On the design and performance of prefix-preserving IP traffic trace anonymization
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
A web server's view of the transport layer
ACM SIGCOMM Computer Communication Review
Beyond folklore: observations on fragmented traffic
IEEE/ACM Transactions on Networking (TON)
Internet research needs better models
ACM SIGCOMM Computer Communication Review
IEEE Internet Computing
Measuring the evolution of transport protocols in the internet
ACM SIGCOMM Computer Communication Review
Experiences with a continuous network tracing infrastructure
Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
Wide-area Internet traffic patterns and characteristics
IEEE Network: The Magazine of Global Internetworking
Packet-level traffic measurements from the Sprint IP backbone
IEEE Network: The Magazine of Global Internetworking
Shadow configuration as a network management primitive
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Evaluation of a comprehensive P2P video-on-demand streaming system
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis of the Effects of XLFrames in a Network
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
IP version 10.0: a strawman design beyond IPv6
Proceedings of the 2009 workshop on Re-architecting the internet
On traffic characteristics of a broadband wireless internet access
NGI'09 Proceedings of the 5th Euro-NGI conference on Next Generation Internet networks
Review: Passive internet measurement: Overview and guidelines based on experiences
Computer Communications
Designing a resource pooling transport protocol
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
From packets to XLFrames: sand and rocks for transfer of mice and elephants
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Trends and differences in connection-behavior within classes of internet backbone traffic
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Protecting SIP against very large flooding DoS attacks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Volume traffic anomaly detection using hierarchical clustering
APNOMS'09 Proceedings of the 12th Asia-Pacific network operations and management conference on Management enabling the future internet for changing business and new computing services
Estimating routing symmetry on single links by passive flow measurements
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Unsupervised host behavior classification from connection patterns
International Journal of Network Management
Network traffic characteristics of data centers in the wild
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Dynamic feature analysis and measurement for large-scale network traffic monitoring
IEEE Transactions on Information Forensics and Security
On collection of large-scale multi-purpose datasets on internet backbone links
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
Data reduction by identification and correlation of TCP/IP attack attributes for network forensics
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Operating a network link at 100%
PAM'11 Proceedings of the 12th international conference on Passive and active measurement
Monitoring abnormal network traffic based on blind source separation approach
Journal of Network and Computer Applications
Exposing invisible timing-based traffic watermarks with BACKLIT
Proceedings of the 27th Annual Computer Security Applications Conference
A survey of mobility in information-centric networks: challenges and research directions
Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications
DDoS flooding attack detection scheme based on F-divergence
Computer Communications
Assessing the quality of packet-level traces collected on internet backbone links
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Fragmentation Considered Vulnerable
ACM Transactions on Information and System Security (TISSEC)
Architecture of multi-OLT PON systems and its bandwidth allocation algorithms
Photonic Network Communications
A survey of mobility in information-centric networks
Communications of the ACM
Adaptive hybrid optical switching: Performance and energy efficiency
Journal of High Speed Networks - Green Networking and Computing, Part 2 of 2
Hi-index | 0.02 |
The dominating Internet protocols, IP and TCP, allow some flexibility in implementation, including a variety of optional features. To support research and further development of these protocols, it is crucial to know about current deployment of protocol specific features and accompanying anomalies. This work is intended to reflect the current characteristics of Internet backbone traffic and point out misbehaviors and potential problems. On 20 consecutive days in April 2006 bidirectional traffic was collected on an OC-192 backbone link. The analysis of the data provides a comprehensive summary about current protocol usage including comparisons to prior studies. Furthermore, header misbehaviors and anomalies were found within almost every aspect analyzed and are discussed in detail. These observations are important information for designers of network protocols, network application and network attack detection systems.1..