ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
A high-level programming environment for packet trace anonymization and transformation
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Strategies for sound internet measurement
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
The internet measurement data catalog
ACM SIGCOMM Computer Communication Review
The devil and packet trace anonymization
ACM SIGCOMM Computer Communication Review
Community-oriented network measurement infrastructure (CONMI) workshop report
ACM SIGCOMM Computer Communication Review
A first look at modern enterprise traffic
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Sharing is caring: so where are your data?
ACM SIGCOMM Computer Communication Review
What ought a program committee to do?
WOWCS'08 Proceedings of the conference on Organizing Workshops, Conferences, and Symposia for Computer Systems
What ought a program committee to do?
WOWCS'08 Proceedings of the conference on Organizing Workshops, Conferences, and Symposia for Computer Systems
Conducting cybersecurity research legally and ethically
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
What are our standards for validation of measurement-based networking research?
ACM SIGMETRICS Performance Evaluation Review
Bunker: a privacy-oriented platform for network tracing
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
The workshop on active internet measurements (AIMS) report
ACM SIGCOMM Computer Communication Review
The role of network trace anonymization under attack
ACM SIGCOMM Computer Communication Review
Review: Passive internet measurement: Overview and guidelines based on experiences
Computer Communications
Human behavior and challenges of anonymizing WLAN traces
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Measurement lab: overview and an invitation to the research community
ACM SIGCOMM Computer Communication Review
Proceedings of the 2010 ACM SIGCOMM workshop on Home networks
A Socratic method for validation of measurement-based networking research
Computer Communications
ACM SIGCOMM Computer Communication Review
Quantifying paedophile activity in a large P2P system
Information Processing and Management: an International Journal
Detection and classification of peer-to-peer traffic: A survey
ACM Computing Surveys (CSUR)
On changing the culture of empirical internet assessment
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
In this note we discuss issues surrounding how to provide and use network measurement data made available for sharing among researchers. While previous work has focused on the technical details of enabling sharing via traffic anonymization, we focus on higher-level aspects of the process such as potential harm to the provider (e.g., by de-anonymizing a shared dataset) or interactions to strengthen subsequent research (e.g., helping to establish ground truth). We believe the community would benefit from a dialog regarding expectations and responsibilities of data providers, and the etiquette involved with using others' measurement data. To this end, we provide a set of guidelines that aim to aid the process of sharing measurement data. We present these not as specific rules, but rather a framework under which providers and users can better attain a mutual understanding about how to treat particular datasets.