Learn More
Pattern matching and analysis over network data streams is increasingly becoming an essential primitive of network monitoring systems. It is a fundamental part of most intrusion detection systems, worm detecting algorithms and many other anomaly detection mechanisms. It is a processing-intensive task, usually requiring to search for a large number of(More)
—With global mobile phone penetration nearing 100%, cellular Call Data Records (CDRs) provide a large-scale and ubiquitous, but also sparse and skewed snapshot of human mobility. It may be difficult or inappropriate to reach strong conclusions about user movement based on such data without proper understanding of user movement between call records. Based on(More)
We study the energy consumptions of two strategies that increase the capacity of an LTE network: (1) the deployment of <i>redundant</i> macro and micro base stations by the operator at locations where the traffic is high, and (2) the deployment of publicly accessible femto base stations by home users. Previous studies show the deployment of publicly(More)
As more corporate and private users outsource their data to cloud storage providers, recent data breach incidents make end-to-end encryption an increasingly prominent requirement. Unfortunately, semantically secure encryption schemes render various cost-effective storage optimization techniques, such as data deduplication, ineffective. We present a novel(More)
We consider the problem of predicting user location in the form of user-cell association in a cellular wireless network. This is motivated by resource optimization, for example switching base transceiver stations on or off to save on network energy consumption. We use GSM traces obtained from an operator, and compare several prediction methods. First, we(More)
Traffic-adaptive packet filtering is a mechanism to adjust packet classification methods at run-time to the particular traffic mix a network node is receiving. It has been conjectured previously that such techniques could perform positively when filtering out malicious attack traffic, due to their flow aggregation capabilities. In this work, we present two(More)
Location-based services are mobile network applications of growing importance and variability. The space of location technologies and applications has not yet been fully explored, perhaps omitting some important practical uses. In this work we present the prototype SS7Tracker platform, an active, non-intrusive, GSM Cell-ID-based solution to network-based(More)