Anja Feldmann
YOU?
Author Swipe
View article: Unmasking the Shadows: A Cross-Country Study of Online Tracking in Illegal Movie Streaming Services
Unmasking the Shadows: A Cross-Country Study of Online Tracking in Illegal Movie Streaming Services Open
The proliferation of Illegal Movie Streaming Services (IMSS) has posed significant challenges to legitimate streaming services and law enforcement alike, causing financial losses and complicating efforts to combat copyright infringement. M…
View article: A Tree in a Tree: Measuring Biases of Partial DNS Tree Exploration
A Tree in a Tree: Measuring Biases of Partial DNS Tree Exploration Open
The Domain Name System (DNS) is a cornerstone of the Internet. As such, it is often the subject or the means of network measurement studies. Over the past decades, the Internet measurement community gathered many lessons-learned and captur…
View article: BBRv3 in the public Internet: a boon or a bane?
BBRv3 in the public Internet: a boon or a bane? Open
The third version of the Bottleneck-Bandwidth and Round-trip (BBR) algorithm, BBRv3, is now the default CCA for all of the public Internet traffic from google.com and YouTube. In this work, we built upon our prior work [23] and examine BBR…
View article: Strategies and Attacks of Digital Militias in WhatsApp Political Groups
Strategies and Attacks of Digital Militias in WhatsApp Political Groups Open
WhatsApp provides a fertile ground for the large-scale dissemination of information, particularly in countries like Brazil and India. Given its increasing popularity and use for political discussions, it is paramount to ensure that WhatsAp…
View article: Characterizing Information Propagation in Fringe Communities on Telegram
Characterizing Information Propagation in Fringe Communities on Telegram Open
Online messaging platforms are key communication tools but are vulnerable to fake news and conspiracy theories. Mainstream platforms such as Facebook are increasing content moderation of harmful and conspiratorial content. In response, use…
View article: <i>Marina</i>: Realizing ML-Driven Real-Time Network Traffic Monitoring at Terabit Scale
<i>Marina</i>: Realizing ML-Driven Real-Time Network Traffic Monitoring at Terabit Scale Open
Network operators require real-time traffic monitoring insights to provide high performance and security to their customers. It has been shown that artificial intelligence and machine learning (ML) can improve the visibility of telemetry s…
View article: How to Operate a Meta-Telescope in your Spare Time
How to Operate a Meta-Telescope in your Spare Time Open
Unsolicited traffic sent to advertised network space that does not host active services provides insights about misconfigurations as well as potentially malicious activities, including the spread of Botnets, DDoS campaigns, and exploitatio…
View article: Enabling Multi-hop ISP-Hypergiant Collaboration
Enabling Multi-hop ISP-Hypergiant Collaboration Open
Today, there is an increasing number of peering agreements between Hypergiants and networks that benefit millions of end-user. However, the majority of Autonomous Systems do not currently enjoy the benefit of interconnecting directly with …
View article: Live Long and Prosper:Analyzing Long-Lived MOAS Prefixes in BGP
Live Long and Prosper:Analyzing Long-Lived MOAS Prefixes in BGP Open
BGP exchanges reachability information in the form of prefixes, which are usually originated by a single Autonomous System (AS). If multiple ASes originate the same prefix, this is referred to as a Multiple Origin ASes (MOAS) prefix. One r…
View article: On the Globalization of the QAnon Conspiracy Theory Through Telegram
On the Globalization of the QAnon Conspiracy Theory Through Telegram Open
QAnon is a far-right conspiracy theory that has implications in the real world, with supporters of the theory participating in real-world violent acts like the US capitol attack in 2021. At the same time, the QAnon theory started evolving …
View article: How Ready Is DNS for an IPv6-Only World?
How Ready Is DNS for an IPv6-Only World? Open
DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be resolved. We point out, that the presence of an AAA…
View article: Runtime Verification for Programmable Switches
Runtime Verification for Programmable Switches Open
We introduce a runtime verification framework for programmable switches that complements static analysis. To evaluate our approach, we design and develop P6, a runtime verification system that automatically detects, localizes, and patches …
View article: How Ready is DNS for an IPv6-Only World?
How Ready is DNS for an IPv6-Only World? Open
DNS is one of the core building blocks of the Internet. In this paper, we investigate DNS resolution in a strict IPv6-only scenario and find that a substantial fraction of zones cannot be resolved. We point out, that the presence of an res…
View article: FlowDNS
FlowDNS Open
Knowing customer's interests, e.g. which Video-On-Demand (VoD) or Social\nNetwork services they are using, helps telecommunication companies with better\nnetwork planning to enhance the performance exactly where the customer's\ninterests l…
View article: Deep dive into the IoT backend ecosystem
Deep dive into the IoT backend ecosystem Open
Internet of Things (IoT) devices are becoming increasingly ubiquitous, e.g., at home, in enterprise environments, and in production lines. To support the advanced functionalities of IoT devices, IoT vendors as well as service and cloud com…
View article: Delay-Resistant Geo-Distributed Analytics
Delay-Resistant Geo-Distributed Analytics Open
Big data analytics platforms have played a critical role in the unprecedented success of data-driven applications. However, real-time and streaming data applications, and recent legislation, e.g., GDPR in Europe, have posed constraints on …
View article: SRv6: Is There Anybody Out There?
SRv6: Is There Anybody Out There? Open
Segment routing is a modern form of source-based routing, i.e., a routing technique where all or part of the routing decision is predetermined by the source or a hop on the path. Since initial standardization efforts in 2013, segment routi…
View article: VOXEL
VOXEL Open
Delivering videos under less-than-ideal network conditions without compromising end-users' quality of experiences is a hard problem. Virtually all prior work follow a piecemeal approach - -either "tweaking"the fully reliable transport laye…
View article: United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale
United We Stand: Collaborative Detection and Mitigation of Amplification DDoS Attacks at Scale Open
Amplification Distributed Denial of Service (DDoS) attacks' traffic and harm are at an all-time high. To defend against such attacks, distributed attack mitigation platforms, such as traffic scrubbing centers that operate in peering locati…
View article: How biased is our validation (data) for AS relationships?
How biased is our validation (data) for AS relationships? Open
The business relationships between Autonomous Systems (ASes) can provide fundamental insights into the Internet's routing ecosystem. Throughout the last two decades, many works focused on how to improve the inference of those relationships…
View article: A year in lockdown
A year in lockdown Open
In March 2020, the World Health Organization declared the Corona Virus 2019 (COVID-19) outbreak a global pandemic. As a result, billions of people were either encouraged or forced by their governments to stay home to reduce the spread of t…
View article: On the Globalization of the QAnon Conspiracy Theory Through Telegram
On the Globalization of the QAnon Conspiracy Theory Through Telegram Open
QAnon is a far-right conspiracy theory that became popular and mainstream over the past few years. Worryingly, the QAnon conspiracy theory has implications in the real world, with supporters of the theory participating in real-world violen…
View article: Implications of the COVID-19 Pandemic on the Internet Traffic
Implications of the COVID-19 Pandemic on the Internet Traffic Open
In this paper, we report on a measurement study by researchers from several institutions that collected and analyzed network data to assess the impact of the first wave of COVID-19 (February-June 2020) on the Internet traffic. The datasets…
View article: When wells run dry
When wells run dry Open
With the recent IPv4 address exhaustion, many networks can no longer rely on requesting additional IPv4 addresses space. They resort to new ways to obtain addresses: buying and leasing. In this paper, we first shed light on the recent econ…
View article: A view of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic
A view of Internet Traffic Shifts at ISP and IXPs during the COVID-19 Pandemic Open
Due to the COVID-19 pandemic, many governments imposed lockdowns that forced hundreds of millions of citizens to stay at home. The implementation of confinement measures increased Internet traffic demands of residential users, in particula…
View article: Exploring Network-Wide Flow Data With Flowyager
Exploring Network-Wide Flow Data With Flowyager Open
Many network operations, ranging from attack investigation and mitigation to\ntraffic management, require answering network-wide flow queries in seconds.\nAlthough flow records are collected at each router, using available traffic\ncapture…
View article: The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic
The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic Open
Due to the COVID-19 pandemic, many governments imposed lockdowns that forced hundreds of millions to stay at home. As a result of these measures, Internet traffic of residential users increased, in particular, for remote working, entertain…