[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3555050acmconferencesBook PagePublication PagesconextConference Proceedingsconference-collections
CoNEXT '22: Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CoNEXT '22: The 18th International Conference on emerging Networking EXperiments and Technologies Roma Italy December 6 - 9, 2022
ISBN:
978-1-4503-9508-3
Published:
30 November 2022
Sponsors:

Reflects downloads up to 24 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

CoNEXT is a premier and highly selective venue in computer networking. This year's exciting technical program helps us better understand and improve the performance, reliability and security of networks in all layers.

Skip Table Of Content Section
SESSION: Security
research-article
Public Access
Xatu: boosting existing DDoS detection systems using auxiliary signals

Traditional DDoS attack detection monitors volumetric traffic features to detect attack onset. To reduce false positives, such detection is often conservative---raising an alert only after a sustained period of observed anomalous behavior. However, ...

research-article
Public Access
Network measurement methods for locating and examining censorship devices

Advances in networking and firewall technology have led to the emergence of network censorship devices that can perform large-scale, highly-performant content blocking. While such devices have proliferated, techniques to locate, identify, and understand ...

short-paper
Intermediate certificate suppression in post-quantum TLS: an approximate membership querying approach

Quantum computing advances threaten the security of today's public key infrastructure, and have led to the pending standardization of alternative, quantum-resistant key encapsulation and digital signature cryptography schemes. Unfortunately, ...

SESSION: Machine learning
research-article
GenDT: mobile network drive testing made efficient with generative modeling

Drive testing continues to play a key role in mobile network optimization for operators but its high cost is a big concern. Alternative approaches like virtual drive testing (VDT) target device testing in the lab whereas MDT or crowdsourcing based ...

research-article
Open Access
Lumen: a framework for developing and evaluating ML-based IoT network anomaly detection

The rise of IoT devices brings a lot of security risks. To mitigate them, researchers have introduced various promising network-based anomaly detection algorithms, which oftentimes leverage machine learning. Unfortunately, though, their deployment and ...

research-article
Public Access
Raven: belady-guided, predictive (deep) learning for in-memory and content caching

Performance of caching algorithms not only determines the quality of experience for users, but also affects the operating and capital expenditures for cloud service providers. Today's production systems rely on heuristics such as LRU (least recently used)...

SESSION: Performance
research-article
Analyzing and modeling the latency and jitter behavior of mixed industrial TSN and DetNet networks

Today, industrial real-time communication is commonly designed based on two key principles to satisfy the challenging Quality of Service (QoS) requirements of industrial applications: a) local communication and b) purpose-built networks. IEEE Time-...

Flexile: meeting bandwidth objectives almost always

Wide-area cloud provider networks must support the bandwidth requirements of network traffic despite failures. Existing traffic engineering (TE) schemes perform no better than an approach that optimally routes traffic for each failure scenario. We show ...

research-article
PipeDevice: a hardware-software co-design approach to intra-host container communication

Containers are prevalently adopted due to the deployment and performance advantages over virtual machines. For many containerized data-intensive applications, however, bulky data transfers may pose performance issues. In particular, communication across ...

SESSION: IoT
Atlas: automate online service configuration in network slicing

Network slicing achieves cost-efficient slice customization to support heterogeneous applications and services. Configuring cross-domain resources to end-to-end slices based on service-level agreements, however, is challenging, due to the complicated ...

research-article
FIAT: frictionless authentication of IoT traffic

Home IoT (Internet of Things) deployments are vulnerable to local adversaries, compromising a LAN, and remote adversaries, compromising either the accounts associated with IoT devices or third-party devices like mobile phones used to control the IoT. ...

SESSION: Measurements
research-article
How gullible are web measurement tools?: a case study analysing and strengthening OpenWPM's reliability

Automated browsers are widely used to study the web at scale. Their premise is that they measure what regular browsers would encounter on the web. In practice, deviations due to detection of automation have been found. To what extent automated browsers ...

short-paper
Open Access
FlowDNS: correlating netflow and DNS streams at scale

Knowing customer's interests, e.g. which Video-On-Demand (VoD) or Social Network services they are using, helps telecommunication companies with better network planning to enhance the performance exactly where the customer's interests lie, and also ...

short-paper
Light, camera, actions: characterizing the usage of IXPs' action BGP communities

Border Gateway Protocol (BGP) communities, an optional message attribute, allow network operators to tag BGP announcements and act on routing decisions. Although widely used, it is so far unclear how prevalent the different types of communities are and ...

On the interplay between TLS certificates and QUIC performance

In this paper, we revisit the performance of the QUIC connection setup and relate the design choices for fast and secure connections to common Web deployments. We analyze over 1M Web domains with 272k QUIC-enabled services and find two worrying results. ...

SESSION: Dataplanes
Scaling beyond packet switch limits with multiple dataplanes

Scale-out datacenter network fabrics enable network operators to translate improved link and switch speeds directly into end-host throughput. Unfortunately, limits in the underlying CMOS packet switch chip manufacturing roadmap mean that NICs, links, ...

research-article
Best Paper
Best Paper
An ultra-low latency and compatible PCIe interconnect for rack-scale communication

Emerging network-attached resource disaggregation architecture requires ultra-low latency rack-scale communication. However, current hardware offloading (e.g., RDMA) and user-space (e.g., mTCP) communication schemes still rely on heavily layered ...

A novel programmable software datapath for software-defined networking

This paper introduces NIKSS (Native In-Kernel SDN Switch), a novel programmable software switch for Software-Defined Networking. NIKSS leverages P4 as a high-level programming abstraction, Portable Switch Architecture (PSA) as a fully-featured P4 ...

SESSION: Network, transport, and application-layer protocols
research-article
Spine: an efficient DRL-based congestion control with ultra-low overhead

Previous congestion control (CC) algorithms based on deep reinforcement learning (DRL) directly adjust flow sending rate to respond to dynamic bandwidth change, resulting in high inference overhead. Such overhead may consume considerable CPU resources ...

R-MPLS: recursive protection for highly dependable MPLS networks

Most modern communication networks feature fast rerouting mechanisms in the data plane. However, design and configuration of such mechanisms even under multiple failures is known to be difficult. In order to increase the resilience of the widely ...

research-article
Open Access
SLAM-share: visual simultaneous localization and mapping for real-time multi-user augmented reality

Augmented reality (AR) devices perform visual simultaneous localization and mapping (SLAM) to map the real world and localize themselves in it, enabling them to render the virtual holograms appropriately. Current multi-user AR platforms fall short in ...

Coal not diamonds: how memory pressure falters mobile video QoE

The popularity of video streaming on smartphones has led to rising demands for high-quality mobile video streaming. Consequently, we are observing growing support for higher resolution videos (e.g., HD, FHD, QHD) and higher video frame rates (e.g., 48 ...

SESSION: Network control and management
research-article
Open Access
Zoonet: a proactive telemetry system for large-scale cloud networks

We present Zoonet, a proactive virtual network telemetry system for multi-tenant clouds. The requirements are to (1) cover hyper-scale virtual networks with millions of tenants and millions of VMs for top tenants; (2) handle frequent virtual topology ...

research-article
Drift-bottle: a lightweight and distributed approach to failure localization in general networks

Network failure severely impairs network performance, affecting latency and throughput of data transmission. Existing failure localization solutions for general networks face problems such as difficulty in acquiring data from end hosts, need for extra ...

research-article
Open Access
FlowTele: remotely shaping traffic on internet-scale networks

Internet content providers often deliver content through bandwidth bottlenecks that are out of their control. Thus, despite often having massively over-provisioned upstream servers, the content providers still cannot control the end-to-end user ...

SESSION: Mobile and wireless
research-article
OutRAN: co-optimizing for flow completion time in radio access network

Traffic from interactive applications demanding low latency has become dominant in cellular networks. However, existing schedulers of cellular network base stations fall short in delivering low latency when prior information (i.e., dedicated Quality of ...

Enabling emerging edge applications through a 5G control plane intervention

5G networks are considered potential enablers for many emerging edge applications, such as those related to autonomous vehicles, virtual and augmented reality, and online gaming. However, recent works have shown the cellular control plane is a potential ...

TnB: resolving collisions in LoRa based on the peak matching cost and block error correction

LoRa has emerged as one of the main candidates for connecting low-power wireless IoT devices. Packet collisions occur in LoRa networks when multiple nodes transmit wireless signals simultaneously. In this paper, a novel solution, referred to as TnB, is ...

Contributors
  • Sapienza University of Rome

Index Terms

  1. Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies
      Index terms have been assigned to the content through auto-classification.
      Please enable JavaScript to view thecomments powered by Disqus.

      Recommendations

      Acceptance Rates

      CoNEXT '22 Paper Acceptance Rate 28 of 151 submissions, 19%;
      Overall Acceptance Rate 198 of 789 submissions, 25%
      YearSubmittedAcceptedRate
      CoNEXT '221512819%
      CoNEXT '19 Companion523465%
      CoNEXT '161603019%
      CoNEXT '141332720%
      CoNEXT Student Workshop '14341750%
      CoNEXT '132264419%
      CoNEXT Student Workhop '13331855%
      Overall78919825%