End-to-End Detection of Middlebox Interference

被引:1
|
作者
Pournaghshband, Vahab [1 ]
Reiher, Peter [2 ]
机构
[1] Univ San Francisco, Dept Comp Sci, San Francisco, CA 94117 USA
[2] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA USA
关键词
Middlebox; Detection; Internet measurement;
D O I
10.1109/NOMS59830.2024.10575716
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet middleboxes are an increasingly common network element. They can significantly alter the handling of traffic streams. Therefore, it is beneficial-and in some cases, crucial-to enable end-hosts to detect them. While transparent middleboxes interfere with the traffic, they do not change traffic content, giving the appearance that the data have merely been routed. This transparency makes end-to-end detection of such intermediaries particularly challenging. While existing ad hoc detection approaches apply only to a specific middlebox type, we present a general framework to detect a broad class of middleboxes. We use detecting transparent middleboxes as an example to illustrate our idea. We demonstrate our results by detecting three common middleboxes: network compression, traffic prioritization, and traffic shaping, using analysis, network simulations, and live Internet experiments with a real middlebox.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] A Middlebox-Cooperative TCP for a non End-to-End Internet
    Craven, Ryan
    Beverly, Robert
    Allman, Mark
    SIGCOMM'14: PROCEEDINGS OF THE 2014 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2014, : 151 - 162
  • [2] A Middlebox-Cooperative TCP for a non End-to-End Internet
    Craven, Ryan
    Beverly, Robert
    Allman, Mark
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (04) : 151 - 162
  • [3] End-to-End Optimum ML Detection for DF Cooperative Diversity Networks in the Presence of Interference
    Lu, Tian
    Liu, Peng
    Kim, Il-Min
    Chan, Francois
    Read, William
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (05) : 2639 - 2654
  • [4] MADTLS: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication
    Wagner, Eric
    Heye, David
    Serror, Martin
    Kunze, Ike
    Wehrle, Klaus
    Henze, Martin
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 972 - 986
  • [5] End-to-End Compromised Account Detection
    Karimi, Hamid
    VanDam, Courtland
    Ye, Liyang
    Tang, Jiliang
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2018, : 314 - 321
  • [6] End-to-End Active Speaker Detection
    Alcazar, Juan Leon
    Cordes, Moritz
    Zhao, Chen
    Ghanem, Bernard
    COMPUTER VISION, ECCV 2022, PT XXXVII, 2022, 13697 : 126 - 143
  • [7] End-to-End Object Detection with YOLOF
    Xi, Xing
    Huang, Yangyang
    Wu, Weiye
    Luo, Ronghua
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT VII, ICIC 2024, 2024, 14868 : 101 - 112
  • [8] End-to-End Learned Self-Interference Cancellation
    Balatsoukas-Stimming, Alexios
    2022 56TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2022, : 1334 - 1338
  • [9] Enhanced Sparse Detection for End-to-End Object Detection
    Liao, Yongwei
    Chen, Gang
    Xu, Runnan
    IEEE ACCESS, 2022, 10 : 85630 - 85640
  • [10] An End-to-End Steel Strip Surface Defects Detection Framework: Considering Complex Background Interference
    Liu, Rongqiang
    Huang, Min
    Cao, Peng
    PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 317 - 322