SDNShield: NFV-Based Defense Framework Against DDoS Attacks on SDN Control Plane
Software-defined networking (SDN) is increasingly popular in today’s information technology industry, but existing SDN control plane is insufficiently scalable to support on-demand, high-frequency flow requests. Weaknesses along SDN control paths ...
Learning to Cache and Caching to Learn: Regret Analysis of Caching Algorithms
Crucial performance metrics of a caching algorithm include its ability to quickly and accurately learn a popularity distribution of requests. However, a majority of work on analytical performance analysis focuses on hit probability after an asymptotically ...
QFlow: A Learning Approach to High QoE Video Streaming at the Wireless Edge
- Rajarshi Bhattacharyya,
- Archana Bura,
- Desik Rengarajan,
- Mason Rumuly,
- Bainan Xia,
- Srinivas Shakkottai,
- Dileep Kalathil,
- Ricky K. P. Mok,
- Amogh Dhamdhere
The predominant use of wireless access networks is for media streaming applications. However, current access networks treat all packets identically, and lack the agility to determine which clients are most in need of service at a given time. Software ...
From Conception to Retirement: A Lifetime Story of a 3-Year-Old Wireless Beacon System in the Wild
We report a 3-year city-wide study of an operational indoor sensing system based on Bluetooth Low Energy (BLE) called <monospace>aBeacon</monospace> (short for <underline>a</underline>libaba <underline>Beacon</underline>). <monospace>aBeacon</monospace> ...
A Coverage-Aware Distributed <italic>k</italic>-Connectivity Maintenance Algorithm for Arbitrarily Large <italic>k</italic> in Mobile Sensor Networks
Mobile sensor networks (MSNs) have emerged from the interaction between mobile robotics and wireless sensor networks. MSNs can be deployed in harsh environments, where failures in some nodes can partition MSNs into disconnected network segments or reduce ...
A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet
Open DNS resolvers are resolvers that perform recursive resolution on behalf of any user. They can be exploited by adversaries because they are open to the public and require no authorization to use. Therefore, it is important to understand the state of ...
SEAD Counter: Self-Adaptive Counters With Different Counting Ranges
The Sketch is a compact data structure useful for network measurements. However, to cope with the high speeds of the current data plane, it needs to be held in the small on-chip memory (SRAM). Therefore, the product of the counter size and the number of ...
Selection of Sensors for Efficient Transmitter Localization
We address the problem of localizing an (unauthorized) transmitter using a distributed set of sensors. Our focus is on developing techniques that perform the transmitter localization in an efficient manner, wherein the efficiency is defined in terms of ...
Optimal Deployment of SRv6 to Enable Network Interconnection Service
Many organizations nowadays have multiple sites at different geographic locations. Typically, transmitting massive data among these sites relies on the interconnection service offered by ISPs. Segment Routing over IPv6 (SRv6) is a new simple and flexible ...
MDLdroid: A ChainSGD-Reduce Approach to Mobile Deep Learning for Personal Mobile Sensing
Personal mobile sensing is fast permeating our daily lives to enable activity monitoring, healthcare and rehabilitation. Combined with deep learning, these applications have achieved significant success in recent years. Different from conventional cloud-...
CodedReduce: A Fast and Robust Framework for Gradient Aggregation in Distributed Learning
We focus on the commonly used synchronous Gradient Descent paradigm for large-scale distributed learning, for which there has been a growing interest to develop efficient and robust gradient aggregation strategies that overcome two key system bottlenecks: ...
MAX-Tree: A Novel Topology Formation for Maximal Area Coverage in Wireless Ad-Hoc Networks
For many wireless ad-hoc network (WANET) applications, including wireless sensor, robotic, and flying ad-hoc networks, area coverage is a major challenge. This challenge, which may include the number of required nodes, cumulative energy consumption, or ...
Quality-Aware Incentive Mechanisms Under Social Influences in Data Crowdsourcing
Incentive mechanism design and quality control are two key challenges in data crowdsourcing, because of the need for recruitment of crowd users and their limited capabilities. Without considering users’ social influences, existing mechanisms often ...
Universal Scaling of Distributed Queues Under Load Balancing in the Super-Halfin-Whitt Regime
This paper considers the steady-state performance of load balancing algorithms in a many-server system with distributed queues. The system has <inline-formula> <tex-math notation="LaTeX">$N$ </tex-math></inline-formula> servers, and each server maintains ...
Exploring Partitioning Attacks on the Bitcoin Network
Bitcoin is the leading example of a blockchain application that facilitates peer-to-peer transactions without the need for a trusted third party. This paper considers possible attacks related to the decentralized network architecture of Bitcoin. We ...
Machine Learning on Volatile Instances: Convergence, Runtime, and Cost Tradeoffs
Due to the massive size of the neural network models and training datasets used in machine learning today, it is imperative to distribute stochastic gradient descent (SGD) by splitting up tasks such as gradient evaluation across multiple worker nodes. ...
Unifying AoI Minimization and Remote Estimation—Optimal Sensor/Controller Coordination With Random Two-Way Delay
The ubiquitous usage of communication networks in modern sensing and control applications has kindled new interests on the timing coordination between sensors and controllers, i.e., how to use the “waiting time” to improve the system ...
Processing-While-Transmitting: Cost-Minimized Transmission in SDN-Based STINs
Existing Space-Terrestrial Integrated Network (STIN) applications collect all data from multiple satellites and terrestrial nodes to the specific analyze center on the earth for processing, which wastes lots of network resources. To save these resources, ...
Virtualization-Aware Traffic Control for Soft Real-Time Network Traffic on Xen
As the role of virtualization technology becomes more prevalent, the range of applications deployed in virtualized systems is steadily growing. This increasingly includes applications with soft real-time requirements that benefit from low and predictable ...
NCScale: Toward Optimal Storage Scaling via Network Coding
To adapt to the increasing storage demands and varying storage redundancy requirements, practical distributed storage systems need to support <italic>storage scaling</italic> by relocating currently stored data to different storage nodes. However, the ...
Adaptive Configuration Selection and Bandwidth Allocation for Edge-Based Video Analytics
Major cities worldwide have millions of cameras deployed for surveillance, business intelligence, traffic control, crime prevention, etc. Real-time analytics on video data demands intensive computation resources and high energy consumption. Traditional ...
Super Spreader Identification Using Geometric-Min Filter
Super spreader identification has a lot of applications in network management and security monitoring. It is a more difficult problem than heavy hitter identification because flow spread is harder to measure than flow size due to the requirement of ...
COIN: An Efficient Indexing Mechanism for Unstructured Data Sharing Systems
Edge computing promises a dramatic reduction in the network latency and the traffic volume, where many edge servers are placed at the edge of the Internet. Furthermore, those edge servers cache data to provide services for edge users. The data sharing ...
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams
Truth discovery is an effective paradigm which could reveal the truth from crowdsouced data with conflicts, enabling data-driven decision-making systems to make quick and smart decisions. The increasing privacy concern promotes users to perturb or encrypt ...
Improved Load Balancing in Large Scale Systems Using Attained Service Time Reporting
Our interest lies in load balancing jobs in large scale systems consisting of multiple dispatchers and FCFS servers. In the absence of any information on job sizes, a popular load balancing method is the SQ(<inline-formula> <tex-math notation="LaTeX">$d$ <...
Cheetah: A High-Speed Programmable Load-Balancer Framework With Guaranteed Per-Connection-Consistency
Large service providers use load balancers to dispatch millions of incoming connections per second towards thousands of servers. There are two basic yet critical requirements for a load balancer: <italic>uniform load distribution</italic> of the incoming ...
An Adaptive Robustness Evolution Algorithm With Self-Competition and its 3D Deployment for Internet of Things
Internet of Things (IoT) includes numerous sensing nodes that constitute a large scale-free network. Optimizing the network topology to increase resistance against malicious attacks is a complex problem, especially on 3-dimension (3D) topological ...
LB Scalability: Achieving the Right Balance Between Being Stateful and Stateless
A high performance Layer-4 load balancer (LB) is one of the most important components of a cloud service infrastructure. Such an LB uses network and transport layer information for deciding how to distribute client requests across a group of servers. A ...
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting
With the popularization of Internet of Things (IoT) devices in smart home and industry fields, a huge number of IoT devices are connected to the Internet. However, what devices are connected to a network may not be known by the Internet Service Provider (...
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID
In this paper, we uncover a new off-path TCP hijacking attack that can be used to terminate victim TCP connections or inject forged data into victim TCP connections by manipulating the new mixed IPID assignment method, which is widely used in Linux kernel ...