Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Young Hyun is active.

Publication


Featured researches published by Young Hyun.


passive and active network measurement | 2005

Comparison of public end-to-end bandwidth estimation tools on high-speed links

Alok Shriram; Margaret Murray; Young Hyun; Nevil Brownlee; Andre Broido; Marina Fomenkov; Kimberly C. Claffy

In this paper we present results of a series of bandwidth estimation experiments conducted on a high-speed testbed at the San Diego Supercomputer Center and on OC-48 and GigE paths in real world networks. We test and compare publicly available bandwidth estimation tools: abing, pathchirp, pathload, and Spruce. We also tested Iperf which measures achievable TCP throughput. In the lab we used two different sources of known and reproducible cross-traffic in a fully controlled environment. In real world networks we had a complete knowledge of link capacities and had access to SNMP counters for independent cross-traffic verification. We compare the accuracy and other operational characteristics of the tools and analyze factors impacting their performance.


2009 Cybersecurity Applications & Technology Conference for Homeland Security | 2009

Internet Mapping: From Art to Science

Kimberly C. Claffy; Young Hyun; Ken Keys; Marina Fomenkov; Dmitri V. Krioukov

We are designing, implementing, deploying, and operating a secure measurement platform capable of performing various types of Internet infrastructure measurements and assessments. We integrate state-of-the-art measurement and analysis capabilities to try to build a coherent view of Internet topology. In September 2007 we began to use this novel architecture to support ongoing global Internet topology measurement and mapping, and are now gathering the largest set of IP topology data for use by academic researchers. We are using the best available techniques for IP topology mapping, and are developing some new techniques, as well as supporting software for data analysis, topology generation, and interactive visualization of resulting large annotated graphs. This paper presents our current results, next steps, and future goals.


internet measurement conference | 2008

Traceroute probe method and forward IP path inference

Matthew J. Luckie; Young Hyun; Bradley Huffaker

Several traceroute probe methods exist, each designed to perform better in a scenario where another fails. This paper examines the effects that the choice of probe method has on the inferred forward IP path by comparing the paths inferred with UDP, ICMP, and TCP-based traceroute methods to (1) a list of routable IP addresses, (2) a list of known routers, and (3) a list of well-known websites. We further compare methods by examining seven months of macroscopic Internet topology data collected by CAIDAs Archipelago infrastructure. We found significant differences in the topology observed using different probe methods. In particular, we found that ICMP-based traceroute methods tend to successfully reach more destinations, as well as collect evidence of a greater number of AS links. UDP-based methods infer the greatest number of IP links, despite reaching the fewest destinations. We hypothesise that some per-flow load balancers implement different forwarding policies for TCP and UDP, and run a specific experiment to confirm this hypothesis.


IEEE ACM Transactions on Networking | 2013

Internet-scale IPv4 alias resolution with MIDAR

Ken Keys; Young Hyun; Matthew J. Luckie; Kimberly C. Claffy

A critical step in creating accurate Internet topology maps from traceroute data is mapping IP addresses to routers, a process known as alias resolution. Recent work in alias resolution inferred aliases based on similarities in IP ID time series produced by different IP addresses. We design, implement, and experiment with a new tool that builds on these insights to scale to Internet-scale topologies, i.e., millions of addresses, with greater precision and sensitivity. MIDAR, our Monotonic ID-Based Alias Resolution tool, provides an extremely precise ID comparison test based on monotonicity rather than proximity. MIDAR integrates multiple probing methods, multiple vantage points, and a novel sliding-window probe scheduling algorithm to increase scalability to millions of IP addresses. Experiments show that MIDARs approach is effective at minimizing the false positive rate sufficiently to achieve a high positive predictive value at Internet scale. We provide sample statistics from running MIDAR on over 2 million addresses. We also validate MIDAR and RadarGun against available ground truth and show that MIDARs results are significantly better than RadarGuns. Tools such as MIDAR can enable longitudinal study of the Internets topological evolution.


passive and active network measurement | 2004

Their Share: Diversity and Disparity in IP Traffic

Andre Broido; Young Hyun; Ruomei Gao; Kimberly C. Claffy

The need to service populations of high diversity in the face of high disparity affects all aspects of network operation: planning, routing, engineering, security, and accounting. We analyze diversity/disparity from the perspective of selecting a boundary between mice and elephants in IP traffic aggregated by route, e.g., destination AS. Our goal is to find a concise quantifier of size disparity for IP addresses, prefixes, policy atoms and ASes, similar to the oft-quoted 80/20 split (e.g., 80% of volume in 20% of sources). We define crossover as the fraction c of total volume contributed by a complementary fraction 1-c of large objects. Studying sources and sinks at two Tier 1 backbones and one university, we find that splits of 90/10 and 95/5 are common for IP traffic. We compare the crossover diversity to common analytic models for size distributions such as Pareto/Zipf. We find that AS traffic volumes (by byte) are top-heavy and can only be approximated by Pareto with α=0.5, and that empirical distributions are often close to Weibull with shape parameter 0.2–0.3. We also find that less than 20 ASes send or receive 50% of all traffic in both backbones’ samples, a disparity that can simplify traffic engineering. Our results are useful for developers of traffic models, generators and simulators, for router testers and operators of high-speed networks.


next generation internet | 2011

MERLIN: MEasure the router level of the INternet

Pascal Mérindol; Benoit Donnet; Jean-Jacques Pansiot; Matthew J. Luckie; Young Hyun

In this paper, we present a new router-level Internet mapping tool called MERLIN. MERLIN takes advantage of mrinfo, a multicast management tool that collects all IPv4 multicast enabled interfaces of a router and all its multicast links towards its neighbors. Our new probing tool fixes mrinfo technical limitations and eases the deployment of multicast probing campaign. We deploy and evaluate the performance of MERLIN at large scale. We investigate the completeness of MERLIN by providing a lower bound on the proportion of information that it may miss. We also demonstrate that the use of several vantage points is crucial to circumvent IGMP filtering in order to increase the amount of collected routers. MERLIN is a valuable tool for collecting the router-level Internet topology.


passive and active network measurement | 2005

Spectroscopy of traceroute delays

Andre Broido; Young Hyun; Kimberly C. Claffy

We analyze delays of traceroute probes, i.e. packets that elicit ICMP TimeExceeded messages, for a full range of probe sizes up to 9000 bytes as observed on unloaded high-end routers. Our ultimate motivation is to use traceroute RTTs for Internet mapping of router and PoP (ISP point-of-presence) level nodes, including potentially gleaning information on equipment models, link technologies, capacities, latencies, and spatial positions. To our knowledge it is the first study to examine in a reliable testbed setting the detailed statistics of ICMP response generation. We find that two fundamental assumptions about ICMP often do not hold in modern routers, namely that ICMP delays are a linear function of packet size and that ICMP generation rate is equal to the capacity of the inteface on which probes are received. The primary causes of these violations appear to be optimizations that suppress size dependence, e.g. buffer carving, and rate-limiting of internal ICMP packet and bit rates. Our results suggest that the linear model of packet delay as a function of packet size merits revisiting for many situations, especially for packets over 1500 bytes. Our findings also suggest possibilities of developing new techniques for bandwidth estimation and router fingerprinting.


acm special interest group on data communication | 2007

AS relationships: inference and validation

Xenofontas A. Dimitropoulos; Dmitri V. Krioukov; Marina Fomenkov; Bradley Huffaker; Young Hyun; Kimberly C. Claffy; George F. Riley


internet measurement conference | 2009

Understanding the efficacy of deployed internet source address validation filtering

Robert Beverly; Arthur W. Berger; Young Hyun; kc claffy


passive and active network measurement | 2003

On Third-party Addresses in Traceroute Paths

Young Hyun; Andre Broido; kc claffy

Collaboration


Dive into the Young Hyun's collaboration.

Top Co-Authors

Avatar

Andre Broido

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

kc claffy

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ken Keys

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ruomei Gao

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alok Shriram

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge