{"id":138,"date":"2016-03-25T15:20:28","date_gmt":"2016-03-25T15:20:28","guid":{"rendered":"https:\/\/www.ecs.csun.edu\/spectra\/?p=138"},"modified":"2023-02-20T18:57:00","modified_gmt":"2023-02-20T18:57:00","slug":"college-research-fellow-is-keeping-an-eye-on-isps","status":"publish","type":"post","link":"https:\/\/www.ecs.csun.edu\/spectra\/2016\/03\/25\/college-research-fellow-is-keeping-an-eye-on-isps\/","title":{"rendered":"College research fellow is keeping an eye on ISPs"},"content":{"rendered":"<p>Vahab Pournaghshband<a title=\"Pournaghshband_Vahab_Sep14_2.jpg\" href=\"https:\/\/www.ecs.csun.edu\/ecsdean\/enews\/fp-content\/images\/2015fall\/Pournaghshband_Vahab_Sep14_2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"floatleft alignleft\" src=\"https:\/\/www.ecs.csun.edu\/ecsdean\/enews\/fp-content\/images\/2015fall\/.thumbs\/Pournaghshband_Vahab_Sep14_2.jpg\" alt=\"Pournaghshband_Vahab_Sep14_2.jpg\" width=\"150\" height=\"210\" \/><\/a><\/p>\n<p>On February 25, 2015, after several years of contentious debate, the FCC adopted new rules about so-called net neutrality, the Internet\u2019s guiding principle. The rules, which went into effect June 23, 2015, stipulate that broadband providers cannot block access to legal content, impede legal Internet traffic, or give preferential treatment in exchange for money or other consideration.<\/p>\n<p>But CSUN\u2019s Vahab Pournaghshband isn\u2019t taking Internet service providers\u2019 compliance for granted. Instead, the CSUN assistant professor of computer science, who is passionate about net neutrality, is responding proactively. Noting that in the past, some U.S. ISPs were found to be violating net neutrality but were not forthcoming about it, he\u2019s intent on developing a novel method that will enable end users to detect violators and will work even if ISPs try to hide what they\u2019re doing.<\/p>\n<p style=\"text-align: left;\">\u201cWe are actually talking about a global issue,\u201d he says. \u201cIt\u2019s not just a problem in the U.S. but in other countries as well.\u201d<\/p>\n<p style=\"text-align: center;\"><a title=\"Slide 1\" href=\"https:\/\/www.ecs.csun.edu\/ecsdean\/enews\/fp-content\/images\/2015fall\/spq1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"floatleft aligncenter\" src=\"https:\/\/www.ecs.csun.edu\/ecsdean\/enews\/fp-content\/images\/2015fall\/.thumbs\/spq1.jpg\" alt=\"Slide 1\" width=\"600\" height=\"138\" \/><\/a><em>An illustration of strict priority queueing, one way ISP\u2019s violate net neutrality.<\/em><\/p>\n<p style=\"text-align: left;\">Pournaghshband is the 2015-16 college research fellow, and he is receiving release time during the spring semester to pursue his project, titled \u201cDetecting Net Neutrality Violators in a Dynamic Environment.\u201d Although he is not the first researcher to tackle the question of net neutrality violations, he explains that the papers published to date have assumed that the ISP is static\u2014that an ISP that is \u201cmistreating\u201d data packets will continue to do so even when experiments are being run to detect the practice. But, he says, that strategy also assumes that ISPs, in turn, are not actually trying to detect the monitoring. If they want to evade detection, they might, for example, be able to fingerprint the test traffic that monitors send. They could then change their behavior and treat all traffic normally during the detection period to conceal the violation and return to mistreating packets and violating net neutrality after the test ends.<\/p>\n<p style=\"text-align: center;\"><a title=\"Slide2.jpg\" href=\"https:\/\/www.ecs.csun.edu\/ecsdean\/enews\/fp-content\/images\/2015fall\/Slide2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"floatleft aligncenter\" src=\"https:\/\/www.ecs.csun.edu\/ecsdean\/enews\/fp-content\/images\/2015fall\/.thumbs\/Slide2.jpg\" alt=\"Slide2.jpg\" width=\"600\" height=\"192\" \/><\/a><em>A mathematical model to describe net neutrality violators, developed by Vahab Pournaghshband.<\/em><\/p>\n<p style=\"text-align: left;\">Previous research into detecting discrimination on the Internet has focused on very specific scenarios, Pournaghshband says, which are only useful for detecting particular sorts of differentiated service. But his goal is to develop an umbrella method that will detect multiple ways that companies might mistreat data packets.<\/p>\n<p>\u201cI want to come up with a general framework so that instead of looking just into specific problems, we can find a common ground and provide one solution that can be applied to a large set of them,\u201d he says. \u201cThis is actually the first research that aims to do that.\u201d<\/p>\n<p>Even though his release time for the project didn\u2019t start until the spring 2016 semester, he began working on the project last year. \u201cI didn\u2019t want to wait,\u201d he said. \u201cI needed many things to be ready before I actually started.\u201d<\/p>\n<p>Those things included forming a research group with a few students, including a computer science graduate student whose master\u2019s thesis is devoted to the project, as well as laying the groundwork for a simulation environment and a test bed for testing the methodology he and his group eventually develop. But he cautions that the work of developing an effective tool that will allow end users to detect net neutrality violations won\u2019t be done this year. It will require a long study and lots of collaboration to gather the extensive data needed to perform detection on a large scale. He\u2019s in this for the long haul, however, because the way he sees it, the stakes are high.<\/p>\n<p>\u201cIf Internet companies are discriminating on content, they could slow sites with content they don\u2019t like,\u201d he says. \u201cAnd that is a form of censorship.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vahab Pournaghshband On February 25, 2015, after several years of contentious debate, the FCC adopted new rules about so-called net neutrality, the Internet\u2019s guiding principle. The rules, which went into effect June 23, 2015, stipulate that broadband providers cannot block access to legal content, impede legal Internet traffic, or give preferential treatment in exchange for money or other consideration. But CSUN\u2019s Vahab Pournaghshband isn\u2019t taking Internet service providers\u2019 compliance for granted. Instead, the CSUN assistant professor of computer science, who is passionate about net neutrality, is responding proactively. Noting that in the past, some U.S. ISPs were found to be [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-138","post","type-post","status-publish","format-standard","hentry","category-fall-2015-2016"],"_links":{"self":[{"href":"https:\/\/www.ecs.csun.edu\/spectra\/wp-json\/wp\/v2\/posts\/138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ecs.csun.edu\/spectra\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecs.csun.edu\/spectra\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecs.csun.edu\/spectra\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecs.csun.edu\/spectra\/wp-json\/wp\/v2\/comments?post=138"}],"version-history":[{"count":1,"href":"https:\/\/www.ecs.csun.edu\/spectra\/wp-json\/wp\/v2\/posts\/138\/revisions"}],"predecessor-version":[{"id":139,"href":"https:\/\/www.ecs.csun.edu\/spectra\/wp-json\/wp\/v2\/posts\/138\/revisions\/139"}],"wp:attachment":[{"href":"https:\/\/www.ecs.csun.edu\/spectra\/wp-json\/wp\/v2\/media?parent=138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecs.csun.edu\/spectra\/wp-json\/wp\/v2\/categories?post=138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecs.csun.edu\/spectra\/wp-json\/wp\/v2\/tags?post=138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}