Northwestern Networks Group's Publications



  • Monetizing Spare Bandwidth: the Case of Distributed VPNs
    Y. Xiao, M. Varvello, and A. Kuzmanovic
    Proceedings of ACM SIGMETRICS / PERFORMANCE '22, Mumbai, India 2022.
    [ .pdf | .pdf.gz | video]
    How to earn money by selling your access bandwidth when you're not using it.

  • Web-LEGO: Trading Content Strictness for Faster Webpages
    P. Wang, M. Varvello, C. Ni, R. Yu, and A. Kuzmanovic
    Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '21), Vancouver, Canada 2021.
    [ .pdf | .pdf.gz | slides]
    Speedup webpages at client side by replacing the slow original content with fast similar or equal content.

  • De-Kodi: Understanding the Kodi Ecosystem
    M. Warrior, Y. Xiao, M. Varvello, and A. Kuzmanovic
    Proceedings of the Web Conference (WWW '20) Taipei, Taiwan, April 2020.
    [ .pdf | .pdf.gz | slides | project ]
    The first analysis of the Kodi ecosystem.

  • Kaleidoscope: A Crowdsourcing Testing Tool for Web Quality of Experience
    P. Wang, M. Varvello, and A. Kuzmanovic
    Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS '19), Dallas, Texas, July 2019.
    [ .pdf | .pdf.gz | slides ]
    How to scale Web quality of experience testing.

  • Net Neutrality: Unexpected Solution to Blockchain Scaling
    A. Kuzmanovic
    ACM Queue Magazine, Volume 17, Issue 1, January/February 2019
    Communications of the ACM Magazine, May 2019
    [ paper ]
    How to scale blockchains (without changing a single line of code).

  • Perceiving Internet Anomalies via CDN Replica Shifts
    Y. Jia and A. Kuzmanovic
    In IEEE INFOCOM '19, Paris, France, April/May 2019.
    [ .pdf | .pdf.gz | slides ]
    How to utilize CDNs to detect Internet anomalies.

  • Mining the Web with Webcoin
    U. Klarman, M. Flores, and A. Kuzmanovic
    In ACM CoNEXT '18, Heraklion/Crete, Greece, December 2018.
    [ .pdf | .pdf.gz | project]
    How Bitcoin's incentive model can be used to crowdsource complex networking tasks.

  • "What's the Score?": A First Look at Sports Live Data Feed Services
    P. Wang and A. Kuzmanovic
    Proccedings of the 21st IEEE Global Internet Symposium, Honolulu, Hi, April 2018.
    [ .pdf | .pdf.gz]
    A first measurement study on sports live data feed services.

  • Fury Route: Leveraging CDNs to Remotely Measure Network Distance
    M. Flores, A. Wenzel, K. Chen, and A. Kuzmanovic
    Proceedings of the 19th International Conference on Passive and Active Measurement, Berlin, Germany, March 2018.
    [ .pdf | .pdf.gz | slides | review ]
    A method to estimate network distance between arbitrary Internet endpoints, without any infrastructure.

  • Drongo: Speeding Up CDNs with Subnet Assimilation from the Client
    M. Warrior, U. Klarman, M. Flores, and A. Kuzmanovic
    In ACM CoNEXT '17, Seoul, South Korea, December 2017.
    [ .pdf | .pdf.gz | review ]
    Drongo introduces the first approach to enable clients to actively measure CDNs and effectively improve their selection decisions, while requiring no changes to the CDNs and respecting CDNs' policies.

  • Oak: User-Targeted Web Performance
    M. Flores, A. Wenzel, and A. Kuzmanovic
    In IEEE ICDCS '17, Atlanta, Georgia, June 2017.
    [ To appear ]
    Oak provides an automated mechanism by which sites are able to replace under-performing resources at an individual user level.

  • Enabling Router-Assisted Congestion Control on the Internet
    M. Flores, A. Wenzel, and A. Kuzmanovic
    In IEEE ICNP '16, Singapore, November 2016.
    [ .pdf | .pdf.gz | slides | review ]
    The paper develops a mechanism that enables explicit rate congestion control protocols to be deployed within the TCP/IP stack.
    The Linux source code, for routers and endpoints, is available here.

  • Understanding Factors That Affect Web Traffic via Twitter
    C. Xiao, Z. Qin, X. Luo, and A. Kuzmanovic
    In WISE '16, Shanghai, China, November 2016.
    [ .pdf | .pdf.gz ]
    The paper analyzes the key factors that affect the Twitter click-through rates.

  • DNS-sly: Avoiding Censorship through Network Complexity
    Q. Akbar, M. Flores, and A. Kuzmanovic
    In USENIX FOCI '16, Austin, Texas, August 2016.
    [ .pdf | .pdf.gz | slides | review ]
    Exploiting network complexity to build a DNS-based counter-censorship system with strong covertness and deniability properties.

  • Riptide: Jump-Starting Back-Office Connections in Cloud Systems
    M. Flores, A. Khakpour, and H. Bedi
    In IEEE ICDCS '16, Nara, Japan, June 2016.
    [ .pdf | .pdf.gz | slides | review ]
    Taking advantage of open connections to optimize cloud communications (work with Verizon Digital Media Services).

  • Wi-FM: Resolving Neighborhood Wireless Network Affairs by Listening to Music
    M. Flores, U. Klarman, and A. Kuzmanovic
    In IEEE ICNP '15, San Francisco, California, November 2015.
    [ .pdf | .pdf.gz | slides | review | press ]
    Using FM radio to coordinate wireless devices across autonomous Wi-Fi networks.

  • Measuring Web Servers' Popularity from an Endpoint
    A.-J. Su and A. Kuzmanovic
    Tech. Report NWU-EECS-15-03, Department of EECS, Northwestern University, October 2015.
    [ .pdf | .pdf.gz ]
    How one can measure a Web server's popularity from an endpoint.

  • Towards Application-Level Multi-Homing
    Y. Wang, H. Wu, W. Zhang, Y. Li, and A. Kuzmanovic
    Tech. Report NWU-EECS-15-04, Department of EECS, Northwestern University, November 2015.
    [ .pdf | .pdf.gz ]
    Building a data transfer infrastructure on top of Gmail, YouTube, Flickr, and the like.

  • Synthoid: Endpoint User Profile Control
    M. Flores and A. Kuzmanovic
    In IEEE/WIC/ACM International Conference on Web Intelligence, Warsaw, Poland, August 2014.
    [ .pdf | .pdf.gz | slides | review ]
    How to control your profile at online trackers.

  • GeoEcho: Inferring User Interests from Geotag Reports in Network Traffic
    N. Xia, S. Miskovic, M. Baldi, A. Kuzmanovic, and A. Nucci
    In IEEE/WIC/ACM International Conference on Web Intelligence, Warsaw, Poland, August 2014 (Best Paper Award)
    [ .pdf | .pdf.gz | slides | review | press ]
    How one can utilize geotag beacons from your phone to understand your inerests.

  • A CDN-Based Domain Name System
    Z. Qin, C, Xiao, Q. Wang, Y. Jin, and A. Kuzmanovic
    In Computer Communications, Volume 45, pages 11-20, June 2014.
    [ .pdf ]
    The paper demonstrates how public DNS resolvers effectively corrupt the CDN model and what can be done about it.

  • How to Improve Your Search Engine Ranking: Myths and Reality
    A.-J. Su, Y. C. Hu, A. Kuzmanovic, and C.-K. Koh
    In ACM Transactions on the Web, March 2014.
    [ .pdf | press ]
    An extended version of the WI 2010 paper that includes the Bing search engine analysis.

  • Mosaic: Quantifying Privacy Leakage in Mobile Networks
    N. Xia, H. Song, Y. Liao, M. Iliofotou, A. Nucci, Z. Zhang, and A. Kuzmanovic
    In Proceedings of ACM SIGCOMM 2013, Hong Kong, China, August 2013.
    [ .pdf | .pdf.gz | slides | review ]
    How to utilize OSN IDs and other identifiers to attribute significant amounts of traffic to individual users in mobile networks.

  • Rayleigh-normalized Gaussian Noise in Blind Signal Fusion
    A. Ballew, C. C. Lee, and A. Kuzmanovic
    In Proceedings of FUSION 2013, Istanbul, Turkey, July 2013.
    [ .pdf | .pdf.gz | review ]
    How to combine multiple poor-quality YouTube clips into a single high-quality one, part 2. Warning: too much math.

  • A Glance at an Overlooked Part of the World Wide Web
    I. Trestian, C. Xiao, and A. Kuzmanovic
    Proceedings of the 1st International Web Observatory Workshop, WOW2013, Rio De Janerio, Brazil, May 2013.
    [ .pdf | .pdf.gz | review ]
    A large-scale analysis of adult online services. Warning: Rated R.

  • Searching for Spam: Detecting Fraudulent Accounts Via Websearch
    M. Flores and A. Kuzmanovic
    Proceedings of the 14th International Conference on Passive and Active Measurement, Hong Kong, China, March 2013.
    [ .pdf | .pdf.gz | slides | review ]
    A method for detecting fraudulent accounts on Twitter by measuring web presence via websearch.

  • Selective Behavior in Online Social Networks
    C. Xiao, L. Su, J. Bi, Y. Xue, and A. Kuzmanovic
    In IEEE/WIC/ACM International Conference on Web Intelligence, Macau, China, December 2012.
    [ .pdf | .pdf.gz | .ppt | review ]
    A large-scale analysis on disseminators and audiences properties (age, gender and location), and their correlation in YouTube, Flickr and Twitter.

  • P2P as a CDN: A New Service Model for File Sharing
    A. Mondal, I. Trestian, Z. Qin, and A. Kuzmanovic
    In Journal of Computer Networks, to appear, 2012.
    [ .html | First review | Second review ]
    How to use unused upload bandwidth for localizing resources in a P2P swarm.

  • Characterization of Vision-aided Indoor Localization and Landmark Routing
    A. Ballew, S. Srivastava, N. Valtchanov, C.-C. Lee, and A. Kuzmanovic
    In Proceedings of The Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2012), Palermo, Italy, July 2012.
    [ .pdf | .pdf.gz | .ppt | review ]
    A characterization of indoor localization with vision-aid.

  • Understanding Human Movement Semantics: A Point of Interest Based Approach
    I. Trestian, K. Huguenin, L. Su, and A. Kuzmanovic
    Poster paper in Proceedings of WWW 2012, Lyon, France, April 2012.
    [ .pdf | .pdf.gz | poster | review ]
    A short paper describing how one can understand human movement characteristics by considering the influence of points of interest.

  • Taming the Mobile Data Deluge with Drop Zones
    I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci
    In IEEE/ACM Transactions on Networking , to appear.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the INFOCOM 2011 paper.

  • Understanding Crowds' Migration on the Web
    Y. Wang, K. Pal, and A. Kuzmanovic
    In IEEE/WIC/ACM International Conference on Web Intelligence, Lyon, France, August 2011.
    [ .pdf | .pdf.gz | .ppt | review ]
    A large-scale analysis on how users' interests collectively spread on the Web.

  • Understanding End-User Perception of Network Problems
    J. Scott Miller, A. Mondal, R. Potharaju, P. Dinda, and A. Kuzmanovic
    In Proceedings of ACM SIGCOMM Workshop on Measurements Up the STack (W-MUST), Toronto, CA, August 2011.
    [ .pdf | .pdf.gz | .ppt | review ]
    Which network-level problems are annoying for people, and which are not?

  • Fusion of Live Audio Recordings for Blind Noise Reduction
    A. Ballew, A. Kuzmanovic, and C.C. Lee
    In Proceedings of FUSION 2011, Chicago, IL, July 2011.
    [ .pdf | .pdf.gz | .ppt | review ]
    How to combine multiple poor-quality YouTube clips into a single high-quality one?

  • Measurement and Diagnosis of Address-Misconfigured P2P Traffic
    Z. Li, A. Goyal, Y. Chen, and A. Kuzmanovic
    In IEEE Network Magazine, 2011.
    [ .pdf | .pdf.gz | review ]
    An extended version of the Infocom 2010 paper.

  • Understanding the Network and User-Targeting Properties of Web Advertising Networks
    Y. Wang, D. Burgener, A. Kuzmanovic, and G. Macia
    In Proceedings of IEEE ICDCS 2011, Minneapolis, MN, June 2011.
    [ .pdf | .pdf.gz | .ppt | review ]
    The paper analyzes the properties of Web advertising networks.

  • Towards Street-Level Client-Independent IP Geolocation
    Y. Wang, D. Burgener, M. Flores, A. Kuzmanovic, and C. Huang
    In Proceedings of USENIX NSDI 2011, Boston, MA, March 2011.
    [ .pdf | .pdf.gz | .ppt | video | review | press ]
    The paper presents a method for geolocating IP addresses with extreme accuracy.

  • Taming User-Generated Content in Mobile Networks via Drop Zones
    I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci
    In Proceedings of IEEE INFOCOM 2011, Shanghai, China, April 2011.
    [ .pdf | .pdf.gz | .ppt | review ]
    This paper considers how the large amounts of user upload activity can be economically supported in mobile networks.

  • Extracting User Web Browsing Patterns from Non-Content Network Traces: The Online Advertising Case Study
    G. Macia, Y. Wang, R. Rodriguez, and A. Kuzmanovic
    In Journal of Computer Networks, to appear, 2011.
    [ .pdf | .pdf.gz | review ]
    An extended version of the INFOCOM 2010 paper.

  • How to Improve Your Google Ranking: Myths and Reality
    A.-J. Su, Y. C. Hu, A. Kuzmanovic, and C.-K. Koh
    In IEEE/WIC/ACM International Conference on Web Intelligence, Toronto, Canada, August 2010.
    [ .pdf | .pdf.gz | .ppt | review | press ]
    How you should update your web page so that it gets highly ranked by Google.

  • Measurement Lab: Overview and an Invitation to the Research Community
    C. Dovrolis, K. Gummadi, A. Kuzmanovic, and S. Meinrath
    In ACM SIGCOMM Computer Communication Review (editorial note), Volume 40, Number 3, July 2010.
    [ .pdf | .pdf.gz ]
    The paper presents an overview of the Measurement Lab.

  • SureCall: Towards Glitch-Free Real-Time Audio/Video Conferencing
    A. Mondal, R. Cutler, C. Huang, J. Li, and A. Kuzmanovic
    In Proceedings of IEEE IWQoS 2010, Beijing, China, June 2010.
    [ .pdf | .pdf.gz | .ppt | review ]
    The paper presents SureCall, a distributed experimental platform for audio/video conferencing.

  • Analyzing Content-Level Properties of the Web Adversphere
    Y. Wang, D. Burgener, A. Kuzmanovic, and G. Macia
    Poster paper in Proceedings of WWW 2010, Raleigh, NC, April 2010.
    [ .pdf | .pdf.gz | .ppt | review ]
    A short paper describing our initial efforts on building a content-level auditing service for web-based ad networks.

  • ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection
    G. Macia, Y. Wang, R. Rodriguez, and A. Kuzmanovic
    In Proceedings of IEEE INFOCOM 2010, San Diego, CA, March 2010.
    [ .pdf | .pdf.gz | .ppt | review | press ]
    The paper explains how ISPs can generate accurate user profiles and perform behavioral ad targeting without inspecting the packet payload.

  • Measurement and Diagnosis of Address-Misconfigured P2P Traffic
    Z. Li, A. Goyal, Y. Chen, and A. Kuzmanovic
    In Proceedings of IEEE INFOCOM 2010, San Diego, CA, March 2010.
    [ .pdf | .pdf.gz | .ppt | review ]
    The paper shows that p2p misconfigurations are remarkably prevalent, and diagnoses the root causes of this phenomenon in different p2p systems.

  • Drafting Behind Akamai: Inferring Network Conditions Based on CDN Redirections
    A.-J. Su, D. Choffnes, A. Kuzmanovic, and F. Bustamante
    In IEEE/ACM Transactions on Networking, (17)6, December 2009.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the SIGCOMM 2006 paper.

  • Measuring Serendipity: Connecting People, Locations and Interests in a Mobile 3G Network
    I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci
    In Proceedings of USENIX/ACM SIGCOMM Internet Measurement Conference (IMC'09), Chicago, IL, November 2009.
    [ .pdf | .pdf.gz | .ppt | review ]
    The paper performs a large scale study of application usage and mobility across a large metropolitan area.

  • Googling the Internet: Profiling Internet Endpoints via the World Wide Web
    I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci
    In IEEE/ACM Transactions on Networking, to appear, August 2009.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the SIGCOMM 2008 paper.

  • Supporting Application Network Flows with Multiple QoS Constraints
    A. Mondal, P. Sharma, S. Banerjee, and A. Kuzmanovic
    In Proceedings of IEEE IWQoS 2009, Charleston, SC, July 2009.
    [ .pdf | .pdf.gz | .ppt | review ]
    The paper designs a framework to find routes that meet individual QoS metrics efficiently and scalably under multiple QoS constraints.

  • Adding Explicit Congestion Notification (ECN) Capability to TCP's SYN/ACK Packets
    A. Kuzmanovic, A. Mondal, S. Floyd, and K.K. Ramakrishnan
    RFC 5562, June 2009.
    [ .txt ]
    An RFC based on the SIGCOMM 2005 paper.

  • Upgrading Mice to Elephants: Effects and End-Point Solutions
    A. Mondal and A. Kuzmanovic
    In IEEE/ACM Transactions on Networking, to appear, March 2009.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the INFOCOM 2007 paper.

  • Removing Exponential Backoff from TCP
    A. Mondal and A. Kuzmanovic
    In ACM SIGCOMM Computer Communication Review,
    Volume 38, Number 5, October 2008.
    [ .pdf | .pdf.gz | review | response ]
    The paper argues that the exponential backoff mechanism, introduced by Van Jacobson 20 years ago, should be removed from TCP.

  • Monitoring Persistently Congested Internet Links
    L. Deng and A. Kuzmanovic
    In Proceedings of IEEE ICNP 2008, Orlando, FL, October 2008.
    [ .pdf | .pdf.gz | .ppt | .ppt.gz| review ]
    How you can locate and monitor persistently congested Internet links efficiently.

  • Thinning Akamai
    A.-J. Su and A. Kuzmanovic
    In Proceedings of USENIX/ACM SIGCOMM Internet Measurement Conference (IMC'08), Vouliagmeni, Greece, October 2008.
    [ .pdf | .pdf.gz | .ppt | review]
    How you can deny service to large-scale DNS-driven streaming networks.

  • Unconstrained Endpoint Profiling (Googling the Internet)
    I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci
    In Proceedings of ACM SIGCOMM 2008, Seattle, WA, August 2008.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can use Google to profile Internet endpoints.

  • Monitoring Network Bias
    G. Biczok, W. Young, and A. Kuzmanovic
    Poster paper in Proceedings of ACM SIGCOMM 2008, Seattle, WA, August 2008.
    [ .pdf | .pdf.gz | .ppt | review ]
    A short paper describing our initial efforts on monitoring network bias.

  • Relative Network Positioning via CDN Redirections
    A.-J. Su, D. Choffnes, F. Bustamante, and A. Kuzmanovic
    In Proceedings of IEEE ICDCS 2008, Beijing, China, June 2008.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can use CDNs' redirections for network positioning.

  • Pollution Attacks and Defenses for Internet Caching Systems
    L. Deng, Y. Gao, Y. Chen, and A. Kuzmanovic
    In Journal of Computer Networks, 52(5): 935-956, April 2008.
    [ .pdf | .pdf.gz | review | response ]
    An extended version of the ICNP 2006 paper.

  • A Poisoning-Resilient TCP Stack
    A. Mondal and A. Kuzmanovic
    In Proceedings of IEEE ICNP 2007, Beijing, China, October 2007.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can protect your TCP connection from poisoning attacks, yet without using cryptography.

  • What Lies Beneath: Understanding Internet Congestion
    L. Deng, A. Kuzmanovic, and B. Davie
    Tech. Report NWU-EECS-07-12, Department of EECS, Northwestern University, October 2007.
    [ .pdf | .pdf.gz | .ppt ]
    Measurement and analysis on the congestion in the Internet core.

  • Pong: Diagnosing Spatio-Temporal Internet Congestion Properties
    L. Deng and A. Kuzmanovic
    Poster paper in Proceedings of ACM SIGMETRICS 2007, San Diego, CA, June 2007.
    [ .pdf | .pdf.gz | .ppt | .ppt.gz| review ]
    How you can accurately locate and characterize congestion in the Internet.
    Pong's source code and measurement data could be downloaded here.

  • When TCP Friendliness Becomes Harmful
    A. Mondal and A. Kuzmanovic
    In Proceedings of IEEE INFOCOM 2007, Anchorage, Alaska, May 2007.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can improve interactive applications' performance, yet without "getting caught."

  • Receiver-Centric Congestion Control with a Misbehaving Receiver: Vulnerabilities and End-Point Solutions
    A. Kuzmanovic and E. Knightly
    To appear in Journal of Computer Networks.
    [ .pdf | .pdf.gz | review | response ]
    An extended version of the ICNP 2004 paper.

  • Internet Cache Pollution Attacks and Countermeasures
    Y. Gao, L. Deng, A. Kuzmanovic, and Y. Chen
    In Proceedings of IEEE ICNP 2006, Santa Barbara, CA, November 2006.
    [ .pdf | .pdf.gz | .ppt | review ]
    How you can detect and protect against cache-targeted pollution attacks.
    A Squid-based implementation could be downloaded here.

  • On the Use of Parallel Connections in Web Browsers
    D. Choffnes, J. Lange, S. Rossoff, and A. Kuzmanovic
    Tech. Report NWU-EECS-06-15, Department of EECS, Northwestern University, October 2006.
    [ .pdf | .pdf.gz ]
    Analysis and implications of popular web browsers' behavior.
    Simulation scripts and Linux code could be download here.

  • Drafting Behind Akamai (Travelocity-Based Detouring)
    A.-J. Su, D. Choffnes, A. Kuzmanovic, and F. Bustamante
    In Proceedings of ACM SIGCOMM 2006, Pisa, Italy, September 2006.
    [ .pdf | .pdf.gz | .ppt | review ]
    How overlay networks can reuse measurements collected by CDNs.
    Measurement data sets are available here; a BitTorrent plugin could be downloaded here.

  • TCP-LP: Low-Priority Service via End-Point Congestion Control
    A. Kuzmanovic and E. Knightly
    In IEEE/ACM Transactions on Networking, 14(4), August 2006.
    [ .pdf | .pdf.gz | review | response ]
    An extended version of the INFOCOM 2003 paper.
    The official TCP-LP patch for Linux is avilable here.

  • Low-Rate TCP-Targeted Denial of Service Attacks and Counter Strategies
    A. Kuzmanovic and E. Knightly
    In IEEE/ACM Transactions on Networking, 14(4), August 2006.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the SIGCOMM 2003 paper.

  • The Power of Explicit Congestion Notification
    A. Kuzmanovic
    In Proceedings of ACM SIGCOMM 2005, Philadelphia, PA, August 2005.
    [ .pdf | .pdf.gz | .ppt | review ]
    How and why ECN helps you, and why people should "turn it on."

  • Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems
    D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel
    In Proceedings of ACM SIGMETRICS 2005, Banff, Alberta, Canada, June 2005.
    [ .pdf | .pdf.gz | .ppt | review ]
    Why are pollution attacks against peer-to-peer systems so successful?

  • A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols
    A. Kuzmanovic and E. Knightly
    In Proceedings of IEEE ICNP 2004, Berlin, Germany, October 2004.
    [ .pdf | .pdf.gz | .ppt | review ]
    How to fix the security problems of receiver-driven TCP stacks.
    NS-2 simulator source code and scripts can be downloaded here.

  • Edge-Based Inference, Control, and Denial-of-Service Resilience for the Internet
    A. Kuzmanovic
    Ph.D. Thesis, Rice University, Houston, TX, August 2004.
    [ .pdf | .pdf.gz | .ppt ]

  • HSTCP-LP: A Protocol for Low-Priority Bulk Data Transfer in High-Speed High-RTT Networks
    A. Kuzmanovic, E. Knightly, and R. Les Cottrell
    In Proceedings of PFLDnet 2004, Argonne, Illinois, February 2004.
    [ .pdf | .pdf.gz | .ppt ] (Abstract)
    TCP-LP for high-speed networks.
    HSTCP-LP Linux source code can be downloaded here.

  • Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew vs. the Mice and Elephants)
    A. Kuzmanovic and E. Knightly
    In Proceedings of ACM SIGCOMM 2003, Karlsruhe, Germany, August 2003.
    [ .pdf| .pdf.gz| .ppt| review/response| Russian translation ]
    How you can deny service without blasting the network.
    NS-2 simulator and Linux source code can be downloaded here.

  • Measurement Based Characterization and Classification of QoS-Enhanced Systems
    A. Kuzmanovic and E. Knightly
    In IEEE Transactions on Parallel and Distributed Systems, 14(7): 671-685, July 2003.
    [ .pdf | .pdf.gz | review/response ]
    An extended version of the Infocom Infocom 2001 paper.

  • TCP-LP: A Distributed Algorithm for Low Priority Data Transfer
    A. Kuzmanovic and E. Knightly
    In Proceedings of IEEE INFOCOM 2003, San Francisco, CA, April 2003.
    [ .pdf | .pdf.gz | .ppt | review ]
    A TCP stack for non-intrusive background bulk data transfers.
    NS-2 simulator and Linux source code can be downloaded here.

  • Measuring Service in Multi-Class Networks
    A. Kuzmanovic and E. Knightly
    In Proceedings of IEEE INFOCOM 2001, Anchorage, Alaska, April 2001.
    [ .pdf | .pdf.gz | .ppt | review | response ]
    How you can infer multi-class network mechanisms and parameters.