End-to-End Detection of Middlebox Interference

被引:1
|
作者
Pournaghshband, Vahab [1 ]
Reiher, Peter [2 ]
机构
[1] Univ San Francisco, Dept Comp Sci, San Francisco, CA 94117 USA
[2] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA USA
关键词
Middlebox; Detection; Internet measurement;
D O I
10.1109/NOMS59830.2024.10575716
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet middleboxes are an increasingly common network element. They can significantly alter the handling of traffic streams. Therefore, it is beneficial-and in some cases, crucial-to enable end-hosts to detect them. While transparent middleboxes interfere with the traffic, they do not change traffic content, giving the appearance that the data have merely been routed. This transparency makes end-to-end detection of such intermediaries particularly challenging. While existing ad hoc detection approaches apply only to a specific middlebox type, we present a general framework to detect a broad class of middleboxes. We use detecting transparent middleboxes as an example to illustrate our idea. We demonstrate our results by detecting three common middleboxes: network compression, traffic prioritization, and traffic shaping, using analysis, network simulations, and live Internet experiments with a real middlebox.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] What Makes for End-to-End Object Detection?
    Sun, Peize
    Jiang, Yi
    Xie, Enze
    Shao, Wenqi
    Yuan, Zehuan
    Wang, Changhu
    Luo, Ping
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 139, 2021, 139
  • [32] RIMformer: An End-to-End Transformer for FMCW Radar Interference Mitigation
    Zhang, Ziang
    Chen, Guangzhi
    Weng, Youlong
    Yang, Shunchuan
    Jia, Zhiyu
    Chen, Jingxuan
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2024, 62
  • [33] The end of end-to-end?
    Garfinkel, S
    TECHNOLOGY REVIEW, 2003, 106 (06) : 30 - 30
  • [34] End-to-end consensus using end-to-end channels
    Wiesmann, Matthias
    Defago, Xavier
    12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 341 - +
  • [35] Maximizing End-to-End Throughput of Interference-Limited Multihop Networks
    Hu, Dali
    wu, Jingxian
    Fan, Pingzhi
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) : 5465 - 5469
  • [36] End-to-End Detection of Caller ID Spoofing Attacks
    Mustafa, Hossen
    Xu, Wenyuan
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (03) : 423 - 436
  • [37] An End-to-End Model for Chicken Detection in a Cluttered Environment
    Chemme, Komeil Sadeghi
    Alitappeh, Reza Javanmard
    PROCEEDINGS OF THE 13TH IRANIAN/3RD INTERNATIONAL MACHINE VISION AND IMAGE PROCESSING CONFERENCE, MVIP, 2024, : 192 - 198
  • [38] FracNet: An end-to-end framework for bone fracture detection
    Alwzwazy, Haider A.
    Alzubaidi, Laith
    Zhao, Zehui
    Gu, Yuantong
    PATTERN RECOGNITION LETTERS, 2025, 190 : 1 - 7
  • [39] End-to-End Object Detection with Fully Convolutional Network
    Wang, Jianfeng
    Song, Lin
    Li, Zeming
    Sun, Hongbin
    Sun, Jian
    Zheng, Nanning
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 15844 - 15853
  • [40] An End-to-End Detection Method for WebShell with Deep Learning
    Qi, Longchen
    Kong, Rui
    Lu, Yang
    Zhuang, Honglin
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 660 - 665