Uncovering the Big Players of the Web
|
|
- Asher Dennis
- 8 years ago
- Views:
Transcription
1 Uncovering the Big Players of the Web 3 rd TMA Workshop Vienna March 12 Vinicius Gehlen Alessandro Finamore Marco Mellia Maurizio M. Munafò TMA COST Action
2 Introduction 2 Nowadays Internet traffic volume is mainly HTTP + P2P Breakdown of downstream traffic of residential customers Mainly SSH, VoIP, DNS, , etc. + A plethora of services!
3 Methodology 3 Focus only on HTTP traffic Rely on to generate flow-level HTTP logs L4: #bytes, #pkts, RTT, etc. L7: service type and meta-data (e.g. video) Rely on organization data base Each server IP is associated to its owner n à AKAMAI TECHNOLOGIES
4 Dataset 4 3 vantage points (VPx) of an ISP in Italy Residential customers ADSL (VP2, VP3) + Fiber-To-The-Home (VP1) 1 week of traffic (20-24 June 2011)
5 5 OVERVIEW Which organizations? Volumes? Popularity?
6 Top10 (+ 1) organizations 6 Rank Org. Name % B % F 1 Google Akamai Leaseweb Megaupload Level Limelight PSINet Webzilla Choopa OVH Facebook Total % Google handles 2x the Akamai volume Besides Google and Akamai, many others known (Level3, Limelight, Leaseweb, Megaupload) less known (PSINet, Webzilla, Choopa) >10k organizations but 65% of volume is due to only 11 big players
7 Organizations popularity 7 % IP clients that have contacted the organization at least one time Organization % Client Video Content SW Update Adv. & Others Google 97.1 YouTube - Google services Akamai 97.2 Vimeo Microsoft, Apple Facebook static content, ebay Leaseweb 64.3 Megavideo - publicbt.com Megaupload 15.6 Megavideo - FileHosting Level YouPorn - Limelight 72.5 Pornhub, Veoh Avast quantserve, tinypic, Photobucket betclick, wdig, trafficjunky PSINet 44.6 Megavideo Kaspersky Imageshack Webzilla 13.2 Adult Video - Filesonic, Depositfiles 97% of clients contact Google and Akamai 63% of client clients contact OVH Advertisement 90.6% of clients contact Facebook!??!!? Choopa zshare OVH 63.1 Auditude - Telaxo, m2cai Facebook 90.6 Facebook - Facebook dynamic content
8 Why FB sees 90% of clients? 8 You visit nutella.com Slurp! There is an embedded object pointing to the FB fan page This generates a connection to FB So FB knows that you like nutella Privacy anyone?!?!
9 Why FB sees 90% of clients? 9 GET /plugins/like.php?href=http%3a%2f%2fwww.facebook.com %2FNutella.Italy&layout=box_count&show_faces=false&width=120&action=like&colorscheme =light&height=65 HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/ (KHTML, like Gecko) Version/5.1.3 Safari/ Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Referer: Accept-Language: en-us Accept-Encoding: gzip, deflate Cookie: presence=em euserfa a2estatefdsb2f0et2f_5b_5delm2fnulleuct2f BEtrFnullEtwF G H0EblcF0EsndF1CEchFDsubF_5b0_5dEp_5f F2CC; p=6; c_user= ; datr=fokptf9njodb9oshmlkp5e_ong..; lu=ggojzj70pxz6grarmpcnirxw; xs=1%3a889419cc0700aee88497c71b1015fa45%3a0%3a ; locale=en_us
10 10 CONTENT SERVED VIDEO? SSL/TLS?
11 Which content is served? 11 Video content is highly predominant
12 Which type of content is served? 12 Video content is highly predominant 90% of Google is YouTube video download
13 Which type of content is served? 13 Video content is highly predominant 90% of Google is YouTube video download The majority of FileHosting is actually video content
14 Which type of content is served? 14 20% of Akamai is Facebook
15 Which type of content is served? 15 20% of Akamai is Facebook Google, Akamai e Facebook have some HTTPS traffic
16 Evolution of HTTPS 16 Compare HTTPS traffic from June 11 and October 11 % Bytes % Flows Organization Jun Oct Jun Oct Google Akamai Leaseweb Level Limelight Megaupload Facebook No. of HTTPS connections are increasing for all the organizations 25% of Facebook connections were HTTPS in October 11 +7% of HTTPS volume for Akamai and Google in < 6 months
17 17
18 Flow size 18 The majority of the flows are small >50% of connection have < 10kB File Hosting organizations are serving a lot of short flows
19 Bulk download rate (1/2) 19 Focusing on connections with > 1MB, what is the download rate?
20 ORGANIZATIONS INFRASTRUCTURE BEHIND THE SCENES 20
21 RTT Latency towards the Internet 21 Minimum RTT is measured by Tstat on per-flow base Facebook has 2 locations (100ms e 170ms) Akamai and Limelight are the closest to the ISP (5ms) 3 Google datacenters are preferred Only <30% of request are served by the closest one (12ms)
22 Number of IPs 22 Organization No. % No. Top5 %bytes Google Akamai Leaseweb Level Limelight Megaupload Facebook Total IP addresses serve 65% of HTTP traffic Google handles 2x the Akamai volume with 1/3 of IPs Most of the traffic is served by few preferred IPs within an organization
23 Volume served by %IP 23
24 Bulk download rate (2/2) 24 Considering connection with > 1MB 1 2 All organizations but Akamai (and Facebook) have >90% connection >500kb/s Caching policies may have an impact: 1 Content already available à high bitrate 2 Content retrieved from backend à low bitrate
25 Conclusions 25 We investigated how the web looks like these days Some clear trends are visible Majority of traffic is handled by few big players HTTPS is becoming very popular Lot of datacenters to manage demand It is very difficult to understand Who owns and who serves the content Which policies are used How much data leaks to these players This makes a tangled web which is very hard to discern
26 26 RTT variation during the day
27 Breakdown del traffico HTTP Traffico HTTP su PDF: La frazione di traffico gestita da ciascuna organizzazione è costante nel tempo 27
28 Comparing days & locations 28 Short-term stability with marginal differences with respect to Days of the week Locations of the users
DISSECTING VIDEO SERVER SELECTION STRATEGIES IN THE CDN [ICDCS 2011]
DISSECTING VIDEO SERVER SELECTION STRATEGIES IN THE CDN [ICDCS 2011] Alessandro Finamore Marco Mellia Maurizio Munafò Ruben Torres Sanjay Rao 2nd TMA PhD School Objectives 1 YouTube is the most popular
More informationThe Need for an Intelligent Measurement Plane: the Example of Time-Variant CDN Policies
The Need for an Intelligent Measurement Plane: the Example of Time-Variant CDN Policies A. Finamore, V. Gehlen, M. Mellia, M. M. Munafò Politecnico di Torino, Italy Email: lastname@tlc.polito.it S. Nicolini
More informationHow To Write A Blog Post On Dropbox
Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IMC 2012 Boston Motivation and goals 1/14 Personal cloud storage
More informationInside Dropbox: Understanding Personal Cloud Storage Services
Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IRTF Vancouver Motivation and goals 1 Personal cloud storage
More informationHTTP/2: Operable and Performant. Mark Nottingham @mnot (@akamai)
HTTP/2: Operable and Performant Mark Nottingham @mnot (@akamai) This talk may be disappointing. As we know, there are known knowns; there are things we know we know. We also know there are known unknowns;
More informationYouTube Everywhere: Impact of Device and Infrastructure Synergies on User Experience
Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 5-2-2 YouTube Everywhere: Impact of Device and Infrastructure Synergies on User Experience A. Finamore Politecnico
More informationYouTube Everywhere: Impact of Device and Infrastructure Synergies on User Experience
YouTube Everywhere: Impact of Device and Infrastructure Synergies on User Experience Alessandro Finamore Politecnico di Torino finamore@tlc.polito.it Ruben Torres Purdue University rtorresg@purdue.edu
More informationLive Traffic Monitoring with Tstat: Capabilities and Experiences
Live Traffic Monitoring with Tstat: Capabilities and Experiences Maurizio M. Munafò Alessandro Finamore Marco Mellia Michela Meo Dario Rossi WWIC - Luleå, June 3, 2010 Outline Motivations Tstat - TCP STatistic
More informationPersonal Cloud Storage: Usage, Performance and Impact of Terminals
Personal Cloud Storage: Usage, Performance and Impact of Terminals Enrico Bocchi, Idilio Drago, Marco Mellia Politecnico di Torino name.surname@polito.it Abstract Personal cloud storage services such as
More informationGetting More Information On Your Network Performance
Getting More Information On Your Network Performance Luca Deri Network Traffic is a Moving Target For years network administrators have identified traffic protocols and services using IP
More informationYouTube All Around: Characterizing YouTube from Mobile and Fixed-line Network Vantage Points
YouTube All Around: Characterizing YouTube from Mobile and Fixed-line Network Vantage Points Pedro Casas, Pierdomenico Fiadino, Arian Bär, Alessandro D Alconzo FTW - Telecommunications Research Center
More informationExploring the Cloud from Passive Measurements: the Amazon AWS Case
Exploring the Cloud from Passive Measurements: the Amazon AWS Case Ignacio Bermudez, Stefano Traverso, Marco Mellia, Maurizio Munafò DET, Politecnico di Torino, Italy {lastname}@tlc.polito.it Abstract
More informationInside Dropbox: Understanding Personal Cloud Storage Services
Inside Dropbox: Understanding Personal Cloud Storage Services Corneliu Claudiu Prodescu School of Engineering and Sciences Jacobs University Bremen Campus Ring 1, 28759 Bremen, Germany Monday 22 nd April,
More informationTowards Web Service Classification using Addresses and DNS
Towards Web Service Classification using Addresses and DNS Martino Trevisan, Idilio Drago, Marco Mellia, Maurizio M. Munafò Politecnico di Torino, Italy (firstname.lastname@polito.it) Abstract The identification
More informationWeb Conferencing Version 8.3 Troubleshooting Guide
System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which
More informationCDN and Traffic-structure
CDN and Traffic-structure Outline Basics CDN Traffic Analysis 2 Outline Basics CDN Building Blocks Services Evolution Traffic Analysis 3 A Centralized Web! Slow content must traverse multiple backbones
More informationTHE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6
The Proxy Server THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 2 1 Purpose The proxy server acts as an intermediate server that relays requests between
More informationLARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University
1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico di Torino Porto Institutional Repository [Proceeding] Dissecting Video Server Selection Strategies in the YouTube CDN Original Citation: Ruben Torres,Alessandro Finamore,Jin Ryong Kim,Marco
More informationArnaud Becart ip- label 11/9/11
Arnaud Becart ip- label 11/9/11 RUM Synthe2c Tests You should measure HTML and RIA (Flash ) Page Rendering Onload + Full Page Load InteracBons in your page Third Party content How Synthe2c / Real browsers
More informationDistributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationHypertext for Hyper Techs
Hypertext for Hyper Techs An Introduction to HTTP for SecPros Bio Josh Little, GSEC ~14 years in IT. Support, Server/Storage Admin, Webmaster, Web App Dev, Networking, VoIP, Projects, Security. Currently
More informationAn Overview of Amazon Silk Amazon s new cloud-powered browser
An Overview of Amazon Silk Amazon s new cloud-powered browser Jon Jenkins Twitter - @jonjenk jjenkin@amazon.com O Reilly Velocity EU November 8, 2011 Web Page Complexity is Steadily Increasing Amazon s
More informationAccessing Websites. Mac/PC Compatibility: QuickStart Guide for Business
Accessing Websites Mac/PC Compatibility: QuickStart Guide for Business 2 Accessing Websites QuickStart Guide for Business The Basics People use the web for research, entertainment, and business. And it
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationApplication Latency Monitoring using nprobe
Application Latency Monitoring using nprobe Luca Deri Problem Statement Users demand services measurements. Network boxes provide simple, aggregated network measurements. You cannot always
More informationInternet Traffic Evolution 2007-2011
Internet Traffic Evolution 2007-2011 Craig Labovitz April 6, 2011 Talk Outline Four-year ongoing inter-domain traffic study Review of 2010 results (NANOG / IETF / SIGCOMM) Methodology Changing carrier
More informationSoftware Product Information. Faba5 Website
Software Product Information Faba5 Website Valid from 09th March 2013 Copyright Faba5 GmbH, A-4020 Linz, 2013. All rights reserved. All hardware and software names used are registered trade names and/or
More informationHamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP. Table of Contents
Hamilton County Communications, Inc. NETWORK POLICY AND PRACTICE FOR ISP Table of Contents Section Page Definitions 2 Terms of Service and Network Management Practices 2 Devices & Software that may be
More information1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
More informationAnalyzing the Impact of YouTube Delivery Policies on User Experience
Analyzing the Impact of YouTube Delivery Policies on User Experience Louis Plissonneau Orange Labs France louis.plissonneau@orange.com Ernst Biersack Eurecom France erbi@eurecom.fr Parikshit Juluri University
More informationInside Dropbox: Understanding Personal Cloud Storage Services
Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago University of Twente i.drago@utwente.nl Anna Sperotto University of Twente a.sperotto@utwente.nl Marco Mellia Politecnico di Torino
More informationThe Application Usage and Threat Report
The Application Usage and Threat Report An Analysis of Application Usage and Related Threats within the Enterprise 10th Edition February 2013 PAGE 1 Executive Summary Global Findings Since 2008, Palo Alto
More informationInside Dropbox: Understanding Personal Cloud Storage Services
Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago University of Twente i.drago@utwente.nl Anna Sperotto University of Twente a.sperotto@utwente.nl Marco Mellia Politecnico di Torino
More informationPLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008
PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2
More informationDistributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationAnalysing the impact of CDN based service delivery on traffic engineering
Analysing the impact of CDN based service delivery on traffic engineering Gerd Windisch Chair for Communication Networks Technische Universität Chemnitz Gerd Windisch - Chair for Communication Networks
More informationAnatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers
Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers By Deral (PercX) Heiland and Michael (omi) Belton Over the past year, one focus of the Foofus.NET
More informationCyber Security Workshop Ethical Web Hacking
Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp
More informationDistributed Systems. 24. Content Delivery Networks (CDN) 2013 Paul Krzyzanowski. Rutgers University. Fall 2013
Distributed Systems 24. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2013 November 27, 2013 2013 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
More informationFrom Internet Data Centers to Data Centers in the Cloud
From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs
More informationInside Dropbox: Understanding Personal Cloud Storage Services
Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago University of Twente i.drago@utwente.nl Anna Sperotto University of Twente a.sperotto@utwente.nl Marco Mellia Politecnico di Torino
More informationWhere Do You Tube? Uncovering YouTube Server Selection Strategy
Where Do You Tube? Uncovering YouTube Server Selection Strategy Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang University of Minnesota- Twin Cities Abstract YouTube is one of the most popular video sharing
More informationProtocolo HTTP. Web and HTTP. HTTP overview. HTTP overview
Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each
More informationLBL Application Availability Infrastructure Unified Secure Reverse Proxy
LBL Application Availability Infrastructure Unified Secure Reverse Proxy Valerio Mezzalira TCOGROUP Company Outline Mission: Development of Software Tools Aimed at Enhancing High Availability (HA) of IT
More informationWeb Log Analysis for Identifying the Number of Visitors and their Behavior to Enhance the Accessibility and Usability of Website
Web Log Analysis for Identifying the Number of and their Behavior to Enhance the Accessibility and Usability of Website Navjot Kaur Assistant Professor Department of CSE Punjabi University Patiala Himanshu
More informationHTTP Response Splitting
The Attack HTTP Response Splitting is a protocol manipulation attack, similar to Parameter Tampering The attack is valid only for applications that use HTTP to exchange data Works just as well with HTTPS
More informationNo. Time Source Destination Protocol Info 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.
Ethereal Lab: HTTP 1. The Basic HTTP GET/response interaction 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.1 GET /ethereal-labs/http-ethereal-file1.html
More informationHTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
More informationIxLoad TM : Data HTTP, SSL, and FTP
IxLoad TM : Data HTTP, SSL, and FTP IxLoad tests the scalability and performance of content-aware networks and devices by emulating HTTP(S), SSL, and FTP clients and servers. IxLoad can be used to: Test
More informationManual. Traffic Exchange
Updated on 21-Oct-2010 Page 1 of 10 Manual Traffic Exchange Updated on 21-Oct-2010 Page 2 of 10 Index Pages 1. To access the Traffic Exchange 3 2. Checking User Log 5 3. Change Password 7 4. Troubleshooting
More informationD. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
More informationLoad Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
More informationPLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009
PLATO Learning Environment 2.0 System and Configuration Requirements Dec 1, 2009 Table of Contents About this document... 3 Document Change Log... 4 System & Configuration Requirements... 5 Workstation
More informationThe Effect of Caches for Mobile Broadband Internet Access
The Effect of s for Mobile Jochen Eisl, Nokia Siemens Networks, Munich, Germany Haßlinger, Deutsche Telekom Technik,, Darmstadt, Germany IP-based content delivery: CDN & cache architecture Impact of access
More informationThe Other 50% of Internet Traffic. Craig Labovitz labovit@deepfield.net
The Other 50% of Internet Traffic Craig Labovitz labovit@deepfield.net 1 Earlier In previous work, focused on HyperGiants 50% of Internet traffic due to 150 companies i.e. Google, MSFT, CDNs, large consumer
More information2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative
2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative of clients 321 N. Clark Street, Suite 2800, Chicago,
More informationExploring YouTube s Content Distribution Network Through Distributed Application-Layer Measurements: A First View
Exploring YouTube s Content Distribution Network Through Distributed Application-Layer Measurements: A First View Albert Rafetseder, Florian Metzger, David Stezenbach, and Kurt Tutschku {albert.rafetseder,
More informationUsing SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
More informationFacebook Smart Card FB 121211_1800
Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any
More informationFront-End Performance Testing and Optimization
Front-End Performance Testing and Optimization Abstract Today, web user turnaround starts from more than 3 seconds of response time. This demands performance optimization on all application levels. Client
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationTo ensure you have the appropriate equipment and settings please review the following: Software and Hardware Recommendations.
Step 2- Computer Check Before you attempt to login to University resources it is important to make sure your computer will support an online course, or an accelerated course with an online component. It
More informationNetwork Performance of Smart Mobile Handhelds in a University Campus WiFi Network
Network Performance of Smart Mobile Handhelds in a University Campus WiFi Network Xian Chen, Ruofan Jin University of Connecticut Kyoungwon Suh Illinois State University Bing Wang, Wei Wei University of
More informationAkamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013
Akamai CDN, IPv6 and DNS security Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013 Agenda Akamai Introduction Who s Akamai? Intelligent Platform & Traffic Snapshot Basic Technology Akamai
More informationHow Do You Tube? Reverse Engineering the YouTube Video Delivery Cloud
How Do You Tube? Reverse Engineering the YouTube Video Delivery Cloud Vijay Kumar Adhikari, Sourabh Jain, Yingying Chen, and Zhi Li Zhang Department of Computer Science & Engineering, University of Minnesota
More informationMobile Performance Testing
Businesses are increasingly realizing the need for wide-ranging functional testing of mobile apps, as well as per formance, load and user experience testing, although most enterprises do not test a l l
More informationIndirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer
Indirection Indirection: rather than reference an entity directly, reference it ( indirectly ) via another entity, which in turn can or will access the original entity A x B "Every problem in computer
More informationSecurity-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet
Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Prepared by: Roberto Suggi Liverani Senior Security Consultant Security-Assessment.com
More informationAll You Can Eat Realtime
HTML5 WebSocket: All You Can Eat Realtime By Peter Lubbers, Kaazing May 14, 2010 1 About Peter Lubbers Director of Documentation and Training, Kaazing Co-Founder San Francisco HTML5 User Group http://www.sfhtml5.org/
More informationDEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
More informationBenchmarking Broadband Internet with Bismark
Benchmarking Broadband Internet with Bismark Srikanth Sundaresan, Nick Feamster Georgia Tech, Atlanta, USA Walter de Donato, Antonio Pescapé University of Napoli Federico II, Napoli, Italy Renata Teixeira
More informationLarge scale observation and analysis of Amazon AWS traffic
Large scale observation and analysis of Amazon AWS traffic Ignacio Bermudez, Stefano Traverso, Marco Mellia, Maurizio Munafò DET, Politecnico di Torino, Italy {lastname}@tlc.polito.it Abstract Cloud Providers
More informationTest Methodology White Paper. Author: SamKnows Limited
Test Methodology White Paper Author: SamKnows Limited Contents 1 INTRODUCTION 3 2 THE ARCHITECTURE 4 2.1 Whiteboxes 4 2.2 Firmware Integration 4 2.3 Deployment 4 2.4 Operation 5 2.5 Communications 5 2.6
More informationThree short case studies
Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.
More informationRise of the Machines: An Internet-Wide Analysis of Web Bots in 2014
SESSION ID: SPO2-W04 Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014 John Summers VP, Security Products Akamai #RSAC The Akamai Intelligent Platform The Platform 167,000+ Servers 2,300+
More informationTesting & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationAccess the GV-IP Camera through a broadband modem
Access the GV-IP Camera through a broadband modem Applied to All GV-IP Cameras Article ID: GV15-12-03-26 Release Date: 03/26/2012 Introduction The document introduces how to connect your GV-IP Camera to
More informationFrequently Asked Questions for the USA TODAY e-newspaper
Frequently Asked Questions for the USA TODAY e-newspaper Navigating the USA TODAY e-newspaper A look at the toolbar Toolbar Functions, Buttons, and Descriptions The tab marked Contents will take the e-reader
More informationHow To Login To Webex Online
Getting Prepared for Your Online Course! This document will let you know what to expect and walk you through a Test Login One of our top priorities is to meet your demand for high quality, easy to use,
More informationMySciLEARN System Requirements. For educators and providers using the Fast ForWord and Reading Assistant programs
MySciLEARN System Requirements For educators and providers using the Fast ForWord and programs December 2014 Copyright 1996 through 2014 Scientific Learning Corporation. All rights reserved. This document
More informationTP-LINK TD-W8901G. Wireless Modem Router. Advanced Troubleshooting Guide
TP-LINK TD-W8901G Wireless Modem Router Advanced Troubleshooting Guide Released on 2009.09.25 Version 1.0 Content Summary... 3 Troubleshooting Flow Chart and Resolutions... 3 Check 1... 3 Check 2... 4
More informationA Look at the Consequences of Internet Censorship through an ISP Lens
A Look at the Consequences of Internet Censorship through an ISP Lens Sheharbano Khattak (University of Cambridge)! Mobin Javed (UC Berkeley) Syed Ali Khayam (PLUMgrid) Zartash Afzal Uzmi (LUMS SBASSE,
More informationExploitation of Server Log Files of User Behavior in Order to Inform Administrator
Exploitation of Server Log Files of User Behavior in Order to Inform Administrator Hamed Jelodar Computer Department, Islamic Azad University, Science and Research Branch, Bushehr, Iran ABSTRACT All requests
More informationMcAfee Web Gateway 7.4.1
Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this
More informationSSL Enforcer Documentation
SSL Enforcer Documentation Introduction Install and Uninstall Getting Started Main Settings Options Log Introduction Today a vast majority of Internet activities like social networking, streaming videos,
More informationWebsite Analysis. foxnews has only one mail server ( foxnewscommail.protection.outlook.com ) North America with 4 IPv4.
Website Analysis Hanieh Hajighasemi Dehaghi Computer Networks : Information transfert (LINGI2141) Ecole Polytechnique de Louvain (EPL) Université Catholique de Louvain Abstract The candidate website(foxnews.com)
More informationNetworks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
More informationMySciLEARN System Requirements. For educators and providers using the Fast ForWord and Reading Assistant programs
MySciLEARN System Requirements For educators and providers using the Fast ForWord and Reading Assistant programs August 2015 Copyright 1996 through 2015 Scientific Learning Corporation. All rights reserved.
More informationMinimum Computer System Requirements
Minimum Computer System Requirements http://ualr.edu/blackboard/welcome/system- requirements/ The following minimum hardware and software requirements are necessary in order to access an online class through
More informationOur My first DDoS attack. Velocity Europe 2011 Berlin Cosimo Streppone Operations Lead
Our My first DDoS attack Velocity Europe 2011 Berlin Cosimo Streppone Operations Lead
More informationREVERSE ENGINEERING THE YOUTUBE VIDEO DELIVERY CLOUD. Vijay Kumar Adhikari, Sourabh Jain, Yingying Chen, and Zhi-Li Zhang
REVERSE ENGINEERING THE YOUTUBE VIDEO DELIVERY CLOUD Vijay Kumar Adhikari, Sourabh Jain, Yingying Chen, and Zhi-Li Zhang Department of Computer Science & Engineering, University of Minnesota - Twin Cities
More informationCombating Web Fraud with Predictive Analytics. Dave Moore Novetta Solutions dmoore@novetta.com
Combating Web Fraud with Predictive Analytics Dave Moore Novetta Solutions dmoore@novetta.com Novetta Solutions Formerly, International Biometric Group (IBG) Consulting DoD, DHS, DRDC IR&D Identity Cyber
More informationBit-Rate and Application Performance in Ultra BroadBand Networks
Bit-Rate and Application Performance in Ultra BroadBand Networks Gianfranco Ciccarella - Telecom Italia Vice President Global Advisory Services 4ºFocus: Gianfranco Ciccarella - Telecom Index QoE platforms:
More information600-152 People Data and the Web Forms and CGI. HTML forms. A user interface to CGI applications
HTML forms A user interface to CGI applications Outline A simple example form. GET versus POST. cgi.escape(). Input controls. A very simple form a simple form
More informationInitial Access and Basic IPv4 Internet Configuration
Initial Access and Basic IPv4 Internet Configuration This quick start guide provides initial and basic Internet (WAN) configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
More informationUMETER Quality of Service (QoS) measurement system for Internet access.
UMETER Quality of Service (QoS) measurement system for Internet access. Flávio da Silva Pereira Software Developer Ubiwhere Lda Aveiro, Portugal fspereira@ubiwhere.com Nuno Ribeiro Chief Operating Officier
More informationQoE-Aware Multimedia Content Delivery Over Next-Generation Networks
QoE-Aware Multimedia Content Delivery Over Next-Generation Networks M. Oğuz Sunay July 9, 2013 Second Romeo Workshop PAGE: 1 M. Oğuz Sunay, Özyeğin University Istanbul, July 9, 2013 Romeo High-quality
More informationHiding Tracks on the Net
Hiding Tracks on the Net Ways one might hide their tracks Private Browsing Anonymizers & Proxy Servers SSL / TLS Passwords False Information Public Networks Email Services Encryption Firewalls Private
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
More information