Tcp's initial window—deployment in the wild and its impact on performance

J Rüth, I Kunze, O Hohlfeld - IEEE Transactions on Network and …, 2019 - ieeexplore.ieee.org
TCP congestion control and particularly its initial congestion window (IW) size is one long-
debated topic that can influence Web performance. Its size is, however, assumed to be static …

Getting under Alexa's umbrella: infiltration attacks against internet top domain lists

W Rweyemamu, T Lauinger, C Wilson… - … Conference, ISC 2019 …, 2019 - Springer
Top domain rankings such as Alexa are frequently used in security research. Typical uses
include selecting popular websites for measurement studies, and obtaining a sample of …

Analysing censorship circumvention with VPNs via DNS cache snooping

O Farnan, J Wright, A Darer - 2019 IEEE Security and Privacy …, 2019 - ieeexplore.ieee.org
Anecdotal evidence suggests an increasing number of people are turning to VPN services
for the properties of privacy, anonymity and free communication over the internet. Despite …

Security in plain txt: Observing the use of dns txt records in the wild

A Portier, H Carter, C Lever - Detection of Intrusions and Malware, and …, 2019 - Springer
Abstract The Domain Name System is a critical piece of infrastructure that has expanded into
use cases beyond its original intent. DNS TXT records are intentionally very permissive in …

Service traceroute: tracing paths of application flows

I Morandi, F Bronzino, R Teixeira… - Passive and Active …, 2019 - Springer
Traceroute is often used to help diagnose when users experience issues with Internet
applications or services. Unfortunately, probes issued by classic traceroute tools differ from …

Inferring the deployment of top domains over public clouds using dns data

Q Jacquemart, C Pigout… - 2019 Network Traffic …, 2019 - ieeexplore.ieee.org
Cloud technologies are becoming pervasive and available for private companies or public
institutions in different flavors, mostly public cloud or private clouds. Our focus in this work is …

Informed Access Network Selection: The Benefits of Socket Intents for Web Performance

T Enghardt, PS Tiesel, T Zinner… - 2019 15th International …, 2019 - ieeexplore.ieee.org
Today's end-user devices have multiple access networks available and can achieve better
application performance by distributing traffic across access networks. However, matching …

Getting under Alexa's umbrella: Infiltration attacks against internet top domain lists

E Kirda - … Security: 22nd International Conference, ISC 2019 …, 2019 - books.google.com
Top domain rankings such as Alexa are frequently used in security research. Typical uses
include selecting popular websites for measurement studies, and obtaining a sample of …

Whitelists that work: Creating defensible dynamic whitelists with statistical learning

R Burton, L Rocha - 2019 APWG Symposium on Electronic …, 2019 - ieeexplore.ieee.org
Blacklists are a fundamental component of many cyber security products. Typically
populated from a number of sources including machine learning algorithms and malware …

On the Privacy Implications of Real Time Bidding

MA Bashir - 2019 - search.proquest.com
The massive growth of online advertising has created a need for commensurate amounts of
user tracking. Advertising companies track online users extensively to serve targeted …