Detecting ICMP Rate Limiting in the Internet. Guo, H. & Heidemann, J. In Proceedings of the Passive and Active Measurement Workshop, pages to appear, Berlin, Germany, March, 2018. Springer.
Detecting ICMP Rate Limiting in the Internet [link]Paper  abstract   bibtex   
ICMP active probing is the center of many network measurements. Rate limiting to ICMP traffic, if undetected, could distort measurements and create false conclusions. To settle this concern, we look systematically for ICMP rate limiting in the Internet. We create \emphFADER, a new algorithm that can identify rate limiting from user-side traces with minimal new measurement traffic. We validate the accuracy of FADER with many different network configurations in testbed experiments and show that it almost always detects rate limiting. With this confidence, we apply our algorithm to a random sample of the whole Internet, showing that \emphrate limiting exists but that \emphfor slow probing rates, rate-limiting is very rare. For our random sample of 40,493 /24 blocks (about 2% of the responsive space), we confirm 6 blocks (0.02%!) see rate limiting at 0.39 packets/s per block. We look at higher rates in public datasets and suggest that fall-off in responses as rates approach 1 packet/s per /24 block is consistent with rate limiting. We also show that even very slow probing (0.0001 packet/s) can encounter rate limiting of NACKs that are concentrated at a single router near the prober.
@InProceedings{Guo18a,
	author = 	"Hang Guo and John Heidemann",
	title = 	"Detecting {ICMP} Rate Limiting in the {Internet}",
        booktitle =     "Proceedings of the " # " Passive and Active Measurement Workshop",
        year =          2018,
	sortdate = 		"2018-03-26", 
	project = "ant, retrofuturebridge, lacrend",
	jsubject = "topology_modeling",
        pages =      "to appear",
        month =      mar,
        address =    "Berlin, Germany",
        publisher =  "Springer",
        jlocation =   "johnh: pafile",
	keywords = 	"icmp, rate limiting",
	url =		"https://ant.isi.edu/%7ejohnh/PAPERS/Guo18a.html",
	pdfurl =	"https://ant.isi.edu/%7ejohnh/PAPERS/Guo18a.pdf",
	blogurl = "https://ant.isi.edu/blog/?p=1176",
	abstract = "ICMP active probing is the center of many network measurements.  Rate
limiting to ICMP traffic, if undetected, could distort measurements
and create false conclusions.  To settle this concern, we look
systematically for ICMP rate limiting in the Internet.  We 
create \emph{FADER}, a new algorithm that can identify rate limiting from
user-side traces with minimal new measurement traffic.  We validate
the accuracy of FADER with many different network configurations in
testbed experiments and show that it almost always detects rate
limiting.  With this confidence, we apply our algorithm to a random
sample of the whole Internet, showing that \emph{rate limiting exists}
but that \emph{for slow probing rates, rate-limiting is very rare}.
For our random sample of 40,493 /24 blocks (about 2\% of the
responsive space), we confirm 6 blocks (0.02\%!) see rate limiting at
0.39 packets/s per block.  We look at higher rates in public datasets
and suggest that fall-off in responses as rates approach 1 packet/s
per /24 block is consistent with rate limiting.  We also show that
even very slow probing (0.0001 packet/s) can encounter rate limiting
of NACKs that are concentrated at a single router near the prober.",
}

Downloads: 0