IEEE site
IEEE Computer Society

Thursday, October 24

1:30 PM - 2:10 PM

Keynote Speaker 1: Grenville Armitage, Swinburne University of Technology, Melbourne, Australia

Title: "Step 1, do no harm...."

Abstract: A big challenge for internet researchers is making measurements that actually tell us something useful, and can be used by other people. Both of these are variations on the question of intrusiveness. If a measurement technique is disruptive to the network under observation, deployment will be unpopular and the information gathered may not be broadly representative. If the captured information is considered sensitive or personally-identifiable then sharing will be constrained, and large-scale trends or insights hard to observe.

 I hope to talk somewhat sensibly about the need for Internet measurement research to take both aspects into consideration.

Grenville Armitage

Speaker Bio: Grenville Armitage is a professor of Telecommunications Engineering and Director of the Centre for Advanced Internet Architectures. His research interests focus on IP network infrastructure issues (such as performance, scalability, resilience and monitoring) that have impacts on the end-user's experience. He earned a B.Eng (Elec)(Hons) in 1988 and a PhD in electronic engineering in 1994, both from the University of Melbourne, Australia.
 During the 1990s he was an active member of the Internet Engineering Task Force (IETF), involved in IP- and ATM-related research focusing on IP over ATM, IP multicast, IPv6, Integrated Services, Differentiated Services, and Multiprotocol Label Switching (MPLS). During the mid-1990s he was a senior scientist in the Internet working Research Group at Bellcore before moving to the High Speed Networks Research department at Bell Labs Research (Lucent Technologies) in 1997. While a researcher at Bell Labs he took a concurrent assignment as Product Marketing Director for a new IP router being developed by Lucent Technologies; a role that took him to North American, EMEA and Asian markets in support of Lucent sales teams.
 In 2002 he returned to Australia (and to Academia) to found the Centre for Advanced Internet Architectures (CAIA). He authored "Quality of Service In IP Networks: Foundations for a Multi-Service Internet" (Macmillan Technical Publishing, April 2000) and co-authored "Networking and Online Games - Understanding and Engineering Multiplayer Internet Games" (John Wiley Sons, UK, April 2006). Professor Armitage is also a member of ACM and ACM SIGCOMM.

2:10 Insights of File-Sharing System Forums

G. Jourjon, O. Mehani and T. Rakotoarivelo One-click file hosting systems (1-CFHS) have become a prominent means to exchange files across the Internet. Studies have previously identified that a lot of the hosted content is infringing on its owner's copyright, and some of the most well know 1-CFHSs have been taken offline as a result of this. In this paper, we present a pilot study of how links to, and copies of, such content are exchanged via online forums. We have crawled and parsed pages from four of the most prominent sites over a period of a few months in order to extract URLs to these items. These URLs have then been periodically tested until they became unavailable in order to derive the lifespan of these copies on various 1-CFHS. We find that URLs are mostly posted once, presumably by their creators, and that unauthorised content on 1-CFHSs has an availability expectancy of about 40 days before being taken down. We propose an initial simple life-and-death model for such content in the form of a Markov chain. We also show that the 1-CFHS market is still unstable, with most of the past leader services having disappeared from the current charts. pp. 1006-1013

2:35 Measuring the Accuracy of Open-Source Payload-Based Traffic Classifiers Using Popular Internet Applications

S. Alcock and R. Nelson Open-source payload-based traffic classifiers are frequently used as a source of ground truth in the traffic classification research field. However, there have been no comprehensive studies that provide evidence that the classifications produced by these software tools are sufficiently accurate for this purpose. In this paper, we present the results of an investigation into the accuracy of four open-source traffic classifiers (L7 Filter, nDPI, libprotoident and tstat) using packet traces captured while using a known selection of common Internet applications, including streaming video, Steam and World of Warcraft. Our results show that nDPI and libprotoident provide the highest accuracy among the evaluated traffic classifiers, whereas L7 Filter is unreliable and should not be used as a source of ground truth. pp. 1014-1021

3:30 PM - 4:10 PM

4:10 Estimating IPv4 Address Space Usage with Capture-Recapture

S. Zander, L. Andrew, G. Armitage and G. Huston As of April 2013 almost 95% of the IPv4 address space has been allocated. Yet, the transition to IPv6 is still relatively slow. One reason could be existing "IPv4 reserves" -- allocated but unused IPv4 addresses. Knowing how many addresses are actively used is important to predict a potential IPv4 address market, predict the IPv6 deployment time frame, and measure progressive exhaustion after the IPv4 space is fully allocated. Unfortunately, only a fraction of hosts responds to probes, such as "ping". We propose a capture-recapture method to estimate the actively used IPv4 addresses from multiple incomplete data sources, including "ping" censuses, network traces and server logs. We estimate that at least 950--1090 million IPv4 addresses are used, which is 36--41% of the publicly routed space. We analyse how the utilisation depends on various factors, such as region, country and allocation prefix length. pp. 1068-1075

4:35 An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis

M. Elich, P. Velan, T. Jirsik and P. Celeda The exhaustion of IPv4 address space increases pressure on network operators and content providers to transition to IPv6. The IPv6 transition mechanisms such as Teredo and 6to4 allow IPv4 hosts to connect to IPv6 hosts. On the other hand, they increase network complexity and render ineffective many methods to observe IP traffic. In this paper, we modified our flow-based measurement system to involve transition mechanisms information to provide full IPv6 visibility. Our traffic analysis focuses on IPv6 tunneled traffic and uses data collected over one week in the Czech national research and education network. The results expose various traffic characteristics of native and tunneled IPv6 traffic, among others the TTL and HOP limit distribution, geolocation aspect of the traffic, and list of Teredo servers used in the network. Furthermore, we show how the traffic of IPv6 transition mechanisms has evolved since 2010. pp. 1076-1082

5:00 Link Quality Prediction for Multimedia Streaming Based on Available Bandwidth and Latency

S. J. Lim, S. W. Lee, S. Lau and E. K. Karuppiah Network performance metrics such as available bandwidth and latency are essential to achieve good Quality of Service (QoS) in multimedia streaming. There are unique requirements in network performance metrics for media applications, such as audio conferencing, video streaming, video conferencing, and high-definition (HD) video conferencing. In this paper, we focus on conference call type suggestion based on link quality prediction. The link's quality is classified based on the available bandwidth and latency between two network nodes. We have implemented and compared two of the most popular supervised learning based classification methods, i.e. logistic regression and support vector machine (SVM). We have compared the performance of both methods and their suitability to apply in link quality prediction. The experimental results show that SVM outperforms logistic regression for binary and multiclass classification in terms of accuracy. pp. 1083-1090