Filter by type:

Sort by year:

SyNIG: Synthetic Network Traffic Generation through Time Series Imaging

Sivaroopan, Nirhoshan, Kattadige, Chamara, Muramudalige, Shashika, Jourjon, Guillaume, Jayasumana, Anura and Thilakarathna, Kanchana
48th IEEE Conference on Local Computer Networks (LCN), 2023
Publication year: 2023.10

Abstract: Immense growth of network usage and the associated proliferation of network, traffic, traffic classes, and diverse QoS requirements pose numerous challenges for network operators. Though data-driven approaches can provide better solutions for these challenges, limited data has been a barrier to developing those methods with high resiliency. In this work, we propose SyNIG (Synthetic Network Traffic Generation through Time Series Imaging) , which utilizes Generative Adversarial Networks (GANs) for network traffic synthesis by converting time series data to a specific image format called GASF (Gramian Angular Summation Field). With GASF images we encode correlation between samples in 1D signals on a single 2D pixel map. Taking three types of network traffic; video streaming, accessing websites
and IoT, we synthesize over 200,000 traces using over 40,000 original traces generalizing our method for different network traffic. We validate our method by demonstrating the fidelity of the synthetic data and applying them to several network related use cases showing improved performance.

Design of a Large-N Correlator for the SKA Low Telescope

D. Humphrey, G. Hampson, J. Bunton, G. Babich, Y. Chen, C. Phillips, X, Deng, B. Bacic, K. Bengston, G. Jourjon, and A. Bolin
URSI 2023
Publication year: 2023.08

Continuous Integration Testing of Real-time Signal Processing and Control for the SKA Low Correlator and Beamformer

A. Bolin, S. Chiang, G. Babich, G. Hampson, B. Bacic, K. Bengston, G. Jourjon, D. Humphrey, J. Bunton, and Y. Chen
Publication year: 2023.08

POSTER: Performance Characterization of Binarized Neural Networks in Traffic Fingerprinting

Yiyan Wang, Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne
Proceedings of ACM ASIA Conference on Com- puter and Communications Security (ACM AsiaCCS’23).
Publication year: 2023.07


Traffic fingerprinting allows making inferences about encrypted traffic flows through passive observation. They have been used for tasks such as network performance management and analytics and in attacker settings such as censorship and surveillance. A key challenge when implementing traffic fingerprinting in real- time settings is how the state-of-the-art traffic fingerprint models can be ported into programmable in-network computing devices with limited computing resources. Towards this, in this work, we characterize the performance of binarized traffic fingerprinting neural networks that are efficient and well-suited for in-network computing devices and propose a new data encoding method that is better suited for network traffic. Overall, we show that the proposed binary neural network with first-layer binarization and last-layer quantization reduces the performance requirement of hardware equipment while retaining the accuracies of those models of binary datasets over 70%. Furthermore, when combined with our proposed encoding algorithm, accuracies of binarized models of numeric datasets show further improvements to achieve over 65% accuracy.

Inline Traffic Analysis Attacks on DNS over HTTPS

T Dahanayaka, Z Wang, G Jourjon, S Seneviratne
2022 IEEE 47th Conference on Local Computer Networks (LCN), 132-139
Publication year: 2022.11


Even though end-to-end encryption was introduced to Domain Name System (DNS) communications to ensure user privacy and there is an increase in adoption of DNS over HTTPS (DoH), prior research has demonstrated that encrypted DNS traffic is vulnerable to traffic analysis attacks. However, these attacks were demonstrated under strong assumptions such as handling only closed-set classification or doing only post-event analysis. In this work we demonstrate traffic analysis attacks on DoH without such strong assumptions. We first show the feasibility of website fingerprinting over DoH traffic and present an inline traffic analysis attack that achieve over 90% accuracy using DoH traces of length as short as ten packets. Next, we propose a novel open-set classification method and achieve over 75% accuracy on both closed-set and open-set samples for the open-set scenario. Finally, we demonstrate that the same attack can be performed without any knowledge on the start of the activity.

Networked Answer to “Life, The Universe, and Everything”

Giles Babich, Keith Bengston, Andrew Bolin, John Bunton, Yuqing Chen, Grant Hampson, David Humphrey, and Guillaume Jourjon
Symposium on Architectures for Networking and Communications Systems (ANCS'21), December 13--16, 2021, Lafayette, IN, USA
Publication year: 2021.12


In the last few years, Input/Output (I/O) bandwidth limitation of legacy computer architectures forced us to reconsider where and how to store and compute data across a large range of applications. This shift has been made possible with the concurrent development of both smart NICs and programmable switches with a common programming language(P4), and the advent of attached High Bandwidth Memory within smartNICs/FPGAs. Recently, proposals to use this kind of technology have emerged to tackle computer science related issues such as fast consensus algorithm in the net-work, network accelerated key-value stores, machine learn-ing, or data-center data aggregation. In this paper, we intro-duce a novel architecture that leverages these advancements to potentially accelerate and improve the processing of radio-astronomy Digital Signal Processing (DSP), such as correlators or beamformers, at unprecedented continuous rates inwhat we have called the “Atomic COTS” design. We givean overview of this new type of architecture to accelerate digital signal processing, leveraging programmable switches and HBM capable FPGAs. We also discuss how to handle radio astronomy data streams to pre-process this stream ofdata for astronomy science products such as pulsar timingand search. Finally, we illustrate, using a proof of concept,how we can process emulated data from the Square Kilometer Array(SKA) project to time pulsars.

SMAUG: Streaming Media Augmentation Using CGANs as a Defence Against Video Fingerprinting

Aleksandr Vaskevich, Thilini Dahanayaka, Suranga Seneviratne and Guillaume Jourjon
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications (NCA 2021)
Publication year: 2021.11


Traffic fingerprinting and developing defenses against them has always been an arms race between the attackers and the defenders. The rapid evolution of deep learning methods makes developing stronger traffic fingerprinting models much easier, while overhead, latency, and deployment constraints restrict the abilities of the defenses. As such, there is always the need of coming up with novel defenses against traffic fingerprinting. In this paper, we propose SMAUG, a novel CGAN-based (Conditional Generative Adversarial Network) defense to protect video streaming traffic against fingerprinting. We first assess the performance of various GANs in video streaming traffic synthesis using multiple GAN quality metrics and show that CGAN outperforms other types of GANs such as basic GANs and WGANs (Wasserstein GAN). Our proposed defense, SMAUG, uses CGANs to synthesize video traffic flows and use those synthesized flows to camouflage the original traffic that needs protection. We compare SMAUG with other state-of-the-art defenses – FPA and d*-private methods, as well as a kernel density estimation-based baseline and show that SMAUG provides better privacy with lower overhead and delay.

VideoTrain: A Generative Adversarial Framework for Synthetic Video Traffic Generation

Chamara Kattadige, Shashika R Muramudalige, Kwon Nung Choi, Guillaume Jourjon, Haonan Wang, Anura Jayasumana, Kanchana Thilakarathna
2021 IEEE 22nd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
Publication year: 2021.06

Understanding Traffic Fingerprinting CNNs

Thilini Dahanayaka, Guillaume Jourjon, Suranga Seneviratne
2020 IEEE 45th Conference on Local Computer Networks (LCN)
Publication year: 2020.11

SETA: Scalable Encrypted Traffic Analytics in Multi-Gbps Networks

Kwon Nung Choi, Achintha Wijesinghe, Chamara Manoj Madarasingha Kattadige, Kanchana Thilakarathna, Suranga Seneviratne, Guillaume Jourjon
2020 IEEE 45th Conference on Local Computer Networks (LCN)
Publication year: 2020.11

The Attack of the Clones Against Proof-of-Authority

P. Ekparinya, V. Gramoli, G. Jourjon
NDSS 202
Publication year: 2020.02

A Linked Data Quality Assessment Framework for Network Data

A. To, R. Meymandpour, J. Davis, G. Jourjon, and J. Chan
GRADES-NDA workshop at SIGMOD 2019
Publication year: 2019.06

A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps

J. Rajasegaran, N. Karunanayake, A. Gunathillake, S. Seneviratne, and G. Jourjon
2019 World Wide Web Conference (WWW 19), May
Publication year: 2019.05

Impact of network delays on Hyperledger Fabric

T. S. L. Nguyen, G. Jourjon, M. Potop-Butucaru, and K. Loan Thai
CryBlock 2019, 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems, co-located with INFOCOM 2019
Publication year: 2019.04

Deep Content: Unveiling Video Streaming Content From Encrypted WiFi Traffic

Y. Li, Y. Huang, A. Cheng, G. Jourjon, S. Seneviratne, K. Thilakarathna, D. Webb, and R. Xu
IEEE International Symposium on Network Computing and Applications (NCA 2018)
Publication year: 2018.10

Impact of Man-In-The-Middle Attacks on Ethereum

P. Ekparinya, V. Gramoli, and G. Jourjon
IEEE International Symposium on Reliable Distributed Systems 2018 (SRDS
Publication year: 2018.06

A delay-tolerant payment scheme on the ethereum blockchain

Ahsan Manzoor, Yining Hu, Madhusanka Liyanage, Parinya Ekparinya, Kanchana Thilakarathna, Guillaume Jourjon, Aruna Seneviratne, Salil Kanhere, Mika E Ylianttila
2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM)
Publication year: 2018.06

DLibOS: Performance and Protection with a Network-on-Chip

S. Mallon, V. Gramoli, G. Jourjon
ACM ASPLOS 2018, 23rd ACM International Conference on Architectural Support for Programming Languages and Operating Systems, March 2018, Williamsburg, VA, USA
Publication year: 2018.03

MPTCP Energy Enhancement Paradox: A Q-Learning Approach

M. J. Shamani, S. Rezaeiy, G. Jourjon, and A. Seneviratne
International Telecommunication Networks and Applications Conference (ITNAC 2017)
Publication year: 2017.12

Stratosphere: Dynamic IP overlay above the clouds

P. Ekparinya, V. Gramoli, G. Jourjon, and L. Zhu
IEEE Local Computer Networks 2017 (LCN)
Publication year: 2017.11

e-DASH: Modelling An Energy-Aware DASH Player

B. Varghese, G. Jourjon, K. Thilakarathne, and A. Seneviratne
IEEE WoWMoM 2017, Jun. 2017
Publication year: 2017.06

Characterizing Key Stakeholders in an Online Black-Hat Marketplace

S. Farooqi, M. Ikram, E. De Cristofaro, A. Friedman, G. Jourjon, M. A. Kaafar, Z. Shafiq, F. Zaffar
IEEE Symposium on Electronic Crime Research (eCrime 2017
Publication year: 2017.03

Endpoint-transparent Multipath Transport with Software-defined Networks

D. Banfi, O. Mehani, G. Jourjon, L. Schwaighofer, and R. Holz
IEEE Local Computer Networks (LCN), Dubai, November 201
Publication year: 2016.11

Are Today’s SDN Controller Ready for Primetime

S. Mallon, V. Gramoli, and G. Jourjon
IEEE Local Computer Networks (LCN), Dubai, November 2016
Publication year: 2016.11

FORGE Enabling FIRE Facilities for the e-Learning Community

O. Fourmaux, M. Y. Rahman, C. Tranoris, D. Pareit, J. Vanhie-Van Gerwen, G. Jourjon, D. Collins, J. Marquez Barja
19th International Conference on Interactive Collabortive Learning, 201
Publication year: 2016.09

Applying a methodology for the design, delivery and evaluation of learning resources for remote experimentation

A. Mikroyannidis, J. Domingue, D. Pareit, J. Vanhie-Van Gerwen, C. Tranoris, G. Jourjon, J. M. Marquez-Barja
IEEE Global Engineering Education Conference (EDUCON), 201
Publication year: 2016.03

Revisiting the controller placement problem

MTI ul Huque, G. Jourjon, V. Gramoli
2015 IEEE 40th Conference on Local Computer Networks (LCN), pp. 450-45
Publication year: 2015.11

Disaster-Tolerant Storage with SDN

V. Gramoli, G. Jourjon, O. Mehani
nternational Conference on NETworked sYStem, NETYS 2015, Agadir, Morocco, May 13-15
Publication year: 2015.05

Paying for Likes? Understanding Facebook Like Fraud Using Honeypots

E. De Cristofaro, A. Friedman, G. Jourjon, D. Kaafar, Z. Shafiq
ACM SIGCOMM Internet Measurement (IMC) 2014 conference
Publication year: 2014.11

Greening Web Servers: A Case for Ultra Low-power Web Servers

B. Varghese, N. Carlsson, G. Jourjon, A. Mahanti, P. Shenoy
International Green Computing Conference, IGCC 2014, Nov. 2014, USA
Publication year: 2014.11

FORGE: Enhancing elearning and research in ICT through remote experimentation

J. M. Marquez-Barja, G. Jourjon, A. Mikroyannidis, C. Tranoris, J. Domingue, L. DaSilva
EDUCON 2014, IEEE Global Engineering Education Conference, Istanbul, Apr. 2014.
Publication year: 2014.04

HPC Applications Deployment on Distributed Heterogeneous Computing Platforms via OMF, OML and P2PDC

D. El Baz, T. T. Nguyen, G. Jourjon, T. Rakotoarivelo
PDP 2014, the 22nd Euromicro International Conference on Parallel, distributed and network-based Computing., Turin, Feb. 201
Publication year: 2014.02

Insights of File-Sharing System Forums

G. Jourjon, O. Mehani, T. Rakotoarivelo
WNM 2013, 7th IEEE Workshop on Network Measurements (co-located with LCN 2013), Sydney, Australia, pp. 948–955, October, 201
Publication year: 2013.10

Into the Moana – Hypergraph-based Network Layer Indirection

Y. Shvartzshnaider, M. Ott, O. Mehani, G. Jourjon, T. Rakotoarivelo and D. Levy
Proceedings of IEEE INFOCOM 2013, April 2013, Turin, Ital
Publication year: 2013.04

Impact of an e-learning platform on CSE Lectures

G. Jourjon, S. Kanhere and J. Yao
ACM ITiCSE 2011, the 16th Annual Conference on Innovation and Technology in Computer Science Education, June 2011, Darmstadt, Germany
Publication year: 2011.6

Why Simulate When You Can Experience?

G. Jourjon, T. Rakotoarivelo and M. Ott
ACM SIGCOMM Education Workshop 2011, Toronto, Aug. 2011
Publication year: 2011.08

LabWiki: An Executable Paper Platform for Experiment-based Research,

G. Jourjon, T. Rakotoarivelo, C. Dwertmann and M. Ott
The International Conference on Computational Science 2011, June 2011, Tsukuba, Japan
Publication year: 2011.02

Mobile Multimedia Streaming Improvements with Freeze-DCCP

O. Mehani, R. Boreli, G. Jourjon and T. Ernst
Mobicom & Wintech 2010 - Demo Session, September 2010, Chicago
Publication year: 2010.09

Measurement Architectures for Network Experiments with Disconnected Mobile Nodes

J. White, G. Jourjon, T. Rakatoarivelo and M. Ott
n Proc. of TridentCom 2010, ser. LNICST, Vol. 46, pp 315-330, Springer-Verlag, May 2010
Publication year: 2010.05

From Learning to Researching, Ease the Shift through Testbeds

G. Jourjon, T. Rakatoarivelo and M. Ott
In Proc. of TridentCom 2010, ser. LNICST, Vol. 46, pp 496-505, Springer-Verlag, May 2010
Publication year: 2010.05

A Portal to Support Rigorous Experimental Methodology in Networking Research

G. Jourjon, T. Rakotoarivelo and M. Ott
TridentCom 2011, May 2011, Shangha
Publication year: 2010.05

Models for an Energy-Efficient P2P Delivery Service

G. Jourjon, T. Rakotoarivelo and M. Ott
PDP 2010 - The 18th Euromicro International Conference on Parallel, Distributed and Network-Based Computin
Publication year: 2010.02

High Performance Peer-to-Peer Distributed Computing with Application to Obstacle Problem

T. T. Nguyen, D. Elbaz, P. Spiteri, G. Jourjon and M. Chau
HotP2P 2010 in conjunction with IPDPS 2010
Publication year: 2010.01

Mobile Experiments Made Easy with OMF/Orbit

C. Dwertmann, I. Ergin, G. Jourjon, M. Ott, T. Rakotoarivelo and I. Seskar
SIGCOMM 2009, demo session
Publication year: 2009.08

Design and Validation of a Reliable Rate Based Transport Protocol: The Chameleon Protocol

E. Lochin, G. Jourjon and S. Ardon
Global Information Infrastructure Symposium, IEEE GIIS 2009
Publication year: 2009.06

Improvements in DCCP congestion control for satellite links,

G. Sarwar, R. Boreli, E. Lochin and G. Jourjon,
2008 International Workshop on Satellite and Space Communications, IWSSC 200
Publication year: 2008.06

Towards sender-based TFRC

G. Jourjon, E. Lochin and P. Senac
IEEE International Conference on Communications 2007 (ICC 2007), June 200
Publication year: 2007.06

Study and enhancement of DCCP over DiffServ Assured Forwarding class

E. Lochin, G. Jourjon and L. Dairaine
Fourth European Conference on Universal Multiservice Networks, IEEE ECUMN’0
Publication year: 2007.03

Towards a Versatile Transport Protocol

G. Jourjon, E. Lochin and P. Senac
Student workshop of CONext 2006 in cooperation with ACM SIGCOMM
Publication year: 2006.12

Implementation and performance analysis of a QoS-aware TFRC mechanism

G. Jourjon, E. Lochin, L. Dairaine, P. Senac, T. Moors and A. Seneviratne
14th IEEE ICON 2006, International Conference on Networkin
Publication year: 2006.11

gTFRC: a QoS-aware congestion control algorithm

E. Lochin, L. Dairaine and G. Jourjon
5th International Conference of Networking, ICN 200
Publication year: 2006.10

REEL: Remote Experimentation with Real Protocols and Applications over Emulated Network

L. Dairaine, G. Jourjon and E. Exposito
Publication year: 2006.06

Modeling, Simulation, and Emulation of QoS Oriented Transport Mechanisms

G. Jourjon, E. Exposito and L. Dairaine
CONext 2005 in cooperation with ACM Sigcomm
Publication year: 2005.12