[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1028788.1028824acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
Article

Strategies for sound internet measurement

Published: 25 October 2004 Publication History

Abstract

Conducting an Internet measurement study in a sound fashion can be much more difficult than it might first appear. We present a number of strategies drawn from experiences for avoiding or overcoming some of the pitfalls. In particular, we discuss dealing with errors and inaccuracies; the importance of associating <i>meta-data</i> with measurements; the technique of calibrating measurements by examining outliers and testing for consistencies; difficulties that arise with large-scale measurements; the utility of developing a discipline for reliably reproducing analysis results; and issues with making datasets publicly available. We conclude with thoughts on the sorts of tools and community practices that can assist researchers with conducting sound measurement studies.

References

[1]
M. Allman. Private communication. 2001.]]
[2]
M. Allman, E. Blanton, and W. Eddy. A Scalable System for Sharing Internet Measurements. Proc. PAM 2002.]]
[3]
M. Allman, W. Eddy and S. Ostermann. Estimating Loss Rates With TCP. ACM Performance Evaluation Review, 31(3). 2003.]]
[4]
P. Barford. Private communication. 2000.]]
[5]
S. Floyd and V. Paxson. Difficulties in Simulating the Internet. IEEE/ACM Transactions on Networking 9(4):392--403. 2001.]]
[6]
C. Fraleigh et al. Packet-Level Traffic Measurements from the Sprint IP Backbone. IEEE Network 17(6). 2003.]]
[7]
A. Gilat. MATLAB: An Introduction with Applications. Wiley Text Books. 2003.]]
[8]
M. Handley, C. Kreibich and V. Paxson. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. Proc. USENIX Security Symposium. 2001.]]
[9]
J. Heidemann, K. Mills, and S. Kumar. Expanding Confidence in Network Simulation. IEEE Network, 15(5):58--63. 2001.]]
[10]
S. Jaiswal et al. Measurement and Classification of Out-of-Sequence Packets in a Tier-1 IP Backbone. Proc. ACM SIGCOMM IMW, 2002.]]
[11]
E. Kohler. ipsumdump. http:www//icir.org/kohler/ipsumdump/. 2002.]]
[12]
C. Kreibich. Design and Implementation of Netdude, a Framework for Packet Trace Manipulation. Proc. USENIX/FREENIX, 2004.]]
[13]
P. Martin-Löf. The Notion of Redundancy and Its Use as a Quantitative Measure of the Discrepancy between a Statistical Hypothesis and a Set of Observational Data. Scandinavian Journal of Statistics, 1(1), pp. 3--18. 1974.]]
[14]
D. Mills. Network Time Protocol (Version 3): Specification, Implementation and Analysis. RFC 1305, Network Information Center, SRI International, Menlo Park, CA. March 1992.]]
[15]
D. Mills. Modelling and Analysis of Computer Network Clocks. Technical Report 92-5-2, Electrical Engineering Department, Univ. Delaware. mbox May 1992.]]
[16]
Greg Minshall. TCPdpriv manual. http:www.acm.org/sigcomm/ITA/. 1996.]]
[17]
J. Mogul. Trace anonymization misses the point. WWW 2002 panel on Web Measurements. http://www2002.org/presentations/mogul-n.pdf]]
[18]
S. Moon, P. Skelly and D. Towsley. Estimation and Removal of Clock Skew from Network Delay Measurements. Proc. IEEE INFOCOM. 1999.]]
[19]
R. Pang and V. Paxson. A High-level Programming Environment for Packet Trace Anonymization and Transformation. Proc. ACM SIGCOMM. 2003.]]
[20]
A. Pasztor and D. Veitch. PC Based Precision Timing Without GPS. Proc. ACM SIGMETRICS. 2002.]]
[21]
V. Paxson. Automated Packet Trace Analysis of TCP Implementations. Proc. ACM SIGCOMM. 1997.]]
[22]
V. Paxson. Measurements and Analysis of End-to-End Internet Dynamics. Ph.D. dissertation. Univ. California, Berkeley. 1997.]]
[23]
V. Paxson. On Calibrating Measurements of Packet Transit Times. Proc. ACM SIGMETRICS '98.]]
[24]
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31(23--24), pp. 2435--2463, Dec. 1999.]]
[25]
T. Ptacek and T. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks. http:www.icir.org/vern/Ptacek-Newsham-Evasion-98.ps. Jan. 1998.]]
[26]
R Development Core Team. R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. 2003.]]
[27]
W. Venables and B. Ripley. Modern Applied Statistics with S-PLUS. Springer. 1999.]]
[28]
L. Wang et al. Observation and Analysis of BGP Behavior under Stress. Proc. ACM SIGCOMM IMW. 2002.]]
[29]
J. Xu, J. Fan, M. Ammar, S. Moon. Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-based Scheme. Proc. ICNP. 2002.]]
[30]
L. Zhang, Z. Liu, and C. Xia. Clock Synchronization Algorithms for Network Measurements. Proc. IEEE INFOCOM. 2002]]

Cited By

View all
  • (2023)Analyzing Cyber Security Research Practices through a Meta-Research FrameworkProceedings of the 16th Cyber Security Experimentation and Test Workshop10.1145/3607505.3607523(64-74)Online publication date: 7-Aug-2023
  • (2022)Reproducibility and Replicability of Web Measurement StudiesProceedings of the ACM Web Conference 202210.1145/3485447.3512214(533-544)Online publication date: 25-Apr-2022
  • (2021)Network and Application Performance Measurement Challenges on Android DevicesACM SIGMETRICS Performance Evaluation Review10.1145/3453953.345395548:3(6-11)Online publication date: 5-Mar-2021
  • Show More Cited By

Index Terms

  1. Strategies for sound internet measurement

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
      October 2004
      386 pages
      ISBN:1581138210
      DOI:10.1145/1028788
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 October 2004

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. calibration
      2. datasets
      3. internet measurement
      4. meta-data
      5. reproducibility

      Qualifiers

      • Article

      Conference

      IMC04
      Sponsor:
      IMC04: Internet Measurement Conference
      October 25 - 27, 2004
      Taormina, Sicily, Italy

      Acceptance Rates

      Overall Acceptance Rate 277 of 1,083 submissions, 26%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)60
      • Downloads (Last 6 weeks)9
      Reflects downloads up to 19 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Analyzing Cyber Security Research Practices through a Meta-Research FrameworkProceedings of the 16th Cyber Security Experimentation and Test Workshop10.1145/3607505.3607523(64-74)Online publication date: 7-Aug-2023
      • (2022)Reproducibility and Replicability of Web Measurement StudiesProceedings of the ACM Web Conference 202210.1145/3485447.3512214(533-544)Online publication date: 25-Apr-2022
      • (2021)Network and Application Performance Measurement Challenges on Android DevicesACM SIGMETRICS Performance Evaluation Review10.1145/3453953.345395548:3(6-11)Online publication date: 5-Mar-2021
      • (2021)Performance Monitoring GuidelinesCompanion of the ACM/SPEC International Conference on Performance Engineering10.1145/3447545.3451195(109-114)Online publication date: 19-Apr-2021
      • (2020)On Landing and Internal Web PagesProceedings of the ACM Internet Measurement Conference10.1145/3419394.3423626(680-695)Online publication date: 27-Oct-2020
      • (2020)A methodology for conducting efficient sanitization of HTTP training datasetsFuture Generation Computer Systems10.1016/j.future.2020.03.033109(67-82)Online publication date: Aug-2020
      • (2018)Dmap: Automating Domain Name Ecosystem Measurements and Applications2018 Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA.2018.8506521(1-8)Online publication date: Jun-2018
      • (2018)Constraint satisfaction problemsACM SIGLOG News10.1145/3292048.32920505:4(4-24)Online publication date: 12-Nov-2018
      • (2018)A Long Way to the TopProceedings of the Internet Measurement Conference 201810.1145/3278532.3278574(478-493)Online publication date: 31-Oct-2018
      • (2018)BITS DarshiniProceedings of the 19th International Conference on Distributed Computing and Networking10.1145/3154273.3154316(1-10)Online publication date: 4-Jan-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media