Tag Archives: tech report

new technical report “Does Anycast hang up on You?(extended)”

We have released a new technical report “Does Anycast hang up on you?(extended)”, ISI-TR-716, available at http://www.isi.edu/~weilan/PAPER/anycast_instability.pdf From the abstract: Anycast-based services today are widely used commercially, with several major providers serving thousands of important websites. However, to our knowledge, there … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment

new technical report “Do You See Me Now? Sparsity in Passive Observations of Address Liveness (extended)”

We have released a new technical report “Do You See Me Now? Sparsity in Passive Observations of Address Liveness (extended)”, ISI-TR-2016-710, available at http://www.isi.edu/~johnh/PAPERS/Mirkovic16a.pdf From the abstract: Full allocation of IPv4 addresses has prompted interest in measuring address liveness, first … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , | Leave a comment

new technical report “Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event”

We have released a new technical report “Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event”, ISI-TR-2016-709, available at http://www.isi.edu/~johnh/PAPERS/Moura16a.pdf From the abstract: Distributed Denial-of-Service (DDoS) attacks continue to be a major threat in the Internet today. DDoS attacks … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , | 1 Comment

new technical report “Anycast Latency: How Many Sites Are Enough?”

We have released a new technical report “Anycast Latency: How Many Sites Are Enough?”, ISI-TR-2016-708, available at http://www.isi.edu/%7ejohnh/PAPERS/Schmidt16a.pdf. From the abstract: Anycast is widely used today to provide important services including naming and content, with DNS and Content Delivery Networks … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

new technical report “BotDigger: Detecting DGA Bots in a Single Network”

We have released a new technical report “BotDigger: Detecting DGA Bots in a Single Network”, CS-16-101, available at http://www.cs.colostate.edu/~hanzhang/papers/BotDigger-techReport.pdf The code of BotDigger is available on GitHub at: https://github.com/hanzhang0116/BotDigger From the abstract: To improve the resiliency of communication between bots and C&C … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Leave a comment

new technical report “Assessing Co-Locality of IP Blocks”

We have released a new technical report “Assessing Co-Locality of IP Blocks”, CSU TR15-103, available at http://www.cs.colostate.edu/TechReports/Reports/2015/tr15-103.pdf. From the abstract: Many IP Geolocation services and applications assume that all IP addresses with the same /24 IPv4 prefix (a /24 block) … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment

new technical report “Poster: Lightweight Content-based Phishing Detection”

We released a new technical report “Poster: Lightweight Content-based Phishing Detection”, ISI-TR-698, available at http://www.isi.edu/publications/trpublic/files/tr-698.pdf. The poster abstract and poster (included as part of the technical report) appeared at the poster session at the 36th IEEE Symposium on Security and Privacy … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Leave a comment

new technical report “Web-scale Content Reuse Detection (extended)”

We released a new technical report “Web-scale Content Reuse Detection (extended)”, ISI-TR-2014-692, available at http://www.isi.edu/publications/trpublic/files/tr-692.pdf. From the abstract: With the vast amount of accessible, online content, it is not surprising that unscrupulous entities “borrow” from the web to provide filler for … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | Leave a comment

new technical report “T-DNS: Connection-Oriented DNS to Improve Privacy and Security (extended)”

We released a new technical report “T-DNS: Connection-Oriented DNS to Improve Privacy and Security (extended)”, ISI-TR-2014-693, available as http://www.isi.edu/~johnh/PAPERS/Zhu14b.pdf From the abstract: DNS is the canonical protocol for connectionless UDP. Yet DNS today is challenged by eavesdropping that compromises privacy, source-address … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

new technical report “When the Internet Sleeps: Correlating Diurnal Networks With External Factors (extended)”

We released a new technical report “When the Internet Sleeps: Correlating Diurnal Networks With External Factors (extended)”, ISI-TR-2014-691, by Lin Quan, John Heidemann, and Yuri Pradkin, available as http://www.isi.edu/~johnh/PAPERS/Quan14b. pdf From the abstract: As the Internet matures, policy questions loom … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment