Northwestern Networks Group's Publications



2016
  • Riptide: Jump-Starting Back-Office Connections in Cloud Systems
    M. Flores, A. Khakpour, and H. Bedi
    To Appear IEEE ICDCS '16, Nara, Japan, June 2016.
    [ .pdf | .pdf.gz | slides | review ]
    Taking advantage of open connections to optimize cloud communications (work with Verizon Digital Media Services).

2015
  • Wi-FM: Resolving Neighborhood Wireless Network Affairs by Listening to Music
    M. Flores, U. Klarman, and A. Kuzmanovic
    In IEEE ICNP '15, San Francisco, California, November 2015.
    [ .pdf | .pdf.gz | slides | review | press ]
    Using FM radio to coordinate wireless devices across networks.

  • Measuring Web Servers' Popularity from an Endpoint
    A.-J. Su and A. Kuzmanovic
    Tech. Report NWU-EECS-15-03, Department of EECS, Northwestern University, October 2015.
    [ .pdf | .pdf.gz ]
    How one can measure a Web server's popularity from an endpoint.

  • Towards Application-Level Multi-Homing
    Y. Wang, H. Wu, W. Zhang, Y. Li, and A. Kuzmanovic
    Tech. Report NWU-EECS-15-04, Department of EECS, Northwestern University, November 2015.
    [ .pdf | .pdf.gz ]
    Building a data transfer infrastructure on top of Gmail, YouTube, Flickr, and the like.

2014
  • Synthoid: Endpoint User Profile Control
    M. Flores and A. Kuzmanovic
    In IEEE/WIC/ACM International Conference on Web Intelligence, Warsaw, Poland, August 2014.
    [ .pdf | .pdf.gz | slides | review ]
    How to control your profile at online trackers.

  • GeoEcho: Inferring User Interests from Geotag Reports in Network Traffic
    N. Xia, S. Miskovic, M. Baldi, A. Kuzmanovic, and A. Nucci
    In IEEE/WIC/ACM International Conference on Web Intelligence, Warsaw, Poland, August 2014 (Best Paper Award)
    [ .pdf | .pdf.gz | slides | review | press ]
    How one can utilize geotag beacons from your phone to understand your inerests.

  • A CDN-Based Domain Name System
    Z. Qin, C, Xiao, Q. Wang, Y. Jin, and A. Kuzmanovic
    In Computer Communications, Volume 45, pages 11-20, June 2014.
    [ .pdf ]
    The paper demonstrates how public DNS resolvers effectively corrupt the CDN model and what can be done about it.

  • How to Improve Your Search Engine Ranking: Myths and Reality
    A.-J. Su, Y. C. Hu, A. Kuzmanovic, and C.-K. Koh
    In ACM Transactions on the Web, March 2014.
    [ .pdf | press ]
    An extended version of the WI 2010 paper.

2013
  • Mosaic: Quantifying Privacy Leakage in Mobile Networks
    N. Xia, H. Song, Y. Liao, M. Iliofotou, A. Nucci, Z. Zhang, and A. Kuzmanovic
    In Proceedings of ACM SIGCOMM 2013, Hong Kong, China, August 2013.
    [ .pdf | .pdf.gz | slides | review ]
    How to utilize OSN IDs and other identifiers to attribute significant amounts of traffic to individual users in mobile networks.

  • Rayleigh-normalized Gaussian Noise in Blind Signal Fusion
    A. Ballew, C. C. Lee, and A. Kuzmanovic
    In Proceedings of FUSION 2013, Istanbul, Turkey, July 2013.
    [ .pdf | .pdf.gz | review ]
    How to combine multiple poor-quality YouTube clips into a single high-quality one, part 2. Warning: too much math.

  • A Glance at an Overlooked Part of the World Wide Web
    I. Trestian, C. Xiao, and A. Kuzmanovic
    Proceedings of the 1st International Web Observatory Workshop, WOW2013, Rio De Janerio, Brazil, May 2013.
    [ .pdf | .pdf.gz | review ]
    A large-scale analysis of adult online services. Warning: Rated R.

  • Searching for Spam: Detecting Fraudulent Accounts Via Websearch
    M. Flores and A. Kuzmanovic
    Proceedings of the 14th International Conference on Passive and Active Measurement, Hong Kong, China, March 2013.
    [ .pdf | .pdf.gz | slides | review ]
    A method for detecting fraudulent accounts on Twitter by measuring web presence via websearch.

2012
  • Selective Behavior in Online Social Networks
    C. Xiao, L. Su, J. Bi, Y. Xue, and A. Kuzmanovic
    In IEEE/WIC/ACM International Conference on Web Intelligence, Macau, China, December 2012.
    [ .pdf | .pdf.gz | .ppt | review ]
    A large-scale analysis on disseminators and audiences properties (age, gender and location), and their correlation in YouTube, Flickr and Twitter.

  • P2P as a CDN: A New Service Model for File Sharing
    A. Mondal, I. Trestian, Z. Qin, and A. Kuzmanovic
    In Journal of Computer Networks, to appear, 2012.
    [ .html | First review | Second review ]
    How to use unused upload bandwidth for localizing resources in a P2P swarm.

  • Characterization of Vision-aided Indoor Localization and Landmark Routing
    A. Ballew, S. Srivastava, N. Valtchanov, C.-C. Lee, and A. Kuzmanovic
    In Proceedings of The Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2012), Palermo, Italy, July 2012.
    [ .pdf | .pdf.gz | .ppt | review ]
    A characterization of indoor localization with vision-aid.

  • Understanding Human Movement Semantics: A Point of Interest Based Approach
    I. Trestian, K. Huguenin, L. Su, and A. Kuzmanovic
    Poster paper in Proceedings of WWW 2012, Lyon, France, April 2012.
    [ .pdf | .pdf.gz | poster | review ]
    A short paper describing how one can understand human movement characteristics by considering the influence of points of interest.

  • Taming the Mobile Data Deluge with Drop Zones
    I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci
    In IEEE/ACM Transactions on Networking , to appear.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the INFOCOM 2011 paper.

2011
  • Understanding Crowds' Migration on the Web
    Y. Wang, K. Pal, and A. Kuzmanovic
    In IEEE/WIC/ACM International Conference on Web Intelligence, Lyon, France, August 2011.
    [ .pdf | .pdf.gz | .ppt | review ]
    A large-scale analysis on how users' interests collectively spread on the Web.

  • Understanding End-User Perception of Network Problems
    J. Scott Miller, A. Mondal, R. Potharaju, P. Dinda, and A. Kuzmanovic
    In Proceedings of ACM SIGCOMM Workshop on Measurements Up the STack (W-MUST), Toronto, CA, August 2011.
    [ .pdf | .pdf.gz | .ppt | review ]
    Which network-level problems are annoying for people, and which are not?

  • Fusion of Live Audio Recordings for Blind Noise Reduction
    A. Ballew, A. Kuzmanovic, and C.C. Lee
    In Proceedings of FUSION 2011, Chicago, IL, July 2011.
    [ .pdf | .pdf.gz | .ppt | review ]
    How to combine multiple poor-quality YouTube clips into a single high-quality one?

  • Measurement and Diagnosis of Address-Misconfigured P2P Traffic
    Z. Li, A. Goyal, Y. Chen, and A. Kuzmanovic
    In IEEE Network Magazine, 2011.
    [ .pdf | .pdf.gz | review ]
    An extended version of the Infocom 2010 paper.

  • Understanding the Network and User-Targeting Properties of Web Advertising Networks
    Y. Wang, D. Burgener, A. Kuzmanovic, and G. Macia
    In Proceedings of IEEE ICDCS 2011, Minneapolis, MN, June 2011.
    [ .pdf | .pdf.gz | .ppt | review ]
    The paper analyzes the properties of Web advertising networks.

  • Towards Street-Level Client-Independent IP Geolocation
    Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang
    In Proceedings of USENIX NSDI 2011, Boston, MA, March 2011.
    [ .pdf | .pdf.gz | .ppt | video | review | press ]
    The paper presents a method for geolocating IP addresses with extreme accuracy.

  • Taming User-Generated Content in Mobile Networks via Drop Zones
    I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci
    In Proceedings of IEEE INFOCOM 2011, Shanghai, China, April 2011.
    [ .pdf | .pdf.gz | .ppt | review ]
    This paper considers how the large amounts of user upload activity can be economically supported in mobile networks.

  • Extracting User Web Browsing Patterns from Non-Content Network Traces: The Online Advertising Case Study
    G. Macia, Y. Wang, R. Rodriguez, and A. Kuzmanovic
    In Journal of Computer Networks, to appear, 2011.
    [ .pdf | .pdf.gz | review ]
    An extended version of the INFOCOM 2010 paper.

2010
  • How to Improve Your Google Ranking: Myths and Reality
    A.-J. Su, Y. C. Hu, A. Kuzmanovic, and C.-K. Koh
    In IEEE/WIC/ACM International Conference on Web Intelligence, Toronto, Canada, August 2010.
    [ .pdf | .pdf.gz | .ppt | review | press ]
    How you should update your web page so that it gets highly ranked by Google.

  • Measurement Lab: Overview and an Invitation to the Research Community
    C. Dovrolis, K. Gummadi, A. Kuzmanovic, and S. Meinrath
    In ACM SIGCOMM Computer Communication Review (editorial note), Volume 40, Number 3, July 2010.
    [ .pdf | .pdf.gz ]
    The paper presents an overview of the Measurement Lab.

  • SureCall: Towards Glitch-Free Real-Time Audio/Video Conferencing
    A. Mondal, R. Cutler, C. Huang, J. Li, and A. Kuzmanovic
    In Proceedings of IEEE IWQoS 2010, Beijing, China, June 2010.
    [ .pdf | .pdf.gz | .ppt | review ]
    The paper presents SureCall, a distributed experimental platform for audio/video conferencing.

  • Analyzing Content-Level Properties of the Web Adversphere
    Y. Wang, D. Burgener, A. Kuzmanovic, and G. Macia
    Poster paper in Proceedings of WWW 2010, Raleigh, NC, April 2010.
    [ .pdf | .pdf.gz | .ppt | review ]
    A short paper describing our initial efforts on building a content-level auditing service for web-based ad networks.

  • ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection
    G. Macia, Y. Wang, R. Rodriguez, and A. Kuzmanovic
    In Proceedings of IEEE INFOCOM 2010, San Diego, CA, March 2010.
    [ .pdf | .pdf.gz | .ppt | review | press ]
    The paper explains how ISPs can generate accurate user profiles and perform behavioral ad targeting without inspecting the packet payload.

  • Measurement and Diagnosis of Address-Misconfigured P2P Traffic
    Z. Li, A. Goyal, Y. Chen, and A. Kuzmanovic
    In Proceedings of IEEE INFOCOM 2010, San Diego, CA, March 2010.
    [ .pdf | .pdf.gz | .ppt | review ]
    The paper shows that p2p misconfigurations are remarkably prevalent, and diagnoses the root causes of this phenomenon in different p2p systems.

2009
  • Drafting Behind Akamai: Inferring Network Conditions Based on CDN Redirections
    A.-J. Su, D. Choffnes, A. Kuzmanovic, and F. Bustamante
    In IEEE/ACM Transactions on Networking, (17)6, December 2009.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the SIGCOMM 2006 paper.

  • Measuring Serendipity: Connecting People, Locations and Interests in a Mobile 3G Network
    I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci
    In Proceedings of USENIX/ACM SIGCOMM Internet Measurement Conference (IMC'09), Chicago, IL, November 2009.
    [ .pdf | .pdf.gz | .ppt | review ]
    The paper performs a large scale study of application usage and mobility across a large metropolitan area.

  • Googling the Internet: Profiling Internet Endpoints via the World Wide Web
    I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci
    In IEEE/ACM Transactions on Networking, to appear, August 2009.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the SIGCOMM 2008 paper.

  • Supporting Application Network Flows with Multiple QoS Constraints
    A. Mondal, P. Sharma, S. Banerjee, and A. Kuzmanovic
    In Proceedings of IEEE IWQoS 2009, Charleston, SC, July 2009.
    [ .pdf | .pdf.gz | .ppt | review ]
    The paper designs a framework to find routes that meet individual QoS metrics efficiently and scalably under multiple QoS constraints.

  • Adding Explicit Congestion Notification (ECN) Capability to TCP's SYN/ACK Packets
    A. Kuzmanovic, A. Mondal, S. Floyd, and K.K. Ramakrishnan
    RFC 5562, June 2009.
    [ .txt ]
    An RFC based on the SIGCOMM 2005 paper.

  • Upgrading Mice to Elephants: Effects and End-Point Solutions
    A. Mondal and A. Kuzmanovic
    In IEEE/ACM Transactions on Networking, to appear, March 2009.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the INFOCOM 2007 paper.

2008
  • Removing Exponential Backoff from TCP
    A. Mondal and A. Kuzmanovic
    In ACM SIGCOMM Computer Communication Review,
    Volume 38, Number 5, October 2008.
    [ .pdf | .pdf.gz | review | response ]
    The paper argues that the exponential backoff mechanism, introduced by Van Jacobson 20 years ago, should be removed from TCP.

  • Monitoring Persistently Congested Internet Links
    L. Deng and A. Kuzmanovic
    In Proceedings of IEEE ICNP 2008, Orlando, FL, October 2008.
    [ .pdf | .pdf.gz | .ppt | .ppt.gz| review ]
    How you can locate and monitor persistently congested Internet links efficiently.

  • Thinning Akamai
    A.-J. Su and A. Kuzmanovic
    In Proceedings of USENIX/ACM SIGCOMM Internet Measurement Conference (IMC'08), Vouliagmeni, Greece, October 2008.
    [ .pdf | .pdf.gz | .ppt | review]
    How you can deny service to large-scale DNS-driven streaming networks.

  • Unconstrained Endpoint Profiling (Googling the Internet)
    I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci
    In Proceedings of ACM SIGCOMM 2008, Seattle, WA, August 2008.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can use Google to profile Internet endpoints.

  • Monitoring Network Bias
    G. Biczok, W. Young, and A. Kuzmanovic
    Poster paper in Proceedings of ACM SIGCOMM 2008, Seattle, WA, August 2008.
    [ .pdf | .pdf.gz | .ppt | review ]
    A short paper describing our initial efforts on monitoring network bias.

  • Relative Network Positioning via CDN Redirections
    A.-J. Su, D. Choffnes, F. Bustamante, and A. Kuzmanovic
    In Proceedings of IEEE ICDCS 2008, Beijing, China, June 2008.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can use CDNs' redirections for network positioning.

  • Pollution Attacks and Defenses for Internet Caching Systems
    L. Deng, Y. Gao, Y. Chen, and A. Kuzmanovic
    In Journal of Computer Networks, 52(5): 935-956, April 2008.
    [ .pdf | .pdf.gz | review | response ]
    An extended version of the ICNP 2006 paper.

2007
  • A Poisoning-Resilient TCP Stack
    A. Mondal and A. Kuzmanovic
    In Proceedings of IEEE ICNP 2007, Beijing, China, October 2007.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can protect your TCP connection from poisoning attacks, yet without using cryptography.

  • What Lies Beneath: Understanding Internet Congestion
    L. Deng, A. Kuzmanovic, and B. Davie
    Tech. Report NWU-EECS-07-12, Department of EECS, Northwestern University, October 2007.
    [ .pdf | .pdf.gz | .ppt ]
    Measurement and analysis on the congestion in the Internet core.

  • Pong: Diagnosing Spatio-Temporal Internet Congestion Properties
    L. Deng and A. Kuzmanovic
    Poster paper in Proceedings of ACM SIGMETRICS 2007, San Diego, CA, June 2007.
    [ .pdf | .pdf.gz | .ppt | .ppt.gz| review ]
    How you can accurately locate and characterize congestion in the Internet.
    Pong's source code and measurement data could be downloaded here.

  • When TCP Friendliness Becomes Harmful
    A. Mondal and A. Kuzmanovic
    In Proceedings of IEEE INFOCOM 2007, Anchorage, Alaska, May 2007.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can improve interactive applications' performance, yet without "getting caught."

  • Receiver-Centric Congestion Control with a Misbehaving Receiver: Vulnerabilities and End-Point Solutions
    A. Kuzmanovic and E. Knightly
    To appear in Journal of Computer Networks.
    [ .pdf | .pdf.gz | review | response ]
    An extended version of the ICNP 2004 paper.

2006
  • Internet Cache Pollution Attacks and Countermeasures
    Y. Gao, L. Deng, A. Kuzmanovic, and Y. Chen
    In Proceedings of IEEE ICNP 2006, Santa Barbara, CA, November 2006.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can detect and protect against cache-targeted pollution attacks.
    A Squid-based implementation could be downloaded here.

  • On the Use of Parallel Connections in Web Browsers
    D. Choffnes, J. Lange, S. Rossoff, and A. Kuzmanovic
    Tech. Report NWU-EECS-06-15, Department of EECS, Northwestern University, October 2006.
    [ .pdf | .pdf.gz ]
    Analysis and implications of popular web browsers' behavior.
    Simulation scripts and Linux code could be download here.

  • Drafting Behind Akamai (Travelocity-Based Detouring)
    A.-J. Su, D. Choffnes, A. Kuzmanovic, and F. Bustamante
    In Proceedings of ACM SIGCOMM 2006, Pisa, Italy, September 2006.
    [ .pdf | .pdf.gz | .ppt | review ]
    How overlay networks can reuse measurements collected by CDNs.
    Measurement data sets are available here; a BitTorrent plugin could be downloaded here.

  • TCP-LP: Low-Priority Service via End-Point Congestion Control
    A. Kuzmanovic and E. Knightly
    In IEEE/ACM Transactions on Networking, 14(4), August 2006.
    [ .pdf | .pdf.gz | review | response ]
    An extended version of the INFOCOM 2003 paper.
    The official TCP-LP patch for Linux is avilable here.

  • Low-Rate TCP-Targeted Denial of Service Attacks and Counter Strategies
    A. Kuzmanovic and E. Knightly
    In IEEE/ACM Transactions on Networking, 14(4), August 2006.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the SIGCOMM 2003 paper.

2005
  • The Power of Explicit Congestion Notification
    A. Kuzmanovic
    In Proceedings of ACM SIGCOMM 2005, Philadelphia, PA, August 2005.
    [ .pdf | .pdf.gz | .ppt | review ]
    How and why ECN helps you, and why people should "turn it on."

  • Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems
    D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel
    In Proceedings of ACM SIGMETRICS 2005, Banff, Alberta, Canada, June 2005.
    [ .pdf | .pdf.gz | .ppt | review ]
    Why are pollution attacks against peer-to-peer systems so successful?

2004 and before
  • A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols
    A. Kuzmanovic and E. Knightly
    In Proceedings of IEEE ICNP 2004, Berlin, Germany, October 2004.
    [ .pdf | .pdf.gz | .ppt | review ]
    How to fix the security problems of receiver-driven TCP stacks.
    NS-2 simulator source code and scripts can be downloaded here.

  • Edge-Based Inference, Control, and Denial-of-Service Resilience for the Internet
    A. Kuzmanovic
    Ph.D. Thesis, Rice University, Houston, TX, August 2004.
    [ .pdf | .pdf.gz | .ppt ]

  • HSTCP-LP: A Protocol for Low-Priority Bulk Data Transfer in High-Speed High-RTT Networks
    A. Kuzmanovic, E. Knightly, and R. Les Cottrell
    In Proceedings of PFLDnet 2004, Argonne, Illinois, February 2004.
    [ .pdf | .pdf.gz | .ppt ] (Abstract)
    TCP-LP for high-speed networks.
    HSTCP-LP Linux source code can be downloaded here.

  • Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants)
    A. Kuzmanovic and E. Knightly
    In Proceedings of ACM SIGCOMM 2003, Karlsruhe, Germany, August 2003.
    [ .pdf| .pdf.gz| .ppt| review/response| Russian translation ]
    How you can deny service without blasting the network.
    NS-2 simulator and Linux source code can be downloaded here.

  • Measurement Based Characterization and Classification of QoS-Enhanced Systems
    A. Kuzmanovic and E. Knightly
    In IEEE Transactions on Parallel and Distributed Systems, 14(7): 671-685, July 2003.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the Infocom Infocom 2001 paper.

  • TCP-LP: A Distributed Algorithm for Low Priority Data Transfer
    A. Kuzmanovic and E. Knightly
    In Proceedings of IEEE INFOCOM 2003, San Francisco, CA, April 2003.
    [ .pdf | .pdf.gz | .ppt | review ]
    A TCP stack for non-intrusive background bulk data transfers.
    NS-2 simulator and Linux source code can be downloaded here.

  • Measuring Service in Multi-Class Networks
    A. Kuzmanovic and E. Knightly
    In Proceedings of IEEE INFOCOM 2001, Anchorage, Alaska, April 2001.
    [ .pdf | .pdf.gz | .ppt | review | response ]
    How you can infer multi-class network mechanisms and parameters.