Passive and active measurement : 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings /: 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings. (2017)
- Record Type:
- Book
- Title:
- Passive and active measurement : 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings /: 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings. (2017)
- Main Title:
- Passive and active measurement : 18th International Conference, PAM 2017, Sydney, NSW, Australia, March 30-31, 2017, Proceedings
- Other Titles:
- PAM 2017
- Further Information:
- Note: Mohamed Ali Kaafar, Steve Uhlig, Johanna Amann (eds.).
- Editors:
- Kaafar, Mohamed Ali
Uhlig, Steve
Amann, Johanna - Other Names:
- PAM (Conference), 18th
- Contents:
- Intro; Preface; Organization; Contents; IPv6; Understanding the Share of IPv6 Traffic in a Dual-Stack ISP; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Measuring IPv6 Connectivity; 3.2 From IPv6 Connectivity to IPv6 Usage; 4 Dataset; 5 A Dual-Stack ISP Perspective on IPv6 Traffic; 5.1 The Subscribers' Side; 5.2 The Service Providers' Side; 5.3 IP Traffic: Barriers and Intent for IPv6; 5.4 Case Studies; 6 Discussion; 7 Conclusion; References; On the Potential of IPv6 Open Resolvers for DDoS Attacks; 1 Introduction; 2 Background; 2.1 Using DNS to Traverse from IPv4 to IPv6 2.2 Possible Resolving Setups3 Methodology; 3.1 Finding IPv4 Open Resolvers; 3.2 Measurement Setup; 3.3 Determining IPv6 Connectivity; 3.4 Distinguishing Dual-Stack and Infrastructural Setups; 3.5 Comparison of Response Sizes for IPv4 and IPv6; 4 Results; 4.1 What Share of the Resolvers Generate IPv6 Traffic?; 4.2 Caching Characteristics; 4.3 Amplification Factor; 4.4 Distribution of Open Resolvers per Network; 4.5 Interface Identifier Analysis; 5 Discussion; 5.1 Ethical Considerations; 5.2 Pitfalls in Scanning/Great Firewall of China; 5.3 Response Size Difference; 6 Related Work 7 ConclusionsReferences; Something from Nothing (There): Collecting Global IPv6 Datasets from DNS; 1 Introduction; 2 Previous Work; 3 DNS Enumeration Techniques; 4 Methodology and Algorithmic Implementation; 5 Evaluation; 6 Case-Study; 7 Conclusion; References; Web and Applications; The Web, the Users, and the MOS: InfluenceIntro; Preface; Organization; Contents; IPv6; Understanding the Share of IPv6 Traffic in a Dual-Stack ISP; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Measuring IPv6 Connectivity; 3.2 From IPv6 Connectivity to IPv6 Usage; 4 Dataset; 5 A Dual-Stack ISP Perspective on IPv6 Traffic; 5.1 The Subscribers' Side; 5.2 The Service Providers' Side; 5.3 IP Traffic: Barriers and Intent for IPv6; 5.4 Case Studies; 6 Discussion; 7 Conclusion; References; On the Potential of IPv6 Open Resolvers for DDoS Attacks; 1 Introduction; 2 Background; 2.1 Using DNS to Traverse from IPv4 to IPv6 2.2 Possible Resolving Setups3 Methodology; 3.1 Finding IPv4 Open Resolvers; 3.2 Measurement Setup; 3.3 Determining IPv6 Connectivity; 3.4 Distinguishing Dual-Stack and Infrastructural Setups; 3.5 Comparison of Response Sizes for IPv4 and IPv6; 4 Results; 4.1 What Share of the Resolvers Generate IPv6 Traffic?; 4.2 Caching Characteristics; 4.3 Amplification Factor; 4.4 Distribution of Open Resolvers per Network; 4.5 Interface Identifier Analysis; 5 Discussion; 5.1 Ethical Considerations; 5.2 Pitfalls in Scanning/Great Firewall of China; 5.3 Response Size Difference; 6 Related Work 7 ConclusionsReferences; Something from Nothing (There): Collecting Global IPv6 Datasets from DNS; 1 Introduction; 2 Previous Work; 3 DNS Enumeration Techniques; 4 Methodology and Algorithmic Implementation; 5 Evaluation; 6 Case-Study; 7 Conclusion; References; Web and Applications; The Web, the Users, and the MOS: Influence of HTTP/2 on User Experience; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Page Catalog; 3.2 Testbed Engineering; 3.3 Scenarios and MOS Dataset Collection; 4 MOS on the Toy Page; 5 MOS on Real Pages; 5.1 Subjective MOS Differences; 5.2 Impact of Page Sharding 5.3 Impact of Latency Diversity6 Objective Metrics on Real Pages; 7 Conclusions; References; Internet Scale User-Generated Live Video Streaming: The Twitch Case; 1 Introduction; 2 Measurement Methodology; 3 Geographic Deployment of Twitch Infrastructure; 4 Stream Hosting Strategy; 4.1 How Important Is Channel Popularity?; 4.2 Scaling of Servers Across Continents; 5 Client Redirection and Traffic Localisation; 6 Related Work; 7 Conclusion; References; Internet Access for All: Assessing a Crowdsourced Web Proxy Service in a Community Network; 1 Introduction; 2 The guifi.net Proxy Service 3 Service Usage Viewpoint4 The Proxy Viewpoint; 5 The Local Network Viewpoint; 6 Related Work; 7 Summary of Lessons Learned; References; Security; A First Look at the CT Landscape: Certificate Transparency Logs in Practice; 1 Introduction; 2 Certificate Transparency; 3 Methodology and Datasets; 4 Analysis of Logs; 4.1 Basic Log Properties and Operational Measures; 4.2 Certificate Analysis; 4.3 Cross-Log Publication; 4.4 Temporal Analysis; 5 Popularity-Based Analysis; 6 Related Work; 7 Conclusions; References … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xiii, 284 pages), illustrations
- Subjects:
- 004.6
Computer science
Computer networks -- Management -- Congresses
Internet -- Management -- Congresses
Software measurement -- Congresses
Computer networks -- Management
Internet -- Management
Software measurement
Computer Science
System Performance and Evaluation
Computer Communication Networks
Special Purpose and Application-Based Systems
Information Systems Applications (incl. Internet)
Systems and Data Security
Coding and Information Theory
Computers -- Hardware -- Network Hardware
Computers -- Expert Systems
Computers -- Information Technology
Computers -- Security -- General
Computers -- Information Theory
Network hardware
Expert systems / knowledge-based systems
Information retrieval
Computer security
Coding theory & cryptology
Computer system performance
Computer Communication Networks
Software engineering
Computer security
Coding theory
Computers -- Hardware -- Handheld Devices
Systems analysis & design
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319543284
3319543288
9783319543277 - Related ISBNs:
- 331954327X
9783319543277 - Notes:
- Note: Includes bibliographical references and author index.
Note: Online resource; title from PDF title page (SpringerLink, viewed March 24, 2017). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.370519
- Ingest File:
- 01_356.xml