Description |
1 online resource (xiii, 284 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 10176 |
|
LNCS sublibrary. SL 5, Computer communication networks and telecommunications |
|
Lecture notes in computer science ; 10176. 0302-9743
|
|
LNCS sublibrary. SL 5, Computer communication networks and telecommunications.
|
Contents |
Intro; Preface; Organization; Contents; IPv6; Understanding the Share of IPv6 Traffic in a Dual-Stack ISP; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Measuring IPv6 Connectivity; 3.2 From IPv6 Connectivity to IPv6 Usage; 4 Dataset; 5 A Dual-Stack ISP Perspective on IPv6 Traffic; 5.1 The Subscribers' Side; 5.2 The Service Providers' Side; 5.3 IP Traffic: Barriers and Intent for IPv6; 5.4 Case Studies; 6 Discussion; 7 Conclusion; References; On the Potential of IPv6 Open Resolvers for DDoS Attacks; 1 Introduction; 2 Background; 2.1 Using DNS to Traverse from IPv4 to IPv6 |
|
2.2 Possible Resolving Setups3 Methodology; 3.1 Finding IPv4 Open Resolvers; 3.2 Measurement Setup; 3.3 Determining IPv6 Connectivity; 3.4 Distinguishing Dual-Stack and Infrastructural Setups; 3.5 Comparison of Response Sizes for IPv4 and IPv6; 4 Results; 4.1 What Share of the Resolvers Generate IPv6 Traffic?; 4.2 Caching Characteristics; 4.3 Amplification Factor; 4.4 Distribution of Open Resolvers per Network; 4.5 Interface Identifier Analysis; 5 Discussion; 5.1 Ethical Considerations; 5.2 Pitfalls in Scanning/Great Firewall of China; 5.3 Response Size Difference; 6 Related Work |
|
7 ConclusionsReferences; Something from Nothing (There): Collecting Global IPv6 Datasets from DNS; 1 Introduction; 2 Previous Work; 3 DNS Enumeration Techniques; 4 Methodology and Algorithmic Implementation; 5 Evaluation; 6 Case-Study; 7 Conclusion; References; Web and Applications; The Web, the Users, and the MOS: Influence of HTTP/2 on User Experience; 1 Introduction; 2 Related Work; 3 Methodology; 3.1 Page Catalog; 3.2 Testbed Engineering; 3.3 Scenarios and MOS Dataset Collection; 4 MOS on the Toy Page; 5 MOS on Real Pages; 5.1 Subjective MOS Differences; 5.2 Impact of Page Sharding |
|
5.3 Impact of Latency Diversity6 Objective Metrics on Real Pages; 7 Conclusions; References; Internet Scale User-Generated Live Video Streaming: The Twitch Case; 1 Introduction; 2 Measurement Methodology; 3 Geographic Deployment of Twitch Infrastructure; 4 Stream Hosting Strategy; 4.1 How Important Is Channel Popularity?; 4.2 Scaling of Servers Across Continents; 5 Client Redirection and Traffic Localisation; 6 Related Work; 7 Conclusion; References; Internet Access for All: Assessing a Crowdsourced Web Proxy Service in a Community Network; 1 Introduction; 2 The guifi.net Proxy Service |
|
3 Service Usage Viewpoint4 The Proxy Viewpoint; 5 The Local Network Viewpoint; 6 Related Work; 7 Summary of Lessons Learned; References; Security; A First Look at the CT Landscape: Certificate Transparency Logs in Practice; 1 Introduction; 2 Certificate Transparency; 3 Methodology and Datasets; 4 Analysis of Logs; 4.1 Basic Log Properties and Operational Measures; 4.2 Certificate Analysis; 4.3 Cross-Log Publication; 4.4 Temporal Analysis; 5 Popularity-Based Analysis; 6 Related Work; 7 Conclusions; References |
Summary |
This book constitutes the proceedings of the 18th International Conference on Passive and Active Measurement, PAM 2017, held in Sydney, Australia, in March 2017. The 20 full papers presented in this volume were carefully reviewed and selected from 87 submissions. They are organized in topical sections on IPv6, Web and applications, security, performance, latency, characterization and troubleshooting, and wireless |
Notes |
International conference proceedings |
|
Includes author index |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed March 24, 2017) |
Subject |
Computer networks -- Management -- Congresses
|
|
Internet -- Management -- Congresses
|
|
Software measurement -- Congresses
|
|
Network hardware.
|
|
Expert systems -- knowledge-based systems.
|
|
Information retrieval.
|
|
Computer security.
|
|
Coding theory & cryptology.
|
|
Systems analysis & design.
|
|
Computers -- Hardware -- Network Hardware.
|
|
Computers -- Expert Systems.
|
|
Computers -- Information Technology.
|
|
Computers -- Security -- General.
|
|
Computers -- Information Theory.
|
|
Computers -- Hardware -- Handheld Devices.
|
|
Computer networks -- Management
|
|
Internet -- Management
|
|
Software measurement
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Kaafar, Mohamed Ali, editor
|
|
Uhlig, Steve, editor.
|
|
Amann, Johanna, editor
|
ISBN |
9783319543284 |
|
3319543288 |
|
331954327X |
|
9783319543277 |