FG Internet Measurement and Analysis (IMA)

24 Items

Recent Submissions
A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic

Feldmann, Anja ; Gasser, Oliver ; Lichtblau, Franziska ; Pujol, Enric ; Poese, Ingmar ; Dietzel, Christoph ; Wagner, Daniel ; Wichtlhuber, Matthias ; Tapiador, Juan ; Vallina-Rodriguez, Narseo ; Hohlfeld, Oliver ; Smaragdakis, Georgios (2021-06)

In March 2020, the World Health Organization declared the COVID-19 outbreak a global pandemic. As a result, billions of people were either encouraged or forced by their governments to stay home to reduce the spread of the virus. This caused many to turn to the Internet for work, education, social interaction, and entertainment. With the Internet demand rising at an unprecedented rate, the quest...

A view of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic

Feldmann, Anja ; Gasser, Oliver ; Lichtblau, Franziska ; Pujol, Enric ; Poese, Ingmar ; Dietzel, Christoph ; Wagner, Daniel ; Wichtlhuber, Matthias ; Tapiador, Juan ; Vallina-Rodriguez, Narseo ; Hohlfeld, Oliver ; Smaragdakis, Georgios (2020-11)

Due to the COVID-19 pandemic, many governments imposed lockdowns that forced hundreds of millions of citizens to stay at home. The implementation of confinement measures increased Internet traffic demands of residential users, in particular, for remote working, entertainment, commerce, and education, which, as a result, caused traffic shifts in the Internet core. In this paper, using data from ...

Identifying Sensitive URLs at Web-Scale

Matic, Srdjan ; Iordanou, Costas ; Smaragdakis, Georgios ; Laoutaris, Nikolaos (2020-10-27)

Several data protection laws include special provisions for protecting personal data relating to religion, health, sexual orientation, and other sensitive categories. Having a well-defined list of sensitive categories is sufficient for filing complaints manually, conducting investigations, and prosecuting cases in courts of law. Data protection laws, however, do not define explicitly what type ...

Who's left behind? Measuring Adoption of Application Updates at Scale

Rula, John P. ; Richter, Philipp ; Smaragdakis, Georgios ; Berger, Arthur (2020-10-27)

This work presents a large-scale, longitudinal measurement study on the adoption of application updates, enabling continuous reporting of potentially vulnerable software populations worldwide. Studying the factors impacting software currentness, we investigate and discuss the impact of the platform and its updating strategies on software currentness, device lock-in effects, as well as user beha...

Keep your Communities Clean: Exploring the Routing Message Impact of BGP Communities

Krenc, Thomas ; Beverly, Robert ; Smaragdakis, Georgios (2020-11-23)

BGP communities are widely used to tag prefix aggregates for policy, traffic engineering, and inter-AS signaling. Because individual ASes de ne their own community semantics, many ASes blindly propagate communities they do not recognize. Prior research has shown the potential security vulnerabilities when communities are not filtered. This work sheds light on a second unintended side-effect of ...

Exploring Network-Wide Flow Data with Flowyager

Saidi, Said Jawad ; Maghsoudlou, Aniss ; Foucard, Damien ; Smaragdakis, Georgios ; Poese, Ingmar ; Feldmann, Anja (2020-10-27)

Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume ...

A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild

Saidi, Said Jawad ; Mandalari, Anna Maria ; Kolcun, Roman ; Haddadi, Hamed ; Dubois, Daniel J. ; Choffnes, David ; Smaragdakis, Georgios ; Feldmann, Anja (2020-10-27)

Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable recent large-scale coordinated global attacks disrupting large service providers. Thus, an important first step to address these risks is to kno...

The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic

Feldmann, Anja ; Gasser, Oliver ; Lichtblau, Franziska ; Pujol, Enric ; Poese, Ingmar ; Dietzel, Christoph ; Wagner, Daniel ; Wichtlhuber, Matthias ; Tapiador, Juan ; Vallina-Rodriguez, Narseo ; Hohlfeld, Oliver ; Smaragdakis, Georgios (2020-10-27)

Due to the COVID-19 pandemic, many governments imposed lockdowns that forced hundreds of millions to stay at home. As a result of these measures, Internet traffic of residential users increased, in particular, for remote working, entertainment, commerce, and education. In turn, traffic demands in the Internet core shifted as well. In this paper, using data from a diverse set of vantage points ...

Edge Replication Strategies for Wide-Area Distributed Processing

Semmler, Niklas ; Rost, Matthias ; Smaragdakis, Georgios ; Feldmann, Anja (2020-04-27)

The rapid digitalization across industries comes with many challenges. One key problem is how the ever-growing and volatile data generated at distributed locations can be efficiently processed to inform decision making and improve products. Unfortunately, wide-area network capacity cannot cope with the growth of the data at the network edges. Thus, it is imperative to decide which data should b...

The State of Network Neutrality Regulation

Stocker, Volker ; Smaragdakis, Georgios ; Lehr, William (2020-03)

The Network Neutrality (NN) debate refers to the battle over the design of a regulatory framework for preserving the Internet as a public network and open innovation platform. Fueled by concerns that broadband access service providers might abuse network management to discriminate against third party providers (e.g., content or application providers), policymakers have struggled with designing ...

Steering hyper-giants' traffic at scale

Pujol, Enric ; Poese, Ingmar ; Zerwas, Johannes ; Smaragdakis, Georgios ; Feldmann, Anja (2019-12-10)

Large content providers, known as hyper-giants, are responsible for sending the majority of the content traffic to consumers. These hyper-giants operate highly distributed infrastructures to cope with the ever-increasing demand for online content. To achieve 40 commercial-grade performance of Web applications, enhanced end-user experience, improved reliability, and scaled network capacity, hype...

Online Replication Strategies for Distributed Data Stores

Semmler, Niklas ; Smaragdakis, Georgios ; Feldmann, Anja (2019-08)

The rate at which data is produced at the network edge, e.g., collected from sensors and Internet of Things (IoT) devices, will soon exceed the storage and processing capabilities of a single system and the capacity of the network. Thus, data will need to be collected and preprocessed in distributed data stores—as part of a distributed database—at the network edge. Yet, even in this setup, the ...

Distributed Mega-Datasets: The Need for Novel Computing Primitives

Semmler, Niklas ; Smaragdakis, Georgios ; Feldmann, Anja (2019-07-07)

With the ongoing digitalization, an increasing number of sensors is becoming part of our digital infrastructure. These sensors produce highly, even globally, distributed data streams. The aggregate data rate of these streams far exceeds local storage and computing capabilities. Yet, for radical new services (e.g., predictive maintenance and autonomous driving), which depend on various control l...

BGP Communities: Even more Worms in the Routing Can

Streibelt, Florian ; Lichtblau, Franziska ; Beverly, Robert ; Feldmann, Anja ; Pelsser, Cristel ; Smaragdakis, Georgios ; Bush, Randy (2018-10-31)

BGP communities are a mechanism widely used by operators to manage policy, mitigate attacks, and engineer traffic; e.g., to drop unwanted traffic, filter announcements, adjust local preference, and prepend paths to influence peer selection. Unfortunately, we show that BGP communities can be exploited by remote parties to influence routing in unintended ways. The BGP community-based vulnerabilit...

Tracing Cross Border Web Tracking

Iordanou, Costas ; Smaragdakis, Georgios ; Poese, Ingmar ; Laoutaris, Nikolaos (2018-10-31)

A tracking flow is a flow between an end user and a Web tracking service. We develop an extensive measurement methodology for quantifying at scale the amount of tracking flows that cross data protection borders, be it national or international, such as the EU28 border within which the General Data Protection Regulation (GDPR) applies. Our methodology uses a browser extension to fully render ...

Stellar: Network Attack Mitigation using Advanced Blackholing

Dietzel, Christoph ; Wichtlhuber, Matthias ; Smaragdakis, Georgios ; Feldmann, Anja (2018-12-04)

Network attacks, including Distributed Denial-of-Service (DDoS), continuously increase in terms of bandwidth along with damage (recent attacks exceed 1.7 Tbps) and have a devastating impact on the targeted companies/governments. Over the years, mitigation techniques, ranging from blackholing to policy-based filtering at routers, and on to traffic scrubbing, have been added to the network opera...

Inferring BGP Blackholing Activity in the Internet

Giotsas, Vasileios ; Smaragdakis, Georgios ; Dietzel, Christoph ; Richter, Philipp ; Feldmann, Anja ; Berger, Arthur (2017-11-01)

The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange reachability information among networks in the Internet. However, little is known about how this protocol is used to restrict reachability to selected destinations, e.g., that are under attack. While such a feature, BGP blackholing, has been available for some time, we lack a systematic study of its...

Detecting Peering Infrastructure Outages in the Wild

Giotsas, Vasileios ; Dietzel, Christoph ; Smaragdakis, Georgios ; Feldmann, Anja ; Berger, Arthur ; Aben, Emile (2017-08-20)

Peering infrastructures, namely, colocation facilities and Internet exchange points, are located in every major city, have hundreds of network members, and support hundreds of thousands of interconnections around the globe. These infrastructures are well provisioned and managed, but outages have to be expected, e.g., due to power failures, human errors, attacks, and natural disasters. However, ...

Flowtree: Enabling Distributed Flow Summarization at Scale

Saidi, Said Jawad ; Foucard, Damien ; Smaragdakis, Georgios ; Feldmann, Anja (2018-08-20)

NetFlow and IPFIX raw ow captures are insightful yet, due to their large volume, challenging to timely analyze and query. In particular, if these captures span long time periods or are collected at remote locations, storing or transferring them for analysis becomes increasingly expensive. Enabling efficient execution of a large range of queries over ow captures while reducing storage and tra...

Optimizing Gradual SDN Upgrades in ISP Networks

Poularakis, Konstantinos ; Iosifidis, George ; Smaragdakis, Georgios ; Tassiulas, Leandros (2019-01-11)

Nowadays, there is a fast-paced shift from legacy telecommunication systems to novel software-defined network (SDN) architectures that can support on-the-fly network reconfiguration, therefore, empowering advanced traffic engineering mechanisms. Despite this momentum, migration to SDN cannot be realized at once especially in high-end networks of Internet service providers (ISPs). It is expected...