Active Mapping: Resisting NIDS Evasion without Altering Traffic
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
On the performance of middleboxes
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
NUTSS: a SIP-based approach to UDP and TCP network connectivity
Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Measuring interactions between transport protocols and middleboxes
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Impact of paging channel overloads or attacks on a cellular network
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Peer-to-peer communication across network address translators
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Characterization and measurement of TCP traversal through NATs and firewalls
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Understanding the efficacy of deployed internet source address validation filtering
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
Anatomizing application performance differences on smartphones
Proceedings of the 8th international conference on Mobile systems, applications, and services
Proceedings of the 8th international conference on Mobile systems, applications, and services
Characterizing radio resource allocation for 3G networks
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Peering through the shroud: the effect of edge opacity on ip-based client identification
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
The middlebox manifesto: enabling innovation in middlebox deployment
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
Periodic transfers in mobile applications: network-wide origin, impact, and optimization
Proceedings of the 21st international conference on World Wide Web
Geolocating IP addresses in cellular data networks
PAM'12 Proceedings of the 13th international conference on Passive and Active Measurement
Multi-resource fair queueing for packet processing
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
Understanding bufferbloat in cellular networks
Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, challenges, and future design
Can we pay for what we get in 3G data access?
Proceedings of the 18th annual international conference on Mobile computing and networking
Multi-resource fair queueing for packet processing
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
Mobile data charging: new attacks and countermeasures
Proceedings of the 2012 ACM conference on Computer and communications security
Collaborative TCP sequence number inference attack: how to crack sequence number under a second
Proceedings of the 2012 ACM conference on Computer and communications security
When David helps Goliath: the case for 3G onloading
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Breaking for commercials: characterizing mobile advertising
Proceedings of the 2012 ACM conference on Internet measurement conference
Meddle: middleboxes for increased transparency and control of mobile traffic
Proceedings of the 2012 ACM conference on CoNEXT student workshop
2G/3G network measurements in rural areas of India
Proceedings of the 3rd ACM Symposium on Computing for Development
An in-depth study of LTE: effect of network protocol and application behavior on performance
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
SIMPLE-fying middlebox policy enforcement using SDN
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
How voice calls affect data in operational LTE networks
Proceedings of the 19th annual international conference on Mobile computing & networking
Demystifying the dark side of the middle: a field study of middlebox failures in datacenters
Proceedings of the 2013 conference on Internet measurement conference
Revealing middlebox interference with tracebox
Proceedings of the 2013 conference on Internet measurement conference
RILAnalyzer: a comprehensive 3G monitor on your phone
Proceedings of the 2013 conference on Internet measurement conference
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles
ACM SIGOPS 24th Symposium on Operating Systems Principles
Timecard: controlling user-perceived delays in server-based mobile applications
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles
SoftCell: scalable and flexible cellular core network architecture
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
3GOL: power-boosting ADSL using 3G onloading
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
Silent TCP connection closure for cellular networks
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
Staying online while mobile: the hidden costs
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
Are TCP extensions middlebox-proof?
Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization
Analysis and topology-based traversal of cascaded large scale NATs
Proceedings of the 2013 workshop on Hot topics in middleboxes and network function virtualization
First impressions on the state of cellular data connectivity in India
Proceedings of the 4th Annual Symposium on Computing for Development
Hi-index | 0.00 |
The use of cellular data networks is increasingly popular as network coverage becomes more ubiquitous and many diverse user-contributed mobile applications become available. The growing cellular traffic demand means that cellular network carriers are facing greater challenges to provide users with good network performance and energy efficiency, while protecting networks from potential attacks. To better utilize their limited network resources while securing the network and protecting client devices the carriers have already deployed various network policies that influence traffic behavior. Today, these policies are mostly opaque, though they directly impact application designs and may even introduce network vulnerabilities. We present NetPiculet, the first tool that unveils carriers' NAT and firewall policies by conducting intelligent measurement. By running NetPiculet on the major U.S. cellular providers as well as deploying it as a smartphone application in the wild covering more than 100 cellular ISPs, we identified the key NAT and firewall policies which have direct implications on performance, energy, and security. For example, NAT boxes and firewalls set timeouts for idle TCP connections, which sometimes cause significant energy waste on mobile devices. Although most carriers today deploy sophisticated firewalls, they are still vulnerable to various attacks such as battery draining and denial of service. These findings can inform developers in optimizing the interaction between mobile applications and cellular networks and also guide carriers in improving their network configurations.