Skip to main content

Showing 1–50 of 53 results for author: Markopoulou, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06473  [pdf, other

    cs.CR

    DiffAudit: Auditing Privacy Practices of Online Services for Children and Adolescents

    Authors: Olivia Figueira, Rahmadi Trimananda, Athina Markopoulou, Scott Jordan

    Abstract: Children's and adolescents' online data privacy are regulated by laws such as the Children's Online Privacy Protection Act (COPPA) and the California Consumer Privacy Act (CCPA). Online services that are directed towards general audiences (i.e., including children, adolescents, and adults) must comply with these laws. In this paper, first, we present DiffAudit, a platform-agnostic privacy auditing… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  2. arXiv:2405.12590  [pdf, other

    cs.LG cs.DC

    Maverick-Aware Shapley Valuation for Client Selection in Federated Learning

    Authors: Mengwei Yang, Ismat Jarin, Baturalp Buyukates, Salman Avestimehr, Athina Markopoulou

    Abstract: Federated Learning (FL) allows clients to train a model collaboratively without sharing their private data. One key challenge in practical FL systems is data heterogeneity, particularly in handling clients with rare data, also referred to as Mavericks. These clients own one or more data classes exclusively, and the model performance becomes poor without their participation. Thus, utilizing Maveric… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

  3. arXiv:2312.17370  [pdf, other

    cs.CR cs.NI

    Seqnature: Extracting Network Fingerprints from Packet Sequences

    Authors: Janus Varmarken, Rahmadi Trimananda, Athina Markopoulou

    Abstract: This paper proposes a general network fingerprinting framework, Seqnature, that uses packet sequences as its basic data unit and that makes it simple to implement any fingerprinting technique that can be formulated as a problem of identifying packet exchanges that consistently occur when the fingerprinted event is triggered. We demonstrate the versatility of Seqnature by using it to implement five… ▽ More

    Submitted 28 December, 2023; originally announced December 2023.

  4. arXiv:2312.04470  [pdf, other

    cs.HC cs.CR

    GaitGuard: Towards Private Gait in Mixed Reality

    Authors: Diana Romero, Ruchi Jagdish Patel, Athina Markopoulou, Salma Elmalaki

    Abstract: Augmented/Mixed Reality (AR/MR) technologies offers a new era of immersive, collaborative experiences, distinctively setting them apart from conventional mobile systems. However, as we further investigate the privacy and security implications within these environments, the issue of gait privacy emerges as a critical yet underexplored concern. Given its uniqueness as a biometric identifier that can… ▽ More

    Submitted 4 June, 2024; v1 submitted 7 December, 2023; originally announced December 2023.

    Comments: 21 pages, 17 figures

  5. arXiv:2310.19958  [pdf, other

    cs.LG cs.CR cs.IT

    PriPrune: Quantifying and Preserving Privacy in Pruned Federated Learning

    Authors: Tianyue Chu, Mengwei Yang, Nikolaos Laoutaris, Athina Markopoulou

    Abstract: Federated learning (FL) is a paradigm that allows several client devices and a server to collaboratively train a global model, by exchanging only model updates, without the devices sharing their local training data. These devices are often constrained in terms of communication and computation resources, and can further benefit from model pruning -- a paradigm that is widely used to reduce the size… ▽ More

    Submitted 22 December, 2023; v1 submitted 30 October, 2023; originally announced October 2023.

  6. arXiv:2308.07304  [pdf, other

    cs.HC cs.CR

    BehaVR: User Identification Based on VR Sensor Data

    Authors: Ismat Jarin, Yu Duan, Rahmadi Trimananda, Hao Cui, Salma Elmalaki, Athina Markopoulou

    Abstract: Virtual reality (VR) platforms enable a wide range of applications, however pose unique privacy risks. In particular, VR devices are equipped with a rich set of sensors that collect personal and sensitive information (e.g., body motion, eye gaze, hand joints, and facial expression), which can be used to uniquely identify a user, even without explicit identifiers. In this paper, we are interested i… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

  7. arXiv:2303.17740  [pdf, other

    cs.CR

    A CI-based Auditing Framework for Data Collection Practices

    Authors: Athina Markopoulou, Rahmadi Trimananda, Hao Cui

    Abstract: Apps and devices (mobile devices, web browsers, IoT, VR, voice assistants, etc.) routinely collect user data, and send them to first- and third-party servers through the network. Recently, there is a lot of interest in (1) auditing the actual data collection practices of those systems; and also in (2) checking the consistency of those practices against the statements made in the corresponding priv… ▽ More

    Submitted 30 March, 2023; originally announced March 2023.

    Comments: 5 pages, 5 figures. The paper was first presented at the 4th Annual Symposium on Applications of Contextual Integrity, NYC, Sept. 2022

  8. arXiv:2210.06746  [pdf, other

    cs.CR

    PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs

    Authors: Hao Cui, Rahmadi Trimananda, Athina Markopoulou, Scott Jordan

    Abstract: Privacy policies disclose how an organization collects and handles personal information. Recent work has made progress in leveraging natural language processing (NLP) to automate privacy policy analysis and extract data collection statements from different sentences, considered in isolation from each other. In this paper, we view and analyze, for the first time, the entire text of a privacy policy… ▽ More

    Submitted 20 June, 2023; v1 submitted 13 October, 2022; originally announced October 2022.

    Comments: 24 pages, 15 figures (including subfigures), 9 tables. This is the extended version of the paper with the same title published at USENIX Security '23

  9. Tracking, Profiling, and Ad Targeting in the Alexa Echo Smart Speaker Ecosystem

    Authors: Umar Iqbal, Pouneh Nikkhah Bahrami, Rahmadi Trimananda, Hao Cui, Alexander Gamero-Garrido, Daniel Dubois, David Choffnes, Athina Markopoulou, Franziska Roesner, Zubair Shafiq

    Abstract: Smart speakers collect voice commands, which can be used to infer sensitive information about users. Given the potential for privacy harms, there is a need for greater transparency and control over the data collected, used, and shared by smart speaker platforms as well as third party skills supported on them. To bridge this gap, we build a framework to measure data collection, usage, and sharing b… ▽ More

    Submitted 13 October, 2023; v1 submitted 22 April, 2022; originally announced April 2022.

    Comments: Published at the ACM Internet Measurement Conference 2023

  10. arXiv:2202.12872  [pdf, other

    cs.LG cs.NI

    AutoFR: Automated Filter Rule Generation for Adblocking

    Authors: Hieu Le, Salma Elmalaki, Athina Markopoulou, Zubair Shafiq

    Abstract: Adblocking relies on filter lists, which are manually curated and maintained by a community of filter list authors. Filter list curation is a laborious process that does not scale well to a large number of sites or over time. In this paper, we introduce AutoFR, a reinforcement learning framework to fully automate the process of filter rule creation and evaluation for sites of interest. We design a… ▽ More

    Submitted 7 March, 2023; v1 submitted 25 February, 2022; originally announced February 2022.

    Comments: 16 pages with 13 figures, 3 tables, 1 algorithm. 3.5 pages of references. Appendices include 10 pages of appendices with 11 figures and 3 tables

  11. arXiv:2202.03679  [pdf, other

    cs.LG cs.NI

    A Unified Prediction Framework for Signal Maps

    Authors: Emmanouil Alimpertis, Athina Markopoulou, Carter T. Butts, Evita Bakopoulou, Konstantinos Psounis

    Abstract: Signal maps are essential for the planning and operation of cellular networks. However, the measurements needed to create such maps are expensive, often biased, not always reflecting the metrics of interest, and posing privacy risks. In this paper, we develop a unified framework for predicting cellular signal maps from limited measurements. Our framework builds on a state-of-the-art random-forest… ▽ More

    Submitted 12 February, 2022; v1 submitted 8 February, 2022; originally announced February 2022.

    Comments: Coverage Maps; Signal Strength Maps; LTE; RSRP; CQI; RSRQ; RSS; Importance Sampling; Random Forests; Carrier's Objectives; Call Drops;Key Performance Indicators

  12. Location Leakage in Federated Signal Maps

    Authors: Evita Bakopoulou, Mengwei Yang, Jiang Zhang, Konstantinos Psounis, Athina Markopoulou

    Abstract: We consider the problem of predicting cellular network performance (signal maps) from measurements collected by several mobile devices. We formulate the problem within the online federated learning framework: (i) federated learning (FL) enables users to collaboratively train a model, while kee** their training data on their devices; (ii) measurements are collected as users move around over time… ▽ More

    Submitted 5 January, 2024; v1 submitted 6 December, 2021; originally announced December 2021.

  13. arXiv:2106.05407  [pdf, other

    cs.CR cs.NI

    OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR

    Authors: Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, Athina Markopoulou

    Abstract: Virtual reality (VR) is an emerging technology that enables new applications but also introduces privacy risks. In this paper, we focus on Oculus VR (OVR), the leading platform in the VR space and we provide the first comprehensive analysis of personal data exposed by OVR apps and the platform itself, from a combined networking and privacy policy perspective. We experimented with the Quest 2 heads… ▽ More

    Submitted 19 November, 2021; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: This is the extended version of the paper with the same title published at USENIX Security Symposium 2022

  14. arXiv:2008.08973  [pdf, other

    cs.CR cs.HC cs.NI

    Exposures Exposed: A Measurement and User Study to Assess Mobile Data Privacy in Context

    Authors: Evita Bakopoulou, Anastasia Shuba, Athina Markopoulou

    Abstract: Mobile devices have access to personal, potentially sensitive data, and there is a large number of mobile applications and third-party libraries that transmit this information over the network to remote servers (including app developer servers and third party servers). In this paper, we are interested in better understanding of not just the extent of personally identifiable information (PII) expos… ▽ More

    Submitted 6 June, 2022; v1 submitted 18 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1803.01261

  15. arXiv:1911.03447  [pdf, other

    cs.NI

    The TV is Smart and Full of Trackers: Towards Understanding the Smart TV Advertising and Tracking Ecosystem

    Authors: Janus Varmarken, Hieu Le, Anastasia Shuba, Zubair Shafiq, Athina Markopoulou

    Abstract: Motivated by the growing popularity of smart TVs, we present a large-scale measurement study of smart TVs by collecting and analyzing their network traffic from two different vantage points. First, we analyze aggregate network traffic of smart TVs in-the-wild, collected from residential gateways of tens of homes and several different smart TV platforms, including Apple, Samsung, Roku, and Chromeca… ▽ More

    Submitted 8 November, 2019; originally announced November 2019.

  16. arXiv:1907.13113  [pdf, other

    cs.LG cs.NI stat.ML

    A Federated Learning Approach for Mobile Packet Classification

    Authors: Evita Bakopoulou, Balint Tillman, Athina Markopoulou

    Abstract: In order to improve mobile data transparency, a number of network-based approaches have been proposed to inspect packets generated by mobile devices and detect personally identifiable information (PII), ad requests, or other activities. State-of-the-art approaches train classifiers based on features extracted from HTTP packets. So far, these classifiers have only been trained in a centralized way,… ▽ More

    Submitted 30 July, 2019; originally announced July 2019.

  17. arXiv:1907.11797  [pdf, other

    cs.NI cs.CR cs.DS cs.LG

    **Pong: Packet-Level Signatures for Smart Home Device Events

    Authors: Rahmadi Trimananda, Janus Varmarken, Athina Markopoulou, Brian Demsky

    Abstract: Smart home devices are vulnerable to passive inference attacks based on network traffic, even in the presence of encryption. In this paper, we present PINGPONG, a tool that can automatically extract packet-level signatures for device events (e.g., light bulb turning ON/OFF) from network traffic. We evaluated PINGPONG on popular smart home devices ranging from smart plugs and thermostats to cameras… ▽ More

    Submitted 10 February, 2020; v1 submitted 26 July, 2019; originally announced July 2019.

    Comments: This is the technical report for the paper titled Packet-Level Signatures for Smart Home Devices published at the Network and Distributed System Security (NDSS) Symposium 2020

  18. arXiv:1803.01261  [pdf, other

    cs.NI cs.CR

    AntShield: On-Device Detection of Personal Information Exposure

    Authors: Anastasia Shuba, Evita Bakopoulou, Milad Asgari Mehrabadi, Hieu Le, David Choffnes, Athina Markopoulou

    Abstract: Mobile devices have access to personal, potentially sensitive data, and there is a growing number of applications that transmit this personally identifiable information (PII) over the network. In this paper, we present the AntShield system that performs on-device packet-level monitoring and detects the transmission of such sensitive information accurately and in real-time. A key insight is to dist… ▽ More

    Submitted 3 March, 2018; originally announced March 2018.

  19. arXiv:1801.01715  [pdf, other

    cs.SI physics.soc-ph

    Spectral Graph Forge: Graph Generation Targeting Modularity

    Authors: Luca Baldesi, Athina Markopoulou, Carter T. Butts

    Abstract: Community structure is an important property that captures inhomogeneities common in large networks, and modularity is one of the most widely used metrics for such community structure. In this paper, we introduce a principled methodology, the Spectral Graph Forge, for generating random graphs that preserves community structure from a real network of interest, in terms of modularity. Our approach l… ▽ More

    Submitted 5 January, 2018; originally announced January 2018.

  20. arXiv:1703.07340  [pdf, other

    cs.SI cs.DS

    Construction of Directed 2K Graphs

    Authors: Bálint Tillman, Athina Markopoulou, Carter T. Butts, Minas Gjoka

    Abstract: We study the problem of constructing synthetic graphs that resemble real-world directed graphs in terms of their degree correlations. We define the problem of directed 2K construction (D2K) that takes as input the directed degree sequence (DDS) and a joint degree and attribute matrix (JDAM) so as to capture degree correlation specifically in directed graphs. We provide necessary and sufficient con… ▽ More

    Submitted 21 March, 2017; originally announced March 2017.

  21. arXiv:1611.04268  [pdf, other

    cs.NI

    AntMonitor: A System for On-Device Mobile Network Monitoring and its Applications

    Authors: Anastasia Shuba, Anh Le, Emmanouil Alimpertis, Minas Gjoka, Athina Markopoulou

    Abstract: In this paper, we present a complete system for on-device passive monitoring, collection, and analysis of fine grained, large-scale packet measurements from mobile devices. First, we describe the design and implementation of AntMonitor as a userspace mobile app based on a VPN-service but only on the device (without the need to route through a remote VPN server) and using only the minimum resources… ▽ More

    Submitted 4 April, 2017; v1 submitted 14 November, 2016; originally announced November 2016.

  22. arXiv:1405.7348  [pdf, other

    cs.SI

    ergm.graphlets: A Package for ERG Modeling Based on Graphlet Statistics

    Authors: Omer Nebil Yaveroglu, Sean M. Fitzhugh, Maciej Kurant, Athina Markopoulou, Carter T. Butts, Natasa Przulj

    Abstract: Exponential-family random graph models (ERGMs) are probabilistic network models that are parametrized by sufficient statistics based on structural (i.e., graph-theoretic) properties. The ergm package for the R statistical computing system is a collection of tools for the analysis of network data within an ERGM framework. Many different network properties can be employed as sufficient statistics fo… ▽ More

    Submitted 28 May, 2014; originally announced May 2014.

    Comments: 32 pages, 9 figures, under review by Journal of Statistical Software

    Journal ref: Journal of Statistical Software, Vol. 65, Issue 12, Jun 2015

  23. arXiv:1405.3622  [pdf, other

    cs.NI cs.MM

    MicroCast: Cooperative Video Streaming using Cellular and D2D Connections

    Authors: Anh Le, Lorenzo Keller, Hulya Seferoglu, Blerim Cici, Christina Fragouli, Athina Markopoulou

    Abstract: We consider a group of mobile users, within proximity of each other, who are interested in watching the same online video at roughly the same time. The common practice today is that each user downloads the video independently on her mobile device using her own cellular connection, which wastes access bandwidth and may also lead to poor video quality. We propose a novel cooperative system where eac… ▽ More

    Submitted 14 May, 2014; originally announced May 2014.

  24. arXiv:1401.8244  [pdf, other

    cs.IT

    On Routing-Optimal Network for Multiple Unicasts

    Authors: Chun Meng, Minghua Chen, Athina Markopoulou

    Abstract: In this paper, we consider networks with multiple unicast sessions. Generally, non-linear network coding is needed to achieve the whole rate region of network coding. Yet, there exist networks for which routing is sufficient to achieve the whole rate region, and we refer to them as routing-optimal networks. We identify a class of routing-optimal networks, which we refer to as information-distribut… ▽ More

    Submitted 30 April, 2014; v1 submitted 31 January, 2014; originally announced January 2014.

  25. arXiv:1305.3876  [pdf, ps, other

    cs.CY cs.SI physics.soc-ph

    Assessing the Potential of Ride-Sharing Using Mobile and Social Data

    Authors: Blerim Cici, Athina Markopoulou, Enrique Frías-Martínez, Nikolaos Laoutaris

    Abstract: Ride-sharing on the daily home-work-home commute can help individuals save on gasoline and other car-related costs, while at the same time it can reduce traffic and pollution. This paper assesses the potential of ride-sharing for reducing traffic in a city, based on mobility data extracted from 3G Call Description Records (CDRs, for the cities of Barcelona and Madrid) and from Online Social Networ… ▽ More

    Submitted 20 March, 2014; v1 submitted 16 May, 2013; originally announced May 2013.

    Comments: 11 pages

  26. arXiv:1305.0868  [pdf, other

    cs.IT

    Precoding-Based Network Alignment For Three Unicast Sessions

    Authors: Chun Meng, Abhik Kumar Das, Abinesh Ramakrishnan, Syed Ali Jafar, Athina Markopoulou, Sriram Vishwanath

    Abstract: We consider the problem of network coding across three unicast sessions over a directed acyclic graph, where each sender and the receiver is connected to the network via a single edge of unit capacity. We consider a network model in which the middle of the network only performs random linear network coding, and restrict our approaches to precoding-based linear schemes, where the senders use precod… ▽ More

    Submitted 21 May, 2014; v1 submitted 3 May, 2013; originally announced May 2013.

    Comments: arXiv admin note: text overlap with arXiv:1202.3405

  27. arXiv:1303.7197  [pdf, other

    cs.NI cs.IT

    Network Codes for Real-Time Applications

    Authors: Anh Le, Arash S. Tehrani, Alexandros G. Dimakis, Athina Markopoulou

    Abstract: We consider the scenario of broadcasting for real-time applications and loss recovery via instantly decodable network coding. Past work focused on minimizing the completion delay, which is not the right objective for real-time applications that have strict deadlines. In this work, we are interested in finding a code that is instantly decodable by the maximum number of users. First, we prove that t… ▽ More

    Submitted 12 May, 2014; v1 submitted 28 March, 2013; originally announced March 2013.

    Comments: ToN 2013 Submission Version

  28. Active Learning of Multiple Source Multiple Destination Topologies

    Authors: Pegah Sattari, Maciej Kurant, Animashree Anandkumar, Athina Markopoulou, Michael Rabbat

    Abstract: We consider the problem of inferring the topology of a network with $M$ sources and $N$ receivers (hereafter referred to as an $M$-by-$N$ network), by sending probes between the sources and receivers. Prior work has shown that this problem can be decomposed into two parts: first, infer smaller subnetwork components (i.e., $1$-by-$N$'s or $2$-by-$2$'s) and then merge these components to identify th… ▽ More

    Submitted 19 March, 2014; v1 submitted 11 December, 2012; originally announced December 2012.

    Journal ref: IEEE Transactions on Signal Processing, Vol. 62, Issue 8, pp. 1926-1937, April 2014

  29. Network Coding Meets Multimedia: a Review

    Authors: Enrico Magli, Mea Wang, Pascal Frossard, Athina Markopoulou

    Abstract: While every network node only relays messages in a traditional communication system, the recent network coding (NC) paradigm proposes to implement simple in-network processing with packet combinations in the nodes. NC extends the concept of "encoding" a message beyond source coding (for compression) and channel coding (for protection against errors and losses). It has been shown to increase networ… ▽ More

    Submitted 18 November, 2012; originally announced November 2012.

    Comments: Part of this work is under publication in IEEE Transactions on Multimedia

  30. arXiv:1210.0460  [pdf, ps, other

    cs.SI cs.CY physics.soc-ph stat.ME

    Graph Size Estimation

    Authors: Maciej Kurant, Carter T. Butts, Athina Markopoulou

    Abstract: Many online networks are not fully known and are often studied via sampling. Random Walk (RW) based techniques are the current state-of-the-art for estimating nodal attributes and local graph properties, but estimating global properties remains a challenge. In this paper, we are interested in a fundamental property of this type - the graph size N, i.e., the number of its nodes. Existing methods fo… ▽ More

    Submitted 1 October, 2012; originally announced October 2012.

  31. arXiv:1208.3667  [pdf, ps, other

    cs.SI physics.data-an physics.soc-ph

    2.5K-Graphs: from Sampling to Generation

    Authors: Minas Gjoka, Maciej Kurant, Athina Markopoulou

    Abstract: Understanding network structure and having access to realistic graphs plays a central role in computer and social networks research. In this paper, we propose a complete, and practical methodology for generating graphs that resemble a real graph of interest. The metrics of the original topology we target to match are the joint degree distribution (JDD) and the degree-dependent average clustering c… ▽ More

    Submitted 17 August, 2012; originally announced August 2012.

  32. arXiv:1203.1730  [pdf, other

    cs.CR cs.DC cs.NI

    Auditing for Distributed Storage Systems

    Authors: Anh Le, Athina Markopoulou, Alexandros G. Dimakis

    Abstract: Distributed storage codes have recently received a lot of attention in the community. Independently, another body of work has proposed integrity checking schemes for cloud storage, none of which, however, is customized for coding-based storage or can efficiently support repair. In this work, we bridge the gap between these two currently disconnected bodies of work. We propose NC-Audit, a novel cry… ▽ More

    Submitted 12 May, 2014; v1 submitted 8 March, 2012; originally announced March 2012.

    Comments: ToN 2014 Submission with Data Dynamics

  33. arXiv:1202.3405  [pdf, other

    cs.IT

    On the Feasibility of Precoding-Based Network Alignment for Three Unicast Sessions

    Authors: Chun Meng, Abinesh Ramakrishnan, Athina Markopoulou, Syed Ali Jafar

    Abstract: We consider the problem of network coding across three unicast sessions over a directed acyclic graph, when each session has min-cut one. Previous work by Das et al. adapted a precoding-based interference alignment technique, originally developed for the wireless interference channel, specifically to this problem. We refer to this approach as precoding-based network alignment (PBNA). Similar to th… ▽ More

    Submitted 18 May, 2012; v1 submitted 15 February, 2012; originally announced February 2012.

    Comments: Technical report for ISIT 2012, 10 pages, 6 figures

  34. arXiv:1108.0377  [pdf, other

    cs.NI cs.CR

    On Detecting Pollution Attacks in Inter-Session Network Coding

    Authors: Anh Le, Athina Markopoulou

    Abstract: Dealing with pollution attacks in inter-session network coding is challenging due to the fact that sources, in addition to intermediate nodes, can be malicious. In this work, we precisely define corrupted packets in inter-session pollution based on the commitment of the source packets. We then propose three detection schemes: one hash-based and two MAC-based schemes: InterMacCPK and SpaceMacPM. In… ▽ More

    Submitted 1 August, 2011; originally announced August 2011.

  35. arXiv:1105.5488  [pdf, ps, other

    cs.SI physics.data-an physics.soc-ph

    Coarse-Grained Topology Estimation via Graph Sampling

    Authors: Maciej Kurant, Minas Gjoka, Yan Wang, Zack W. Almquist, Carter T. Butts, Athina Markopoulou

    Abstract: Many online networks are measured and studied via sampling techniques, which typically collect a relatively small fraction of nodes and their associated edges. Past work in this area has primarily focused on obtaining a representative sample of nodes and on efficient estimation of local graph properties (such as node degree distribution or any node attribute) based on that sample. However, less is… ▽ More

    Submitted 27 May, 2011; originally announced May 2011.

  36. arXiv:1102.4599  [pdf, ps, other

    cs.SI cs.NI stat.ME

    Towards Unbiased BFS Sampling

    Authors: Maciej Kurant, Athina Markopoulou, Patrick Thiran

    Abstract: Breadth First Search (BFS) is a widely used approach for sampling large unknown Internet topologies. Its main advantage over random walks and other exploration techniques is that a BFS sample is a plausible graph on its own, and therefore we can study its topological characteristics. However, it has been empirically observed that incomplete BFS is biased toward high-degree nodes, which may strongl… ▽ More

    Submitted 22 February, 2011; originally announced February 2011.

    Comments: BFS, RDS, graph traversal, sampling bias correction

    Journal ref: arXiv:1004.1729, 2010

  37. arXiv:1102.3504  [pdf, other

    cs.CR cs.NI

    Cooperative Defense against Pollution Attacks in Network Coding Using SpaceMac

    Authors: Anh Le, Athina Markopoulou

    Abstract: Intra-session network coding is known to be vulnerable to pollution attacks. In this work, first, we introduce a novel homomorphic MAC scheme called SpaceMac, which allows an intermediate node to verify if its received packets belong to a specific subspace, even if the subspace is expanding over time. Then, we use SpaceMac as a building block to design a cooperative scheme that provides complete d… ▽ More

    Submitted 15 September, 2011; v1 submitted 17 February, 2011; originally announced February 2011.

    Comments: This is an extended version of a short version to appear in IEEE JSAC on Cooperative Networking - Challenges and Applications 2011

  38. arXiv:1101.5463  [pdf, ps, other

    cs.SI cs.NI physics.soc-ph stat.ME

    Walking on a Graph with a Magnifying Glass: Stratified Sampling via Weighted Random Walks

    Authors: M. Kurant, M. Gjoka, C. T. Butts, A. Markopoulou

    Abstract: Our objective is to sample the node set of a large unknown graph via crawling, to accurately estimate a given metric of interest. We design a random walk on an appropriately defined weighted graph that achieves high efficiency by preferentially crawling those nodes and edges that convey greater information regarding the target metric. Our approach begins by employing the theory of stratification t… ▽ More

    Submitted 27 March, 2011; v1 submitted 28 January, 2011; originally announced January 2011.

    Comments: To appear in SIGMETRICS 2011

  39. PhishDef: URL Names Say It All

    Authors: Anh Le, Athina Markopoulou, Michalis Faloutsos

    Abstract: Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identify phishing URLs. First, we carefully select lexical features of the URLs that are resistant to obfuscation techniques used by attackers. Second, we evaluate the classification accuracy when using only lexical features, b… ▽ More

    Submitted 12 September, 2010; originally announced September 2010.

    Comments: 9 pages, submitted to IEEE INFOCOM 2011

  40. arXiv:1008.5217  [pdf, ps, other

    cs.NI

    Intra- and Inter-Session Network Coding in Wireless Networks

    Authors: Hulya Seferoglu, Athina Markopoulou, K. K. Ramakrishnan

    Abstract: In this paper, we are interested in improving the performance of constructive network coding schemes in lossy wireless environments.We propose I2NC - a cross-layer approach that combines inter-session and intra-session network coding and has two strengths. First, the error-correcting capabilities of intra-session network coding make our scheme resilient to loss. Second, redundancy allows intermedi… ▽ More

    Submitted 23 February, 2012; v1 submitted 31 August, 2010; originally announced August 2010.

  41. arXiv:1008.2565  [pdf, ps, other

    cs.NI cs.DS cs.SI physics.data-an stat.ME

    Multigraph Sampling of Online Social Networks

    Authors: Minas Gjoka, Carter T. Butts, Maciej Kurant, Athina Markopoulou

    Abstract: State-of-the-art techniques for probability sampling of users of online social networks (OSNs) are based on random walks on a single social relation (typically friendship). While powerful, these methods rely on the social graph being fully connected. Furthermore, the mixing time of the sampling process strongly depends on the characteristics of this graph. In this paper, we observe that there ofte… ▽ More

    Submitted 16 June, 2011; v1 submitted 15 August, 2010; originally announced August 2010.

    Comments: IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Measurement of Internet Topologies, 2011

  42. arXiv:1008.0235  [pdf, ps, other

    cs.IT

    Network Coding for Multiple Unicasts: An Interference Alignment Approach

    Authors: Abhik Das, Sriram Vishwanath, Syed Jafar, Athina Markopoulou

    Abstract: This paper considers the problem of network coding for multiple unicast connections in networks represented by directed acyclic graphs. The concept of interference alignment, traditionally used in interference networks, is extended to analyze the performance of linear network coding in this setup and to provide a systematic code design approach. It is shown that, for a broad class of three-source… ▽ More

    Submitted 2 August, 2010; originally announced August 2010.

    Comments: 5 pages, appeared in ISIT 2010

  43. Active Topology Inference using Network Coding

    Authors: Pegah Sattari, Christina Fragouli, Athina Markopoulou

    Abstract: Our goal is to infer the topology of a network when (i) we can send probes between sources and receivers at the edge of the network and (ii) intermediate nodes can perform simple network coding operations, i.e., additions. Our key intuition is that network coding introduces topology-dependent correlation in the observations at the receivers, which can be exploited to infer the topology. For undire… ▽ More

    Submitted 6 February, 2013; v1 submitted 20 July, 2010; originally announced July 2010.

  44. arXiv:1006.1165  [pdf, ps, other

    cs.NI

    Optimal Source-Based Filtering of Malicious Traffic

    Authors: Fabio Soldo, Katerina Argyraki, Athina Markopoulou

    Abstract: In this paper, we consider the problem of blocking malicious traffic on the Internet, via source-based filtering. In particular, we consider filtering via access control lists (ACLs): these are already available at the routers today but are a scarce resource because they are stored in the expensive ternary content addressable memory (TCAM). Aggregation (by filtering source prefixes instead of indi… ▽ More

    Submitted 6 June, 2010; originally announced June 2010.

    Comments: Conference version appeared in Infocom 2009. Journal version submitted to ToN

  45. A Network Coding Approach to Loss Tomography

    Authors: Pegah Sattari, Athina Markopoulou, Christina Fragouli, Minas Gjoka

    Abstract: Network tomography aims at inferring internal network characteristics based on measurements at the edge of the network. In loss tomography, in particular, the characteristic of interest is the loss rate of individual links and multicast and/or unicast end-to-end probes are typically used. Independently, recent advances in network coding have shown that there are advantages from allowing intermedia… ▽ More

    Submitted 9 February, 2013; v1 submitted 26 May, 2010; originally announced May 2010.

  46. arXiv:1004.1729  [pdf, ps, other

    cs.DM cs.DS cs.NI cs.SI stat.ME

    On the bias of BFS

    Authors: Maciej Kurant, Athina Markopoulou, Patrick Thiran

    Abstract: Breadth First Search (BFS) and other graph traversal techniques are widely used for measuring large unknown graphs, such as online social networks. It has been empirically observed that an incomplete BFS is biased toward high degree nodes. In contrast to more studied sampling techniques, such as random walks, the precise bias of BFS has not been characterized to date. In this paper, we quantify th… ▽ More

    Submitted 10 April, 2010; originally announced April 2010.

    Comments: 9 pages

    Journal ref: International Teletraffic Congress (ITC 22), 2010

  47. arXiv:1002.4885  [pdf, ps, other

    cs.NI

    Network Coding-Aware Queue Management for TCP Flows over Coded Wireless Networks

    Authors: Hulya Seferoglu, Athina Markopoulou

    Abstract: We are interested in unicast traffic over wireless networks that employ constructive inter-session network coding, including single-hop and multi-hop schemes. In this setting, TCP flows do not fully exploit the network coding opportunities due to their bursty behavior and due to the fact that TCP is agnostic to the underlying network coding. In order to improve the performance of TCP flows over co… ▽ More

    Submitted 3 October, 2010; v1 submitted 26 February, 2010; originally announced February 2010.

  48. arXiv:0908.2007  [pdf, other

    cs.NI

    Predictive Blacklisting as an Implicit Recommendation System

    Authors: Fabio Soldo, Anh Le, Athina Markopoulou

    Abstract: A widely used defense practice against malicious traffic on the Internet is through blacklists: lists of prolific attack sources are compiled and shared. The goal of blacklists is to predict and block future attack sources. Existing blacklisting techniques have focused on the most prolific attack sources and, more recently, on collaborative blacklisting. In this paper, we formulate the problem o… ▽ More

    Submitted 13 August, 2009; originally announced August 2009.

    Comments: Comments: 11 pages; Submitted to INFOCOM 2010

  49. arXiv:0906.0060  [pdf, ps, other

    cs.SI cs.NI physics.data-an physics.soc-ph stat.ME

    A Walk in Facebook: Uniform Sampling of Users in Online Social Networks

    Authors: Minas Gjoka, Maciej Kurant, Carter T. Butts, Athina Markopoulou

    Abstract: Our goal in this paper is to develop a practical framework for obtaining a uniform sample of users in an online social network (OSN) by crawling its social graph. Such a sample allows to estimate any user property and some topological properties as well. To this end, first, we consider and compare several candidate crawling techniques. Two approaches that can produce approximately uniform samples… ▽ More

    Submitted 17 June, 2011; v1 submitted 30 May, 2009; originally announced June 2009.

    Comments: published in IEEE INFOCOM '10; IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Measurement of Internet Topologies, 2011 under the title "Practical Recommendations on Crawling Online Social Networks"

  50. arXiv:0811.3828  [pdf, other

    cs.NI

    Optimal Filtering of Malicious IP Sources

    Authors: Fabio Soldo, Athina Markopoulou, Katerina Argyraki

    Abstract: How can we protect the network infrastructure from malicious traffic, such as scanning, malicious code propagation, and distributed denial-of-service (DDoS) attacks? One mechanism for blocking malicious traffic is filtering: access control lists (ACLs) can selectively block traffic based on fields of the IP header. Filters (ACLs) are already available in the routers today but are a scarce resour… ▽ More

    Submitted 24 November, 2008; originally announced November 2008.

    Comments: submitted to Infocom 09