The measurement of response time in web based applications is a common task for the evaluation of service responsiveness and the detection of network or server problems. Traffic analysis is the most common strategy for obtaining response time measurements. However, when the traffic is encrypted, the analysis tools cannot provide these measurement results. In this paper we propose a methodology for measuring the response time in HTTPS traffic based on the flow of data in each direction. We have validated the tool with real traffic and with a worst case scenario created in a testbed. When pipelining is present in the encrypted HTTP 1.1 traffic, it results in a small error in the measurement (between 5% and 15% of error for the 99.9 percentile...
Computer systems play an increasingly crucial and ubiquitous role in human endeavour by carrying out...
The prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, ...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
The measurement of response time in hypertext transfer protocol (HTTP) requests is the most basic pr...
Secure web access has a remarkable growth. Users would like to exploit the advantages of the Interne...
The usage of Internet is rapidly increasing and a large part of the Internet traffic is generated ...
The response time of a WWW service often plays an important role in its success or demise. From a us...
The usage of Internet is rapidly increasing and a large part of the Internet traffic is generated by...
peer reviewedIn this paper we propose and implement novel techniques for performance evaluation of w...
Encrypting traffic does not prevent an attacker from per- forming some types of traffic analysis. We...
IP networks are increasingly carrying mission-critical appli-cations with robust end-to-end network ...
Abstract—Application Level Gateways and firewalls are com-monly used to enforce security policies at...
Abstract—The traffic generated by the Hypertext Transfer Protocol has a dominating position in curre...
The World Wide Web is one of the most popular services on the Internet today. Users of the Internet ...
Abstract—We consider a timing-only based attack against encrypted and padded web traffic. The attack...
Computer systems play an increasingly crucial and ubiquitous role in human endeavour by carrying out...
The prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, ...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...
The measurement of response time in hypertext transfer protocol (HTTP) requests is the most basic pr...
Secure web access has a remarkable growth. Users would like to exploit the advantages of the Interne...
The usage of Internet is rapidly increasing and a large part of the Internet traffic is generated ...
The response time of a WWW service often plays an important role in its success or demise. From a us...
The usage of Internet is rapidly increasing and a large part of the Internet traffic is generated by...
peer reviewedIn this paper we propose and implement novel techniques for performance evaluation of w...
Encrypting traffic does not prevent an attacker from per- forming some types of traffic analysis. We...
IP networks are increasingly carrying mission-critical appli-cations with robust end-to-end network ...
Abstract—Application Level Gateways and firewalls are com-monly used to enforce security policies at...
Abstract—The traffic generated by the Hypertext Transfer Protocol has a dominating position in curre...
The World Wide Web is one of the most popular services on the Internet today. Users of the Internet ...
Abstract—We consider a timing-only based attack against encrypted and padded web traffic. The attack...
Computer systems play an increasingly crucial and ubiquitous role in human endeavour by carrying out...
The prevalence of HTTP web traffic on the Internet has long transcended the layer 7 classification, ...
Thesis (Ph.D.)--Boston UniversityPLEASE NOTE: Boston University Libraries did not receive an Authori...