• Publications
  • Influence
Remote physical device fingerprinting
Remote physical device fingerprinting is introduced, or fingerprinting a physical device, as opposed to an operating system or class of devices, remotely, and without the fingerprinted device's known cooperation, by exploiting small, microscopic deviations in device hardware: clock skews. Expand
Transport layer identification of P2P traffic
This paper develops a systematic methodology to identify P2P flows at the transport layer, i.e., based on connection patterns of P1P networks, and without relying on packet payload, and believes it is the first method for characterizing P2p traffic using only knowledge of network dynamics rather than any user payload. Expand
Is P2P dying or just hiding? [P2P traffic measurement]
It is found that, if measured accurately, P2P traffic has never declined; indeed, the proportion of P 2P traffic decrease over time (any change is an increase) in any of the data sources. Expand
A nonstationary Poisson view of Internet traffic
It is shown that unlike the older data sets, current network traffic can be well represented by the Poisson model for sub-second time scales, and this traffic characterization reconciliates the seemingly contradicting observations of Poisson and long-memory traffic characteristics. Expand
File-sharing in the Internet: A characterization of P2P traffic in the backbone
This paper develops several heuristics that allow for P2P traffic at nonstandard ports to be recognized, and finds that depending on the protocol and metric used, approximately 30%-70% of traffic related to P2p applications cannot be identified using wellknown ports. Expand
Internet topology: connectivity of IP graphs
In this paper we introduce a framework for analyzing local properties of Internet connectivity. We compare BGP and probed topology data, finding that currently probed topology data yields much denserExpand
Comparison of Public End-to-End Bandwidth Estimation Tools on High-Speed Links
Results of a series of bandwidth estimation experiments conducted on a high-speed testbed at the San Diego Supercomputer Center and on OC-48 and GigE paths in real world networks are presented. Expand
Analysis of RouteViews BGP data: policy atoms
Traceroute and BGP AS Path Incongruities
This study categorizes differences between AS paths obtained from BGP routing tables and AS paths derived from traceroute paths and introduces a new AS relationship, common ownership, that reflects the complexities of real-world business relationships and practices. Expand
The RTT distribution of TCP flows on the Internet and its impact on TCP based flow control
This paper presents three different methods of estimating RTT and shows that all three methods provide a consistent description of the RTT distribution and uses this data to validate the use of fluid models that have grown pervasive in TCP analysis. Expand