Do you see me now? Sparsity in passive observations of address liveness

作者: Jelena Mirkovic , Genevieve Bartlett , John Heidemann , Hao Shi , Xiyue Deng

DOI: 10.23919/TMA.2017.8002908

关键词:

摘要: Accurate information about address and block usage in the Internet has many applications planning allocation, topology studies, simulations. Prior studies used active probing, sometimes augmented with passive observation, to study macroscopic phenomena, such as overall of IPv4 space. This paper instead completeness sources: how well they can observe microscopic phenomena within a given network. We define sparsity limitation monitor see target, we quantify effects interest, temporal, coverage sparsity. To sparsity, introduce inverted analysis, novel approach that uses complete observations few end networks (three campus our case) infer what these would be seen by millions virtual monitors near their traffic's destinations. Unsurprisingly, find popular content more targets visibility is strongly influenced bipartite traffic between clients servers. are first show implications for liveness from observations. heavy-tailed, only 0.5% seeing than 10% targets' addresses, most affected interest over temporal Visibility also bipartite. Monitors different class target (e.g., server observing client target) outperform same 82–99% cases datasets. Finally, adding probing greatly improves both but not critical blocks. Our findings valuable understand limitations existing measurement develop methods maximize future studies.

参考文章(17)
Alberto Dainotti, Karyn Benson, Alistair King, kc claffy, Michael Kallitsis, Eduard Glatz, Xenofontas Dimitropoulos, Estimating internet address space usage through passive measurements acm special interest group on data communication. ,vol. 44, pp. 42- 49 ,(2013) , 10.1145/2567561.2567568
Sebastian Zander, Lachlan L.H. Andrew, Grenville Armitage, Capturing ghosts: predicting the used IPv4 space by inferring unobserved addresses internet measurement conference. pp. 319- 332 ,(2014) , 10.1145/2663716.2663718
John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, Joseph Bannister, Census and survey of the visible internet Proceedings of the 8th ACM SIGCOMM conference on Internet measurement conference - IMC '08. pp. 169- 182 ,(2008) , 10.1145/1452520.1452542
Jinliang Fan, Jun Xu, Mostafa H. Ammar, Sue B. Moon, Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme international conference on network protocols. ,vol. 46, pp. 253- 272 ,(2002) , 10.1016/J.COMNET.2004.03.033
David Moore, Colleen Shannon, Douglas J. Brown, Geoffrey M. Voelker, Stefan Savage, Inferring Internet denial-of-service activity ACM Transactions on Computer Systems. ,vol. 24, pp. 115- 139 ,(2006) , 10.1145/1132026.1132027
Lance Alt, Robert Beverly, Alberto Dainotti, Uncovering network tarpits with degreaser annual computer security applications conference. pp. 156- 165 ,(2014) , 10.1145/2664243.2664285
M. Liljenstam, Y. Yuan, B.J. Premore, D. Nicol, A mixed abstraction level simulation model of large-scale Internet worm infestations modeling, analysis, and simulation on computer and telecommunication systems. pp. 109- 116 ,(2002) , 10.1109/MASCOT.2002.1167067
Eric Wustrow, Zakir Durumeric, J. Alex Halderman, ZMap: fast internet-wide scanning and its security applications usenix security symposium. pp. 605- 620 ,(2013)
Lin Quan, John Heidemann, Yuri Pradkin, Trinocular: understanding internet reliability through adaptive probing acm special interest group on data communication. ,vol. 43, pp. 255- 266 ,(2013) , 10.1145/2486001.2486017
K. Mani Chandy, Leslie Lamport, Distributed snapshots: determining global states of distributed systems ACM Transactions on Computer Systems. ,vol. 3, pp. 63- 75 ,(1985) , 10.1145/214451.214456