discussions held on our regular meetings. His ideas
and comments improved this work. I would also
like to thank my students, especially Stanislav
Bárta, Barbora Franková, Martin Holkovič, Radek
Hranický, Jakub Jirásek, and Petr Kramoliš: both
for their input and for their help during the
development of the tools required in this research.
Last but not least, I want to thank Cisco Systems
Switzerland, in particular Davide Cuda and Amine
Choukir, for giving me the possibility of seeing the
research problem from a different angle.
REFERENCES
Asati, R. and Wing, D. (2012). Internet Draft version 00
(Work in progress): Tracking of Static/
Autoconfigured IPv6 addresses. Internet Engineering
Task Force.
ATIS/TIA (2006). Lawfully Authorized Electronic
Surveillance. J-STD-025-B. Alliance for Telecom-
munications Industry Solutions/ Telecommunications
Industry Association Joint Standard.
Banse, C., Herrmann, D., and Federrath, H. (2012).
Tracking users on the internet with behavioral
patterns: Evaluation of its practical feasibility. In
Gritzalis, D., Furnell, S., and Theoharidou, M.,
editors, Information Security and Privacy Research,
volume 376 of IFIP Advances in Information and
Communication Technology, pages 235–248. Springer
Berlin Heidelberg, DE.
Cisco Systems (2014). Cisco medianet architecture. http://
www.cisco.com/web/solutions/trends/medianet.
Clauß, S. and Köhntopp, M. (2001). Identity management
and its support of multilateral security. Computer
Networks, 37(2):205–219. Electronic Business
Systems.
Dunlop, M., Groat, S., Marchany, R., and Tront, J.
(2011). The Good, the Bad, the IPv6. In
Communication Networks and Services Research
Conference, pages 77–84, Ottawa, Canada.
Eckersley, P. (2010). How unique is your web browser?
In Atallah, M. and Hopper, N., editors, Privacy
Enhancing Technologies, volume 6205 of Lecture
Notes in Computer Science, pages 1–18. Springer
Berlin Heidelberg, DE.
Eckert, T., Penno, R., Choukir, A., and Eckel, C. (2013).
A Framework for Signaling Flow Characteristics
between Applications and the Network. IETF.
InternetDraft (work in progress), intended status:
Informational.
ETSI (2001). ETSI TR 101 944: Telecommunications
security; Lawful Interception (LI); Issues on IP
Interception. European Telecommunications
Standards Institute. Version 1.1.2.
FIT BUT (2010–2014). Modern tools for detection and
mitigation of cyber criminality on the new generation
internet. Brno University of Technology, Faculty of
Information Technology, CZ.
http://www.fit.vutbr.cz/~ipolcak/ grants.php?id=517.
Groat, S., Dunlop, M., Marchany, R., and Tront, J.
(2010). The privacy implications of stateless IPv6
addressing. In Cyber Security and Information
Intelligence Research, pages 52:1–52:4, New York,
NY, USA. ACM.
Groat, S., Dunlop, M., Marchany, R., and Tront, J.
(2011). What DHCPv6 says about you. In 2011
World Congress on Internet Security, pages 146–151,
London, UK.
Grégr, M., Matoušek, P., Podermański, T., and Švéda, M.
(2011). Practical IPv6 Monitoring Challenges and
Techniques. In Symposium on Integrated Network
Management, pages 660–663, Dublin, Ireland. IEEE
CS.
Herrmann, D., Gerber, C., Banse, C., and Federrath, H.
(2012). Analyzing characteristic host access patterns
for re-identification of web user sessions. In Aura, T.,
Järvinen, K., and Nyberg, K., editors, Information
Security Technology for Applications, volume 7127 of
Lecture Notes in Computer Science, pages 136–154.
Springer Berlin Heidelberg, DE.
Huang, D.-J., Yang, K.-T., Ni, C.-C., Teng, W.-C.,
Hsiang, T.-R., and Lee, Y.-J. (2012). Clock skew
based client device identification in cloud
environments. In Advanced Information Networking
and Applications, pages 526–533.
Jøsang, A., Fabre, J., Hay, B., Dalziel, J., and Pope, S.
(2005). Trust requirements in identity management.
In Proceedings of the 2005 Australasian Workshop on
Grid Computing and e-Research Volume 44, ACSW
Frontiers ’05, pages 99–108, Darlinghurst, Australia,
Australia. Australian Computer Society, Inc.
Kohno, T., Broido, A., and Claffy, K. (2005). Remote
physical device fingerprinting. IEEE Transactions on
Dependable and Secure Computing, 2(2):93–108.
Kumpošt, M. (2008). Context Information and User
Profiling. PhD thesis, Masaryk University, CZ.
Laiping Zhao, Yizhi Ren, Mingchu Li, and Kouichi
Sakurai (2012). Flexible service selection with user-
specific QoS support in service-oriented architecture.
Journal of Network and Computer Applications,
35(3):962–973. Special Issue on Trusted Computing
and Communications.
Lanze, F., Panchenko, A., Braatz, B., and Zinnen, A.
(2012). Clock skew based remote device
fingerprinting demystified. In Global
Communications Conference, pages 813–819.
Love, R. (2005). Kernel korner: Intro to inotify. Linux
Journal, 2005(139).
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar,
G., Peterson, L., Rexford, J., Shenker, S., and Turner,
J. (2008). OpenFlow: enabling innovation in campus
networks. SIGCOMM Computer Communication
Review, 38(2):69–74.
Megyesi, P. and Molnár, S. (2013). Analysis of elephant
users in broadband network traffic. In Bauschert, T.,
editor, Advances in Communication Networking,
ChallengesinIdentificationinFutureComputerNetworks
23