Monitoring network neutrality: A survey on traffic differentiation detection

T Garrett, LE Setenareski, LM Peres… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Network neutrality is becoming increasingly important as the global debate intensifies and
governments worldwide implement and withdraw regulations. According to this principle, all …

Resonance: Dynamic access control for enterprise networks

AK Nayak, A Reimers, N Feamster… - Proceedings of the 1st …, 2009 - dl.acm.org
Enterprise network security is typically reactive, and it relies heavily on host security and
middleboxes. This approach creates complicated interactions between protocols and …

Detecting traffic differentiation in backbone ISPs with NetPolice

Y Zhang, ZM Mao, M Zhang - Proceedings of the 9th ACM SIGCOMM …, 2009 - dl.acm.org
Traffic differentiations are known to be found at the edge of the Internet in broadband ISPs
and wireless carriers [13, 2]. The ability to detect traffic differentiations is essential for …

Detecting network neutrality violations with causal inference

MB Tariq, M Motiwala, N Feamster… - Proceedings of the 5th …, 2009 - dl.acm.org
We present NANO, a system that detects when ISPs apply policies that discriminate against
specific classes of applications, users, or destinations. Existing systems for detecting …

ShaperProbe: end-to-end detection of ISP traffic shaping using active methods

P Kanuparthy, C Dovrolis - Proceedings of the 2011 ACM SIGCOMM …, 2011 - dl.acm.org
We present an end-to-end measurement method for the detection of traffic shaping. Traffic
shaping is typically implemented using token buckets, allowing a maximum burst of traffic to …

[PDF][PDF] {CensMon}: A Web Censorship Monitor

E Athanasopoulos, S Ioannidis… - USENIX Workshop on …, 2011 - usenix.org
The Internet has traditionally been the most free medium for publishing and accessing
information. It is also quickly becoming the dominant medium for quick and easy access to …

Inferring traffic shaping and policy parameters using end host measurements

U Weinsberg, A Soule… - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
The increasing adoption of high speed Internet connectivity in homes has led to the
development of bandwidth hungry applications. This, in turn, induces ISPs to protect their …

Measurement integrity attacks against network tomography: Feasibility and defense

S Zhao, Z Lu, C Wang - IEEE Transactions on Dependable and …, 2019 - ieeexplore.ieee.org
Network tomography is an important tool to estimate link metrics from end-to-end network
measurements. An implicit assumption in network tomography is that observed …

[HTML][HTML] A holistic approach for locating traffic differentiation in the internet

T Garrett, LCE Bona, EP Duarte Jr - Computer Networks, 2021 - Elsevier
The worldwide debate over Network Neutrality (NN) has been raging on for nearly two
decades. According to NN principles, all traffic in the Internet must be treated with …

Rapid and scalable isp service delivery through a programmable middlebox

KR Khan, Z Ahmed, S Ahmed, A Syed… - ACM SIGCOMM …, 2014 - dl.acm.org
With only access billing no longer ensuring profits, an ISP's growth now relies on rolling out
new and differentiated services. However, ISPs currently do not have a well-defined …