Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3281411.3281427acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

Memento: making sliding windows efficient for heavy hitters

Published: 04 December 2018 Publication History
  • Get Citation Alerts
  • Abstract

    Cloud operators require real-time identification of Heavy Hitters (HH) and Hierarchical Heavy Hitters (HHH) for applications such as load balancing, traffic engineering, and attack mitigation. However, existing techniques are slow in detecting new heavy hitters.
    In this paper, we make the case for identifying heavy hitters through sliding windows. Sliding windows are quicker and more accurate to detect new heavy hitters than current interval based methods, but to date had no practical algorithms. Accordingly, we introduce, design and analyze the Memento family of sliding window algorithms for the HH and HHH problems in the single-device and network-wide settings. Using extensive evaluations, we show that our single-device solutions attain similar accuracy and are by up to 273X faster than existing window-based techniques. Furthermore, we exemplify our network-wide HHH detection capabilities on a realistic testbed. To that end, we implemented Memento as an open-source extension to the popular HAProxy cloud load-balancer. In our evaluations, using an HTTP flood by 50 subnets, our network-wide approach detected the new subnets faster, and reduced the number of undetected flood requests by up to 37X compared to the alternatives.

    Supplementary Material

    ZIP File (p254-basat.zip)
    Supplemental material.
    MP4 File (p254-ben_basat.mp4)

    References

    [1]
    Memento algorithms code and HAProxy extension. https://github.com/DHMementoz/Memento.
    [2]
    Unpublished, see http://www.lasr.cs.ucla.edu/ddos/traces/.
    [3]
    Y. Afek, A. Bremler-Barr, S. L. Feibish, and L. Schiff. Detecting heavy flows in the SDN match and action model. Computer Networks, 136:1 -- 12, 2018.
    [4]
    M. Alizadeh, S. Yang, M. Sharif, S. Katti, N. McKeown, B. Prabhakar, and S. Shenker. pFabric: Minimal Near-optimal Datacenter Transport. ACM SIGCOMM, pages 435--446, 2013.
    [5]
    D. Anderson, P. Bevan, K. Lang, E. Liberty, L. Rhodes, and J. Thaler. A high-performance algorithm for identifying frequent items in data streams. In ACM Internet Measurement Conference, pages 268--282, 2017.
    [6]
    E. Assaf, R. Ben-Basat, G. Einziger, and R. Friedman. Pay for a sliding bloom filter and get counting, distinct elements, and entropy for free. In IEEE INFOCOM, 2018.
    [7]
    R. B. Basat, G. Einziger, R. Friedman, M. C. Luizelli, and E. Waisbard. Constant time updates in hierarchical heavy hitters. In ACM SIGCOMM, 2017.
    [8]
    R. B. Basat, G. Einziger, R. Friedman, M. C. Luizelli, and E. Waisbard. Volumetric hierarchical heavy hitters. In IEEE MASCOTS, 2018.
    [9]
    R. B. Basat, G. Einziger, I. Keslassy, A. Orda, S. Vargraftik, and E. Waisbard. Memento: Making sliding windows efficient for heavy hitters (full version). CoRR, 2018. http://arxiv.org/abs/1810.02899.
    [10]
    R. Ben Basat, G. Einziger, and R. Friedman. Fast flow volume estimation. In ICDCN '18, 2018.
    [11]
    R. Ben-Basat, G. Einziger, R. Friedman, and Y. Kassner. Heavy Hitters in Streams and Sliding Windows. In IEEE Infocom, 2016.
    [12]
    R. Ben-Basat, G. Einziger, R. Friedman, and Y. Kassner. Optimal elephant flow detection. In IEEE INFOCOM, 2017.
    [13]
    R. Ben-Basat, G. Einziger, R. Friedman, and Y. Kassner. Randomized admission policy for efficient top-k and frequency estimation. In IEEE INFOCOM, 2017.
    [14]
    T. Benson, A. Akella, and D. A. Maltz. Network traffic characteristics of data centers in the wild (univ 1 dataset). In ACM Internet Measurement Conference, 2010.
    [15]
    T. Benson, A. Anand, A. Akella, and M. Zhang. MicroTE: Fine Grained Traffic Engineering for Data Centers. In ACM CoNEXT, 2011.
    [16]
    R. A. Brualdi. Introductory combinatorics. New York, 3, 1992.
    [17]
    M. Chiesa, G. Rétvári, and M. Schapira. Lying your way to better traffic engineering. In Proceedings of the 12th International on Conference on Emerging Networking EXperiments and Technologies, ACM CoNEXT, 2016.
    [18]
    K. Cho. Recursive lattice search: hierarchical heavy hitters revisited. In ACM IMC, 2017.
    [19]
    G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava. Finding Hierarchical Heavy Hitters in Data Streams. In VLDB, 2003.
    [20]
    G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava. Diamond in the Rough: Finding Hierarchical Heavy Hitters in Multi-dimensional Data. In SIGMOD, pages 155--166, 2004.
    [21]
    G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava. Finding Hierarchical Heavy Hitters in Streaming Data. ACM Trans. Knowl. Discov. Data, 1(4):2:1--2:48, Feb. 2008.
    [22]
    M. Datar, A. Gionis, P. Indyk, and R. Motwani. Maintaining stream statistics over sliding windows. SIAM J. Comput., 2002.
    [23]
    G. Dittmann and A. Herkersdorf. Network processor load balancing for high-speed links. In SPECTS, volume 735, 2002.
    [24]
    G. Einziger, M. C. Luizelli, and E. Waisbard. Constant time weighted frequency estimation for virtual network functionalities. In ICCCN, pages 1--9, July 2017.
    [25]
    C. Estan, S. Savage, and G. Varghese. Automatically inferring patterns of resource consumption in network traffic. In ACM SIGCOMM, SIGCOMM '03, pages 137--148, New York, NY, USA, 2003. ACM.
    [26]
    R. Harrison, Q. Cai, A. Gupta, and J. Rexford. Network-wide heavy hitter detection with commodity switches. In ACM SOSR, pages 8:1--8:7, 2018.
    [27]
    J. Hershberger, N. Shrivastava, S. Suri, and C. D. Tóth. Space Complexity of Hierarchical Heavy Hitters in Multi-dimensional Data Streams. In ACM PODS, pages 338--347, 2005.
    [28]
    P. Hick. CAIDA Anonymized 2016 Internet Trace, equinix-chicago 2016-02-18 13:00-13:05 UTC, Direction A.
    [29]
    S. Hilton. Dyn Analysis Summary Of Friday October 21 Attack. Available: https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/.
    [30]
    Q. Huang, X. Jin, P. P. C. Lee, R. Li, L. Tang, Y.-C. Chen, and G. Zhang. Sketchvisor: Robust network measurement for software packet processing. In ACM SIGCOMM, 2017.
    [31]
    R. Y. S. Hung, L. Lee, and H. Ting. Finding frequent items over sliding windows with constant update time. IPL 2010.
    [32]
    R. Y. S. Hung and H. F. Ting. Finding heavy hitters over the sliding window of a weighted data stream. In LATIN, pages 699--710, 2008.
    [33]
    L. Jose, M. Yu, and J. Rexford. Online measurement of large traffic aggregates on commodity switches. In USENIX Hot-ICE, 2011.
    [34]
    N. Katta, A. Ghag, M. Hira, I. Keslassy, A. Bergman, C. Kim, and J. Rexford. Clove: Congestion-aware load-balancing at the virtual edge. In ACM CoNEXT, 2017.
    [35]
    A. Khalimonenko, O. Kupreev, and E. Badovskaya. DDoS attacks in Q1 2018. Available: https://securelist.com/ddos-report-in-q1-2018/85373/.
    [36]
    L. K. Lee and H. F. Ting. A simpler and more efficient deterministic scheme for finding frequent items over sliding windows. In ACM PODS, 2006.
    [37]
    Y. Li, R. Miao, C. Kim, and M. Yu. FlowRadar: A better NetFlow for data centers. In Usenix NSDI, 2016.
    [38]
    A. Metwally, D. Agrawal, and A. E. Abbadi. Efficient Computation of Frequent and Top-k Elements in Data Streams. In ICDT, 2005.
    [39]
    R. Miao, H. Zeng, C. Kim, J. Lee, and M. Yu. Silkroad: Making stateful layer-4 load balancing fast and cheap using switching asics. In ACM SIGCOMM, pages 15--28, 2017.
    [40]
    M. Mitzenmacher, T. Steinke, and J. Thaler. Hierarchical heavy hitters with the space saving algorithm. CoRR, 2011. Conference version appeared in ALENEX 2012.
    [41]
    M. Mitzenmacher, T. Steinke, and J. Thaler. Hierarchical Heavy Hitters with the Space Saving Algorithm. In Proceedings of the Meeting on Algorithm Engineering & Expermiments, ALENEX, 2012.
    [42]
    M. Moshref, M. Yu, R. Govindan, and A. Vahdat. DREAM: Dynamic resource allocation for software-defined measurement. In ACM SIGCOMM, 2014.
    [43]
    S. Muthukrishnan. Data streams: Algorithms and applications. Foundations and Trends® in Theoretical Computer Science, 2005.
    [44]
    S. Muthukrishnan. Data Streams: Algorithms and Applications. Foundations and Trends in Theoretical Computer Science, 1, 2005.
    [45]
    K. Nyalkalkar, S. Sinhay, M. Bailey, and F. Jahanian. A comparative study of two network-based anomaly detection methods. In IEEE Infocom, 2011.
    [46]
    T. Peng, C. Leckie, and K. Ramamohanarao. Protection from distributed denial of service attack using history-based ip filtering. 2002.
    [47]
    R. Schweller, A. Gupta, E. Parsons, and Y. Chen. Reversible sketches for efficient and accurate change detection over network data streams. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, IMC '04, pages 207--212, New York, NY, USA, 2004. ACM.
    [48]
    V. Sekar, N. G. Duffield, O. Spatscheck, J. E. van der Merwe, and H. Zhang. Lads: Large-scale automated ddos detection system. In USENIX ATC, 2006.
    [49]
    V. Sivaraman, S. Narayana, O. Rottenstreich, S. Muthukrishnan, and J. Rexford. Heavy-hitter detection entirely in the data plane. In ACM SOSR, 2017.
    [50]
    O. Tilmans, T. Bühler, I. Poese, S. Vissicchio, and L. Vanbever. Stroboscope: Declarative network monitoring on a budget. In Usenix NSDI, 2018.
    [51]
    T. Yang, J. Jiang, P. Liu, J. G. Qun Huang, Y. Zhou, R. Miao, X. Li, and S. Uhlig. Elastic sketch: Adaptive and fast network-wide measurements. ACM SIGCOMM, 2018.
    [52]
    Y. Yuan, D. Lin, A. Mishra, S. Marwaha, R. Alur, and B. T. Loo. Quantitative network monitoring with NetQRE. In ACM SIGCOMM, pages 99--112, 2017.
    [53]
    Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund. Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation, and Applications. In ACM IMC, pages 101--114, 2004.
    [54]
    Y. Zhou, Y. Zhou, S. Chen, and Y. Zhang. Per-flow counting for big network data stream over sliding windows. In IEEE IWQoS, 2017.
    [55]
    Y. Zhu, N. Kang, J. Cao, A. Greenberg, G. Lu, R. Mahajan, D. Maltz, L. Yuan, M. Zhang, B. Y. Zhao, and H. Zheng. Packet-level telemetry in large datacenter networks. ACM SIGCOMM CCR, 45(4), Aug. 2015.

    Cited By

    View all
    • (2024)Detecting Heavy Hitters in Network-Wide Programmable Multi-Pipe DevicesNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575503(1-5)Online publication date: 6-May-2024
    • (2024)HeavySeparation: A Generic Framework for Stream Processing Faster and More AccurateComputer Communications10.1016/j.comcom.2024.04.036Online publication date: May-2024
    • (2023)Network Monitoring on Multi-Pipe SwitchesProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/35793217:1(1-31)Online publication date: 2-Mar-2023
    • Show More Cited By

    Index Terms

    1. Memento: making sliding windows efficient for heavy hitters

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CoNEXT '18: Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies
        December 2018
        408 pages
        ISBN:9781450360807
        DOI:10.1145/3281411
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 04 December 2018

        Permissions

        Request permissions for this article.

        Check for updates

        Badges

        Qualifiers

        • Research-article

        Conference

        CoNEXT '18
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 198 of 789 submissions, 25%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)32
        • Downloads (Last 6 weeks)3
        Reflects downloads up to 10 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Detecting Heavy Hitters in Network-Wide Programmable Multi-Pipe DevicesNOMS 2024-2024 IEEE Network Operations and Management Symposium10.1109/NOMS59830.2024.10575503(1-5)Online publication date: 6-May-2024
        • (2024)HeavySeparation: A Generic Framework for Stream Processing Faster and More AccurateComputer Communications10.1016/j.comcom.2024.04.036Online publication date: May-2024
        • (2023)Network Monitoring on Multi-Pipe SwitchesProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/35793217:1(1-31)Online publication date: 2-Mar-2023
        • (2023)HH-IPG: Leveraging Inter-Packet Gap Metrics in P4 Hardware for Heavy Hitter DetectionIEEE Transactions on Network and Service Management10.1109/TNSM.2022.322706520:3(3536-3548)Online publication date: Sep-2023
        • (2023)Towards Software Defined Measurement in Data Centers: A Comparative Study of Designs, Implementation, and EvaluationIEEE Transactions on Cloud Computing10.1109/TCC.2022.318189011:2(2057-2070)Online publication date: 1-Apr-2023
        • (2023)A survey on sliding window sketch for network measurementComputer Networks10.1016/j.comnet.2023.109696226(109696)Online publication date: May-2023
        • (2022)Designing Probabilistic Flow Counting over Sliding Windows2022 IEEE 11th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)10.23919/PEMWN56085.2022.9963868(1-6)Online publication date: 8-Nov-2022
        • (2022)AutoMon: Automatic Distributed Monitoring for Arbitrary Multivariate FunctionsProceedings of the 2022 International Conference on Management of Data10.1145/3514221.3517866(310-324)Online publication date: 10-Jun-2022
        • (2022)Botnet Mapping Based on Intersections of TracesProceedings of the 23rd International Conference on Distributed Computing and Networking10.1145/3491003.3491025(198-207)Online publication date: 4-Jan-2022
        • (2022)Staggered HLL: Near-continuous-time cardinality estimation with no overheadComputer Communications10.1016/j.comcom.2022.06.038193(168-175)Online publication date: Sep-2022
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media