Xin Zhe Khooi, Levente Csikor, M. Kang, D. Divakaran
{"title":"In-network defense against AR-DDoS attacks","authors":"Xin Zhe Khooi, Levente Csikor, M. Kang, D. Divakaran","doi":"10.1145/3405837.3411375","DOIUrl":"https://doi.org/10.1145/3405837.3411375","url":null,"abstract":"The prevalence of the disruptive amplified reflection DDoS (AR-DDoS) attacks is one of the biggest concerns of all network operators today. The increasing magnitude of new attacks are rendering existing measures (e.g., scrubbing services) inefficient. This work demonstrates DIDA, an efficient, topology independent, in-line AR-DDoS detection and mitigation architecture that operates entirely in the data plane.","PeriodicalId":396272,"journal":{"name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115235621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AS relationships inference from the internet routing registries","authors":"Akmal Khan, Hyunchul Kim, T. Kwon","doi":"10.1145/3405837.3411401","DOIUrl":"https://doi.org/10.1145/3405837.3411401","url":null,"abstract":"We present a methodology to infer business relationships between ASes using routing polices stored in the Internet Routing Registries (IRR), which are a set of databases used by ASes to register their inter-domain routing policies. We show that the overall accuracy of our algorithm is comparable (95% for p2c, 92% for p2p links) to the existing algorithms, which infer AS relationships using BGP AS paths. We highlight that the IRR is a strong complementary source for better understandings of the structure, performance, dynamics, and evolution of the Internet since it is actively used by a large number of operational ASes in the Internet.","PeriodicalId":396272,"journal":{"name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120955346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Somy, Abhijit Mondal, B. Ghosh, Sandip Chakraborty
{"title":"System call interception for serverless isolation","authors":"N. Somy, Abhijit Mondal, B. Ghosh, Sandip Chakraborty","doi":"10.1145/3405837.3411391","DOIUrl":"https://doi.org/10.1145/3405837.3411391","url":null,"abstract":"Serverless functions [6, 9, 13, 14], like AWS Lambda [3] or Google Cloud Functions [7], are new techniques for running short-lived workloads over a cloud, which are particularly preferred by users for their easy deployment, fine-grained billing and automatic scaling. Unlike traditional cloud offerings such as VMs and containers, these functions are stateless, where each function execution starts with a fresh state of memory, disk, and other resources. A multi-tenant serverless cloud platform has two primary components, a gateway controlled by the cloud service provider (CSP) and the user functions which are users' programs. A typical serverless function execution is stateless and involves broadly the following steps: (1) User request is received by the gateway, (2) Gateway executes the function and passes the request arguments, (3) The function performs necessary computation, (4) Optionally, it can call other functions through the gateway or access external Database, and (5) It returns the result to the user.","PeriodicalId":396272,"journal":{"name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","volume":"28 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125687564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
István Pelle, János Czentye, János Dóka, Balázs Sonkoly
{"title":"Dynamic latency control of serverless applications operated on AWS lambda and greengrass","authors":"István Pelle, János Czentye, János Dóka, Balázs Sonkoly","doi":"10.1145/3405837.3411381","DOIUrl":"https://doi.org/10.1145/3405837.3411381","url":null,"abstract":"Cloud native programming and the serverless paradigm can revolutionize software development and the operation of distributed applications. However, latency sensitive applications pose additional challenges to the underlying networks and cloud platforms. Moving compute resources to the edge is an inevitable step but further mechanisms and novel components are also required to enable such services in a serverless environment. In this demonstration, we present a novel system providing soft latency control for serverless applications and we showcase our proof-of-concept prototype supervising microservices operated on Amazon Web Services, and its edge extension, called Greengrass. Our main objective is the cost optimal operation while meeting the average latency requirements which is achieved by dynamically changing the software layout and serverless artifacts based on live monitoring.","PeriodicalId":396272,"journal":{"name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121139662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Singh, Christian Esteve Rothenberg, M. C. Luizelli, G. Antichi, Gergely Pongrácz
{"title":"Revisiting heavy-hitters: don't count packets, compute flow inter-packet metrics in the data plane","authors":"S. Singh, Christian Esteve Rothenberg, M. C. Luizelli, G. Antichi, Gergely Pongrácz","doi":"10.1145/3405837.3411388","DOIUrl":"https://doi.org/10.1145/3405837.3411388","url":null,"abstract":"Detecting Heavy Hitter (HH) flows, i.e., flows exceeding a pre-determined threshold in a time window, is a fundamental task as it enables network management and security applications like DoS attack detection/prevention, flow-size aware routing, and QoS. The recent breakthroughs of programmable data planes has provided an unique opportunity: detect them directly in the data plane to enable fast control decisions. State-of-the-art solutions leverage either probabilistic data structures [1, 2] or prefix trees [3] to store flow counters directly in the programmable pipeline of switches. However, the former approach still depends on the intervention of a central controller to identify the HH flows from the hash-buckets, thus partially diminishing the fast data plane reaction. The latter approach instead, while successfully implemented on FPGA, is not yet a feasible solution for today's programmable ASICs due to limited accesses to registers [4].","PeriodicalId":396272,"journal":{"name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","volume":"19 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113992958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time deep learning based traffic analytics","authors":"Massimo Gallo, A. Finamore, G. Simon, Dario Rossi","doi":"10.1145/3405837.3411398","DOIUrl":"https://doi.org/10.1145/3405837.3411398","url":null,"abstract":"The increased interest towards Deep Learning (DL) technologies has led to the development of a new generation of specialized hardware accelerator [8] such as Graphic Processing Unit (GPU) and Tensor Processing Unit (TPU) [1, 2]. Although attractive for implementing real-time analytics based traffic engineering fostering the development of self-driving networks [5], the integration of such components in network routers is not trivial. Indeed, routers typically aim to minimize the overhead of per-packet processing (e.g., Ethernet switching, IP forwarding, telemetry) and design choices (e.g., power, memory consumption) to integrate a new accelerator need to factor in these key requirements. Previous works on DL hardware accelerators have overlooked specific router constraints (e.g., strict latency) and focused instead on cloud deployment [4] and image processing. Likewise, there is limited literature regarding DL application on traffic processing at line-rate [6, 9].","PeriodicalId":396272,"journal":{"name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131693860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Suraj Jog, Zikun Liu, Antonio Franques, V. Fernando, Haitham Hassanieh, S. Abadal, J. Torrellas
{"title":"Millimeter wave wireless network on chip using deep reinforcement learning","authors":"Suraj Jog, Zikun Liu, Antonio Franques, V. Fernando, Haitham Hassanieh, S. Abadal, J. Torrellas","doi":"10.1145/3405837.3411396","DOIUrl":"https://doi.org/10.1145/3405837.3411396","url":null,"abstract":"Wireless Network-on-Chip (NoC) has emerged as a promising solution to scale chip multi-core processors to hundreds of cores. However, traditional medium access protocols fall short here since the traffic patterns on wireless NoCs tend to be very dynamic and can change drastically across different cores, different time intervals and different applications. In this work, we present NeuMAC, a unified approach that combines networking, architecture and AI to generate highly adaptive medium access protocols that can learn and optimize for the structure, correlations and statistics of the traffic patterns on the NoC. Our results show that NeuMAC can quickly adapt to NoC traffic to provide significant gains in terms of latency and overall execution time, improving the execution time by up to 1.69X - 3.74X.","PeriodicalId":396272,"journal":{"name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115860908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Narayanan, Eman Ramadan, Jacob Quant, Peiqi Ji, Feng Qian, Zhi-Li Zhang
{"title":"5G tracker: a crowdsourced platform to enable research using commercial 5g services","authors":"A. Narayanan, Eman Ramadan, Jacob Quant, Peiqi Ji, Feng Qian, Zhi-Li Zhang","doi":"10.1145/3405837.3411394","DOIUrl":"https://doi.org/10.1145/3405837.3411394","url":null,"abstract":"While 5G has offered many opportunities for research, the majority of studies have been conducted with constrained experimental settings or done privately by 5G operators. Even a year after the launch of commercial 5G networks, research over commercial 5G has been limited due to the lack of publicly available tools and datasets. In this paper, we propose 5G Tracker - a crowdsourced platform intended to aid researchers in collecting and leveraging large-scale 5G datasets. This platform includes an Android app that records passive and active measurements tailored to 5G networks and research. We have been using 5G Tracker for over 8 months, during which time we have collected over 4 million data points, consuming over 50 TB of cellular data across multiple 5G carriers in the U.S. Our experience shows that 5G performance is affected by several user-side contextual factors besides location such as user mobility level, orientation, weather, location dynamics (e.g., moving vehicles), and environmental features such as pillars, foliage, and buildings. This is partly because mmWave signals (considered key to mainstream 5G) are known to be highly sensitive to obstructions and user mobility. These observations highlight the need to move towards building context-aware 5G performance prediction models that can provide guidance for decisions at various layers such as preemptive handoff, multi-path scheduling, tower placement, and \"5G-aware\" application development. Finally, we showcase the utility of our platform by building a first of kind, interactive 5G coverage mapping application as a case study driven by the data we collected, which is publicly available at: https://5gophers.umn.edu.","PeriodicalId":396272,"journal":{"name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117319035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
János Dóka, B. Nagy, M. A. U. Rehman, Dong-Hak Kim, Byung-Seo Kim, László Toka, Balázs Sonkoly
{"title":"AR over NDN: augmented reality applications and the rise of information centric networking","authors":"János Dóka, B. Nagy, M. A. U. Rehman, Dong-Hak Kim, Byung-Seo Kim, László Toka, Balázs Sonkoly","doi":"10.1145/3405837.3411386","DOIUrl":"https://doi.org/10.1145/3405837.3411386","url":null,"abstract":"Collaborative multi-user Augmented Reality (AR) applications pose serious challenges to the underlying network infrastructure due to their all-to-all communication pattern. The Named Data Networking (NDN) paradigm can be a crucial enabler of these applications operated in extremely large scale in terms of users, amount of content, and network size. The inherent multicast support together with a carefully designed naming scheme can provide the efficient network operation, while the inflated Forwarding Information Base (FIB) tables of typical NDN routers can be compressed by powerful algorithms to make the concept feasible. In this demonstration, we showcase an AR application supporting remote collaboration for a large number of users. The software stack of our proof-of-concept prototype leverages open source tools, such as ChronoSync, NDN Forwarding Daemon (NFD), Named Data Link State Routing Protocol (NLSR), and in order to validate the feasibility of the concept, we established a flexible NDN test environment based on Docker containers, real Android clients and emulated users. The framework enables starting arbitrary NDN topologies with predefined FIB contents and to emulate thousands of users. During the live demo, we can show the current network status and relevant performance metrics, such as end-to-end application latency, crucial for AR applications.","PeriodicalId":396272,"journal":{"name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128415168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fenglin-I: an open-source TSN chip for scenario-driven customization*","authors":"Wenwen Fu, Jinli Yan, W. Quan, Zhigang Sun","doi":"10.1145/3405837.3411392","DOIUrl":"https://doi.org/10.1145/3405837.3411392","url":null,"abstract":"In most distributed hard real-time scenarios (e.g., industry, aerospace), customizing a Time-Sensitive Networking (TSN) chip is critical for meeting their differentiated requirements. In order to provide flexible customization capacity (e.g., traffic workload, I/O integration), we propose an open-source TSN chip architecture namly Fenglin, which contains two basic features for scenario-driven customization: (1)modular cut-through switching architecture, (2)fine-grained forwarding abstraction. Targeting the typical aerospace scenario, we prototype the Fenglin-I TSN chip based on Fenglin architecture and build a ring topology network to demonstrate the correctness and performance of this chip.","PeriodicalId":396272,"journal":{"name":"Proceedings of the SIGCOMM '20 Poster and Demo Sessions","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123254923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}