kc claffy

ORCID: 0000-0003-4824-3493
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Traffic and Congestion Control
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • IPv6, Mobility, Handover, Networks, Security
  • Peer-to-Peer Network Technologies
  • Software-Defined Networks and 5G
  • Complex Network Analysis Techniques
  • Network Packet Processing and Optimization
  • Wireless Networks and Protocols
  • Mobile Agent-Based Network Management
  • ICT Impact and Policies
  • Privacy, Security, and Data Protection
  • Advanced Malware Detection Techniques
  • Privacy-Preserving Technologies in Data
  • Digital Platforms and Economics
  • Advanced Optical Network Technologies
  • Advanced Data Storage Technologies
  • Spam and Phishing Detection
  • Image and Video Quality Assessment
  • Software System Performance and Reliability
  • Social Media and Politics
  • Distributed systems and fault tolerance
  • Interconnection Networks and Systems
  • Green IT and Sustainability

University of California, San Diego
2015-2024

UC San Diego Health System
2013-2024

Wellcome Centre for Anti-Infectives Research
2003-2023

Cicatelli Associates
2012-2020

San Diego Supercomputer Center
2000-2019

National Bureau of Economic Research
2019

Massachusetts Institute of Technology
2014

University of San Diego
2013

University of California System
2012

Swiss Data Science Center
2004-2006

Named Data Networking (NDN) is one of five projects funded by the U.S. National Science Foundation under its Future Internet Architecture Program. NDN has roots in an earlier project, Content-Centric (CCN), which Van Jacobson first publicly presented 2006. The project investigates Jacobson's proposed evolution from today's host-centric network architecture (IP) to a data-centric (NDN). This conceptually simple shift far-reaching implications for how we design, develop, deploy, and use...

10.1145/2656877.2656887 article EN ACM SIGCOMM Computer Communication Review 2014-07-28

On July 19, 2001, more than 359,000 computers connected to the Internet were infected with Code-Red (CRv2) worm in less 14 hours. The cost of this epidemic, including subsequent strains Code-Red, is estimated be excess $2.6 billion. Despite global damage caused by attack, there have been few serious attempts characterize spread worm, partly due challenge collecting information about worms. Using a technique that enables detection spread, we collected and analyzed data over period 45 days...

10.1145/637201.637244 article EN 2002-01-01

In a packet network, the terms bandwidth and throughput often characterize amount of data that network can transfer per unit time. Bandwidth estimation is interest to users wishing optimize end-to-end transport performance, overlay routing, peer-to-peer file distribution. Techniques for accurate are also important traffic engineering capacity planning support. Existing tools measure one or more three related metrics: capacity, available bandwidth, bulk capacity. Currently employ variety...

10.1109/mnet.2003.1248658 article EN IEEE Network 2003-11-01

Since the emergence of peer-to-peer (P2P) networking in late '90s, P2P applications have multiplied, evolved and established themselves as leading `growth app' Internet traffic workload. In contrast to first-generation networks which used well-defined port numbers, current ability disguise their existence through use arbitrary ports. As a result, reliable estimates require examination packet payload, methodological landmine from legal, privacy, technical, logistic, fiscal perspectives....

10.1145/1028788.1028804 article EN 2004-10-25

Traffic classification technology has increased in relevance this decade, as it is now used the definition and implementation of mechanisms for service differentiation, network design engineering, security, accounting, advertising, research. Over past 10 years research community networking industry have investigated, proposed developed several approaches. While traffic techniques are improving accuracy efficiency, continued proliferation different Internet application behaviors, addition to...

10.1109/mnet.2012.6135854 article EN IEEE Network 2012-01-01

Recent reports in the popular media suggest a significant decrease peer-to-peer (P2P) file-sharing traffic, attributed to public's response legal threats. Have we reached end of P2P revolution? In pursuit legitimate data verify this hypothesis, paper, embark on more accurate measurement effort traffic at link level. contrast previous efforts, introduce two novel elements our methodology. First, measure all known protocols. Second, go beyond "known port" limitation by reverse engineering...

10.1109/glocom.2004.1378239 article EN 2005-04-05

We introduce the area of remote physical device fingerprinting, or fingerprinting a device, as opposed to an operating system class devices, remotely, and without fingerprinted device's known cooperation. accomplish this goal by exploiting small, microscopic deviations in hardware: clock skews. Our techniques do not require any modification devices. report consistent measurements when measurer is thousands miles, multiple hops, tens milliseconds away from connected Internet different...

10.1109/tdsc.2005.26 article EN IEEE Transactions on Professional Communication 2005-02-01

Recent research on Internet traffic classification algorithms has yield a flurry of proposed approaches for distinguishing types traffic, but no systematic comparison the various algorithms. This fragmented approach to leaves operational community with basis consensus what use when, and how interpret results. In this work we critically revisit by conducting thorough evaluation three approaches, based transport layer ports, host behavior, flow features. A strength our is broad range data...

10.1145/1544012.1544023 article EN 2008-01-01

Business relationships between ASes in the Internet are typically confidential, yet knowledge of them is essential to understand many aspects structure, performance, dynamics, and evolution. We present a new algorithm infer these using BGP paths. Unlike previous approaches, our does not assume presence (or seek maximize number) valley-free paths, instead relying on three assumptions about Internet's inter-domain structure: (1) an AS enters into provider relationship become globally...

10.1145/2504730.2504735 article EN 2013-10-22

In the first months of 2011, Internet communications were disrupted in several North African countries response to civilian protests and threats civil war. this paper we analyze episodes these disruptions two countries: Egypt Libya. Our analysis relies on multiple sources large-scale data already available academic researchers: BGP interdomain routing control plane data; unsolicited traffic unassigned address space; active macroscopic traceroute measurements; RIR delegation files; MaxMind's...

10.1145/2068816.2068818 article EN 2011-11-02

We present a parameterizable methodology for profiling Internet traffic flows at variety of granularities. Our differs from many previous studies that have concentrated on end-point definitions in terms state derived observing the explicit opening and closing TCP connections. Instead, our model defines based satisfying various temporal spatial locality conditions, as observed internal points network. This approach to flow characterization helps address some central problems networking model....

10.1109/49.464717 article EN IEEE Journal on Selected Areas in Communications 1995-01-01

We present the concept of network traffic streams and ways they aggregate into flows through Internet links. describe a method measuring size lifetime streams, use this to characterize distributions at two different sites. find that although most (about 45 percent them) are dragonflies, lasting less than 2 seconds, significant number have lifetimes hours days, can carry high proportion (50-60 percent) total bytes on given link. define tortoises as last longer 15 minutes. point out be...

10.1109/mcom.2002.1039865 article EN IEEE Communications Magazine 2002-10-01

The relative performance of different data collection methods in the assessment various traffic parameters is significant when amount generated by a complete trace interval computationally overwhelming, and even capturing summary statistics for all impractical. This paper presents study sampling answering questions related to wide area network characterization. Using packet from environment that aggregates large number sources, we simulate approaches, including time-driven event-driven...

10.1145/166237.166256 article EN 1993-10-01

We calculate an extensive set of characteristics for Internet AS topologies extracted from the three data sources most frequently used by research community: traceroutes, BGP, and WHOIS. discover that traceroute BGP are similar to one another but differ substantially WHOIS topology. Among widely considered metrics, we find joint degree distribution appears fundamentally characterize as well narrowly define values other important metrics. discuss interplay between specifics collection...

10.1145/1111322.1111328 article EN ACM SIGCOMM Computer Communication Review 2006-01-10

We introduce the area of remote physical device fingerprinting, or fingerprinting a device, as opposed to an operating system class devices, remotely, and without fingerprinted device's known cooperation. accomplish this goal by exploiting small, microscopic deviations in hardware: clock skews. Our techniques do not require any modification devices. report consistent measurements when measurer is thousands miles, multiple hops, tens milliseconds away from connected Internet different...

10.1109/sp.2005.18 article EN 2005-01-01

We describe the structure and functionality of Internet cache protocol (ICP) its implementation in Squid web caching software. ICP is a lightweight message format used for communication among Web caches. Caches exchange queries replies to gather information use selecting most appropriate location from which retrieve an object. present background on history ICP, discuss issues deployment, efficiency, security, interaction with other aspects traffic behavior. catalog successes, failures,...

10.1109/49.669043 article EN IEEE Journal on Selected Areas in Communications 1998-04-01

Research on performance, robustness, and evolution of the global Internet is fundamentally handicapped without accurate thorough knowledge nature structure contractual relationships between Autonomous Systems (ASs). In this work we introduce novel heuristics for inferring AS relationships. Our improve upon previous works in several technical aspects, which outline detail demonstrate with examples. Seeking to increase value reliability our inference results, then focus validation inferred We...

10.1145/1198255.1198259 article EN ACM SIGCOMM Computer Communication Review 2007-01-17

As the Internet has grown, so challenge of accurate measurement and modeling its topology. Commonly used but coarse methods measuring topology, e.g., BGP tables, suffer from several limitations. To pursue more empirically-based topology modeling, in 1998 CAIDA began Macroscopic Topology Project, which focuses on actively round trip time (RTT) information across a large cross-section commodity Internet. We describe CAIDA's architecture our analysis visualization tools. differences between IP...

10.1109/saintw.2002.994558 article EN 2003-06-25
Coming Soon ...