2008
DOI: 10.1109/tnsm.2008.080102
|View full text |Cite
|
Sign up to set email alerts
|

Traffic analysis at short time-scales: an empirical case study from a 3G cellular network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Notably, the traces used in [1]- [3] date after the "explosion" of scanning traffic that is documented in [13]. In another work, we have found that such traffic has an impact on global rate (and delay) statistics, introducing large spikes, some of which appear regularly and periodically (see [14]). More in general, the impact of unwanted traffic on the wavelet spectrum of real traces is a point that deserves further study.…”
Section: Mapping To Realitymentioning
confidence: 99%
“…Notably, the traces used in [1]- [3] date after the "explosion" of scanning traffic that is documented in [13]. In another work, we have found that such traffic has an impact on global rate (and delay) statistics, introducing large spikes, some of which appear regularly and periodically (see [14]). More in general, the impact of unwanted traffic on the wavelet spectrum of real traces is a point that deserves further study.…”
Section: Mapping To Realitymentioning
confidence: 99%
“…Only when cross traffic is close to the bottleneck link capacity for long time, the extra delay can reach the order of seconds [9] and the adversary could mistakenly infer that the RRC state was IDLE. Given the bursty nature of traffic in mobile networks [19] we deem this as an extreme scenario. In fact, mobile devices are typically used for short periods of time, and non-user generated traffic is produced by background apps and services regularly downloading short updates from the network (e.g., social network status updates, emails, and so on).…”
Section: Factors Affecting the Detection Accuracymentioning
confidence: 99%
“…traffic originated by unproductive (and often illegitimate) activities like scanning and flooding -see e.g. [8], [9] and references therein. Such traffic might experience a loss rate considerably higher than the rest of legitimate traffic: for example, in a previous study of traffic from a real network [9] we found that high-rate packet bursts originated by sequential scanning were causing micro-congestion events, i.e.…”
Section: Loss Metricsmentioning
confidence: 99%
“…Moreover, we used nmap [15] to produce high-rate scanning traffic, as representative of the unwanted traffic that is found in the real Internet (see e.g. [9] and references therein): bursts of TCP SYN directed towards different destinations are produced approximately every 10 minutes. Every burst has a duration of 5-6 seconds, and a gross bitrate of 2.5 Mbps and 0.8 Mbps respectively in the high and low load scenarios.…”
Section: Testbed Validation a Testbed Settingmentioning
confidence: 99%