University of Southern California
 2010 - Present 2000 1990's 1980's 1970's
 
ISI-TR-710
Do You See Me Now? Sparsity in Passive Observations of Address Liveness (extended)
 
Jelena Mirkovic, Genevieve Bartlett, John Heidemann, Hao Shi, Xiyue Deng
 
May 2016,  15 pages

abstract

ISI-TR-709
Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event
 
Given C. M. Moura, Ricardo de O. Schmidt, John Heidemann, Wouter B. de Vries, Moritz Muller, Lan Wei, Cristian Hesselman
 
May 2016,  15 pages

abstract

ISI-TR-708
Anycast Latency: How Many Sites Are Enough?
 
Ricardo de O. Schmidt, John Heidemann, Jan Harm Kuipers
 
May 2016,  13 pages

abstract

ISI-TR-707
Improving Long-term Accuracy of DNS Backscatter for Monitoring of Internet-Wide Malicious Activity - The Poster
 
Abdul Qadeer, John Heidemann, Kensuke Fukuda
 
April 2016,  2 pages

abstract

ISI-TR-706
T-DNS: Connection-Oriented DNS to Improve Privacy and Security (poster abstract)
 
Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya
 
March 2016,  3 pages

abstract

ISI-TR-705
RESECT: Self-learning Spoofed Traffic Filters
 
Jelena Mirkovic, Erik Kline, Peter Reiher
 
November 2015,  15 pages

IP spoofing has been a persistent Internet security threat for decades. While research solutions exist that can help an edge network detect spoofed and reflected traffic, sheer volume of such traffic requires handling further upstream. Prior research [20] has shown that route-dependent spoofed packet filters, such as hop-count filtering and route-based filtering, would be extremely effective if deployed in the Internet core. Deployment at only 50 chosen autonomous systems (0.25% of all ASes) would eliminate 92–97% of spoofed traffic in the entire Internet! But prior research assumes that filters always have correct filtering information. It is an open research problem how to bootstrap this information and keep it up to date when routes change, or in presence of asymmetric or multi-path routing. Our paper addresses this issue. We propose RESECT - a system that enables route- dependent spoofed packet filters to learn correct filtering information in realistic routing scenarios. A RESECT-enhanced filter probes sources of traffic that have stale or missing filtering information, by dropping a minuscule fraction of their TCP traffic, which invokes retransmission behavior. Retransmitted TCP packets are used to update filtering information about the probed source. RESECT works with asymmetric and multi- path routing, quickly detects route changes, and requires no cooperation between filters nor any changes to traffic sources. Its operation has minimal effect on legitimate traffic, while it quickly detects and drops spoofed packets. RESECT thus completes route-dependent packet filters, making them practical and highly effective solutions for IP spoofing defense.

ISI-TR-704
Detecting Malicious Activity with DNS Backscatter (extended)
 
Kensuke Fukuda, John Heidemann
 
October 2015,  18 pages


ISI-TR-703
The FailSafe Assertion Language
 
Hans P. Zima, Erik DeBenedictis, Jacqueline N. Chame, Pedro C. Diniz, Robert F. Lucas
 
October 2015,  46 pages

ISI-TR-702
Data Science in the News: Advances and Challenges for the Era of Big Data
 
Kate Musen, Alyssa Deng, Taylor Alarcon, Yolanda Gil
 
August 2015,  13 pages

abstract

ISI-TR-701
Evaluating Externally Visible Outages
 
Abdulla Alwabel, John Healy, John Heidemann, Brian Luu, Yuri Pradkin, Rasoul Safavian
 
August 2015,  8 pages

abstract

ISI-TR-700
QUASAR: A New Approach to Software Attestation
 
Jeremy Abramson, Stephen Schwab, Quoc Tran, W. Brad Moore
 
July 2015,  9 pages

abstrack

ISI-TR-699
LegoTG: Composable Traffic Generation with a Custom Blueprint
 
Jelena Mirkovic, Genevieve Bartlett
 
June 2015,  14 pages

abstract

ISI-TR-698
Poster: Lightweight Content-based Phishing Detection
 
Calvin Ardi, John Heidemann
 
May 2015,  3 pages

abstract

ISI-TR-697
PASO: An Integrated, Scalable PSO-based Optimization Framework for Hyper-Redundant Manipulator Path Planning and Inverse Kinematics
 
Thomas Collins, Wei-Min Shen
 
April 2015,  7 pages

ISI-TR-696
Implementation of the TCP Extended Data Offset Option
 
Harry Trieu, Joe Touch, Ted Faber
 
March 2015,  3 pages

abstract

ISI-TR-695
Connection-Oriented DNS to Improve Privacy and Security (extended)
 
Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya
 
February 2015,  26 pages

abstract

ISI-TR-693
T-DNS: Connection-Oriented DNS to Improve Privacy and Security (extended)
 
Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya
 
June 2014,  26 pages

abstract

ISI-TR-692
Web-scale Content Reuse Detection (extended)
 
Calvin Ardi, John Heidemann
 
June 2014,  16 pages

abstract

ISI-TR-691
When the Internet Sleeps: Correlating Diurnal Networks With External Factors (extended)
 
Lin Quan, John Heidemann, Yuri Pradkin
 
May 2014,  16 pages

abstract

ISI-TR-690
The Impact of Errors on Differential Optical Processing
 
J. Touch, A. Mohajerin-Ariaei, M. Chitgarha, M. Ziyadi, S. Khaleghi, Y. Akasaka, J. Y. Yang, M. Sekiya
 
March 2014,  2 pages

abstract

ISI-TR-689
The BLEMS Augmented Sensor Device
 
Joe Touch
 
March 2014,  21 pages

abstract

ISI-TR-688
T-DNS: Connection-Oriented DNS to Improve Privacy and Security
 
Liang Zhu, Zi Hu, John Heidemann, Duane Wessels, Allison Mankin, Nikita Somaiya
 
February 2014,  17 pages

abstract

ISI-TR-687
A Holistic Framework for Bridging Physical Threats to User QoE
 
Xue Cai, John Heidemann, Walter Willinger
 
July 2013,  11 pages

Submarine cable cuts have become increasingly common, with five incidents breaking more than ten cables in the last three years. Today, around 300 cables carry the majority of international Internet traffic, so a single cable cut can affect millions of users, and repairs to any cut are expensive and time consuming. Prior work has either measured the impact following incidents, or predicted the results of network changes to relatively abstract Internet topological models. In this paper, we develop a new approach to model cable cuts. Our approach differs by following problems drawn from real-world occurrences all the way to their impact on end-users. Because our approach spans many layers, no single organization can provide all the data needed to apply the model. We therefore perform what-if analysis to study a range of possibilities. With this approach we evaluate four incidents in 2012 and 2013; our analysis suggests general rules that assess the degree of a country's vulnerability to a cut.

ISI-TR-686b
Reducing False Alarms with Multi-modal Sensing for Pipeline Blockage (Extended)
 
Chengjie Zhang, John Heidemann
 
June 2013,  18 pages

abstract

ISI-TR-685
A Preliminary Analysis of Network Outages During Hurricane Sandy
 
John Heidemann, Lin Quan, Yuri Pradkin
 
November 2012,  8 pages

abstract

ISI-TR-684
Montage Topology Manager: Tools for Constructing and Sharing Representative Internet Topologies
 
Alefiya Hussain, Jennifer Chen
 
August 2012,  9 pages

abstract

ISI-TR-683
Building Apparatus for Multi-resolution Networking Experiments Using Containers
 
DETER Team
 
July 2012,  9 pages

abstract

ISI-TR-679
An Organization-Level View of the Internet and its Implications (extended)
 
Xue Cai, John Heidemann, Balachander Krishnamurthy, Walter Willinger
 
June 2012,  26 pages

abstract

ISI-TR-681
Characterizing Anycast in the Domain Name System
 
Xun Fan, John Heidemann, Ramesh Govindan
 
May 2012,  14 pages

abstract

ISI-TR-680
Towards Geolocation of Millions of IP Addresses
 
Zi Hu, John Heidemann, Yuri Pradkin
 
May 2012,  7 pages

abstract

ISI-TR-678b
Detecting Internet Outages with Precise Active Probing (extended)
 
Lin Quan, John Heidemann, Yuri Pradkin
 
May 2012,  22 pages

abstract

ISI-TR-677
Multifrontal Sparse Matrix Factorization on Graphics Processing Units
 
Robert F. Lucas, Gene Wagenbreth, John J. Tran, Dan M. Davis
 
January 2012,  19 pages

abstract

ISI-TR-676
A preliminary empirical study to compare MPI and OpenMP
 
Lorin Hochstein, Victor R. Basili
 
December 2011,  43 pages

abstract

ISI-TR-675
Evaluating Signature Matching in a Multi-Sensor Vehicle Classification System (extended)
 
Chengjie Zhang, John Heidemann
 
November 2011,  21 pages

abstract

ISI-TR-674
Final Report of the 2011 Workshop on Aquatic Ecosystem Sustainability
 
Yolanda Gil, Tom Harmon
 
October 2011,  34 pages

ISI-TR-673
Data Muling with Mobile Phones for Sensornets
 
Unkyu Park, John Heidemann
 
July 2011,  16 pages

abstract

ISI-TR-672
Detecting Internet Outages with Active Probing
 
Lin Quan, John Heidemann
 
May 2011,  15 pages

abstract

ISI-TR-671
Identifying and Characterizing Anycast in the Domain Name System
 
Xun Fan, John Heidemann, Ramesh Govindan
 
May 2011,  13 pages

abstract

ISI-TR-670
Steam-Powered Sensing: Extended Design and Evaluation
 
Chengjie Zhang, Affan Syed, Young H. Cho, John Heidemann
 
February 2011,  28 pages

abstract

ISI-TR-669
Demo Abstract: Energy Transference for Sensornets
 
Affan A. Syed, Young Cho, John Heidemann
 
November 2010,  3 pages

ISI-TR-668
Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks
 
Joon Ahn, Affan Syed, Bhaskar Krishnamachari, John Heidemann
 
September 2010,  26 pages

abstract

ISI-TR-667
On the Characteristics and Reasons of Long-lived Internet Flows
 
Lin Quan, John Heidemann
 
July 2010,  9 pages

abstract

ISI-TR-666
Selecting Representative IP Addresses for Internet Topology Studies
 
Xun Fan, John Heidemann
 
June 2010,  12 pages

abstract

ISI-TR-665
Understanding Block-level Address Usage in the Visible Internet (extended)
 
Xue Cai, John Heidemann
 
June 2010,  24 pages

abstract

ISI-TR-660b
Low-latency Synchronization of Loosely-coupled Sensornet Republishing
 
Unkyu Park, John Heidemann
 
June 2010,  18 pages

abstract

ISI-TR-664
DADL: Distributed Application Description Language
 
Jelena Mirkovic, Ted Faber, Paul Hsieh, Ganesan Malaiyandisamy, Rashi Malaviy
 
May 2010,  6 pages

abstract

 
 
Technical Report Search

Title   Author