2016 IEEE 24th International Conference on Network Protocols (ICNP)最新文献

筛选
英文 中文
Bringing execution assurances of pattern matching in outsourced middleboxes 在外包中间件中提供模式匹配的执行保证
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-12-14 DOI: 10.1109/ICNP.2016.7784424
Xingliang Yuan, Huayi Duan, Cong Wang
{"title":"Bringing execution assurances of pattern matching in outsourced middleboxes","authors":"Xingliang Yuan, Huayi Duan, Cong Wang","doi":"10.1109/ICNP.2016.7784424","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784424","url":null,"abstract":"Migrating middleboxes to third-party service providers (e.g., clouds and ISPs) has drawn widespread attentions recently from both industry and academia. While its benefits on reduced local cost and increased service scalability are well understood, such deployment also introduces new security concerns, due to the fact that these boxes are no longer under the direct control of enterprises. Among others, one fundamental desideratum here is to ensure that those middleboxes consistently perform network functions as intended. In this work, we propose practical solutions towards enabling runtime execution assurances of outsourced middleboxes with high confidence. As an initial effort, we target on pattern matching based network functions, which cover a broad class of middlebox applications such as instruction detection, web firewall, and traffic classification. For efficiency, our design follows the same roadmap of probabilistic checking that provides tunable levels of assurance, as in outsourced computation and distributed computing literature. We show how to synthesize the design intuitions in the context of outsourced middleboxes and the dynamic network effect. We present diligent technical instantiations, in the case of single middlebox and the composition of multiple middlebox service chaining, respectively. For a large batch of packets, sufficiently high assurance levels can be achieved by pre-processing only a few randomly selected packets, with marginal overhead. Evaluations of our system prototype on Amazon EC2 show that, the processing of 1000 packets, which includes pattern matching and execution proof generation, results in 200-500ms latency and throughput up to 360Mbps.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133275974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Optimal link-disjoint node-“somewhat disjoint” paths 最优链接-不相交节点-“有些不相交”路径
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-11 DOI: 10.1109/ICNP.2016.7784451
Jose Yallouz, Ori Rottenstreich, P. Babarczi, A. Mendelson, A. Orda
{"title":"Optimal link-disjoint node-“somewhat disjoint” paths","authors":"Jose Yallouz, Ori Rottenstreich, P. Babarczi, A. Mendelson, A. Orda","doi":"10.1109/ICNP.2016.7784451","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784451","url":null,"abstract":"Network survivability has been recognized as an issue of major importance in terms of security, stability and prosperity. A crucial research problem in this context is the identification of suitable pairs of disjoint paths. Here, “disjointness” can be considered in terms of either nodes or links. Accordingly, several studies have focused on finding pairs of either link or node disjoint paths with a minimum sum of link weights. In this study, we investigate the gap between the optimal node-disjoint and link-disjoint solutions. Specifically, we formalize several optimization problems that aim at finding minimum-weight link-disjoint paths while restricting the number of its common nodes. We establish that some of these variants are computationally intractable, while for other variants we establish polynomial-time algorithmic solutions. Finally, through extensive simulations, we show that, by allowing link-disjoint paths share a few common nodes, a major improvement is obtained in terms of the quality (i.e., total weight) of the solution.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"337 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115670896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
FIB efficiency in distributed platforms 分布式平台的FIB效率
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-08 DOI: 10.1109/ICNP.2016.7784452
Kirill Kogan, S. Nikolenko, P. Eugster, A. Shalimov, Ori Rottenstreich
{"title":"FIB efficiency in distributed platforms","authors":"Kirill Kogan, S. Nikolenko, P. Eugster, A. Shalimov, Ori Rottenstreich","doi":"10.1109/ICNP.2016.7784452","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784452","url":null,"abstract":"The Internet routing ecosystem is facing substantial scalability challenges due to continuous, significant growth of the state represented in the data plane. Distributed switch architectures introduce additional constraints on efficient implementations from both lookup time and memory footprint perspectives. In this work we explore efficient FIB representations in common distributed switch architectures. Our approach introduces substantial savings in memory footprint transparently for existing hardware. Our results are supported by an extensive simulation study on real IPv4 and IPv6 FIBs.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124292004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
We've got you covered: Failure recovery with backup tunnels in traffic engineering 我们已经为你准备好了:交通工程中的备用隧道故障恢复
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784449
Jiaqi Zheng, Hong Xu, Xiaojun Zhu, Guihai Chen, Yanhui Geng
{"title":"We've got you covered: Failure recovery with backup tunnels in traffic engineering","authors":"Jiaqi Zheng, Hong Xu, Xiaojun Zhu, Guihai Chen, Yanhui Geng","doi":"10.1109/ICNP.2016.7784449","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784449","url":null,"abstract":"We present Sentinel, a novel failure recovery system for traffic engineering that pre-computes and installs backup tunnels to improve the robustness of software defined wide area networks (WANs). When a link fails, switches locally redirect traffic to backup tunnels and recover immediately in the data plane, thus substantially reducing the transient congestion compared to reactive rescaling. On the other hand Sentinel completely avoids the bandwidth headroom required by existing proactive approaches like FFC, and improves efficiency of operating the expensive WAN. We make several technical contributions in designing Sentinel. We formulate traffic engineering with backup tunnels (TE-BT) as optimization programs. We propose an approximation algorithm to efficiently solve the problem. We further present a concrete design and implementation of the system based on Openflow group tables for backup tunnels. Extensive experiments on Mininet and numerical simulations show that similar to FFC, Sentinel reduces congestion by 45% compared with rescaling, and its algorithm runs much faster than FFC. Sentinel only introduces a small number of additional forwarding rules and can be readily implemented on today's Openflow switches.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115401078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Towards verifiable outsourced middleboxes 走向可验证的外包中间体
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784466
Xingliang Yuan, Huayi Duan, Cong Wang
{"title":"Towards verifiable outsourced middleboxes","authors":"Xingliang Yuan, Huayi Duan, Cong Wang","doi":"10.1109/ICNP.2016.7784466","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784466","url":null,"abstract":"Outsourced middlebox services have drawn broad attentions recently from both industry and academia [1]. Despite benefiting enterprises from reduced cost and increased service scalability, such services also introduce acute security concerns, because these boxes are no longer under direct control of enterprises. Among others, one fundamental and immediate requirement is to ensure that those middleboxes always perform network functions truthfully and correctly [2]. Fulfilling this requirement will extend enterprises' visibility into remote middleboxes and promote further adoption of middlebox outsourcing services. Unfortunately, to our best knowledge, little work investigates the above problem, i.e., making network functions executed by middleboxes verifiable.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115613236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MS-LSTM: A multi-scale LSTM model for BGP anomaly detection MS-LSTM:用于BGP异常检测的多尺度LSTM模型
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7785326
Min Cheng, Qian Xu, Jianming Lv, Wenyin Liu, Qing Li, Jianping Wang
{"title":"MS-LSTM: A multi-scale LSTM model for BGP anomaly detection","authors":"Min Cheng, Qian Xu, Jianming Lv, Wenyin Liu, Qing Li, Jianping Wang","doi":"10.1109/ICNP.2016.7785326","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7785326","url":null,"abstract":"Detecting anomalous Border Gateway Protocol (BGP) traffic is significantly important in improving both security and robustness of the Internet. Existing solutions apply classic classifiers to make real-time decision based on the traffic features of present moment. However, due to the frequently happening burst and noise in dynamic Internet traffic, the decision based on short-term features is not reliable. To address this problem, we propose MS-LSTM, a multi-scale Long Short-Term Memory (LSTM) model to consider the Internet flow as a multi-dimensional time sequence and learn the traffic pattern from historical features in a sliding time window. In addition, we find that adopting different time scale to preprocess the traffic flow has great impact on the performance of all classifiers. In this paper, comprehensive experiments are conducted and the results show that a proper time scale can improve about 10% accuracy of LSTM as well as all conventional machine learning methods. Particularly, MS-LSTM with optimal time scale 8 can achieve 99.5% accuracy in the best case.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123053164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Optimization-based network flow deadline scheduling 基于优化的网络流截止时间调度
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784415
Andrey Gushchin, Shih-Hao Tseng, A. Tang
{"title":"Optimization-based network flow deadline scheduling","authors":"Andrey Gushchin, Shih-Hao Tseng, A. Tang","doi":"10.1109/ICNP.2016.7784415","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784415","url":null,"abstract":"Many network flows nowadays, especially in a data center environment, have associated deadlines by which they must be fully transmitted. Nevertheless, traditional transport protocols such as TCP, focus on concepts like throughput and fairness, and do not aim to satisfy flow deadlines. Motivated by this limitation, several alternative transport designs and solutions have been recently proposed. These approaches generally achieve a better performance in terms of the number of satisfied deadlines and are usually built upon various heuristics. In contrast to these previous works, this article approaches the problem directly from an optimization perspective. We first prove that the problem belongs to the class of NP-hard problems that do not even admit a constant ratio approximation solution (unless P=NP), and formulate it as a mixed integer-linear optimization program. Then, using linear programming approximations, we further develop offline and online optimization-based rate control algorithms to approach the problem. Flow-level simulation results indicate that the proposed algorithms can be near-optimal, and hence they can be served as benchmarks against which other solutions to this problem can be evaluated. We additionally performed simulations incorporating such real network features as deployment delays and packet-level granularity to evaluate the performance of the proposed algorithms in a more realistic environment.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Consistent replication protocol for Named Data Networking 命名数据网络的一致复制协议
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784456
Lijing Wang, Wentao Shang, Wenbo He, Dongsheng Wang
{"title":"Consistent replication protocol for Named Data Networking","authors":"Lijing Wang, Wentao Shang, Wenbo He, Dongsheng Wang","doi":"10.1109/ICNP.2016.7784456","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784456","url":null,"abstract":"This poster presents a consistent replication protocol natively designed for NDN. This protocol can serve as a basic building block for designing consistent data replication, distributed lock service and other fault tolerant system over NDN networks. It also removes the burdens of implementing complex and error-prone logic of maintaining consistency from applications and greatly simplifies the design and implementation of distributed applications over NDN.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128511249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fit the elephant in a box - towards IP lookup at on-chip memory access speed 把大象装进盒子里——以片上存储器访问速度进行IP查找
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784462
Tong Yang, A. Liu, Qiaobin Fu, Dongsheng Yang, S. Uhlig, Xiaoming Li
{"title":"Fit the elephant in a box - towards IP lookup at on-chip memory access speed","authors":"Tong Yang, A. Liu, Qiaobin Fu, Dongsheng Yang, S. Uhlig, Xiaoming Li","doi":"10.1109/ICNP.2016.7784462","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784462","url":null,"abstract":"Fitting large and ever increasing routing tables in small on-chip memory is just like fitting an elephant in a box, which has been considered as impossible. In this paper, we propose the data structure of two-Dimensional Division Bloom Filter (D2BF) that can compactly encode almost all the needed information for performing IP lookup from a FIB in small on-chip memory. With pipelining, we further achieve the throughput of one packet per on-chip memory access.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124538801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacenters Macroflow:一个细粒度的网络抽象,用于数据中心中面向任务完成时间的调度
2016 IEEE 24th International Conference on Network Protocols (ICNP) Pub Date : 2016-11-01 DOI: 10.1109/ICNP.2016.7784473
Chen Tian, Junhua Yan, A. Liu, Yizhou Tang, Yuankun Zhong, Zi Li
{"title":"Macroflow: A fine-grained networking abstraction for job completion time oriented scheduling in datacenters","authors":"Chen Tian, Junhua Yan, A. Liu, Yizhou Tang, Yuankun Zhong, Zi Li","doi":"10.1109/ICNP.2016.7784473","DOIUrl":"https://doi.org/10.1109/ICNP.2016.7784473","url":null,"abstract":"For a datacenter running a data-parallel analytic framework, minimizing job completion time (JCT) is crucial for application performance. The key observation is that JCT could be improved, if network scheduling can exploit the opportunity of decreasing the amount of occupied machine slot-time spend on communication. We propose Macroflow, a networking abstraction that captures the primitive resource granularity of data-parallel frameworks. We study the inter-macroflow scheduling problem for decreasing application JCT. We propose the Smallest-Macroflow-First (SMF) and Smallest-Average-Macroflow-First (SAMF) heuristics that greedily schedule macroflows based on their network footprint. Trace-driven simulations demonstrate that our algorithms can reduce the average and tail JCT of network-intensive jobs by up to 20% and 25%, respectively; at the same time, the throughput of computation-intensive jobs is increased by up to 2.2×.","PeriodicalId":115376,"journal":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124542707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信