Rob Sherwood CS244 Lecture 8: Sound Strategies For Internet Measurement.

Slides:



Advertisements
Similar presentations
Attention (your target market) !. Are you (their problem) ?
Advertisements

Research Methods David Parkinson 26th April 2007.
By Anthony Campanaro & Dennis Hernandez
An Introduction to Physics
Kapsalakis Giorgos - AM: 1959 HY459 - Internet Measurements Fall 2010.
Q and A for Ch. 1, 2, 3 CS 332 Spring Structure of the class Q: Comer describes five aspects of networking around which he has structured his text.
MSc Dissertation Preparation Session 2. Literature review The literature review is the means by which we establish what is already known and recorded.
CS 4700 / CS 5700 Network Fundamentals Lecture 4.5: Review from last week Revised 1/12/14.
How to read and analyze a scientific paper Kiana Frank.
Bryan Coad Research Fellow Ian Wark Research Institute University of South Australia 18 th July 2013 Publishing during your PhD and during your post-doc.
Friday, November 14 and Monday, November 17 Evaluating Scientific Argument: Peer Review IPHY 3700 Writing Process Map.
CSCD 555 Research Methods for Computer Science
Writing tips Based on Michael Kremer’s “Checklist”,
Basic Scientific Writing in English Lecture 3 Professor Ralph Kirby Faculty of Life Sciences Extension 7323 Room B322.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
Publishing your paper. Learning About You What journals do you have access to? Which do you read regularly? Which journals do you aspire to publish in.
Maths Counts Insights into Lesson Study 1. Sandra Fay, Irene Stone, Sharon Mack First year Junior Cert An Introduction to Patterns 2.
Fundamentals of Computer Networks ECE 478/578 Lecture #2 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona.
Thinking About How You Read
Personal reading procedure
Science Fair Projects.
Advanced Research Methodology
Introduction to Honeypot, Botnet, and Security Measurement
CHAPTER 3: DEVELOPING LITERATURE REVIEW SKILLS
Educator’s Guide Using Instructables With Your Students.
Technical Writing Vikram Pudi. Vikram © IIIT 2 Dedicated to: My Ph.D advisor Prof. Jayant Haritsa IISc, Bangalore.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Business and Management Research WELCOME. Business and Management Research Instructor:Rawaa Muhandes Office Number: 624 Term/yearSemester.
Reference Materials Library Lesson Using Reference Materials (e.g. Atlas, Encyclopedia, Dictionary, Periodical, Newspaper, and Thesaurus)
THINKING CRITICALLY ABOUT INFORMATION: “GOOD” AND “BAD” SOURCE TYPES Kevin Klipfel, Information Literacy Coordinator, California State University, Chico.
Research Writing and Scientific Literature
Practitioner Discussant Comments Malik Datardina CPA, CA, CISA.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
How NOT to Write an Academic Paper? Nguyen Xuan Hoai, Hanoi University.
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
6.3 Ethics in Statistics. Minimizing Risk vs. Maximizing Info To test a new surgical practice, should you account for the placebo effect by performing.
Digital Citizenship Created By: Kelli Stinson June 2011.
Business and Management Research WELCOME. Business and Management Research Instructor:XXXXXX Office Number:XXX Term/yearsemester two /2014.
How to write a basic research article to be relevant for the readers of European Urology Jean-Nicolas CORNU Associate Editor European Urology.
Software Engineering Experimentation Rules for Reviewing Papers Jeff Offutt See my editorials 17(3) and 17(4) in STVR
TOK Camp 2013 – TOK Presentation Preparation Part 1.
How to read a scientific paper
Research Skills: Effective Reading Strategies. Task 1 Complete the questionnaire to discover how you read.
Reflection helps you articulate and think about your processes for communication. Reflection gives you an opportunity to consider your use of rhetorical.
Plagiarism. Doing research puts you in a position to present views relevant to your topic other than your own. You will discover many interesting ideas.
PRISM: Private Retrieval of the Internet’s Sensitive Metadata Ang ChenAndreas Haeberlen University of Pennsylvania.
Developing Academic Reading Skills Planning Research Chapter 2.
Test Prep CS 690 Test 1. How to Prepare – all topics  Make an outline for each subject/topic or make flash cards  For each major idea, write a short.
Unit 9: Distributing Computing & Networking Kaplan University 1.
Keys to a Successful Grant Application E. Brooke Lerner, Ph.D. Associate Professor Department of Emergency Medicine Medical College of Wisconsin.
IR 202 Research Methods This course aims to introduce students what is social research, what are the different types of research and the research process.
COMP 417 – Jan 12 th, 2006 Guest Lecturer: David Meger Topic: Camera Networks for Robot Localization.
Dataset citation Clickable link to Dataset in the archive Sarah Callaghan (NCAS-BADC) and the NERC Data Citation and Publication team
Guide for AWS Reviewers Lois A. Killewich, MD PhD AWS AJS Editorial Board.
De-anonymizing Genomic Databases Using Phenotypic Traits Humbert et al. Proceedings on Privacy Enhancing Technologies 2015 (2) :
Business Project Nicos Rodosthenous PhD 08/10/2013 1
Section 3 Systems of Professional Learning Module 1 Grades K–5: Focus on Practice Standards.
Scientific Methods in Earth Science. What You Will Learn  Explain how scientists begin to learn about the natural world.  Explain what scientific methods.
Introductions In an Expository Essay. What does a good introduction do?  Introduces the topic to the reader and gives some background – be specific.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Introductions In an Argumentative Essay. What does a good introduction do?  Introduces the topic to the reader and gives some background – be specific.
GoRelations: an Intuitive Query System for DBPedia Lushan Han and Tim Finin 15 November 2011
Technical Writing (Applies to research papers and theses)
Fair Use in the Classroom
Research Methods Dr. X.
CS244 Lecture 8: Sound Strategies For Internet Measurement
Giving instant Feedback to Disabled Students with Technology to Create Engagement and Motivation By John O’Sullivan.
How to Get Your Paper Rejected
How to Get Your Paper Rejected
Presentation transcript:

Rob Sherwood CS244 Lecture 8: Sound Strategies For Internet Measurement

Background Who am I? Stanford ; Visiting Researcher/PostDoc Currently CTO of Big Switch Networks Research Background Internet Security Peer-to-Peer Internet Measurement Software Defined Networking 2

Sound Strategies Big Money Questions: Why this paper? –Hint: not because it’s short Who is Vern Paxon? 3

Why Measure The Internet? Isn’t it man-made? Why not just model it? Partial Answers: Statistical models of packet arrival and traffic matrices inaccurate The actual topology is unknown Many parts are intentionally obscured for commercial gain Apply natural science principles 4

You Said Patrick Harvey, "Many of the potential pitfalls in data gathering and analysis that the paper notes--while relevant to non-Internet data--seem to be somewhat exacerbated by the heavily-layered Internet architecture. This may be especially true of ‘misconception’, the potential for which means that sound data analysis likely must not treat Internet abstractions as opaque as is typical in the development of many actual systems, but instead take into account many layers and modules in addition to those of most immediate proximity to the measured data." 5

Accuracy versus Precision? Hard/formal definition? Why is this so important for measurement? 6

SigFigs? “Real” science depends heavily on Significant Figures –E.g., C=2.997,924,58 x10 8 meters/second How do we apply SigFigs with computer systems? gettimeofday() ==

Implicit Assumptions? About Time? About TCP? About Routers/Switches? 8

Metadata What is this? Why is it important? Critical tip: Save exact cut-and-paste command for every graph People will ask you to reproduce War Stories: DNS data OptAck – Nick’s class last year 9

You Said Anonymous 1, "I feel like the first half of this paper could have been titled "Reasons to Never Ever Use tcpdump". Anonymous 2, “The author says this advice is drawn from his experiences so now I am bit skeptical of every chart I see.” 10

Misconceptions vs. Calibration? Obviously misconceptions are bad –What can we do about them? –Is “learn lots of domain knowledge” enough? What does Calibration mean in practice? Answer: if you want to do it right: – “measure twice or more, cut publish once” –Can be painstaking, but better than retraction –Great Firewall of China  visualization 11

Are Large Datasets Still Hard? Paper was published in 2004 –Most of the lessons were learned before then 10+ years later, we have Hadoop, AWS, –Is big data management still an issue? My Dissertation gathered 4+TB (!!! ) –Needed tuned RAID, mysql, condor, and 300+ machines to process 12

Why Is Reproduction Hard? Or important? Truth time: –who has already had this problem? 13

Why is Publishing Data Hard? Practical answer: Privacy is Important Very hard to get consent –Map IPs to people? –People don’t understand the cost or benefit Most academic institutions have a “fail fast” approach to legal threats Anonymizing and De-anonymizing data Huge research topic; very interesting 14

You Said Anonymous, " I am a bit worried about the conflict that might appear between the two ideals of collecting an abundance of meta- data and making datasets publicly available. If a lot of metadata is collected in order to allow for the reuse of the data in many settings, this only increases the complexity of dealing with privacy issues in regards to the use of the data" 15

Ethical Internet Measurement Follow Up Papers/IMC Guidelines “BotNet Labs”/Password distribution Open Question: –Should Internet Measurement go through IRB approval? War story: –Multiple accidental DoS experiments –Very unhappy people == unhappy advisor 16

You Said Anonymous, "I feel the authors should have discussed the issue of intrusiveness of a measurement technique in the accuracy/ misconception section -- the authors rightly describe the importance of collecting metadata especially for publicly made data. But how much metadata should one collect - and what if this metadata collection actually causes an overhead and skews the results?" 17

Conclusion Very few of these concepts apply to just the Internet Rob’s claim: –This paper made me a better scientist –Which then made me a better system designer Additional Questions/Comments? 18