Most memory efficient distributed super points detection on core networks

12/17/2018 ∙ by Jie Xu, et al. ∙ NetEase, Inc 0

The super point, a host which communicates with lots of others, is a kind of special hosts gotten great focus. Mining super point at the edge of a network is the foundation of many network research fields. In this paper, we proposed the most memory efficient super points detection scheme. This scheme contains a super points reconstruction algorithm called short estimator and a super points filter algorithm called long estimator. Short estimator gives a super points candidate list using thousands of bytes memory and long estimator improves the accuracy of detection result using millions of bytes memory. Combining short estimator and long estimator, our scheme acquires the highest accuracy using the smallest memory than other algorithms. There is no data confliction and floating operation in our scheme. This ensures that our scheme is suitable for parallel running and we deploy our scheme on a common GPU to accelerate processing speed. Experiments on several real-world core network traffics show that our algorithm acquires the highest accuracy with only consuming littler than one-fifth memory of other algorithms.

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

1 Introduction

With the developing of the network, thousands of Gigabytes data pass through the Internet every second [6]. It is too expensive to monitor every host in the network. An efficient way is to focus on special ones which have great influence on the network security and management. The super point, a host which communicates with lots of others, is one of such special hosts playing important roles in the network, such as Web servers[15][20], P2P spreaders[4][17], DDoS victims[22][25], scanners[9][3] and so on. Detecting super point can help us with network management and security. It is also a foundation module of many instruction detection system[16].

For example, DDoS (Distributed Denial of Service) attack is a heavy threat to the Internet[12][10]. It appears at the beginning of the Internet and becomes complex with the rapid growth of the network technology. Although many defense algorithms have been proposed, most of them are too elaborate to deploy in the high-speed network. The peculiarity of a victim under DDoS attack is that it will receive huge packets with different source IP addresses in a short period. A DDoS victim is a typical super point. Super point only accounts for a small fraction of the overall hosts. If we detect super points first and spend more monitoring resource to them, we can defense DDoS much more efficiently. Real-time super points detection on the core network is an important step of these applications.

The speed of nowadays network is growing rapidly. For a core network, it always contains several border routers which locate at different places. How to detect overall super points from all of these distributed routers is more difficult than from a small single router. A distributed super points detection algorithm should satisfy following criteria:

  1. High accuracy.

  2. Small memory requirement.

  3. Real-time packets processing time.

A high accuracy algorithm should detect out all super points and does not report normal hosts as super points by mistake. Many researchers try to use small and fast memory, such as static random accessing memory SRAM[13][14], to detect super point. These algorithms used estimating method to record hosts’ cardinalities, the opposite hosts number during a time period. But the accuracy of these algorithms will decrease with the reduction of memory. Parallel computation ability of GPU (Graphic Processing Unit) is stronger than that of CPU because of its plenty operating cores. When using GPU to scan packets parallel, we would get a high throughput and that is what we do in this paper.

To overcome previous algorithms’ weakness, we devise a novel distributed super points detection algorithm which has the highest accuracy but consumes smaller than one-fifth memory used by other algorithms. The contributions of this paper are listed following:

  1. A tiny super points detection algorithm is proposed in this paper.

  2. A high accuracy super points filtering algorithm is proposed.

  3. We design the most memory efficient scheme for distributed super points detection.

  4. We extend our algorithm to sliding time window by adopting a more powerful counter.

  5. We implement our algorithm on GPU for real-time super point detection on core network traffic.

In the next section, we will introduce other super point detection algorithms and analyze their merit and weakness. In section 3, our novel memory efficient algorithm will be represented in detail. How to deploy our algorithm in GPU is described in section 4. In section 5, we describe how to run our algorithm under sliding time window. Section 6 shows experiments of our algorithm compared with other ones. And we make a conclusion in the last section.

2 Related work

Super point detection is a hot topic in network research field. Shobha et al.[21] proposed an algorithm that did not keep the state of every host so this algorithm can scale very well. Cao et al.[4] used a pair-based sampling method to eliminate the majority of low opposite number hosts and reserved more resource to estimate the opposite number of the resting hosts. Estan et al.[8] proposed two bits map algorithms based on sampling flows. Several hosts could share a bit of this map to reduce memory consumption. All of these methods were based on sampling flows which limited their accuracy.

In these previous algorithms, only a few were suitable for running in distributed environment[23][13][18].

Wang et al.[23] devised a novel structure, called double connection degree sketch (DCDS), to store and estimate different hosts cardinalities. They updated DCDS by setting several bits to one simply. In order to restore super points at the end of a time period, which bits to be updated were determined by Chinese Remainder Theory(CRT) when parsing a packet. By using CRT, every bit of DCDS could be shared by different hosts. But the computing process of CRT was very complex which limited the speed of this algorithm.

Liu et al.[13]

proposed a simple method to restore super hosts basing on bloom filter. They called this algorithm as Vector Bloom Filter(VBF). VBF used the bits extracted from IP address to decide which bits to be updated when scanning a packet. Compared with CRT, bit extraction only needed a small operation. But VBF would consume much time to restore super point when the number of super points was very big because it used four bit arrays to record cardinalities.

Most of the previous works only focused on accelerating speed by adapting fast memory but neglected the calculation ability of processors. Seon-Ho et al.[18] first used GPU to estimate hosts opposite numbers. They devised a Collision-tolerant hash table to filter flows from origin traffic and used a bitmap data structure to record and estimate hosts’ opposite numbers. But this method needed to store IP address of every flow while scanning traffic because they could not restore super points from the bitmap directly. Additional candidate IP address storing space increased the memory requirement of this algorithm.

To reduce transmission data in the distributed environment, we devise a novel super point opposite number estimator which can tell if a host is a super point with only 8 bits. Base on this memory efficient estimator, a smart super point restoring algorithm is devised. We will describe our novel algorithm in the following section.

3 Super point detection

The Super point is a host which contacts with many others in a time period . “Other host” here has different means under different cases. When monitoring opposite IP at a host’s network card, other host means every one that sends packets to or receives packets from this host. But this kind of opposite IPs could only be counted by each host self. Generally, a host is locating in a network managed by some Internet Service Providers (ISP). The managers of this subnetwork hope to get information about the traffic between their network and others. From the inspection of ISP, opposite host represents one that being watched at the edge of ISP’s subnetwork. Edge of a network means a set of routers forwarding packets between this network and other networks. When monitoring traffic between different network, a router could be regarded as a watch point(WP).

Let SNet represent the subnetwork managed by an ISP and ONet represent the set of other network communicating with SNet through its edge routers. When detecting the super point at the edge of SNet, the set of a host’s opposite IP addresses is defined as below.

Definition 1 (Opposite IP set/ Opposite IP number)

For a host in SNet or ONet, its Opposite IP set is the set of IP addresses communicating with it over a certain time period through the edge of SNet written as . ’s opposite IP number is the number of elements in denoted as .

Then we can give the definition of the super point used in this paper.

Definition 2 (Super point)

In a certain time period T, if a host in or has no less than opposite IPs, , is a super point.

Super points may be located in or . Both of these super points could be found out by the same algorithm with changing the order of IP addresses. In the rest of this paper, super point means SNet’s super point briefly. Opposite IP number estimation is the foundation of super point detection. In this paper, we proposed two novel estimators: short estimator and long estimator.

3.1 Short Estimator

In order to judge if a host is a super point, we should record its opposite IP addresses while scanning packets sending to it or it receives. The estimation accuracy is related to the size of memory using to record opposite number. The bigger the size of allocating memory, the more accuracy the result will be. One of the most memory efficient algorithms is OPT proposed by Daniel et al. [11]. But the computing complex of OPT is very complex. In this paper, we proposed a more memory efficient algorithm derived from OPT to judge if the opposite IP’s number is more than a threshold . We call this method as Short Estimator(SE) because it uses only 8 bits, much shorter than other algorithms consumed.

Suppose that SE consists of bits. 8 is big enough for when host’s IP address is version 4. Every bit of SE is initialized to 0 at the begin of a time period. When receiving a packet related to host , ’s opposite IP address in this packet will update a bit of SE if the least significant bit of ’s randomly hashed value is bigger than an integer . is firstly hashed by a random hash function[5]

to make sure that the hashed value is uniform distribution.

will map an integer between 0 and to another random value in the same range.

If , one bit in SE, seleted by another hash function , will be set to 1. map an integer between 0 and to a random value between 0 and .

is an integer derived from by the following equation:

(1)

Function ceil(x) returns the smallest integer no less than x. After scanning all ’s relevant packets, we can judge if is bigger than by counting the number of “1” bits in SE. The number of “1” bits in SE is also called the weight of SE, written as . If , is judged as bigger than .

We have introduced how to judge if a single host is a super point by SE. But there are millions of host in the network and it’s not reasonable to allocate a SE for each of them because of the following two reasons:

  1. Too many memory is required. A core network always contains millions of host. For an IP address of version 4, it will consume 4 bytes. Together with 8 bits used by an SE, each host requires 5 bytes. For a core network containing 100 millions of hosts, we will allocate more than 500 millions of bytes. Such big size of memory is a heavy burden for both memory allocation on server and transmission in the distributed environment.

  2. The memory location is very difficult for huge hosts. IP addresses of hosts are widely distributed between 0 and , especially for IP addresses of ONet. How to store and access these randomly hosts efficiently is a hard task. No matter storing these IP addresses in a list or hash table, we have to spend much time in memory accession.

To overcome previous questions, we design an SE sharing structure which can use a fixed number of SE to judge and restore lots of hosts. In the next section, we will introduce super point restoring algorithm based on SE.

3.2 Restoring super points by short estimator

Without allocating an SE for each host, we won’t know the IP address of super point. In order to detect super points at the end of a time period, we have to reconstruction IP address from our data structure. This requires that our data structure will contain enough IP address information when updating. Based on this requirement, we design a novel structure called Short Estimator Array, written as SEA, which can avoid keeping huge SE instances but can restore super point easily.

From the name of the SEA, we can see that it is an array of SE. SEA has rows and the th row contains SEs. When receiving a packet, we extract an IP pair with format from it where is the IP address of the host that we want to monitor and is its opposite IP address. An SE in each row of the SEA will record . decides which SE of each row is chosen. Because there are huge hosts in the network, using a single SEA would cause that its SEs is overshared by many hosts. “Overshare” means there are too many hosts map to the same SE. So we use SEAs and each SEA record a part of traffic. We call these SEAs as SEA Vector (SEAV). Using which SEA to record and estimate a host’s opposite IP number is decided by the rightest bits of the host. We call the right r bits of a host as Right Part (RP) and the rest left 32-r bits as the Left Part (LP). Figure 1 shows how to choose SEA to record opposite IP number.

Figure 1: Short estimarot arrays vector

For a certain SEA in SEAV, RP of a host is clear and only LP is unknown. When choosing a SE to update, we extract several successive bits from ’s LP as the index of SE in each row. SE’s index, written as , means the th row’s column identifier of SE relating to a host whose LP is . If every bit of LP is contained in one or more SEs’ indexes, we can restore LP by extracting and concatenating bits in all these indexes. To explain how to get of each row, we give the following declaration:

Definition 3 (index starting bit)

For the th row in a SEA, its index starting bit is a bit in the LP from which we begin to extract sub bits of the LP.

Definition 4 (Index Bits Number)

For the th row in a SEA, its index bits number is the number of bits that we would extract from the LP.

decides the number of , which is written as , in the th row. We can acquire by and . Let point to the th bit of and represent the th bit of . Every bit of could be determined by the following equation.

(2)

Where and . The value of and should obey two constraints.

  1. Every bit of locates in at least one index. This constraint makes sure that could be reconstructed from the indexes. In another word, for , there is at least a that let .

  2. One index should have several bits same to its next index part. These duplicating bits could help us to remove fake candidate IP addresses efficiently. For , .

The rows number will affect and . When choose a bigger number, the first condition could be matched even all s are small. For example, we can set the value of equal to and , where and is a positive integer. When is fixed, will decrease with the increasing of . Small causes small memory consumption of SEA. Because each packet will be updated by s, when is very big, the updating time will increase too. Considering that the memory requirement of a single SE is very small, only one byte, we can set to a small value such as 3 or 4.

At the end of a time period, super points will be restored from SEVA. By equation 2, we can see that each bit of could be recovered from the set of by a reverse equation as shown below.

(3)

Where , , and .

But when update SEAV, we do not record . We can derive that if a host is a super point, will contain no less than 3 ‘1’ bits. We call these SE whose weight is no less than 3 as Hot SE (HSE). Let represent the set of HSE in the th row.

By picking HSEs from every , we can get a candidate index set where and . Supposing there are elements in the th row, there would be total . The set of all is denoted by . If is a super point, . By test each in we can reconstruct all super points.

In order to reduce this influence, we test if the union , acquiring by the bit-wise “AND” of all these , still contains more than opposite hosts. When its weight is no less than 3, we will return the restored LP as a super point’s LP. Together with RP, the index of this SEAV, a super point will be restored. But some normal hosts, whose opposite number is littler than will stay in the result too. To reduce the number of these normal hosts, we apply a more precise estimation method, long estimator, together with the short estimator.

3.3 Long estimator

Long estimator are used to improve the accuracy of detection result. It uses more bits to estimate host’s opposite number. Our long estimator is based on linear distinct counting algorithm (LDC) [24]. LDC is a bit vector of bits initialized with 0. When recording an opposite host , one bit in LDC, chosen by a random hash function , will be set. LDC has the simplest updating process. The opposite hosts number could be estimated by the following equation:

(4)

is the resting zero number in LDC after recording all opposite hosts. LDC has a good accuracy performance in estimating opposite host number, but its memory consumption is very large. So it’s too expensive to allocate an LDC for every host. Like SEA, we construct an array of LDC, written as , with rows and columns. Figure 2 describes the structure of and how to update it.

Figure 2: Structure of LDCA

We use random hash functions to map a host to LDCs in each row. No need to restore super points, the updating algorithm is much simpler than SEAV. For a given host at the end of a time window, its opposite hosts number is acquired from the union LDC related with it in each row by equation 4. Two LDC is merged by bit-wise “AND” operation. has a great influence on the accuracy of LDCA. The next section we will describe how to set .

3.4 Setting the number of rows of LDCA

The row number of , , affects the accuracy of cardinality estimation. The larger the value of , the more SE will be updated when processing each IP pair. In addition to increasing computing time, a large may also reduce the accuracy of the algorithm.

When the memory occupied by is constant, how to set the and is the most reasonable? This section discusses this issue.

In order to facilitate the discussion, the symbols and parameters are given first. V denotes the number of in , and ; denotes the number of different IP pairs in a time window. For a stable network, the fluctuation range of in a period should be relatively stable. This value can be obtained from statistical observations of past traffic and can be reset when the observed changes exceed the acceptable range. Therefore, in the following discussion, is assumed to be a constant.

, the probability that a bit in the

is set to ‘1’, is used as the analysis measure. This is because setting to a reasonable value can reduce and improve the accuracy of cardinality estimation. In the union , , generated by the merging of , varies with the change of and , so is an unavoidable parameter to discuss this problem.

Lemma 1

When there are different IP pairs in a time window, the probability that a bit in is ‘1’ is

Proof

Let n1 be the number of IP pairs corresponding to a . In , each row is updated by IP pairs. When IP pairs are mapped uniformly to different LDC by hash functions, . In a , the probability that a bit is keep 0 is . In the merged , a bit is ‘1’ if and only if all the corresponding bit in the rows are set to ‘1’, so .

Theorem 3.1

If there are a total of V in , i.e. , and different IP pairs in a time window, then gets the minimum when .

Proof

When and are constant,. Let , . The derivative of is When , reaches its minimum. Since , when ,, and we have the following equation:

(5)

Let . Equation 5 is rewritten as follows:

(6)

When , equation 6 established. Here . Replacing , and in equation 5, we will get .

For , setting reasonably according to the number of IP pairs can improve the accuracy. The given in Theorem 3.1 can be used as the upper limit of the number of rows. When does not exceed , increasing decreases . But the larger the , the more bits need to be merged when generating . This will increase the time consumed by our algorithm. Therefore, the accuracy and calculation time of the algorithm should be taken into account when selecting in practice. From Theorem 3.1, we can see that the larger , the smaller , but the larger . In the actual determination of , as long as is less than 1, that is, the number of noise in the combined is less than 1, the accuracy of is as high as .

LDCA improves the accuracy of detection result. Both and can be updated parallel without any data accessing conflict which ensures the success deploying on GPU. In the next section we will introduce how to detect super points in parallel and distributed environment.

4 Distributed super points detection on GPU

In a high speed network, such as 40 Gb/s, there are millions of packets passing through the edge of the network. To scan so many packets in real time requires plenty computing resource. Graphic processing unit (GPU) is one of the most popular parallel computing platform in recent years. For these tasks that have no data accessing conflict and processing different data with the same instructions (SIMD), GPU can acquire a high speed up[2][19]. Every packet will update SEAV and LDCA. Both these processes just set several bits and every bit could be set by different threads concurrently without introducing any mistakes. Our algorithm has great potential of scanning packets parallel on GPU. When detecting super points on different s, there are three critical stages: scanning packets on every WP; merging and of every WP into global ones; restoring super points from global and .

4.1 Packets scanning

Edge routers transmit packets between SNet and ONet. IP addresses of every packet could be acquired directly at these edge routers. But GPU has its own memory and it can only access its graphic memory directly. So we have to copy IP addresses from WP to GPU’s global memory. It’s not efficient to copy these IP addresses one by one because the copying processing requires additional starting and ending operations. In order to reducing copying time, we allocate two buffers on WP and GPU separately. When the buffer on WP is full, we will copy it to buffer on GPU and clear it for storing other IP addresses.

GPU has hundreds of cores and can launch thousands of threads to coping with different data parallel. After receiving IP addresses buffer from WP, we will start plenty threads to cope with these IP pairs parallel.

Each WP will only cope with IP pairs of packets passing through it. But a host’s opposite hosts may send to different s. It’s not possible to get the accuracy opposite number from one WP. So we should gather all and from distributed s together for global super points restoring.

4.2 Data merging and super points restoring

At the end of a time period, we will merge all and together. In order to relieve the pressure of WP, we set another server as the global server (GS) to restore super points. All WP will send their and to GS. and in different s have the same size and all of them are very small. So communication delay between s and will not cause congestion.

On GS, we acquired the global and . Super points will be acquired from global and opposite hosts number of super points could be calculated from global .

Our algorithm requires small memory and has simple operation, no floating operation. A cheap GPU can acquire a high speed up as showed in our experiment.

5 Work under sliding time window

The previous discussion only focus on super point detection and cardinality estimation under discrete time window. But the result under discrete time window will be affected by the time boundary. An efficient way to solve this problem is to replace discrete time window with sliding time window.

5.1 Sliding time window & Discrete time window

Super point’s cardinality estimation under discrete time window is simple because it doesn’t need to maintain hosts’ state in the previous time slices. But the estimating result has the following two problems:

  1. The result is affected by the starting of a discrete time window, and it fails to detect and estimate the super point which spans the boundary of two adjacent windows.

  2. The result is reported with high latency.

This two weakness of discrete time window comes from its moving step. The moving step of discrete time window equals its size. The bigger monitor period, the higher latency and more errors. Sliding time window solves these two problems together because its moving step has no relation to its window size. But super point cardinality estimation under sliding time window is more complex than that under discrete time window because it maintains hosts state of previous time and estimates super point’s cardinality more frequently. Discrete time window and sliding time window are two kinds of the period for cardinality estimating as shown in figure 3.

Figure 3: Sliding time window and discrete time window

Traffic between network SNet and ONet could be divided into successive time slices which have the same duration. The length of a time slice could be 1 second, 1 minute or any period in different situations. A sliding time window, denoted as , contains k successive time slices starting from time point t as shown in the top part of figure 3. Sliding time window will move forward one time slice a time. So two adjacent sliding time windows contain k-1 same slices. When k is set to 1, there is no duplicate period between two adjacent windows, which is the case of the discrete time window in the bottom part of figure 3. In figure 3, the size of the time slice is set to 1 second for sliding time window and 300 seconds for the discrete time window. A sliding window in figure 3 contains 300 time slices. In figure 3, the size of a sliding time window is equal to that of a discrete time window.

Cardinality estimation under discrete time window is easy because it doesn’t need to maintain the appearance of opposite hosts in another time window. But the result is affected by the starting of the discrete time window. When a super point has different opposite hosts in two adjacent time windows, it may be neglected under discrete time window.

For example, suppose that starts from time point to time point and starts from time point to time point in figure 3. Let and be two time points in and separately and seconds. If and , is a super point in . But will never be detected out in nor . By surveying a real-world 40Gb/s network, we found that discrete time window will lose average 14 such super points. We call the super point detected under the sliding window a sliding super point.

5.2 Sliding super point detection

In discrete time window, single bit is big enough to store if a host has appeared in a certain period. But under the sliding time window, a counter must store previous state of previous time slices. Hence, a more powerful counter is required. There are many excellent counters used for sliding cardinality estimation, such as time stamp[7], Distance Recorder (DR) [26] and Asynchronous Timestamp (AT)[27]. AT has the merits of small memory consumption and few state maintain time at the same time. This paper adopts AT to make SEAV and LDCA run under sliding window.

Under the sliding window, each bit in SEAV or LDCA is replaced by an AT. We call the discrete time window version SLGA and the sliding version of super point detection algorithm SSLGA. SLAG needs to initialize SEAV and LDCA at the beginning of each time window as described in the previous section. SSLGA only needs to initialize once at the beginning of the algorithm. Then SSLGA updates AT incrementally.

Because the number of bits in SEAV and LDCA are constant while running, the number of AT in SSLGA are constant too while running. A pool containing fixed number of AT is allocated at the beginning of SSLGA. Each AT in SSLGA corresponds to an AT in the AT pool. Instead of reinitialization at the beginning of each time window, SSLGA maintains the states of its AT at the end of each time slice. The state maintaining of SSLGA is to maintain the state of AT in the pool. The AT in the pool is divided according to the method in paper [27]. The maintaining time of AT is small. Hence SSLGA has a fast speed. SSLGA detects super points like SLGA. The inactive AT corresponds to “0” bit and the active AT corresponds to “1” bit. AT has the ability to run parallel. Hence SSLGA could be deployed on GPU to running in real time.

6 Experiment and analysis

In order to evaluate the performance of our algorithm, we use six real world core network traffic to compare the accuracy and consumption time of our algorithm with others. These traffics could be downloaded from Caida[1]. Caida’s OC192 data monitors an hour-long trace starting from 13:00. Table 1 shows the detail information of every experiment traffic.

Table 1: Traffic information

We use a common and low cost GPU, Nvidia GTX 650, to run every algorithm. There are total 1 GB of graphic memory in this GPU card and it communicates with computer through PCIe3.0 which has a bandwidth as high as 16 Gb/s. We compare the performance of different algorithms: DCDS[23], VBFA [13], GSE [18] and SLGA. SLGA is the one proposed in this paper.

6.1 Accuracy and memory

False positive rate (FPR) and false negative rate (FNR) are two important criteria of detection accuracy. FPR means the ratio of the number of detected fake host to the number of super points. FNR is the ration of the number of these super points that failed be detected by an algorithm to the number of super points. For an estimating algorithm, we hope that its FPR and FNR are small at the same time because FPR shows a negative correlation with FNR. Figure 4 and 5 illustrate the FPR and FNR of different algorithms. In our algorithm, the time window is set to 300 seconds and each one-hour traffic is split into 12 sub traffics according to the time window.

Figure 4: FPR of different algorithms
Figure 5: FNR of different algorithms

GSE has a smaller FPR than other algorithms have. SLGA’s FPR is a little higher than that of GSE but much smaller than that of DCDS and VBFA.

Although GSE has a small FPR, its FNR is higher than other algorithms’. A high FNR will let GSE fail to detect some important super points. DCDS’s FNR is the lowest at the cost of its high FPR. SLGA’s FNR is between DCDS’s and VBFA’s. In order to have an overall detection accuracy, we use the sum of FPR and FNR, called false total rate (FTR), as the accuracy criterion. SLGA’s FTR is the smallest in all of these algorithm. Table 2 shows the memory consumption and average result of different algorithms.

Table 2: Average result of different algorithms

Both DCDS and GSE use more than 100 MB memory and DCDS uses nearly 200 MB memory. VBFA uses smaller memory than DCDS and GSE. But SLGA consumes the smallest memory in all of these algorithm, only one-fifth memory that VBFA uses. Small memory requirement let SLGA has a small communication latency in a distributed environment than other algorithms. False rates listing in table 2 are acquired by calculating the average value of an algorithm at all these time windows. From table 2 we can see that SLGA not only has the smallest memory requirement, but also the smallest overall false rate. Its processing speed is fast enough for deal with this traffic in real time.

6.2 Time consumption

When running in our cheap GPU, all algorithm can detect super points in real time for every 5-minutes sub traffic. But their consuming time are very different as shown in figure 6.

Figure 6: Total used time of different algorithms for every sub traffic

DCDS uses much more time than GSE and SLGA because it employs CRT to restore super points which requires more complex operation than a hash function does. In the first three traffics, VBFA uses littler time than DCDS does. This is because VBFA can locate column index by extracting sub bits of hosts’s IP addresses. But when reconstructing super points, VBFA will generate huge candidate IP addresses. The number of candidate IP addresses increases sharply with the number of super points. In the last three traffic, which all contain more than 300 super points, VBFA uses much more time than all the other algorithms.

SLGA uses a little more time than GSE. When scanning traffic, GSE only needs to set one bit while SLGA will set several bits in and . But GPU can hide the memory accessing delay by launching plenty threads parallel. So SLGA is slower than GSE a little. In this paper, we divide the total packets number in a time window by the processing time to get the speed. The unit of algorithm’s speed is million packets per seconds, written as Mpps. Speeds of different algorithms listed in table 2 is the mean value of different algorithms’s speeds of all 5-minutes sub traffics.

SLGA and GSE have faster speed than VBFA and DCDS. The experiment traffics have an average bandwidth of 4.5 Gb/s [1]. Suppose that 900 MB memory of GPU are available for different algorithms’ kernel structures and the rest 100 MB memory are used for IP addresses buffer and other running parameters. For a higher bandwidth traffic, more memory will be required. Suppose that the memory requirement grows linearly with the bandwidth which could be realized by splitting IP addresses by their right bits. From the memory perspective, our algorithm can deal with network traffic with bandwidth as high as 249 Gb/s, while the highest traffic bandwidth for DCDS, VBFA and GSE are 21.1 Gb/s, 50.6 Gb/s and 31.6 Gb/s. Note that the GPU used in our experiment is a cheap one which costs only 30 dollars. A more advanced GPU, such as GTX 1080 with 11 GB graphic memory, could be brought with 1000 dollars to deal with a faster and bigger network.

7 Conclusion

In this paper we introduce a memory efficient distributed super points detection algorithm. Super point plays important roles in network management and security. How to find them out in real time is the foundation of super points application. Unlike other algorithms, we use two kinds of opposite number estimation algorithms in our scheme: short estimation and long estimation. SE consumes very small memory and has a fast processing speed. Based on SE, we design a novel super point restoring structure SEAV. From SEAV we can get a candidate super points lists. In order to improve the accuracy of the detection result, we introduce LE. LE consumes more memory than SE but has a higher accuracy. Using SE and LE together makes our algorithm get the highest accuracy with the smallest memory.

References