need: summary of duration, number of samples, volume of compressed and uncompressed traces, i gues the IMPACT-like nubmers, were we putting these datasets in impact. for all anonymized passive traces.

How about network neutrality measurements? |

Traffic control/management |

Social network behavior inference |

Another in energy efficiency |

Several used for analysis of SDN and floods but not sure which are highlights?

DDoS example?

More energy efficient ethernet |

Big data, scalable traffic analysis |

Energy efficient routers |

Characterization of Evolving Networks for Cybersecurity |

Bot detection and identification |

The topic of elephant flows and bloom filters seems to come up often |

Network troubleshooting |

Example from ILENS

3.2 New research opportunities enabled by current data products Our web site lists publications known to us by non-CAIDA authors that make use of CAIDA data (summarized in Figure 5) [60], a lower bound since we cannot enforce the reporting requirement of our AUP. Researchers have requested CAIDA's topology data to support research in the areas of: modeling IPv4 and IPv6 AS-level topology and routing behavior; alias resolution, router-level, and PoP-level topology discovery (including classified work to support DARPA's Plan X project); topology inference and fault diagnosis; infrastructure failure assessments; machine-learning-based AS classification; incongruity between data plane and control plane paths; improving anycast implementations; new metrics for describing scale-free networks; peer-to-peer system scalability; improving visualization of complex systems; geolocation; modeling of delay; improved traceback for network attacks; and new protocols (extensions of IP) to support attribution and prioritization. Publications reported back to us have covered a variety of topics related to the security and stability of the Internet as critical infrastructure [61,62,63,64]: growth analysis of ISPs [65]; infrastructure improvements in the developing world [66]; interdomain traffic estimation [67]; Internet mapping [68], router-level topology discovery [14,69,70]; tomography [71] and path prediction techniques [72]; evolution of interconnection policies and controversies [73]; risks of Internet partitioning [74]; prefix hijacking [75,76,77]; DDoS attack countermeasures [78,79]; complex network robustness in the face of epidemics [80]; geometric analysis of the Internet topology [81]; complex network theory [82,83]; future Internet architectures; CDN architectures [84]; and a geographic database ("Atlas") of the Internet at the physical layer [85,86].

Edit | Attach | Watch | Print version | History: r3 < r2 < r1 | Backlinks | Raw View | More topic actions...
Topic revision: r2 - 2018-12-03 - JoshPolterock
  • Edit
  • Attach
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2023 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback