Browsing by Author "claffy, kc"

Now showing items 1-5 of 8

  • The 2nd workshop on active internet measurements (AIMS-2) report

    claffy, kc; Aben, Emile; Auge, Jordan; Beverly, Robert; Bustamante, Fabian; Donnet, Benoit; Friedman, Timur; Fomenkov, Marina; Haga, Peter; Luckie, Matthew John; Shavitt, Yuval (2010)
    On February 8-10, 2010, CAIDA hosted the second Workshop on Active Internet Measurements (AIMS-2) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshops. The goals of this workshop were to further ...
  • Inferring persistent interdomain congestion

    Dhamdhere, Amogh; Clark, David D.; Gamero-Garrido, Alexander; Luckie, Matthew John; Mok, Ricky K. P.; Akiwate, Gautam; Gogia, Kabir; Bajpai, Vaibhav; Snoeren, Alex C.; claffy, kc (ACM, 2018)
    There is significant interest in the technical and policy communities regarding the extent, scope, and consumer harm of persistent interdomain congestion. We provide empirical grounding for discussions of interdomain ...
  • Learning regexes to extract router names from hostnames

    Luckie, Matthew John; Huffaker, Bradley; claffy, kc (ACM Press, 2019)
    We present the design, implementation, evaluation, and validation of a system that automatically learns to extract router names (router identifiers) from hostnames stored by network operators in different DNS zones, which ...
  • Measured impact of crooked traceroute

    Luckie, Matthew John; Dhamdhere, Amogh; claffy, kc; Murrell, David (Association for Computing Machinery, 2011-01)
    Data collected using traceroute-based algorithms underpins research into the Internet’s router-level topology, though it is possible to infer false links from this data. One source of false inference is the combination of ...
  • Network hygiene, incentives, and regulation: Deployment of source address validation in the internet

    Luckie, Matthew John; Beverly, Robert; Koga, Ryan; Keys, Ken; Kroll, Joshua A.; claffy, kc (ACM Press, 2019)
    The Spoofer project has collected data on the deployment and characteristics of IP source address validation on the Internet since 2005. Data from the project comes from participants who install an active probing client ...