Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ken Keys is active.

Publication


Featured researches published by Ken Keys.


acm special interest group on data communication | 2004

Building a better NetFlow

Cristian Estan; Ken Keys; David Moore; George Varghese

Network operators need to determine the composition of the traffic mix on links when looking for dominant applications, users, or estimating traffic matrices. Ciscos NetFlow has evolved into a solution that satisfies this need by reporting flow records that summarize a sample of the traffic traversing the link. But sampled NetFlow has shortcomings that hinder the collection and analysis of traffic data. First, during flooding attacks router memory and network bandwidth consumed by flow records can increase beyond what is available; second, selecting the right static sampling rate is difficult because no single rate gives the right tradeoff of memory use versus accuracy for all traffic mixes; third, the heuristics routers use to decide when a flow is reported are a poor match to most applications that work with time bins; finally, it is impossible to estimate without bias the number of active flows for aggregates with non-TCP traffic.In this paper we propose Adaptive NetFlow, deployable through an update to router software, which addresses many shortcomings of NetFlow by dynamically adapting the sampling rate to achieve robustness without sacrificing accuracy. To enable counting of non-TCP flows, we propose an optional Flow Counting Extension that requires augmenting existing hardware at routers. Both our proposed solutions readily provide descriptions of the traffic of progressively smaller sizes. Transmitting these at progressively higher levels of reliability allows graceful degradation of the accuracy of traffic reports in response to network congestion on the reporting path.


2009 Cybersecurity Applications & Technology Conference for Homeland Security | 2009

Internet Mapping: From Art to Science

Kimberly C. Claffy; Young Hyun; Ken Keys; Marina Fomenkov; Dmitri V. Krioukov

We are designing, implementing, deploying, and operating a secure measurement platform capable of performing various types of Internet infrastructure measurements and assessments. We integrate state-of-the-art measurement and analysis capabilities to try to build a coherent view of Internet topology. In September 2007 we began to use this novel architecture to support ongoing global Internet topology measurement and mapping, and are now gathering the largest set of IP topology data for use by academic researchers. We are using the best available techniques for IP topology mapping, and are developing some new techniques, as well as supporting software for data analysis, topology generation, and interactive visualization of resulting large annotated graphs. This paper presents our current results, next steps, and future goals.


acm special interest group on data communication | 2010

Internet-scale IP alias resolution techniques

Ken Keys

The well-known traceroute probing method discovers links between interfaces on Internet routers. IP alias resolution, the process of identifying IP addresses belonging to the same router, is a critical step in producing Internet topology maps. We compare the performance and accuracy of known alias resolution techniques, propose some enhancements, and suggest a practical combination of techniques that can produce the most accurate and complete IP-to-router mapping at macroscopic scale.


acm special interest group on data communication | 2005

The internet measurement data catalog

Colleen Shannon; David Moore; Ken Keys; Marina Fomenkov; Bradley Huffaker; Kimberly C. Claffy

Internet data remains one of the basic components of computer science network research. Despite its necessity, available data is limited by legal, social, and technical constraints on its collection and distribution. Thus, optimal distribution of knowledge about available data is a valuable service to the research community. To this end, CAIDA has developed the Internet Measurement Data Catalog to:provide a searchable index of available dataenhance documentation of datasets via a public annotation systemadvance network science by promoting reproducible researchThis paper describes the impetus, design, and planned deployment of the Internet Measurement Data Catalog.


IEEE ACM Transactions on Networking | 2013

Internet-scale IPv4 alias resolution with MIDAR

Ken Keys; Young Hyun; Matthew J. Luckie; Kimberly C. Claffy

A critical step in creating accurate Internet topology maps from traceroute data is mapping IP addresses to routers, a process known as alias resolution. Recent work in alias resolution inferred aliases based on similarities in IP ID time series produced by different IP addresses. We design, implement, and experiment with a new tool that builds on these insights to scale to Internet-scale topologies, i.e., millions of addresses, with greater precision and sensitivity. MIDAR, our Monotonic ID-Based Alias Resolution tool, provides an extremely precise ID comparison test based on monotonicity rather than proximity. MIDAR integrates multiple probing methods, multiple vantage points, and a novel sliding-window probe scheduling algorithm to increase scalability to millions of IP addresses. Experiments show that MIDARs approach is effective at minimizing the false positive rate sufficiently to achieve a high positive predictive value at Internet scale. We provide sample statistics from running MIDAR on over 2 million addresses. We also validate MIDAR and RadarGun against available ground truth and show that MIDARs results are significantly better than RadarGuns. Tools such as MIDAR can enable longitudinal study of the Internets topological evolution.


WISICT '04 Proceedings of the winter international synposium on Information and communication technologies | 2004

Longitudinal study of Internet traffic in 1998-2003

Marina Fomenkov; Ken Keys; David Moore; kc claffy


usenix large installation systems administration conference | 2001

The CoralReef Software Suite as a Tool for System and Network Administrators

David Moore; Ken Keys; Ryan Koga; Edouard Lagache; Kimberly C. Claffy


passive and active network measurement | 2001

The architecture of CoralReef: an Internet traffic monitoring software suite

Ken Keys; David Moore; Ryan Koga; Edouard Lagache; Michael Tesch; kc claffy


measurement and modeling of computer systems | 2005

A robust system for accurate real-time summaries of internet traffic

Ken Keys; David Moore; Cristian Estan


Winter International Symposium on Information and Communication Technologies (WISICT) | 2003

Longitudinal study of Internet traffic from 1998-2003

Marina Fomenkov; Ken Keys; David Moore; kc claffy

Collaboration


Dive into the Ken Keys's collaboration.

Top Co-Authors

Avatar

David Moore

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

kc claffy

University of California

View shared research outputs
Top Co-Authors

Avatar

Cristian Estan

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar

Young Hyun

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge