Organization:
Center for Measurement and Analysis of Network Data (CMAND)

orgunit.page.dateEstablished
orgunit.page.dateDissolved
City
Country
Description
Type
Website of the organization
ID

Publication Search Results

Now showing 1 - 10 of 12
  • Publication
    Center for Measurement and Analysis of Network Data @ NPS Publications
    (Monterey, California: Naval Postgraduate School., 2014-05-01) Center for Measurement and Analysis of Network Data (CMAND)
    The CMAND lab at NPS focuses on advanced measurement and analysis techniques for informing network architecture and developing novel solutions to real-world critical infrastructure issues including routing, provisioning, and security and forensics.
  • Publication
    Spoofer Project: Spoofer Main
    (Monterey, California: Naval Postgraduate School., 2014) Center for Measurement and Analysis of Network Data (CMAND)
    What: The Spoofer project measures the Internet's susceptibility to spoofed source address IP packets. Malicious users capitalize on the ability to "spoof" source IP addresses for anonymity, indirection, targeted attacks and security circumvention. Compromised hosts on networks that permit IP spoofing enable a wide variety of attacks.
  • Publication
    IPv6 Measurement and Mapping
    (Monterey, California: Naval Postgraduate School., 2014) Center for Measurement and Analysis of Network Data (CMAND)
    Description: In collaboration with UCSD, we have undertaken three transformative research tasks to explore the evolution of IPv6 deployment: (1) providing a comprehensive view of the IPv6 topology from core to edge; (2) correlating the rate of IPv6 deployment with socioeconomic parameters; and (3) conducting quantitative assessment of IPv6 performance, including the impact of transition technologies and traffic characteristics. A primary result from this project is to improve the fidelity, scope, and usability of IPv6 measurement technology. We have also built tools to measure the characteristics of IPv6 adoption at the edge and compare characteristics of IPv4 and IPv6 connectivity. The resulting data sets serve as input to our work in correlating these observations with other technical and socioeconomic data: address allocation, available geographic and traffic data, ISP organizational structure (commercial, government, educational), and political/regulatory factors influencing IPv6 deployment. Finally, we are working to improve the state of quantitative modeling of the IPv6 transition by gathering rigorous empirical data on the extent and effectiveness of converter technologies, investigating prevailing concerns over IPv6 performance and path inflation, and analyzing actual IPv6 traffic workloads on a major U.S. backbone.
  • Publication
    TCP-HICCUPS
    (Monterey, California: Naval Postgraduate School., 2014) Center for Measurement and Analysis of Network Data (CMAND)
    TCP-HICCUPS (Handshake-based Integrity Check of Critical Underlying Protocol Semantics) is a lightweight extension to TCP that can help it infer when it is being misinterpreted due to packet header modifications made by middleboxes. HICCUPS applies a tamper-evident seal to the TCP 3- way handshake that is incrementally deployable and cooperative with today's middleboxes. HICCUPS is currently under development; please contact us for details or more information.
  • Publication
    Center for Measurement and Analysis of Network Data, Website homepage
    (Monterey, California: Naval Postgraduate School., 2014-05-24) Center for Measurement and Analysis of Network Data (CMAND)
    The CMAND lab at NPS focuses on advanced measurement and analysis techniques for informing network architecture and developing novel solutions to real-world critical infrastructure issues including routing, provisioning, and security and forensics.
  • Publication
    Center for Measurement and Analysis of Network Data @ NPS News
    (Monterey, California: Naval Postgraduate School., 2011-10-14) Center for Measurement and Analysis of Network Data (CMAND)
    The CMAND lab at NPS focuses on advanced measurement and analysis techniques for informing network architecture and developing novel solutions to real-world critical infrastructure issues including routing, provisioning, and security and forensics.
  • Publication
    Degreaser
    (Monterey, California: Naval Postgraduate School., 2014) Center for Measurement and Analysis of Network Data (CMAND)
    What: Degreaser is a tool to detect network tarpits via active probing/fingerprinting. Currently, degreaser can reliably detect instances of LaBrea and iptables tarpit. Degreaser is currently under development; please contact us for details or more information.
  • Publication
    Center for Measurement and Analysis of Network Data @ NPS People
    (Monterey, California: Naval Postgraduate School., 2014-05-01) Center for Measurement and Analysis of Network Data (CMAND)
    The CMAND lab at NPS focuses on advanced measurement and analysis techniques for informing network architecture and developing novel solutions to real-world critical infrastructure issues including routing, provisioning, and security and forensics.
  • Publication
    IPv6 Alias Resolution
    (Monterey, California: Naval Postgraduate School., 2012) Brinkmeyer, William; Center for Measurement and Analysis of Network Data (CMAND)
    Too-Big_Trick library provides an IP6 fingerprinting technique to assist in router-level alias resolution by comparing fragment identification numbers received from targeted router interfaces. An ICMP6 Too Big message is sent invoking source router fragmentation iliciting a unique identifier common to all interfaces of a router. Received fragmentation identification numbers are compared to determine if provided IP6 addresses are aliases. We have implemented TBT in a Python library and are making it available here under an MIT license. Feedback and bugfixes welcome. tbt.py
  • Publication
    Transport Traffic Analysis
    (Monterey, California: Naval Postgraduate School., 2014) Center for Measurement and Analysis of Network Data (CMAND)
    "Botnets" are distributed collections of compromised networked machines under common control. Botnets provide a formidable computing and communication platform by harnessing the power of thousands, or even millions, of nodes for a common collective purpose. Unfortunately, that purpose is often malicious and economically or politically motivated. This research investigates a unique approach to detecting bots, botnet infrastructure, and mitigating abusive traffic via Transport-level Traffic Analysis (TTA).