首页 > 最新文献

Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications最新文献

英文 中文
Virtual ring routing: network routing inspired by DHTs 虚拟环路由:受dht启发的网络路由
M. Caesar, M. Castro, Edmund B. Nightingale, G. O'Shea, A. Rowstron
This paper presents Virtual Ring Routing (VRR), a new network routing protocol that occupies a unique point in the design space. VRR is inspired by overlay routing algorithms in Distributed Hash Tables (DHTs) but it does not rely on an underlying network routing protocol. It is implemented directly on top of the link layer. VRR provides both raditional point-to-point network routing and DHT routing to the node responsible for a hash table key.VRR can be used with any link layer technology but this paper describes a design and several implementations of VRR that are tuned for wireless networks. We evaluate the performance of VRR using simulations and measurements from a sensor network and an 802.11a testbed. The experimental results show that VRR provides robust performance across a wide range of environments and workloads. It performs comparably to, or better than, the best wireless routing protocol in each experiment. VRR performs well because of its unique features: it does not require network flooding or trans-lation between fixed identifiers and location-dependent addresses.
虚拟环路由(VRR)是一种新型的网络路由协议,在设计空间中占有独特的地位。VRR的灵感来自分布式哈希表(dht)中的覆盖路由算法,但它不依赖于底层网络路由协议。它直接在链路层的顶层实现。VRR既提供传统的点对点网络路由,也提供到负责哈希表键的节点的DHT路由。VRR可以与任何链路层技术一起使用,但本文描述了针对无线网络进行调谐的VRR的设计和几种实现。我们使用传感器网络和802.11a测试平台的模拟和测量来评估VRR的性能。实验结果表明,VRR在广泛的环境和工作负载中提供了稳健的性能。在每次实验中,它的性能与最好的无线路由协议相当,甚至更好。VRR表现良好是因为它的独特特性:它不需要网络泛洪,也不需要在固定标识符和位置相关地址之间进行转换。
{"title":"Virtual ring routing: network routing inspired by DHTs","authors":"M. Caesar, M. Castro, Edmund B. Nightingale, G. O'Shea, A. Rowstron","doi":"10.1145/1159913.1159954","DOIUrl":"https://doi.org/10.1145/1159913.1159954","url":null,"abstract":"This paper presents Virtual Ring Routing (VRR), a new network routing protocol that occupies a unique point in the design space. VRR is inspired by overlay routing algorithms in Distributed Hash Tables (DHTs) but it does not rely on an underlying network routing protocol. It is implemented directly on top of the link layer. VRR provides both raditional point-to-point network routing and DHT routing to the node responsible for a hash table key.VRR can be used with any link layer technology but this paper describes a design and several implementations of VRR that are tuned for wireless networks. We evaluate the performance of VRR using simulations and measurements from a sensor network and an 802.11a testbed. The experimental results show that VRR provides robust performance across a wide range of environments and workloads. It performs comparably to, or better than, the best wireless routing protocol in each experiment. VRR performs well because of its unique features: it does not require network flooding or trans-lation between fixed identifiers and location-dependent addresses.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126742236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 440
COPE: traffic engineering in dynamic networks COPE:动态网络中的流量工程
Hao Wang, Haiyong Xie, Lili Qiu, Yang Richard Yang, Yin Zhang, Albert G. Greenberg
Traffic engineering plays a critical role in determining the performance and reliability of a network. A major challenge in traffic engineering is how to cope with dynamic and unpredictable changes in traffic demand. In this paper, we propose COPE, a class of traffic engineering algorithms that optimize for the expected scenarios while providing a worst-case guarantee for unexpected scenarios. Using extensive evaluations based on real topologies and traffic traces, we show that COPE can achieve efficient resource utilization and avoid network congestion in a wide variety of scenarios.
流量工程对网络的性能和可靠性起着至关重要的作用。交通工程面临的主要挑战是如何应对交通需求的动态和不可预测的变化。在本文中,我们提出了COPE,这是一类针对预期场景进行优化同时为意外场景提供最坏情况保证的流量工程算法。通过基于真实拓扑和流量轨迹的广泛评估,我们表明COPE可以在各种场景中实现有效的资源利用并避免网络拥塞。
{"title":"COPE: traffic engineering in dynamic networks","authors":"Hao Wang, Haiyong Xie, Lili Qiu, Yang Richard Yang, Yin Zhang, Albert G. Greenberg","doi":"10.1145/1159913.1159926","DOIUrl":"https://doi.org/10.1145/1159913.1159926","url":null,"abstract":"Traffic engineering plays a critical role in determining the performance and reliability of a network. A major challenge in traffic engineering is how to cope with dynamic and unpredictable changes in traffic demand. In this paper, we propose COPE, a class of traffic engineering algorithms that optimize for the expected scenarios while providing a worst-case guarantee for unexpected scenarios. Using extensive evaluations based on real topologies and traffic traces, we show that COPE can achieve efficient resource utilization and avoid network congestion in a wide variety of scenarios.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122506414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Realistic and responsive network traffic generation 现实和响应的网络流量生成
K. Vishwanath, Amin Vahdat
This paper presents Swing, a closed-loop, network-responsive traffic generator that accurately captures the packet interactions of a range of applications using a simple structural model. Starting from observed traffic at a single point in the network, Swing automatically extracts distributions for user, application, and network behavior. It then generates live traffic corresponding to the underlying models in a network emulation environment running commodity network protocol stacks. We find that the generated traces are statistically similar to the original traces. Further, to the best of our knowledge, we are the first to reproduce burstiness in traffic across a range of timescales using a model applicable to a variety of network settings. An initial sensitivity analysis reveals the importance of capturing and recreating user, application, and network characteristics to accurately reproduce such burstiness. Finally, we explore Swing's ability to vary user characteristics, application properties, and wide-area network conditions to project traffic characteristics into alternate scenarios.
本文介绍了Swing,一个闭环,网络响应流量生成器,它使用一个简单的结构模型准确地捕获一系列应用程序的数据包交互。从网络中单个点上观察到的流量开始,Swing自动提取用户、应用程序和网络行为的分布。然后,它生成与运行商品网络协议栈的网络仿真环境中的底层模型相对应的实时流量。我们发现生成的迹线在统计上与原始迹线相似。此外,据我们所知,我们是第一个使用适用于各种网络设置的模型在一系列时间尺度上重现流量突发的人。初步的敏感性分析揭示了捕获和重新创建用户、应用程序和网络特征以准确再现此类突发事件的重要性。最后,我们将探讨Swing改变用户特征、应用程序属性和广域网条件的能力,从而将流量特征投射到备选场景中。
{"title":"Realistic and responsive network traffic generation","authors":"K. Vishwanath, Amin Vahdat","doi":"10.1145/1159913.1159928","DOIUrl":"https://doi.org/10.1145/1159913.1159928","url":null,"abstract":"This paper presents Swing, a closed-loop, network-responsive traffic generator that accurately captures the packet interactions of a range of applications using a simple structural model. Starting from observed traffic at a single point in the network, Swing automatically extracts distributions for user, application, and network behavior. It then generates live traffic corresponding to the underlying models in a network emulation environment running commodity network protocol stacks. We find that the generated traces are statistically similar to the original traces. Further, to the best of our knowledge, we are the first to reproduce burstiness in traffic across a range of timescales using a model applicable to a variety of network settings. An initial sensitivity analysis reveals the importance of capturing and recreating user, application, and network characteristics to accurately reproduce such burstiness. Finally, we explore Swing's ability to vary user characteristics, application properties, and wide-area network conditions to project traffic characteristics into alternate scenarios.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128377196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 123
A basic stochastic network calculus 基本的随机网络演算
Yuming Jiang
A basic calculus is presented for stochastic service guarantee analysis in communication networks. Central to the calculus are two definitions, maximum-(virtual)-backlog-centric (m. b. c) stochastic arrival curve and stochastic service curve, which respectively generalize arrival curve and service curve in the deterministic network calculus framework. With m. b. c stochastic arrival curve and stochastic service curve, various basic results are derived under the (min, +)algebra for the general case analysis, which are crucial to the development of stochastic network calculus. These results include (i)superposition of flows, (ii)concatenation of servers, (iii) output characterization, (iv)per-flow service under aggregation, and (v)stochastic backlog and delay guarantees. In addition, to perform independent case analysis, stochastic strict server is defined, which uses an ideal service process and an impairment process to characterize a server. The concept of stochastic strict server not only allows us to improve the basic results (i)-(v)under the independent case, but also provides a convenient way to find the stochastic service curve of a serve. Moreover, an approach is introduced to find the m.b.c stochastic arrival curve of a flow and the stochastic service curve of a server.
提出了通信网络随机服务保障分析的基本演算方法。微积分的核心是两个定义,即最大(虚拟)积压中心(m.b.c)随机到达曲线和随机服务曲线,它们分别推广了确定性网络微积分框架中的到达曲线和服务曲线。利用m. b. c .随机到达曲线和随机服务曲线,在(min, +)代数下得到了一般情况分析的各种基本结果,这对随机网络微积分的发展至关重要。这些结果包括(i)流的叠加,(ii)服务器的连接,(iii)输出特性,(iv)聚合下的每流服务,以及(v)随机积压和延迟保证。另外,为了进行独立的案例分析,定义了随机严格服务器,使用理想服务过程和损伤过程来表征服务器。随机严格发球者的概念不仅使我们可以改进独立情况下的基本结果(i)-(v),而且为寻找发球者的随机发球曲线提供了一种方便的方法。此外,还介绍了一种求流的m.b.c随机到达曲线和服务器的随机服务曲线的方法。
{"title":"A basic stochastic network calculus","authors":"Yuming Jiang","doi":"10.1145/1159913.1159929","DOIUrl":"https://doi.org/10.1145/1159913.1159929","url":null,"abstract":"A basic calculus is presented for stochastic service guarantee analysis in communication networks. Central to the calculus are two definitions, maximum-(virtual)-backlog-centric (m. b. c) stochastic arrival curve and stochastic service curve, which respectively generalize arrival curve and service curve in the deterministic network calculus framework. With m. b. c stochastic arrival curve and stochastic service curve, various basic results are derived under the (min, +)algebra for the general case analysis, which are crucial to the development of stochastic network calculus. These results include (i)superposition of flows, (ii)concatenation of servers, (iii) output characterization, (iv)per-flow service under aggregation, and (v)stochastic backlog and delay guarantees. In addition, to perform independent case analysis, stochastic strict server is defined, which uses an ideal service process and an impairment process to characterize a server. The concept of stochastic strict server not only allows us to improve the basic results (i)-(v)under the independent case, but also provides a convenient way to find the stochastic service curve of a serve. Moreover, an approach is introduced to find the m.b.c stochastic arrival curve of a flow and the stochastic service curve of a server.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129125192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 168
Drafting behind Akamai (travelocity-based detouring) Akamai背后的绘图(基于旅行城市的绕行)
Ao-Jan Su, D. Choffnes, A. Kuzmanovic, F. Bustamante
To enhance web browsing experiences, content distribution networks (CDNs) move web content "closer" to clients by caching copies of web objects on thousands of servers worldwide. Additionally, to minimize client download times, such systems perform extensive network and server measurements, and use them to redirect clients to different servers over short time scales. In this paper, we explore techniques for inferring and exploiting network measurements performed by the largest CDN, Akamai; our objective is to locate and utilize quality Internet paths without performing extensive path probing or monitoring.Our contributions are threefold. First, we conduct a broad measurement study of Akamai's CDN. We probe Akamai's network from 140 PlanetLab vantage points for two months. We find that Akamai redirection times, while slightly higher than advertised, are sufficiently low to be useful for network control. Second, we empirically show that Akamai redirections overwhelmingly correlate with network latencies on the paths between clients and the Akamai servers. Finally, we illustrate how large-scale overlay networks can exploit Akamai redirections to identify the best detouring nodes for one-hop source routing. Our research shows that in more than 50% of investigated scenarios, it is better to route through the nodes "recommended" by Akamai, than to use the direct paths. Because this is not the case for the rest of the scenarios, we develop lowoverhead pruning algorithms that avoid Akamai-driven paths when they are not beneficial.
为了增强web浏览体验,内容分发网络(cdn)通过在全球数千台服务器上缓存web对象的副本,使web内容“更接近”客户端。此外,为了最大限度地减少客户机下载时间,这些系统执行广泛的网络和服务器测量,并使用它们在短时间内将客户机重定向到不同的服务器。在本文中,我们探索了推断和利用最大的CDN Akamai执行的网络测量的技术;我们的目标是定位和利用高质量的互联网路径,而无需执行广泛的路径探测或监控。我们的贡献是三重的。首先,我们对Akamai的CDN进行了广泛的测量研究。我们从行星实验室的140个有利位置对阿卡迈的网络进行了两个月的调查。我们发现,Akamai重定向时间虽然略高于广告,但对于网络控制来说足够低。其次,我们的经验表明,Akamai重定向与客户端和Akamai服务器之间路径上的网络延迟有着压倒性的关联。最后,我们说明了大规模覆盖网络如何利用Akamai重定向来识别单跳源路由的最佳绕路节点。我们的研究表明,在超过50%的调查场景中,通过Akamai“推荐”的节点路由比使用直接路径要好。因为这不是其他场景的情况,所以我们开发了低开销的修剪算法,当akamai驱动的路径无益时,可以避免它们。
{"title":"Drafting behind Akamai (travelocity-based detouring)","authors":"Ao-Jan Su, D. Choffnes, A. Kuzmanovic, F. Bustamante","doi":"10.1145/1159913.1159962","DOIUrl":"https://doi.org/10.1145/1159913.1159962","url":null,"abstract":"To enhance web browsing experiences, content distribution networks (CDNs) move web content \"closer\" to clients by caching copies of web objects on thousands of servers worldwide. Additionally, to minimize client download times, such systems perform extensive network and server measurements, and use them to redirect clients to different servers over short time scales. In this paper, we explore techniques for inferring and exploiting network measurements performed by the largest CDN, Akamai; our objective is to locate and utilize quality Internet paths without performing extensive path probing or monitoring.Our contributions are threefold. First, we conduct a broad measurement study of Akamai's CDN. We probe Akamai's network from 140 PlanetLab vantage points for two months. We find that Akamai redirection times, while slightly higher than advertised, are sufficiently low to be useful for network control. Second, we empirically show that Akamai redirections overwhelmingly correlate with network latencies on the paths between clients and the Akamai servers. Finally, we illustrate how large-scale overlay networks can exploit Akamai redirections to identify the best detouring nodes for one-hop source routing. Our research shows that in more than 50% of investigated scenarios, it is better to route through the nodes \"recommended\" by Akamai, than to use the direct paths. Because this is not the case for the rest of the scenarios, we develop lowoverhead pruning algorithms that avoid Akamai-driven paths when they are not beneficial.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125484128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 212
Minimizing churn in distributed systems 减少分布式系统的混乱
Brighten Godfrey, S. Shenker, I. Stoica
A pervasive requirement of distributed systems is to deal with churn-change in the set of participating nodes due to joins, graceful leaves, and failures. A high churn rate can increase costs or decrease service quality. This paper studies how to reduce churn by selecting which subset of a set of available nodes to use.First, we provide a comparison of the performance of a range of different node selection strategies in five real-world traces. Among our findings is that the simple strategy of picking a uniform-random replacement whenever a node fails performs surprisingly well. We explain its performance through analysis in a stochastic model.Second, we show that a class of strategies, which we call "Preference List" strategies, arise commonly as a result of optimizing for a metric other than churn, and produce high churn relative to more randomized strategies under realistic node failure patterns. Using this insight, we demonstrate and explain differences in performance for designs that incorporate varying degrees of randomization. We give examples from a variety of protocols, including anycast, over-lay multicast, and distributed hash tables. In many cases, simply adding some randomization can go a long way towards reducing churn.
分布式系统的一个普遍需求是处理由于连接、优美的叶子和故障而导致的参与节点集中的频繁变化。高流失率会增加成本或降低服务质量。本文研究了如何通过选择可用节点集合中的哪个子集来减少用户流失。首先,我们比较了不同节点选择策略在五个实际轨迹中的性能。我们的发现之一是,每当节点发生故障时,选择均匀随机替换的简单策略表现得非常好。我们通过随机模型的分析来解释它的性能。其次,我们展示了一类策略,我们称之为“偏好列表”策略,通常是针对流失率以外的指标进行优化的结果,并且在实际节点故障模式下相对于更随机的策略产生更高的流失率。利用这一见解,我们展示并解释了不同程度的随机化设计在性能上的差异。我们给出了各种协议的例子,包括任意播、覆盖多播和分布式哈希表。在许多情况下,简单地添加一些随机性能够有效地减少流失率。
{"title":"Minimizing churn in distributed systems","authors":"Brighten Godfrey, S. Shenker, I. Stoica","doi":"10.1145/1159913.1159931","DOIUrl":"https://doi.org/10.1145/1159913.1159931","url":null,"abstract":"A pervasive requirement of distributed systems is to deal with churn-change in the set of participating nodes due to joins, graceful leaves, and failures. A high churn rate can increase costs or decrease service quality. This paper studies how to reduce churn by selecting which subset of a set of available nodes to use.First, we provide a comparison of the performance of a range of different node selection strategies in five real-world traces. Among our findings is that the simple strategy of picking a uniform-random replacement whenever a node fails performs surprisingly well. We explain its performance through analysis in a stochastic model.Second, we show that a class of strategies, which we call \"Preference List\" strategies, arise commonly as a result of optimizing for a metric other than churn, and produce high churn relative to more randomized strategies under realistic node failure patterns. Using this insight, we demonstrate and explain differences in performance for designs that incorporate varying degrees of randomization. We give examples from a variety of protocols, including anycast, over-lay multicast, and distributed hash tables. In many cases, simply adding some randomization can go a long way towards reducing churn.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122262250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 236
Network monitors and contracting systems: competition and innovation 网络监控和承包系统:竞争和创新
Paul Laskowski, J. Chuang
Today's Internet industry suffers from several well-known pathologies, but none is as destructive in the long term as its resistance to evolution. Rather than introducing new services, ISPs are presently moving towards greater commoditization. It is apparent that the network's primitive system of contracts does not align incentives properly. In this study, we identify the network's lack of accountability as a fundamental obstacle to correcting this problem: Employing an economic model, we argue that optimal routes and innovation are impossible unless new monitoring capability is introduced and incorporated with the contracting system. Furthermore, we derive the minimum requirements a monitoring system must meet to support first-best routing and innovation characteristics. Our work does not constitute a new protocol; rather, we provide practical and specific guidance for the design of monitoring systems, as well as a theoretical framework to explore the factors that influence innovation.
今天的互联网行业有几个众所周知的弊病,但从长远来看,没有一个比它对进化的抵制更具有破坏性。互联网服务提供商目前正在走向更大的商品化,而不是引入新的服务。很明显,网络的原始合约系统并没有恰当地调整激励机制。在本研究中,我们认为网络缺乏问责制是纠正这一问题的根本障碍:我们采用经济模型,认为除非引入新的监控能力并将其纳入合同系统,否则不可能实现最佳路线和创新。此外,我们推导出监控系统必须满足的最低要求,以支持最佳路由和创新特性。我们的工作并不构成一项新的议定书;相反,我们为监测系统的设计提供了实践和具体的指导,并为探索影响创新的因素提供了理论框架。
{"title":"Network monitors and contracting systems: competition and innovation","authors":"Paul Laskowski, J. Chuang","doi":"10.1145/1159913.1159935","DOIUrl":"https://doi.org/10.1145/1159913.1159935","url":null,"abstract":"Today's Internet industry suffers from several well-known pathologies, but none is as destructive in the long term as its resistance to evolution. Rather than introducing new services, ISPs are presently moving towards greater commoditization. It is apparent that the network's primitive system of contracts does not align incentives properly. In this study, we identify the network's lack of accountability as a fundamental obstacle to correcting this problem: Employing an economic model, we argue that optimal routes and innovation are impossible unless new monitoring capability is introduced and incorporated with the contracting system. Furthermore, we derive the minimum requirements a monitoring system must meet to support first-best routing and innovation characteristics. Our work does not constitute a new protocol; rather, we provide practical and specific guidance for the design of monitoring systems, as well as a theoretical framework to explore the factors that influence innovation.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132052610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Understanding the network-level behavior of spammers 了解垃圾邮件发送者的网络级行为
Anirudh Ramachandran, N. Feamster
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persistent across time each spamming host is, and characteristics of spamming botnets. We try to answer these questions by analyzing a 17-month trace of over 10 million spam messages collected at an Internet "spam sinkhole", and by correlating this data with the results of IP-based blacklist lookups, passive TCP fingerprinting information, routing information, and botnet "command and control" traces.We find that most spam is being sent from a few regions of IP address space, and that spammers appear to be using transient "bots" that send only a few pieces of email over very short periods of time. Finally, a small, yet non-negligible, amount of spam is received from IP addresses that correspond to short-lived BGP routes, typically for hijacked prefixes. These trends suggest that developing algorithms to identify botnet membership, filtering email messages based on network-level properties (which are less variable than email content), and improving the security of the Internet routing infrastructure, may prove to be extremely effective for combating spam.
本文研究了垃圾邮件发送者的网络级行为,包括:发送最多垃圾邮件的IP地址范围,常见的垃圾邮件模式(例如,BGP路由劫持,bot),每个垃圾邮件主机的持续时间,以及垃圾邮件僵尸网络的特征。我们试图通过分析在互联网“垃圾邮件坑”收集的超过1000万条垃圾邮件的17个月跟踪来回答这些问题,并将这些数据与基于ip的黑名单查找结果、被动TCP指纹信息、路由信息和僵尸网络“命令和控制”跟踪相关联。我们发现大多数垃圾邮件是从IP地址空间的几个区域发送的,而且垃圾邮件发送者似乎使用临时“机器人”,在很短的时间内只发送几封电子邮件。最后,从与短寿命BGP路由对应的IP地址(通常是被劫持的前缀)接收到的垃圾邮件数量很少,但不可忽略。这些趋势表明,开发识别僵尸网络成员的算法,根据网络级属性(比电子邮件内容变化更小)过滤电子邮件消息,以及提高互联网路由基础设施的安全性,可能对打击垃圾邮件非常有效。
{"title":"Understanding the network-level behavior of spammers","authors":"Anirudh Ramachandran, N. Feamster","doi":"10.1145/1159913.1159947","DOIUrl":"https://doi.org/10.1145/1159913.1159947","url":null,"abstract":"This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persistent across time each spamming host is, and characteristics of spamming botnets. We try to answer these questions by analyzing a 17-month trace of over 10 million spam messages collected at an Internet \"spam sinkhole\", and by correlating this data with the results of IP-based blacklist lookups, passive TCP fingerprinting information, routing information, and botnet \"command and control\" traces.We find that most spam is being sent from a few regions of IP address space, and that spammers appear to be using transient \"bots\" that send only a few pieces of email over very short periods of time. Finally, a small, yet non-negligible, amount of spam is received from IP addresses that correspond to short-lived BGP routes, typically for hijacked prefixes. These trends suggest that developing algorithms to identify botnet membership, filtering email messages based on network-level properties (which are less variable than email content), and improving the security of the Internet routing infrastructure, may prove to be extremely effective for combating spam.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116365775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 654
Beyond bloom filters: from approximate membership checks to approximate state machines 超越布隆过滤器:从近似成员检查到近似状态机
F. Bonomi, M. Mitzenmacher, R. Panigrahy, Sushil Singh, G. Varghese
Many networking applications require fast state lookups in a concurrent state machine,which tracks the state of a large number of flows simultaneously.We consider the question of how to compactly represent such concurrent state machines. To achieve compactness,we consider data structures for Approximate Concurrent State Machines (ACSMs)that can return false positives,false negatives,or a "don 't know "response.We describe three techniques based on Bloom filters and hashing,and evaluate them using both theoretical analysis and simulation.Our analysis leads us to an extremely efficient hashing-based scheme with several parameters that can be chosen to trade off space,computation,and the pact of errors.Our hashing approach also yields a simple alternative structure with the same functionality as a counting Bloom filter that uses much less space.We show how ACSMs can be used for video congestion control.Using an ACSM,a router can implement sophisticated Active Queue Management (AQM)techniques for video traffic (without the need for standards changes to mark packets or change video formats),with a factor of four reduction in memory compared to full-state schemes and with very little error.We also show that ACSMs show promise for real-time detection of P2P traffic.
许多网络应用程序需要在并发状态机中进行快速状态查找,并发状态机可以同时跟踪大量流的状态。我们考虑如何紧凑地表示这种并发状态机的问题。为了实现紧凑性,我们考虑了近似并发状态机(acsm)的数据结构,它可以返回假阳性、假阴性或“不知道”响应。我们描述了基于布隆过滤器和哈希的三种技术,并使用理论分析和仿真对它们进行了评估。我们的分析使我们得到了一个非常有效的基于散列的方案,该方案有几个参数,可以选择这些参数来权衡空间、计算和错误。我们的哈希方法也产生了一个简单的替代结构,其功能与计数布隆过滤器相同,使用的空间更少。我们将展示ACSMs如何用于视频拥塞控制。使用ACSM,路由器可以为视频流量实现复杂的活动队列管理(AQM)技术(不需要更改标准来标记数据包或更改视频格式),与全状态方案相比,内存减少了四倍,而且错误很少。我们还表明ACSMs有望用于P2P流量的实时检测。
{"title":"Beyond bloom filters: from approximate membership checks to approximate state machines","authors":"F. Bonomi, M. Mitzenmacher, R. Panigrahy, Sushil Singh, G. Varghese","doi":"10.1145/1159913.1159950","DOIUrl":"https://doi.org/10.1145/1159913.1159950","url":null,"abstract":"Many networking applications require fast state lookups in a concurrent state machine,which tracks the state of a large number of flows simultaneously.We consider the question of how to compactly represent such concurrent state machines. To achieve compactness,we consider data structures for Approximate Concurrent State Machines (ACSMs)that can return false positives,false negatives,or a \"don 't know \"response.We describe three techniques based on Bloom filters and hashing,and evaluate them using both theoretical analysis and simulation.Our analysis leads us to an extremely efficient hashing-based scheme with several parameters that can be chosen to trade off space,computation,and the pact of errors.Our hashing approach also yields a simple alternative structure with the same functionality as a counting Bloom filter that uses much less space.We show how ACSMs can be used for video congestion control.Using an ACSM,a router can implement sophisticated Active Queue Management (AQM)techniques for video traffic (without the need for standards changes to mark packets or change video formats),with a factor of four reduction in memory compared to full-state schemes and with very little error.We also show that ACSMs show promise for real-time detection of P2P traffic.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133950748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 197
Algorithms to accelerate multiple regular expressions matching for deep packet inspection 深度包检测中多个正则表达式匹配加速算法
S. Sushanth Kumar, Sarang Dharmapurikar, Fang Yu, P. Crowley, J. Turner
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most high performance systems that perform deep packet inspection implement simple string matching algorithms to match packets against a large, but finite set of strings. owever, there is growing interest in the use of regular expression-based pattern matching, since regular expressions offer superior expressive power and flexibility. Deterministic finite automata (DFA) representations are typically used to implement regular expressions. However, DFA representations of regular expression sets arising in network applications require large amounts of memory, limiting their practical application.In this paper, we introduce a new representation for regular expressions, called the Delayed Input DFA (D2FA), which substantially reduces space equirements as compared to a DFA. A D2FA is constructed by transforming a DFA via incrementally replacing several transitions of the automaton with a single default transition. Our approach dramatically reduces the number of distinct transitions between states. For a collection of regular expressions drawn from current commercial and academic systems, a D2FA representation reduces transitions by more than 95%. Given the substantially reduced space equirements, we describe an efficient architecture that can perform deep packet inspection at multi-gigabit rates. Our architecture uses multiple on-chip memories in such a way that each remains uniformly occupied and accessed over a short duration, thus effectively distributing the load and enabling high throughput. Our architecture can provide ostffective packet content scanning at OC-192 rates with memory requirements that are consistent with current ASIC technology.
为了提高网络安全性和提供特定于应用程序的服务,对能够检查数据包内容的网络设备的需求日益增长。大多数执行深度包检测的高性能系统实现简单的字符串匹配算法,以根据大量但有限的字符串集匹配数据包。然而,人们对使用基于正则表达式的模式匹配越来越感兴趣,因为正则表达式提供了优越的表达能力和灵活性。确定性有限自动机(DFA)表示通常用于实现正则表达式。然而,在网络应用程序中产生的正则表达式集的DFA表示需要大量内存,限制了它们的实际应用。在本文中,我们引入了一种新的正则表达式表示,称为延迟输入DFA (D2FA),与DFA相比,它大大减少了空间需求。D2FA是通过用单个默认转换增量地替换自动机的多个转换来转换DFA来构造的。我们的方法极大地减少了状态之间不同转换的数量。对于来自当前商业和学术系统的正则表达式集合,D2FA表示减少了95%以上的转换。考虑到大幅减少的空间需求,我们描述了一种能够以千兆位速率执行深度数据包检测的高效架构。我们的架构使用多个片上存储器,使每个存储器在短时间内保持均匀占用和访问,从而有效地分配负载并实现高吞吐量。我们的架构可以在OC-192速率下提供有效的数据包内容扫描,其内存要求与当前的ASIC技术一致。
{"title":"Algorithms to accelerate multiple regular expressions matching for deep packet inspection","authors":"S. Sushanth Kumar, Sarang Dharmapurikar, Fang Yu, P. Crowley, J. Turner","doi":"10.1145/1159913.1159952","DOIUrl":"https://doi.org/10.1145/1159913.1159952","url":null,"abstract":"There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most high performance systems that perform deep packet inspection implement simple string matching algorithms to match packets against a large, but finite set of strings. owever, there is growing interest in the use of regular expression-based pattern matching, since regular expressions offer superior expressive power and flexibility. Deterministic finite automata (DFA) representations are typically used to implement regular expressions. However, DFA representations of regular expression sets arising in network applications require large amounts of memory, limiting their practical application.In this paper, we introduce a new representation for regular expressions, called the Delayed Input DFA (D2FA), which substantially reduces space equirements as compared to a DFA. A D2FA is constructed by transforming a DFA via incrementally replacing several transitions of the automaton with a single default transition. Our approach dramatically reduces the number of distinct transitions between states. For a collection of regular expressions drawn from current commercial and academic systems, a D2FA representation reduces transitions by more than 95%. Given the substantially reduced space equirements, we describe an efficient architecture that can perform deep packet inspection at multi-gigabit rates. Our architecture uses multiple on-chip memories in such a way that each remains uniformly occupied and accessed over a short duration, thus effectively distributing the load and enabling high throughput. Our architecture can provide ostffective packet content scanning at OC-192 rates with memory requirements that are consistent with current ASIC technology.","PeriodicalId":109155,"journal":{"name":"Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124295062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 557
期刊
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1