메뉴 건너뛰기




Volumn , Issue , 2004, Pages 263-271

Strategies for sound internet measurement

Author keywords

Calibration; Datasets; Internet measurement; Meta data; Reproducibility

Indexed keywords

CALIBRATION; COMPUTER OPERATING SYSTEMS; METADATA; NETWORK PROTOCOLS; TELECOMMUNICATION LINKS; TELECOMMUNICATION TRAFFIC;

EID: 14944381729     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1028788.1028824     Document Type: Conference Paper
Times cited : (101)

References (30)
  • 1
    • 14944374569 scopus 로고    scopus 로고
    • Private communication
    • M. Allman. Private communication. 2001.
    • (2001)
    • Allman, M.1
  • 2
    • 33847246033 scopus 로고    scopus 로고
    • A scalable system for sharing internet measurements
    • M. Allman, E. Blanton, and W. Eddy. A Scalable System for Sharing Internet Measurements. Proc. PAM 2002.
    • (2002) Proc. PAM
    • Allman, M.1    Blanton, E.2    Eddy, W.3
  • 4
    • 14944351128 scopus 로고    scopus 로고
    • Private communication
    • P. Barford. Private communication. 2000.
    • (2000)
    • Barford, P.1
  • 6
    • 0344583800 scopus 로고    scopus 로고
    • Packet-level traffic measurements from the sprint IP backbone
    • C. Fraleigh et al. Packet-Level Traffic Measurements from the Sprint IP Backbone. IEEE Network 17(6). 2003.
    • (2003) IEEE Network , vol.17 , Issue.6
    • Fraleigh, C.1
  • 8
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • M. Handley, C. Kreibich and V. Paxson. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. Proc. USENIX Security Symposium. 2001.
    • (2001) Proc. USENIX Security Symposium
    • Handley, M.1    Kreibich, C.2    Paxson, V.3
  • 9
    • 0035439029 scopus 로고    scopus 로고
    • Expanding confidence in network simulation
    • J. Heidemann, K. Mills, and S. Kumar. Expanding Confidence in Network Simulation. IEEE Network, 15(5):58-63. 2001.
    • (2001) IEEE Network , vol.15 , Issue.5 , pp. 58-63
    • Heidemann, J.1    Mills, K.2    Kumar, S.3
  • 10
    • 0345137001 scopus 로고    scopus 로고
    • Measurement and classification of out-of-sequence packets in a tier-1 IP backbone
    • S. Jaiswal et al Measurement and Classification of Out-of-Sequence Packets in a Tier-1 IP Backbone. Proc. ACM SIGCOMM IMW, 2002.
    • (2002) Proc. ACM SIGCOMM IMW
    • Jaiswal, S.1
  • 11
    • 14944344243 scopus 로고    scopus 로고
    • E. Kohler, ipsumdump. http://www.icir.org/kohleripsu/mdump/. 2002.
    • (2002) Ipsumdump.
    • Kohler, E.1
  • 12
    • 84969805182 scopus 로고    scopus 로고
    • Design and implementation of netdude, a framework for packet trace manipulation
    • C. Kreibich. Design and Implementation of Netdude, a Framework for Packet Trace Manipulation. Proc. USENIX/FREENIX, 2004.
    • (2004) Proc. USENIX/FREENIX
    • Kreibich, C.1
  • 13
    • 0002256326 scopus 로고
    • The notion of redundancy and its use as a quantitative measure of the discrepancy between a statistical hypothesis and a set of observational data
    • P. Martin-Löf. The Notion of Redundancy and Its Use as a Quantitative Measure of the Discrepancy between a Statistical Hypothesis and a Set of Observational Data. Scandinavian Journal of Statistics, 1(1), pp. 3-18. 1974.
    • (1974) Scandinavian Journal of Statistics , vol.1 , Issue.1 , pp. 3-18
    • Martin-Löf, P.1
  • 14
    • 0006465765 scopus 로고
    • Network time protocol (version 3): Specification, implementation and analysis
    • Network Information Center, SRI International, Menlo Park, CA. March
    • D. Mills. Network Time Protocol (Version 3): Specification, Implementation and Analysis. RFC 1305, Network Information Center, SRI International, Menlo Park, CA. March 1992.
    • (1992) RFC , vol.1305
    • Mills, D.1
  • 15
    • 1642555807 scopus 로고
    • Modelling and analysis of computer network clocks
    • Electrical Engineering Department, Univ. Delaware. May
    • D. Mills. Modelling and Analysis of Computer Network Clocks. Technical Report 92-5-2, Electrical Engineering Department, Univ. Delaware. May 1992.
    • (1992) Technical Report 92-5-2
    • Mills, D.1
  • 17
    • 1242285723 scopus 로고    scopus 로고
    • Trace anonymization misses the point
    • J. Mogul. Trace anonymization misses the point. WWW 2002 panel on Web Measurements, http://www2002.org/presentations/mogul-n.pdf
    • WWW 2002 Panel on Web Measurements
    • Mogul, J.1
  • 18
    • 0032660830 scopus 로고    scopus 로고
    • Estimation and removal of clock skew from network delay measurements
    • S. Moon, P. Skelly and D. Towsley. Estimation and Removal of Clock Skew from Network Delay Measurements. Proc. IEEE INFOCOM, 1999.
    • (1999) Proc. IEEE INFOCOM
    • Moon, S.1    Skelly, P.2    Towsley, D.3
  • 19
    • 10444260259 scopus 로고    scopus 로고
    • A high-level programming environment for packet trace anonymization and transformation
    • R. Pang and V. Paxson. A High-level Programming Environment for Packet Trace Anonymization and Transformation. Proc. ACM SIGCOMM. 2003.
    • (2003) Proc. ACM SIGCOMM
    • Pang, R.1    Paxson, V.2
  • 21
    • 0000579968 scopus 로고    scopus 로고
    • Automated packet trace analysis of TCP implementations
    • V. Paxson. Automated Packet Trace Analysis of TCP Implementations. Proc. ACM SIGCOMM. 1997.
    • (1997) Proc. ACM SIGCOMM
    • Paxson, V.1
  • 23
    • 0002964172 scopus 로고    scopus 로고
    • On calibrating measurements of packet transit times
    • V. Paxson. On Calibrating Measurements of Packet Transit Times. Proc. ACM SIGMETRICS '98.
    • Proc. ACM SIGMETRICS '98
    • Paxson, V.1
  • 24
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Dec.
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31(23-24), pp. 2435-2463, Dec. 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 25
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks. Jan.
    • T. Ptacek and T. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, http://www.icir.org/vern/Ptacek-Newsham-Evasion-98.ps. Jan. 1998.
    • (1998) Technical Report
    • Ptacek, T.1    Newsham, T.2
  • 26
  • 28
    • 1642302619 scopus 로고    scopus 로고
    • Observation and analysis of BGP behavior under stress
    • L. Wang et al. Observation and Analysis of BGP Behavior under Stress. Proc. ACM SIGCOMM IMW. 2002.
    • (2002) Proc. ACM SIGCOMM IMW
    • Wang, L.1
  • 29
    • 24344436696 scopus 로고    scopus 로고
    • Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
    • J. Xu, J. Fan, M. Ammar, S. Moon. Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-based Scheme. Proc. ICNP. 2002.
    • (2002) Proc. ICNP
    • Xu, J.1    Fan, J.2    Ammar, M.3    Moon, S.4
  • 30
    • 0036349134 scopus 로고    scopus 로고
    • Clock synchronization algorithms for network measurements
    • L. Zhang, Z. Liu, and C. Xia. Clock Synchronization Algorithms for Network Measurements. Proc. IEEE INFOCOM. 2002
    • (2002) Proc. IEEE INFOCOM
    • Zhang, L.1    Liu, Z.2    Xia, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.