- Caching and Content Delivery
- Internet Traffic Analysis and Secure E-voting
- Peer-to-Peer Network Technologies
- Network Security and Intrusion Detection
- Network Traffic and Congestion Control
- Software-Defined Networks and 5G
- Opportunistic and Delay-Tolerant Networks
- Spam and Phishing Detection
- Advanced Malware Detection Techniques
- IPv6, Mobility, Handover, Networks, Security
- Advanced Data Storage Technologies
- Cloud Computing and Resource Management
- Mobile Agent-Based Network Management
- Privacy, Security, and Data Protection
- Cooperative Communication and Network Coding
- Mobile Ad Hoc Networks
- Advanced Optical Network Technologies
- Cybercrime and Law Enforcement Studies
- Network Time Synchronization Technologies
- Software Testing and Debugging Techniques
- IoT and Edge/Fog Computing
- Misinformation and Its Impacts
- Network Packet Processing and Optimization
- Software System Performance and Reliability
- Data Management and Algorithms
Delft University of Technology
2021-2025
Cyprus University of Technology
2023
Universidad Carlos III de Madrid
2023
IMDEA Networks
2023
Huawei German Research Center
2023
Emerald Group Publishing (United Kingdom)
2023
Berlin Institute for the Foundations of Learning and Data
2022
Technische Universität Berlin
2012-2021
Max Planck Institute for Informatics
2020
Massachusetts Institute of Technology
2015-2017
Due to the COVID-19 pandemic, many governments imposed lock downs that forced hundreds of millions citizens stay at home. The implementation confinement measures increased Internet traffic demands residential users, in particular, for remote working, entertainment, commerce, and education, which, as a result, caused shifts core. In this paper, using data from diverse set vantage points (one ISP, three IXPs, one metropolitan educational network), we examine effect these lockdowns on shifts....
Today a spectrum of solutions are available for istributing content over the Internet, ranging from commercial CDNs to ISP-operated content-provider-operated peer-to-peer CDNs. Some deploy servers in just few large data centers while others thousands locations or even on millions desktops. Recently, major have formed strategic alliances with ISPs provide delivery network solutions. Such show natural evolution today driven by need address scalability issues and take advantage new technology...
The Domain Name System (DNS) is a fundamental building block of the Internet. Today, performance more and applications depend not only on responsiveness DNS, but also exact answer returned by queried DNS resolver, e.g., for Content Distribution Networks (CDN).In this paper, we compare local resolvers against GoogleDNS OpenDNS large set vantage points. Our end-host measurements inside 50 commercial ISPs reveal that two aspects have significant impact responsiveness: (1) latency to (2) content...
Many emerging scientific and industrial applications require transferring multiple Tbytes of data on a daily basis. Examples include pushing from particle accelerators/colliders to laboratories around the world, synchronizing data-centers across continents, replicating collections high definition videos events taking place at different time-zones. A key property all above is their ability tolerate delivery delays ranging few hours days. Such Delay Tolerant Bulk (DTB) are currently being...
Internet eXchange Points (IXPs) are generally considered to be the successors of four Network Access (NAPs) that were mandated as part decommissioning National Science Foundation (NSFNET) in 1994/95 facilitate transition from NSFNET "public Internet" we know it today. While this popular view does not tell whole story behind early beginnings IXPs, what is true since around 1994, number operational IXPs worldwide has grown more than 300 (as May 2013), with largest handling daily traffic...
In March 2020, the World Health Organization declared Corona Virus 2019 (COVID-19) outbreak a global pandemic. As result, billions of people were either encouraged or forced by their governments to stay home reduce spread virus. This caused many turn Internet for work, education, social interaction, and entertainment. With demand rising at an unprecedented rate, question whether could sustain this additional load emerged. To answer question, paper will review impact first year COVID-19...
A data-driven, follow-the-money approach to characterize the ransomware ecosystem uncovers two parallel criminal markets: commodity and Ransomware as a Service (RaaS).
Content delivery systems constitute a major portion of today's Internet traffic. While they are good source revenue for Service Providers (ISPs), the huge volume content traffic also poses significant burden and engineering challenge ISP. The difficulty is due to immense transfers, while stems from fact that most themselves utilize distributed infrastructure. They perform their own flow optimization realize this using DNS system. may, some extent, consider user's performance within criteria,...
Recent studies show that a significant part of Internet traffic is delivered through Web-based applications. To cope with the increasing demand for Web content, large scale content hosting and delivery infrastructures, such as data-centers distribution networks, are continuously being deployed. Being able to identify classify infrastructures helpful not only producers, providers, ISPs, but also research community at large. For example, quantify degree infrastructure deployment in or...
Nowadays, there is a fast-paced shift from legacy telecommunication systems to novel Software Defined Network (SDN) architectures that can support on-the-fly network reconfiguration, therefore, empowering advanced traffic engineering mechanisms. Despite this momentum, migration SDN cannot be realized at once especially in high-end cost networks of Internet Service Providers (ISPs). It expected ISPs will gradually upgrade their over period spans several years. In paper, we study the upgrading...
During the last few years, more and of medium-to-large Internet eXchange Points (IXP) around world have started to operate a route server offer its use as free value-added service their members. This has greatly simplified inter-domain routing for those members made it easy them peer with possibly hundreds networks at IXPs from get-go.
Peering infrastructures, namely, colocation facilities and Internet exchange points, are located in every major city, have hundreds of network members, support thousands interconnections around the globe. These infrastructures well provisioned managed, but outages to be expected, e.g., due power failures, human errors, attacks, natural disasters. However, little is known about frequency impact at these critical with high peering concentration.
Content Hypergiants deliver the vast majority of Internet traffic to end users. In recent years, some have invested heavily in deploying services and servers inside end-user networks. With several dozen thousands deployed networks, these off-net (meaning outside Hypergiant networks) deployments change structure Internet. Previous efforts study them relied on proprietary data or specialized per-Hypergiant measurement techniques that neither scale nor generalize, providing a limited view...
The effectiveness of service provisioning in large-scale networks is highly dependent on the number and location facilities deployed at various hosts. classical, centralized approach to determining latter would amount formulating solving <i xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">uncapacitated k-median</i> (UKM) problem (if requested fixed), or facility </i> (UFL) also be optimized). Clearly, such approaches require knowledge global...
We introduce an Internet traffic anomaly detection mechanism based on large deviations results for empirical measures. Using past traces we characterize network during various time-of-day intervals, assuming that it is anomaly-free. present two different approaches to traffic: (i) a model-free approach the method of types and Sanov's theorem, (ii) model-based modeling using Markov modulated process. these characterizations as reference continuously monitor employ decision theory...
Today, a large fraction of Internet traffic is originated by Content Delivery Networks (CDNs). To cope with increasing demand for content, CDNs have deployed massively distributed infrastructures. These deployments pose challenges as they to dynamically map end-users appropriate servers without being full+y aware the network conditions within an Service Provider (ISP) or end-user location. On other hand, ISPs struggle rapid shifts caused dynamic server selection policies CDNs. The that and...
Many emerging scientific and industrial applications require transferring multiple terabytes of data on a daily basis. Examples include pushing from particle accelerators/colliders to laboratories around the world, synchronizing datacenters across continents, replicating collections high-definition videos events taking place at different time-zones. A key property all above is their ability tolerate delivery delays ranging few hours days. Such delay-tolerant bulk (DTB) are currently being...
In the context of measuring Internet, a long-standing question has been whether there exist well-localized physical entities in today's network where traffic from representative cross-section constituents Internet can be observed at fine-enough granularity to paint an accurate and informative picture how these shape impact much structure evolution actual it carries. this paper, we first answer affirmative by mining 17 weeks continuous sFlow data one largest European IXPs. Examining weekly...
The Border Gateway Protocol (BGP) has been used for decades as the de facto protocol to exchange reachability information among networks in Internet. However, little is known about how this restrict selected destinations, e.g., that are under attack. While such a feature, BGP blackholing, available some time, we lack systematic study of its Internet-wide adoption, practices, and network efficacy, well profile blackholed destinations.
A tracking flow is a between an end user and Web service. We develop extensive measurement methodology for quantifying at scale the amount of flows that cross data protection borders, be it national or international, such as EU28 border within which General Data Protection Regulation (GDPR) applies. Our uses browser extension to fully render advertising code, various lists heuristics extract well known trackers, passive DNS replication get all IP ranges state-of-the art geolocation. employ...
The recently proposed DNS extension, EDNS-Client-Subnet (ECS), has been quickly adopted by major Internet companies such as Google to better assign user requests their servers and improve end-user experience. In this paper, we show that the adoption of ECS also offers unique, but likely unintended, opportunities uncover details about these companies' operational practices at almost no cost. A key observation is allows resolve domain names adopters on behalf any arbitrary IP/prefix in...