Measuring the evolution of transport protocols in the internet
ACM SIGCOMM Computer Communication Review
Internet Mapping: From Art to Science
CATCH '09 Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security
Analyzing Router Responsiveness to Active Measurement Probes
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Resolving IP aliases with prespecified timestamps
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Inferring router statistics with IP timestamps
Proceedings of the ACM CoNEXT Student Workshop
Broadband internet performance: a view from the gateway
Proceedings of the ACM SIGCOMM 2011 conference
Analysis of country-wide internet outages caused by censorship
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Detecting third-party addresses in traceroute IP paths
Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
Detecting third-party addresses in traceroute IP paths
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
Detecting third-party addresses in traceroute traces with IP timestamp option
PAM'13 Proceedings of the 14th international conference on Passive and Active Measurement
Pythia: yet another active probing technique for alias resolution
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
DataTraffic Monitoring and Analysis
Hi-index | 0.00 |
In the last years, network measurements have shown a growing interest in active probing techniques. Recent works propose approaches based on the IP prespecified timestamp option and consider its support to be enough for their purposes. On the other hand, other works found that IP options are usually filtered, poorly implemented, or not widely supported. In this paper, to shed light on this controversial topic, we investigate the responsiveness obtained targeting more than 1.7M IPs using several probes (ICMP, UDP, TCP, and SKIP ), with and without the IP prespecified timestamp option. Our results show that: (i) the option has a significant impact on the responsiveness to the probes; (ii) a not−negligible amount of targeted addresses return several categories of non RFC−compliant replies; (iii) by considering only the RFC−compliant replies which preserve the option, the probes ranking by responsiveness considerably changes. Finally, we discuss the large−scale applicability of two proposed techniques based on the IP prespecified timestamp option.