Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jeff Sedayao is active.

Publication


Featured researches published by Jeff Sedayao.


international conference on computer communications and networks | 2011

Quantifying and Improving DNSSEC Availability

Casey T. Deccio; Jeff Sedayao; Krishna Kant; Prasant Mohapatra

The Domain Name System (DNS) is a foundational component of todays Internet for mapping Internet names to addresses. With the DNS Security Extensions (DNSSEC) DNS responses can be cryptographically verified to prevent malicious tampering. The protocol complexity and administrative overhead associated with DNSSEC can significantly impact the potential for name resolution failure. We present metrics for assessing the quality of a DNSSEC deployment, based on its potential for resolution failure in the presence of DNSSEC misconfiguration. We introduce a metric to analyze the administrative complexity of a DNS configuration, which contributes to its failure potential. We then discuss a technique which uses soft anchoring to increase robustness in spite of misconfigurations. We analyze a representative set of production signed DNS zones and determine that 28% of the validation failures we encountered would be mitigated by the soft anchoring technique we propose.


ieee computer society international conference | 1995

World Wide Web network traffic patterns

Jeff Sedayao

The World Wide Web (WWW) generates a significant and growing portion of traffic on the Internet. With the click of a mouse button, a person browsing on the WWW can generate megabytes of multimedia network traffic. WWWs growth and possible network impact merit a study of its traffic patterns, problems, and possible changes. This paper attempts to characterize World Wide Web traffic patterns. First, the Webs HyperText Transfer Protocol (HTTP) is reviewed, with particular attention to latency factors. User access patterns and file size distribution are then described. Next, the HTTP design issues are discussed, followed by a section on proposed revisions. Benefits and drawbacks to each of the proposals are covered. The paper ends with pointers toward more information on this area.


international conference on distributed computing systems | 2017

An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds

Eve M. Schooler; David Zage; Jeff Sedayao; Hassnaa Moustafa; Andrew Stephen Brown; Moreno Ambrosin

The Internet of Things (IoT) is producing a tidal wave of data, much of it originating at the network edge, from applications with requirements unmet by the traditional back-end Cloud architecture. To address the disruption caused by the overabundance of data, this paper offers a holistic data-centric architectural vision for the data-centric IoT. It advocates that we rethink our approach to the design and definition of key elements: that we shift our focus from Things to Smart Objects; grow Trust organically; and evolve back-end Clouds toward Edge and Fog clouds, which leverage data-centric networks and enable optimal handling of upstream data flows. Along the way, we wax poetic about several blue-sky topics, assess the status of these elements in the context of related work, and identify known gaps in meeting this vision.


international conference on computer communications | 2010

Measuring Availability in the Domain Name System

Casey T. Deccio; Jeff Sedayao; Krishna Kant; Prasant Mohapatra

The domain name system (DNS) is critical to Internet functionality. The availability of a domain name refers to its ability to be resolved correctly. We develop a model for server dependencies that is used as a basis for measuring availability. We introduce the minimum number of servers queried (MSQ) and redundancy as availability metrics and show how common DNS misconfigurations impact the availability of domain names. We apply the availability model to domain names from production DNS and observe that 6.7% of names exhibit sub-optimal MSQ, and 14% experience false redundancy. The MSQ and redundancy values can be optimized by proper maintenance of delegation records for zones.


international conference on network protocols | 2009

Quality of name resolution in the Domain Name System

Casey T. Deccio; Chao-Chih Chen; Prasant Mohapatra; Jeff Sedayao; Krishna Kant

The Domain Name System (DNS) is integral to todays Internet. Name resolution for a domain is often dependent on servers well outside the control of the domains owner. In this paper we propose a formal model for analyzing the name dependencies inherent in DNS, based on protocol specification and actual implementations. We derive metrics to quantify the extent to which domain names affect other domain names. It is found that under certain conditions, the name resolution for over one-half of the queries exhibits influence of domains not expressly configured by administrators. This result serves to quantify the degree of vulnerability of DNS due to dependencies that administrators are unaware of. The model presented in the paper also shows that the set of domains whose resolution affects a given domain name is much smaller than previously thought. The model also shows that with caching of NS target addresses, the number of influential domains expands greatly, thereby making the DNS infrastructure more vulnerable.


Computer Networks | 2012

Quantifying DNS namespace influence

Casey T. Deccio; Jeff Sedayao; Krishna Kant; Prasant Mohapatra

Name resolution using the Domain Name System (DNS) is integral to todays Internet. The resolution of a domain name is often dependent on namespace outside the control of the domains owner. In this article we review the DNS protocol and several DNS server implementations. Based on our examination, we propose a formal model for analyzing the name dependencies inherent in DNS. Using our name dependency model we derive metrics to quantify the extent to which domain names affect other domain names. It is found that under certain conditions, more than half of the queries for a domain name are influenced by namespaces not expressly configured by administrators. This result serves to quantify the degree of vulnerability of DNS due to dependencies that administrators are unaware of. When we apply metrics from our model to production DNS data, we show that the set of domains whose resolution affects a given domain name is much smaller than previously thought. However, behaviors such as using cached addresses for querying authoritative servers and chaining domain name aliases increase the number and diversity of influential domains, thereby making the DNS infrastructure more vulnerable.


information integration and web-based applications & services | 2008

Implementing and operating an internet scale distributed application using service oriented architecture principles and cloud computing infrastructure

Jeff Sedayao


Archive | 2006

Apparatus for end-user transparent utilization of computational, storage, and network capacity of mobile devices, and associated methods

Jeff Sedayao; John B. Vicente; Sanjay Rungta; Winson Chan


international congress on big data | 2014

Making Big Data, Privacy, and Anonymization Work Together in the Enterprise: Experiences and Issues

Jeff Sedayao; Rahul M. Bhardwaj; Nakul Gorade


international conference on cloud computing | 2009

A Simple Technique for Securing Data at Rest Stored in a Computing Cloud

Jeff Sedayao; Steven Su; Xiaohao Ma; Minghao Jiang; Kai Miao

Collaboration


Dive into the Jeff Sedayao's collaboration.

Top Co-Authors

Avatar

Casey T. Deccio

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge