Ημερομηνία/Date |
Ύλη/Material
| |
Notes |
19/9 |
| Εισαγωγή - Introduction |
|
21/9 |
1, 2.1-2.3 |
Introduction, Internet’s architecture, details of internet operation |
|
30/9 |
2.3, 2.4 |
Protocols, applications |
|
3/10 |
4.1, 4.2 |
Where can measurements be made?The role of Time |
|
5/10 |
iPlane |
Introduction to iPlane |
|
7/10 |
| Assignment 1
| |
10/10 |
4.3, 4.4 |
Role of Internet DataBases, Measurements Across Various Layers |
|
12/10 |
5.1-5.2 |
Infrastructure: Properties Challenges |
|
17/10
| 5.3-5.4
| Infrastructure: Tools, State of the art
| |
19/10
|
| C. Estan, G. Varghese: New Directions in Traffic Measurement and Accounting. SIGCOMM, August 2002
| TA:solomos |
24/10
| 6.1-6.2
| Traffic: Properties, Challenges
| |
26/10
| 6.3, 6.4
| Traffic: Tools, State of the Art
| |
31/10
| 7.1, 7.2, 7.3, 7.4
| Application Mix, DNS, Web
| |
2/11
|
| Stefan Savage, D. Wetherall, A. Karlin, and Tom Anderson. Practical Network Support for IP Traceback. In Proceedings of the 2000 ACM SIGCOMM Conference, pages 295--306, Stockholm, Sweden, August 2000
| TA:kleftog |
7/11
| 7.1,7.2
|
Application Mix, DNS, Web
| |
9/11
| Trajectory Sampling
|
N. C. Duffield and M. Grossglauser. Trajectory Sampling for Direct Traffic Observation. IEEE/ACM Transactions on Networking, June 2001
| |
14/11
| 7.3,7.4
|
Application Mix, DNS, Web
| |
16/11
|
| Introduction to Passive Network Traffic Monitoring
| |
18/11
|
| Assignment 2
| |
21/11
| 8
|
Anonymization:
Constantinos Dovrolis, Parameswaran Ramanathan, David Moore: What do packet dispersion techniques measure? In INFOCOM 01
| |
23/11
|
|
Reverse Traceroute. E. Katz-Bassett, H. Madhyastha, V. Adhikari, C. Scott, J. Sherry, P. van Wesep, A. Krishnamurthy, and T. Anderson. NSDI 2010.
| psistakis |
28/11
| Recitation
| Recitation
| |
30/11
|
|
- Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham Vigilante: End-to-End Containment of Internet Worms, SOSP 2005.
- Mochapetris et al. : Development of the Domain Name System..
|
- Eric
- csd3247
|
2/12
|
|
- Benoit Donnet, Philippe Raoult, Timur Friedman, and Mark Crovella. 2005. Efficient algorithms for large-scale topology discovery. SIGMETRICS '05.
- Yarrping the Internet: Randomized High-Speed Active Topology Discovery: Robert Beverly, IMC 2016
- csd3894
- csd3732
- kiosterakis
|
|
5/12
|
|
- David Moore, Geoffrey M. Voelker, and Stefan Savage, "Inferring Internet Denial-of-Service Activity," Usenix Security Symposium, 2001
- S. Singh, Cristian Estan, George Varghese, and Stefan Savage. Automated Worm Fingerprinting, OSDI 2004
|
- mkarabin
- shevtsov
|
7/12
|
|
- I Tube, You Tube, Everybody Tubes: Analyzing the World's Largest User Generated Content Video System, IMC 07
- Thanasis Petsas, Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos, and Thomas Karagiannis. 2013. Rise of the planet of the apps: a systematic study of the mobile app ecosystem. IMC 2013
|
- csd3201
|
12/12
|
|
- M. Polychronakis, K. G. Anagnostakis, E. P. Markatos, Arne Øslebø. Design of an Application Programming Interface for IP Network Monitoring. NOMS 2004
- Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos. An Empirical Study of Real-world Polymorphic Code Injection Attacks. LEET
|
- Stathist
- kostasdrk
|
14/12
|
|
- Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry Peterson: Characteristics of internet background radiation, IMC 04
- BLINC: Multilevel Traffic Classification in the Dark, SIGOCOMM 2005
|
- Jagathan
- Pachylakis
|