A Reactive Measurement Framework

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4979)


Often when assessing complex network behavior a single measurement is not enough to gain a solid understanding of the root causes of the behavior. In this initial paper we argue for thinking about “measurement” as a process rather than an event. We introduce reactive measurement (REM), which is a technique in which one measurement’s results are used to automatically decide what (if any) additional measurements are required to further understand some observed phenomenon. While reactive measurement has been used on occasion in measurement studies, what has been lacking is (i) an examination of its general power, and (ii) a generic framework for facilitating fluid use of this approach. We discuss REM’s power and sketch an architecture for a system that provides general REM functionality to network researchers. We argue that by enabling the coupling of disparate measurement tools, REM holds great promise for assisting researchers and operators in determining the root causes of network problems and enabling measurement targeted for specific conditions.


Intrusion Detection System Domain Name System Reactive Measurement Packet Reordering Internet Measurement 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Allman, M.: Measuring End-to-End Bulk Transfer Capacity. In: ACM SIGCOMM Internet Measurement Workshop (November 2001)Google Scholar
  2. 2.
    Anderson, D.S., Fleizach, C., Savage, S., Voelker, G.M.: Spamscatter: Characterizing Internet Scam Hosting Infrastructure. In: Proceedings of the USENIX Security Symposium (August 2007)Google Scholar
  3. 3.
    Chang, D.-F., Govindan, R., Heidemann, J.: Exploring The Ability of Locating BGP Missing Routes From Multiple Looking Glasses. In: ACM SIGCOMM Network Troubleshooting Workshop (September 2004)Google Scholar
  4. 4.
    Clark, D., Partridge, C., Ramming, J.C., Wroclawksi, J.: A Knowledge Plane for the Internet. In: ACM SIGCOMM Workshop on Future Directions in Network Architecture (August 2003)Google Scholar
  5. 5.
    Huang, H., Jennings III, R., Ruan, Y., Sahoo, R., Sahu, S., Shaikh, A.: PDA: A Tool for Automated Problem Determination. In: Proceedings of USENIX Large Installation System Administration Conference (LISA) (November 2007)Google Scholar
  6. 6.
    Jung, J., Sit, E., Balakrishnan, H., Morris, R.: DNS Performance and the Effectiveness of Caching. In: ACM SIGCOMM Internet Measurement Workshop (November 2001)Google Scholar
  7. 7.
    Kornexl, S., Paxson, V., Dreger, H., Feldmann, A., Sommer, R.: Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. In: ACM Internet Measurement Conference (2005)Google Scholar
  8. 8.
    Krishnamurthy, B., Madhyastha, H.V., Spatscheck, O.: ATMEN: A Triggered Network Measurement Infrastructure. In: Proceedings of WWW (May 2005)Google Scholar
  9. 9.
    Mao, Z.M., Rexford, J., Wang, J., Katz, R.: Towards an Accurate AS-Level Traceroute Tool. ACM SIGCOMM (2003)Google Scholar
  10. 10.
    Mathis, M.: Diagnosing Internet Congestion with a Transport Layer Performance Tool. In: Proceedings of INET 1996 (June 1996)Google Scholar
  11. 11.
    University of Oregon RouteViews Project,
  12. 12.
    Paxson, V.: End-to-End Routing Behavior in the Internet. ACM SIGCOMM (August 1996)Google Scholar
  13. 13.
    Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. In: Proceedings of the 7th USENIX Security Symposium (January 1998)Google Scholar
  14. 14.
    Paxson, V., Adams, A., Mathis, M.: Experiences with NIMI. In: Proceedings of Passive and Active Measurement (2000)Google Scholar
  15. 15.
    Paxson, V., Mahdavi, J., Adams, A., Mathis, M.: An Architecture for Large-Scale Internet Measurement. IEEE Communications (1998)Google Scholar
  16. 16.
    Peterson, J.L.: Petri Net Theory and the Modeling of Systems. Prentice Hall, Englewood Cliffs (1981)Google Scholar
  17. 17.
    Rabinovich, M., Triukose, S., Wen, Z., Wang, L.: Dipzoom: the Internet measurements marketplace. In: 9th IEEE Global Internet Symp. (2006)Google Scholar
  18. 18.
    Roesch, M.: Snort: Lightweight intrusion detection for networks. In: Proceedings of USENIX LISA (1999)Google Scholar
  19. 19.
    Spring, N., Wetherall, D., Anderson, T.: Scriptroute: A Public Internet Measurement Facility. In: USENIX Symposium on Internet Technologies and Systems (USITS) (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  1. 1.International Computer Science Institute 

Personalised recommendations