Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication 2008
DOI: 10.1145/1402958.1402991
|View full text |Cite
|
Sign up to set email alerts
|

Unconstrained endpoint profiling (googling the internet)

Abstract: Understanding Internet access trends at a global scale, i.e., what do people do on the Internet, is a challenging problem that is typically addressed by analyzing network traces. However, obtaining such traces presents its own set of challenges owing to either privacy concerns or to other operational difficulties. The key hypothesis of our work here is that most of the information needed to profile the Internet endpoints is already available around us -on the web.In this paper, we introduce a novel approach fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(22 citation statements)
references
References 22 publications
0
22
0
Order By: Relevance
“…Our basic idea is inspired by a Googling approach used in previous studies [29]. Essentially we use Google query APIs to search resourceidentifiers.…”
Section: A Exclusiveness Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Our basic idea is inspired by a Googling approach used in previous studies [29]. Essentially we use Google query APIs to search resourceidentifiers.…”
Section: A Exclusiveness Analysismentioning
confidence: 99%
“…Based on the return results and their context, we infer whether these resources are already associated with benign software. We refer readers to [29] for more details. In short, from our search query, if the resource-identifiers does not conflict with benign software or there is no any matching search result, then we proceed with further analysis.…”
Section: A Exclusiveness Analysismentioning
confidence: 99%
“…Many researchers focused on profiling network behavior of individual end users [14], [15] or on classifying the roles and communities of end users based on their traffic patterns [16], [17]. By using information available on the web, a traffic classification technique is developed based on the Google search engine in [14].…”
Section: Related Workmentioning
confidence: 99%
“…Many researchers focused on profiling network behavior of individual end users [14], [15] or on classifying the roles and communities of end users based on their traffic patterns [16], [17]. By using information available on the web, a traffic classification technique is developed based on the Google search engine in [14]. In [16], two algorithms are implemented to group users of enterprise networks into different roles based on their observed connection patterns; similarly, in [17], the communities of interest (COI) for user communications are studied using traffic data collected from a large enterprise network.…”
Section: Related Workmentioning
confidence: 99%
“…While a number of groups have maintained manual lists of dynamicallyassigned addresses, Xie et al have inferred this information for accesses to e-mail provider logs [74]. Trestian et al developed a classification method for addresses based on their presence on the web, as shown through the Google search engine [70]. We have been conducting census of all Internet addresses for several years [26].…”
Section: Understanding Network Topologymentioning
confidence: 99%