Path fingerprinting is an essential component of applications that distinguish among different network paths, including path selection in overlay networks, multi-path routing, monitoring and diagnosis of network problems, and developing a deeper understanding of network behavior. This paper proposes a new approach to Internet path fingerprinting based on the distribution of end-toend packet-pair measurements. This approach allows detection of busy link sharing between two paths, even when those segments have low utilization and are not the paths ’ bottlenecks. While our fingerprints do not assure physically disjoint paths (since that requires information external to the network), they reflect the traffic and link characteristics of intermed...
The widespread use of encryption and anonymization technologies - -e.g., HTTPS, VPNs, Tor, and iClou...
Intruders that log in through a series of machines when conducting an attack are hard to trace becau...
International audienceThis paper investigates to what extent it is possible to use traceroute-style ...
Virtual private networks are often used to secure communication between two hosts and preserve priva...
The Internet has become an inseparable part of our daily life and work activities. Due to its distri...
Abstract—Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneou...
Abstract—Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneou...
Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneous, highly...
Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneous, highly...
International audienceTools to measure Internet properties usually assume the existence of just one ...
peer reviewedTraceroute is the most widely used Internet path analysis tool today to study the topol...
Nowadays, computer networks have become as popular as telephone networks fifteen years ago and by th...
TLS fingerprinting has evolved in response to growing cybersecurity concerns. The need for a mechani...
The widespread use of encryption and anonymization technologies - -e.g., HTTPS, VPNs, Tor, and iClou...
The ability to locate network bottlenecks along end-to-end paths on the Internet is of great interes...
The widespread use of encryption and anonymization technologies - -e.g., HTTPS, VPNs, Tor, and iClou...
Intruders that log in through a series of machines when conducting an attack are hard to trace becau...
International audienceThis paper investigates to what extent it is possible to use traceroute-style ...
Virtual private networks are often used to secure communication between two hosts and preserve priva...
The Internet has become an inseparable part of our daily life and work activities. Due to its distri...
Abstract—Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneou...
Abstract—Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneou...
Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneous, highly...
Tracing Internet paths is essential for gathering knowledge about the complex, heterogeneous, highly...
International audienceTools to measure Internet properties usually assume the existence of just one ...
peer reviewedTraceroute is the most widely used Internet path analysis tool today to study the topol...
Nowadays, computer networks have become as popular as telephone networks fifteen years ago and by th...
TLS fingerprinting has evolved in response to growing cybersecurity concerns. The need for a mechani...
The widespread use of encryption and anonymization technologies - -e.g., HTTPS, VPNs, Tor, and iClou...
The ability to locate network bottlenecks along end-to-end paths on the Internet is of great interes...
The widespread use of encryption and anonymization technologies - -e.g., HTTPS, VPNs, Tor, and iClou...
Intruders that log in through a series of machines when conducting an attack are hard to trace becau...
International audienceThis paper investigates to what extent it is possible to use traceroute-style ...