ANT publications and presentations

2017

  • Liang Zhu and John Heidemann 2017. LDplayer: DNS Experimentation at Scale. Technical Report 722. USC/Information Sciences Institute. [PDF] [Code] ["Details"]
  • Wouter B. de Vries, Ricardo de O. Schmidt, Wes Haraker, John Heidemann, Pieter-Tjerk de Boer and Aiko Pras 2017. Verfploeter: Broad and Load-Aware Anycast Mapping. Proceedings of the ACM Internet Measurement Conference (London, UK, 2017). [DOI] [PDF] [Dataset] ["Details"]
  • Moritz Müller, Giovane C. M. Moura, Ricardo de O. Schmidt and John Heidemann 2017. Recursives in the Wild: Engineering Authoritative DNS Servers. Proceedings of the ACM Internet Measurement Conference (London, UK, 2017). [DOI] [PDF] [Dataset] ["Details"]
  • Kensuke Fukuda, John Heidemann and Abdul Qadeer 2017. Detecting Malicious Activity with DNS Backscatter Over Time. ACM/IEEE Transactions on Networking. 25, 5 (Aug. 2017), 3203–3218. [DOI] [PDF] [Dataset] ["Details"]
  • Liang Zhu and John Heidemann 2017. LDplayer: DNS Experimentation at Scale (abstract with poster). Technical Report ISI-TR-2017-721. USC/Information Sciences Institute. [PDF] [Code] ["Details"]
  • Liang Zhu and John Heidemann 2017. LDplayer: DNS Experimentation at Scale (poster abstract). Proceedings of the SIGCOMM Posters and Demos (Aug. 2017), 60–62. [DOI] [PDF] [Code] ["Details"]
  • Lan Wei and John Heidemann 2017. Does Anycast Hang up on You? IEEE. [PDF] ["Details"]
  • Jelena Mirkovic, Genevieve Bartlett, John Heidemann, Hao Shi and Xiyue Deng 2017. Do You See Me Now? Sparsity in Passive Observations of Address Liveness. IEEE International Workshop on Traffic Monitoring and Analaysis (Dublin, Ireland, Jul. 2017), to appear. [DOI] [PDF] ["Details"]
  • John Heidemann 2017. Digging in to Ground Truth in Network Measurements. Talk at the Network Traffic Measurement and Analysis PhD School. [PDF] ["Details"]
  • Moritz Müller, Giovane C. M. Moura, Ricardo de O. Schmidt and John Heidemann 2017. Recursives in the Wild: Engineering Authoritative DNS Servers. Technical Report ISI-TR-720. USC/Information Sciences Institute. [PDF] ["Details"]
  • Wouter B. de Vries, Ricardo de O. Schmidt, Wes Haraker, John Heidemann, Pieter-Tjerk de Boer and Aiko Pras 2017. Verfploeter: Broad and Load-Aware Anycast Mapping. Technical Report ISI-TR-719. USC/Information Sciences Institute. [PDF] [Dataset] ["Details"]
  • Hang Guo and John Heidemann 2017. Detecting ICMP Rate Limiting in the Internet. Technical Report ISI-TR-717. USC/Information Sciences Institute. [PDF] ["Details"]
  • Ricardo de O. Schmidt, John Heidemann and Jan Harm Kuipers 2017. Anycast Latency: How Many Sites Are Enough? Proceedings of the Passive and Active Measurement Workshop (Sydney, Australia, Mar. 2017), to appear. [PDF] ["Details"]
  • Liang Zhu and John Heidemann 2017. Infrastructure for Experimental Replay and Mutation of DNS Queries. Talk at Active Internet Measurement Workshop. [PDF] ["Details"]
  • John Heidemann 2017. Collecting and Visualizing Outages Over the Long Haul. Talk at Active Internet Measurement Workshop. [PDF] ["Details"]
  • John Heidemann 2017. DNS Privacy, Service Management, and Research: Friends or Foes. Talk at ISOC NDSS Workshop on DNS Privacy . [PDF] ["Details"]
  • Lan Wei and John Heidemann 2017. Does Anycast Hang up on You? (extended). Technical Report ISI-TR-716. USC/Information Sciences Institute. [PDF] ["Details"]

2016

  • John Heidemann 2016. Distributed Denial-of-Service: What Datasets Can Help? Invited talk at ACM Annual Computer Security Applications Conference. [PDF] ["Details"]
  • Anant Shah, Romain Fontugne and Christos Papadopoulos 2016. Towards Characterizing International Routing Detours. Proceedings of the 12th Asian Internet Engineering Conference (AINTEC) (Bangkok, Thailand, Nov. 2016), to appear. ["Details"]
  • Giovane C. M. Moura, Ricardo de O. Schmidt, John Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei and Christian Hesselman 2016. Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event. Proceedings of the ACM Internet Measurement Conference (Nov. 2016). [DOI] [PDF] ["Details"]
  • John Heidemann, Ricardo de O. Schmidt and Jan Harm Kuipers 2016. Anycast Latency: How Many Sites are Enough? Presentation at DNS-OARC Meeting. [PDF] ["Details"]
  • John Heidemann, Giovane C. M. Moura, Ricardo de O. Schmidt, and Wouter B. de Vries, Moritz Muller, Lan Wei and Christian Hesselman 2016. Anycast vs. DDoS: Evaluating Nov. 30. Presentation at DNS-OARC Meeting. [PDF] ["Details"]
  • Jelena Mirkovic, Genevieve Bartlett, John Heidemann, Hao Shi and Xiyue Deng 2016. Do You See Me Now? Sparsity in Passive Observations of Address Liveness (extended). Technical Report ISI-TR-2016-710. USC/Information Sciences Institute. [PDF] ["Details"]
  • Giovane C. M. Moura, Ricardo de O. Schmidt, John Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei and Christian Hesselman 2016. Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event (extended). Technical Report ISI-TR-2016-709b. USC/Information Sciences Institute. [PDF] ["Details"]
  • Ricardo de O. Schmidt, John Heidemann and Jan Harm Kuipers 2016. Anycast Latency: How Many Sites Are Enough? Technical Report ISI-TR-2016-708. USC/Information Sciences Institute. [PDF] ["Details"]
  • Z. Hu, L. Zhu, J. Heidemann, A. Mankin, D. Wessels and P. Hoffman 2016. Specification for DNS over Transport Layer Security (TLS) . Technical Report 7858. Internet Request For Comments. [DOI] [PDF] ["Details"]
  • Abdul Qadeer, John Heidemann and Kensuke Fukuda 2016. Improving Long-term Accuracy of DNS Backscatter for Monitoring of Internet-Wide Malicious Activity (poster). Technical Report ISI-TR-2016-707. USC/Information Sciences Institute. [PDF] [Dataset] ["Details"]
  • Manaf Gharaibeh, Han Zhang, Christos Papadopoulos and John Heidemann 2016. Assessing Co-Locality of IP Blocks. Proceedings of the 19th IEEE Global Internet Symposium (San Francisco, CA, USA, Apr. 2016). [PDF] ["Details"]
  • Han Zhang, Manaf Gharaibeh, Spiros Thanasoulas and Christos Papadopoulos 2016. BotDigger: Detecting DGA Bots in a Single Network. Proceedings of the IEEE International Workshop on Traffic Monitoring and Analaysis (Louvain La Neuve, Belgium, Apr. 2016), 16–21. [DOI] ["Details"]
  • Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin and Nikita Somaiya 2016. T-DNS: Connection-Oriented DNS to Improve Privacy and Security (poster abstract). Technical Report ISI-TR-2016-706. USC/Information Sciences Institute. [PDF] ["Details"]
  • Calvin Ardi and John Heidemann 2016. AuntieTuna: Personalized Content-Based Phishing Detection. Proceedings of the NDSS Workshop on Usable Security (San Diego, California, USA, Feb. 2016), to appear. [PDF] [Code] ["Details"]
  • John Heidemann 2016. New Opportunities for Research and Experiments in Internet Naming And Identification. Talk at Active Internet Measurement Workshop. [PDF] ["Details"]
  • Han Zhang, Manaf Gharaibeh, Spiros Thanasoulas and Christos Papadopoulos 2016. BotDigger: Detecting DGA Bots in a Single Network. Technical Report CS-16-101. Colorado State University . ["Details"]

2015

  • Manaf Gharaibeh, Han Zhang, Christos Papadopoulos and John Heidemann 2015. Assessing Co-Locality of IP Blocks. Technical Report CS-15-103. Colorado State University Department of Computer Science . [PDF] ["Details"]
  • Kensuke Fukuda and John Heidemann 2015. Detecting Malicious Activity with DNS Backscatter. Proceedings of the ACM Internet Measurement Conference (Tokyo, Japan, Oct. 2015), 197–210. [DOI] [PDF] [Dataset] ["Details"]
  • Kensuke Fukuda and John Heidemann 2015. Detecting Malicious Activity with DNS Backscatter (extended). Technical Report ISI-TR-2015-704. USC/Information Sciences Institute. [PDF] [Dataset] ["Details"]
  • Abdulla Alwabel, John Healy, John Heidemann, Brian Luu, Yuri Pradkin and Rasoul Safavian. 2015. Evaluating Externally Visible Outages. Technical Report ISI-TR-701. USC/Information Sciences Institute. [PDF] ["Details"]
  • Calvin Ardi and John Heidemann 2015. Poster: Lightweight Content-based Phishing Detection. Technical Report ISI-TR-2015-698. USC/Information Sciences Institute. [PDF] ["Details"]
  • Zi Hu, Liang Zhu, John Heidemann, Allison Mankin, Duane Wessels and Paul Hoffman 2015. TLS for DNS: Initiation and Performance Considerations, draft-ietf-dprive-start-tls-for-dns-00. IETF Internet Draft. [PDF] ["Details"]
  • Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin and Nikita Somaiya 2015. Connection-Oriented DNS to Improve Privacy and Security. Proceedings of the 36thIEEE Symposium on Security and Privacy (San Jose, Californa, USA, May 2015), 171–186. [DOI] [PDF] [Code] [Dataset] ["Details"]
  • Xun Fan, Ethan Katz-Bassett and John Heidemann 2015. Assessing Affinity Between Users and CDN Sites. Proceedings of the 7th IEEE International Workshop on Traffic Monitoring and Analaysis (Barcelona, Spain, Apr. 2015). [DOI] [PDF] [Dataset] ["Details"]
  • Liang Zhu, Duane Wessels, Allison Mankin and John Heidemann 2015. Measuring DANE TLSA Deployment. Proceedings of the 7th IEEE International Workshop on Traffic Monitoring and Analaysis (Barcelona, Spain, Apr. 2015), 219–232. [DOI] [PDF] [Code] ["Details"]
  • Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin and Nikita Somaiya 2015. Connection-Oriented DNS to Improve Privacy and Security (extended). Technical Report ISI-TR-2015-695. USC/Information Sciences Institute. [PDF] [Code] ["Details"]
  • Liang Zhu, Zi Hu and John Heidemann 2015. Evaluation of Future DNSSEC Response Sizes at a Root and a TLD Server. [PDF] ["Details"]

2014

  • John Heidemann 2014. Towards Understanding Internet Reliability. Presentation at DHS Cyber Security Division R&D Showcase and Technical Workshop. [PDF] ["Details"]
  • Lin Quan, John Heidemann and Yuri Pradkin 2014. When the Internet Sleeps: Correlating Diurnal Networks With External Factors. Proceedings of the ACM Internet Measurement Conference (Vancouver, BC, Canada, Nov. 2014), 87–100. [DOI] [PDF] ["Details"]
  • John Heidemann 2014. Internet Populations (Good and Bad): Measurement, Estimation, and Correlation. Presentation at ICERM Workshop on Cybersecurity. [PDF] ["Details"]
  • Liang Zhu, Duane Wessels, Allison Mankin and John Heidemann 2014. Measuring DANE TLSA Deployment. Presentation at DNS-OARC Fall Workshop. [PDF] ["Details"]
  • Calvin Ardi and John Heidemann 2014. Web-scale Content Reuse Detection (extended). Technical Report ISI-TR-2014-692. USC/Information Sciences Institute. [PDF] ["Details"]
  • Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin and Nikita Somaiya 2014. T-DNS: Connection-Oriented DNS to Improve Privacy and Security (extended). Technical Report ISI-TR-2014-693. USC/Information Sciences Institute. [PDF] [Code] ["Details"]
  • John Heidemann 2014. T-DNS: Connection-Oriented DNS to Improve Privacy and Security. Presentation at the Spring DNS-OARC Meeting. [PDF] ["Details"]
  • Lin Quan, John Heidemann and Yuri Pradkin 2014. When the Internet Sleeps: Correlating Diurnal Networks With External Factors (extended). Technical Report ISI-TR-2014-691b. USC/Information Sciences Institute. [PDF] ["Details"]
  • Lin Quan, John Heidemann and Yuri Pradkin 2014. When the Internet Sleeps: Correlating Diurnal Networks With External Factors (extended). Technical Report ISI-TR-2014-691. USC/Information Sciences Institute. [PDF] ["Details"]
  • Michael E. Fisk and Curtis L. Hash 2014. FileMap: Map-Reduce Program Execution on Loosely-Coupled Distributed Systems. Proceedings of the 4th International Workshop on Cloud Data and Platforms (Amsterdam, the Netherlands, Apr. 2014), to appear. [DOI] [Code] ["Details"]
  • John Heidemann 2014. Sharing Network Data: Bright Gray Days Ahead. Keynote talk at Passive and Active Measurements Conference. [PDF] ["Details"]
  • Zi Hu, Liang Zhu, Calvin Ardi, Ethan Katz-Bassett, Harsha V. Madhyastha, John Heidemann and Minlan Yu 2014. The Need for End-to-End Evaluation of Cloud Availability. Proceedings of the Passive and Active Measurement Workshop (Marina del Rey, California, USA, Mar. 2014), 119–130. [DOI] [PDF] ["Details"]
  • John Heidemann 2014. Broadening Network Performance: The Edge and Outages. Presentation at the Second perfSONAR NSF Workshop. [PDF] ["Details"]
  • Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin and Nikita Somaiya 2014. T-DNS: Connection-Oriented DNS to Improve Privacy and Security. Technical Report ISI-TR-2014-688. USC/Information Sciences Institute. [PDF] ["Details"]
  • Lin Quan, John Heidemann and Yuri Pradkin 2014. Visualizing Sparse Internet Events: Network Outages and Route Changes. Computing. 96, 1 (Jan. 2014), 39–51. [DOI] [PDF] ["Details"]

2013

  • Xue Cai, John Heidemann and Walter Willinger 2013. A Holistic Framework for Bridging Regional Threats to User QoE. Technical Report ISI-TR-2013-687. USC/Information Sciences Institute. [PDF] ["Details"]
  • Alefiya Hussain, Yuri Pradkin and John Heidemann 2013. Replay of Malicious Traffic in Network Testbeds. Proceedings of the 13th IEEE Conference on Technologies for Homeland Security (HST) (Waltham, Massachusetts, USA, Nov. 2013), (to appear). [PDF] ["Details"]
  • Matt Calder, Xun Fan, Zi Hu, Ethan Katz-Bassett, John Heidemann and Ramesh Govindan 2013. Mapping the Expansion of Google’s Serving Infrastructure. Proceedings of the ACM Internet Measurement Conference (Barcelona, Spain, Oct. 2013), 313–326. [PDF] ["Details"]
  • Lin Quan, John Heidemann and Yuri Pradkin 2013. Trinocular: Understanding Internet Reliability Through Adaptive Probing. Proceedings of the ACM SIGCOMM Conference (Hong Kong, China, Aug. 2013), 255–266. [DOI] [PDF] ["Details"]
  • Matt Calder, Xun Fan, Zi Hu, Ethan Katz-Bassett, John Heidemann and Ramesh Govindan 2013. Mapping the Expansion of Google’s Serving Infrastructure. Technical Report TR 13-935. University of Southern California Computer Science Department. [PDF] ["Details"]
  • John Heidemann 2013. Evaluating Anycast in the Domain Name System. Presentation at DNS-OARC Meeting. [PDF] ["Details"]
  • Xun Fan, John Heidemann and Ramesh Govindan 2013. Evaluating Anycast in the Domain Name System. Proceedings of the IEEE Infocom (Turin, Italy, Apr. 2013), 1681–1689. [PDF] ["Details"]
  • Lin Quan, John Heidemann and Yuri Pradkin 2013. Poster Abstract: Towards Active Measurements of Edge Network Outages. Proceedings of the Passive and Active Measurement Workshop (Hong Kong, China, Mar. 2013), 276–279. [DOI] [PDF] ["Details"]
  • John Heidemann 2013. Long-term Data Collection and Analysis of Outages at the Edge. Talk given at CAIDA Workshop on Active Internet Measurement Systems. [PDF] ["Details"]
  • John Heidemann 2013. Active Probing of Edge Networks: Outages During Hurricane Sandy. Talk given at NANOG57 as part of panel hosted by James Cowie. [PDF] ["Details"]
  • John Heidemann 2013. Active Probing of Edge Networks: Hurricane Sandy and Beyond. Talk given at FCC Workshop on Network Resiliency. [PDF] ["Details"]
  • John Heidemann 2013. Third-Party Measurement of Network Outages in Hurricane Sandy. Proceedings of the FCC Workshop on Network Resiliency (Brooklyn, New York, USA, Feb. 2013). [PDF] ["Details"]
  • Lin Quan, John Heidemann and Yuri Pradkin 2013. Visualizing Sparse Internet Events: Network Outages and Route Changes. Computing. (Jan. 2013), to appear. [DOI] [PDF] ["Details"]
  • John Heidemann and Walter Willinger 2013. Internet Visualization. Computing. 96, 1 (2013), 1–2. [DOI] [PDF] ["Details"]

2012

  • John Heidemann, Lin Quan and Yuri Pradkin 2012. A Preliminary Analysis of Network Outages During Hurricane Sandy. Technical Report ISI-TR-2008-685b. USC/Information Sciences Institute. [PDF] ["Details"]
  • Lin Quan, John Heidemann and Yuri Pradkin 2012. Visualizing Sparse Internet Events: Network Outages and Route Changes. Proceedings of the First ACM Workshop on Internet Visualization (Boston, Mass., USA, Nov. 2012). [PDF] ["Details"]
  • John Heidemann 2012. Broadening DNS Research: beyond just DNS anonymization (work in progress). Talk at ISC/CAIDA Data Collaboration Workshop. [PDF] ["Details"]
  • Xue Cai, John Heidemann, Balachander Krishnamurthy and Walter Willinger 2012. An Organization-Level View of the Internet and its Implications (Extended). Technical Report ISI-TR-2009-679. USC/Information Sciences Institute. [PDF] ["Details"]
  • Xun Fan, John Heidemann and Ramesh Govindan 2012. Characterizing Anycast in the Domain Name System. Technical Report ISI-TR-2011-681. USC/Information Sciences Institute. [PDF] ["Details"]
  • Lin Quan, John Heidemann and Yuri Pradkin 2012. Detecting Internet Outages with Precise Active Probing (extended). Technical Report ISI-TR-2012-678b. USC/Information Sciences Institute. [PDF] ["Details"]
  • Zi Hu and John Heidemann 2012. Towards Geolocation of Millions of IP Addresses. Proceedings of the ACM Internet Measurement Conference (Boston, MA, USA, 2012), 123–130. [DOI] [PDF] ["Details"]
  • Zi Hu and John Heidemann 2012. Towards Geolocation of Millions of IP Addresses. Technical Report ISI-TR-2012-680. USC/Information Sciences Institute. [PDF] ["Details"]

2011

  • Xun Fan, John Heidemann and Ramesh Govindan 2011. Identifying and Characterizing Anycast in the Domain Name System. Technical Report ISI-TR-2011-671. USC/Information Sciences Institute. [PDF] ["Details"]
  • Lin Quan and John Heidemann 2011. Detecting Internet Outages with Active Probing (extended). Technical Report ISI-TR-2011-672. USC/Information Sciences Institute. [PDF] ["Details"]
  • Genevieve Bartlett, John Heidemann and Christos Papadopoulos 2011. Low-Rate, Flow-Level Periodicity Detection. Proceedings of the 14th IEEE Global Internet Symposium (Shanghai, China, Apr. 2011), 804–809. [DOI] [PDF] ["Details"]

2010

  • Xue Cai, John Heidemann, Balachander Krishnamurthy and Walter Willinger 2010. Towards an AS-to-Organization Map. Proceedings of the ACM Internet Measurement Conference (Melbourne, Australia, Nov. 2010), 199–205. [DOI] [PDF] ["Details"]
  • Xun Fan and John Heidemann 2010. Selecting Representative IP Addresses for Internet Topology Studies. Proceedings of the ACM Internet Measurement Conference (Melbourne, Australia, Nov. 2010), 411–423. [DOI] [PDF] ["Details"]
  • Lin Quan and John Heidemann 2010. On the Characteristics and Reasons of Long-lived Internet Flows. Proceedings of the ACM Internet Measurement Conference (Melbourne, Australia, Nov. 2010), 444–450. [DOI] [PDF] ["Details"]
  • Xue Cai and John Heidemann 2010. Understanding Block-level Address Usage in the Visible Internet. Proceedings of the ACM SIGCOMM Conference (New Delhi, India, Aug. 2010), 99–110. [DOI] [PDF] ["Details"]
  • Gautam Thatte, Urbashi Mitra and John Heidemann 2010. Parametric Methods for Anomaly Detection in Aggregate Traffic. ACM/IEEE Transactions on Networking. 19, 2 (Aug. 2010), 512–525. [DOI] [PDF] ["Details"]
  • Xue Cai and John Heidemann 2010. Understanding Block-level Address Usage in the Visible Internet (extended). Technical Report ISI-TR-2009-665. USC/Information Sciences Institute. [PDF] ["Details"]
  • Xun Fan and John Heidemann 2010. Selecting Representative IP Addresses for Internet Topology Studies. Technical Report ISI-TR-2010-666. USC/Information Sciences Institute. [PDF] ["Details"]
  • John Heidemann 2010. Mapping the Internet to Assist Cyber-Defense. Invited talk at Spring Electronic Crimes Task Force Meeting. [PDF] ["Details"]
  • Lin Quan and John Heidemann 2010. On the Characteristics and Reasons of Long-lived Internet Flows (extended). Technical Report ISI-TR-2010-667. USC/Information Sciences Institute. [PDF] ["Details"]
  • Chris Wilcox, Christos Papadopoulos and John Heidemann 2010. Correlating Spam Activity with IP Address Characteristics. Proceedings of the IEEE Global Internet Symposium (San Diego, California, USA, Mar. 2010), 1–6. [DOI] [PDF] ["Details"]

2009

  • Genevieve Bartlett, John Heidemann and Christos Papadopoulos 2009. Using Low-Rate Flow Periodicities for Anomaly Detection: Extended. Technical Report ISI-TR-2009-661. USC/Information Sciences Institute. [PDF] ["Details"]
  • Gautam Thatte, Urbashi Mitra and John Heidemann 2009. Parametric Methods for Anomaly Detection in Aggregate Traffic. Technical Report ISI-TR-2009-663b. USC/Information Sciences Institute. [PDF] ["Details"]
  • Gautam Thatte, Urbashi Mitra and John Heidemann 2009. Parametric Methods for Anomaly Detection in Aggregate Traffic. Technical Report ISI-TR-2009-663. USC/Information Sciences Institute. [PDF] ["Details"]
  • John Heidemann and Christos Papadopoulos 2009. Uses and Challenges for Network Datasets. Proceedings of the IEEE Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH) (Washington, DC, USA, Mar. 2009), 73–82. [DOI] [PDF] ["Details"]
  • Xue Cai and John Heidemann 2009. Understanding Address Usage in the Visible Internet. Technical Report ISI-TR-2009-656. USC/Information Sciences Institute. [PDF] ["Details"]
  • Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra and Usman Riaz 2009. Remote Detection of Bottleneck Links Using Spectral and Statistical Methods. Computer Networks. 53, 3 (Feb. 2009), 279–298. [DOI] [PDF] ["Details"]
  • John Heidemann 2009. USC/LANDER Passive and Active Data Collection. Lightning talk at CAIDA AIMS Workshop. [PDF] ["Details"]

2008

  • John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett and Joseph Bannister 2008. Census and Survey of the Visible Internet. Proceedings of the ACM Internet Measurement Conference (Vouliagmeni, Greece, Oct. 2008), 169–182. [PDF] ["Details"]
  • Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra and Usman Riaz 2008. Remote Detection of Bottleneck Links Using Spectral and Statistical Methods. [PDF] ["Details"]
  • Xue Cai and John Heidemann 2008. Active Probing to Classify Internet Address Blocks (poster abstract). Proceedings of the ACM SIGCOMM Conference (Seattle, Washington, USA, Aug. 2008), to appear. [PDF] ["Details"]
  • Xue Cai and John Heidemann 2008. Active Probing to Classify Internet Address Blocks (poster abstract). Technical Report ISI-TR-2008-653. USC/Information Sciences Institute. [PDF] ["Details"]
  • Gautam Thatte, Urbashi Mitra and John Heidemann 2008. Detection of Low-Rate Attacks in Computer Networks. Proceedings of the 11th IEEE Global Internet Symposium (Phoenix, Arizona, USA, Apr. 2008), 1–6. [DOI] [PDF] ["Details"]
  • John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett and Joseph Bannister 2008. Census and Survey of the Visible Internet (extended). Technical Report ISI-TR-2008-649b. USC/Information Sciences Institute. [PDF] ["Details"]

2007

  • Genevieve Bartlett, John Heidemann and Christos Papadopoulos 2007. Understanding Passive and Active Service Discovery. Proceedings of the ACM Internet Measurement Conference (San Diego, California, USA, Oct. 2007), to appear. [PDF] ["Details"]
  • John Heidemann and Yuri Pradkin 2007. Mapping the Internet Address Space (Poster). (Aug. 2007). [Code] [Dataset] ["Details"]
  • Genevieve Bartlett, John Heidemann, Christos Papadopoulos and James Pepin 2007. Estimating P2P Traffic Volume at USC. Technical Report ISI-TR-2007-645. USC/Information Sciences Institute. [PDF] ["Details"]
  • Genevieve Bartlett, John Heidemann and Christos Papadopoulos 2007. Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing. Proceedings of the 10th IEEE Global Internet Symposium (Anchorage, Alaska, USA, May 2007). [PDF] ["Details"]
  • Genevieve Bartlett, John Heidemann and Christos Papadopoulos 2007. Understanding Passive and Active Service Discovery (extended). Technical Report ISI-TR-2007-642. USC/Information Sciences Institute. [PDF] ["Details"]
  • John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos and Joseph Bannister 2007. Exploring Visible Internet Hosts through Census and Survey. Technical Report ISI-TR-2007-640. USC/Information Sciences Institute. [PDF] [Code] [Dataset] ["Details"]
  • Rishi Sinha, Christos Papadopoulos and John Heidemann 2007. Internet Packet Size Distributions: Some Observations. Technical Report ISI-TR-2007-643. USC/Information Sciences Institute. [PDF] ["Details"]

2006

  • Genevieve Bartlett, John Heidemann and Christos Papadopoulos 2006. Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing (extended). Technical Report ISI-TR-2006-627. USC/Information Sciences Institute. [PDF] ["Details"]
  • Urbashi Mitra, Antonio Ortega, John Heidemann and Christos Papadopoulos 2006. Detecting and Identifying Malware: A New Signal Processing Goal. IEEE Signal Processing Magazine. 23, 5 (Sep. 2006), 107–111. [PDF] ["Details"]
  • Alefiya Hussain, John Heidemann and Christos Papadopoulos 2006. Identification of Repeated Denial of Service Attacks. Proceedings of the IEEE Infocom (Barcelona, Spain, Apr. 2006), to appear. [PDF] ["Details"]
  • Kun-chan Lan and John Heidemann 2006. A Measurement Study of Correlation of Internet Flow Characteristics. Computer Networks. 50, 1 (Jan. 2006), 46–62. [PDF] ["Details"]

2005

  • Kun-chan Lan and John Heidemann 2005. On the feasibility of utilizing correlations between user populations for traffic inference. Proceedings of the 30th IEEE International Conference on Local Computer Networks (Sydney, Australia, Nov. 2005), 132–139. [PDF] ["Details"]
  • Xuan Chen and John Heidemann 2005. Flash Crowd Mitigation via Adaptive Admission Control Based on Application-Level Observation. ACM Transactions on Internet Technology. 5, 3 (Aug. 2005), 532–562. [DOI] [PDF] ["Details"]
  • Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin, John Heidemann, Christos Papadopoulos and Joseph Bannister 2005. Experiences with a Continuous Network Tracing Infrastructure. Proceedings of the ACM SIGCOMM MineNet Workshop (Philadelphia, PA, USA, Aug. 2005), 185–190. [PDF] ["Details"]
  • Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, Usman Riaz and Alefiya Hussain 2005. Spectral Analysis of Bottleneck Traffic. Technical Report USC-CSD-TR-05-854. University of Southern California Computer Science Department. [PDF] ["Details"]
  • Alefiya Hussain, Genevieve Bartlett, Yuri Pryadkin, John Heidemann, Christos Papadopoulos and Joseph Bannister 2005. Experiences with a Continuous Network Tracing Infrastructure. Technical Report ISI-TR-2005-601. USC/Information Sciences Institute. [PDF] ["Details"]
  • Debojyoti Dutta, Abhimanyu Das, Ashish Goel, Ahmed Helmy and John Heidemann 2005. Low State Fairness: Lower Bounds and Practical Enforcement. Proceedings of the IEEE Infocom (Miami, Florida, USA, Mar. 2005), to appear. [PDF] ["Details"]
  • Rishi Sinha, Christos Papadopoulos and John Heidemann 2005. Fingerprinting Internet Paths using Packet Pair Dispersion. Technical Report 06-876. University of Southern California Computer Science Department. [PDF] ["Details"]

2004

  • Alefiya Hussain, John Heidemann and Christos Papadopoulos 2004. Distinguishing between Single and Multi-source Attacks using Signal Processing. Computer Networks. 46, 4 (Nov. 2004), 479–503. [PDF] ["Details"]
  • Di-Fa Chang, Ramesh Govindan and John Heidemann 2004. Locating BGP Missing Routes Using Multiple Perspectives. ACM SIGCOMM Workshop Network Troubleshooting (Portland, Oregon, USA, Sep. 2004), 301–306. [PDF] ["Details"]
  • Xinming He, Christos Papadopoulos, John Heidemann and Alefiya Hussain 2004. Spectral Characteristics of Saturated Links. Technical Report USC-CSD-TR-827. University of Southern California Computer Science Department. [PDF] ["Details"]
  • Di-Fa Chang, Ramesh Govindan and John Heidemann 2004. Locating BGP Missing Routes Using Multiple Perspectives. Technical Report ISI-TR-2004-588. USC/Information Sciences Institute. [PDF] ["Details"]
  • Alefiya Hussain, Aman Kapoor and John Heidemann 2004. The Effect of Detail on Ethernet Simulation. Proceedings of the ACM Workshop on Parallel and Distributed Simulation (Kufstein, Austria, May 2004), 97–104. [PDF] ["Details"]
  • Xuan Chen and John Heidemann 2004. Detecting Early Worm Propagation through Packet Matching. Technical Report ISI-TR-2004-585. USC/Information Sciences Institute. [PDF] ["Details"]

2003

  • Di-Fa Chang, Ramesh Govindan and John Heidemann 2003. The Temporal and Topological Characteristics of BGP Path Changes. Proceedings of the International Conference on Network Protocols (Atlanta, Georga, USA, Nov. 2003), 190–199. [PDF] ["Details"]
  • Alefiya Hussain, John Heidemann and Christos Papadopoulos 2003. A Framework for Classifying Denial of Service Attacks. Proceedings of the ACM SIGCOMM Conference (Karlsruhe, Germany, Aug. 2003), 99–110. [PDF] ["Details"]
  • Alefiya Hussain, John Heidemann and Christos Papadopoulos 2003. Identification of Repeated DoS Attacks using Network Traffic Forensics. Technical Report ISI-TR-2003-577b. USC/Information Sciences Institute. [PDF] ["Details"]
  • Kun-Chan Lan, Alefiya Hussain and Debojyoti Dutta 2003. Effect of Malicious Traffic on the Network. Proceedings of the PAM Workshop (Apr. 2003). [PDF] ["Details"]
  • Kun-chan Lan and John Heidemann 2003. A Tool for RApid Model Parameterization and its Applications. Proceedings of the Workshop on Models, Methods and Tools for Reproducible Network Research (MoMeTools) (Karlsruhe, Germany, Aug. 2003), to appear. [PDF] ["Details"]
  • Xuan Chen and John Heidemann 2003. Experimental Evaluation of an Adaptive Flash Crowd Protection System. Technical Report IIS-TR-2003-573. USC/Information Sciences Institute. [PDF] ["Details"]
  • Kun-chan Lan and John Heidemann 2003. On the correlation of Internet flow characteristics. Technical Report ISI-TR-574. USC/Information Sciences Institute. [PDF] ["Details"]
  • Alefiya Hussain, John Heidemann and Christos Papadopoulos 2003. A Framework for Classifying Denial of Service Attacks-extended. Technical Report ISI-TR-2003-569b. USC/Information Sciences Institute. [PDF] ["Details"]
  • Xuan Chen and John Heidemann 2003. Preferential Treatment for Short Flows to Reduce Web Latency. Computer Networks. 41, 6 (Apr. 2003), 779–794. ["Details"]
  • Debojyoti Dutta, Ashish Goel and John Heidemann 2003. Oblivious AQM and Nash Equilibria. Proceedings of the IEEE Infocom (San Francisco, California, USA, Mar. 2003), 106–113. [PDF] ["Details"]

2002

  • Di-Fa Chang, Ramesh Govindan and John Heidemann 2002. An Empirical Study of Router Response to Large BGP Routing Table Load. Proceedings of the ACM SIGCOMM Internet Measurement Workshop (Marseille, France, Nov. 2002), 203–208. [PDF] ["Details"]
  • Debojyoti Dutta, Ashish Goel and John Heidemann 2002. Faster Network Design with Scenario Pre-filtering. Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Fort Worth, Texas, USA, Oct. 2002), 237–246. [PDF] ["Details"]
  • Purushotham Kamath, Kun-chan Lan, John Heidemann, Joe Bannister and Joe Touch 2002. Generation of High Bandwidth Network Traffic Traces. Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Fort Worth, Texas, USA, Oct. 2002), 401–410. [PDF] ["Details"]
  • Kun-chan Lan and John Heidemann 2002. Rapid model parameteration from traffic measurement. Technical Report 561. USC/Information Sciences Institute. [PDF] ["Details"]
  • Christos Papadopoulos and John Heidemann 2002. Using Ns in the Classroom and Lab. Proceedings of the ACM SIGCOMM Workshop on Computer Networking: Curriculum Designs and Educational Challenges (Pittsburgh, PA, USA, Aug. 2002), 45–46. [PDF] ["Details"]
  • Debojyoti Dutta, Ashish Goel and John Heidemann 2002. Oblivious AQM and Nash Equilibria. Technical Report 02-764. University of Southern California Computer Science Department. [PDF] ["Details"]
  • Debojyoti Dutta, Ashish Goel and John Heidemann 2002. Oblivious AQM and Nash Equilibria (abstract for SIGCOMM Poster). ACM Computer Communication Review. 32, 3 (Jul. 2002), 20. [PDF] ["Details"]
  • Kun-Chan Lan and John Heidemann 2002. Rapid model parameteration from traffic measurement. ACM Transactions on Modeling and Computer Simulations. 12, 3 (Jul. 2002), 201–229. [PDF] ["Details"]
  • Xuan Chen and John Heidemann 2002. Flash crowd mitigation via an adaptive admission control based on application-level measurement. Technical Report ISI-TR-557. USC/Information Sciences Institute. [PDF] ["Details"]
  • Debojyoti Dutta and Ashish Goel 2002. Router mechanisms and Nash Equilibria. Technical Report 02-758. University of Southern California Computer Science Department. ["Details"]

2001

  • Di-Fa Chang, Ramesh Govindan and John Heidemann 2001. An Empirical Study of Router Response to Large BGP Routing Table Load. Technical Report ISI-TR-2001-552. USC/Information Sciences Institute. [PDF] ["Details"]
  • Debojyoti Dutta, Ashish Goel and John Heidemann 2001. Faster Network Design with Scenario Pre-filtering. Technical Report ISI-TR-550. USC/Information Sciences Institute. [PDF] ["Details"]
  • Xuan Chen and John Heidemann 2001. Preferential Treatment for Short Flows to Reduce Web Latency. Technical Report ISI-TR-548. USC/Information Sciences Institute. [PDF] ["Details"]
  • John Heidemann, Kevin Mills and Sri Kumar 2001. Expanding Confidence in Network Simulation. IEEE Network Magazine. 15, 5 (Sep. 2001), 58–63. [PDF] ["Details"]
  • Kun-chan Lan and John Heidemann 2001. Structural Modeling of RealAudio Traffic. Technical Report ISI-TR-544. USC/Information Sciences Institute. [PDF] ["Details"]
  • Polly Huang and John Heidemann 2001. Minimizing Routing State for Light-Weight Network Simulation. Proceedings of the International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (Cincinnati, Ohio, USA, Aug. 2001), to appear. [PDF] ["Details"]
  • John Heidemann, Nirupama Bulusu, Jeremy Elson, Chalermek Intanagonwiwat, Kun-chan Lan, Ya Xu, Wei Ye, Deborah Estrin and Ramesh Govindan 2001. Effects of Detail in Wireless Network Simulation. Proceedings of the SCS Multiconference on Distributed Simulation (Phoenix, Arizona, USA, Jan. 2001), 3–11. [PDF] ["Details"]
  • Polly Huang and John Heidemann 2001. Capturing TCP Burstiness in Light-weight Simulations. Proceedings of the SCS Conference on Communication Networks and Distributed Systems Modeling and Simulation (Phoenix, Arizona, USA, Jan. 2001), 90–96. [PDF] ["Details"]

2000

  • Deborah Estrin, Mark Handley, John Heidemann, Steven McCanne, Ya Xu and Haobo Yu 2000. Network Visualization with the Nam, VINT Network Animator. IEEE Computer. 33, 11 (Nov. 2000), 63–68. [DOI] [PDF] ["Details"]
  • John Heidemann, Nirupama Bulusu, Jeremy Elson, Chalermek Intanagonwiwat, Kun-chan Lan, Ya Xu, Wei Ye, Deborah Estrin, Ramesh Govindan and John Heidemann 2000. Effects of Detail in Wireless Network Simulation. [PDF] ["Details"]
  • Polly Huang and John Heidemann 2000. Capturing TCP Burstiness in Light-weight Simulations. Technical Report 92. Institut für Technische Informatik, ETH Zürich. [PDF] ["Details"]
  • Lee Breslau, Deborah Estrin, Kevin Fall, Sally Floyd, John Heidemann, Ahmed Helmy, Polly Huang, Steven McCanne, Kannan Varadhan, Ya Xu and Haobo Yu 2000. Advances in Network Simulation. IEEE Computer. 33, 5 (May 2000), 59–67. [PDF] ["Details"]
  • John Heidemann, Kevin Mills and Sri Kumar 2000. Expanding Confidence in Network Simulation. Technical Report 00-522. USC/Information Sciences Institute. [PDF] ["Details"]
  • M. Allman, S. Dawkins, D. Glover, J. Griner, D. Tran, T. Henderson, J. Heidemann, J. Touch, H. Kruse, S. Ostermann, K. Scott and J. Semke 2000. Ongoing TCP Research Related to Satellites. Technical Report 2760. Internet Request For Comments. [PDF] ["Details"]
  • Lars Eggert, John Heidemann and Joe Touch 2000. Effects of Ensemble-TCP. ACM Computer Communication Review. 30, 1 (Jan. 2000), 15–29. [PDF] ["Details"]