skip to main content
10.1145/1028788.1028824acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
Article

Strategies for sound internet measurement

Published:25 October 2004Publication History

ABSTRACT

Conducting an Internet measurement study in a sound fashion can be much more difficult than it might first appear. We present a number of strategies drawn from experiences for avoiding or overcoming some of the pitfalls. In particular, we discuss dealing with errors and inaccuracies; the importance of associating <i>meta-data</i> with measurements; the technique of calibrating measurements by examining outliers and testing for consistencies; difficulties that arise with large-scale measurements; the utility of developing a discipline for reliably reproducing analysis results; and issues with making datasets publicly available. We conclude with thoughts on the sorts of tools and community practices that can assist researchers with conducting sound measurement studies.

References

  1. M. Allman. Private communication. 2001.]]Google ScholarGoogle Scholar
  2. M. Allman, E. Blanton, and W. Eddy. A Scalable System for Sharing Internet Measurements. Proc. PAM 2002.]]Google ScholarGoogle Scholar
  3. M. Allman, W. Eddy and S. Ostermann. Estimating Loss Rates With TCP. ACM Performance Evaluation Review, 31(3). 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Barford. Private communication. 2000.]]Google ScholarGoogle Scholar
  5. S. Floyd and V. Paxson. Difficulties in Simulating the Internet. IEEE/ACM Transactions on Networking 9(4):392--403. 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Fraleigh et al. Packet-Level Traffic Measurements from the Sprint IP Backbone. IEEE Network 17(6). 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Gilat. MATLAB: An Introduction with Applications. Wiley Text Books. 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Handley, C. Kreibich and V. Paxson. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics. Proc. USENIX Security Symposium. 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Heidemann, K. Mills, and S. Kumar. Expanding Confidence in Network Simulation. IEEE Network, 15(5):58--63. 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Jaiswal et al. Measurement and Classification of Out-of-Sequence Packets in a Tier-1 IP Backbone. Proc. ACM SIGCOMM IMW, 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. E. Kohler. ipsumdump. http:www//icir.org/kohler/ipsumdump/. 2002.]]Google ScholarGoogle Scholar
  12. C. Kreibich. Design and Implementation of Netdude, a Framework for Packet Trace Manipulation. Proc. USENIX/FREENIX, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Martin-Löf. The Notion of Redundancy and Its Use as a Quantitative Measure of the Discrepancy between a Statistical Hypothesis and a Set of Observational Data. Scandinavian Journal of Statistics, 1(1), pp. 3--18. 1974.]]Google ScholarGoogle Scholar
  14. D. Mills. Network Time Protocol (Version 3): Specification, Implementation and Analysis. RFC 1305, Network Information Center, SRI International, Menlo Park, CA. March 1992.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Mills. Modelling and Analysis of Computer Network Clocks. Technical Report 92-5-2, Electrical Engineering Department, Univ. Delaware. mbox May 1992.]]Google ScholarGoogle Scholar
  16. Greg Minshall. TCPdpriv manual. http:www.acm.org/sigcomm/ITA/. 1996.]]Google ScholarGoogle Scholar
  17. J. Mogul. Trace anonymization misses the point. WWW 2002 panel on Web Measurements. http://www2002.org/presentations/mogul-n.pdf]]Google ScholarGoogle Scholar
  18. S. Moon, P. Skelly and D. Towsley. Estimation and Removal of Clock Skew from Network Delay Measurements. Proc. IEEE INFOCOM. 1999.]]Google ScholarGoogle ScholarCross RefCross Ref
  19. R. Pang and V. Paxson. A High-level Programming Environment for Packet Trace Anonymization and Transformation. Proc. ACM SIGCOMM. 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Pasztor and D. Veitch. PC Based Precision Timing Without GPS. Proc. ACM SIGMETRICS. 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. V. Paxson. Automated Packet Trace Analysis of TCP Implementations. Proc. ACM SIGCOMM. 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. V. Paxson. Measurements and Analysis of End-to-End Internet Dynamics. Ph.D. dissertation. Univ. California, Berkeley. 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. V. Paxson. On Calibrating Measurements of Packet Transit Times. Proc. ACM SIGMETRICS '98.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks 31(23--24), pp. 2435--2463, Dec. 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. T. Ptacek and T. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks. http:www.icir.org/vern/Ptacek-Newsham-Evasion-98.ps. Jan. 1998.]]Google ScholarGoogle Scholar
  26. R Development Core Team. R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria. 2003.]]Google ScholarGoogle Scholar
  27. W. Venables and B. Ripley. Modern Applied Statistics with S-PLUS. Springer. 1999.]]Google ScholarGoogle Scholar
  28. L. Wang et al. Observation and Analysis of BGP Behavior under Stress. Proc. ACM SIGCOMM IMW. 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. Xu, J. Fan, M. Ammar, S. Moon. Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-based Scheme. Proc. ICNP. 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. L. Zhang, Z. Liu, and C. Xia. Clock Synchronization Algorithms for Network Measurements. Proc. IEEE INFOCOM. 2002]]Google ScholarGoogle Scholar

Index Terms

  1. Strategies for sound internet measurement

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
        October 2004
        386 pages
        ISBN:1581138210
        DOI:10.1145/1028788

        Copyright © 2004 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 October 2004

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate277of1,083submissions,26%

        Upcoming Conference

        IMC '24
        ACM Internet Measurement Conference
        November 4 - 6, 2024
        Madrid , AA , Spain

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader