ABSTRACT
Network measurements are a necessary component of assessing real-world protocol use to inform the development of new and improvement of old protocols and standards. However, especially active measurements, i.e., measurements in which probes are sent to remote devices to illicit a response, face ethical challenges, are difficult to execute reliably, and may cause unintended harm.
In this paper, we reflect on the connection between the Internet's growing complexity, the practicalities of academic research, and the likelyhood of reliability issues and unintended harm occurring in active measurements. We argue that communal infrastructure providing measurement services to the academic community could be a path forward to improve reliability and accessibility, while reducing the potential for unintended harm, and enabling PhD students to more easily draw from the experience of industry professionals.
- Yasemin Acar, Michael Backes, Sascha Fahl, Doowon Kim, Michelle L Mazurek, and Christian Stransky. 2016. You get where you're looking for: The impact of information sources on code security. In IEEE Symposium on Security and Privacy (SP). 289--305.Google ScholarCross Ref
- Michael Bailey, David Dittrich, Erin Kenneally, and Doug Maughan. 2012. The menlo report. IEEE Security & Privacy 10, 2 (2012), 71--75.Google ScholarDigital Library
- Kent Beck. 2003. Test-driven development: by example. Addison-Wesley Professional.Google ScholarDigital Library
- Bert Hubert. 2018. Herding the DNS Camel. https://www.ietf.org/blog/herding-dns-camel/Google Scholar
- Ramón Cáceres, Peter B Danzig, Sugih Jamin, and Danny J Mitzel. 1991. Characteristics of wide-area TCP/IP conversations. ACM SIGCOMM Computer Communication Review 21, 4 (1991), 101--112.Google ScholarDigital Library
- Ray M Chang, Robert J Kauffman, and YoungOk Kwon. 2014. Understanding the paradigm shift to computational social science in the presence of big data. Decision Support Systems 63 (2014), 67--80.Google ScholarCross Ref
- Nikolaos Chatzis, Georgios Smaragdakis, Jan Böttger, Thomas Krenc, and Anja Feldmann. 2013. On the benefits of using a large IXP as an Internet vantage point. In Proceedings of the 2013 conference on Internet measurement conference. 333--346.Google ScholarDigital Library
- Jakub Czyz, Michael Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael Bailey, and Manish Karir. 2014. Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks. In Proceedings of the 2014 Conference on Internet Measurement Conference. 435--448.Google ScholarDigital Library
- Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. ZMap: Fast Internet-wide Scanning and Its Security Applications. In USENIX Security Symposium, Vol. 8. 47--53.Google Scholar
- T. Fiebig. 2022. Send it (or rather not): Stupid things with OpenSMTPd and mysql. https://doing-stupid-things.as59645.net/mail/opensmtpd/mysql/2022/08/30/receiving-an-email.htmlGoogle Scholar
- Tobias Fiebig and Doris Aschenbrenner. 2022. 13 Propositions on an Internet for a "Burning World". In Proceedings of the ACM SIGCOMM Joint Workshops on Technologies, Applications, and Uses of a Responsible Internet and Building Greener Internet.Google ScholarDigital Library
- Tobias Fiebig, Seda Gürses, Carlos H Gañán, Erna Kotkamp, Fernando Kuipers, Martina Lindorfer, Menghua Prisse, and Taritha Sari. 2023. Heads in the Clouds? Measuring Universities' Migration to Public Clouds: Implications for Privacy & Academic Freedom. In Proceedings on Privacy Enhancing Technologies Symposium, Vol. 2023.Google ScholarCross Ref
- Florian Holzbauer, Johanna Ullrich, Martina Lindorfer, and Tobias Fiebig. 2022. Not that Simple: Email Delivery in the 21st Century. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). 295--308.Google Scholar
- Mannat Kaur, Harshini Sri Ramulu, Yasemin Acar, and Tobias Fiebig. 2023. "Oh yes! over-preparing for meetings is my jam:)": The Gendered Experiences of System Administrators. Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (2023), 1--38.Google ScholarDigital Library
- Mannat Kaur, Michelvan Eeten, Marijn Janssen, Kevin Borgolte, and Tobias Fiebig. 2021. Human Factors in Security Research: Lessons Learned from 2008-2018. arXiv preprint arXiv:2103.13287 (2021).Google Scholar
- Chris Lorenz. 2015. The metrification of 'quality' and the fall of the academic profession. Oxford Magazine 355 (2015), 7--11.Google Scholar
- P.V. Mockapetris. 1987. Domain names - concepts and facilities. RFC 1034 (Internet Standard). https://doi.org/10.17487/RFC1034 Updated by RFCs 1101, 1183, 1348, 1876, 1982, 2065, 2181, 2308, 2535, 4033, 4034, 4035, 4343, 4035, 4592, 5936, 8020, 8482, 8767.Google ScholarDigital Library
- P.V. Mockapetris. 1987. Domain names - implementation and specification. RFC 1035 (Internet Standard). https://doi.org/10.17487/RFC1035 Updated by RFCs 1101, 1183, 1348, 1876, 1982, 1995, 1996, 2065, 2136, 2181, 2137, 2308, 2535, 2673, 2845, 3425, 3658, 4033, 4034, 4035, 4343, 5936, 5966, 6604, 7766, 8482, 8490, 8767.Google ScholarDigital Library
- Jonathan Perry, Amy Ousterhout, Hari Balakrishnan, Devavrat Shah, and Hans Fugal. 2014. Fastpass: A centralized "zero-queue" datacenter network. In Proceedings of ACM SIGCOMM. 307--318.Google ScholarDigital Library
- Estelle Phillips and Colin Johnson. 2022. Ebook: How to Get a PhD: A Handbook for Students and Their Supervisors, 7th Edition. McGraw-Hill Education (UK).Google Scholar
- Philipp Richter and Arthur Berger. 2019. Scanning the scanners: Sensing the internet from a massively distributed network telescope. In Proceedings of the Internet Measurement Conference. 144--157.Google ScholarDigital Library
- RIPE Atlas. 2023. RIPE Atlas. https://atlas.ripe.net/Google Scholar
- Arjun Roy, Hongyi Zeng, Jasmeet Bagga, George Porter, and Alex C Snoeren. 2015. Inside the social network's (datacenter) network. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. 123--137.Google ScholarDigital Library
- Florian Streibelt, Martina Lindorfer, Seda Gürses, Carlos H Gañán, and Tobias Fiebig. 2023. Back-to-the-Future Whois: An IP Address Attribution Service for Working with Historic Datasets. In International Conference on Passive and Active Network Measurement. Springer, 209--226.Google Scholar
- Florian Streibelt, Patrick Sattler, Franziska Lichtblau, Carlos H Ganán, Anja Feldmann, Oliver Gasser, and Tobias Fiebig. 2023. How Ready is DNS for an IPv6-Only World?. In International Conference on Passive and Active Network Measurement. Springer, 525--549.Google ScholarDigital Library
- E. Vyncke, B. Donnet, and J. Iurman. 2023. Attribution of Internet Probes. https://datatracker.ietf.org/doc/draft-ietf-opsec-probe-attribution/03/Google Scholar
- Tianyi Zhang, Ganesha Upadhyaya, Anastasia Reinhardt, Hridesh Rajan, and Miryung Kim. 2018. Are code examples on an online Q&A forum reliable? a study of API misuse on stack overflow. In Proceedings of the 40th International Conference on Software Engineering. 886--896.Google ScholarDigital Library
Index Terms
- Crisis, Ethics, Reliability & a measurement.network: Reflections on Active Network Measurements in Academia
Recommendations
Moral luck and computer ethics: Gauguin in cyberspace
I argue that the problem of `moral luck' is an unjustly neglected topic within Computer Ethics. This is unfortunate given that the very nature of computer technology, its `logical malleability', leads to ever greater levels of complexity, unreliability ...
From ethics washing to ethics bashing: a view on tech ethics from within moral philosophy
FAT* '20: Proceedings of the 2020 Conference on Fairness, Accountability, and TransparencyThe word 'ethics' is under siege in technology policy circles. Weaponized in support of deregulation, self-regulation or handsoff governance, "ethics" is increasingly identified with technology companies' self-regulatory efforts and with shallow ...
Flourishing Ethics
This essay describes a new ethical theory that has begun to coalesce from the works of several scholars in the international computer ethics community. I call the new theory Flourishing Ethics' because of its Aristotelian roots, though it also includes ...
Comments