Today's Usenet Usage: NNTP Traffic Characterization

@article{Kim2010TodaysUU,
  title={Today's Usenet Usage: NNTP Traffic Characterization},
  author={Juhoon Kim and Fabian Schneider and Bernhard Ager and Anja Feldmann},
  journal={2010 INFOCOM IEEE Conference on Computer Communications Workshops},
  year={2010},
  pages={1-6}
}
The finding by Maier et al [1] that Network News Transport Protocol (NNTP) traffic is responsible for up to 5% of residential network traffic inspires us to revisit today's Usenet usage. For this purpose we have developed an NNTP analyzer for the Bro network intrusion detection system. We find that NNTP is intensively used by a small fraction of the residential broadband lines that we study and that almost all traffic is to NNTP servers that require subscription for a monthly fee. The accessed… 

Figures and Tables from this paper

Bandwidth Usage Optimization for NNTP Protocol
TLDR
An extension of the existing NNTP protocol is described which can circumvent this problem by actively shaping the bandwidth of the incoming connections, and a method for remote measurement of NN TP protocol bandwidth is described.
On Workload-driven Router Designs
TLDR
This dissertation proposes a novel IP router design that follows the split architecture paradigm; separating control from data plane functionality, and conducts an extensive study of Internet tra c as seen by a large European Internet Exchange Point.
Anatomy of a large european IXP
TLDR
A first-of-its-kind and in-depth analysis of one of the largest IXPs worldwide based on nine months' worth of sFlow records collected at that IXP in 2011 suggests that these large IXPs can be viewed as a microcosm of the Internet ecosystem itself and argues for a re-assessment of the mental picture the community has about this ecosystem.
EMFS: Repurposing SMTP and IMAP for Data Storage and Synchronization
TLDR
This paper proposes using widely available, well standardized email protocols like SMTP and IMAP in conjunction with free email service providers to store, synchronize, and share files across discrete systems.
A Deep Dive into the LISP Cache and What ISPs Should Know about It
TLDR
The results prove that even a timeout as short as 60 seconds provides high hit ratio and that the impact of using security policies is small, and the implications of policies to increase the level of security of LISP are analyzed.
Investigating IPv6 Traffic - What Happened at the World IPv6 Day?
TLDR
Analysis of traffic traces recorded at a large European Internet Exchange Point (IXP) and on the campus of a major US university finds that native IPv6 traffic almost doubled during the World IPv6 Day while changes in tunneled traffic were limited.
N I ] 1 7 F eb 2 01 4 Watching the IPv 6 Takeoff from an IXP ’ s Viewpoint
TLDR
Based on the Internet traffic collected from a large European Internet Exchange Point (IXP), the status of IPv6 traffic is presented mainly focusing on the periods of the two global IPv6 events and it is shown that IPv6 Traffic is responsible for a small fraction such as 0.5 % of the total traffic in the peak period.
Understanding benefits of different vantage points in today's Internet
TLDR
The measurement results show that the Internet peering complexity is higher than anticipated in previous publications, and that IXPs are the key to this unexpected complexity, which highlights the importance of IXPs and the role they play in today’s Internet ecosystem.
Analysis of new trends in the web from a network perspective
TLDR
This thesis studies how users actually interact with Online Social Networks by extracting anonymized clickstreams from passively monitored network traffic and characterization of user interactions within the OSN for four different OSNs focuses on feature popularity, session characteristics, and the dynamics within OSN sessions.
...
...

References

SHOWING 1-10 OF 17 REFERENCES
Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection
TLDR
This paper discusses the design and implementation of a NIDS extension to perform dynamic application-layer protocol analysis and demonstrates the power of the enhancement with three examples: reliable detection of applications not using their standard ports, payload inspection of FTP data transfers, and detection of IRC-based botnet clients and servers.
Bro: a system for detecting network intruders in real-time
  • V. Paxson
  • Computer Science
    Comput. Networks
  • 1998
On dominant characteristics of residential broadband internet traffic
TLDR
Observations from monitoring the network activity for more than 20,000 residential DSL customers in an urban area find that HTTP - not peer-to-peer - traffic dominates by a significant margin and that the DSL lines are frequently not the bottleneck in bulk-transfer performance.
binpac: a yacc for writing application protocol parsers
TLDR
Binpac is presented, a declarative language and compiler designed to simplify the task of constructing robust and efficient semantic analyzers for complex network protocols and can then be used to express application-level analysis of network traffic in high-level terms that are both concise and expressive.
Internet traffic growth: sources and implications
The high tech bubble was inflated by myths of astronomical Internet traffic growth rates. Yet although these myths were false, Internet traffic was increasing very rapidly, close to doubling each
ipoque internet study 2008/2009
  • http: //www.ipoque.com/resources/internet-studies/ (need to register), 2009.
  • 2009
2009 global broadband phenomena
  • http://www. sandvine.com/news/global_broadband_trends.asp, 2009.
  • 2009
ipoque internet study http://www. ipoque.com/resources/internet-studies/ (need to register)
  • ipoque internet study http://www. ipoque.com/resources/internet-studies/ (need to register)
  • 2007
yEnc - Efficient encoding for Usenet and eMail
  • Project home page http://www.yenc.org/, 2003.
  • 2003
TeleGeography research
  • http://www. telegeography.com/product-info/gb/download/executive-summary.pdf, 2009.
  • 2009
...
...