Skip to main content

Showing 1–12 of 12 results for author: Dabbous, W

Searching in archive cs. Search in all archives.
.
  1. SLICES, a scientific instrument for the networking community

    Authors: Serge Fdida, Nikos Makris, Thanasis Korakis, Raffaele Bruno, Andrea Passarella, Panayiotis Andreou, Bartosz Belter, Cedric Crettaz, Walid Dabbous, Yuri Demchenko, Raymond Knopp

    Abstract: A science is defined by a set of encyclopedic knowledge related to facts or phenomena following rules or evidenced by experimentally-driven observations. Computer Science and in particular computer networks is a relatively new scientific domain maturing over years and adopting the best practices inherited from more fundamental disciplines. The design of past, present and future networking componen… ▽ More

    Submitted 13 February, 2025; originally announced February 2025.

    Journal ref: Volume 193, 1 September 2022, Pages 189-203

  2. arXiv:1111.0948  [pdf, ps, other

    cs.NI cs.MM

    Network Characteristics of Video Streaming Traffic

    Authors: Ashwin Rao, Yeon-Sup Lim, Chadi Barakat, Arnaud Legout, Don Towsley, Walid Dabbous

    Abstract: Video streaming represents a large fraction of Internet traffic. Surprisingly, little is known about the network characteristics of this traffic. In this paper, we study the network characteristics of the two most popular video streaming services, Netflix and YouTube. We show that the streaming strategies vary with the type of the application (Web browser or native mobile application), and the typ… ▽ More

    Submitted 3 November, 2011; originally announced November 2011.

    Comments: This is the author version of the paper accepted as a full paper at ACM CoNEXT 2011

  3. arXiv:1109.4039  [pdf, ps, other

    cs.NI

    I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy

    Authors: Stevens Le Blond, Zhang Chao, Arnaud Legout, Keith W. Ross, Walid Dabbous

    Abstract: In this paper, we show how to exploit real-time communication applications to determine the IP address of a targeted user. We focus our study on Skype, although other real-time communication applications may have similar privacy issues. We first design a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT. By calling th… ▽ More

    Submitted 16 October, 2011; v1 submitted 19 September, 2011; originally announced September 2011.

    Comments: This is the authors' version of the ACM/USENIX Internet Measurement Conference (IMC) 2011 paper

  4. arXiv:1103.1518  [pdf, ps, other

    cs.NI

    One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users

    Authors: Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Dali Kaafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous

    Abstract: Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in practi… ▽ More

    Submitted 8 March, 2011; originally announced March 2011.

    Journal ref: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11) (2011)

  5. Pushing BitTorrent Locality to the Limit

    Authors: Stevens Le Blond, Arnaud Legout, Walid Dabbous

    Abstract: Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, it dramatically increases the traffic on inter-ISP links. To solve this issue, the idea to keep a fraction of the P2P traffic local to each ISP was introduced a few years ago. Since then, P2P solutions exploiting locality… ▽ More

    Submitted 8 November, 2010; originally announced November 2010.

    Journal ref: Computer Networks (2010)

  6. arXiv:1006.4490  [pdf, ps, other

    cs.NI

    Can Realistic BitTorrent Experiments Be Performed on Clusters?

    Authors: Ashwin Rao, Arnaud Legout, Walid Dabbous

    Abstract: Network latency and packet loss are considered to be an important requirement for realistic evaluation of Peer-to-Peer protocols. Dedicated clusters, such as Grid'5000, do not provide the variety of network latency and packet loss rates that can be found in the Internet. However, compared to the experiments performed on testbeds such as PlanetLab, the experiments performed on dedicated clusters ar… ▽ More

    Submitted 23 June, 2010; originally announced June 2010.

    Journal ref: 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10), Delft : Netherlands (2010)

  7. arXiv:1004.1461  [pdf, ps, other

    cs.NI cs.CR

    Compromising Tor Anonymity Exploiting P2P Information Leakage

    Authors: Pere Manils, Chaabane Abdelberri, Stevens Le Blond, Mohamed Ali Kaafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous

    Abstract: Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak inf… ▽ More

    Submitted 9 April, 2010; originally announced April 2010.

  8. arXiv:1004.1267  [pdf, ps, other

    cs.NI cs.CR

    De-anonymizing BitTorrent Users on Tor

    Authors: Stevens Le Blond, Pere Manils, Abdelberi Chaabane, Mohamed Ali Kaafar, Arnaud Legout, Claude Castellucia, Walid Dabbous

    Abstract: Some BitTorrent users are running BitTorrent on top of Tor to preserve their privacy. In this extended abstract, we discuss three different attacks to reveal the IP address of BitTorrent users on top of Tor. In addition, we exploit the multiplexing of streams from different applications into the same circuit to link non-BitTorrent applications to revealed IP addresses.

    Submitted 8 April, 2010; originally announced April 2010.

    Comments: Poster accepted at the 7th USENIX Symposium on Network Design and Implementation (NSDI '10), San Jose, CA : United States (2010)

  9. arXiv:1004.0930  [pdf, ps, other

    cs.NI

    Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent

    Authors: Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kaafar

    Abstract: This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show… ▽ More

    Submitted 6 April, 2010; originally announced April 2010.

    Journal ref: 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), San Jose, CA : United States (2010)

  10. arXiv:1003.5746  [pdf, ps, other

    cs.NI

    BitTorrent Experiments on Testbeds: A Study of the Impact of Network Latencies

    Authors: Ashwin Rao, Arnaud Legout, Walid Dabbous

    Abstract: In this paper, we study the impact of network latency on the time required to download a file distributed using BitTorrent. This study is essential to understand if testbeds can be used for experimental evaluation of BitTorrent. We observe that the network latency has a marginal impact on the time required to download a file; hence, BitTorrent experiments can performed on testbeds.

    Submitted 30 March, 2010; originally announced March 2010.

    Journal ref: JDIR, Sophia Antipolis : France (2010)

  11. arXiv:0812.0581  [pdf, ps, other

    cs.NI

    Pushing BitTorrent Locality to the Limit

    Authors: Stevens Le Blond, Arnaud Legout, Walid Dabbous

    Abstract: Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, it dramatically increases the traffic on inter-ISP links. To solve this issue, the idea to keep a fraction of the P2P traffic local to each ISP was introduced a few years ago. Since then, P2P solutions exploiting localit… ▽ More

    Submitted 12 May, 2009; v1 submitted 2 December, 2008; originally announced December 2008.

  12. arXiv:cs/0605080  [pdf, ps, other

    cs.NI

    A Locating-First Approach for Scalable Overlay Multicast

    Authors: Mohamed Ali Dali Kaafar, Thierry Turletti, Walid Dabbous

    Abstract: Recent proposals in multicast overlay construction have demonstrated the importance of exploiting underlying network topology. However, these topology-aware proposals often rely on incremental and periodic refinements to improve the system performance. These approaches are therefore neither scalable, as they induce high communication cost due to refinement overhead, nor efficient because long co… ▽ More

    Submitted 18 May, 2006; originally announced May 2006.

    Journal ref: Dans IEEE IWQoS 2006