Vern Paxson, Papers

2014

N. Weaver, C. Kreibich, M. Dam, and V. Paxson, Here Be Web Proxies, Proc. Passive & Active Measurement: PAM-2014. To appear, March 2014.

2013

P. Pearce et al, The ZeroAccess Auto-Clicking and Search-Hijacking Click Fraud Modules, Technical Report No. UCB/EECS-2013-211, UC Berkeley, December 2013.

M. Javed and V. Paxson, Detecting Stealthy, Distributed SSH Brute-Forcing, Proc. ACM CCS, November 2013.

S. Hao, M Thomas, V. Paxson, N. Feamster, C. Kreibich, C. Grier, and S. Hollenbeck, Understanding the Domain Registration Behavior of Spammers, Proc. ACM IMC, October 2013.

K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson, Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse, Proc. USENIX Security Symposium, August 2013.

V. Paxson et al, Practical Comprehensive Bounds on Surreptitious Communication Over DNS, Proc. USENIX Security Symposium, August 2013.

S. Khattak, M. Javed, P. D. Anderson, and V. Paxson, Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion, Proc. USENIX Workshop on Free and Open Communications on the Internet (FOCI), August 2013.

2012

M. Dhawan, J. Samuel, R. Teixeira, C. Kreibich, M. Allman, N. Weaver, and V. Paxson, Fathom: A Browser-based Network Measurement Platform, Proc. ACM IMC, November 2012.

C. Grier et al, Manufacturing Compromise: The Emergence of Exploit-as-a-Service, Proc. ACM CCS, October 2012.

L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica, Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems, Proc. USENIX Annual Technical Conference, June 2012.

C. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van Steen, Prudent Practices for Designing Malware Experiments: Status Quo and Outlook, Proc. IEEE Symposium on Security and Privacy, May 2012.

K. Thomas, C. Grier, and V. Paxson, Adapting Social Spam Infrastructure for Political Censorship, Proc. USENIX LEET, April 2012.

H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson, Hold-On: Protecting Against On-Path DNS Poisoning, Securing and Trusting Internet Names, SATIN 2012.

T. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. Paxson, The BIZ Top-Level Domain: Ten Years Later, Proc. Passive & Active Measurement: PAM-2012.

M. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. Song, Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community, Technical Report No. UCB/EECS-2012-12, UC Berkeley, January 2012.

2011

C. Kreibich, N. Weaver, C. Kanich, W. Cui, and V. Paxson, GQ: Practical Containment for Measuring Modern Malware Systems, Proc. ACM IMC, November 2011.

K. Thomas, C. Grier, V. Paxson and D. Song, Suspended Accounts in Retrospect: An Analysis of Twitter Spam, Proc. ACM IMC, November 2011.

J. Caballero, C. Grier, C. Kreibich and V. Paxson, Measuring Pay-per-Install: The Commoditization of Malware Distribution, Proc. USENIX Security Symposium, August 2011.

C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker and S. Savage, Show Me the Money: Characterizing Spam-advertised Revenue, Proc. USENIX Security Symposium, August 2011.

N. Weaver, C. Kreibich and V. Paxson, Redirecting DNS for Ads and Profit, Proc. USENIX Workshop on Free and Open Communications on the Internet (FOCI), August 2011.

C. Kreibich, N. Weaver, G. Maier, B. Nechaev and V. Paxson, Experiences from Netalyzr with Engaging Users in End-System Measurement, ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), August 2011.

B. Miller, P. Pearce, and C. Grier, C. Kreibich and V. Paxson, What's Clicking What? Techniques and Innovations of Today's Clickbots, Proc. Eighth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 2011.

G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin, An Assessment of Overt Malicious Activity Manifest in Residential Networks, Proc. Eighth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 2011.

V. Paxson, M. Allman, H.K. Chu, and M. Sargent, Computing TCP's Retransmission Timer, RFC 6298, Proposed Standard, June 2011. This is an update of RFC 2988.

K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. Voelker and S. Savage, Click Trajectories: End-to-End Analysis of the Spam Value Chain, Proc. IEEE Symposium on Security and Privacy, May 2011.

K. Thomas, C. Grier, J. Ma, V. Paxson and D. Song, Design and Evaluation of a Real-Time URL Spam Filtering Service, Proc. IEEE Symposium on Security and Privacy, May 2011.

N. Weaver, C. Kreibich, B. Nechaev and V. Paxson, Implications of Netalyzr's DNS Measurements, Proc. Workshop on Securing and Trusting Internet Names (SATIN), April 2011.

Z. Li, A. Goyal, Y. Chen and V. Paxson, Towards Situational Awareness of Large-scale Botnet Probing Events, IEEE Transactions on Information Forensics & Security, 6(1), March 2011. An earlier version of this paper appeared in Proc. ASIACCS, Mar. 2009.

C. M. Zhang and V. Paxson, Detecting and Analyzing Automated Activity on Twitter, Proc. Passive & Active Measurement: PAM-2011.

2010

C. Kreibich, N. Weaver, B. Nechaev and V. Paxson, Netalyzr: Illuminating The Edge Network, Proc. ACM IMC, November 2010.

C. Muthukrishnan, V. Paxson, M. Allman and A. Akella, Using Strongly Typed Networking to Architect for Tussle, Proc. HotNets, October 2010.

C. Grier, K. Thomas, V. Paxson and M. Zhang, @spam: The Underground on 140 Characters or Less, Proc. ACM CCS, October 2010.

R. Sommer and V. Paxson, Outside the Closed World: On Using Machine Learning For Network Intrusion Detection, Proc. IEEE Symposium on Security and Privacy, May 2010.

C. Y. Cho, J. Caballero, C. Grier, V. Paxson and D. Song, Insights from the Inside: A View of Botnet Management from Infiltration, Proc. USENIX LEET, April 2010.

M. Felegyhazi, C. Kreibich and V. Paxson, On the Potential of Proactive Domain Blacklisting, Proc. USENIX LEET, April 2010.

B. Nechaev, M. Allman, V. Paxson and A. Gurtov, A Preliminary Analysis of TCP Performance in an Enterprise Network, Proc. USENIX Internet Network Management Workshop/Workshop on Research on Enterprise Networking, April 2010.

T. Callahan, M. Allman and V. Paxson, A Longitudinal View of HTTP Traffic, Proc. Passive & Active Measurement: PAM-2010, April 2010.

A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. Voelker, V. Paxson, N. Weaver and S. Savage, Botnet Judo: Fighting Spam with Itself, Proc. NDSS, February 2010.

2009

G. Maier, A. Feldmann, V. Paxson and M. Allman, On Dominant Characteristics of Residential Broadband Internet Traffic, Proc. ACM IMC, November 2009.

B. Nechaev, V. Paxson, M. Allman and A. Gurtov, On Calibrating Enterprise Switch Measurements, Proc. ACM IMC, November 2009.

P. Mittal, V. Paxson, R. Sommer and M. Winterrowd, Securing Mediated Trace Access Using Black-box Permutation Analysis, Proc. HOTNETS, October 2009.

C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, S. Savage, Spamalytics: An Empirical Analysis of Spam Marketing Conversion, Communications of the ACM, 52(9), pp. 99-107, September 2009.

M. Allman, V. Paxson and E. Blanton, TCP Congestion Control, RFC 5681, Draft Standard, September 2009.

R. Sommer, V. Paxson, and N. Weaver, An architecture for exploiting multi-core processors to parallelize network intrusion prevention, Concurrency and Computation: Practice and Experience, Special Issue: Multi-core Supported Network and System Security, 21(10), pp. 1255-1279, May 2009.

C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage, Spamcraft: An Inside Look At Spam Campaign Orchestration, Proc. USENIX LEET, April 2009.

N. Weaver, R. Sommer and V. Paxson, Detecting Forged TCP Reset Packets, Proc. NDSS, February 2009.

Z. Li, A. Goyal, Y. Chen and V. Paxson, Automating Analysis of Large-Scale Botnet Probing Events, Proc. ASIACCS, March 2009.

2008

C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, S. Savage, Spamalytics: An Empirical Analysis of Spam Marketing Conversion, (Overview), Proc. ACM CCS, October 2008.

H. Dreger, A. Feldmann, V. Paxson and R. Sommer, Predicting the Resource Consumption of Network Intrusion Detection Systems, Proc. RAID, September 2008.

G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson and F. Schneider, Enriching Network Security Analysis with Time Travel, Proc. ACM SIGCOMM, August 2008.

J. Jung, R. Milito, and V. Paxson, On the Adaptive Real-Time Detection of Fast-Propagating Network Worms, Journal in Computer Virology, Vol.4, No.3, August 2008. An earlier version of this paper appeared in Proc. Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, July 2007.

M. Allman, C. Kreibich, V. Paxson, R. Sommer and N. Weaver, Principles for Developing Comprehensive Network Visibility (HTML, PDF), USENIX Workshop on Hot Topics in Security, July 2008.

L. Juan, C. Kreibich, C-H. Lin, and V. Paxson, A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract), Proc. Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 2008. (Longer version).

C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage, On the Spam Campaign Trail (HTML, PDF), First USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET '08), 2008.

M. Vutukuru, H. Balakrishnan and V. Paxson, Efficient and Robust TCP Stream Normalization, Proc. IEEE Symposium on Security and Privacy, May 2008.

M. Allman and V. Paxson, A Reactive Measurement Framework, Proc. Passive and Active Measurement Conference, April 2008.

2007

M. Allman, K. Christensen, B. Nordman, and V. Paxson, Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems, Proc. HOTNETS, November 2007.

J. Franklin, V. Paxson, A. Perrig, and S. Savage, An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants, Proc. ACM CCS, October 2007.

J. Gonzalez, V. Paxson, and N. Weaver, Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention, Proc. ACM CCS, October 2007.

M. Allman, V. Paxson, and J. Terrell, A Brief History of Scanning, Proc. ACM IMC, October 2007.

M. Allman and V. Paxson, Issues and Etiquette Concerning Use of Shared Measurement Data, Proc. ACM IMC, October 2007.

M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney, The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware, Proc. RAID 2007.

M. Allman, C. Kreibich, V. Paxson, R. Sommer and N. Weaver, The Strengths of Weaker Identities: Opportunistic Personas, Proc. USENIX Hot Security, August 2007.

J. Jung, R. Milito, and V. Paxson, On the Adaptive Real-Time Detection of Fast-Propagating Network Worms, Proc. Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, July 2007.

V. Paxson, R. Sommer, and N. Weaver, An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention, Proc. IEEE Sarnoff Symposium, May 2007.

N. Weaver, V. Paxson, and J. Gonzalez, The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention, Proc. FPGA '07, February 2007.

2006

E. Kohler, J. Li, V. Paxson, and S. Shenker, Observed Structure of Addresses in IP Traffic, IEEE/ACM Transactions on Networking, Vol.14, No.6, December 2006. An earlier version of this paper appeared in Proc. ACM SIGCOMM Internet Measurement Workshop, November 2002.

M. Allman, E. Blanton, V. Paxson and S. Shenker, Fighting Coordinated Attackers with Cross-Organizational Information Sharing, Proc. HOTNETS 2006.

A. Parker et al, Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications, Proc. HOTNETS 2006.

J. Jung, R. Milito and V. Paxson, On the Adaptive Real-Time Detection of Fast-Propagating Network Worms, MIT Technical Report MIT-CSAIL-TR-2006-074, November 2006.

R. Pang, V. Paxson, R. Sommer and L. Peterson, binpac: A yacc for Writing Application Protocol Parsers, Proc. ACM IMC, October 2006.

J. Kannan, J. Jung, V. Paxson and C. Koksal, Semi-Automated Discovery of Application Session Structure, Proc. ACM IMC, October 2006.

W. Cui, V. Paxson and N. Weaver, GQ: Realizing a System to Catch Worms in a Quarter Million Places, ICSI Technical Report TR-06-004, September 2006.

V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer and N. Weaver, Rethinking Hardware Support for Network Analysis and Intrusion Prevention, Proc. USENIX Hot Security, August 2006.

H. Dreger, A. Feldmann, M. Mai, V. Paxson and R. Sommer, Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection, Proc. USENIX Security Symposium, August 2006. (PDF)

N. Duffield, F. Lo Presti, V. Paxson and D. Towsley, Network Loss Tomography Using Striped Unicast Probes, IEEE/ACM Transactions on Networking, Vol.14, No.4, pp. 697-710, August 2006.

J. Gonzalez and V. Paxson, Enhancing Network Intrusion Detection With Integrated Sampling and Filtering, Proc. RAID 2006.

S. Floyd, V. Paxson and A. Falk, IAB Thoughts on the Role of the Internet Research Task Force (IRTF), RFC 4440, March 2006.

W. Cui, V. Paxson, N. Weaver and R. Katz, Protocol-Independent Adaptive Replay of Application Dialog, Proc. NDSS, February 2006.

R. Pang, M. Allman, V. Paxson and J. Lee, The Devil and Packet Trace Anonymization, Computer Communication Review, 36(1), January 2006.

2005

M. Casado, T. Garfinkel, W. Cui, V. Paxson and S. Savage, Opportunistic Measurement: Extracting Insight from Spurious Traffic, Proc. HOTNETS 2005.

V. Yegneswaran, P. Barford and V. Paxson, Using Honeynets for Internet Situational Awareness, Proc. HOTNETS 2005.

R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson and B. Tierney, A First Look at Modern Enterprise Traffic, Proc. ACM IMC, October 2005. (PDF)

R. Sommer and V. Paxson, Exploiting Independent State For Network Intrusion Detection, Proc. ACSAC 2005.

A. Kumar, V. Paxson and N. Weaver, Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event, Proc. ACM IMC, October 2005.

S. Kornexl, V. Paxson, H. Dreger, A. Feldmann and R. Sommer, Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic, Proc. ACM IMC, October 2005. (PDF)

S. Dharmapurikar and V. Paxson, Robust TCP Stream Reassembly in the Presence of Adversaries, Proc. USENIX Security Symposium 2005. (PDF)

M. Allman, E. Blanton and V. Paxson, An Architecture for Developing Behavioral History, Proc. Steps to Reducing Unwanted Traffic on the Internet (SRUTI) 2005.

H. Dreger, C. Kreibich, V. Paxson and R. Sommer, Enhancing the Accuracy of Network-based Intrusion Detection with Host-based Context, Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) 2005.

J. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker and D. Wetherall, The Network Oracle, Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 28(1), March 2005.

2004

V. Paxson, Strategies for Sound Internet Measurement, Proc. ACM IMC, October 2004.

R. Pang, V. Yegneswaran, P. Barford, V. Paxson and L. Peterson, Characteristics of Internet Background Radiation, Proc. ACM IMC, October 2004.

R. Sommer and V. Paxson, Exploiting Independent State For Network Intrusion Detection, Technical Report TUM-I0420, Technische Universität München, November 2004. (Postscript)

N. Weaver, I. Hamadeh, G. Kesidis and V. Paxson, Preliminary Results Using ScaleDown to Explore Worm Dynamics, Proc. ACM CCS WORM, October 2004.

S. Staniford, D. Moore, V. Paxson and N. Weaver, The Top Speed of Flash Worms, Proc. ACM CCS WORM, October 2004.

H. Dreger, A. Feldmann, V. Paxson, and R. Sommer, Operational Experiences with High-Volume Network Intrusion Detection, Proc. ACM CCS, October 2004.

N. Weaver, D. Ellis, S. Staniford and V. Paxson, Worms vs. Perimeters: The Case for Hard-LANs, Proc. Hot Interconnects 12, August 2004.

N. Weaver, S. Staniford and V. Paxson, Very Fast Containment of Scanning Worms, Proc. USENIX Security Symposium, August 2004.

N. Weaver and V. Paxson, A Worst-Case Worm, Proc. Third Annual Workshop on Economics and Information Security (WEIS04), May 2004.

J. Jung, V. Paxson, A. Berger, and H. Balakrishnan, Fast Portscan Detection Using Sequential Hypothesis Testing, Proc. IEEE Symposium on Security and Privacy, May 2004.

2003

R. Sommer and V. Paxson, Enhancing Byte-Level Network Intrusion Detection Signatures with Context, Proc. ACM CCS 2003. (compressed Postscript)

R. Pang and V. Paxson, A High-level Programming Environment for Packet Trace Anonymization and Transformation, Proc. ACM SIGCOMM 2003, August 2003.

N. Weaver, V. Paxson, S. Staniford and R. Cunningham, A Taxonomy of Computer Worms, Proc. ACM CCS Workshop on Rapid Malcode, October 2003.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, Inside the Slammer Worm, Security and Privacy, July/August 2003.

N. Weaver, V. Paxson, S. Staniford and R. Cunningham, Large Scale Malicious Code: A Research Agenda. DARPA-sponsored report, 2003.

U. Shankar and V. Paxson, Active Mapping: Resisting NIDS Evasion Without Altering Traffic, Proc. IEEE Symposium on Security and Privacy, May 2003.

J. Gonzalez and V. Paxson, pktd: A Packet Capture and Injection Daemon, Proc. Passive & Active Measurement: PAM-2003.

D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, The Spread of the Sapphire/Slammer Worm, technical report, February 2003.

2002

S. Staniford, V. Paxson and N. Weaver, How to 0wn the Internet in Your Spare Time, Proc. USENIX Security Symposium 2002.

Computer Science and Telecommunications Board, National Research Council, The Internet Under Crisis Conditions: Learning from September 11, National Academy Press, Washington, D.C., 2002.

E. Kohler, J. Li, V. Paxson and S. Shenker, Observed Structure of Addresses in IP Traffic, Proc. ACM SIGCOMM Internet Measurement Workshop, November 2002.

Y. Zhang, L. Breslau, V. Paxson and S. Shenker, On the Characteristics and Origins of Internet Flow Rates, Proc. ACM SIGCOMM, August 2002.

R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson and S. Shenker. Controlling High Bandwidth Aggregates in the Network, Computer Communication Review 32(3), July 2002. (Extended version; Slashdot note; Web page on ACC and Pushback.)

W. Willinger, R. Govindan, S. Jamin, V. Paxson and S. Shenker, Scaling phenomena in the Internet: Critically examining criticality, Proceedings of Natl. Acad. Sci. USA, Vol. 99, Suppl. 1, 2573-2580, February 19, 2002.

D. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay, Proc. RAID 2002.

R. Govindan and V. Paxson, Estimating Router ICMP Generation Delays, Proceedings of Passive & Active Measurement: PAM-2002.

W. Willinger, V. Paxson, R. H. Riedi and M. S. Taqqu, Long-range dependence and data network traffic. Long-range Dependence: Theory and Applications, P. Doukhan, G. Oppenheim and M. S. Taqqu, eds., Birkhauser, 2002.

2001

Y. Zhang, N. Duffield, V. Paxson, and S. Shenker, On the Constancy of Internet Path Properties, Proc. ACM SIGCOMM Internet Measurement Workshop, November 2001.

S. Floyd and V. Paxson, Difficulties in Simulating the Internet. (PDF) IEEE/ACM Transactions on Networking, Vol.9, No.4, pp. 392-403, August 2001. An earlier version appeared in Proceedings of the 1997 Winter Simulation Conference, December 1997.

M. Handley, C. Kreibich and V. Paxson, Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML). (compressed Postscript) (PDF) Proc. USENIX Security Symposium 2001.

V. Paxson, An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks (HTML). (compressed Postscript) (PDF) Computer Communication Review 31(3), July 2001.

Computer Science and Telecommunications Board, National Research Council, Looking Over the Fence at Networks: A Neighbor's View of Networking Research, National Academy Press, Washington, D.C., 2001.

N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley, Inferring link loss using striped unicast probes, Proc. IEEE INFOCOM, April 2001.

2000

V. Paxson and M. Allman, Computing TCP's Retransmission Timer, RFC 2988, Proposed Standard, November 2000.

Y. Zhang and V. Paxson, Detecting Backdoors, Proc. 9th USENIX Security Symposium, August 2000. (HTML)

Y. Zhang and V. Paxson, Detecting Stepping Stones, Proc. 9th USENIX Security Symposium, August 2000. (HTML)

R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson, Stream Control Transmission Protocol, RFC 2960, Proposed Standard, October 2000.

Y. Zhang, V. Paxson, and S. Shenker, The Stationarity of Internet Path Properties: Routing, Loss, and Throughput, ACIRI Technical Report, May 2000.

X. Xiao, A. Hannan, V. Paxson, and E. Crabbe, TCP Processing of the IPv4 Precedence Field, RFC 2873, Proposed Standard, June 2000.

V. Paxson, A. Adams, and M. Mathis, Experiences with NIMI, Proceedings of Passive & Active Measurement: PAM-2000.

S. Bradner and V. Paxson, IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers, RFC 2780, Best Current Practice, March 2000.

A. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S. B. Moon, V. Paxson, and D. Towsley, The Use of End-to-end Multicast Measurements for Characterizing Internal Network Behavior, IEEE Communications, 38(5), May 2000.

1999

V. Paxson, End-to-End Internet Packet Dynamics. IEEE/ACM Transactions on Networking, Vol.7, No.3, pp. 277-292, June 1999. An earlier version appeared in Proc. ACM SIGCOMM '97, September 1997, Cannes, France.

M. Allman and V. Paxson, On Estimating End-to-End Network Path Properties, ACM SIGCOMM '99, September 1999, Cambridge, MA.

V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time, Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999. (PDF, HTML) This paper is a revision of paper that previously appeared in Proc. 7th USENIX Security Symposium , January 1998.

J. Mahdavi and V. Paxson, IPPM Metrics for Measuring Connectivity. RFC 2678, Proposed Standard, September 1999. Previously issued as RFC 2498, Experimental, January 1999.

M. Allman, V. Paxson and W. Stevens, TCP Congestion Control, RFC 2581, Proposed Standard, April 1999.

P. Francis, S. Jamin, V. Paxson, L. Zhang, D. Gryniewicz, and Y. Jin, An architecture for a global Internet host distance estimation service, Proc. IEEE INFOCOM, March 1999.

V. Paxson, M. Allman, S. Dawson, W. Fenner, J. Griner, I. Heavens, K. Lahey, J. Semke, and B. Volz, Known TCP Implementation Problems, RFC 2525, Informational, March 1999.

1998

A. Mankin, A. Romanow, S. Bradner, and V. Paxson, IETF Criteria for Evaluating Reliable Multicast Transport and Application Protocols, RFC 2357, Informational, June 1998.

V. Paxson, G. Almes, J. Mahdavi, and M. Mathis, Framework for IP Performance Metrics. RFC 2330, Informational, May 1998.

V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time. Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998. This version of the paper differs from that in the printed Proceedings in that an error in the performance analysis, which overstated the load on the FDDI ring by a factor of two, has been corrected.

V. Paxson, On Calibrating Measurements of Packet Transit Times. Proceedings of SIGMETRICS '98, June 1998.

V. Paxson, J. Mahdavi, A. Adams, and M. Mathis, An Architecture for Large-Scale Internet Measurement. IEEE Communications, Vol.36, No.8, pp 48-54, August 1998.

W. Willinger, and V. Paxson, Where Mathematics meets the Internet, Notices of the American Mathematical Society, Vol.45, No.8, pp. 961-970, August 1998.

W. Willinger, V. Paxson, and M.S. Taqqu, Self-similarity and Heavy Tails: Structural Modeling of Network Traffic. In A Practical Guide to Heavy Tails: Statistical Techniques and Applications, Adler, R., Feldman, R., and Taqqu, M.S., editors, Birkhauser, 1998.

A. Adams, J. Mahdavi, M. Mathis, and V. Paxson, Creating a Scalable Architecture for Internet Measurement. Proc. INET '98.

1997

V. Paxson, End-to-End Routing Behavior in the Internet. IEEE/ACM Transactions on Networking, Vol.5, No.5, pp. 601-615, October 1997. An earlier version appeared in Proc. ACM SIGCOMM '96, August 1996, Stanford, CA.

V. Paxson, End-to-End Internet Packet Dynamics, ACM SIGCOMM '97, September 1997, Cannes, France.

V. Paxson, Automated Packet Trace Analysis of TCP Implementations, ACM SIGCOMM '97, September 1997, Cannes, France.

V. Paxson, Measurements and Analysis of End-to-End Internet Dynamics, (1.8 MB gzip compressed, ~400 pages), Ph.D. dissertation, 1997. README.

V. Paxson, Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic . Computer Communications Review, V. 27 N. 5, October 1997, pp. 5-18. This paper is a minor revision of Fast Approximation of Self-Similar Network Traffic , an April 1995 technical report. Abstract.

V. Paxson, and S. Floyd, Why We Don't Know How To Simulate The Internet, Proceedings of the 1997 Winter Simulation Conference, December 1997.

W. Willinger, and V. Paxson, Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick, Annals of Statistics, Vol.25, No.5, pp. 1805-1869, 1997. Abstract of Prof. Resnick's paper, On-line version of Prof. Resnick's paper.

1996

V. Paxson, Towards a Framework for Defining Internet Performance Metrics. LBNL-38952, June 20, 1996. An earlier version of this paper appeared in Proc. INET '96.

1995

V. Paxson. 1995, "Re: Traceroute and TTL", Usenet, comp.protocols.tcp-ip Newsgroup, Message-ID <48407@dog.ee.lbl.gov> Sept. 1995. 30% of measured Internet routes are asymmetrical.

V. Paxson and S. Floyd, Wide-Area Traffic: The Failure of Poisson Modeling, IEEE/ACM Transactions on Networking, Vol. 3 No. 3, pp. 226-244, June 1995. Abstract. (Original Postscript.) An earlier version of this paper appeared in SIGCOMM 94, pp. 257-268, August 1994.

1994

V. Paxson, Empirically-Derived Analytic Models of Wide-Area TCP Connections, IEEE/ACM Transactions on Networking, Vol. 2 No. 4, August 1994. Abstract. (Original Postscript.)

V. Paxson, Growth Trends in Wide-Area TCP Connections. IEEE Network, Vol. 8 No. 4, pp. 8-17, July 1994. Abstract.

1993

V. Paxson, Glish: A Software Bus for High-Level Control. Proceedings of the 1993 International Conference on Accelerator and Large Experimental Physics Control Systems (Berlin, Germany, Oct. 1993). Abstract.

V. Paxson, and C. Saltmarsh, Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. Proceedings of the 1993 Winter USENIX Technical Conference (San Diego, CA, Jan. 1993), USENIX. Abstract.

1991

V. Paxson, A Program for Testing IEEE Decimal-Binary Conversion. CS 279 class project, University of California, Berkeley, May, 1991.

1990

V. Paxson, A Survey of Support for Implementing Debuggers. CS 262 class project, University of California, Berkeley, October, 1990. Abstract.

Return to [Vern Paxson].