TY - JOUR
T1 - I Know What You Did Last Summer
T2 - Network Monitoring using Interval Queries
AU - Ivkin, Nikita
AU - Ben Basat, Ran
AU - Liu, Zaoxing
AU - Einziger, Gil
AU - Friedman, Roy
AU - Braverman, Vladimir
N1 - Publisher Copyright:
© 2020 Copyright is held by the owner/author(s).
PY - 2020/7/8
Y1 - 2020/7/8
N2 - Modern telemetry systems require advanced analytic capabilities such as drill down queries. These queries can be used to detect the beginning and end of a network anomaly by efficiently refining the search space. We present the first integral solution that (i) enables multiple measurement tasks inside the same data structure, (ii) supports specifying the time frame of interest as part of its queries, and (iii) is sketch-based and thus space efficient. Namely, our approach allows the user to define both the measurement task (e.g., heavy hitters, entropy estimation, cardinality estimation) and the time frame of relevance (e.g., 5PM-6PM) at query time. Our approach provides accuracy guarantees and is the only space-efficient solution that offers such capabilities. Finally, we demonstrate how the algorithm can be used to accurately pinpoint the beginning of a realistic DDoS attack.
AB - Modern telemetry systems require advanced analytic capabilities such as drill down queries. These queries can be used to detect the beginning and end of a network anomaly by efficiently refining the search space. We present the first integral solution that (i) enables multiple measurement tasks inside the same data structure, (ii) supports specifying the time frame of interest as part of its queries, and (iii) is sketch-based and thus space efficient. Namely, our approach allows the user to define both the measurement task (e.g., heavy hitters, entropy estimation, cardinality estimation) and the time frame of relevance (e.g., 5PM-6PM) at query time. Our approach provides accuracy guarantees and is the only space-efficient solution that offers such capabilities. Finally, we demonstrate how the algorithm can be used to accurately pinpoint the beginning of a realistic DDoS attack.
UR - http://www.scopus.com/inward/record.url?scp=85088484000&partnerID=8YFLogxK
U2 - https://doi.org/10.1145/3410048.3410084
DO - https://doi.org/10.1145/3410048.3410084
M3 - Article
AN - SCOPUS:85088484000
SN - 0163-5999
VL - 48
SP - 61
EP - 62
JO - Performance Evaluation Review
JF - Performance Evaluation Review
IS - 1
ER -