Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows

02/02/2021
by   Simon Scherrer, et al.
0

Current probabilistic flow-size monitoring can only detect heavy hitters (e.g., flows utilizing 10 times their permitted bandwidth), but cannot detect smaller overuse (e.g., flows utilizing 50-100 bandwidth). Thus, these systems lack accuracy in the challenging environment of high-throughput packet processing, where fast-memory resources are scarce. Nevertheless, many applications rely on accurate flow-size estimation, e.g. for network monitoring, anomaly detection and Quality of Service. We design, analyze, implement, and evaluate LOFT, a new approach for efficiently detecting overuse flows that achieves dramatically better properties than prior work. LOFT can detect 1.5x overuse flows in one second, whereas prior approaches fail to detect 2x overuse flows within a timeout of 300 seconds. We demonstrate LOFT's suitability for high-speed packet processing with implementations in the DPDK framework and on an FPGA.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 2

page 4

page 5

page 6

page 8

page 9

page 12

page 13

11/16/2019

Memory-Efficient Performance Monitoring on Programmable Switches with Lean Algorithms

Network performance problems are notoriously difficult to diagnose. Prio...
06/15/2020

Why Normalizing Flows Fail to Detect Out-of-Distribution Data

Detecting out-of-distribution (OOD) data is crucial for robust machine l...
12/05/2018

HashFlow For Better Flow Record Collection

Collecting flow records is a common practice of network operators and re...
02/11/2019

Scaling Up Anomaly Detection Using In-DRAM Working Set of Active Flows Table

In the zettabyte era, per-flow measurement becomes more challenging owin...
12/11/2019

LightFDG: An Integrated Approach to Flow Detection and Grooming in Optical Wireless DCNs

LightFDG is an integrated approach to flow detection (FD) and flow groom...
09/23/2018

Fundamental Limits of Invisible Flow Fingerprinting

Network flow fingerprinting can be used to de-anonymize communications o...
09/27/2021

HTBQueue: A Hierarchical Token Bucket Implementation for the OMNeT++/INET Framework

The hierarchical token bucket (HTB) algorithm allows to specify per-flow...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.