You do not have permission to edit this page, for the following reason:

You are not allowed to execute the action you have requested.


You can view and copy the source of this page.

x
 
1
2
== Abstract ==
3
4
Network management relies on an up-to-date and accurate view of many traffic metrics for tasks such as traffic engineering (e.g., heavy hitters), anomaly detection (e.g., entropy of source addresses), and security (e.g., DDoS detection). Obtaining an accurate estimate of these metrics while using little router CPU and memory is challenging. This in turn has inspired a large body of work in data streaming devoted to developing optimized algorithms for individual monitoring tasks, as well as recent approaches to make it simpler to implement these algorithms (e.g., OpenSketch). While this body of work has been seminal, we argue that this trajectory of crafting special purpose algorithms is untenable in the long term. We make a case for a "RISC" approach for flow monitoring analogous to a reduced instruction set in computer architecture---a simple and generic monitoring primitive from which a range of metrics can be computed with high accuracy. Building on recent theoretical advances in universal streaming, we show that this "holy grail" for flow monitoring might be well within our reach.
5
6
7
== Original document ==
8
9
The different versions of the original document can be found in:
10
11
* [http://users.ece.cmu.edu/%7Evsekar/papers/hotnets15_universalstreaming.pdf http://users.ece.cmu.edu/%7Evsekar/papers/hotnets15_universalstreaming.pdf]
12
13
* [http://users.ece.cmu.edu/~vsekar/papers/hotnets15_universalstreaming.pdf http://users.ece.cmu.edu/~vsekar/papers/hotnets15_universalstreaming.pdf],
14
: [https://dblp.uni-trier.de/db/conf/hotnets/hotnets2015.html#LiuVBS15 https://dblp.uni-trier.de/db/conf/hotnets/hotnets2015.html#LiuVBS15],
15
: [https://users.ece.cmu.edu/~vsekar/papers/hotnets15_universalstreaming.pdf https://users.ece.cmu.edu/~vsekar/papers/hotnets15_universalstreaming.pdf],
16
: [http://conferences.sigcomm.org/hotnets/2015/papers/liu.pdf http://conferences.sigcomm.org/hotnets/2015/papers/liu.pdf],
17
: [https://doi.acm.org/10.1145/2834050.2834098 https://doi.acm.org/10.1145/2834050.2834098],
18
: [https://dl.acm.org/citation.cfm?doid=2834050.2834098 https://dl.acm.org/citation.cfm?doid=2834050.2834098],
19
: [https://academic.microsoft.com/#/detail/2266632434 https://academic.microsoft.com/#/detail/2266632434]
20
21
* [http://dl.acm.org/ft_gateway.cfm?id=2834098&ftid=1643669&dwn=1 http://dl.acm.org/ft_gateway.cfm?id=2834098&ftid=1643669&dwn=1],
22
: [http://dx.doi.org/10.1145/2834050.2834098 http://dx.doi.org/10.1145/2834050.2834098] under the license http://www.acm.org/publications/policies/copyright_policy#Background
23

Return to Liu et al 2015f.

Back to Top

Document information

Published on 01/01/2015

Volume 2015, 2015
DOI: 10.1145/2834050.2834098
Licence: Other

Document Score

0

Views 0
Recommendations 0

Share this document

Keywords

claim authorship

Are you one of the authors of this document?