2012 Proceedings IEEE INFOCOM 2012
DOI: 10.1109/infcom.2012.6195691
|View full text |Cite
|
Sign up to set email alerts
|

A fast sketch for aggregate queries over high-speed network traffic

Abstract: There have been security problems and network failures that are hard to resolve, for example, botnets, polymorphic worm/virus, DDoS, etc. To address them, we need to monitor the traffic dynamics and have a network-wide view about them, and more importantly, be able to detect attacks and failures in a timely manner. Due to the rapid increase in the traffic volume, it is often infeasible to monitor every individual flow in the backbone network due to space and time constraints. Instead, we are often required to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
30
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(30 citation statements)
references
References 15 publications
0
30
0
Order By: Relevance
“…Both sketches utilize the position information to identify interested hosts in the network. A similar recovery method has also been proposed for traffic anomaly detection with the Principle Component Analysis (PCA) [15] and the aggregate queries in high-speed network [16].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Both sketches utilize the position information to identify interested hosts in the network. A similar recovery method has also been proposed for traffic anomaly detection with the Principle Component Analysis (PCA) [15] and the aggregate queries in high-speed network [16].…”
Section: Related Workmentioning
confidence: 99%
“…In order to provide a small failure probability δ, this algorithm has to be repeated log(1/δ) times independently. If this algorithm is used in reversible sketches [12], [14], [16], the space and the running time would be very high for the detection of high-cardinality hosts. Therefore, in this paper we propose a more efficient data structure than trivial solutions, which considers the errors in cardinality estimation.…”
Section: Related Workmentioning
confidence: 99%
“…We may categorize them into four main approaches: traceback-based [1][2][3][4][5], rule-based [6][7][8][9][10][11][12][13][14][15][16], protocolbased [17][18][19][20][21][22][23][24][25][26][27] and anomaly-based [28][29][30]. Traceback-based methods make the victim to identify the attack source as well as attack paths once the attack has been encountered.…”
Section: Introductionmentioning
confidence: 99%
“…They are network/transport-level [18][19][20][21][22][23] and application-level flooding [24][25][26][27]. Network/transport-level flooding has been launched attacks to consume the victims' resource by exploiting the bugs and the weakness of IP, TCP, UDP and ICMP protocols.…”
Section: Introductionmentioning
confidence: 99%
“…People are using and relying on a large variety of services built on the top of the Internet, such as web browsing, online banking, shopping, entertainment, VoIP, Video on demand, auction, social networks, etc [1]. However, some network attacks including DDOS, information phishing and email spamming are pervasive in the Internet, and often cause great financial loss [2].…”
Section: Introductionmentioning
confidence: 99%