[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

The 2nd workshop on active internet measurements (AIMS-2) report

Published: 22 October 2010 Publication History

Abstract

On February 8-10, 2010, CAIDA hosted the second Workshop on Active Internet Measurements (AIMS-2) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshops. The goals of this workshop were to further our understanding of the potential and limitations of active measurement research and infrastructure in the wide-area Internet, and to promote cooperative solutions and coordinated strategies to addressing future data needs of the network and security research communities. The three-day workshop included presentations, group discussion and analysis, and focused interaction between participating researchers, operators, and policymakers from all over the world. This report describes the motivation and findings of the workshop, and reviews progress on recommendations developed at the 1st Active Internet Measurements Workshop in 2009 [18]. Slides from the workshop presentations are available at [9].

References

[1]
Iplane.http://iplane.cs.washington.edu.
[2]
AquaLab@Northwestern. EdgeScope -- Sharing the view from a distributed Internet telescope. http://www.aqualab.cs.northwestern.edu/projects/EdgeScope.html.
[3]
Richard Barnes. Ietf working group on geographic location/privacy, 2009. http://tools.ietf.org/wg/geopriv/,[email protected].
[4]
Robert Beverly, Arthur Berger, Young Hyun, and k claffy. Understanding the Efficacy of Deployed Internet SourceAddress Validation Filtering. In 8th ACMSIGCOMM/USENIX Internet Measurement Conference(IMC), November 2009.
[5]
Robert Beverly, Arthur Berger, and Geoffrey Xie.Primitives for active internet topology mapping: Towardhigh-frequency characterization. In Proceedings of theTenth ACM SIGCOMM/USENIX Internet MeasurementConference (IMC), November 2010.
[6]
Bradley Huffaker and kc claffy. CAIDA's Geolocation ToolsComparison, 2010. http://www.caida.org/projects/cybersecurity/geolocation/.
[7]
CAIDA. The DHS PREDICT project.http://www.caida.org/projects/predict/.
[8]
CAIDA. Netgeo ref.http://www.caida.org/utilities/netgeo/.
[9]
CAIDA. ISMA 2009 AIMS - Workshop on Active InternetMeasurements, 2009.http://www.caida.org/workshops/isma/0902/.
[10]
CAIDA. ISMA 2010 AIMS-2 - Workshop on ActiveInternet Measurements, 2010.http://www.caida.org/workshops/isma/1002/.
[11]
Kai Chen, David Choffnes, Rahul Potharaju, Yan Chen,Fabian Bustamante, and Yao Zhao. Where the SidewalkEnds: Extending the Internet AS Graph Using TraceroutesFrom P2P Users. Rome, Italy, December 2009.
[12]
David Choffnes and Fabian Bustamante. Pitfalls for testbedevaluations of Internet systems. SIGCOMM ComputingCommunications Review, 40(2), April 2010.
[13]
David R. Choffnes and Fabián E. Bustamante. Taming thetorrent: A practical approach to reducing cross-ISP trafficin peer-to-peer systems. In Proc. of ACM SIGCOMM,Seattle, WA, Aug. 2008.
[14]
David R. Choffnes, Fabián E. Bustamante, and Zihui Ge.Crowdsourcing service-level network event detection. InProc. of ACM SIGCOMM, New Delhi, India, August 2010.
[15]
Douglas Maughan Erin Kenneally, Michael Bailey. AFramework for Understanding and Applying EthicalPrinciples in Network and Security Research. In Ethics inComputer Security Research (WECSR 2010), January2010.
[16]
Cooperative Association for Internet Data Analysis.Internet Topology Data Kit, April 2010. http://www.caida.org/data/active/internet-topology-data-kit/.
[17]
Simson Garfinkel and Lorrie Faith Cranor. Institutionalreview boards and your research: A proposal for improvingthe review procedures for research projects that involvehuman subjects and their associated identifiable privateinformation. 2010.http://simson.net/clips/academic/2010.CACM.IRB.pdf.
[18]
Bradley Huffaker, Amogh Dhamdhere, Marina Fomenkov,and kc claffy. Toward Topology Dualism: Improving theAccuracy of AS Annotations for Routers. In PAM, 2010.
[19]
kc claffy, M. Fomenkov, E. Katz-Bassett, R. Beverly,B.Cox, and M. Luckie. The Workshop on Active InternetMeasurements (AIMS) Report. Computer CommunicationReview, 39(5), 2009.
[20]
kc claffy, Young Hyun, Ken Keys, Marina Fomenkov, andDmitri Krioukov. Internet mapping: from art to science. InCATCH, 2009.
[21]
Erin Kenneally and kc claffy. Dialing privacy and utility: aproposed data-sharing framework to advance Internetresearch. IEEE Security and Privacy, 2010.http://www.caida.org/publications/papers/2010/dialing_privacy_utility/.
[22]
K. Keys. Ip alias resolution techniques. ComputerCommunication Review, January 2010.
[23]
D. Krioukov, F. Chung, kc claffy, M. Fomenkov,A. Vespignani, and W. Willinger. The Workshop onInternet Topology (WIT) Report. ComputerCommunication Review, 37(1), 2007.
[24]
S. Laki, P. Matray, P. Haga, I. Csabai, and G. Vattay. AModel Based Approach for Improving Router Geolocation.Computer Networks, 54:1490--1501, 2010.
[25]
Harsha V. Madhyastha, Tomas Isdal, Michael Piatek, ColinDixon, Thomas Anderson, Arvind Krishnamurthy, and Arun Venkataramani. iPlane: An Information Plane forDistributed Services. In OSDI, 2006.
[26]
Harsha V. Madhyastha, Ethan Katz-Bassett, ThomasAnderson, Arvind Krishnamurthy, and ArunVenkataramani. iPlane Nano: Path Prediction forPeer-to-Peer Applications. In NSDI, 2009.
[27]
Pascal Mérindol, Virginie Van den Schrieck, Benoit Donnet,Olivier Bonaventure, and Jean-Jacques Pansiot.Quantifying ases multiconnectivity using multicastinformation. In IMC '09: Proceedings of the 9th ACMSIGCOMM conference on Internet measurementconference, 2009.
[28]
Saverio Niccolini, Sandra Tartarelli, Juergen Quittek,Thomas Dietz, and Martin Swany. Information model andXML data model for traceroute measurements.http://www.ietf.org/rfc/rfc5388.txt.
[29]
S. Laki and P. Matray and P. Haga and T. Sebok and I.Csabai and G. Vattay. Spotter: A Model Based ActiveGeolocation Service, 2010. in preparation.
[30]
Yuval Shavitt and Noa Zilberman. A study of geolocationdatabases. Technical report.http://arxiv.org/abs/1005.5674.
[31]
Fabien Viger, Brice Augustin, Xavier Cuvellier, Clémence Magnien, Matthieu Latapy, Timur Friedman, and RenataTeixeira. Detection, understanding, and prevention oftraceroute measurement artifacts. Computer Networks,52(5):998--1018, 2008.
[32]
Team Contact W3C Womer, Matt. Geolocation workinggroup, 2009. http://www.w3.org/2008/geolocation/.

Cited By

View all
  • (2011)The 3rd workshop on active internet measurements (AIMS-3) reportACM SIGCOMM Computer Communication Review10.1145/2002250.200225741:3(37-42)Online publication date: 5-Jul-2011

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 40, Issue 5
October 2010
73 pages
ISSN:0146-4833
DOI:10.1145/1880153
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 October 2010
Published in SIGCOMM-CCR Volume 40, Issue 5

Check for updates

Author Tags

  1. active measurement
  2. codes of ethics
  3. codes of good practice
  4. management techniques
  5. measurement techniques
  6. validation

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2011)The 3rd workshop on active internet measurements (AIMS-3) reportACM SIGCOMM Computer Communication Review10.1145/2002250.200225741:3(37-42)Online publication date: 5-Jul-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media