598 research outputs found

    Management and Service-aware Networking Architectures (MANA) for Future Internet Position Paper: System Functions, Capabilities and Requirements

    Get PDF
    Future Internet (FI) research and development threads have recently been gaining momentum all over the world and as such the international race to create a new generation Internet is in full swing: GENI, Asia Future Internet, Future Internet Forum Korea, European Union Future Internet Assembly (FIA). This is a position paper identifying the research orientation with a time horizon of 10 years, together with the key challenges for the capabilities in the Management and Service-aware Networking Architectures (MANA) part of the Future Internet (FI) allowing for parallel and federated Internet(s)

    Inside Dropbox: Understanding Personal Cloud Storage Services

    Get PDF
    Personal cloud storage services are gaining popularity. With a rush of providers to enter the market and an increasing of- fer of cheap storage space, it is to be expected that cloud storage will soon generate a high amount of Internet traffic. Very little is known about the architecture and the perfor- mance of such systems, and the workload they have to face. This understanding is essential for designing efficient cloud storage systems and predicting their impact on the network. This paper presents a characterization of Dropbox, the leading solution in personal cloud storage in our datasets. By means of passive measurements, we analyze data from four vantage points in Europe, collected during 42 consecu- tive days. Our contributions are threefold: Firstly, we are the first to study Dropbox, which we show to be the most widely-used cloud storage system, already accounting for a volume equivalent to around one third of the YouTube traffic at campus networks on some days. Secondly, we characterize the workload typical users in different environments gener- ate to the system, highlighting how this reflects on network traffic. Lastly, our results show possible performance bot- tlenecks caused by both the current system architecture and the storage protocol. This is exacerbated for users connected far from control and storage data-center

    What about their performance do free jazz improvisers agree upon? A case study

    Get PDF
    When musicians improvise freely together—not following any sort of script, predetermined harmonic structure, or “referent”—to what extent do they understand what they are doing in the same way as each other? And to what extent is their understanding privileged relative to outside listeners with similar levels of performing experience in free improvisation? In this exploratory case study, a saxophonist and a pianist of international renown who knew each other's work but who had never performed together before were recorded while improvising freely for 40 min. Immediately afterwards the performers were interviewed separately about the just-completed improvisation, first from memory and then while listening to two 5 min excerpts of the recording in order to prompt specific and detailed commentary. Two commenting listeners from the same performance community (a saxophonist and drummer) listened to, and were interviewed about, these excerpts. Some months later, all four participants rated the extent to which they endorsed 302 statements that had been extracted from the four interviews and anonymized. The findings demonstrate that these free jazz improvisers characterized the improvisation quite differently, selecting different moments to comment about and with little overlap in the content of their characterizations. The performers were not more likely to endorse statements by their performing partner than by a commenting listener from the same performance community, and their patterns of agreement with each other (endorsing or dissenting with statements) across multiple ratings—their interrater reliability as measured with Cohen's kappa—was only moderate, and not consistently higher than their agreement with the commenting listeners. These performers were more likely to endorse statements about performers' thoughts and actions than statements about the music itself, and more likely to endorse evaluatively positive than negative statements. But these kinds of statements were polarizing; the performers were more likely to agree with each other in their ratings of statements about the music itself and negative statements. As in Schober and Spiro (2014), the evidence supports a view that fully shared understanding is not needed for joint improvisation by professional musicians in this genre and that performing partners can agree with an outside listener more than with each other

    MikroTik Devices Landscape, Realistic Honeypots, and Automated Attack Classification

    Get PDF
    In 2018, several malware campaigns targeted and succeed to infect millions of low-cost routers (malwares e.g., VPN-Filter, Navidade, and SonarDNS). These routers were used, then, for all sort of cybercrimes: from DDoS attacks to ransomware. MikroTik routers are a peculiar example of low-cost routers. These routers are used to provide both last mile access to home users and are used in core network infrastructure. Half of the core routers used in one of the biggest Internet exchanges in the world are MikroTik devices. The problem is that vulnerable firmwares (RouterOS) used in homeusers houses are also used in core networks. In this paper, we are the first to quantify the problem that infecting MikroTik devices would pose to the Internet. Based on more than 4 TB of data, we reveal more than 4 million MikroTik devices in the world. Then, we propose an easy-to-deploy MikroTik honeypot and collect more than 17 millions packets, in 45 days, from sensors deployed in Australia, Brazil, China, India, Netherlands, and the United States. Finally, we use the collected data from our honeypots to automatically classify and assess attacks tailored to MikroTik devices. All our source-codes and analysis are publicly available. We believe that our honeypots and our findings in this paper foster security improvements in MikroTik devices worldwide

    The Internet of Names: A DNS Big Dataset - Actively Measuring 50% of the Entire DNS Name Space, Every Day

    Get PDF
    The Domain Name System (DNS) is part of the core infrastructure of the Internet. Tracking changes in the DNS over time provides valuable information about the evolution of the Internet’s infrastructure. Until now, only one large-scale approach to perform these kinds of measurements existed, passive DNS (pDNS). While pDNS is useful for applications like tracing security incidents, it does not provide sufficient information to reliably track DNS changes over time. We use a complementary approach based on active measurements, which provides a unique, comprehensive dataset on the evolution of DNS over time. Our high-performance infrastructure performs Internet-scale active measurements, currently querying over 50% of the DNS name space on a daily basis. Our infrastructure is designed from the ground up to enable big data analysis approaches on, e.g., a Hadoop cluster. With this novel approach we aim for a quantum leap in DNS-based measurement and analysis of the Internet

    Characterising attacks targeting low-cost routers: a MikroTik case study (Extended)

    Get PDF
    Attacks targeting network infrastructure devices pose a threat to the security of the internet. An attack targeting such devices can affect an entire autonomous system. In recent years, malware such as VPNFilter, Navidade, and SonarDNS has been used to compromise low-cost routers and commit all sorts of cybercrimes from DDoS attacks to ransomware deployments. Routers of the type concerned are used both to provide last-mile access for home users and to manage interdomain routing (BGP). MikroTik is a particular brand of low-cost router. In our previous research, we found more than 4 million MikroTik routers available on the internet. We have shown that these devices are also popular in Internet Exchange infrastructures. Despite their popularity, these devices are known to have numerous vulnerabilities. In this paper, we extend our previous analysis by presenting a long-term investigation of MikroTik-targeted attacks. By using a highly interactive honeypot that we developed, we collected more than 44 million packets over 120 days, from sensors deployed in Australia, Brazil, China, India, the Netherlands, and the United States. The incoming traffic was classified on the basis of Common Vulnerabilities and Exposures to detect attacks targeting MikroTik devices. That enabled us to identify a wide range of activities on the system, such as cryptocurrency mining, DNS server redirection, and more than 3,000 successfully established tunnels used for eavesdropping. Although this research focuses on Mikrotik devices, both the methodology and the publicly available scripts can be easily applied to any other type of network device

    Defining functional classes of Barth syndrome mutation in humans

    Get PDF
    The X-linked disease Barth syndrome (BTHS) is caused by mutations in TAZ; TAZ is the main determinant of the final acyl chain composition of the mitochondrial-specific phospholipid, cardiolipin. To date, a detailed characterization of endogenous TAZ has only been performed in yeast. Further, why a given BTHS-associated missense mutation impairs TAZ function has only been determined in a yeast model of this human disease. Presently, the detailed characterization of yeast tafazzin harboring individual BTHS mutations at evolutionarily conserved residues has identified seven distinct loss-of-function mechanisms caused by patient-associated missense alleles. However, whether the biochemical consequences associated with individual mutations also occur in the context of human TAZ in a validated mammalian model has not been demonstrated. Here, utilizing newly established monoclonal antibodies capable of detecting endogenous TAZ, we demonstrate that mammalian TAZ, like its yeast counterpart, is localized to the mitochondrion where it adopts an extremely protease-resistant fold, associates non-integrally with intermembrane space-facing membranes and assembles in a range of complexes. Even though multiple isoforms are expressed at the mRNA level, only a single polypeptide that co-migrates with the human isoform lacking exon 5 is expressed in human skin fibroblasts, HEK293 cells, and murine heart and liver mitochondria. Finally, using a new genome-edited mammalian BTHS cell culture model, we demonstrate that the loss-of-function mechanisms for two BTHS alleles that represent two of the seven functional classes of BTHS mutation as originally defined in yeast, are the same when modeled in human TAZ
    • 

    corecore