Publications

2020
[1]
W. Aqeel, B. Chandrasekaran, A. Feldmann, and B. M. Maggs, “On Landing and Internal Web Pages,” in IMC ’20, 20th ACM Internet Measurement Conference, Virtual Event, USA, 2020.
Export
BibTeX
@inproceedings{Aqeel_IMC2020, TITLE = {On Landing and Internal Web Pages}, AUTHOR = {Aqeel, Waqar and Chandrasekaran, Balakrishnan and Feldmann, Anja and Maggs, Bruce M.}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423626}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference}, PAGES = {680--695}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Aqeel, Waqar %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %A Maggs, Bruce M. %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations %T On Landing and Internal Web Pages : %G eng %U http://hdl.handle.net/21.11116/0000-0007-8559-F %R 10.1145/3419394.3423626 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC '20 %P 680 - 695 %I ACM %@ 9-781-4503-8138-3
[2]
J. Baumgartner, S. Zannettou, B. Keegan, M. Squire, and J. Blackburn, “The Pushshift Reddit Dataset,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Baumgartner_ICWSM2020b, TITLE = {The {Pushshift} {Reddit} Dataset}, AUTHOR = {Baumgartner, Jason and Zannettou, Savvas and Keegan, Brian and Squire, Megan and Blackburn, Jeremy}, LANGUAGE = {eng}, ISBN = {978-1-57735-823-7}, URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7347}, PUBLISHER = {AAAI}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)}, PAGES = {830--839}, ADDRESS = {Atlanta, GA, USA (Virtual Event)}, }
Endnote
%0 Conference Proceedings %A Baumgartner, Jason %A Zannettou, Savvas %A Keegan, Brian %A Squire, Megan %A Blackburn, Jeremy %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations %T The Pushshift Reddit Dataset : %G eng %U http://hdl.handle.net/21.11116/0000-0007-8792-B %U https://ojs.aaai.org//index.php/ICWSM/article/view/7347 %D 2020 %B 14th International Conference on Web and Social Media %Z date of event: 2020-06-08 - 2020-06-11 %C Atlanta, GA, USA (Virtual Event) %B Proceedings of the Fourteenth International Conference on Web and Social Media %P 830 - 839 %I AAAI %@ 978-1-57735-823-7
[3]
J. Baumgartner, S. Zannettou, M. Squire, and J. Blackburn, “The Pushshift Telegram Dataset,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Baumgartner_ICWSM2020c, TITLE = {The {Pushshift} {Telegram} Dataset}, AUTHOR = {Baumgartner, Jason and Zannettou, Savvas and Squire, Megan and Blackburn, Jeremy}, LANGUAGE = {eng}, ISBN = {978-1-57735-823-7}, URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7348}, PUBLISHER = {AAAI}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)}, PAGES = {840--847}, ADDRESS = {Atlanta, GA, USA (Virtual Event)}, }
Endnote
%0 Conference Proceedings %A Baumgartner, Jason %A Zannettou, Savvas %A Squire, Megan %A Blackburn, Jeremy %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations %T The Pushshift Telegram Dataset : %G eng %U http://hdl.handle.net/21.11116/0000-0007-879A-3 %U https://ojs.aaai.org//index.php/ICWSM/article/view/7348 %D 2020 %B 14th International Conference on Web and Social Media %Z date of event: 2020-06-08 - 2020-06-11 %C Atlanta, GA, USA (Virtual Event) %B Proceedings of the Fourteenth International Conference on Web and Social Media %P 840 - 847 %I AAAI %@ 978-1-57735-823-7
[4]
T. Enghardt, T. Zinner, and A. Feldmann, “Using Informed Access Network Selection to Improve HTTP Adaptive Streaming Performance,” in MMSys ’20, 11th ACM Multimedia Systems Conference, Istanbul, Turkey, 2020.
Export
BibTeX
@inproceedings{Enghardt_MMSys2020, TITLE = {Using Informed Access Network Selection to Improve {HTTP} Adaptive Streaming Performance}, AUTHOR = {Enghardt, Theresa and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-6845-2}, DOI = {10.1145/3339825.3391865}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {MMSys '20, 11th ACM Multimedia Systems Conference}, PAGES = {126--140}, ADDRESS = {Istanbul, Turkey}, }
Endnote
%0 Conference Proceedings %A Enghardt, Theresa %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Using Informed Access Network Selection to Improve HTTP Adaptive Streaming Performance : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0AA5-4 %R 10.1145/3339825.3391865 %D 2020 %B 11th ACM Multimedia Systems Conference %Z date of event: 2020-06-08 - 2020-06-11 %C Istanbul, Turkey %B MMSys '20 %P 126 - 140 %I ACM %@ 978-1-4503-6845-2
[5]
A. Feldmann, O. Gasser, F. Lichtblau, E. Pujol, I. Poese, C. Dietzel, D. Wagner, M. Wichtlhuber, J. Tapiador, N. Vallina-Rodriguez, O. Hohlfeld, and G. Smaragdakis, “The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic,” in IMC ’20, 20th ACM Internet Measurement Conference, Virtual Event, USA, 2020.
Export
BibTeX
@inproceedings{Feldmann_IMC2020, TITLE = {The Lockdown Effect: Implications of the {COVID}-19 Pandemic on Internet Traffic}, AUTHOR = {Feldmann, Anja and Gasser, Oliver and Lichtblau, Franziska and Pujol, Enric and Poese, Ingmar and Dietzel, Christoph and Wagner, Daniel and Wichtlhuber, Matthias and Tapiador, Juan and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver and Smaragdakis, Georgios}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423658}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference}, PAGES = {1--18}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Feldmann, Anja %A Gasser, Oliver %A Lichtblau, Franziska %A Pujol, Enric %A Poese, Ingmar %A Dietzel, Christoph %A Wagner, Daniel %A Wichtlhuber, Matthias %A Tapiador, Juan %A Vallina-Rodriguez, Narseo %A Hohlfeld, Oliver %A Smaragdakis, Georgios %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0641-9 %R 10.1145/3419394.3423658 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC '20 %P 1 - 18 %I ACM %@ 9-781-4503-8138-3 %U https://labs.ripe.net/Members/oliver_gasser/the-lockdown-effect-implications-of-the-covid-19-pandemic-on-internet-traffic
[6]
A. Feldmann, O. Gasser, F. Lichtblau, E. Pujol, I. Poese, C. Dietzel, D. Wagner, M. Wichtlhuber, J. Tapiador, N. Vallina-Rodriguez, O. Hohlfeld, and G. Smaragdakis, “A View of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic,” in COVID-19 Network Impacts Workshop, Virtual Workshop, 2020.
Export
BibTeX
@inproceedings{Feldmann_IABWorkshop2020, TITLE = {A view of Internet Traffic Shifts at {ISP} and {IXPs} during the {COVID}-19 Pandemic}, AUTHOR = {Feldmann, Anja and Gasser, Oliver and Lichtblau, Franziska and Pujol, Enric and Poese, Ingmar and Dietzel, Christoph and Wagner, Daniel and Wichtlhuber, Matthias and Tapiador, Juan and Vallina-Rodriguez, Narseo and Hohlfeld, Oliver and Smaragdakis, Georgios}, LANGUAGE = {eng}, URL = {https://www.iab.org/activities/workshops/covid-19-network-impacts-workshop-2020/}, PUBLISHER = {IAB}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {COVID-19 Network Impacts Workshop}, ADDRESS = {Virtual Workshop}, }
Endnote
%0 Conference Proceedings %A Feldmann, Anja %A Gasser, Oliver %A Lichtblau, Franziska %A Pujol, Enric %A Poese, Ingmar %A Dietzel, Christoph %A Wagner, Daniel %A Wichtlhuber, Matthias %A Tapiador, Juan %A Vallina-Rodriguez, Narseo %A Hohlfeld, Oliver %A Smaragdakis, Georgios %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T A View of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic : %G eng %U http://hdl.handle.net/21.11116/0000-0007-6FA5-3 %D 2020 %B COVID-19 Network Impacts Workshop %Z date of event: 2020-11-09 - 2020-11-13 %C Virtual Workshop %B COVID-19 Network Impacts Workshop %I IAB %U https://www.iab.org/activities/workshops/covid-19-network-impacts-workshop-2020/
[7]
D. Han and A. Feldmann, Eds., CoNEXT ’20 : Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies. ACM, 2020.
Export
BibTeX
@proceedings{CoNEXT2020_Proc, TITLE = {CoNEXT '20 : Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies}, EDITOR = {Han, Dongsu and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-7948-9}, DOI = {10.1145/3386367}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ADDRESS = {Barcelona, Spain (Virtual Event)}, }
Endnote
%0 Conference Proceedings %E Han, Dongsu %E Feldmann, Anja %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T CoNEXT '20 : Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies : %G eng %U http://hdl.handle.net/21.11116/0000-0007-855E-A %R 10.1145/3386367 %@ 978-1-4503-7948-9 %I ACM %D 2020 %B 16th International Conference on Emerging Networking Experiments and Technologies %Z date of event: 2020-12-01 - 2020-12-04 %D 2020 %C Barcelona, Spain (Virtual Event)
[8]
M. Horta Ribeiro, J. Blackburn, B. Bradlyn, E. De Cristofaro, G. Stringhini, S. Long, S. Greenberg, and S. Zannettou, “The Evolution of the Manosphere Across the Web,” 2020. [Online]. Available: https://arxiv.org/abs/2001.07600. (arXiv: 2001.07600)
Abstract
In this paper, we present a large-scale characterization of the Manosphere, a conglomerate of Web-based misogynist movements roughly focused on "men's issues," which has seen significant growth over the past years. We do so by gathering and analyzing 28.8M posts from 6 forums and 51 subreddits. Overall, we paint a comprehensive picture of the evolution of the Manosphere on the Web, showing the links between its different communities over the years. We find that milder and older communities, such as Pick Up Artists and Men's Rights Activists, are giving way to more extremist ones like Incels and Men Going Their Own Way, with a substantial migration of active users. Moreover, our analysis suggests that these newer communities are more toxic and misogynistic than the former.
Export
BibTeX
@online{HortaRibeiro2020, TITLE = {The Evolution of the {Manosphere} Across the {Web}}, AUTHOR = {Horta Ribeiro, Manoel and Blackburn, Jeremy and Bradlyn, Barry and De Cristofaro, Emiliano and Stringhini, Gianluca and Long, Summer and Greenberg, Stephanie and Zannettou, Savvas}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2001.07600}, EPRINT = {2001.07600}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {In this paper, we present a large-scale characterization of the Manosphere, a conglomerate of Web-based misogynist movements roughly focused on "men's issues," which has seen significant growth over the past years. We do so by gathering and analyzing 28.8M posts from 6 forums and 51 subreddits. Overall, we paint a comprehensive picture of the evolution of the Manosphere on the Web, showing the links between its different communities over the years. We find that milder and older communities, such as Pick Up Artists and Men's Rights Activists, are giving way to more extremist ones like Incels and Men Going Their Own Way, with a substantial migration of active users. Moreover, our analysis suggests that these newer communities are more toxic and misogynistic than the former.}, }
Endnote
%0 Report %A Horta Ribeiro, Manoel %A Blackburn, Jeremy %A Bradlyn, Barry %A De Cristofaro, Emiliano %A Stringhini, Gianluca %A Long, Summer %A Greenberg, Stephanie %A Zannettou, Savvas %+ External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T The Evolution of the Manosphere Across the Web : %G eng %U http://hdl.handle.net/21.11116/0000-0007-89A7-2 %U https://arxiv.org/abs/2001.07600 %D 2020 %X In this paper, we present a large-scale characterization of the Manosphere, a conglomerate of Web-based misogynist movements roughly focused on "men's issues," which has seen significant growth over the past years. We do so by gathering and analyzing 28.8M posts from 6 forums and 51 subreddits. Overall, we paint a comprehensive picture of the evolution of the Manosphere on the Web, showing the links between its different communities over the years. We find that milder and older communities, such as Pick Up Artists and Men's Rights Activists, are giving way to more extremist ones like Incels and Men Going Their Own Way, with a substantial migration of active users. Moreover, our analysis suggests that these newer communities are more toxic and misogynistic than the former. %K Computer Science, Computers and Society, cs.CY
[9]
M. Horta Ribeiro, S. Jhaver, S. Zannettou, J. Blackburn, E. De Cristofaro, G. Stringhini, and R. West, “Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels,” 2020. [Online]. Available: https://arxiv.org/abs/2010.10397. (arXiv: 2010.10397)
Abstract
When toxic online communities on mainstream platforms face moderation measures, such as bans, they may migrate to other platforms with laxer policies or set up their own dedicated website. Previous work suggests that, within mainstream platforms, community-level moderation is effective in mitigating the harm caused by the moderated communities. It is, however, unclear whether these results also hold when considering the broader Web ecosystem. Do toxic communities continue to grow in terms of user base and activity on their new platforms? Do their members become more toxic and ideologically radicalized? In this paper, we report the results of a large-scale observational study of how problematic online communities progress following community-level moderation measures. We analyze data from r/The_Donald} and r/Incels, two communities that were banned from Reddit and subsequently migrated to their own standalone websites. Our results suggest that, in both cases, moderation measures significantly decreased posting activity on the new platform, reducing the number of posts, active users, and newcomers. In spite of that, users in one of the studied communities (r/The_Donald) showed increases in signals associated with toxicity and radicalization, which justifies concerns that the reduction in activity may come at the expense of a more toxic and radical community. Overall, our results paint a nuanced portrait of the consequences of community-level moderation and can inform their design and deployment.
Export
BibTeX
@online{HortaRibeiro_arXiv2010.10397, TITLE = {Does Platform Migration Compromise Content Moderation? {Evidence} from {r/The\_Donald} and {r/Incels}}, AUTHOR = {Horta Ribeiro, Manoel and Jhaver, Shagun and Zannettou, Savvas and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and West, Robert}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2010.10397}, EPRINT = {2010.10397}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {When toxic online communities on mainstream platforms face moderation measures, such as bans, they may migrate to other platforms with laxer policies or set up their own dedicated website. Previous work suggests that, within mainstream platforms, community-level moderation is effective in mitigating the harm caused by the moderated communities. It is, however, unclear whether these results also hold when considering the broader Web ecosystem. Do toxic communities continue to grow in terms of user base and activity on their new platforms? Do their members become more toxic and ideologically radicalized? In this paper, we report the results of a large-scale observational study of how problematic online communities progress following community-level moderation measures. We analyze data from r/The_Donald} and r/Incels, two communities that were banned from Reddit and subsequently migrated to their own standalone websites. Our results suggest that, in both cases, moderation measures significantly decreased posting activity on the new platform, reducing the number of posts, active users, and newcomers. In spite of that, users in one of the studied communities (r/The_Donald) showed increases in signals associated with toxicity and radicalization, which justifies concerns that the reduction in activity may come at the expense of a more toxic and radical community. Overall, our results paint a nuanced portrait of the consequences of community-level moderation and can inform their design and deployment.}, }
Endnote
%0 Report %A Horta Ribeiro, Manoel %A Jhaver, Shagun %A Zannettou, Savvas %A Blackburn, Jeremy %A De Cristofaro, Emiliano %A Stringhini, Gianluca %A West, Robert %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations %T Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels : %G eng %U http://hdl.handle.net/21.11116/0000-0007-89E0-1 %U https://arxiv.org/abs/2010.10397 %D 2020 %X When toxic online communities on mainstream platforms face moderation measures, such as bans, they may migrate to other platforms with laxer policies or set up their own dedicated website. Previous work suggests that, within mainstream platforms, community-level moderation is effective in mitigating the harm caused by the moderated communities. It is, however, unclear whether these results also hold when considering the broader Web ecosystem. Do toxic communities continue to grow in terms of user base and activity on their new platforms? Do their members become more toxic and ideologically radicalized? In this paper, we report the results of a large-scale observational study of how problematic online communities progress following community-level moderation measures. We analyze data from r/The_Donald} and r/Incels, two communities that were banned from Reddit and subsequently migrated to their own standalone websites. Our results suggest that, in both cases, moderation measures significantly decreased posting activity on the new platform, reducing the number of posts, active users, and newcomers. In spite of that, users in one of the studied communities (r/The_Donald) showed increases in signals associated with toxicity and radicalization, which justifies concerns that the reduction in activity may come at the expense of a more toxic and radical community. Overall, our results paint a nuanced portrait of the consequences of community-level moderation and can inform their design and deployment. %K Computer Science, Computers and Society, cs.CY
[10]
M. Hoseini, P. Melo, M. Júnior, F. Benevenuto, B. Chandrasekaran, A. Feldmann, and S. Zannettou, “Demystifying the Messaging Platforms’ Ecosystem Through the Lens of Twitter,” in IMC ’20, 20th ACM Internet Measurement Conference, Virtual Event, USA, 2020.
Export
BibTeX
@inproceedings{Hoseini_IMC2020, TITLE = {Demystifying the Messaging Platforms' Ecosystem Through the Lens of {Twitter}}, AUTHOR = {Hoseini, Mohamad and Melo, Philipe and J{\'u}nior, Manoel and Benevenuto, Fabr{\'i}cio and Chandrasekaran, Balakrishnan and Feldmann, Anja and Zannettou, Savvas}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423651}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference}, PAGES = {345--359}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Hoseini, Mohamad %A Melo, Philipe %A Júnior, Manoel %A Benevenuto, Fabrício %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %A Zannettou, Savvas %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Demystifying the Messaging Platforms' Ecosystem Through the Lens of Twitter : %G eng %U http://hdl.handle.net/21.11116/0000-0007-8542-8 %R 10.1145/3419394.3423651 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC '20 %P 345 - 359 %I ACM %@ 9-781-4503-8138-3
[11]
A. Maghsoudlou, O. Gasser, and A. Feldmann, “Reserved: Dissecting Internet Traffic on Port 0,” in Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020, Virtual Conference, 2020. (arXiv: 2004.03653)
Abstract
Transport protocols use port numbers to allow connection multiplexing on Internet hosts. TCP as well as UDP, the two most widely used transport protocols, have limitations on what constitutes a valid and invalid port number. One example of an invalid port number for these protocols is port 0. In this work, we present preliminary results from analyzing port 0 traffic at a large European IXP. In one week of traffic we find 74GB port 0 traffic. The vast majority of this traffic has both source and destination ports set to 0, suggesting scanning or reconnaissance as its root cause. Our analysis also shows that more than half of all port 0 traffic is targeted to just 18 ASes, whereas more than half of all traffic is originated by about 100 ASes, suggesting a more diverse set of source ASes.
Export
BibTeX
@inproceedings{Maghsoudlou_PAM2020, TITLE = {Reserved: {D}issecting Internet Traffic on Port 0}, AUTHOR = {Maghsoudlou, Aniss and Gasser, Oliver and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/2004.03653}, EPRINT = {2004.03653}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Transport protocols use port numbers to allow connection multiplexing on Internet hosts. TCP as well as UDP, the two most widely used transport protocols, have limitations on what constitutes a valid and invalid port number. One example of an invalid port number for these protocols is port 0. In this work, we present preliminary results from analyzing port 0 traffic at a large European IXP. In one week of traffic we find 74GB port 0 traffic. The vast majority of this traffic has both source and destination ports set to 0, suggesting scanning or reconnaissance as its root cause. Our analysis also shows that more than half of all port 0 traffic is targeted to just 18 ASes, whereas more than half of all traffic is originated by about 100 ASes, suggesting a more diverse set of source ASes.}, BOOKTITLE = {Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020}, ADDRESS = {Virtual Conference}, }
Endnote
%0 Conference Proceedings %A Maghsoudlou, Aniss %A Gasser, Oliver %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Reserved: Dissecting Internet Traffic on Port 0 : %G eng %U http://hdl.handle.net/21.11116/0000-0006-0D13-7 %U http://arxiv.org/abs/2004.03653 %D 2020 %B The Passive and Active Measurement Conference %Z date of event: 2020-03-30 - 2020-03-31 %C Virtual Conference %X Transport protocols use port numbers to allow connection multiplexing on Internet hosts. TCP as well as UDP, the two most widely used transport protocols, have limitations on what constitutes a valid and invalid port number. One example of an invalid port number for these protocols is port 0. In this work, we present preliminary results from analyzing port 0 traffic at a large European IXP. In one week of traffic we find 74GB port 0 traffic. The vast majority of this traffic has both source and destination ports set to 0, suggesting scanning or reconnaissance as its root cause. Our analysis also shows that more than half of all port 0 traffic is targeted to just 18 ASes, whereas more than half of all traffic is originated by about 100 ASes, suggesting a more diverse set of source ASes. %K Computer Science, Networking and Internet Architecture, cs.NI %B Extended abstract of a poster presented at Passive and Active Measurement Conference (PAM) 2020
[12]
P. Marcos, L. Prehn, L. Leal, A. Dainotti, A. Feldmann, and M. Barcellos, “AS-Path Prepending: There is No Rose without a Thorn,” in IMC ’20, 20th ACM Internet Measurement Conference, Virtual Event, USA, 2020.
Export
BibTeX
@inproceedings{Marcos_IMC2020, TITLE = {{AS-Path Prepending}: {T}here is No Rose without a Thorn}, AUTHOR = {Marcos, Pedro and Prehn, Lars and Leal, Lucas and Dainotti, Alberto and Feldmann, Anja and Barcellos, Marinho}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423642}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference}, PAGES = {506--520}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Marcos, Pedro %A Prehn, Lars %A Leal, Lucas %A Dainotti, Alberto %A Feldmann, Anja %A Barcellos, Marinho %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations %T AS-Path Prepending: There is No Rose without a Thorn : %G eng %U http://hdl.handle.net/21.11116/0000-0007-854C-E %R 10.1145/3419394.3423642 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC '20 %P 506 - 520 %I ACM %@ 9-781-4503-8138-3
[13]
A. Mittos, S. Zannettou, J. Blackburn, and E. De Cristofaro, “Analyzing Genetic Testing Discourse on the Web Through the Lens of Twitter, Reddit, and 4chan,” ACM Transactions on the Web, vol. 14, no. 4, 2020.
Export
BibTeX
@article{Mittos_2020, TITLE = {Analyzing Genetic Testing Discourse on the Web Through the Lens of {Twitter, Reddit, and 4chan}}, AUTHOR = {Mittos, Alexandros and Zannettou, Savvas and Blackburn, Jeremy and De Cristofaro, Emiliano}, LANGUAGE = {eng}, DOI = {10.1145/3404994}, PUBLISHER = {ACM}, ADDRESS = {New York, NY}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, JOURNAL = {ACM Transactions on the Web}, VOLUME = {14}, NUMBER = {4}, EID = {17}, }
Endnote
%0 Journal Article %A Mittos, Alexandros %A Zannettou, Savvas %A Blackburn, Jeremy %A De Cristofaro, Emiliano %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations %T Analyzing Genetic Testing Discourse on the Web Through the Lens of Twitter, Reddit, and 4chan : %G eng %U http://hdl.handle.net/21.11116/0000-0007-72E1-A %R 10.1145/3404994 %7 2020 %D 2020 %J ACM Transactions on the Web %V 14 %N 4 %Z sequence number: 17 %I ACM %C New York, NY
[14]
A. Mittos, S. Zannettou, J. Blackburn, and E. De Cristofaro, “‘And We Will Fight for Our Race!’ A Measurement Study of Genetic Testing Conversations on Reddit and 4chan,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020, pp. 452–463.
Export
BibTeX
@inproceedings{Mittos_ICWSM2020, TITLE = {"{A}nd We Will Fight for Our Race!" {A} Measurement Study of Genetic Testing Conversations on {R}eddit and 4chan}, AUTHOR = {Mittos, Alexandros and Zannettou, Savvas and Blackburn, Jeremy and De Cristofaro, Emiliano}, LANGUAGE = {eng}, ISBN = {978-1-57735-823-7}, URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7314}, PUBLISHER = {AAAI}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)}, PAGES = {452--463}, ADDRESS = {Atlanta, GA, USA (Virtual Event)}, }
Endnote
%0 Conference Proceedings %A Mittos, Alexandros %A Zannettou, Savvas %A Blackburn, Jeremy %A De Cristofaro, Emiliano %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations %T "And We Will Fight for Our Race!" A Measurement Study of Genetic Testing Conversations on Reddit and 4chan : %G eng %U http://hdl.handle.net/21.11116/0000-0007-859A-5 %U https://ojs.aaai.org//index.php/ICWSM/article/view/7314 %D 2020 %B 14th International Conference on Web and Social Media %Z date of event: 2020-06-08 - 2020-06-11 %C Atlanta, GA, USA (Virtual Event) %B Proceedings of the Fourteenth International Conference on Web and Social Media %P 452 - 463 %I AAAI %@ 978-1-57735-823-7
[15]
K. Papadamou, A. Papasavva, S. Zannettou, J. Blackburn, N. Kourtellis, I. Leontiadis, G. Stringhini, and M. Sirivianos, “Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Papadamou_ICWSM2020, TITLE = {Disturbed {YouTube} for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children}, AUTHOR = {Papadamou, Kostantinos and Papasavva, Antonis and Zannettou, Savvas and Blackburn, Jeremy and Kourtellis, Nicolas and Leontiadis, Ilias and Stringhini, Gianluca and Sirivianos, Michael}, LANGUAGE = {eng}, ISBN = {978-1-57735-823-7}, URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7320}, PUBLISHER = {AAAI}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)}, PAGES = {522--533}, ADDRESS = {Atlanta, GA, USA (Virtual Event)}, }
Endnote
%0 Conference Proceedings %A Papadamou, Kostantinos %A Papasavva, Antonis %A Zannettou, Savvas %A Blackburn, Jeremy %A Kourtellis, Nicolas %A Leontiadis, Ilias %A Stringhini, Gianluca %A Sirivianos, Michael %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations %T Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children : %G eng %U http://hdl.handle.net/21.11116/0000-0007-85A4-9 %U https://ojs.aaai.org//index.php/ICWSM/article/view/7320 %D 2020 %B 14th International Conference on Web and Social Media %Z date of event: 2020-06-08 - 2020-06-11 %C Atlanta, GA, USA (Virtual Event) %B Proceedings of the Fourteenth International Conference on Web and Social Media %P 522 - 533 %I AAAI %@ 978-1-57735-823-7
[16]
K. Papadamou, S. Zannettou, J. Blackburn, E. De Cristofaro, G. Stringhini, and M. Sirivianos, “Understanding the Incel Community on YouTube,” 2020. [Online]. Available: https://arxiv.org/abs/2001.08293. (arXiv: 2001.08293)
Abstract
YouTube is by far the largest host of user-generated video content worldwide. Alas, the platform also hosts inappropriate, toxic, and/or hateful content. One community that has come into the spotlight for sharing and publishing hateful content are the so-called Involuntary Celibates (Incels), a loosely defined movement ostensibly focusing on men's issues, who have often been linked to misogynistic views. In this paper, we set out to analyze the Incel community on YouTube by focusing on the evolution of this community over the last decade and understanding whether YouTube's recommendation algorithm steers users towards Incel-related videos. We collect videos shared on Incel-related communities within Reddit, and perform a data-driven characterization of the content posted on YouTube. Among other things, we find that the Incel community on YouTube is getting traction and that during the last decade the number of Incel-related videos and comments rose substantially. Also, we quantify the probability that a user will encounter an Incel-related video by virtue of YouTube's recommendation algorithm. Within five hops when starting from a non-Incel-related video, this probability is 1 in 5, which is alarmingly high as such content is likely to share toxic and misogynistic views.
Export
BibTeX
@online{Papadamou_arXiv2001.08293, TITLE = {Understanding the {Incel} Community on {YouTube}}, AUTHOR = {Papadamou, Kostantinos and Zannettou, Savvas and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and Sirivianos, Michael}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2001.08293}, EPRINT = {2001.08293}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {YouTube is by far the largest host of user-generated video content worldwide. Alas, the platform also hosts inappropriate, toxic, and/or hateful content. One community that has come into the spotlight for sharing and publishing hateful content are the so-called Involuntary Celibates (Incels), a loosely defined movement ostensibly focusing on men's issues, who have often been linked to misogynistic views. In this paper, we set out to analyze the Incel community on YouTube by focusing on the evolution of this community over the last decade and understanding whether YouTube's recommendation algorithm steers users towards Incel-related videos. We collect videos shared on Incel-related communities within Reddit, and perform a data-driven characterization of the content posted on YouTube. Among other things, we find that the Incel community on YouTube is getting traction and that during the last decade the number of Incel-related videos and comments rose substantially. Also, we quantify the probability that a user will encounter an Incel-related video by virtue of YouTube's recommendation algorithm. Within five hops when starting from a non-Incel-related video, this probability is 1 in 5, which is alarmingly high as such content is likely to share toxic and misogynistic views.}, }
Endnote
%0 Report %A Papadamou, Kostantinos %A Zannettou, Savvas %A Blackburn, Jeremy %A De Cristofaro, Emiliano %A Stringhini, Gianluca %A Sirivianos, Michael %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations %T Understanding the Incel Community on YouTube : %G eng %U http://hdl.handle.net/21.11116/0000-0007-89B3-4 %U https://arxiv.org/abs/2001.08293 %D 2020 %X YouTube is by far the largest host of user-generated video content worldwide. Alas, the platform also hosts inappropriate, toxic, and/or hateful content. One community that has come into the spotlight for sharing and publishing hateful content are the so-called Involuntary Celibates (Incels), a loosely defined movement ostensibly focusing on men's issues, who have often been linked to misogynistic views. In this paper, we set out to analyze the Incel community on YouTube by focusing on the evolution of this community over the last decade and understanding whether YouTube's recommendation algorithm steers users towards Incel-related videos. We collect videos shared on Incel-related communities within Reddit, and perform a data-driven characterization of the content posted on YouTube. Among other things, we find that the Incel community on YouTube is getting traction and that during the last decade the number of Incel-related videos and comments rose substantially. Also, we quantify the probability that a user will encounter an Incel-related video by virtue of YouTube's recommendation algorithm. Within five hops when starting from a non-Incel-related video, this probability is 1 in 5, which is alarmingly high as such content is likely to share toxic and misogynistic views. %K Computer Science, Computers and Society, cs.CY
[17]
K. Papadamou, S. Zannettou, J. Blackburn, E. De Cristofaro, G. Stringhini, and M. Sirivianos, “‘It is just a flu’: Assessing the Effect of Watch History on YouTube’s Pseudoscientific Video Recommendations,” 2020. [Online]. Available: https://arxiv.org/abs/2010.11638. (arXiv: 2010.11638)
Abstract
YouTube has revolutionized the way people discover and consume videos, becoming one of the primary news sources for Internet users. Since content on YouTube is generated by its users, the platform is particularly vulnerable to misinformative and conspiratorial videos. Even worse, the role played by YouTube's recommendation algorithm in unwittingly promoting questionable content is not well understood, and could potentially make the problem even worse. This can have dire real-world consequences, especially when pseudoscientific content is promoted to users at critical times, e.g., during the COVID-19 pandemic. In this paper, we set out to characterize and detect pseudoscientific misinformation on YouTube. We collect 6.6K videos related to COVID-19, the flat earth theory, the anti-vaccination, and anti-mask movements; using crowdsourcing, we annotate them as pseudoscience, legitimate science, or irrelevant. We then train a deep learning classifier to detect pseudoscientific videos with an accuracy of 76.1%. Next, we quantify user exposure to this content on various parts of the platform (i.e., a user's homepage, recommended videos while watching a specific video, or search results) and how this exposure changes based on the user's watch history. We find that YouTube's recommendation algorithm is more aggressive in suggesting pseudoscientific content when users are searching for specific topics, while these recommendations are less common on a user's homepage or when actively watching pseudoscientific videos. Finally, we shed light on how a user's watch history substantially affects the type of recommended videos.
Export
BibTeX
@online{Papadamou_arXiv2010.11638, TITLE = {"It is just a flu": {A}ssessing the Effect of Watch History on {YouTube}'s Pseudoscientific Video Recommendations}, AUTHOR = {Papadamou, Kostantinos and Zannettou, Savvas and Blackburn, Jeremy and De Cristofaro, Emiliano and Stringhini, Gianluca and Sirivianos, Michael}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2010.11638}, EPRINT = {2010.11638}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {YouTube has revolutionized the way people discover and consume videos, becoming one of the primary news sources for Internet users. Since content on YouTube is generated by its users, the platform is particularly vulnerable to misinformative and conspiratorial videos. Even worse, the role played by YouTube's recommendation algorithm in unwittingly promoting questionable content is not well understood, and could potentially make the problem even worse. This can have dire real-world consequences, especially when pseudoscientific content is promoted to users at critical times, e.g., during the COVID-19 pandemic. In this paper, we set out to characterize and detect pseudoscientific misinformation on YouTube. We collect 6.6K videos related to COVID-19, the flat earth theory, the anti-vaccination, and anti-mask movements; using crowdsourcing, we annotate them as pseudoscience, legitimate science, or irrelevant. We then train a deep learning classifier to detect pseudoscientific videos with an accuracy of 76.1%. Next, we quantify user exposure to this content on various parts of the platform (i.e., a user's homepage, recommended videos while watching a specific video, or search results) and how this exposure changes based on the user's watch history. We find that YouTube's recommendation algorithm is more aggressive in suggesting pseudoscientific content when users are searching for specific topics, while these recommendations are less common on a user's homepage or when actively watching pseudoscientific videos. Finally, we shed light on how a user's watch history substantially affects the type of recommended videos.}, }
Endnote
%0 Report %A Papadamou, Kostantinos %A Zannettou, Savvas %A Blackburn, Jeremy %A De Cristofaro, Emiliano %A Stringhini, Gianluca %A Sirivianos, Michael %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations %T "It is just a flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations : %G eng %U http://hdl.handle.net/21.11116/0000-0007-89E5-C %U https://arxiv.org/abs/2010.11638 %D 2020 %X YouTube has revolutionized the way people discover and consume videos, becoming one of the primary news sources for Internet users. Since content on YouTube is generated by its users, the platform is particularly vulnerable to misinformative and conspiratorial videos. Even worse, the role played by YouTube's recommendation algorithm in unwittingly promoting questionable content is not well understood, and could potentially make the problem even worse. This can have dire real-world consequences, especially when pseudoscientific content is promoted to users at critical times, e.g., during the COVID-19 pandemic. In this paper, we set out to characterize and detect pseudoscientific misinformation on YouTube. We collect 6.6K videos related to COVID-19, the flat earth theory, the anti-vaccination, and anti-mask movements; using crowdsourcing, we annotate them as pseudoscience, legitimate science, or irrelevant. We then train a deep learning classifier to detect pseudoscientific videos with an accuracy of 76.1%. Next, we quantify user exposure to this content on various parts of the platform (i.e., a user's homepage, recommended videos while watching a specific video, or search results) and how this exposure changes based on the user's watch history. We find that YouTube's recommendation algorithm is more aggressive in suggesting pseudoscientific content when users are searching for specific topics, while these recommendations are less common on a user's homepage or when actively watching pseudoscientific videos. Finally, we shed light on how a user's watch history substantially affects the type of recommended videos. %K Computer Science, Computers and Society, cs.CY,cs.SI
[18]
A. Papasavva, S. Zannettou, E. De Cristofaro, G. Stringhini, and J. Blackburn, “Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Papasavva_ICWSM2020, TITLE = {Raiders of the Lost {Kek}: 3.5 Years of Augmented 4chan Posts from the {Politically Incorrect} Board}, AUTHOR = {Papasavva, Antonis and Zannettou, Savvas and De Cristofaro, Emiliano and Stringhini, Gianluca and Blackburn, Jeremy}, LANGUAGE = {eng}, ISBN = {978-1-57735-823-7}, URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7354}, PUBLISHER = {AAAI}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)}, PAGES = {885--894}, ADDRESS = {Atlanta, GA, USA (Virtual Event)}, }
Endnote
%0 Conference Proceedings %A Papasavva, Antonis %A Zannettou, Savvas %A De Cristofaro, Emiliano %A Stringhini, Gianluca %A Blackburn, Jeremy %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations %T Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board : %G eng %U http://hdl.handle.net/21.11116/0000-0007-87A0-B %U https://ojs.aaai.org//index.php/ICWSM/article/view/7354 %D 2020 %B 14th International Conference on Web and Social Media %Z date of event: 2020-06-08 - 2020-06-11 %C Atlanta, GA, USA (Virtual Event) %B Proceedings of the Fourteenth International Conference on Web and Social Media %P 885 - 894 %I AAAI %@ 978-1-57735-823-7
[19]
A. Papasavva, J. Blackburn, G. Stringhini, S. Zannettou, and E. De Cristofaro, “‘Is it a Qoincidence?’: A First Step Towards Understanding and Characterizing the QAnon Movement on Voat.co,” 2020. [Online]. Available: https://arxiv.org/abs/2009.04885. (arXiv: 2009.04885)
Abstract
Online fringe communities offer fertile grounds for users to seek and share paranoid ideas fueling suspicion of mainstream news, and outright conspiracy theories. Among these, the QAnon conspiracy theory has emerged in 2017 on 4chan, broadly supporting the idea that powerful politicians, aristocrats, and celebrities are closely engaged in a global pedophile ring. At the same time, governments are thought to be controlled by "puppet masters," as democratically elected officials serve as a fake showroom of democracy. In this paper, we provide an empirical exploratory analysis of the QAnon community on Voat.co, a Reddit-esque news aggregator, which has recently captured the interest of the press for its toxicity and for providing a platform to QAnon followers. More precisely, we analyze a large dataset from /v/GreatAwakening, the most popular QAnon-related subverse (the Voat equivalent of a subreddit) to characterize activity and user engagement. To further understand the discourse around QAnon, we study the most popular named entities mentioned in the posts, along with the most prominent topics of discussion, which focus on US politics, Donald Trump, and world events. We also use word2vec models to identify narratives around QAnon-specific keywords, and our graph visualization shows that some of QAnon-related ones are closely related to those from the Pizzagate conspiracy theory and "drops" by "Q." Finally, we analyze content toxicity, finding that discussions on /v/GreatAwakening are less toxic than in the broad Voat community.
Export
BibTeX
@online{Papasavva_arXiv2009.04885, TITLE = {"Is it a {Qoincidence}?": {A} First Step Towards Understanding and Characterizing the {QAnon} Movement on {Voat.co}}, AUTHOR = {Papasavva, Antonis and Blackburn, Jeremy and Stringhini, Gianluca and Zannettou, Savvas and De Cristofaro, Emiliano}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2009.04885}, EPRINT = {2009.04885}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Online fringe communities offer fertile grounds for users to seek and share paranoid ideas fueling suspicion of mainstream news, and outright conspiracy theories. Among these, the QAnon conspiracy theory has emerged in 2017 on 4chan, broadly supporting the idea that powerful politicians, aristocrats, and celebrities are closely engaged in a global pedophile ring. At the same time, governments are thought to be controlled by "puppet masters," as democratically elected officials serve as a fake showroom of democracy. In this paper, we provide an empirical exploratory analysis of the QAnon community on Voat.co, a Reddit-esque news aggregator, which has recently captured the interest of the press for its toxicity and for providing a platform to QAnon followers. More precisely, we analyze a large dataset from /v/GreatAwakening, the most popular QAnon-related subverse (the Voat equivalent of a subreddit) to characterize activity and user engagement. To further understand the discourse around QAnon, we study the most popular named entities mentioned in the posts, along with the most prominent topics of discussion, which focus on US politics, Donald Trump, and world events. We also use word2vec models to identify narratives around QAnon-specific keywords, and our graph visualization shows that some of QAnon-related ones are closely related to those from the Pizzagate conspiracy theory and "drops" by "Q." Finally, we analyze content toxicity, finding that discussions on /v/GreatAwakening are less toxic than in the broad Voat community.}, }
Endnote
%0 Report %A Papasavva, Antonis %A Blackburn, Jeremy %A Stringhini, Gianluca %A Zannettou, Savvas %A De Cristofaro, Emiliano %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations %T "Is it a Qoincidence?": A First Step Towards Understanding and Characterizing the QAnon Movement on Voat.co : %G eng %U http://hdl.handle.net/21.11116/0000-0007-89D2-1 %U https://arxiv.org/abs/2009.04885 %D 2020 %X Online fringe communities offer fertile grounds for users to seek and share paranoid ideas fueling suspicion of mainstream news, and outright conspiracy theories. Among these, the QAnon conspiracy theory has emerged in 2017 on 4chan, broadly supporting the idea that powerful politicians, aristocrats, and celebrities are closely engaged in a global pedophile ring. At the same time, governments are thought to be controlled by "puppet masters," as democratically elected officials serve as a fake showroom of democracy. In this paper, we provide an empirical exploratory analysis of the QAnon community on Voat.co, a Reddit-esque news aggregator, which has recently captured the interest of the press for its toxicity and for providing a platform to QAnon followers. More precisely, we analyze a large dataset from /v/GreatAwakening, the most popular QAnon-related subverse (the Voat equivalent of a subreddit) to characterize activity and user engagement. To further understand the discourse around QAnon, we study the most popular named entities mentioned in the posts, along with the most prominent topics of discussion, which focus on US politics, Donald Trump, and world events. We also use word2vec models to identify narratives around QAnon-specific keywords, and our graph visualization shows that some of QAnon-related ones are closely related to those from the Pizzagate conspiracy theory and "drops" by "Q." Finally, we analyze content toxicity, finding that discussions on /v/GreatAwakening are less toxic than in the broad Voat community. %K Computer Science, Computers and Society, cs.CY
[20]
L. Prehn, F. Lichtblau, and A. Feldmann, “When Wells Run Dry: The 2020 IPv4 Address Market,” in CoNEXT’20, 16th International Conference on Emerging Networking Experiments And Technologies, Barcelona, Spain (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Prehn_CoNEXT2020, TITLE = {When wells run dry: the 2020 {IPv4} address market}, AUTHOR = {Prehn, Lars and Lichtblau, Franziska and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {9781450379489}, DOI = {10.1145/3386367.3431301}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {CoNEXT'20, 16th International Conference on Emerging Networking Experiments And Technologies}, EDITOR = {Han, Dongsu and Feldmann, Anja}, PAGES = {46--54}, ADDRESS = {Barcelona, Spain (Virtual Event)}, }
Endnote
%0 Conference Proceedings %A Prehn, Lars %A Lichtblau, Franziska %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T When Wells Run Dry: The 2020 IPv4 Address Market : %G eng %U http://hdl.handle.net/21.11116/0000-0007-853A-2 %R 10.1145/3386367.3431301 %D 2020 %B 16th International Conference on Emerging Networking Experiments And Technologies %Z date of event: 2020-12-01 - 2020-12-04 %C Barcelona, Spain (Virtual Event) %B CoNEXT'20 %E Han, Dongsu; Feldmann, Anja %P 46 - 54 %I ACM %@ 9781450379489
[21]
S. J. Saidi, A. M. Mandalari, R. Kolcun, H. Haddadi, D. J. Dubois, D. Choffnes, G. Smaragdakis, and A. Feldmann, “A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild,” in IMC ’20, 20th ACM Internet Measurement Conference, Virtual Event, USA, 2020.
Export
BibTeX
@inproceedings{Saidi_IMC2020, TITLE = {A Haystack Full of Needles: {Scalable} Detection of {IoT} Devices in the Wild}, AUTHOR = {Saidi, Said Jawad and Mandalari, Anna Maria and Kolcun, Roman and Haddadi, Hamed and Dubois, Daniel J. and Choffnes, David and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {9-781-4503-8138-3}, DOI = {10.1145/3419394.3423650}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, BOOKTITLE = {IMC '20, 20th ACM Internet Measurement Conference}, PAGES = {87--100}, ADDRESS = {Virtual Event, USA}, }
Endnote
%0 Conference Proceedings %A Saidi, Said Jawad %A Mandalari, Anna Maria %A Kolcun, Roman %A Haddadi, Hamed %A Dubois, Daniel J. %A Choffnes, David %A Smaragdakis, Georgios %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild : %G eng %U http://hdl.handle.net/21.11116/0000-0007-72B5-C %R 10.1145/3419394.3423650 %D 2020 %B 20th ACM Internet Measurement Conference %Z date of event: 2020-10-27 - 2020-10-29 %C Virtual Event, USA %B IMC '20 %P 87 - 100 %I ACM %@ 9-781-4503-8138-3 %U https://dl.acm.org/doi/10.1145/3419394.3423650
[22]
S. J. Saidi, A. Maghsoudlou, D. Foucard, G. Smaragdakis, I. Poese, and A. Feldmann, “Exploring Network-Wide Flow Data with Flowyager,” IEEE Transactions on Network and Service Management, vol. 17, no. 4, 2020.
Export
BibTeX
@article{Saidi_10.1109/TNSM.2020.3034278, TITLE = {Exploring Network-Wide Flow Data with {Flowyager}}, AUTHOR = {Saidi, Said Jawad and Maghsoudlou, Aniss and Foucard, Damien and Smaragdakis, Georgios and Poese, Ingmar and Feldmann, Anja}, LANGUAGE = {eng}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2020.3034278}, PUBLISHER = {IEEE}, ADDRESS = {Piscataway, NJ}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, JOURNAL = {IEEE Transactions on Network and Service Management}, VOLUME = {17}, NUMBER = {4}, PAGES = {1988--2006}, }
Endnote
%0 Journal Article %A Saidi, Said Jawad %A Maghsoudlou, Aniss %A Foucard, Damien %A Smaragdakis, Georgios %A Poese, Ingmar %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Exploring Network-Wide Flow Data with Flowyager : %G eng %U http://hdl.handle.net/21.11116/0000-0007-7295-0 %R 10.1109/TNSM.2020.3034278 %7 2020 %D 2020 %J IEEE Transactions on Network and Service Management %V 17 %N 4 %& 1988 %P 1988 - 2006 %I IEEE %C Piscataway, NJ %@ false
[23]
S. J. Saidi, A. Maghsoudlou, D. Foucard, G. Smaragdakis, I. Poese, and A. Feldmann, “Exploring Network-Wide Flow Data with Flowyager,” 2020. [Online]. Available: https://arxiv.org/abs/2010.13120. (arXiv: 2010.13120)
Abstract
Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this paper, we investigate how to improve the response time for a priori unknown network-wide queries. We present Flowyager, a system that is built on top of existing traffic capture utilities. Flowyager generates and analyzes tree data structures, that we call Flowtrees, which are succinct summaries of the raw flow data available by capture utilities. Flowtrees are self-adjusted data structures that drastically reduce space and transfer requirements, by 75% to 95%, compared to raw flow records. Flowyager manages the storage and transfers of Flowtrees, supports Flowtree operators, and provides a structured query language for answering flow queries across sites and time periods. By deploying a Flowyager prototype at both a large Internet Exchange Point and a Tier-1 Internet Service Provider, we showcase its capabilities for networks with hundreds of router interfaces. Our results show that the query response time can be reduced by an order of magnitude when compared with alternative data analytics platforms. Thus, Flowyager enables interactive network-wide queries and offers unprecedented drill-down capabilities to, e.g., identify DDoS culprits, pinpoint the involved sites, and determine the length of the attack.
Export
BibTeX
@online{Saidi_arXiv2010.13120, TITLE = {Exploring Network-Wide Flow Data with Flowyager}, AUTHOR = {Saidi, Said Jawad and Maghsoudlou, Aniss and Foucard, Damien and Smaragdakis, Georgios and Poese, Ingmar and Feldmann, Anja}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2010.13120}, EPRINT = {2010.13120}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this paper, we investigate how to improve the response time for a priori unknown network-wide queries. We present Flowyager, a system that is built on top of existing traffic capture utilities. Flowyager generates and analyzes tree data structures, that we call Flowtrees, which are succinct summaries of the raw flow data available by capture utilities. Flowtrees are self-adjusted data structures that drastically reduce space and transfer requirements, by 75% to 95%, compared to raw flow records. Flowyager manages the storage and transfers of Flowtrees, supports Flowtree operators, and provides a structured query language for answering flow queries across sites and time periods. By deploying a Flowyager prototype at both a large Internet Exchange Point and a Tier-1 Internet Service Provider, we showcase its capabilities for networks with hundreds of router interfaces. Our results show that the query response time can be reduced by an order of magnitude when compared with alternative data analytics platforms. Thus, Flowyager enables interactive network-wide queries and offers unprecedented drill-down capabilities to, e.g., identify DDoS culprits, pinpoint the involved sites, and determine the length of the attack.}, }
Endnote
%0 Report %A Saidi, Said Jawad %A Maghsoudlou, Aniss %A Foucard, Damien %A Smaragdakis, Georgios %A Poese, Ingmar %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Exploring Network-Wide Flow Data with Flowyager : %G eng %U http://hdl.handle.net/21.11116/0000-0007-8562-4 %U https://arxiv.org/abs/2010.13120 %D 2020 %X Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and distributed nature of flow records. In this paper, we investigate how to improve the response time for a priori unknown network-wide queries. We present Flowyager, a system that is built on top of existing traffic capture utilities. Flowyager generates and analyzes tree data structures, that we call Flowtrees, which are succinct summaries of the raw flow data available by capture utilities. Flowtrees are self-adjusted data structures that drastically reduce space and transfer requirements, by 75% to 95%, compared to raw flow records. Flowyager manages the storage and transfers of Flowtrees, supports Flowtree operators, and provides a structured query language for answering flow queries across sites and time periods. By deploying a Flowyager prototype at both a large Internet Exchange Point and a Tier-1 Internet Service Provider, we showcase its capabilities for networks with hundreds of router interfaces. Our results show that the query response time can be reduced by an order of magnitude when compared with alternative data analytics platforms. Thus, Flowyager enables interactive network-wide queries and offers unprecedented drill-down capabilities to, e.g., identify DDoS culprits, pinpoint the involved sites, and determine the length of the attack. %K Computer Science, Networking and Internet Architecture, cs.NI
[24]
L. Schild, C. Ling, J. Blackburn, G. Stringhini, Y. Zhang, and S. Zannettou, “‘Go eat a bat, Chang!’: An Early Look on the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19,” 2020. [Online]. Available: https://arxiv.org/abs/2004.04046. (arXiv: 2004.04046)
Abstract
The outbreak of the COVID-19 pandemic has changed our lives in unprecedented ways. In the face of the projected catastrophic consequences, many countries have enacted social distancing measures in an attempt to limit the spread of the virus. Under these conditions, the Web has become an indispensable medium for information acquisition, communication, and entertainment. At the same time, unfortunately, the Web is being exploited for the dissemination of potentially harmful and disturbing content, such as the spread of conspiracy theories and hateful speech towards specific ethnic groups, in particular towards Chinese people since COVID-19 is believed to have originated from China. In this paper, we make a first attempt to study the emergence of Sinophobic behavior on the Web during the outbreak of the COVID-19 pandemic. We collect two large-scale datasets from Twitter and 4chan's Politically Incorrect board (/pol/) over a time period of approximately five months and analyze them to investigate whether there is a rise or important differences with regard to the dissemination of Sinophobic content. We find that COVID-19 indeed drives the rise of Sinophobia on the Web and that the dissemination of Sinophobic content is a cross-platform phenomenon: it exists on fringe Web communities like \dspol, and to a lesser extent on mainstream ones like Twitter. Also, using word embeddings over time, we characterize the evolution and emergence of new Sinophobic slurs on both Twitter and /pol/. Finally, we find interesting differences in the context in which words related to Chinese people are used on the Web before and after the COVID-19 outbreak: on Twitter we observe a shift towards blaming China for the situation, while on /pol/ we find a shift towards using more (and new) Sinophobic slurs.
Export
BibTeX
@online{Schild_arXiv2004.04046, TITLE = {"Go eat a bat, {Chang!}": {A}n Early Look on the Emergence of Sinophobic Behavior on {Web} Communities in the Face of {COVID}-19}, AUTHOR = {Schild, Leonard and Ling, Chen and Blackburn, Jeremy and Stringhini, Gianluca and Zhang, Yang and Zannettou, Savvas}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2004.04046}, EPRINT = {2004.04046}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {The outbreak of the COVID-19 pandemic has changed our lives in unprecedented ways. In the face of the projected catastrophic consequences, many countries have enacted social distancing measures in an attempt to limit the spread of the virus. Under these conditions, the Web has become an indispensable medium for information acquisition, communication, and entertainment. At the same time, unfortunately, the Web is being exploited for the dissemination of potentially harmful and disturbing content, such as the spread of conspiracy theories and hateful speech towards specific ethnic groups, in particular towards Chinese people since COVID-19 is believed to have originated from China. In this paper, we make a first attempt to study the emergence of Sinophobic behavior on the Web during the outbreak of the COVID-19 pandemic. We collect two large-scale datasets from Twitter and 4chan's Politically Incorrect board (/pol/) over a time period of approximately five months and analyze them to investigate whether there is a rise or important differences with regard to the dissemination of Sinophobic content. We find that COVID-19 indeed drives the rise of Sinophobia on the Web and that the dissemination of Sinophobic content is a cross-platform phenomenon: it exists on fringe Web communities like \dspol, and to a lesser extent on mainstream ones like Twitter. Also, using word embeddings over time, we characterize the evolution and emergence of new Sinophobic slurs on both Twitter and /pol/. Finally, we find interesting differences in the context in which words related to Chinese people are used on the Web before and after the COVID-19 outbreak: on Twitter we observe a shift towards blaming China for the situation, while on /pol/ we find a shift towards using more (and new) Sinophobic slurs.}, }
Endnote
%0 Report %A Schild, Leonard %A Ling, Chen %A Blackburn, Jeremy %A Stringhini, Gianluca %A Zhang, Yang %A Zannettou, Savvas %+ External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T "Go eat a bat, Chang!": An Early Look on the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19 : %G eng %U http://hdl.handle.net/21.11116/0000-0007-89C5-0 %U https://arxiv.org/abs/2004.04046 %D 2020 %X The outbreak of the COVID-19 pandemic has changed our lives in unprecedented ways. In the face of the projected catastrophic consequences, many countries have enacted social distancing measures in an attempt to limit the spread of the virus. Under these conditions, the Web has become an indispensable medium for information acquisition, communication, and entertainment. At the same time, unfortunately, the Web is being exploited for the dissemination of potentially harmful and disturbing content, such as the spread of conspiracy theories and hateful speech towards specific ethnic groups, in particular towards Chinese people since COVID-19 is believed to have originated from China. In this paper, we make a first attempt to study the emergence of Sinophobic behavior on the Web during the outbreak of the COVID-19 pandemic. We collect two large-scale datasets from Twitter and 4chan's Politically Incorrect board (/pol/) over a time period of approximately five months and analyze them to investigate whether there is a rise or important differences with regard to the dissemination of Sinophobic content. We find that COVID-19 indeed drives the rise of Sinophobia on the Web and that the dissemination of Sinophobic content is a cross-platform phenomenon: it exists on fringe Web communities like \dspol, and to a lesser extent on mainstream ones like Twitter. Also, using word embeddings over time, we characterize the evolution and emergence of new Sinophobic slurs on both Twitter and /pol/. Finally, we find interesting differences in the context in which words related to Chinese people are used on the Web before and after the COVID-19 outbreak: on Twitter we observe a shift towards blaming China for the situation, while on /pol/ we find a shift towards using more (and new) Sinophobic slurs. %K cs.SI,Computer Science, Computers and Society, cs.CY
[25]
N. Semmler, M. Rost, G. Smaragdakis, and A. Feldmann, “Edge Replication Strategies for Wide-Area Distributed Processing,” in EdgeSys ’20, Third ACM International Workshop on Edge Systems, Analytics and Networking, Heraklion, Greece, 2020.
Export
BibTeX
@inproceedings{Semmler_EdgeSys2020, TITLE = {Edge Replication Strategies for Wide-Area Distributed Processing}, AUTHOR = {Semmler, Niklas and Rost, Matthias and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-7132-2}, DOI = {10.1145/3378679.3394532}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {EdgeSys '20, Third ACM International Workshop on Edge Systems, Analytics and Networking}, PAGES = {1--6}, ADDRESS = {Heraklion, Greece}, }
Endnote
%0 Conference Proceedings %A Semmler, Niklas %A Rost, Matthias %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Edge Replication Strategies for Wide-Area Distributed Processing : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0A9F-C %R 10.1145/3378679.3394532 %D 2020 %B Third ACM International Workshop on Edge Systems, Analytics and Networking %Z date of event: 2020-04-27 - 2020-04-27 %C Heraklion, Greece %B EdgeSys '20 %P 1 - 6 %I ACM %@ 978-1-4503-7132-2
[26]
A. Shukla, S. Fathalli, T. Zinner, A. Hecker, and S. Schmid, “P4Consist: Toward Consistent P4 SDNs,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 7, 2020.
Export
BibTeX
@article{Shukla2020b, TITLE = {{P4Consist}: {T}oward Consistent {P4 SDNs}}, AUTHOR = {Shukla, Apoorv and Fathalli, Seifeddine and Zinner, Thomas and Hecker, Artur and Schmid, Stefam}, LANGUAGE = {eng}, ISSN = {0733-8716}, DOI = {10.1109/JSAC.2020.2999653}, PUBLISHER = {IEEE}, ADDRESS = {Piscataway, NJ}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, JOURNAL = {IEEE Journal on Selected Areas in Communications}, VOLUME = {38}, NUMBER = {7}, PAGES = {1293--1307}, }
Endnote
%0 Journal Article %A Shukla, Apoorv %A Fathalli, Seifeddine %A Zinner, Thomas %A Hecker, Artur %A Schmid, Stefam %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations %T P4Consist: Toward Consistent P4 SDNs : %G eng %U http://hdl.handle.net/21.11116/0000-0006-D337-E %R 10.1109/JSAC.2020.2999653 %7 2020 %D 2020 %J IEEE Journal on Selected Areas in Communications %V 38 %N 7 %& 1293 %P 1293 - 1307 %I IEEE %C Piscataway, NJ %@ false
[27]
A. Shukla, S. J. Saidi, S. Schmid, M. Canini, T. Zinner, and A. Feldmann, “Toward Consistent SDNs: A Case for Network State Fuzzing,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, 2020.
Export
BibTeX
@article{Shukla2020, TITLE = {Toward Consistent {SDNs}: {A} Case for Network State Fuzzing}, AUTHOR = {Shukla, Apoorv and Saidi, S. Jawad and Schmid, Stefan and Canini, Marco and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, ISSN = {1932-4537}, DOI = {10.1109/TNSM.2019.2955790}, PUBLISHER = {IEEE}, ADDRESS = {Piscataway, NJ}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, DATE = {2020}, JOURNAL = {IEEE Transactions on Network and Service Management}, VOLUME = {17}, NUMBER = {2}, PAGES = {668--681}, }
Endnote
%0 Journal Article %A Shukla, Apoorv %A Saidi, S. Jawad %A Schmid, Stefan %A Canini, Marco %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Toward Consistent SDNs: A Case for Network State Fuzzing : %G eng %U http://hdl.handle.net/21.11116/0000-0006-DADE-B %R 10.1109/TNSM.2019.2955790 %7 2019 %D 2020 %J IEEE Transactions on Network and Service Management %V 17 %N 2 %& 668 %P 668 - 681 %I IEEE %C Piscataway, NJ %@ false
[28]
A. Shukla, K. Hudemann, Z. Vági, L. Hügerich, G. Smaragdakis, S. Schmid, A. Hecker, and A. Feldmann, “Towards Runtime Verification of Programmable Switches,” 2020. [Online]. Available: http://arxiv.org/abs/2004.10887. (arXiv: 2004.10887)
Abstract
Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time localization of bugs in P4 programs using software testing techniques like Tarantula. Once the bug in a P4 program is localized, the faulty code can be patched due to the programmable nature of P4. In addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest version), our observation is that as the programmable blocks increase, the patchability of P4 programs increases accordingly. To this end, we design, develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs in P4 programs with minimal human interaction. P6 tests P4 switch non-intrusively, i.e., requires no modification to the P4 program for detecting and localizing bugs. We used a P6 prototype to detect and patch seven existing bugs in eight publicly available P4 application programs deployed on two different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation shows that P6 significantly outperforms bug detection baselines while generating fewer packets and patches bugs in P4 programs such as switch.p4 without triggering any regressions.
Export
BibTeX
@online{Shukla_arXiv2004.10887, TITLE = {Towards Runtime Verification of Programmable Switches}, AUTHOR = {Shukla, Apoorv and Hudemann, Kevin and V{\'a}gi, Zsolt and H{\"u}gerich, Lily and Smaragdakis, Georgios and Schmid, Stefan and Hecker, Artur and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/2004.10887}, EPRINT = {2004.10887}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time localization of bugs in P4 programs using software testing techniques like Tarantula. Once the bug in a P4 program is localized, the faulty code can be patched due to the programmable nature of P4. In addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest version), our observation is that as the programmable blocks increase, the patchability of P4 programs increases accordingly. To this end, we design, develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs in P4 programs with minimal human interaction. P6 tests P4 switch non-intrusively, i.e., requires no modification to the P4 program for detecting and localizing bugs. We used a P6 prototype to detect and patch seven existing bugs in eight publicly available P4 application programs deployed on two different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation shows that P6 significantly outperforms bug detection baselines while generating fewer packets and patches bugs in P4 programs such as switch.p4 without triggering any regressions.}, }
Endnote
%0 Report %A Shukla, Apoorv %A Hudemann, Kevin %A Vági, Zsolt %A Hügerich, Lily %A Smaragdakis, Georgios %A Schmid, Stefan %A Hecker, Artur %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Towards Runtime Verification of Programmable Switches : %G eng %U http://hdl.handle.net/21.11116/0000-0007-0AAD-C %U http://arxiv.org/abs/2004.10887 %D 2020 %X Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time localization of bugs in P4 programs using software testing techniques like Tarantula. Once the bug in a P4 program is localized, the faulty code can be patched due to the programmable nature of P4. In addition, platform-dependent bugs can be detected. From P4_14 to P4_16 (latest version), our observation is that as the programmable blocks increase, the patchability of P4 programs increases accordingly. To this end, we design, develop, and evaluate P6 that (a) detects, (b) localizes, and (c) patches bugs in P4 programs with minimal human interaction. P6 tests P4 switch non-intrusively, i.e., requires no modification to the P4 program for detecting and localizing bugs. We used a P6 prototype to detect and patch seven existing bugs in eight publicly available P4 application programs deployed on two different switch platforms: behavioral model (bmv2) and Tofino. Our evaluation shows that P6 significantly outperforms bug detection baselines while generating fewer packets and patches bugs in P4 programs such as switch.p4 without triggering any regressions. %K Computer Science, Software Engineering, cs.SE,Computer Science, Learning, cs.LG,Computer Science, Networking and Internet Architecture, cs.NI
[29]
Y. Wang, F. Tahmasbi, J. Blackburn, B. Bradlyn, E. De Cristofaro, D. Magerman, S. Zannettou, and G. Stringhini, “Understanding the Use of Fauxtography on Social Media,” 2020. [Online]. Available: https://arxiv.org/abs/2009.11792. (arXiv: 2009.11792)
Abstract
Despite the influence that image-based communication has on online discourse, the role played by images in disinformation is still not well understood. In this paper, we present the first large-scale study of fauxtography, analyzing the use of manipulated or misleading images in news discussion on online communities. First, we develop a computational pipeline geared to detect fauxtography, and identify over 61k instances of fauxtography discussed on Twitter, 4chan, and Reddit. Then, we study how posting fauxtography affects engagement of posts on social media, finding that posts containing it receive more interactions in the form of re-shares, likes, and comments. Finally, we show that fauxtography images are often turned into memes by Web communities. Our findings show that effective mitigation against disinformation need to take images into account, and highlight a number of challenges in dealing with image-based disinformation.
Export
BibTeX
@online{Wang_arXiv2009.11792, TITLE = {Understanding the Use of Fauxtography on Social Media}, AUTHOR = {Wang, Yuping and Tahmasbi, Fatemeh and Blackburn, Jeremy and Bradlyn, Barry and De Cristofaro, Emiliano and Magerman, David and Zannettou, Savvas and Stringhini, Gianluca}, LANGUAGE = {eng}, URL = {https://arxiv.org/abs/2009.11792}, EPRINT = {2009.11792}, EPRINTTYPE = {arXiv}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Despite the influence that image-based communication has on online discourse, the role played by images in disinformation is still not well understood. In this paper, we present the first large-scale study of fauxtography, analyzing the use of manipulated or misleading images in news discussion on online communities. First, we develop a computational pipeline geared to detect fauxtography, and identify over 61k instances of fauxtography discussed on Twitter, 4chan, and Reddit. Then, we study how posting fauxtography affects engagement of posts on social media, finding that posts containing it receive more interactions in the form of re-shares, likes, and comments. Finally, we show that fauxtography images are often turned into memes by Web communities. Our findings show that effective mitigation against disinformation need to take images into account, and highlight a number of challenges in dealing with image-based disinformation.}, }
Endnote
%0 Report %A Wang, Yuping %A Tahmasbi, Fatemeh %A Blackburn, Jeremy %A Bradlyn, Barry %A De Cristofaro, Emiliano %A Magerman, David %A Zannettou, Savvas %A Stringhini, Gianluca %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T Understanding the Use of Fauxtography on Social Media : %G eng %U http://hdl.handle.net/21.11116/0000-0007-89D9-A %U https://arxiv.org/abs/2009.11792 %D 2020 %X Despite the influence that image-based communication has on online discourse, the role played by images in disinformation is still not well understood. In this paper, we present the first large-scale study of fauxtography, analyzing the use of manipulated or misleading images in news discussion on online communities. First, we develop a computational pipeline geared to detect fauxtography, and identify over 61k instances of fauxtography discussed on Twitter, 4chan, and Reddit. Then, we study how posting fauxtography affects engagement of posts on social media, finding that posts containing it receive more interactions in the form of re-shares, likes, and comments. Finally, we show that fauxtography images are often turned into memes by Web communities. Our findings show that effective mitigation against disinformation need to take images into account, and highlight a number of challenges in dealing with image-based disinformation. %K Computer Science, Computers and Society, cs.CY
[30]
S. Zannettou, T. Caulfield, B. Bradlyn, E. D. Cristofaro, G. Stringhini, and J. Blackburn, “Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Zannettou_ICWSM2020, TITLE = {Characterizing the Use of Images in State-Sponsored Information Warfare Operations by {R}ussian Trolls on {Twitter}}, AUTHOR = {Zannettou, Savvas and Caulfield, Tristan and Bradlyn, Barry and Cristofaro, Emiliano De and Stringhini, Gianluca and Blackburn, Jeremy}, LANGUAGE = {eng}, ISBN = {978-1-57735-823-7}, URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7342}, PUBLISHER = {AAAI}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)}, PAGES = {774--785}, ADDRESS = {Atlanta, GA, USA (Virtual Event)}, }
Endnote
%0 Conference Proceedings %A Zannettou, Savvas %A Caulfield, Tristan %A Bradlyn, Barry %A Cristofaro, Emiliano De %A Stringhini, Gianluca %A Blackburn, Jeremy %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations %T Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter : %G eng %U http://hdl.handle.net/21.11116/0000-0007-85C1-8 %U https://ojs.aaai.org//index.php/ICWSM/article/view/7342 %D 2020 %B 14th International Conference on Web and Social Media %Z date of event: 2020-06-08 - 2020-06-11 %C Atlanta, GA, USA (Virtual Event) %B Proceedings of the Fourteenth International Conference on Web and Social Media %P 774 - 785 %I AAAI %@ 978-1-57735-823-7
[31]
S. Zannettou, J. Finkelstein, B. Bradlyn, and J. Blackburn, “A Quantitative Approach to Understanding Online Antisemitism,” in Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020), Atlanta, GA, USA (Virtual Event), 2020.
Export
BibTeX
@inproceedings{Zannettou_ICWSM2020b, TITLE = {A Quantitative Approach to Understanding Online Antisemitism}, AUTHOR = {Zannettou, Savvas and Finkelstein, Joel and Bradlyn, Barry and Blackburn, Jeremy}, LANGUAGE = {eng}, ISBN = {978-1-57735-823-7}, URL = {https://ojs.aaai.org//index.php/ICWSM/article/view/7343}, PUBLISHER = {AAAI}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {Proceedings of the Fourteenth International Conference on Web and Social Media (ICWSM 2020)}, PAGES = {786--797}, ADDRESS = {Atlanta, GA, USA (Virtual Event)}, }
Endnote
%0 Conference Proceedings %A Zannettou, Savvas %A Finkelstein, Joel %A Bradlyn, Barry %A Blackburn, Jeremy %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations %T A Quantitative Approach to Understanding Online Antisemitism : %G eng %U http://hdl.handle.net/21.11116/0000-0007-878F-0 %U https://ojs.aaai.org//index.php/ICWSM/article/view/7343 %D 2020 %B 14th International Conference on Web and Social Media %Z date of event: 2020-06-08 - 2020-06-11 %C Atlanta, GA, USA (Virtual Event) %B Proceedings of the Fourteenth International Conference on Web and Social Media %P 786 - 797 %I AAAI %@ 978-1-57735-823-7
[32]
S. Zannettou, M. Elsherief, E. Belding, S. Nilizadeh, and G. Stringhini, “Measuring and Characterizing Hate Speech on News Websites,” in WebSci ’20, 12th ACM Conference on Web Science, Southampton, UK (Online), 2020.
Export
BibTeX
@inproceedings{Zannettou_WebSci2020, TITLE = {Measuring and Characterizing Hate Speech on News Websites}, AUTHOR = {Zannettou, Savvas and Elsherief, Mai and Belding, Elizabeth and Nilizadeh, Shirin and Stringhini, Gianluca}, LANGUAGE = {eng}, ISBN = {9781450379892}, DOI = {10.1145/3394231.3397902}, PUBLISHER = {ACM}, YEAR = {2020}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {WebSci '20, 12th ACM Conference on Web Science}, PAGES = {125--134}, ADDRESS = {Southampton, UK (Online)}, }
Endnote
%0 Conference Proceedings %A Zannettou, Savvas %A Elsherief, Mai %A Belding, Elizabeth %A Nilizadeh, Shirin %A Stringhini, Gianluca %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations %T Measuring and Characterizing Hate Speech on News Websites : %G eng %U http://hdl.handle.net/21.11116/0000-0007-87AF-C %R 10.1145/3394231.3397902 %D 2020 %B 12th ACM Conference on Web Science %Z date of event: 2020-07-06 - 2020-07-10 %C Southampton, UK (Online) %B WebSci '20 %P 125 - 134 %I ACM %@ 9781450379892
2019
[33]
V. Bajpai, A. Brunstrom, A. Feldmann, W. Kellerer, A. Pras, H. Schulzrinne, G. Smaragdakis, M. Wählisch, and K. Wehrle, “The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research,” ACM SIGCOMM Computer Communication Review, vol. 49, no. 1, 2019.
Export
BibTeX
@article{Bajpai2019, TITLE = {The {D}agstuhl Beginners Guide to Reproducibility for Experimental Networking Research}, AUTHOR = {Bajpai, Vaibhav and Brunstrom, Anna and Feldmann, Anja and Kellerer, Wolfgang and Pras, Aiko and Schulzrinne, Henning and Smaragdakis, Georgios and W{\"a}hlisch, Matthias and Wehrle, Klaus}, LANGUAGE = {eng}, ISSN = {0146-4833}, DOI = {10.1145/3314212.3314217}, PUBLISHER = {ACM}, ADDRESS = {New York, NY}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, DATE = {2019}, JOURNAL = {ACM SIGCOMM Computer Communication Review}, VOLUME = {49}, NUMBER = {1}, PAGES = {24--30}, }
Endnote
%0 Journal Article %A Bajpai, Vaibhav %A Brunstrom, Anna %A Feldmann, Anja %A Kellerer, Wolfgang %A Pras, Aiko %A Schulzrinne, Henning %A Smaragdakis, Georgios %A Wählisch, Matthias %A Wehrle, Klaus %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research : %G eng %U http://hdl.handle.net/21.11116/0000-0003-36CA-D %R 10.1145/3314212.3314217 %7 2019 %D 2019 %J ACM SIGCOMM Computer Communication Review %V 49 %N 1 %& 24 %P 24 - 30 %I ACM %C New York, NY %@ false
[34]
V. Bajpai, A. Brunstrom, A. Feldmann, W. Kellerer, A. Pras, H. Schulzrinne, G. Smaragdakis, M. Wählisch, and K. Wehrle, “The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research,” 2019. [Online]. Available: http://arxiv.org/abs/1902.02165. (arXiv: 1902.02165)
Abstract
Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.
Export
BibTeX
@online{Bajpai_arXiv2019, TITLE = {The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research}, AUTHOR = {Bajpai, Vaibhav and Brunstrom, Anna and Feldmann, Anja and Kellerer, Wolfgang and Pras, Aiko and Schulzrinne, Henning and Smaragdakis, Georgios and W{\"a}hlisch, Matthias and Wehrle, Klaus}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1902.02165}, EPRINT = {1902.02165}, EPRINTTYPE = {arXiv}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, ABSTRACT = {Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.}, }
Endnote
%0 Report %A Bajpai, Vaibhav %A Brunstrom, Anna %A Feldmann, Anja %A Kellerer, Wolfgang %A Pras, Aiko %A Schulzrinne, Henning %A Smaragdakis, Georgios %A Wählisch, Matthias %A Wehrle, Klaus %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research : %G eng %U http://hdl.handle.net/21.11116/0000-0003-F012-9 %U http://arxiv.org/abs/1902.02165 %D 2019 %X Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others. %K Computer Science, Networking and Internet Architecture, cs.NI
[35]
T. Chung, E. Aben, T. Bruijnzeels, B. Chandrasekaran, D. R. Choffnes, D. Levin, B. M. Maggs, A. Mislove, R. van Rijswijk-Deij, J. P. Rula, and N. Sullivan, “RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins,” in IMC ’19, ACM Internet Measurement Conference, Amsterdam, Netherlands, 2019.
Export
BibTeX
@inproceedings{Chung_IMC2019, TITLE = {{RPKI} is Coming of Age: {A} Longitudinal Study of {RPKI} Deployment and Invalid Route Origins}, AUTHOR = {Chung, Taejoong and Aben, Emile and Bruijnzeels, Tim and Chandrasekaran, Balakrishnan and Choffnes, David R. and Levin, Dave and Maggs, Bruce M. and Mislove, Alan and van Rijswijk-Deij, Roland and Rula, John P. and Sullivan, Nick}, LANGUAGE = {eng}, ISBN = {978-1-4503-6948-0}, DOI = {10.1145/3355369.3355596}, PUBLISHER = {ACM}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {IMC '19, ACM Internet Measurement Conference}, PAGES = {406--419}, ADDRESS = {Amsterdam, Netherlands}, }
Endnote
%0 Conference Proceedings %A Chung, Taejoong %A Aben, Emile %A Bruijnzeels, Tim %A Chandrasekaran, Balakrishnan %A Choffnes, David R. %A Levin, Dave %A Maggs, Bruce M. %A Mislove, Alan %A van Rijswijk-Deij, Roland %A Rula, John P. %A Sullivan, Nick %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins : %G eng %U http://hdl.handle.net/21.11116/0000-0005-7678-0 %R 10.1145/3355369.3355596 %D 2019 %B ACM Internet Measurement Conference %Z date of event: 2019-10-21 - 2019-10-23 %C Amsterdam, Netherlands %B IMC '19 %P 406 - 419 %I ACM %@ 978-1-4503-6948-0
[36]
T. Enghardt, T. Zinner, and A. Feldmann, “Web Performance Pitfalls,” in Passive and Active Measurement Conference (PAM 2019), Puerto Varas, Chile, 2019.
Export
BibTeX
@inproceedings{Engelhardt_PAM2019, TITLE = {Web Performance Pitfalls}, AUTHOR = {Enghardt, Theresa and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-3-030-15985-6}, DOI = {10.1007/978-3-030-15986-3_19}, PUBLISHER = {Springer}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, DATE = {2019}, BOOKTITLE = {Passive and Active Measurement Conference (PAM 2019)}, EDITOR = {Choffnes, David and Barcellos, Marinho}, PAGES = {286--303}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {11419}, ADDRESS = {Puerto Varas, Chile}, }
Endnote
%0 Conference Proceedings %A Enghardt, Theresa %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Web Performance Pitfalls : %G eng %U http://hdl.handle.net/21.11116/0000-0002-F657-7 %R 10.1007/978-3-030-15986-3_19 %D 2019 %B 20th Passive and Active Measurement Conference %Z date of event: 2019-03-27 - 2019-03-29 %C Puerto Varas, Chile %B Passive and Active Measurement Conference %E Choffnes, David; Barcellos, Marinho %P 286 - 303 %I Springer %@ 978-3-030-15985-6 %B Lecture Notes in Computer Science %N 11419
[37]
T. Enghardt, P. S. Tiesel, T. Zinner, and A. Feldmann, “Informed Access Network Selection: The Benefits of Socket Intents for Web Performance,” in 15th International Conference on Network and Service Management (CNSM 2019), Halifax, Canada, 2019.
Export
BibTeX
@inproceedings{Enghardt_CNSM2019, TITLE = {Informed Access Network Selection: {The} Benefits of Socket Intents for {Web} Performance}, AUTHOR = {Enghardt, Theresa and Tiesel, Philipp S. and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-3-903176-24-9}, DOI = {10.23919/CNSM46954.2019.9012714}, PUBLISHER = {IEEE}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {15th International Conference on Network and Service Management (CNSM 2019)}, PAGES = {1--9}, ADDRESS = {Halifax, Canada}, }
Endnote
%0 Conference Proceedings %A Enghardt, Theresa %A Tiesel, Philipp S. %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Informed Access Network Selection: The Benefits of Socket Intents for Web Performance : %G eng %U http://hdl.handle.net/21.11116/0000-0007-7300-7 %R 10.23919/CNSM46954.2019.9012714 %D 2019 %B 15th International Conference on Network and Service Management %Z date of event: 2019-10-21 - 2019-10-25 %C Halifax, Canada %B 15th International Conference on Network and Service Management %P 1 - 9 %I IEEE %@ 978-3-903176-24-9
[38]
A. Feldmann, B. Chandrasekaran, S. Fathalli, and E. N. Weyulu, “P4-enabled Network-assisted Congestion Feedback: A Case for NACKs,” in BS ’19, Workshop on Buffer Sizing, Palo Alto, CA, USA, 2019.
Export
BibTeX
@inproceedings{Feldmann_BS19, TITLE = {P4-enabled Network-assisted Congestion Feedback: {A} Case for {NACKs}}, AUTHOR = {Feldmann, Anja and Chandrasekaran, Balakrishnan and Fathalli, Seifeddine and Weyulu, Emilia Ndilokelwa}, LANGUAGE = {eng}, ISBN = {9781450377454}, DOI = {10.1145/3375235.3375238}, PUBLISHER = {ACM}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {BS '19, Workshop on Buffer Sizing}, EID = {3}, ADDRESS = {Palo Alto, CA, USA}, }
Endnote
%0 Conference Proceedings %A Feldmann, Anja %A Chandrasekaran, Balakrishnan %A Fathalli, Seifeddine %A Weyulu, Emilia Ndilokelwa %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T P4-enabled Network-assisted Congestion Feedback: A Case for NACKs : %G eng %U http://hdl.handle.net/21.11116/0000-0008-4580-9 %R 10.1145/3375235.3375238 %D 2019 %B Workshop on Buffer Sizing %Z date of event: 2019-12-02 - 2019-12-03 %C Palo Alto, CA, USA %B BS '19 %Z sequence number: 3 %I ACM %@ 9781450377454
[39]
M. Hoseini, F. Saghafi, and E. Aghayi, “A Multidimensional Model of Knowledge Sharing Behavior in Mobile Social Networks,” Kybernetes, vol. 48, no. 5, 2019.
Export
BibTeX
@article{Hoseini2019, TITLE = {A Multidimensional Model of Knowledge Sharing Behavior in Mobile Social Networks}, AUTHOR = {Hoseini, Mohamad and Saghafi, Fatemeh and Aghayi, Emad}, LANGUAGE = {eng}, ISSN = {0368-492X}, DOI = {10.1108/K-07-2017-0249}, PUBLISHER = {Emerald}, ADDRESS = {Bradford}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, DATE = {2019}, JOURNAL = {Kybernetes}, VOLUME = {48}, NUMBER = {5}, PAGES = {906--929}, }
Endnote
%0 Journal Article %A Hoseini, Mohamad %A Saghafi, Fatemeh %A Aghayi, Emad %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations %T A Multidimensional Model of Knowledge Sharing Behavior in Mobile Social Networks : %G eng %U http://hdl.handle.net/21.11116/0000-0003-D41E-D %R 10.1108/K-07-2017-0249 %7 2019 %D 2019 %J Kybernetes %V 48 %N 5 %& 906 %P 906 - 929 %I Emerald %C Bradford %@ false
[40]
C. Iordanou, N. Kourtellis, J. M. Carrascosa, C. Soriente, R. Cuevas, and N. Laoutaris, “Beyond Content Analysis: Detecting Targeted Ads via Distributed Counting,” in CoNEXT ’19, 15th International Conference on Emerging Networking Experiments And Technologies, Orlando, FL, USA, 2019.
Export
BibTeX
@inproceedings{Iordanou_CoNEXT2019, TITLE = {Beyond Content Analysis: {D}etecting Targeted Ads via Distributed Counting}, AUTHOR = {Iordanou, Costas and Kourtellis, Nicolas and Carrascosa, Juan Miguel and Soriente, Claudio and Cuevas, Ruben and Laoutaris, Nikolaos}, LANGUAGE = {eng}, ISBN = {978-1-4503-6998-5}, DOI = {10.1145/3359989.3365428}, PUBLISHER = {ACM}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {CoNEXT '19, 15th International Conference on Emerging Networking Experiments And Technologies}, PAGES = {110--122}, ADDRESS = {Orlando, FL, USA}, }
Endnote
%0 Conference Proceedings %A Iordanou, Costas %A Kourtellis, Nicolas %A Carrascosa, Juan Miguel %A Soriente, Claudio %A Cuevas, Ruben %A Laoutaris, Nikolaos %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations %T Beyond Content Analysis: Detecting Targeted Ads via Distributed Counting : %G eng %U http://hdl.handle.net/21.11116/0000-0006-8DF1-B %R 10.1145/3359989.3365428 %D 2019 %B 15th International Conference on Emerging Networking Experiments And Technologies %Z date of event: 2019-12-09 - 2019-12-12 %C Orlando, FL, USA %B CoNEXT '19 %P 110 - 122 %I ACM %@ 978-1-4503-6998-5
[41]
D. Kopp, M. Wichtlhuber, I. Poese, J. Santanna, O. Hohlfeld, and C. Dietzel, “DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown,” in IMC ’19, ACM Internet Measurement Conference, Amsterdam, Netherlands, 2019.
Export
BibTeX
@inproceedings{Kopp_IMC2019, TITLE = {{DDoS} Hide \& Seek: {O}n the Effectiveness of a Booter Services Takedown}, AUTHOR = {Kopp, Daniel and Wichtlhuber, Matthias and Poese, Ingmar and Santanna, Jair and Hohlfeld, Oliver and Dietzel, Christoph}, LANGUAGE = {eng}, ISBN = {978-1-4503-6948-0}, DOI = {10.1145/3355369.3355590}, PUBLISHER = {ACM}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {IMC '19, ACM Internet Measurement Conference}, PAGES = {65--72}, ADDRESS = {Amsterdam, Netherlands}, }
Endnote
%0 Conference Proceedings %A Kopp, Daniel %A Wichtlhuber, Matthias %A Poese, Ingmar %A Santanna, Jair %A Hohlfeld, Oliver %A Dietzel, Christoph %+ External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown : %G eng %U http://hdl.handle.net/21.11116/0000-0005-758A-C %R 10.1145/3355369.3355590 %D 2019 %B ACM Internet Measurement Conference %Z date of event: 2019-10-21 - 2019-10-23 %C Amsterdam, Netherlands %B IMC '19 %P 65 - 72 %I ACM %@ 978-1-4503-6948-0
[42]
R. Motamedi, B. Yeganeh, B. Chandrasekaran, R. Rejaie, B. M. Maggs, and W. Willinger, “On Mapping the Interconnections in Today’s Internet,” IEEE/ACM Transactions on Networking, vol. 27, no. 5, 2019.
Export
BibTeX
@article{Motamedi_2019, TITLE = {On Mapping the Interconnections in Today's Internet}, AUTHOR = {Motamedi, Reza and Yeganeh, Bahador and Chandrasekaran, Balakrishnan and Rejaie, Reza and Maggs, Bruce M. and Willinger, Walter}, LANGUAGE = {eng}, ISSN = {1558-2566}, DOI = {10.1109/TNET.2019.2940369}, PUBLISHER = {IEEE}, ADDRESS = {Piscataway, NJ}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, DATE = {2019}, JOURNAL = {IEEE/ACM Transactions on Networking}, VOLUME = {27}, NUMBER = {5}, PAGES = {2056}, }
Endnote
%0 Journal Article %A Motamedi, Reza %A Yeganeh, Bahador %A Chandrasekaran, Balakrishnan %A Rejaie, Reza %A Maggs, Bruce M. %A Willinger, Walter %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations %T On Mapping the Interconnections in Today's Internet : %G eng %U http://hdl.handle.net/21.11116/0000-0005-6B21-E %R 10.1109/TNET.2019.2940369 %7 2019 %D 2019 %J IEEE/ACM Transactions on Networking %V 27 %N 5 %& 2056 %P 2056 %I IEEE %C Piscataway, NJ %@ false
[43]
M. Nawrocki, J. Blendin, C. Dietzel, T. C. Schmidt, and M. Wählisch, “Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs,” in IMC ’19, ACM Internet Measurement Conference, Amsterdam, Netherlands, 2019.
Export
BibTeX
@inproceedings{Nawrocki_IMC2019, TITLE = {Down the Black Hole: {D}ismantling Operational Practices of {BGP} Blackholing at {IXPs}}, AUTHOR = {Nawrocki, Marcin and Blendin, Jeremias and Dietzel, Christoph and Schmidt, Thomas C. and W{\"a}hlisch, Matthias}, LANGUAGE = {eng}, ISBN = {978-1-4503-6948-0}, DOI = {10.1145/3355369.3355593}, PUBLISHER = {ACM}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {IMC '19, ACM Internet Measurement Conference}, PAGES = {435--448}, ADDRESS = {Amsterdam, Netherlands}, }
Endnote
%0 Conference Proceedings %A Nawrocki, Marcin %A Blendin, Jeremias %A Dietzel, Christoph %A Schmidt, Thomas C. %A Wählisch, Matthias %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations %T Down the Black Hole: Dismantling Operational Practices of BGP Blackholing at IXPs : %G eng %U http://hdl.handle.net/21.11116/0000-0005-759E-6 %R 10.1145/3355369.3355593 %D 2019 %B ACM Internet Measurement Conference %Z date of event: 2019-10-21 - 2019-10-23 %C Amsterdam, Netherlands %B IMC '19 %P 435 - 448 %I ACM %@ 978-1-4503-6948-0
[44]
E. Pujol, I. Poese, J. Zerwas, G. Smaragdakis, and A. Feldmann, “Steering Hyper-Giants’ Traffic at Scale,” in CoNEXT ’19, 15th International Conference on Emerging Networking Experiments And Technologies, Orlando, FL, USA, 2019.
Export
BibTeX
@inproceedings{Pujol_CoNEXT2019, TITLE = {Steering Hyper-Giants' Traffic at Scale}, AUTHOR = {Pujol, Enric and Poese, Ingmar and Zerwas, Johannes and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-6998-5}, DOI = {10.1145/3359989.3365430}, PUBLISHER = {ACM}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, BOOKTITLE = {CoNEXT '19, 15th International Conference on Emerging Networking Experiments And Technologies}, PAGES = {82--95}, ADDRESS = {Orlando, FL, USA}, }
Endnote
%0 Conference Proceedings %A Pujol, Enric %A Poese, Ingmar %A Zerwas, Johannes %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Steering Hyper-Giants' Traffic at Scale : %G eng %U http://hdl.handle.net/21.11116/0000-0005-74C6-9 %R 10.1145/3359989.3365430 %D 2019 %B 15th International Conference on Emerging Networking Experiments And Technologies %Z date of event: 2019-12-09 - 2019-12-12 %C Orlando, FL, USA %B CoNEXT '19 %P 82 - 95 %I ACM %@ 978-1-4503-6998-5
[45]
N. Semmler, G. Smaragdakis, and A. Feldmann, “Online Replication Strategies for Distributed Data Stores,” Open Journal of Internet Of Things, vol. 5, no. 1, 2019.
Export
BibTeX
@article{Semmler2019, TITLE = {Online Replication Strategies for Distributed Data Stores}, AUTHOR = {Semmler, Niklas and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISSN = {2364-7108}, URL = {urn:nbn:de:101:1-2019092919335387371884}, PUBLISHER = {RonPub UG}, ADDRESS = {L{\"u}beck}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, JOURNAL = {Open Journal of Internet Of Things}, VOLUME = {5}, NUMBER = {1}, PAGES = {47--57}, }
Endnote
%0 Journal Article %A Semmler, Niklas %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Online Replication Strategies for Distributed Data Stores : %G eng %U http://hdl.handle.net/21.11116/0000-0005-74C1-E %U urn:nbn:de:101:1-2019092919335387371884 %F OTHER: GLN-LP 1195986211 %7 2019 %D 2019 %J Open Journal of Internet Of Things %O OJIOT %V 5 %N 1 %& 47 %P 47 - 57 %I RonPub UG %C Lübeck %@ false
[46]
N. Semmler, G. Smaragdakis, and A. Feldmann, “Distributed Mega-Datasets: The Need for Novel Computing Primitives,” in 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019), Richardson, TX, USA, 2019.
Export
BibTeX
@inproceedings{Semmler_ICDCS2019, TITLE = {Distributed Mega-Datasets: {T}he Need for Novel Computing Primitives}, AUTHOR = {Semmler, Niklas and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-7281-2519-0}, DOI = {10.1109/ICDCS.2019.00167}, PUBLISHER = {IEEE}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, DATE = {2019}, BOOKTITLE = {39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)}, PAGES = {1684--1692}, ADDRESS = {Richardson, TX, USA}, }
Endnote
%0 Conference Proceedings %A Semmler, Niklas %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Distributed Mega-Datasets: The Need for Novel Computing Primitives : %G eng %U http://hdl.handle.net/21.11116/0000-0005-74CE-1 %R 10.1109/ICDCS.2019.00167 %D 2019 %B 39th IEEE International Conference on Distributed Computing Systems %Z date of event: 2019-07-07 - 2019-07-09 %C Richardson, TX, USA %B 39th IEEE International Conference on Distributed Computing Systems %P 1684 - 1692 %I IEEE %@ 978-1-7281-2519-0
[47]
A. Shukla, S. J. Saidi, S. Schmid, M. Canini, T. Zinner, and A. Feldmann, “Consistent SDNs through Network State Fuzzing,” 2019. [Online]. Available: http://arxiv.org/abs/1904.08977. (arXiv: 1904.08977)
Abstract
The conventional wisdom is that a software-defined network (SDN) operates under the premise that the logically centralized control plane has an accurate representation of the actual data plane state. Nevertheless, bugs, misconfigurations, faults or attacks can introduce inconsistencies that undermine correct operation. Previous work in this area, however, lacks a holistic methodology to tackle this problem and thus, addresses only certain parts of the problem. Yet, the consistency of the overall system is only as good as its least consistent part. Motivated by an analogy of network consistency checking with program testing, we propose to add active probe-based network state fuzzing to our consistency check repertoire. Hereby, our system, PAZZ, combines production traffic with active probes to continuously test if the actual forwarding path and decision elements (on the data plane) correspond to the expected ones (on the control plane). Our insight is that active traffic covers the inconsistency cases beyond the ones identified by passive traffic. PAZZ prototype was built and evaluated on topologies of varying scale and complexity. Our results show that PAZZ requires minimal network resources to detect persistent data plane faults through fuzzing and localize them quickly.
Export
BibTeX
@online{Shukla_arXiv1904.08977, TITLE = {Consistent {SDNs} through Network State Fuzzing}, AUTHOR = {Shukla, Apoorv and Saidi, Said Jawad and Schmid, Stefan and Canini, Marco and Zinner, Thomas and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1904.08977}, EPRINT = {1904.08977}, EPRINTTYPE = {arXiv}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, ABSTRACT = {The conventional wisdom is that a software-defined network (SDN) operates under the premise that the logically centralized control plane has an accurate representation of the actual data plane state. Nevertheless, bugs, misconfigurations, faults or attacks can introduce inconsistencies that undermine correct operation. Previous work in this area, however, lacks a holistic methodology to tackle this problem and thus, addresses only certain parts of the problem. Yet, the consistency of the overall system is only as good as its least consistent part. Motivated by an analogy of network consistency checking with program testing, we propose to add active probe-based network state fuzzing to our consistency check repertoire. Hereby, our system, PAZZ, combines production traffic with active probes to continuously test if the actual forwarding path and decision elements (on the data plane) correspond to the expected ones (on the control plane). Our insight is that active traffic covers the inconsistency cases beyond the ones identified by passive traffic. PAZZ prototype was built and evaluated on topologies of varying scale and complexity. Our results show that PAZZ requires minimal network resources to detect persistent data plane faults through fuzzing and localize them quickly.}, }
Endnote
%0 Report %A Shukla, Apoorv %A Saidi, Said Jawad %A Schmid, Stefan %A Canini, Marco %A Zinner, Thomas %A Feldmann, Anja %+ External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Consistent SDNs through Network State Fuzzing : %G eng %U http://hdl.handle.net/21.11116/0000-0003-F027-2 %U http://arxiv.org/abs/1904.08977 %D 2019 %X The conventional wisdom is that a software-defined network (SDN) operates under the premise that the logically centralized control plane has an accurate representation of the actual data plane state. Nevertheless, bugs, misconfigurations, faults or attacks can introduce inconsistencies that undermine correct operation. Previous work in this area, however, lacks a holistic methodology to tackle this problem and thus, addresses only certain parts of the problem. Yet, the consistency of the overall system is only as good as its least consistent part. Motivated by an analogy of network consistency checking with program testing, we propose to add active probe-based network state fuzzing to our consistency check repertoire. Hereby, our system, PAZZ, combines production traffic with active probes to continuously test if the actual forwarding path and decision elements (on the data plane) correspond to the expected ones (on the control plane). Our insight is that active traffic covers the inconsistency cases beyond the ones identified by passive traffic. PAZZ prototype was built and evaluated on topologies of varying scale and complexity. Our results show that PAZZ requires minimal network resources to detect persistent data plane faults through fuzzing and localize them quickly. %K Computer Science, Networking and Internet Architecture, cs.NI
[48]
S. Zannettou, T. Caulfield, B. Bradlyn, E. De Cristofaro, G. Stringhini, and J. Blackburn, “Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter,” 2019. [Online]. Available: http://arxiv.org/abs/1901.05997. (arXiv: 1901.05997)
Abstract
State-sponsored organizations are increasingly linked to efforts aimed to exploit social media for information warfare and manipulating public opinion. Typically, their activities rely on a number of social network accounts they control, aka trolls, that post and interact with other users disguised as "regular" users. These accounts often use images and memes, along with textual content, in order to increase the engagement and the credibility of their posts. In this paper, we present the first study of images shared by state-sponsored accounts by analyzing a ground truth dataset of 1.8M images posted to Twitter by accounts controlled by the Russian Internet Research Agency. First, we analyze the content of the images as well as their posting activity. Then, using Hawkes Processes, we quantify their influence on popular Web communities like Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab, with respect to the dissemination of images. We find that the extensive image posting activity of Russian trolls coincides with real-world events (e.g., the Unite the Right rally in Charlottesville), and shed light on their targets as well as the content disseminated via images. Finally, we show that the trolls were more effective in disseminating politics-related imagery than other images.
Export
BibTeX
@online{Zannettou_arXIv1901.05997, TITLE = {Characterizing the Use of Images in State-Sponsored Information Warfare Operations by {R}ussian {Tr}olls on Twitter}, AUTHOR = {Zannettou, Savvas and Caulfield, Tristan and Bradlyn, Barry and De Cristofaro, Emiliano and Stringhini, Gianluca and Blackburn, Jeremy}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1901.05997}, EPRINT = {1901.05997}, EPRINTTYPE = {arXiv}, YEAR = {2019}, MARGINALMARK = {$\bullet$}, ABSTRACT = {State-sponsored organizations are increasingly linked to efforts aimed to exploit social media for information warfare and manipulating public opinion. Typically, their activities rely on a number of social network accounts they control, aka trolls, that post and interact with other users disguised as "regular" users. These accounts often use images and memes, along with textual content, in order to increase the engagement and the credibility of their posts. In this paper, we present the first study of images shared by state-sponsored accounts by analyzing a ground truth dataset of 1.8M images posted to Twitter by accounts controlled by the Russian Internet Research Agency. First, we analyze the content of the images as well as their posting activity. Then, using Hawkes Processes, we quantify their influence on popular Web communities like Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab, with respect to the dissemination of images. We find that the extensive image posting activity of Russian trolls coincides with real-world events (e.g., the Unite the Right rally in Charlottesville), and shed light on their targets as well as the content disseminated via images. Finally, we show that the trolls were more effective in disseminating politics-related imagery than other images.}, }
Endnote
%0 Report %A Zannettou, Savvas %A Caulfield, Tristan %A Bradlyn, Barry %A De Cristofaro, Emiliano %A Stringhini, Gianluca %A Blackburn, Jeremy %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations %T Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter : %G eng %U http://hdl.handle.net/21.11116/0000-0005-767F-9 %U http://arxiv.org/abs/1901.05997 %D 2019 %X State-sponsored organizations are increasingly linked to efforts aimed to exploit social media for information warfare and manipulating public opinion. Typically, their activities rely on a number of social network accounts they control, aka trolls, that post and interact with other users disguised as "regular" users. These accounts often use images and memes, along with textual content, in order to increase the engagement and the credibility of their posts. In this paper, we present the first study of images shared by state-sponsored accounts by analyzing a ground truth dataset of 1.8M images posted to Twitter by accounts controlled by the Russian Internet Research Agency. First, we analyze the content of the images as well as their posting activity. Then, using Hawkes Processes, we quantify their influence on popular Web communities like Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab, with respect to the dissemination of images. We find that the extensive image posting activity of Russian trolls coincides with real-world events (e.g., the Unite the Right rally in Charlottesville), and shed light on their targets as well as the content disseminated via images. Finally, we show that the trolls were more effective in disseminating politics-related imagery than other images. %K cs.SI,Computer Science, Computers and Society, cs.CY
2018
[49]
R. Beverly, G. Smaragdakis, and A. Feldmann, Eds., Passive and Active Measurement, vol. 10771. Springer, 2018.
Export
BibTeX
@proceedings{PAM2018, TITLE = {Passive and Active Measurement (PAM 2018)}, EDITOR = {Beverly, Robert and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, DOI = {10.1007/978-3-319-76481-8}, PUBLISHER = {Springer}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {Lecture Notes in Computer Science (LNCS)}, VOLUME = {10771}, ADDRESS = {Berlin, Germany}, }
Endnote
%0 Conference Proceedings %E Beverly, Robert %E Smaragdakis, Georgios %E Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Passive and Active Measurement : 19th International Conference, PAM 2018 ; Berlin, Germany, March 26-27, 2018 ; Proceedings %G eng %U http://hdl.handle.net/21.11116/0000-0001-3CC6-D %R 10.1007/978-3-319-76481-8 %I Springer %D 2018 %B 19th International Passive and Active Measurement Conference %Z date of event: 2018-03-26 - 2018-03-27 %D 2018 %C Berlin, Germany %V 10771
[50]
D. Bhattacherjee, W. Aqeel, I. N. Bozkurt, A. Aguirre, B. Chandrasekaran, P. B. Godfrey, G. Laughlin, B. Maggs, and A. Singla, “Gearing up for the 21st Century Space Race,” in HotNets-VXIII, Redmond, WA, USA, 2018.
Export
BibTeX
@inproceedings{Bhattacherjee_HotNets18, TITLE = {Gearing up for the 21st Century Space Race}, AUTHOR = {Bhattacherjee, Debopam and Aqeel, Waqar and Bozkurt, Ilker Nadi and Aguirre, Anthony and Chandrasekaran, Balakrishnan and Godfrey, P. Brighten and Laughlin, Gregory and Maggs, Bruce and Singla, Ankit}, LANGUAGE = {eng}, ISBN = {978-1-4503-6120-0}, DOI = {10.1145/3286062.3286079}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {HotNets-VXIII}, PAGES = {113--119}, ADDRESS = {Redmond, WA, USA}, }
Endnote
%0 Conference Proceedings %A Bhattacherjee, Debopam %A Aqeel, Waqar %A Bozkurt, Ilker Nadi %A Aguirre, Anthony %A Chandrasekaran, Balakrishnan %A Godfrey, P. Brighten %A Laughlin, Gregory %A Maggs, Bruce %A Singla, Ankit %+ External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations %T Gearing up for the 21st Century Space Race : %G eng %U http://hdl.handle.net/21.11116/0000-0002-BF0B-C %R 10.1145/3286062.3286079 %D 2018 %B ACM Workshop on Hot Topics in Networks %Z date of event: 2018-11-15 - 2018-11-16 %C Redmond, WA, USA %B HotNets-VXIII %P 113 - 119 %I ACM %@ 978-1-4503-6120-0
[51]
D. Bhattacherjee, S. A. Jyothi, I. N. Bozkurt, M. Tirmazi, W. Aqeel, A. Aguirre, B. Chandrasekaran, P. B. Godfrey, G. P. Laughlin, B. M. Maggs, and A. Singla, “cISP: A Speed-of-Light Internet Service Provider,” 2018. [Online]. Available: http://arxiv.org/abs/1809.10897. (arXiv: 1809.10897)
Abstract
Low latency is a requirement for a variety of interactive network applications. The Internet, however, is not optimized for latency. We thus explore the design of cost-effective wide-area networks that move data over paths very close to great-circle paths, at speeds very close to the speed of light in vacuum. Our cISP design augments the Internet's fiber with free-space wireless connectivity. cISP addresses the fundamental challenge of simultaneously providing low latency and scalable bandwidth, while accounting for numerous practical factors ranging from transmission tower availability to packet queuing. We show that instantiations of cISP across the contiguous United States and Europe would achieve mean latencies within 5% of that achievable using great-circle paths at the speed of light, over medium and long distances. Further, we estimate that the economic value from such networks would substantially exceed their expense.
Export
BibTeX
@online{Bhattacherjee_arXiv1809.10897, TITLE = {{cISP}: {A} Speed-of-Light Internet Service Provider}, AUTHOR = {Bhattacherjee, Debopam and Jyothi, Sangeetha Abdu and Bozkurt, Ilker Nadi and Tirmazi, Muhammad and Aqeel, Waqar and Aguirre, Anthony and Chandrasekaran, Balakrishnan and Godfrey, P. Brighten and Laughlin, Gregory P. and Maggs, Bruce M. and Singla, Ankit}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1809.10897}, EPRINT = {1809.10897}, EPRINTTYPE = {arXiv}, YEAR = {2018}, ABSTRACT = {Low latency is a requirement for a variety of interactive network applications. The Internet, however, is not optimized for latency. We thus explore the design of cost-effective wide-area networks that move data over paths very close to great-circle paths, at speeds very close to the speed of light in vacuum. Our cISP design augments the Internet's fiber with free-space wireless connectivity. cISP addresses the fundamental challenge of simultaneously providing low latency and scalable bandwidth, while accounting for numerous practical factors ranging from transmission tower availability to packet queuing. We show that instantiations of cISP across the contiguous United States and Europe would achieve mean latencies within 5% of that achievable using great-circle paths at the speed of light, over medium and long distances. Further, we estimate that the economic value from such networks would substantially exceed their expense.}, }
Endnote
%0 Report %A Bhattacherjee, Debopam %A Jyothi, Sangeetha Abdu %A Bozkurt, Ilker Nadi %A Tirmazi, Muhammad %A Aqeel, Waqar %A Aguirre, Anthony %A Chandrasekaran, Balakrishnan %A Godfrey, P. Brighten %A Laughlin, Gregory P. %A Maggs, Bruce M. %A Singla, Ankit %+ External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations %T cISP: A Speed-of-Light Internet Service Provider : %G eng %U http://hdl.handle.net/21.11116/0000-0002-BF14-1 %U http://arxiv.org/abs/1809.10897 %D 2018 %X Low latency is a requirement for a variety of interactive network applications. The Internet, however, is not optimized for latency. We thus explore the design of cost-effective wide-area networks that move data over paths very close to great-circle paths, at speeds very close to the speed of light in vacuum. Our cISP design augments the Internet's fiber with free-space wireless connectivity. cISP addresses the fundamental challenge of simultaneously providing low latency and scalable bandwidth, while accounting for numerous practical factors ranging from transmission tower availability to packet queuing. We show that instantiations of cISP across the contiguous United States and Europe would achieve mean latencies within 5% of that achievable using great-circle paths at the speed of light, over medium and long distances. Further, we estimate that the economic value from such networks would substantially exceed their expense. %K Computer Science, Networking and Internet Architecture, cs.NI
[52]
I. N. Bozkurt, W. Aqeel, D. Bhattacherjee, B. Chandrasekaran, P. B. Godfrey, G. Laughlin, B. M. Maggs, and A. Singla, “Dissecting Latency in the Internet’s Fiber Infrastructure,” 2018. [Online]. Available: http://arxiv.org/abs/1811.10737. (arXiv: 1811.10737)
Abstract
The recent publication of the `InterTubes' map of long-haul fiber-optic cables in the contiguous United States invites an exciting question: how much faster would the Internet be if routes were chosen to minimize latency? Previous measurement campaigns suggest the following rule of thumb for estimating Internet latency: multiply line-of-sight distance by 2.1, then divide by the speed of light in fiber. But a simple computation of shortest-path lengths through the conduits in the InterTubes map suggests that the conversion factor for all pairs of the 120 largest population centers in the U.S.\ could be reduced from 2.1 to 1.3, in the median, even using less than half of the links. To determine whether an overlay network could be used to provide shortest paths, and how well it would perform, we used the diverse server deployment of a CDN to measure latency across individual conduits. We were surprised to find, however, that latencies are sometimes much higher than would be predicted by conduit length alone. To understand why, we report findings from our analysis of network latency data from the backbones of two Tier-1 ISPs, two scientific and research networks, and the recently built fiber backbone of a CDN.
Export
BibTeX
@online{Bozkurt_arXIv1811.10737, TITLE = {Dissecting Latency in the Internet's Fiber Infrastructure}, AUTHOR = {Bozkurt, Ilker Nadi and Aqeel, Waqar and Bhattacherjee, Debopam and Chandrasekaran, Balakrishnan and Godfrey, Philip Brighten and Laughlin, Gregory and Maggs, Bruce M. and Singla, Ankit}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1811.10737}, EPRINT = {1811.10737}, EPRINTTYPE = {arXiv}, YEAR = {2018}, ABSTRACT = {The recent publication of the `InterTubes' map of long-haul fiber-optic cables in the contiguous United States invites an exciting question: how much faster would the Internet be if routes were chosen to minimize latency? Previous measurement campaigns suggest the following rule of thumb for estimating Internet latency: multiply line-of-sight distance by 2.1, then divide by the speed of light in fiber. But a simple computation of shortest-path lengths through the conduits in the InterTubes map suggests that the conversion factor for all pairs of the 120 largest population centers in the U.S.\ could be reduced from 2.1 to 1.3, in the median, even using less than half of the links. To determine whether an overlay network could be used to provide shortest paths, and how well it would perform, we used the diverse server deployment of a CDN to measure latency across individual conduits. We were surprised to find, however, that latencies are sometimes much higher than would be predicted by conduit length alone. To understand why, we report findings from our analysis of network latency data from the backbones of two Tier-1 ISPs, two scientific and research networks, and the recently built fiber backbone of a CDN.}, }
Endnote
%0 Report %A Bozkurt, Ilker Nadi %A Aqeel, Waqar %A Bhattacherjee, Debopam %A Chandrasekaran, Balakrishnan %A Godfrey, Philip Brighten %A Laughlin, Gregory %A Maggs, Bruce M. %A Singla, Ankit %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations %T Dissecting Latency in the Internet's Fiber Infrastructure : %G eng %U http://hdl.handle.net/21.11116/0000-0002-BFB3-D %U http://arxiv.org/abs/1811.10737 %D 2018 %X The recent publication of the `InterTubes' map of long-haul fiber-optic cables in the contiguous United States invites an exciting question: how much faster would the Internet be if routes were chosen to minimize latency? Previous measurement campaigns suggest the following rule of thumb for estimating Internet latency: multiply line-of-sight distance by 2.1, then divide by the speed of light in fiber. But a simple computation of shortest-path lengths through the conduits in the InterTubes map suggests that the conversion factor for all pairs of the 120 largest population centers in the U.S.\ could be reduced from 2.1 to 1.3, in the median, even using less than half of the links. To determine whether an overlay network could be used to provide shortest paths, and how well it would perform, we used the diverse server deployment of a CDN to measure latency across individual conduits. We were surprised to find, however, that latencies are sometimes much higher than would be predicted by conduit length alone. To understand why, we report findings from our analysis of network latency data from the backbones of two Tier-1 ISPs, two scientific and research networks, and the recently built fiber backbone of a CDN. %K Computer Science, Networking and Internet Architecture, cs.NI
[53]
T. Chung, J. Lok, B. Chandrasekaran, D. Choffnes, D. Levin, B. M. Maggs, A. Mislove, J. Rula, N. Sullivan, and C. Wilson, “Is the Web Ready for OCSP Must-Staple?,” in IMC’18, Internet Measurement Conference, Boston, MA, USA, 2018.
Export
BibTeX
@inproceedings{Chung_IMC2018, TITLE = {Is the Web Ready for {OCSP} Must-Staple?}, AUTHOR = {Chung, Taejoong and Lok, Jay and Chandrasekaran, Balakrishnan and Choffnes, David and Levin, Dave and Maggs, Bruce M. and Mislove, Alan and Rula, John and Sullivan, Nick and Wilson, Christo}, LANGUAGE = {eng}, ISBN = {978-1-4503-5619-0}, DOI = {10.1145/3278532.3278543}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {IMC'18, Internet Measurement Conference}, PAGES = {105--118}, ADDRESS = {Boston, MA, USA}, }
Endnote
%0 Conference Proceedings %A Chung, Taejoong %A Lok, Jay %A Chandrasekaran, Balakrishnan %A Choffnes, David %A Levin, Dave %A Maggs, Bruce M. %A Mislove, Alan %A Rula, John %A Sullivan, Nick %A Wilson, Christo %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations External Organizations %T Is the Web Ready for OCSP Must-Staple? : %G eng %U http://hdl.handle.net/21.11116/0000-0002-BF11-4 %R 10.1145/3278532.3278543 %D 2018 %B Internet Measurement Conference %Z date of event: 2018-10-31 - 2018-11-02 %C Boston, MA, USA %B IMC'18 %P 105 - 118 %I ACM %@ 978-1-4503-5619-0
[54]
C. Dietzel, M. Wichtlhuber, G. Smaragdakis, and A. Feldmann, “Stellar: Network Attack Mitigation Using Advanced Blackholing,” in CoNEXT’18, 14th International Conference on Emerging Networking Experiments and Technologies, Heraklion, Greece, 2018.
Export
BibTeX
@inproceedings{Dietzel_CoNTEXT, TITLE = {Stellar: {N}etwork Attack Mitigation Using Advanced Blackholing}, AUTHOR = {Dietzel, Christoph and Wichtlhuber, Matthias and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-6080-7}, DOI = {10.1145/3281411.3281413}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {CoNEXT'18, 14th International Conference on Emerging Networking Experiments and Technologies}, PAGES = {152--164}, ADDRESS = {Heraklion, Greece}, }
Endnote
%0 Conference Proceedings %A Dietzel, Christoph %A Wichtlhuber, Matthias %A Smaragdakis, Georgios %A Feldmann, Anja %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Stellar: Network Attack Mitigation Using Advanced Blackholing : %G eng %U http://hdl.handle.net/21.11116/0000-0002-D534-3 %R 10.1145/3281411.3281413 %D 2018 %B 14th International Conference on Emerging Networking Experiments and Technologies %Z date of event: 2018-12-04 - 2018-12-07 %C Heraklion, Greece %B CoNEXT'18 %P 152 - 164 %I ACM %@ 978-1-4503-6080-7
[55]
T. Enghardt, P. S. Tiesel, and A. Feldmann, “Metrics for Access Network Selection,” in ANRW’18, Applied Networking Research Workshop, Montréal, Canada, 2018.
Export
BibTeX
@inproceedings{Enghardt_ANRW2018, TITLE = {Metrics for Access Network Selection}, AUTHOR = {Enghardt, Theresa and Tiesel, Philipp S. and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-5585-8}, DOI = {10.1145/3232755.3232764}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {ANRW'18, Applied Networking Research Workshop}, PAGES = {67--73}, ADDRESS = {Montr{\'e}al, Canada}, }
Endnote
%0 Conference Proceedings %A Enghardt, Theresa %A Tiesel, Philipp S. %A Feldmann, Anja %+ External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Metrics for Access Network Selection : %G eng %U http://hdl.handle.net/21.11116/0000-0002-1585-0 %R 10.1145/3232755.3232764 %D 2018 %B Applied Networking Research Workshop %Z date of event: 2018-07-16 - 2018-07-16 %C Montréal, Canada %B ANRW'18 %P 67 - 73 %I ACM %@ 978-1-4503-5585-8
[56]
T. Fiebig, K. Borgolte, S. Hao, C. Kruegel, G. Vigna, and A. Feldmann, “In rDNS We Trust: Revisiting a Common Data-Source’s Reliability,” in Lecture Notes in Computer Science (LNCS), Berlin, Germany, 2018, vol. 10771.
Export
BibTeX
@inproceedings{FiebigPAM2018, TITLE = {In {rDNS} We Trust: {R}evisiting a Common Data-Source's Reliability}, AUTHOR = {Fiebig, Tobias and Borgolte, Kevin and Hao, Shuang and Kruegel, Christopher and Vigna, Giovanni and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-3-319-76480-1}, DOI = {10.1007/978-3-319-76481-8_10}, PUBLISHER = {Springer}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {Passive and Active Measurement (PAM 2018)}, EDITOR = {Beverly, Robert and Smaragdakis, Giorgios and Feldmann, Anja}, PAGES = {131--145}, BOOKTITLE = {Lecture Notes in Computer Science (LNCS)}, VOLUME = {10771}, ADDRESS = {Berlin, Germany}, }
Endnote
%0 Conference Proceedings %A Fiebig, Tobias %A Borgolte, Kevin %A Hao, Shuang %A Kruegel, Christopher %A Vigna, Giovanni %A Feldmann, Anja %+ External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T In rDNS We Trust: Revisiting a Common Data-Source's Reliability : %G eng %U http://hdl.handle.net/21.11116/0000-0001-3CBD-8 %R 10.1007/978-3-319-76481-8_10 %D 2018 %B 19th International Passive and Active Measurement Conference %Z date of event: 2018-03-26 - 2018-03-27 %C Berlin, Germany %B Passive and Active Measurement %E Beverly, Robert; Smaragdakis, Giorgios; Feldmann, Anja %P 131 - 145 %I Springer %@ 978-3-319-76480-1 %B Lecture Notes in Computer Science %V 10771
[57]
M. Palmer, T. Krüger, B. Chandrasekaran, and A. Feldmann, “The QUIC Fix for Optimal Video Streaming,” 2018. [Online]. Available: http://arxiv.org/abs/1809.10270. (arXiv: 1809.10270)
Abstract
Within a few years of its introduction, QUIC has gained traction: a significant chunk of traffic is now delivered over QUIC. The networking community is actively engaged in debating the fairness, performance, and applicability of QUIC for various use cases, but these debates are centered around a narrow, common theme: how does the new reliable transport built on top of UDP fare in different scenarios? Support for unreliable delivery in QUIC remains largely unexplored. The option for delivering content unreliably, as in a best-effort model, deserves the QUIC designers' and community's attention. We propose extending QUIC to support unreliable streams and present a simple approach for implementation. We discuss a simple use case of video streaming---an application that dominates the overall Internet traffic---that can leverage the unreliable streams and potentially bring immense benefits to network operators and content providers. To this end, we present a prototype implementation that, by using both the reliable and unreliable streams in QUIC, outperforms both TCP and QUIC in our evaluations.
Export
BibTeX
@online{Palmer_arXiv1809.10270, TITLE = {The {QUIC} Fix for Optimal Video Streaming}, AUTHOR = {Palmer, Mirko and Kr{\"u}ger, Thorben and Chandrasekaran, Balakrishnan and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1809.10270}, EPRINT = {1809.10270}, EPRINTTYPE = {arXiv}, YEAR = {2018}, ABSTRACT = {Within a few years of its introduction, QUIC has gained traction: a significant chunk of traffic is now delivered over QUIC. The networking community is actively engaged in debating the fairness, performance, and applicability of QUIC for various use cases, but these debates are centered around a narrow, common theme: how does the new reliable transport built on top of UDP fare in different scenarios? Support for unreliable delivery in QUIC remains largely unexplored. The option for delivering content unreliably, as in a best-effort model, deserves the QUIC designers' and community's attention. We propose extending QUIC to support unreliable streams and present a simple approach for implementation. We discuss a simple use case of video streaming---an application that dominates the overall Internet traffic---that can leverage the unreliable streams and potentially bring immense benefits to network operators and content providers. To this end, we present a prototype implementation that, by using both the reliable and unreliable streams in QUIC, outperforms both TCP and QUIC in our evaluations.}, }
Endnote
%0 Report %A Palmer, Mirko %A Krüger, Thorben %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T The QUIC Fix for Optimal Video Streaming : %G eng %U http://hdl.handle.net/21.11116/0000-0002-BFC0-E %U http://arxiv.org/abs/1809.10270 %D 2018 %X Within a few years of its introduction, QUIC has gained traction: a significant chunk of traffic is now delivered over QUIC. The networking community is actively engaged in debating the fairness, performance, and applicability of QUIC for various use cases, but these debates are centered around a narrow, common theme: how does the new reliable transport built on top of UDP fare in different scenarios? Support for unreliable delivery in QUIC remains largely unexplored. The option for delivering content unreliably, as in a best-effort model, deserves the QUIC designers' and community's attention. We propose extending QUIC to support unreliable streams and present a simple approach for implementation. We discuss a simple use case of video streaming---an application that dominates the overall Internet traffic---that can leverage the unreliable streams and potentially bring immense benefits to network operators and content providers. To this end, we present a prototype implementation that, by using both the reliable and unreliable streams in QUIC, outperforms both TCP and QUIC in our evaluations. %K Computer Science, Networking and Internet Architecture, cs.NI
[58]
M. Palmer, T. Krüger, B. Chandrasekaran, and A. Feldmann, “The QUIC Fix for Optimal Video Streaming,” in EPIQ’18, Workshop on the Evolution, Performance, and Interoperability of QUIC, Heraklion, Greece, 2018.
Export
BibTeX
@inproceedings{Palmer_EPIQ18, TITLE = {The {QUIC} Fix for Optimal Video Streaming}, AUTHOR = {Palmer, Mirko and Kr{\"u}ger, Thorben and Chandrasekaran, Balakrishnan and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-6082-1}, DOI = {10.1145/3284850.3284857}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {EPIQ'18, Workshop on the Evolution, Performance, and Interoperability of QUIC}, PAGES = {43--49}, ADDRESS = {Heraklion, Greece}, }
Endnote
%0 Conference Proceedings %A Palmer, Mirko %A Krüger, Thorben %A Chandrasekaran, Balakrishnan %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society %T The QUIC Fix for Optimal Video Streaming : %G eng %U http://hdl.handle.net/21.11116/0000-0002-BED7-6 %R 10.1145/3284850.3284857 %D 2018 %B Workshop on the Evolution, Performance, and Interoperability of QUIC %Z date of event: 2018-12-04 - 2018-12-04 %C Heraklion, Greece %B EPIQ'18 %P 43 - 49 %I ACM %@ 978-1-4503-6082-1
[59]
S. J. Saidi, D. Foucard, G. Smaragdakis, and A. Feldmann, “Flowtree: Enabling Distributed Flow Summarization at Scale,” in SIGCOMM’18, Budapest, Hungary, 2018.
Export
BibTeX
@inproceedings{Saidi_SIGCOMM2018, TITLE = {Flowtree: Enabling Distributed Flow Summarization at Scale}, AUTHOR = {Saidi, Said Jawad and Foucard, Damien and Smaragdakis, Georgios and Feldmann, Anja}, LANGUAGE = {eng}, ISBN = {978-1-4503-5915-3}, DOI = {10.1145/3234200.3234225}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {SIGCOMM'18}, PAGES = {30-32}, ADDRESS = {Budapest, Hungary}, }
Endnote
%0 Conference Proceedings %A Saidi, Said Jawad %A Foucard, Damien %A Smaragdakis, Georgios %A Feldmann, Anja %+ Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Flowtree: Enabling Distributed Flow Summarization at Scale : %G eng %U http://hdl.handle.net/21.11116/0000-0002-1577-1 %R 10.1145/3234200.3234225 %D 2018 %B SIGCOMM 2018 %Z date of event: 2018-08-20 - 2018-08-25 %C Budapest, Hungary %B SIGCOMM'18 %P 30-32 %I ACM %@ 978-1-4503-5915-3
[60]
F. Streibelt, F. Lichtblau, R. Beverly, A. Feldmann, C. Pelsser, G. Smaragdakis, and R. Bush, “BGP Communities: Even more Worms in the Routing Can,” in IMC’18, Internet Measurement Conference, Boston, MA, USA, 2018.
Export
BibTeX
@inproceedings{Streibelt_IMC2018, TITLE = {{BGP} Communities: {E}ven more Worms in the Routing Can}, AUTHOR = {Streibelt, Florian and Lichtblau, Franziska and Beverly, Robert and Feldmann, Anja and Pelsser, Cristel and Smaragdakis, Georgios and Bush, Randy}, LANGUAGE = {eng}, ISBN = {978-1-4503-5619-0}, DOI = {10.1145/3278532.3278557}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {IMC'18, Internet Measurement Conference}, PAGES = {279--292}, ADDRESS = {Boston, MA, USA}, }
Endnote
%0 Conference Proceedings %A Streibelt, Florian %A Lichtblau, Franziska %A Beverly, Robert %A Feldmann, Anja %A Pelsser, Cristel %A Smaragdakis, Georgios %A Bush, Randy %+ Internet Architecture, MPI for Informatics, Max Planck Society Internet Architecture, MPI for Informatics, Max Planck Society External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations External Organizations External Organizations %T BGP Communities: Even more Worms in the Routing Can : %G eng %U http://hdl.handle.net/21.11116/0000-0002-BFC7-7 %R 10.1145/3278532.3278557 %D 2018 %B Internet Measurement Conference %Z date of event: 2018-10-31 - 2018-11-02 %C Boston, MA, USA %B IMC'18 %P 279 - 292 %I ACM %@ 978-1-4503-5619-0
[61]
K. Thimmaraju, B. Shastry, T. Fiebig, F. Hetzelt, J.-P. Seifert, A. Feldmann, and S. Schmid, “Taking Control of SDN-based Cloud Systems via the Data Plane,” in Proceedings of the Symposium on SDN Research (SOSR 2018), Los Angeles, CA, USA, 2018.
Export
BibTeX
@inproceedings{ThimmarajuSOSR2018, TITLE = {Taking Control of {SDN}-based Cloud Systems via the Data Plane}, AUTHOR = {Thimmaraju, Kashyap and Shastry, Bhargava and Fiebig, Tobias and Hetzelt, Felicitas and Seifert, Jean-Pierre and Feldmann, Anja and Schmid, Stefan}, LANGUAGE = {eng}, ISBN = {978-1-4503-5664-0}, DOI = {10.1145/3185467.3185468}, PUBLISHER = {ACM}, YEAR = {2018}, DATE = {2018}, BOOKTITLE = {Proceedings of the Symposium on SDN Research (SOSR 2018)}, EID = {1}, ADDRESS = {Los Angeles, CA, USA}, }
Endnote
%0 Conference Proceedings %A Thimmaraju, Kashyap %A Shastry, Bhargava %A Fiebig, Tobias %A Hetzelt, Felicitas %A Seifert, Jean-Pierre %A Feldmann, Anja %A Schmid, Stefan %+ External Organizations External Organizations External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society External Organizations %T Taking Control of SDN-based Cloud Systems via the Data Plane : %G eng %U http://hdl.handle.net/21.11116/0000-0001-3CB1-4 %R 10.1145/3185467.3185468 %D 2018 %B Symposium on SDN Research %Z date of event: 2018-03-28 - 2018-03-29 %C Los Angeles, CA, USA %B Proceedings of the Symposium on SDN Research %Z sequence number: 1 %I ACM %@ 978-1-4503-5664-0
[62]
P. S. Tiesel, T. Enghardt, M. Palmer, and A. Feldmann, “Socket Intents: OS Support for Using Multiple Access Networks and its Benefits for Web Browsing,” 2018. [Online]. Available: http://arxiv.org/abs/1804.08484. (arXiv: 1804.08484)
Abstract
In today's Internet, mobile devices are connected to multiple access networks, e.g., WiFi/DSL and LTE. To take advantage of the networks' diverse paths characteristics (delay, bandwidth, and reliability) and aggregate bandwidth, we need smart strategies for choosing which interface(s) to use for what traffic. In this paper, we present an approach how to tackle this challenge as part of the Operating System (OS): With the concept of Socket Intents, applications can express what they know about their communication pattern and their preferences. Using our Socket Intents Prototype and our modified BSD Socket Interface, this information is used to choose the most appropriate path or path combination on a per message or per connection basis. We evaluate our system based on the use case of Web browsing: Using our prototype and a client-side proxy, we show the feasibility and benefits of our design. Using a flow-based simulator and a full factorial experimental design, we study a broad range of access network combinations (based on typical DSL and LTE scenarios) and real workloads (Alexa Top 100 and Top 1000 Web Sites). Our policies achieve performance benefits in more than 50% of the cases and speedups of more than factor two in 20% of the cases without adding overhead in the other cases.
Export
BibTeX
@online{Tiesel_arXiv1804.08484, TITLE = {Socket Intents: {OS} Support for Using Multiple Access Networks and its Benefits for Web Browsing}, AUTHOR = {Tiesel, Philipp S. and Enghardt, Theresa and Palmer, Mirko and Feldmann, Anja}, LANGUAGE = {eng}, URL = {http://arxiv.org/abs/1804.08484}, EPRINT = {1804.08484}, EPRINTTYPE = {arXiv}, YEAR = {2018}, ABSTRACT = {In today's Internet, mobile devices are connected to multiple access networks, e.g., WiFi/DSL and LTE. To take advantage of the networks' diverse paths characteristics (delay, bandwidth, and reliability) and aggregate bandwidth, we need smart strategies for choosing which interface(s) to use for what traffic. In this paper, we present an approach how to tackle this challenge as part of the Operating System (OS): With the concept of Socket Intents, applications can express what they know about their communication pattern and their preferences. Using our Socket Intents Prototype and our modified BSD Socket Interface, this information is used to choose the most appropriate path or path combination on a per message or per connection basis. We evaluate our system based on the use case of Web browsing: Using our prototype and a client-side proxy, we show the feasibility and benefits of our design. Using a flow-based simulator and a full factorial experimental design, we study a broad range of access network combinations (based on typical DSL and LTE scenarios) and real workloads (Alexa Top 100 and Top 1000 Web Sites). Our policies achieve performance benefits in more than 50% of the cases and speedups of more than factor two in 20% of the cases without adding overhead in the other cases.}, }
Endnote
%0 Report %A Tiesel, Philipp S. %A Enghardt, Theresa %A Palmer, Mirko %A Feldmann, Anja %+ External Organizations External Organizations External Organizations Internet Architecture, MPI for Informatics, Max Planck Society %T Socket Intents: OS Support for Using Multiple Access Networks and its Benefits for Web Browsing : %G eng %U http://hdl.handle.net/21.11116/0000-0002-158A-B %U http://arxiv.org/abs/1804.08484 %D 2018 %X In today's Internet, mobile devices are connected to multiple access networks, e.g., WiFi/DSL and LTE. To take advantage of the networks' diverse paths characteristics (delay, bandwidth, and reliability) and aggregate bandwidth, we need smart strategies for choosing which interface(s) to use for what traffic. In this paper, we present an approach how to tackle this challenge as part of the Operating System (OS): With the concept of Socket Intents, applications can express what they know about their communication pattern and their preferences. Using our Socket Intents Prototype and our modified BSD Socket Interface, this information is used to choose the most appropriate path or path combination on a per message or per connection basis. We evaluate our system based on the use case of Web browsing: Using our prototype and a client-side proxy, we show the feasibility and benefits of our design. Using a flow-based simulator and a full factorial experimental design, we study a broad range of access network combinations (based on typical DSL and LTE scenarios) and real workloads (Alexa Top 100 and Top 1000 Web Sites). Our policies achieve performance benefits in more than 50% of the cases and speedups of more than factor two in 20% of the cases without adding overhead in the other cases. %K Computer Science, Networking and Internet Architecture, cs.NI