2016
DOI: 10.1007/978-3-319-30505-9_8
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Cellular Middleboxes Using Passive Measurement Techniques

Abstract: The Transmission Control Protocol (TCP) follows the endto-end principle-when a client establishes a connection with a server, the connection is only shared by two physical machines, the client and the server. In current cellular networks, a myriad of middleboxes disregard the end-to-end principle to enable network operators to deploy services such as content caching, compression, and protocol optimization to improve end-to-end network performance. If server operators remain unaware of such middleboxes, TCP con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
16
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 11 publications
1
16
0
Order By: Relevance
“…Methodologies to detect proxies, and more generally middleboxes, are diverse and can rely on active measurements as well as passive measurements [15]. Mobile Tracebox [16], belongs to the first school of thought: it sends specially crafted packets to highlight intermediate boxes that modify those packets or alter the path between source and destination.…”
Section: Mobile Traceboxmentioning
confidence: 99%
“…Methodologies to detect proxies, and more generally middleboxes, are diverse and can rely on active measurements as well as passive measurements [15]. Mobile Tracebox [16], belongs to the first school of thought: it sends specially crafted packets to highlight intermediate boxes that modify those packets or alter the path between source and destination.…”
Section: Mobile Traceboxmentioning
confidence: 99%
“…Detection through passive measurement is also possible [20] but, as middleboxes are usually designed to be transparent, methods often resort to active probing to force the box to reveal its presence. Mobile Tracebox relies on an active measurement paradigm by sending specially crafted packets and retrieving them after modifications occur.…”
Section: Mobile Traceboxmentioning
confidence: 99%
“…Protocol Enhancing Proxies are therefore currently considered an important tool by operators needing to support long network paths. They are widely used for satellite broadband access and also in mobile operator networks to ensure acceptable web performance without the need to update or configure client equipment [36].…”
Section: Implication and Opportunities For Peps When Using Long Netwomentioning
confidence: 99%
“…Perhaps most significantly, current application PEPs are incompatible with the end-to-end security model of HTTPS and HTTP/2 and need to break this model to enable acceleration. The volume of encrypted HTTP traffic continues to grow [37], and many networks enable such proxies by installing root certificates in user devices to sign the HTTPS objects requested by the user [36]. This allows a TLS connection to be split at an application-layer PEP but breaks the end-to-end integrity of the connection [43] and is only possible in scenarios where the network administrator has access to user devices (e.g.…”
Section: Implication and Opportunities For Peps When Using Long Netwomentioning
confidence: 99%
See 1 more Smart Citation