Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jeffrey Knockel is active.

Publication


Featured researches published by Jeffrey Knockel.


Nucleic Acids Research | 2017

DrugCentral: online drug compendium

Oleg Ursu; Jayme Holmes; Jeffrey Knockel; Cristian G. Bologa; Jeremy J. Yang; Stephen L. Mathias; Stuart J. Nelson; Tudor I. Oprea

DrugCentral (http://drugcentral.org) is an open-access online drug compendium. DrugCentral integrates structure, bioactivity, regulatory, pharmacologic actions and indications for active pharmaceutical ingredients approved by FDA and other regulatory agencies. Monitoring of regulatory agencies for new drugs approvals ensures the resource is up-to-date. DrugCentral integrates content for active ingredients with pharmaceutical formulations, indexing drugs and drug label annotations, complementing similar resources available online. Its complementarity with other online resources is facilitated by cross referencing to external resources. At the molecular level, DrugCentral bridges drug-target interactions with pharmacological action and indications. The integration with FDA drug labels enables text mining applications for drug adverse events and clinical trial information. Chemical structure overlap between DrugCentral and five online drug resources, and the overlap between DrugCentral FDA-approved drugs and their presence in four different chemical collections, are discussed. DrugCentral can be accessed via the web application or downloaded in relational database format.


passive and active network measurement | 2014

Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels

Roya Ensafi; Jeffrey Knockel; Geoffrey Alexander; Jedidiah R. Crandall

We describe a method for remotely detecting intentional packet drops on the Internet via side channel inferences. That is, given two arbitrary IP addresses on the Internet that meet some simple requirements, our proposed technique can discover packet drops (e.g., due to censorship) between the two remote machines, as well as infer in which direction the packet drops are occurring. The only major requirements for our approach are a client with a global IP Identifier (IPID) and a target server with an open port. We require no special access to the client or server. Our method is robust to noise because we apply intervention analysis based on an autoregressive-moving-average (ARMA) model. In a measurement study using our method featuring clients from multiple continents, we observed that, of all measured client connections to Tor directory servers that were censored, 98% of those were from China, and only 0.63% of measured client connections from China to Tor directory servers were not censored. This is congruent with current understandings about global Internet censorship, leading us to conclude that our method is effective.


international conference on computer communications | 2015

Original SYN: Finding machines hidden behind firewalls

Xu Zhang; Jeffrey Knockel; Jedidiah R. Crandall

We present an Internet measurement technique for finding machines that are hidden behind firewalls. That is, if a firewall prevents outside IP addresses from sending packets to an internal protected machine that is only accessible on the local network, our technique can still find the machine. We employ a novel TCP/IP side channel technique to achieve this. The technique uses side channels in “zombie” machines to learn information about the network from the perspective of a zombie. Unlike previous TCP/IP side channel techniques, our technique does not require a high packet rate and does not cause denial-of-service. We also make no assumptions about globally incrementing IPIDs, as do idle scans. This paper addresses two key questions about our technique: how many machines are there on the Internet that are hidden behind firewalls, and how common is ingress filtering that prevents our scan by not allowing spoofed IP packets into the network. We answer both of these questions, respectively, by finding 1,296 hidden machines and measuring that only 23.9% of our candidate zombie machines are on networks that perform ingress filtering.


global communications conference | 2016

High Fidelity Off-Path Round-Trip Time Measurement via TCP/IP Side Channels with Duplicate SYNs

Xu Zhang; Jeffrey Knockel; Jedidiah R. Crandall

Off-path round-trip time (RTT) measurement has many potential applications, including: improved geolocation capabilities, measuring the performance of parts of the Internet where there is not much measurement infrastructure (e.g., PlanetLab), and providing data plane measurements to better understand global Internet routing. Off-path means that the measurement machine is not on the path being measured. More specifically, we can measure the RTT between essentially any two machines (A and B) on the Internet without having special access to A or B or having any presence in the path between A and B. Alexander and Crandall proposed a new technique for off-path RTT measurements that made fewer assumptions than previous techniques, such as King (based on DNS). Alexander and Crandalls technique assumed only that one of A or B was a standard Linux machine with at least one open port and the other replied to unsolicited SYN-ACKs with RSTs. Thus, their technique is widely applicable across many parts of the Internet. However, their techniques accuracy was severely impacted by short RTTs or high packet loss rates. In this paper, we propose an improved technique that overcomes both of these limitations. Our new technique is shown to have 82.95% of the RTT measurement results within 10% of the actual RTT, and 91.18% of the results within 20% of the actual RTT; while the previous technique by Alexander and Crandall only had 60.7% of the results within 10% and 81.33% of the results within 20%.


foundations of computational intelligence | 2011

Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance.

Jeffrey Knockel; Jedidiah R. Crandall; Jared Saia


First Monday | 2013

Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC

Jedidiah R. Crandall; Masashi Crete-Nishihata; Jeffrey Knockel; Sarah McKune; Adam Senft; Diana Tseng; Greg Wiseman


Archive | 2016

Every step you fake: a comparative analysis of fitness tracker privacy and security

Andrew Hilts; Christopher A. Parsons; Jeffrey Knockel


foundations of computational intelligence | 2014

Counting Packets Sent Between Arbitrary Internet Hosts

Jeffrey Knockel; Jedidiah R. Crandall


arXiv: Networking and Internet Architecture | 2013

Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels: Extended Version.

Roya Ensafi; Jeffrey Knockel; Geoffrey Alexander; Jedidiah R. Crandall


international symposium on stabilization safety and security of distributed systems | 2013

Self-Healing of Byzantine Faults

Jeffrey Knockel; George Saad; Jared Saia

Collaboration


Dive into the Jeffrey Knockel's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jared Saia

University of New Mexico

View shared research outputs
Top Co-Authors

Avatar

Xu Zhang

University of New Mexico

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

George Saad

University of New Mexico

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge