Proceedings of the Symposium on SDN Research 2018
DOI: 10.1145/3185467.3185476
|View full text |Cite
|
Sign up to set email alerts
|

Network-Wide Heavy Hitter Detection with Commodity Switches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
63
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
2

Relationship

2
8

Authors

Journals

citations
Cited by 84 publications
(64 citation statements)
references
References 18 publications
0
63
0
1
Order By: Relevance
“…Sonata provides a foundation for much future work. First, we are currently extending Sonata to support telemetry applications such as network-wide heavy hitter detection [18] that require observing traffic at multiple locations. Second, we plan to improve on Sonata's query planning by developing new (1) methods to minimize the amount of packet traces required, (2) heuristics for expediting the computation of query plans, and (3) techniques to make the query planning more robust.…”
Section: Resultsmentioning
confidence: 99%
“…Sonata provides a foundation for much future work. First, we are currently extending Sonata to support telemetry applications such as network-wide heavy hitter detection [18] that require observing traffic at multiple locations. Second, we plan to improve on Sonata's query planning by developing new (1) methods to minimize the amount of packet traces required, (2) heuristics for expediting the computation of query plans, and (3) techniques to make the query planning more robust.…”
Section: Resultsmentioning
confidence: 99%
“…Even with this approach sometimes we need to collect from a selected node statistics to a central server. For example in [15] a low-overhead network-wide heavy hitter detection is done where large flows are detected locally in the data-plane with a per-key threshold that triggers reports to a central coordinator. A similar approach is used in [16].…”
Section: B Discussionmentioning
confidence: 99%
“…Tal identificaçãoéútil para detectar os nós que estejam consumindo a maioria dos recursos de uma rede. Ela pode ser utilizada para, por exemplo, detectar ataques DDoS [Harrison et al 2018].…”
Section: Detecção De Heavy Hittersunclassified