Table of Contents
|
Traffic Monitoring and Analysis Moritz Steiner, Pere Barlet-Ros, Olivier Bonaventure (Eds.)
|
Front Matter |
Measurement Tools and Methods
|
Youtube Revisited: On the Importance of Correct Measurement Methodology Ossi Karkulahti, Jussi Kangasharju |
17-30 |
Zen and the Art of Network Troubleshooting: A Hands on Experimental Study François Espinet, Diana Joumblatt, Dario Rossi |
31-45 |
Mobile and Wireless
|
Vivisecting WhatsApp in Cellular Networks: Servers, Flows, and Quality of Experience Pierdomenico Fiadino, Mirko Schiavone, Pedro Casas |
49-63 |
Device-Specific Traffic Characterization for Root Cause Analysis in Cellular Networks Peter Romirer-Maierhofer, Mirko Schiavone, Alessandro D’alconzo |
64-78 |
Tracking Middleboxes in the Mobile World with TraceboxAndroid Valentin Thirion, Korian Edeline, Benoit Donnet |
79-91 |
Web
|
Assessing Affinity Between Users and CDN Sites Xun Fan, Ethan Katz-Bassett, John Heidemann |
95-110 |
The Online Tracking Horde: A View from Passive Measurements Hassan Metwalley, Stefano Traverso, Marco Mellia, Stanislav Miskovic, Mario Baldi |
111-125 |
SFMap: Inferring Services over Encrypted Web Flows Using Dynamical Domain Name Graphs Tatsuya Mori, Takeru Inoue, Akihiro Shimoda, Kazumichi Sato, Keisuke Ishibashi, Shigeki Goto |
126-139 |
Security
|
Monitoring Internet Censorship with UBICA Giuseppe Aceto, Alessio Botta, Antonio Pescapè, Nick Feamster, M. Faheem Awan, Tahir Ahmad, Saad Qaisar |
143-157 |
How Dangerous Is Internet Scanning? Elias Raftopoulos, Eduard Glatz, Xenofontas Dimitropoulos, Alberto Dainotti |
158-172 |
Investigating the Nature of Routing Anomalies: Closing in on Subprefix Hijacking Attacks Johann Schlamp, Ralph Holz, Oliver Gasser, Andreas Korsten, Quentin Jacquemart, Georg Carle, Ernst Biersack |
173-187 |
The Abandoned Side of the Internet: Hijacking Internet Resources When Domain Names Expire Johann Schlamp, Josef Gustafsson, Matthias Wählisch, Thomas Schmidt, Georg Carle |
188-201 |
New Protocols
|
DoS Amplification Attacks – Protocol-Agnostic Detection of Service Abuse in Amplifier Networks Timm Böttger, Lothar Braun, Oliver Gasser, Felix Eye, Helmut Reiser, Georg Carle |
205-218 |
Measuring DANE TLSA Deployment Liang Zhu, Duane Wessels, Allison Mankin, John Heidemann |
219-232 |
A First Look at Real Multipath TCP Traffic Benjamin Hesmans, Hoang Tran-Viet, Ramin Sadre, Olivier Bonaventure |
233-246 |
|