Abstract — While earlier studies have pointed out that short-lived TCP flows (mice) may hurt long-lived TCP flows (elephants) in the long term, they provide insufficient insight for developing scenarios leading to drastic drop in throughputs of long-lived TCP flows. We have systematically developed TCP adversarial scenarios where we use short-lived TCP flows to adversely influence long-lived TCP flows. Our scenarios are interesting since, (a) they point out the increased vulnerabilities of recently proposed scheduling, AQM and routing techniques that further favor short-lived TCP flows, and (b) they are more difficult to detect when intentionally found to target long-lived TCP flows. We systematically exploit the ability of TCP flows in slo...
Long-range dependence has been observed in many recent Internet traffic measurements. In addition, s...
Abstract — TCP (Transmission Control Protocol) is one of most important Internet protocols. It provi...
Network conditions and traffic requirements of the Internet have been dynamically changing. These c...
Best effort applications over non-TCP protocols, e.g., UDP, can be used in attacks that capture unfa...
Abstract — Short TCP flows may suffer significant response-time performance degradations during netw...
In recent years a number of TCP variants have emerged to optimise some aspect of data transport wher...
peer reviewedWe first study the accuracy of two well-known analytical models of the average throughp...
We study the burstiness of TCP flows at the packet level. We aggregate packets into entities we call...
Restricted until 28 Apr. 2010.Many modern variations of transport protocols are equipped with improv...
In this paper we consider the performance of several well known high speed protocols in environments...
Understanding the nature of TCP behavior is critical in order to properly engineer, operate, and eva...
Long-range dependence has been observed in many recent Internet traffic measurements. Previous studi...
In this work, we investigate the bandwidth and transfer time of long-haul TCP versus cascaded TCP [5...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
The traditional concept of fairness in TCP is based on being limited by congestion control. Today, h...
Long-range dependence has been observed in many recent Internet traffic measurements. In addition, s...
Abstract — TCP (Transmission Control Protocol) is one of most important Internet protocols. It provi...
Network conditions and traffic requirements of the Internet have been dynamically changing. These c...
Best effort applications over non-TCP protocols, e.g., UDP, can be used in attacks that capture unfa...
Abstract — Short TCP flows may suffer significant response-time performance degradations during netw...
In recent years a number of TCP variants have emerged to optimise some aspect of data transport wher...
peer reviewedWe first study the accuracy of two well-known analytical models of the average throughp...
We study the burstiness of TCP flows at the packet level. We aggregate packets into entities we call...
Restricted until 28 Apr. 2010.Many modern variations of transport protocols are equipped with improv...
In this paper we consider the performance of several well known high speed protocols in environments...
Understanding the nature of TCP behavior is critical in order to properly engineer, operate, and eva...
Long-range dependence has been observed in many recent Internet traffic measurements. Previous studi...
In this work, we investigate the bandwidth and transfer time of long-haul TCP versus cascaded TCP [5...
Denial of Service attacks are presenting an increasing threat to the global inter-networking infrast...
The traditional concept of fairness in TCP is based on being limited by congestion control. Today, h...
Long-range dependence has been observed in many recent Internet traffic measurements. In addition, s...
Abstract — TCP (Transmission Control Protocol) is one of most important Internet protocols. It provi...
Network conditions and traffic requirements of the Internet have been dynamically changing. These c...