Abstract
Is it possible to design a packet-sampling algorithm that prevents the network node that performs the sampling from treating the sampled packets preferentially? We study this problem in the context of designing a "network transparency'' system. In this system, networks emit receipts for a small sample of the packets they observe, and a monitor collects these receipts to estimate each network's loss and delay performance. Sampling is a good building block for this system, because it enables a solution that is flexible and combines low resource cost with quantifiable accuracy. The challenge is cheating resistance: when a network's performance is assessed based on the conditions experienced by a small traffic sample, the network has a strong incentive to treat the sampled packets better than the rest. We contribute a sampling algorithm that is provably robust to such prioritization attacks, enables network performance estimation with quantifiable accuracy, and requires minimal resources. We confirm our analysis using real traffic traces.
- Katerina Argyraki, Petros Maniatis, David Cheriton, and Scott Shenker. 2004. Providing Packet Obituaries. In Proc. of the ACM Workshop on Hot Topics in Networking (HotNets).Google Scholar
- Katerina Argyraki, Petros Maniatis, Olga Irzak, Subramanian Ashish, and Scott Shenker. 2007. Loss and Delay Accountability for the Internet. In Proc. of the IEEE International Conference on Network Protocols (ICNP).Google Scholar
Cross Ref
- Katerina Argyraki, Petros Maniatis, and Ankit Singla. 2010. Verifiable Network-performance Measurements. In Proc. of the International Conference on emerging Networking EXperiments and Technologies (CoNEXT). Google Scholar
Digital Library
- Boaz Barak, Sharon Goldberg, and David Xiao. 2008. Protocols and Lower Bounds for Failure Localization in the Internet. In Proc. of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT). Google Scholar
Digital Library
- Jean-Yves Le Boudec. 2011. Performance Evaluation of Computer and Communication Systems. EFPL Press.Google Scholar
- Cisco. 2019. IOS NetFlow. (2019). Retrieved January 2019 from http://www.cisco.com/c/en/us/products/ios-nx-ossoftware/ ios-netflow/index.htmlGoogle Scholar
- Global Net Neutrality Coalition. 2019. Status of Net Neutrality Around the World. (2019). Retrieved January 2019 from https://www.thisisnetneutrality.org/Google Scholar
- Cogent. 2016. Network Services SLA Global. (2016). Retrieved January 2019 from https://cogentco.com/files/docs/ network/performance/global_sla.pdfGoogle Scholar
- Comcast. 2009. Service Level Agreement for Wholesale Dedicated Internet. (2009). Retrieved January 2019 from https://portals.comcasttechnologysolutions.com/sites/default/files/service_level_agreement_for_wholesale_ dedicated_internet_sla07292014.pdfGoogle Scholar
- European Commission. 2013. On-line public consultation on "specific aspects of transparency, traffic management and switching in an Open Internet". (2013). Retrieved January 2019 from https://ec.europa.eu/digital-single-market/en/ news/answers-public-consultation-specific-aspects-transparency-traffic-management-and-switching-openGoogle Scholar
- David Cox and P A. W. Lewis. 1966. The statistical analysis of series of events. Springer. 59--60 pages.Google Scholar
- DPDK. 2015. Data Plane Development Kit. (2015). Retrieved May 2015 from http://dpdk.orgGoogle Scholar
- Nick Duffield and Matthias Grossglauser. 2001. Trajectory Sampling for Direct Traffic Observation. IEEE/ACM Transactions on Networking (June 2001). Google Scholar
Digital Library
- Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak, and Jennifer Rexford. 2008. Path-quality Monitoring in the Presence of Adversaries. In Proc. of the ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS). Google Scholar
Digital Library
- Shay Gueron. 2010. Intel Advanced Encryption Standard (AES) New Instruction Set. (2010). Retrieved January 2019 from https://software.intel.com/sites/default/files/article/165683/aes-wp-2012-09--22-v01.pdfGoogle Scholar
- Gerhard Hasslinger and Oliver Hohlfeld. 2008. The Gilbert-Elliott Model for Packet Loss in Real Time Services on the Internet. In Proc. of the GI/ITG Conference - Measurement, Modelling and Evalutation of Computer and Communication Systems (MMB).Google Scholar
- Manish Joshi and Theyazn Hassn Hadi. 2015. A Review of Network Traffic Analysis and Prediction Techniques. (2015). arXiv:arXiv:1507.05722Google Scholar
- Myungjin Lee, Nick Duffield, and Ramana Rao Kompella. 2010. Two Samples Are Enough: Opportunistic Flowlevel Latency Estimation Using Netflow. In Proc. of the IEEE International Conference on Computer Communications (INFOCOM). Google Scholar
Digital Library
- William Lehr, Erin Kenneally, and Steven Bauer. 2015. The Road to an Open Internet is Paved with Pragmatic Disclosure and Transparency Policies. In Proc. of the Telecommunications Policy Research Conference (TPRC).Google Scholar
Cross Ref
- Body of European Regulators for Electronic Communications (BEREC). 2016. BoR (16) 127: Guidelines on the Implementation by National Regulators of European Net Neutrality Rules. (2016). Retrieved January 2019 from http://berec.europa.eu/eng/document_register/subject_matter/berec/download/0/6160-berec-guidelines-on-theimplementation- b_0.pdfGoogle Scholar
- Christos Pappas, Katerina Argyraki, Stefan Bechtold, and Adrian Perrig. 2015. Transparency Instead of Neutrality. In Proc. of the ACM Workshop on Hot Topics in Networks (HotNets). Google Scholar
Digital Library
- Joel Sommers, Paul Barford, Nick Duffield, and Amos Ron. 2007. Accurate and Efficient SLA Compliance Monitoring. SIGCOMM Computer Communication Review (Oct 2007). Google Scholar
Digital Library
- Verizon. 2019. Global Latency and Packet Delivery SLA. (2019). Retrieved January 2019 from http://www. verizonenterprise.com/terms/global_latency_sla.xmlGoogle Scholar
- Xin Zhang, Abhishek Jain, and Adrian Perrig. 2008. Packet-dropping Adversary Identification for Data Plane Security. In Proc. of the International Conference on emerging Networking EXperiments and Technologies (CoNEXT). Google Scholar
Digital Library
- Xin Zhang, Chang Lan, and Adrian Perrig. 2012. Secure and Scalable Fault Localization Under Dynamic Traffic Patterns. In Proc. of the IEEE Symposium on Security and Privacy (SP). Google Scholar
Digital Library
- Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Adrian Perrig, and Patrick Tague. 2012. ShortMAC: Efficient Data Plane Fault Localization. In Proc. of the NDSS Symposium (NDSS).Google Scholar
- Tanja Zseby and Sebastian Zander. 2001. Evaluation of Building Blocks for Passive One-way-delay Measurements. In Proc. of the workshop on Passive and Active Measurement (PAM).Google Scholar
Index Terms
Retroactive Packet Sampling for Traffic Receipts
Recommendations
Retroactive Packet Sampling for Traffic Receipts
SIGMETRICS '19: Abstracts of the 2019 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer SystemsIs it possible to design a packet-sampling algorithm that prevents the network node that performs the sampling from treating the sampled packets preferentially? We study this problem in the context of designing a "network-transparency'' system. In this ...
Retroactive Packet Sampling for Traffic Receipts
Is it possible to design a packet-sampling algorithm that prevents the network node that performs the sampling from treating the sampled packets preferentially? We study this problem in the context of designing a "network-transparency" system. In this ...
Study of temporal behaviour of packet loss in packet switches with bursty traffic arrivals
The study of packet loss is of great importance to the design of fast packet switching systems. Fast packet switching is generally accepted as the best technique for designing high-speed computer networks. Due to the high throughput demands and the ...






Comments