Skip to main content

Showing 1–20 of 20 results for author: Smaragdakis, G

.
  1. arXiv:2309.15622  [pdf, other

    cs.NI

    Pushing Alias Resolution to the Limit

    Authors: Taha Albakour, Oliver Gasser, Georgios Smaragdakis

    Abstract: In this paper, we show that utilizing multiple protocols offers a unique opportunity to improve IP alias resolution and dual-stack inference substantially. Our key observation is that prevalent protocols, e.g., SSH and BGP, reply to unsolicited requests with a set of values that can be combined to form a unique device identifier. More importantly, this is possible by just completing the TCP hand-s… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  2. arXiv:2309.15612  [pdf, other

    cs.NI

    Illuminating Router Vendor Diversity Within Providers and Along Network Paths

    Authors: Taha Albakour, Oliver Gasser, Robert Beverly, Georgios Smaragdakis

    Abstract: The Internet architecture has facilitated a multi-party, distributed, and heterogeneous physical infrastructure where routers from different vendors connect and inter-operate via IP. Such vendor heterogeneity can have important security and policy implications. For example, a security vulnerability may be specific to a particular vendor and implementation, and thus will have a disproportionate imp… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  3. arXiv:2302.00598  [pdf, other

    cs.SI

    Reviewing War: Unconventional User Reviews as a Side Channel to Circumvent Information Controls

    Authors: José Miguel Moreno, Sergio Pastrana, Jens Helge Reelfs, Pelayo Vallina, Andriy Panchenko, Georgios Smaragdakis, Oliver Hohlfeld, Narseo Vallina-Rodriguez, Juan Tapiador

    Abstract: During the first days of the 2022 Russian invasion of Ukraine, Russia's media regulator blocked access to many global social media platforms and news sites, including Twitter, Facebook, and the BBC. To bypass the information controls set by Russian authorities, pro-Ukrainian groups explored unconventional ways to reach out to the Russian population, such as posting war-related content in the user… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

  4. Deep Dive into the IoT Backend Ecosystem

    Authors: Said Jawad Saidi, Srdjan Matic, Oliver Gasser, Georgios Smaragdakis, Anja Feldmann

    Abstract: Internet of Things (IoT) devices are becoming increasingly ubiquitous, e.g., at home, in enterprise environments, and in production lines. To support the advanced functionalities of IoT devices, IoT vendors as well as service and cloud companies operate IoT backends -- the focus of this paper. We propose a methodology to identify and locate them by (a) compiling a list of domains used exclusively… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Journal ref: Proceedings of the 2022 ACM Internet Measurement Conference (IMC '22)

  5. arXiv:2205.05028  [pdf, other

    cs.CR

    A Tale of Two Markets: Investigating the Ransomware Payments Economy

    Authors: Kris Oosthoek, Jack Cable, Georgios Smaragdakis

    Abstract: Ransomware attacks are among the most severe cyber threats. They have made headlines in recent years by threatening the operation of governments, critical infrastructure, and corporations. Collecting and analyzing ransomware data is an important step towards understanding the spread of ransomware and designing effective defense and mitigation mechanisms. We report on our experience operating Ranso… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

  6. arXiv:2203.08946  [pdf, other

    cs.CR cs.NI

    One Bad Apple Can Spoil Your IPv6 Privacy

    Authors: Said Jawad Saidi, Oliver Gasser, Georgios Smaragdakis

    Abstract: IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that have already been installed at home. Unfortunately, we find that the privacy of a substantial fraction of end-users is still at risk, despite the efforts by ISPs and electronic vendors to improve end-user security, e.g., by adopting prefix rotation and IPv6 privacy extensions. By analyzing passive data fr… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Accepted at ACM SIGCOMM Computer Communication Review, to appear in the April 2022 issue

  7. Securing Federated Sensitive Topic Classification against Poisoning Attacks

    Authors: Tianyue Chu, Alvaro Garcia-Recuero, Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris

    Abstract: We present a Federated Learning (FL) based solution for building a distributed classifier capable of detecting URLs containing GDPR-sensitive content related to categories such as health, sexual preference, political beliefs, etc. Although such a classifier addresses the limitations of previous offline/centralised classifiers,it is still vulnerable to poisoning attacks from malicious users that ma… ▽ More

    Submitted 28 October, 2022; v1 submitted 31 January, 2022; originally announced January 2022.

    MSC Class: 68M25 ACM Class: I.2.11; K.4.1

    Journal ref: Network and Distributed System Security (NDSS) Symposium 2023

  8. arXiv:2110.03816  [pdf, other

    cs.NI

    AS-Level BGP Community Usage Classification

    Authors: Thomas Krenc, Robert Beverly, Georgios Smaragdakis

    Abstract: BGP communities are a popular mechanism used by network operators for traffic engineering, blackholing, and to realize network policies and business strategies. In recent years, many research works have contributed to our understanding of how BGP communities are utilized, as well as how they can reveal secondary insights into real-world events such as outages and security attacks. However, one fun… ▽ More

    Submitted 7 October, 2021; originally announced October 2021.

  9. Third Time's Not a Charm: Exploiting SNMPv3 for Router Fingerprinting

    Authors: Taha Albakour, Oliver Gasser, Robert Beverly, Georgios Smaragdakis

    Abstract: In this paper, we show that adoption of the SNMPv3 network management protocol standard offers a unique -- but likely unintended -- opportunity for remotely fingerprinting network infrastructure in the wild. Specifically, by sending unsolicited and unauthenticated SNMPv3 requests, we obtain detailed information about the configuration and status of network devices including vendor, uptime, and the… ▽ More

    Submitted 6 October, 2021; v1 submitted 30 September, 2021; originally announced September 2021.

    Comments: Visit https://snmpv3.io for up-to-date SNMPv3 measurement results

    Journal ref: Proceedings of the 2021 ACM Internet Measurement Conference (IMC '21)

  10. Exploring Network-Wide Flow Data with Flowyager

    Authors: Said Jawad Saidi, Aniss Maghsoudlou, Damien Foucard, Georgios Smaragdakis, Ingmar Poese, Anja Feldmann

    Abstract: Many network operations, ranging from attack investigation and mitigation to traffic management, require answering network-wide flow queries in seconds. Although flow records are collected at each router, using available traffic capture utilities, querying the resulting datasets from hundreds of routers across sites and over time, remains a significant challenge due to the sheer traffic volume and… ▽ More

    Submitted 27 October, 2020; v1 submitted 25 October, 2020; originally announced October 2020.

    Comments: accepted at IEEE TNSM Journal DOI added

  11. arXiv:2010.00745  [pdf, other

    cs.NI

    Keep your Communities Clean: Exploring the Routing Message Impact of BGP Communities

    Authors: Thomas Krenc, Robert Beverly, Georgios Smaragdakis

    Abstract: BGP communities are widely used to tag prefix aggregates for policy, traffic engineering, and inter-AS signaling. Because individual ASes define their own community semantics, many ASes blindly propagate communities they do not recognize. Prior research has shown the potential security vulnerabilities when communities are not filtered. This work sheds light on a second unintended side-effect of co… ▽ More

    Submitted 2 November, 2020; v1 submitted 1 October, 2020; originally announced October 2020.

  12. arXiv:2009.01880  [pdf, other

    cs.NI

    A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild

    Authors: Said Jawad Saidi, Anna Maria Mandalari, Roman Kolcun, Hamed Haddadi, Daniel J. Dubois, David Choffnes, Georgios Smaragdakis, Anja Feldmann

    Abstract: Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable recent large scale coordinated global attacks disrupting large service providers. Thus, an important first step to address these risks is to know w… ▽ More

    Submitted 30 September, 2020; v1 submitted 3 September, 2020; originally announced September 2020.

    Comments: Accepted at the ACM Internet Measurement Conference 2020 (IMC'20)

  13. The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic

    Authors: Anja Feldmann, Oliver Gasser, Franziska Lichtblau, Enric Pujol, Ingmar Poese, Christoph Dietzel, Daniel Wagner, Matthias Wichtlhuber, Juan Tapiador, Narseo Vallina-Rodriguez, Oliver Hohlfeld, Georgios Smaragdakis

    Abstract: Due to the COVID-19 pandemic, many governments imposed lock downs that forced hundreds of millions of citizens to stay at home. The implementation of confinement measures increased Internet traffic demands of residential users, in particular, for remote working, entertainment, commerce, and education, which, as a result, caused traffic shifts in the Internet core. In this paper, using data from a… ▽ More

    Submitted 5 October, 2020; v1 submitted 25 August, 2020; originally announced August 2020.

    Journal ref: Proceedings of the 2020 Internet Measurement Conference (IMC '20)

  14. arXiv:2004.10887  [pdf, other

    cs.SE cs.LG cs.NI

    Towards Runtime Verification of Programmable Switches

    Authors: Apoorv Shukla, Kevin Hudemann, Zsolt Vági, Lily Hügerich, Georgios Smaragdakis, Stefan Schmid, Artur Hecker, Anja Feldmann

    Abstract: Is it possible to patch software bugs in P4 programs without human involvement? We show that this is partially possible in many cases due to advances in software testing and the structure of P4 programs. Our insight is that runtime verification can detect bugs, even those that are not detected at compile-time, with machine learning-guided fuzzing. This enables a more automated and real-time locali… ▽ More

    Submitted 26 April, 2020; v1 submitted 22 April, 2020; originally announced April 2020.

    Comments: added a missing author name to a reference

  15. arXiv:1908.02261  [pdf, other

    cs.CR cs.CY cs.NI

    Who's Tracking Sensitive Domains?

    Authors: Costas Iordanou, Georgios Smaragdakis, Nikolaos Laoutaris

    Abstract: We turn our attention to the elephant in the room of data protection, which is none other than the simple and obvious question: "Who's tracking sensitive domains?". Despite a fast-growing amount of work on more complex facets of the interplay between privacy and the business models of the Web, the obvious question of who collects data on domains where most people would prefer not be seen, has rece… ▽ More

    Submitted 6 August, 2019; originally announced August 2019.

  16. arXiv:1902.02165  [pdf, ps, other

    cs.NI

    The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research

    Authors: Vaibhav Bajpai, Anna Brunstrom, Anja Feldmann, Wolfgang Kellerer, Aiko Pras, Henning Schulzrinne, Georgios Smaragdakis, Matthias Wählisch, Klaus Wehrle

    Abstract: Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.

    Submitted 12 January, 2019; originally announced February 2019.

    Journal ref: SIGCOMM Computer Communication Review (2019)

  17. Beyond Counting: New Perspectives on the Active IPv4 Address Space

    Authors: Philipp Richter, Georgios Smaragdakis, David Plonka, Arthur Berger

    Abstract: In this study, we report on techniques and analyses that enable us to capture Internet-wide activity at individual IP address-level granularity by relying on server logs of a large commercial content delivery network (CDN) that serves close to 3 trillion HTTP requests on a daily basis. Across the whole of 2015, these logs recorded client activity involving 1.2 billion unique IPv4 addresses, the hi… ▽ More

    Submitted 9 September, 2016; v1 submitted 1 June, 2016; originally announced June 2016.

    Comments: in Proceedings of ACM IMC 2016

  18. arXiv:1405.1811  [pdf, other

    cs.NI cs.DC

    Opportunities in a Federated Cloud Marketplace

    Authors: Hamed Haddadi, Georgios Smaragdakis, K. K. Ramakrishnan

    Abstract: Recent measurement studies show that there are massively distributed hosting and computing infrastructures deployed in the Internet. Such infrastructures include large data centers and organizations' computing clusters. When idle, these resources can readily serve local users. Such users can be smartphone or tablet users wishing to access services such as remote desktop or CPU/bandwidth intensive… ▽ More

    Submitted 8 May, 2014; originally announced May 2014.

    Comments: 4 pages

    ACM Class: C.2.4

  19. arXiv:1307.5264  [pdf

    cs.NI cs.CY

    On the importance of Internet eXchange Points for today's Internet ecosystem

    Authors: Nikolaos Chatzis, Georgios Smaragdakis, Anja Feldmann

    Abstract: Internet eXchange Points (IXPs) are generally considered to be the successors of the four Network Access Points that were mandated as part of the decommissioning of the NSFNET in 1994/95 to facilitate the transition from the NSFNET to the "public Internet" as we know it today. While this popular view does not tell the whole story behind the early beginnings of IXPs, what is true is that since arou… ▽ More

    Submitted 27 July, 2013; v1 submitted 19 July, 2013; originally announced July 2013.

    Comments: 10 pages, keywords: Internet Exchange Point, Internet Architecture, Peering, Content Delivery

  20. arXiv:1202.1464  [pdf, ps, other

    cs.NI

    Content-aware Traffic Engineering

    Authors: Benjamin Frank, Ingmar Poese, Georgios Smaragdakis, Steve Uhlig, Anja Feldmann

    Abstract: Today, a large fraction of Internet traffic is originated by Content Providers (CPs) such as content distribution networks and hyper-giants. To cope with the increasing demand for content, CPs deploy massively distributed infrastructures. This poses new challenges for CPs as they have to dynamically map end-users to appropriate servers, without being fully aware of network conditions within an ISP… ▽ More

    Submitted 7 February, 2012; originally announced February 2012.

    Comments: Also appears as TU-Berlin technical report 2012-3, ISSN: 1436-9915