Loading...
Please wait, while we are loading the content...
Similar Documents
An Untold Story of Middleboxes in Cellular Networks (2011)
| Content Provider | CiteSeerX |
|---|---|
| Author | Xu, Qiang Wang, Zhaoguang Qian, Zhiyun Mao, Z. Morley Zhang, Ming |
| Abstract | The use of cellular data networks is increasingly popular as net-work coverage becomes more ubiquitous and many diverse user-contributed mobile applications become available. The growing cellular traffic demand means that cellular network carriers are fac-ing greater challenges to provide users with good network perfor-mance and energy efficiency, while protecting networks from po-tential attacks. To better utilize their limited network resources while securing the network and protecting client devices the car-riers have already deployed various network policies that influence traffic behavior. Today, these policies are mostly opaque, though they directly impact application designs and may even introduce network vulnerabilities. We present NetPiculet, the first tool that unveils carriers ’ NAT and firewall policies by conducting intelligent measurement. By running NetPiculet on the major U.S. cellular providers as well as deploying it as a smartphone application in the wild covering more than 100 cellular ISPs, we identified the key NAT and firewall poli-cies which have direct implications on performance, energy, and se-curity. For example, NAT boxes and firewalls set timeouts for idle TCP connections, which sometimes cause significant energy waste on mobile devices. Although most carriers today deploy sophisti-cated firewalls, they are still vulnerable to various attacks such as battery draining and denial of service. These findings can inform developers in optimizing the interaction between mobile applica-tions and cellular networks and also guide carriers in improving their network configurations. |
| File Format | |
| Publisher Date | 2011-01-01 |
| Access Restriction | Open |
| Subject Keyword | Cellular Data Network Significant Energy Waste Client Device Net-work Coverage Intelligent Measurement Smartphone Application Sophisti-cated Firewall Various Network Policy Firewall Policy Nat Box Traffic Behavior Carrier Today Cellular Traffic Demand Untold Story Key Nat Idle Tcp Connection Direct Implication Limited Network Resource Cellular Network Carrier Cellular Isps Present Netpiculet Many Diverse User-contributed Mobile Application Network Vulnerability Carrier Nat Good Network Perfor-mance Guide Carrier Application Design Battery Draining Major U.s. Cellular Provider Various Attack Mobile Applica-tions Po-tential Attack First Tool |
| Content Type | Text |