SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University.

Slides:



Advertisements
Similar presentations
New Packet Sampling Technique for Robust Flow Measurements Shigeo Shioda Department of Architecture and Urban Science Graduate School of Engineering, Chiba.
Advertisements

Bitmap algorithms for flow counting – Internet Measurement Conference, October 2003 Bitmap Algorithms for Counting Active Flows on High Speed Links Cristian.
New Directions in Traffic Measurement and Accounting Cristian Estan (joint work with George Varghese)
New Directions in Traffic Measurement and Accounting Cristian Estan – UCSD George Varghese - UCSD Reviewed by Michela Becchi Discussion Leaders Andrew.
Data Streaming Algorithms for Accurate and Efficient Measurement of Traffic and Flow Matrices Qi Zhao*, Abhishek Kumar*, Jia Wang + and Jun (Jim) Xu* *College.
Cisco S3 C5 Routing Protocols. Network Design Characteristics Reliable – provides mechanisms for error detection and correction Connectivity – incorporate.
Fast Firewall Implementation for Software and Hardware-based Routers Lili Qiu, Microsoft Research George Varghese, UCSD Subhash Suri, UCSB 9 th International.
OpenSketch Slides courtesy of Minlan Yu 1. Management = Measurement + Control Traffic engineering – Identify large traffic aggregates, traffic changes.
A Fast and Compact Method for Unveiling Significant Patterns in High-Speed Networks Tian Bu 1, Jin Cao 1, Aiyou Chen 1, Patrick P. C. Lee 2 Bell Labs,
Fine-Grained Latency and Loss Measurements in the Presence of Reordering Myungjin Lee, Sharon Goldberg, Ramana Rao Kompella, George Varghese.
Detecting DDoS Attacks on ISP Networks Ashwin Bharambe Carnegie Mellon University Joint work with: Aditya Akella, Mike Reiter and Srinivasan Seshan.
A Data Stream Management System for Network Traffic Management Shivnath Babu Stanford University Lakshminarayanan Subramanian Univ. California, Berkeley.
SKELETON BASED PERFORMANCE PREDICTION ON SHARED NETWORKS Sukhdeep Sodhi Microsoft Corp Jaspal Subhlok University of Houston.
PERSISTENT DROPPING: An Efficient Control of Traffic Aggregates Hani JamjoomKang G. Shin Electrical Engineering & Computer Science UNIVERSITY OF MICHIGAN,
Measuring Large Traffic Aggregates on Commodity Switches Lavanya Jose, Minlan Yu, Jennifer Rexford Princeton University, NJ 1.
Streaming Algorithms for Robust, Real- Time Detection of DDoS Attacks S. Ganguly, M. Garofalakis, R. Rastogi, K. Sabnani Krishan Sabnani Bell Labs Research.
1 Reversible Sketches for Efficient and Accurate Change Detection over Network Data Streams Robert Schweller Ashish Gupta Elliot Parsons Yan Chen Computer.
Polytechnic University,ECE Department1 Detection of “Hot Spots” Paper Title : Joint Data Streaming and Sampling Techniques for Detection of Super Sources.
Deterministic Memory- Efficient String Matching Algorithms for Intrusion Detection Nathan Tuck, Timothy Sherwood, Brad Calder, George Varghese Department.
Shadow Configurations: A Network Management Primitive Richard Alimi, Ye Wang, Y. Richard Yang Laboratory of Networked Systems Yale University.
Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications Robert Schweller 1, Zhichun Li 1, Yan Chen 1, Yan Gao 1, Ashish.
“On Scalable Attack Detection in the Network” Ramana Rao Kompella, Sumeet Singh, and George Varghese Presented by Nadine Sundquist.
Two stage packet classification using most specific filter matching and transport level sharing Authors: M.E. Kounavis *,A. Kumar,R. Yavatkar,H. Vin Presenter:
On the Difficulty of Scalably Detecting Network Attacks Kirill Levchenko with Ramamohan Paturi and George Varghese.
Hash-Based IP Traceback Alex C. Snoeren, Craig Partidge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer.
Dream Slides Courtesy of Minlan Yu (USC) 1. Challenges in Flow-based Measurement 2 Controller Configure resources1Fetch statistics2(Re)Configure resources1.
Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Princeton University Joint work with Jennifer.
George Varghese (based on Cristi Estan’s work) University of California, San Diego May 2011 Internet traffic measurement: from packets to insight.
Tomo-gravity Yin ZhangMatthew Roughan Nick DuffieldAlbert Greenberg “A Northern NJ Research Lab” ACM.
Automated Worm Fingerprinting
Shannon Lab 1AT&T – Research Traffic Engineering with Estimated Traffic Matrices Matthew Roughan Mikkel Thorup
1 CISCO NETWORKING ACADEMY PROGRAM (CNAP) SEMESTER 1/ MODULE 8 Ethernet Switching.
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic Minho Sung Networking & Telecommunications Group College.
New Streaming Algorithms for Fast Detection of Superspreaders Shobha Venkataraman* Joint work with: Dawn Song*, Phillip Gibbons ¶,
CEDAR Counter-Estimation Decoupling for Approximate Rates Erez Tsidon (Technion, Israel) Joint work with Iddo Hanniel and Isaac Keslassy ( Technion ) 1.
CEDAR Counter-Estimation Decoupling for Approximate Rates Erez Tsidon Joint work with Iddo Hanniel and Isaac Keslassy Technion, Israel 1.
Efficient Packet Classification with Digest Caches Francis Chang Wu-chang Feng Wu-chi Feng Kang Li.
Wire Speed Packet Classification Without TCAMs ACM SIGMETRICS 2007 Qunfeng Dong (University of Wisconsin-Madison) Suman Banerjee (University of Wisconsin-Madison)
Packet Classification on Multiple Fields 참고 논문 : Pankaj Gupta and Nick McKeown SigComm 1999.
ICOM 6115: Computer Systems Performance Measurement and Evaluation August 11, 2006.
1 LD-Sketch: A Distributed Sketching Design for Accurate and Scalable Anomaly Detection in Network Data Streams Qun Huang and Patrick P. C. Lee The Chinese.
1 Robust Endpoint Detection and Energy Normalization for Real-Time Speech and Speaker Recognition Qi Li, Senior Member, IEEE, Jinsong Zheng, Augustine.
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
1 Evaluating NGI performance Matt Mathis
D 陳怡安 R 解巽評 R 高榮泰 IEEE/ACM TRANSACTIONS ON NETWORKING OCTOBER 2006 Cristian Estan, George Varghese, Member, IEEE, and Michael Fisk.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
Automated Worm Fingerprinting Authors: Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Publish: OSDI'04. Presenter: YanYan Wang.
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
@ Carnegie Mellon Databases 1 Finding Frequent Items in Distributed Data Streams Amit Manjhi V. Shkapenyuk, K. Dhamdhere, C. Olston Carnegie Mellon University.
1 ECE 526 – Network Processing Systems Design System Implementation Principles I Varghese Chapter 3.
Packet Classification Using Multidimensional Cutting Sumeet Singh (UCSD) Florin Baboescu (UCSD) George Varghese (UCSD) Jia Wang (AT&T Labs-Research) Reviewed.
IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo a, Jose G. Delgado-Frias Publisher: Journal of Systems.
1 IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo, Jose G. Delgado-Frias Publisher: Journal of Systems.
SCREAM: Sketch Resource Allocation for Software-defined Measurement Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat (CoNEXT’15)
An Analysis of AIMD Algorithm with Decreasing Increases Yunhong Gu, Xinwei Hong, and Robert L. Grossman National Center for Data Mining.
PATH DIVERSITY WITH FORWARD ERROR CORRECTION SYSTEM FOR PACKET SWITCHED NETWORKS Thinh Nguyen and Avideh Zakhor IEEE INFOCOM 2003.
SketchVisor: Robust Network Measurement for Software Packet Processing
Jennifer Rexford Princeton University
FlowRadar: A Better NetFlow For Data Centers
Xin Li , Chen Qian University of Kentucky
A Resource-minimalist Flow Size Histogram Estimator
Prepared By : Pina Chhatrala
Data Streaming in Computer Networking
Lightweight Application Classification for Network Management
Optimal Elephant Flow Detection Presented by: Gil Einziger,
Qun Huang, Patrick P. C. Lee, Yungang Bao
Mapping Internet Sensors With Probe Response Attacks
Lu Tang , Qun Huang, Patrick P. C. Lee
Author: Ramana Rao Kompella, Kirill Levchenko, Alex C
Presentation transcript:

SIGCOMM 2002 New Directions in Traffic Measurement and Accounting Focusing on the Elephants, Ignoring the Mice Cristian Estan and George Varghese University of California, San Diego

SIGCOMM 2002 Talk outline Problem definition Sample and hold Multistage filters Validation, measurements Conclusions

SIGCOMM 2002 Traffic analysis today Router Fast link Measurement module Sampled packets Workstation Large raw data Collection and analysis software Concise analysis results Offline analysis

SIGCOMM 2002 Our research agenda Router Real-time analysis Is it doable? Is it better? Fast link Measurement module Concise analysis results

SIGCOMM 2002 What is traffic analysis used for? Network planning: need to know traffic between pairs of networks (traffic matrix) Accounting: usage based billing Detecting DoS attacks: flood attacks Application characterization: breaking up the traffic based on port numbers …

SIGCOMM 2002 Common abstractions Packets are grouped together into streams based on header fields  Traffic matrix – by source and destination AS  DoS attacks – by destination IP address Measuring large streams (this paper) Estimating the number of active streams (poster) …

SIGCOMM 2002 Why is measuring streams hard? Cheap memories (DRAM) are too slow to count all packets Fast memories (SRAM) are too small to keep counters for all streams Opportunity: elephants matter, mice don’t Problem: usually we don’t know in advance which streams are large

SIGCOMM 2002 Problem definition Given a fixed definition for streams, measure large streams accurately  Large = above 1% of link capacity over a 1 minute interval Assumptions  Mice don’t matter  Accuracy of results important

SIGCOMM 2002 Talk outline Problem definition Sample and hold Multistage filters Validation, measurements Conclusions

SIGCOMM 2002 How does sample and hold work? stream memory stream1 1 Sample Insert

SIGCOMM 2002 How does sample and hold work? stream memory stream1 1stream1 2 Update

SIGCOMM 2002 How does sample and hold work? stream memory stream1 2 stream2 1 Sample Insert

SIGCOMM 2002 Why is sample & hold better? uncertainty Sample and hold Ordinary sampling

SIGCOMM 2002 Comparing the relative error of the estimate for a stream at 1/F of the link bandwidth Memory limited to M entries How much better is it? Measure Ordinary sampling Sample and hold Error √ F/MF/M Memory accesses 1/S1

SIGCOMM 2002 Talk outline Problem definition Sample and hold Multistage filters Validation, measurements Conclusions

SIGCOMM 2002 Multistage filters Characteristics: No large stream is ever omitted Very few entries are used by small streams Better performance but implementation and tuning is more complex

SIGCOMM 2002 How do multistage filters work? stream memory Array of counters Hash(Pink)

SIGCOMM 2002 How do multistage filters work? stream memory Array of counters Hash(Green)

SIGCOMM 2002 How do multistage filters work? stream memory Array of counters Hash(Green)

SIGCOMM 2002 How do multistage filters work? stream memory

SIGCOMM 2002 How do multistage filters work? stream memory Collisions are OK

SIGCOMM 2002 How do multistage filters work? stream memory stream1 1 Insert Reached threshold

SIGCOMM 2002 How do multistage filters work? stream memory stream1 1

SIGCOMM 2002 How do multistage filters work? stream memory stream1 1 stream2 1

SIGCOMM 2002 Stage 2 How do multistage filters work? stream memory stream1 1 Stage 1

SIGCOMM 2002 Conservative update Gray = all prior packets

SIGCOMM 2002 Conservative update Redundant

SIGCOMM 2002 Conservative update

SIGCOMM 2002 Talk outline Problem definition Sample and hold Multistage filters Validation, measurements Conclusions

SIGCOMM 2002 Validation Analytical evaluation Comparison of analytical results to measured performance Comparison of full measurement devices using different algorithms

SIGCOMM 2002 On traces, algorithms much better than analysis predicts Number of stages Percentage of small streamspassingfilter (log scale) TheoryZipfActual Conservativeupdate

SIGCOMM 2002 Measurement results Setup: OC48 trace, 100,000 TCP flows, 5 second intervals, ordinary sampling - unlimited memory, sampling 1 in 16 our algorithms - 1Mbit, adapting parameters to keep it around 90% full Large streams (above 0.1%): ordinary sampling has an error of 9% sample and hold 0.075%, multistage filter 0.037%

SIGCOMM 2002 Talk outline Problem definition Sample and hold Multistage filters Validation, measurements Conclusions

SIGCOMM 2002 Our contributions Abstraction:  Real-time packet analysis abstractions can help systematize router implementations.  While the notion of elephants and mice is inherent in earlier work, we abstracted measurement of large streams - it can be used by many applications.

SIGCOMM 2002 Our contributions (2) Algorithms:  Sample and hold is a simple and efficient algorithm for identifying and measuring large streams.  Multistage filters with conservative update perform better but are more complex.  Both can be used for real-time as well as offline analysis.

SIGCOMM 2002 Our contributions (3) Validation:  Theoretical results that make no assumptions on traffic distribution  Simulations on traces are orders of magnitude better  Preliminary hardware design (John Huber) indicates feasibility at OC192 speeds

SIGCOMM 2002 Thank you!

SIGCOMM 2002 Optimizations to sample and hold Preserving entries: Keep large entries from one measurement interval to the next  Reduces error by a factor of 6 Early removal: Quickly remove entries that do not accumulate much traffic  Reduces memory usage by 25%

SIGCOMM 2002 Optimizations to multistage filters Preserving entries: Keep large entries from one measurement interval to the next  Reduces error by a factor of 5 Shielding: Large streams identified in previous intervals don’t pass through the filter  Reduces memory usage by up to 70%