End-to-end routing behavior in the Internet
Conference proceedings on Applications, technologies, architectures, and protocols for computer communications
Measuring end-to-end bulk transfer capacity
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
DNS performance and the effectiveness of caching
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
Petri Net Theory and the Modeling of Systems
Petri Net Theory and the Modeling of Systems
A knowledge plane for the internet
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Towards an accurate AS-level traceroute tool
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
ATMEN: a triggered network measurement infrastructure
WWW '05 Proceedings of the 14th international conference on World Wide Web
Building a time machine for efficient recording and retrieval of high-volume network traffic
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Scriptroute: a public internet measurement facility
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
Bro: a system for detecting network intruders in real-time
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
PDA: a tool for automated problem determination
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Spamscatter: characterizing internet scam hosting infrastructure
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
An architecture for large scale Internet measurement
IEEE Communications Magazine
Scamper: a scalable and extensible packet prober for active measurement of the internet
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
CANVuS: context-aware network vulnerability scanning
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Hi-index | 0.00 |
Often when assessing complex network behavior a single measurement is not enough to gain a solid understanding of the root causes of the behavior. In this initial paper we argue for thinking about "measurement" as a process rather than an event. We introduce reactive measurement (REM), which is a technique in which one measurement's results are used to automatically decide what (if any) additional measurements are required to further understand some observed phenomenon. While reactive measurement has been used on occasion in measurement studies, what has been lacking is (i) an examination of its general power, and (ii) a generic framework for facilitating fluid use of this approach. We discuss REM's power and sketch an architecture for a system that provides general REM functionality to network researchers. We argue that by enabling the coupling of disparate measurement tools, REM holds great promise for assisting researchers and operators in determining the root causes of network problems and enabling measurement targeted for specific conditions.