97 research outputs found

    An Experimental Evaluation of the Computational Cost of a DPI Traffic Classifier

    Get PDF
    A common belief in the scientific community is that traffic classifiers based on deep packet inspection (DPI) are far more expensive in terms of computational complexity compared to statistical classifiers. In this paper we counter this notion by defining accurate models for a deep packet inspection classifier and a statistical one based on support vector machines, and by evaluating their actual processing costs through experimental analysis. The results suggest that, contrary to the common belief, a DPI classifier and an SVM-based one can have comparable computational costs. Although much work is left to prove that our results apply in more general cases, this preliminary analysis is a first indication of how DPI classifiers might not be as computationally complex, compared to other approaches, as we previously though

    Comparing P2PTV Traffic Classifiers

    Get PDF
    Peer-to-Peer IP Television (P2PTV) applications represent one of the fastest growing application classes on the Internet, both in terms of their popularity and in terms of the amount of traffic they generate. While network operators require monitoring tools that can effectively analyze the traffic produced by these systems, few techniques have been tested on these mostly closed-source, proprietary applications. In this paper we examine the properties of three traffic classifiers applied to the problem of identifying P2PTV traffic. We report on extensive experiments conducted on traffic traces with reliable ground truth information, highlighting the benefits and shortcomings of each approach. The results show that not only their performance in terms of accuracy can vary significantly, but also that their usability features suggest different effective aspects that can be integrate

    On the Implementation of Location Obfuscation in openwifi and Its Performance

    Get PDF
    Wi-Fi sensing as a side-effect of communications is opening new opportunities for smart services integrating communications with environmental properties, first and foremost the position of devices and people. At the same time, this technology represents an unprecedented threat to people’s privacy, as personal information can be collected directly at the physical layer without any possibility to hide or protect it. Several works already discussed the possibility of safeguarding users’ privacy without hampering communication performance. Usually, some signal pre-processing at the transmitter side is needed to introduce pseudo-random (artificial) patterns in the channel response estimated at the receiver, preventing the extraction of meaningful information from the channel state. However, there is currently just one implementation of such techniques in a real system (openwifi), and it has never been tested for performance. In this work, we present the implementation of a location obfuscation technique within the openwifi project that enables fine manipulation of the radio signal at transmitter side and yields acceptable, if not good, performance. The paper discusses the implementation of the obfuscation subsystem, its performance, possible improvements, and further steps to allow authorized devices to “de-obfuscate” the signal and retrieve the sensed information

    GT: Picking up the Truth from the Ground for Internet Traffic

    Get PDF
    Much of Internet traffic modeling, firewall, and intrusion detection research requires traces where some ground truth regarding application and protocol is associated with each packet or flow. This paper presents the design, development and experimental evaluation of gt, an open source software toolset for associating ground truth information with Internet traffic traces. By probing the monitored host's kernel to obtain information on active Internet sessions, gt gathers ground truth at the application level. Preliminary exper- imental results show that gt's effectiveness comes at little cost in terms of overhead on the hosting machines. Furthermore, when coupled with other packet inspection mechanisms, gt can derive ground truth not only in terms of applications (e.g., e-mail), but also in terms of protocols (e.g., SMTP vs. POP3

    LTE/Wi-Fi Co-existence under Scrutiny: An Empirical Study

    Get PDF
    Mobile operators are seeking to increase network capacity by extending Long Term Evolution (LTE) cellular operation into unlicensed frequency bands. While these efforts may respond to the projected exponential growth in mobile data traffic, significant concerns exist about the harmonious co-existence of LTE with incumbent Wi-Fi deployments. In this paper we characterise experimentally the LTE and Wi-Fi behaviour when sharing the same spectrum while operating under a broad range of network conditions. Specifically, we deploy a test bed with commodity Wi-Fi hardware and low-cost software-defined radio equipment running an open-source LTE stack. We investigate the user-level performance attainable over these technologies when employing different settings, including LTE duty cycling patterns, Wi-Fi offered loads, transmit power levels, modulation and coding schemes, and packet sizes. We show that co-existence is feasible without modifications to the Wi-Fi stack, if LTE periodically employs "silent" sub-frames; however, optimising the performance of both requires non-trivial tuning of multiple parameters in conjunction with close monitoring of Wi-Fi operation and detection of application-specific requirements. Our findings lay the foundations for coherent design of practical LTE/Wi-Fi co-existence mechanisms

    Characterizing Bufferbloat and its Impact at End-hosts

    Get PDF
    Part 2: Performance at the EdgeInternational audienceWhile buffers on forwarding devices are required to handle bursty Internet traffic, overly large or badly sized buffers can interact with TCP in undesirable ways. This phenomenon is well understood and is often called “bufferbloat”. Although a number of previous studies have shown that buffering (particularly, in home) can delay packets by as much as a few seconds in the worst case, there is less empirical evidence of tangible impacts on end-users. In this paper, we develop a modified algorithm that can detect bufferbloat at individual end-hosts based on passive observations of traffic. We then apply this algorithm on packet traces collected at 55 end-hosts, and across different network environments. Our results show that 45 out of the 55 users we study experience bufferbloat at least once, 40% of these users experience bufferbloat more than once per hour. In 90% of cases, buffering more than doubles RTTs, but RTTs during bufferbloat are rarely over one second. We also show that web and interactive applications, which are particularly sensitive to delay, are the applications most often affected by bufferbloat

    Imola: A decentralised learning-driven protocol for multi-hop White-Fi

    Get PDF
    In this paper we tackle the digital exclusion problem in developing and remote locations by proposing Imola, an inexpensive learning-driven access mechanism for multi-hop wireless networks that operate across TV white-spaces (TVWS). Stations running Imola only rely on passively acquired neighbourhood information to achieve scheduled-like operation in a decentralised way, without explicit synchronisation. Our design overcomes pathological circumstances such as hidden and exposed terminals that arise due to carrier sensing and are exceptionally problematic in low frequency bands. We present a prototype implementation of our proposal and conduct experiments in a real test bed, which confirms the practical feasibility of deploying our solution in mesh networks that build upon the IEEE 802.11af standard. Finally, the extensive system level simulations we perform demonstrate that Imola achieves up to 4x\u97 more throughput than the channel access protocol defined by the standard and reduces frame loss rate by up to 100%

    Low-delay high-rate operation of 802.11ac WLAN downlink: Nonlinear controller analysis & design

    No full text
    In this paper we present a novel nonlinear control design for regulating the aggregation level in 802.11 WLANs so as to ensure robust low-delay operation at high data rates. The controller compensates for system nonlinearities and so can be used for the full range of WLAN operation. We develop an implementation of the nonlinear control design and use this to evaluate performance using both simulations and hardware measurements
    corecore