CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report)

07/16/2018
by   Hao Wu, et al.
0

The detection of network flows that send excessive amounts of traffic is of increasing importance to enforce QoS and to counter DDoS attacks. Large-flow detection has been previously explored, but the proposed approaches can be used on high-capacity core routers only at the cost of significantly reduced accuracy, due to their otherwise too high memory and processing overhead. We propose CLEF, a new large-flow detection scheme with low memory requirements, which maintains high accuracy under the strict conditions of high-capacity core routers. We compare our scheme with previous proposals through extensive theoretical analysis, and with an evaluation based on worst-case-scenario attack traffic. We show that CLEF outperforms previously proposed systems in settings with limited memory.

READ FULL TEXT
research
08/06/2018

Outlier detection on network flow analysis

It is important to be able to detect and classify malicious network traf...
research
12/10/2018

Crossfire Attack Detection using Deep Learning in Software Defined ITS Networks

Recent developments in intelligent transport systems (ITS) based on smar...
research
05/05/2021

Dynamic QoS-Aware Traffic Planning for Time-Triggered Flows with Conflict Graphs

Many networked applications, e.g., in the domain of cyber-physical syste...
research
12/11/2019

LightFDG: An Integrated Approach to Flow Detection and Grooming in Optical Wireless DCNs

LightFDG is an integrated approach to flow detection (FD) and flow groom...
research
09/06/2022

DFI: An Interprocedural Value-Flow Analysis Framework that Scales to Large Codebases

Context- and flow-sensitive value-flow information is an important build...
research
05/01/2020

Evaluation of Elephant-based Algorithms for Flow Table Reduction under Realistic Traffic Distributions

The majority of Internet traffic is caused by a relatively small number ...
research
08/22/2018

DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning

Flow correlation is the core technique used in a multitude of deanonymiz...

Please sign up or login with your details

Forgot password? Click here to reset