skip to main content
10.1145/1080173acmconferencesBook PagePublication PagescommConference Proceedingsconference-collections
MineNet '05: Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
ACM2005 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SIGCOMM05: ACM SIGCOMM 2005 Conference Philadelphia Pennsylvania USA 26 August 2005
ISBN:
978-1-59593-026-2
Published:
22 August 2005
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

Welcome to the ACM SIGCOMM 2005 Workshops!This year we are pleased to present a program of four excellent workshops: (1) Workshop on experimental approaches to wireless network design and analysis (E-WIND), (2) Workshops on economics of peer-to-peer systems (P2PECON), (3) Workshop on mining data networks (MineNet), and (4) Workshop on delay tolerant networking and related networks (WDTN).Workshops are becoming an integral part of the ACM SIGCOMM week-long Data Communications Festival and their goal is to enhance the ACM SIGCOMM conference technical program and promote cross-disciplinary interactions. In response to the call for proposals, we received a record of 12 workshop proposals, 4 of which were accepted after a review by the SIGCOMM 2005 organizing committee. Reaching out to other communities was probably one of the key factors in our selection process. E-WIND brings together the wireless and data networking communities; P2PECON has been successfully organized in the past two years as an independent workshop and brings together researchers from economics, distributed systems, and data networking; MineNet focuses on the analysis of the vast amount of data that can be extracted from the network and crosses the boundaries of networking, data mining, statistics, and machine learning. WDTN was selected as an emerging topic in data networking that could benefit from a focused workshop that will update researchers on the latest results in the area.There is a significant amount of logistics and co-ordination required between the four workshops and the ACM SIGCOMM 2005 conference and I would like to thank all the members of the SIGCOMM 2005 organizing committee and several volunteers who made it possible. First, I would like to thank Roch Guerin, Joe Touch, and Jennifer Rexford, for all their guidance during the workshop organization process and for being ready to assist at any time. Jaudelice C. de Oliveira and Honghui Lu managed the local arrangements. Steve Weber was always available to update the web-site with the workshop information, and Andreas Terzis and Christos Papadopoulos handled the registration and financial issues. Saswati Sarkar, and Lisa Tolles at Sheridan Printing led the difficult task of producing the combined proceedings.Last but not least, I would like to thank the organizers of the four workshops: Ed Knightly, Christophe Diot, Emin Gun Sirer, Eric Friedman, Shubhabrata Sen, Chuanyi Ji, Debanjan Saha, Joe McCloskey, S. Keshav, and Kevin Fall. Their hard work together with the excellent contributions of all authors were key in making these workshops successful.

Skip Table Of Content Section
SESSION: Security and network problem determination
Article
Free
Detecting mass-mailing worm infected hosts by mining DNS traffic data

The Domain Name System (DNS) is a critical infrastructure in the Internet; thus, monitoring its traffic, and protecting DNS from malicious activities are important for security in cyberspace. However, it is often difficult to determine whether a DNS ...

Article
Free
Detecting malicious network traffic using inverse distributions of packet contents

We study the problem of detecting malicious IP traffic in the network early, by analyzing the contents of packets. Existing systems look at packet contents as a bag of substrings and study characteristics of its base distribution B where B(i) is the ...

Article
Free
Greynets: a definition and evaluation of sparsely populated darknets

Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise network operators. We introduce and evaluate the Greynet - a region of IP ...

Article
Free
Shrink: a tool for failure diagnosis in IP networks

Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneous causes like power outages. These faults are usually detected as failures ...

Article
Free
Topographical proximity for mining network alarm data

Increasingly powerful fault management systems are required to ensure robustness and quality of service in today's networks. In this context, event correlation is of prime importance to extract meaningful information from the wealth of alarm data ...

SESSION: Traffic analysis and infrastructure monitoring
Article
Free
Experiences with a continuous network tracing infrastructure

One of the most pressing problems in network research is the lack of long-term trace data from ISPs. The Internet carries an enormous volume and variety of data; mining this data can provide valuable insight into the design and development of new ...

Article
Free
Manifold learning visualization of network traffic data

When traffic anomalies or intrusion attempts occur on the network, we expect that the distribution of network traffic will change. Monitoring the network for changes over time, across space (at various routers in the network), over source and ...

Article
Free
ACAS: automated construction of application signatures

An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identified using well-known default server network-port numbers in the TCP or UDP ...

Article
Free
Anemone: using end-systems as a rich network management platform

Enterprise networks contain hundreds, if not thousands, of cooperative end-systems. We advocate devoting a small fraction of their idle cycles, free disk space and network bandwidth to create Anemone, a platform for network management. In contrast to ...

SESSION: Routing & configuration management
Article
Free
A first step toward understanding inter-domain routing dynamics

BGP updates are triggered by a variety of events such as link failures, resets, routers crashing, configuration changes, and so on. Making sense of these updates and identifying the underlying events is key to debugging and troubleshooting BGP routing ...

Article
Free
Identifying BGP routing table transfers

BGP routing updates collected by monitoring projects such as RouteViews and RIPE have been a vital source to our understanding of the global routing system. The updates logged by these monitoring projects are generated either by individual route changes,...

Article
Free
Learning-based anomaly detection in BGP updates

Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet's interdomain-routing system. In this paper, we propose an instance-learning framework that identifies anomalies based on deviations from ...

Article
Free
Bayesian detection of router configuration anomalies

Problems arising from router misconfigurations cost time and money. The first step in fixing such misconfigurations is finding them. In this paper, we propose a method for detecting misconfigurations that does not depend on an a priori model of what ...

Article
Free
Role of machine learning in configuration management of ad hoc wireless networks

In this work, we show that machine learning, e.g., graphical models, plays an important role for the self-configuration of ad hoc wireless network. The role of such a learning approach includes a simple representation of complex dependencies in the ...

Contributors
  • AT&T Inc.
  • School of Electrical and Computer Engineering
  • IBM Research
  • United States Department of Defense
  1. Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data

    Recommendations