首页 > 最新文献

2020 IFIP Networking Conference (Networking)最新文献

英文 中文
Joint Coreset Construction and Quantization for Distributed Machine Learning 分布式机器学习的联合核心集构建与量化
Pub Date : 2020-06-01 DOI: 10.48550/arXiv.2204.06652
Hanlin Lu, Changchang Liu, Shiqiang Wang, T. He, V. Narayanan, Kevin S. Chan, Stephen Pasteris
Coresets are small, weighted summaries of larger datasets, aiming at providing provable error bounds for machine learning (ML) tasks while significantly reducing the communication and computation costs. To achieve a better trade-off between ML error bounds and costs, we propose the first framework to incorporate quantization techniques into the process of coreset construction. Specifically, we theoretically analyze the ML error bounds caused by a combination of coreset construction and quantization. Based on that, we formulate an optimization problem to minimize the ML error under a fixed budget of communication cost. To improve the scalability for large datasets, we identify two proxies of the original objective function, for which efficient algorithms are developed. For the case of data on multiple nodes, we further design a novel algorithm to allocate the communication budget to the nodes while minimizing the overall ML error. Through extensive experiments on multiple real-world datasets, we demonstrate the effectiveness and efficiency of our proposed algorithms for a variety of ML tasks. In particular, our algorithms have achieved more than 90% data reduction with less than 10% degradation in ML performance in most cases.
核心集是大型数据集的小型加权摘要,旨在为机器学习(ML)任务提供可证明的误差界限,同时显着降低通信和计算成本。为了在机器学习错误边界和成本之间实现更好的权衡,我们提出了第一个将量化技术纳入核心集构建过程的框架。具体来说,我们从理论上分析了由核集构建和量化相结合引起的机器学习误差范围。在此基础上,提出了在固定通信成本预算下最小化机器学习误差的优化问题。为了提高大数据集的可扩展性,我们确定了原始目标函数的两个代理,并为此开发了有效的算法。对于数据在多个节点上的情况,我们进一步设计了一种新的算法来分配通信预算给节点,同时最小化总体ML误差。通过对多个真实世界数据集的广泛实验,我们证明了我们提出的算法在各种ML任务中的有效性和效率。特别是,我们的算法在大多数情况下实现了超过90%的数据减少,ML性能下降不到10%。
{"title":"Joint Coreset Construction and Quantization for Distributed Machine Learning","authors":"Hanlin Lu, Changchang Liu, Shiqiang Wang, T. He, V. Narayanan, Kevin S. Chan, Stephen Pasteris","doi":"10.48550/arXiv.2204.06652","DOIUrl":"https://doi.org/10.48550/arXiv.2204.06652","url":null,"abstract":"Coresets are small, weighted summaries of larger datasets, aiming at providing provable error bounds for machine learning (ML) tasks while significantly reducing the communication and computation costs. To achieve a better trade-off between ML error bounds and costs, we propose the first framework to incorporate quantization techniques into the process of coreset construction. Specifically, we theoretically analyze the ML error bounds caused by a combination of coreset construction and quantization. Based on that, we formulate an optimization problem to minimize the ML error under a fixed budget of communication cost. To improve the scalability for large datasets, we identify two proxies of the original objective function, for which efficient algorithms are developed. For the case of data on multiple nodes, we further design a novel algorithm to allocate the communication budget to the nodes while minimizing the overall ML error. Through extensive experiments on multiple real-world datasets, we demonstrate the effectiveness and efficiency of our proposed algorithms for a variety of ML tasks. In particular, our algorithms have achieved more than 90% data reduction with less than 10% degradation in ML performance in most cases.","PeriodicalId":231191,"journal":{"name":"2020 IFIP Networking Conference (Networking)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Practical Analysis on Mirai Botnet Traffic Mirai僵尸网络流量的实际分析
Pub Date : 2020-06-01 DOI: 10.5281/ZENODO.3966899
Getoar Gallopeni, B. Rodrigues, M. Franco, B. Stiller
Distributed Denial-of-Service (DDoS) attacks are one of the biggest threats to the availability of Internet services. Behind these attacks are Botnets, such as Mirai, which exploits default and weak security credentials to take control of the host and spreads itself to other devices. This paper demonstrates a Mirai traffic analysis based on on DNS heavy-hitters streams and Mirai scanning patterns by simulating an attack and the extraction of traffic data. The Mirai Command-and-Control (CnC) traffic as well as its scanning traffic are analyzed in a local Testbed composed of six ASUS Tinker Board devices (RaspberryPi like devices) cluster nodes and a MikroTik’s RouterOS to route traffic in different internal networks. In addition to the analysis of traffic flow patterns a real-time mitigation is demonstrated in the experiments.
分布式拒绝服务(DDoS)攻击是对Internet服务可用性的最大威胁之一。这些攻击的背后是僵尸网络,比如Mirai,它利用默认和薄弱的安全证书来控制主机,并将自己传播到其他设备。本文通过模拟攻击和提取流量数据,演示了基于DNS重型攻击流和Mirai扫描模式的Mirai流量分析。Mirai命令与控制(CnC)流量及其扫描流量在本地测试平台上进行分析,该测试平台由六个ASUS Tinker Board设备(类似RaspberryPi的设备)集群节点和一个MikroTik的RouterOS组成,以在不同的内部网络中路由流量。除了分析交通流模式外,还在实验中验证了实时缓解措施。
{"title":"A Practical Analysis on Mirai Botnet Traffic","authors":"Getoar Gallopeni, B. Rodrigues, M. Franco, B. Stiller","doi":"10.5281/ZENODO.3966899","DOIUrl":"https://doi.org/10.5281/ZENODO.3966899","url":null,"abstract":"Distributed Denial-of-Service (DDoS) attacks are one of the biggest threats to the availability of Internet services. Behind these attacks are Botnets, such as Mirai, which exploits default and weak security credentials to take control of the host and spreads itself to other devices. This paper demonstrates a Mirai traffic analysis based on on DNS heavy-hitters streams and Mirai scanning patterns by simulating an attack and the extraction of traffic data. The Mirai Command-and-Control (CnC) traffic as well as its scanning traffic are analyzed in a local Testbed composed of six ASUS Tinker Board devices (RaspberryPi like devices) cluster nodes and a MikroTik’s RouterOS to route traffic in different internal networks. In addition to the analysis of traffic flow patterns a real-time mitigation is demonstrated in the experiments.","PeriodicalId":231191,"journal":{"name":"2020 IFIP Networking Conference (Networking)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128799976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Tracking Down Sources of Spoofed IP Packets 跟踪欺骗IP报文的来源
Pub Date : 2019-12-09 DOI: 10.1145/3360468.3368175
O. Fonseca, Ítalo F. S. Cunha, E. Fazzion, Brivaldo Junior, R. Ferreira, Ethan Katz-Bassett
The lack of authentication in the Internet’s data plane allows hosts to falsify (spoof) the source IP address in packet headers, which forms the basis for amplification denialof-service (DoS) attacks. Current approaches to locate sources of spoofed traffic lack coverage or are not deployable today. We propose a mechanism that a network with multiple peering links can use to coarsely locate the sources of spoofed traffic in the Internet. More precisely, the network can monitor and map spoofed traffic arriving on a peering link to the set of sources routed toward that link. We propose mechanisms the network can use to systematically vary BGP announcement configurations to induce changes to Internet routes and to the set of sources routed to each peering link. A network using our technique can correlate observations over multiple configurations to more precisely delineate regions sending spoofed traffic. Evaluation of our techniques on the Internet shows that they can partition the Internet into small regions, allowing targeted intervention.
由于Internet数据平面缺乏身份验证,主机可以在数据包头中伪造(欺骗)源IP地址,这为放大拒绝服务(DoS)攻击提供了基础。目前定位欺骗流量来源的方法缺乏覆盖,或者目前无法部署。我们提出了一种机制,一个具有多个对等链路的网络可以使用它来粗略地定位互联网中欺骗流量的来源。更准确地说,网络可以监控并映射通过对等链路到达的欺骗流量到路由到该链路的一组源。我们提出了网络可以使用的机制来系统地改变BGP公告配置,以诱导Internet路由和路由到每个对等链路的源集的变化。使用我们的技术的网络可以将多个配置的观测结果关联起来,以更精确地描绘发送欺骗流量的区域。我们的技术在互联网上的评估表明,它们可以将互联网划分为小区域,允许有针对性的干预。
{"title":"Tracking Down Sources of Spoofed IP Packets","authors":"O. Fonseca, Ítalo F. S. Cunha, E. Fazzion, Brivaldo Junior, R. Ferreira, Ethan Katz-Bassett","doi":"10.1145/3360468.3368175","DOIUrl":"https://doi.org/10.1145/3360468.3368175","url":null,"abstract":"The lack of authentication in the Internet’s data plane allows hosts to falsify (spoof) the source IP address in packet headers, which forms the basis for amplification denialof-service (DoS) attacks. Current approaches to locate sources of spoofed traffic lack coverage or are not deployable today. We propose a mechanism that a network with multiple peering links can use to coarsely locate the sources of spoofed traffic in the Internet. More precisely, the network can monitor and map spoofed traffic arriving on a peering link to the set of sources routed toward that link. We propose mechanisms the network can use to systematically vary BGP announcement configurations to induce changes to Internet routes and to the set of sources routed to each peering link. A network using our technique can correlate observations over multiple configurations to more precisely delineate regions sending spoofed traffic. Evaluation of our techniques on the Internet shows that they can partition the Internet into small regions, allowing targeted intervention.","PeriodicalId":231191,"journal":{"name":"2020 IFIP Networking Conference (Networking)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115829003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2020 IFIP Networking Conference (Networking)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1