CoNEXT is a premier and highly selective venue in computer networking. This year's exciting technical program helps us better understand and improve the performance, reliability and security of networks in all layers.
Proceeding Downloads
Xatu: boosting existing DDoS detection systems using auxiliary signals
Traditional DDoS attack detection monitors volumetric traffic features to detect attack onset. To reduce false positives, such detection is often conservative---raising an alert only after a sustained period of observed anomalous behavior. However, ...
Network measurement methods for locating and examining censorship devices
Advances in networking and firewall technology have led to the emergence of network censorship devices that can perform large-scale, highly-performant content blocking. While such devices have proliferated, techniques to locate, identify, and understand ...
Intermediate certificate suppression in post-quantum TLS: an approximate membership querying approach
Quantum computing advances threaten the security of today's public key infrastructure, and have led to the pending standardization of alternative, quantum-resistant key encapsulation and digital signature cryptography schemes. Unfortunately, ...
GenDT: mobile network drive testing made efficient with generative modeling
Drive testing continues to play a key role in mobile network optimization for operators but its high cost is a big concern. Alternative approaches like virtual drive testing (VDT) target device testing in the lab whereas MDT or crowdsourcing based ...
Lumen: a framework for developing and evaluating ML-based IoT network anomaly detection
The rise of IoT devices brings a lot of security risks. To mitigate them, researchers have introduced various promising network-based anomaly detection algorithms, which oftentimes leverage machine learning. Unfortunately, though, their deployment and ...
Raven: belady-guided, predictive (deep) learning for in-memory and content caching
Performance of caching algorithms not only determines the quality of experience for users, but also affects the operating and capital expenditures for cloud service providers. Today's production systems rely on heuristics such as LRU (least recently used)...
Analyzing and modeling the latency and jitter behavior of mixed industrial TSN and DetNet networks
Today, industrial real-time communication is commonly designed based on two key principles to satisfy the challenging Quality of Service (QoS) requirements of industrial applications: a) local communication and b) purpose-built networks. IEEE Time-...
Flexile: meeting bandwidth objectives almost always
Wide-area cloud provider networks must support the bandwidth requirements of network traffic despite failures. Existing traffic engineering (TE) schemes perform no better than an approach that optimally routes traffic for each failure scenario. We show ...
PipeDevice: a hardware-software co-design approach to intra-host container communication
- Qiang Su,
- Chuanwen Wang,
- Zhixiong Niu,
- Ran Shu,
- Peng Cheng,
- Yongqiang Xiong,
- Dongsu Han,
- Chun Jason Xue,
- Hong Xu
Containers are prevalently adopted due to the deployment and performance advantages over virtual machines. For many containerized data-intensive applications, however, bulky data transfers may pose performance issues. In particular, communication across ...
Atlas: automate online service configuration in network slicing
Network slicing achieves cost-efficient slice customization to support heterogeneous applications and services. Configuring cross-domain resources to end-to-end slices based on service-level agreements, however, is challenging, due to the complicated ...
FIAT: frictionless authentication of IoT traffic
Home IoT (Internet of Things) deployments are vulnerable to local adversaries, compromising a LAN, and remote adversaries, compromising either the accounts associated with IoT devices or third-party devices like mobile phones used to control the IoT. ...
How gullible are web measurement tools?: a case study analysing and strengthening OpenWPM's reliability
Automated browsers are widely used to study the web at scale. Their premise is that they measure what regular browsers would encounter on the web. In practice, deviations due to detection of automation have been found. To what extent automated browsers ...
FlowDNS: correlating netflow and DNS streams at scale
Knowing customer's interests, e.g. which Video-On-Demand (VoD) or Social Network services they are using, helps telecommunication companies with better network planning to enhance the performance exactly where the customer's interests lie, and also ...
Light, camera, actions: characterizing the usage of IXPs' action BGP communities
Border Gateway Protocol (BGP) communities, an optional message attribute, allow network operators to tag BGP announcements and act on routing decisions. Although widely used, it is so far unclear how prevalent the different types of communities are and ...
On the interplay between TLS certificates and QUIC performance
- Marcin Nawrocki,
- Pouyan Fotouhi Tehrani,
- Raphael Hiesgen,
- Jonas Mücke,
- Thomas C. Schmidt,
- Matthias Wählisch
In this paper, we revisit the performance of the QUIC connection setup and relate the design choices for fast and secure connections to common Web deployments. We analyze over 1M Web domains with 272k QUIC-enabled services and find two worrying results. ...
Scaling beyond packet switch limits with multiple dataplanes
Scale-out datacenter network fabrics enable network operators to translate improved link and switch speeds directly into end-host throughput. Unfortunately, limits in the underlying CMOS packet switch chip manufacturing roadmap mean that NICs, links, ...
An ultra-low latency and compatible PCIe interconnect for rack-scale communication
- Yibo Huang,
- Yukai Huang,
- Ming Yan,
- Jiayu Hu,
- Cunming Liang,
- Yang Xu,
- Wenxiong Zou,
- Yiming Zhang,
- Rui Zhang,
- Chunpu Huang,
- Jie Wu
Emerging network-attached resource disaggregation architecture requires ultra-low latency rack-scale communication. However, current hardware offloading (e.g., RDMA) and user-space (e.g., mTCP) communication schemes still rely on heavily layered ...
A novel programmable software datapath for software-defined networking
This paper introduces NIKSS (Native In-Kernel SDN Switch), a novel programmable software switch for Software-Defined Networking. NIKSS leverages P4 as a high-level programming abstraction, Portable Switch Architecture (PSA) as a fully-featured P4 ...
Spine: an efficient DRL-based congestion control with ultra-low overhead
Previous congestion control (CC) algorithms based on deep reinforcement learning (DRL) directly adjust flow sending rate to respond to dynamic bandwidth change, resulting in high inference overhead. Such overhead may consume considerable CPU resources ...
R-MPLS: recursive protection for highly dependable MPLS networks
Most modern communication networks feature fast rerouting mechanisms in the data plane. However, design and configuration of such mechanisms even under multiple failures is known to be difficult. In order to increase the resilience of the widely ...
SLAM-share: visual simultaneous localization and mapping for real-time multi-user augmented reality
Augmented reality (AR) devices perform visual simultaneous localization and mapping (SLAM) to map the real world and localize themselves in it, enabling them to render the virtual holograms appropriately. Current multi-user AR platforms fall short in ...
Coal not diamonds: how memory pressure falters mobile video QoE
The popularity of video streaming on smartphones has led to rising demands for high-quality mobile video streaming. Consequently, we are observing growing support for higher resolution videos (e.g., HD, FHD, QHD) and higher video frame rates (e.g., 48 ...
Zoonet: a proactive telemetry system for large-scale cloud networks
- Shunmin Zhu,
- Jianyuan Lu,
- Biao Lyu,
- Tian Pan,
- Chenhao Jia,
- Xin Cheng,
- Daxiang Kang,
- Yilong Lv,
- Fukun Yang,
- Xiaobo Xue,
- Zhiliang Wang,
- Jiahai Yang
We present Zoonet, a proactive virtual network telemetry system for multi-tenant clouds. The requirements are to (1) cover hyper-scale virtual networks with millions of tenants and millions of VMs for top tenants; (2) handle frequent virtual topology ...
Drift-bottle: a lightweight and distributed approach to failure localization in general networks
Network failure severely impairs network performance, affecting latency and throughput of data transmission. Existing failure localization solutions for general networks face problems such as difficulty in acquiring data from end hosts, need for extra ...
FlowTele: remotely shaping traffic on internet-scale networks
Internet content providers often deliver content through bandwidth bottlenecks that are out of their control. Thus, despite often having massively over-provisioned upstream servers, the content providers still cannot control the end-to-end user ...
OutRAN: co-optimizing for flow completion time in radio access network
Traffic from interactive applications demanding low latency has become dominant in cellular networks. However, existing schedulers of cellular network base stations fall short in delivering low latency when prior information (i.e., dedicated Quality of ...
Enabling emerging edge applications through a 5G control plane intervention
- Mukhtiar Ahmad,
- Muhammad Ali Nawazish,
- Muhammad Taimoor Tariq,
- Muhammad Basit Iqbal Awan,
- Muhammad Taqi Raza,
- Zafar Ayyub Qazi
5G networks are considered potential enablers for many emerging edge applications, such as those related to autonomous vehicles, virtual and augmented reality, and online gaming. However, recent works have shown the cellular control plane is a potential ...
TnB: resolving collisions in LoRa based on the peak matching cost and block error correction
LoRa has emerged as one of the main candidates for connecting low-power wireless IoT devices. Packet collisions occur in LoRa networks when multiple nodes transmit wireless signals simultaneously. In this paper, a novel solution, referred to as TnB, is ...
Index Terms
- Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CoNEXT '22 | 151 | 28 | 19% |
CoNEXT '19 Companion | 52 | 34 | 65% |
CoNEXT '16 | 160 | 30 | 19% |
CoNEXT '14 | 133 | 27 | 20% |
CoNEXT Student Workshop '14 | 34 | 17 | 50% |
CoNEXT '13 | 226 | 44 | 19% |
CoNEXT Student Workhop '13 | 33 | 18 | 55% |
Overall | 789 | 198 | 25% |