{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:40:08Z","timestamp":1755870008429,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1145\/3618257.3624809","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:19:52Z","timestamp":1698020392000},"page":"591-605","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Localizing Traffic Differentiation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-7310","authenticated-orcid":false,"given":"Zeinab","family":"Shmeis","sequence":"first","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6867-6488","authenticated-orcid":false,"given":"Muhammad","family":"Abdullah","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1344-188X","authenticated-orcid":false,"given":"Pavlos","family":"Nikolopoulos","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9470-2819","authenticated-orcid":false,"given":"Katerina","family":"Argyraki","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7825-7226","authenticated-orcid":false,"given":"David","family":"Choffnes","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4286-3018","authenticated-orcid":false,"given":"Phillipa","family":"Gill","sequence":"additional","affiliation":[{"name":"Google, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Arzani Behnaz","year":"2018","unstructured":"Behnaz Arzani, Selim Ciraci, Luiz Chamon, Yibo Zhu, Hongqiang Harry Liu, Jitu Padhye, Boon Thau Loo, and Geoff Outhred. 2018. 007: Democratically finding the cause of packet drops. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 419--435."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159940"},{"key":"e_1_3_2_1_3_1","volume-title":"Scapy API reference. https:\/\/scapy.readthedocs.io\/en\/latest\/api\/scapy.html. Accessed","author":"Biondi Philippe","year":"2023","unstructured":"Philippe Biondi and the Scapy community. 2023. Scapy API reference. https:\/\/scapy.readthedocs.io\/en\/latest\/api\/scapy.html. Accessed August 2023."},{"key":"e_1_3_2_1_4_1","volume-title":"The CAIDA Anonymized Internet Traces Dataset (April 2008 -","author":"CAIDA.","year":"2019","unstructured":"CAIDA. 2023. The CAIDA Anonymized Internet Traces Dataset (April 2008 - January 2019). https:\/\/www.caida.org\/catalog\/datasets\/passive_dataset\/. Accessed August 2023."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1214\/088342304000000422"},{"key":"e_1_3_2_1_6_1","volume-title":"Robert Nowak, and Bin Yu. 2002 a. Internet tomography","author":"Coates III","year":"2002","unstructured":"AHeroIII Coates, Alfred O Hero III, Robert Nowak, and Bin Yu. 2002 a. Internet tomography. IEEE Signal processing magazine, Vol. 19, 3 (2002), 47--65."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/79.998081"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504757"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364677"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Dischinger Marcel","year":"2010","unstructured":"Marcel Dischinger, Massimiliano Marcon, Saikat Guha, Krishna P Gummadi, Ratul Mahajan, and Stefan Saroiu. 2010. Glasnost: Enabling End Users to Detect Traffic Differentiation. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452523"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.885460"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934873"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079320"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452343"},{"key":"e_1_3_2_1_16_1","volume-title":"Data Maximizer for Prepaid Plans. https:\/\/www.t-mobile.com\/support\/plans-features\/data-maximizer-for-prepaid-plans. Accessed","author":"T-Mobile USA Inc. 2023.","year":"2023","unstructured":"T-Mobile USA Inc. 2023. Data Maximizer for Prepaid Plans. https:\/\/www.t-mobile.com\/support\/plans-features\/data-maximizer-for-prepaid-plans. Accessed August 2023."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461983"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068860"},{"key":"e_1_3_2_1_19_1","unstructured":"Ken Keys Young Hyun Matthew Luckie and K Claffy. 2011. Internet-scale ipv4 alias resolution with midar: System architecture. Cooperative Association for Internet Data Analysis (CAIDA) Tech. Rep (2011)."},{"key":"e_1_3_2_1_20_1","volume-title":"2023 a. Measure the Internet, save the data, and make it universally accessible and useful. https:\/\/www.measurementlab.net\/. Accessed","author":"Lab Measurement","year":"2023","unstructured":"Measurement Lab. 2023 a. Measure the Internet, save the data, and make it universally accessible and useful. https:\/\/www.measurementlab.net\/. Accessed August 2023."},{"key":"e_1_3_2_1_21_1","volume-title":"2023 b. Wehe. https:\/\/measurementlab.net\/tests\/wehe. Accessed","author":"Lab Measurement","year":"2023","unstructured":"Measurement Lab. 2023 b. Wehe. https:\/\/measurementlab.net\/tests\/wehe. Accessed August 2023."},{"volume-title":"Performance evaluation of computer and communication systems","author":"Le Boudec Jean-Yves","key":"e_1_3_2_1_22_1","unstructured":"Jean-Yves Le Boudec. 2010. Performance evaluation of computer and communication systems. Epfl Press."},{"key":"e_1_3_2_1_23_1","volume-title":"David Choffnes, Phillipa Gill, and Alan Mislove.","author":"Li Fangfan","year":"2019","unstructured":"Fangfan Li, Arian Akhavan Niaki, David Choffnes, Phillipa Gill, and Alan Mislove. 2019. A large-scale analysis of deployed traffic differentiation practices. In Proceedings of the ACM Special Interest Group on Data Communication."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879171"},{"key":"e_1_3_2_1_25_1","unstructured":"Linux manual page. 2023 a. tc-mirred(8). https:\/\/man7.org\/linux\/man-pages\/man8\/tc-mirred.8.html."},{"key":"e_1_3_2_1_26_1","unstructured":"Linux manual page. 2023 b. tc-tbf(8). https:\/\/man7.org\/linux\/man-pages\/man8\/tc-tbf.8.html."},{"key":"e_1_3_2_1_27_1","unstructured":"Linux manual page. 2023 c. tc(8). https:\/\/man7.org\/linux\/man-pages\/man8\/tc.8.html."},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/measurementlab.net\/tests\/traceroute. Accessed","author":"Lab Measurement","year":"2023","unstructured":"Measurement Lab. 2023. Traceroute. https:\/\/measurementlab.net\/tests\/traceroute. Accessed August 2023."},{"key":"e_1_3_2_1_29_1","volume-title":"burst-size. https:\/\/www.juniper.net\/documentation\/us\/en\/software\/junos\/security-services\/topics\/ref\/statement\/burst-size-rate-limiting.html. Accessed","author":"Networks Juniper","year":"2023","unstructured":"Juniper Networks. 2023. burst-size. https:\/\/www.juniper.net\/documentation\/us\/en\/software\/junos\/security-services\/topics\/ref\/statement\/burst-size-rate-limiting.html. Accessed August 2023."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.245"},{"volume-title":"Proceedings of the IEEE Internet Measurement Conference (IMC).","author":"Hung","key":"e_1_3_2_1_31_1","unstructured":"Hung X. Nguyen and Patrick Thiran. 2007 b. Network Loss Inference with Second Order Statistics of End-to-End Flows. In Proceedings of the IEEE Internet Measurement Conference (IMC)."},{"volume-title":"ns-3 Network Simulator. https:\/\/www.nsnam.org\/. Accessed","year":"2023","key":"e_1_3_2_1_32_1","unstructured":"nsnam. 2023. ns-3 Network Simulator. https:\/\/www.nsnam.org\/. Accessed August 2023."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the IEEE INFOCOM Conference.","author":"Padmanabhan V N","year":"2003","unstructured":"V N Padmanabhan, L Qiu, and H J Wang. 2003. Server-based Inference of Internet Performance. In Proceedings of the IEEE INFOCOM Conference."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249172"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163706"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.1012369"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140293"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107763"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the ACM CoNEXT Conference.","author":"Tariq Mukarram Bin","year":"2008","unstructured":"Mukarram Bin Tariq, Murtaza Motiwala, Nick Feamster, and Mostafa Ammar. 2008. Detecting Network Neutrality Violations with Causal Inference. In Proceedings of the ACM CoNEXT Conference."},{"key":"e_1_3_2_1_40_1","volume-title":"Trump's FCC has revealed plans to wipe out net neutrality. https:\/\/www.vox.com\/2017\/11\/21\/16679114\/fcc-ajit-pai-net-neutrality-rules-donald-trump. Accessed","author":"VOXMEDIA.","year":"2023","unstructured":"VOXMEDIA. 2023. Trump's FCC has revealed plans to wipe out net neutrality. https:\/\/www.vox.com\/2017\/11\/21\/16679114\/fcc-ajit-pai-net-neutrality-rules-donald-trump. Accessed August 2023."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934941"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.30.2.223"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the ACM Internet Measurement Conference (IMC).","author":"Zhang Ying","year":"2007","unstructured":"Ying Zhang, Zhuoqing Morley Mao, and Ming Zhang. 2007. Detecting Traffic Differentiation in Backbone ISPs with NetPolice. In Proceedings of the ACM Internet Measurement Conference (IMC)."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the ACM Hot Topic in Networks (HotNets).","author":"Zhang Ying","year":"2008","unstructured":"Ying Zhang, Z. Morley Mao, and Ming Zhang. 2008. Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs. In Proceedings of the ACM Hot Topic in Networks (HotNets)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626308"}],"event":{"name":"IMC '23: ACM Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Montreal QC Canada","acronym":"IMC '23"},"container-title":["Proceedings of the 2023 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624809","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3618257.3624809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T13:15:20Z","timestamp":1755868520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3618257.3624809"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":45,"alternative-id":["10.1145\/3618257.3624809","10.1145\/3618257"],"URL":"https:\/\/doi.org\/10.1145\/3618257.3624809","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"2023-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}