. (2018). Metrics for Access Network Selection. In ANRW’18, Applied Networking Research Workshop. Montréal, Canada: ACM. doi:10.1145/3232755.3232764
Export
BibTeX
@inproceedings{Enghardt_ANRW2018, TITLE = {Metrics for Access Network Selection}, AUTHOR = {Enghardt, Theresa and Tiesel, Philipp S. and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-5585-8}, DOI = {10.1145/3232755.3232764}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {ANRW'18, Applied Networking Research Workshop}, PAGES = {67--73}, ADDRESS = {Montr{\'e}al, Canada}, }
Endnote
%0 Conference Proceedings %A Enghardt, Theresa %A Tiesel, Philipp S. %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Metrics for Access Network Selection : %G eng %U http://hdl.handle.net/21.11116/0000-0002-1585-0 %R 10.1145/3232755.3232764 %D 2018 %B Applied Networking Research Workshop %Z date of event: 2018-07-16 - 2018-07-16 %C Montréal, Canada %B ANRW'18 %P 67 - 73 %I ACM %@ 978-1-4503-5585-8

More Publications

More Publications can be found here:

Research Interests

  • Internet traffic analysis
  • Internet Modeling
  • Internet Routing

Honours and Awards

  • 2018: Schelling Prize
  • 2017: Scientific member of the Max Planck Society
  • 2013: Full member of the Academia Europaea
  • 2011: Gottfried Wilhelm Leibniz Prize
  • 2011: Berlin Science Prize
  • since March 2010: Member of AcademiaNet after nomination by Leopoldina and the German Research Foundation
  • since July 15, 2009: Member (Matricel-No. 7279) of the German Academy of Sciences Leopoldina

Teachings

Lectures:

Data Networks

Seminars:

Hot Topics in Data Networks