PPT-Network-Wide Heavy-Hitter Detection
Author : trish-goza | Published Date : 2018-11-08
for RealTime Telemetry Qizhe Cai Advisor Jennifer Rexford 1 HeavyHitter Flows FlowID Count Green 101 Blue 30 Red 10 2 HeavyHitters exceed some threshold of packets
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Network-Wide Heavy-Hitter Detection" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Network-Wide Heavy-Hitter Detection: Transcript
for RealTime Telemetry Qizhe Cai Advisor Jennifer Rexford 1 HeavyHitter Flows FlowID Count Green 101 Blue 30 Red 10 2 HeavyHitters exceed some threshold of packets or bytes . D. ynamic . Re. source . A. llocation for Software-defined . M. easurement. Masoud Moshref. , Minlan Yu, . Ramesh Govindan, Amin Vahdat. 1. (SIGCOMM’14). Measurement is Crucial for Network Management. Paper by: T. Bowen. Presented by: Tiyseer Al Homaiyd. 1. Introduction: . Intrusions: show observable events that deviate from the . norm.. Survivable system usually focus on detecting intrusions rather than preventing or containing damage. . Anomaly-based . Network Intrusion . Detection (A-NIDS). by Nitish Bahadur, Gulsher Kooner, . Caitlin Kuhlman. 1. PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management [Online]. Available: . D. ynamic . Re. source . A. llocation for Software-defined . M. easurement. Masoud Moshref. , Minlan Yu, . Ramesh Govindan, Amin Vahdat. 1. (SIGCOMM’14). Measurement is Crucial for Network Management. Approach. . for Software-Defined . Monitoring. . using Universal Streaming. Vyas Sekar. Zaoxing Liu. , . Greg . Vorsanger. , . Vladimir Braverman. Network Management:. Many . Monitoring Requirements. Vibhaalakshmi Sivaraman. Srinivas Narayana, Ori . RottenSTREICH. , MUTHU . MuthuKRSISHNAN. , JENNIFER REXFORD. 1. Heavy Hitter Flows. Flows above a certain threshold of total packets. “Top-. k. ” flows by size. David Woodruff . IBM . Almaden. Based on works with Vladimir . Braverman. , Stephen R. Chestnut Nikita . Ivkin. , Jelani Nelson, and . Zhengyu. Wang. Streaming Model. Stream of elements a. 1. , …, a. M. ustafa . Wide Area Network (WAN). Computers connected to a wide area network are often connected through community networks, such as the telephone organization. They can also be connected through rented lines or satellites. . modified from slides of . Lawrie. Brown. Classes of Intruders – Cyber Criminals. Individuals or members of an organized crime group with a goal of financial reward. Their activities may include: . David Woodruff . IBM . Almaden. Based on works with Vladimir . Braverman. , Stephen R. Chestnut Nikita . Ivkin. , Jelani Nelson, and . Zhengyu. Wang. Streaming Model. Stream of elements a. 1. , …, a. Vibhaalakshmi Sivaraman. Srinivas Narayana, Ori . RottenSTREICH. , MUTHU . MuthuKRSISHNAN. , JENNIFER REXFORD. 1. Heavy Hitter Flows. Flows above a certain threshold of total packets. “Top-. k. ” flows by size. Why Social Graphs Are Different. Communities. Finding Triangles. Jeffrey D. Ullman. Stanford University/. Infolab. Social Graphs. Graphs can be either directed or undirected.. Example. : The Facebook “friends” graph (undirected).. DIMENSIONS ARE SUBJECT TO MANUFACTURERS TOLERANCE AND CHANGE WITHOUT NOTICEWE CAN ASSUME NO RESPONSIBILITY FOR USE OF SUPERSEDED OR VOID DATADRAWN BYCHECKED BYAPPROVED BYDRAWING NUMBERDATEJAY RMEMBER Superspreaders. . Lu Tang. †. . , . Qun. Huang. ‡. , and Patrick P. C. Lee. †. † . The Chinese University of Hong Kong. ‡ . Institute of Computing Technology, CAS. IEEE INFOCOM 2020. 1.
Download Document
Here is the link to download the presentation.
"Network-Wide Heavy-Hitter Detection"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents