Monitoring network neutrality: A survey on traffic differentiation detection
Network neutrality is becoming increasingly important as the global debate intensifies and
governments worldwide implement and withdraw regulations. According to this principle, all …
governments worldwide implement and withdraw regulations. According to this principle, all …
Resonance: Dynamic access control for enterprise networks
AK Nayak, A Reimers, N Feamster… - Proceedings of the 1st …, 2009 - dl.acm.org
Enterprise network security is typically reactive, and it relies heavily on host security and
middleboxes. This approach creates complicated interactions between protocols and …
middleboxes. This approach creates complicated interactions between protocols and …
Detecting traffic differentiation in backbone ISPs with NetPolice
Traffic differentiations are known to be found at the edge of the Internet in broadband ISPs
and wireless carriers [13, 2]. The ability to detect traffic differentiations is essential for …
and wireless carriers [13, 2]. The ability to detect traffic differentiations is essential for …
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against
specific classes of applications, users, or destinations. Existing systems for detecting …
specific classes of applications, users, or destinations. Existing systems for detecting …
ShaperProbe: end-to-end detection of ISP traffic shaping using active methods
P Kanuparthy, C Dovrolis - Proceedings of the 2011 ACM SIGCOMM …, 2011 - dl.acm.org
We present an end-to-end measurement method for the detection of traffic shaping. Traffic
shaping is typically implemented using token buckets, allowing a maximum burst of traffic to …
shaping is typically implemented using token buckets, allowing a maximum burst of traffic to …
[PDF][PDF] {CensMon}: A Web Censorship Monitor
E Athanasopoulos, S Ioannidis… - USENIX Workshop on …, 2011 - usenix.org
The Internet has traditionally been the most free medium for publishing and accessing
information. It is also quickly becoming the dominant medium for quick and easy access to …
information. It is also quickly becoming the dominant medium for quick and easy access to …
Inferring traffic shaping and policy parameters using end host measurements
U Weinsberg, A Soule… - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
The increasing adoption of high speed Internet connectivity in homes has led to the
development of bandwidth hungry applications. This, in turn, induces ISPs to protect their …
development of bandwidth hungry applications. This, in turn, induces ISPs to protect their …
Measurement integrity attacks against network tomography: Feasibility and defense
Network tomography is an important tool to estimate link metrics from end-to-end network
measurements. An implicit assumption in network tomography is that observed …
measurements. An implicit assumption in network tomography is that observed …
[HTML][HTML] A holistic approach for locating traffic differentiation in the internet
The worldwide debate over Network Neutrality (NN) has been raging on for nearly two
decades. According to NN principles, all traffic in the Internet must be treated with …
decades. According to NN principles, all traffic in the Internet must be treated with …
Rapid and scalable isp service delivery through a programmable middlebox
With only access billing no longer ensuring profits, an ISP's growth now relies on rolling out
new and differentiated services. However, ISPs currently do not have a well-defined …
new and differentiated services. However, ISPs currently do not have a well-defined …