Proceedings of the 17th International Conference on Emerging Networking EXperiments and Technologies 2021
DOI: 10.1145/3485983.3494871
|View full text |Cite
|
Sign up to set email alerts
|

Colibri

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 42 publications
0
6
0
Order By: Relevance
“…This reconciliation of estimation accuracy and query efficiency decisively propels real-world applications that rely on stream processing. For example, emerging QoS systems based on bandwidth reservation [17] must quickly identify flows that overuse their reservation, and require the highly efficient and highly accurate flow-size estimation which only the sketches in this paper can guarantee.…”
Section: Discussionmentioning
confidence: 99%
“…This reconciliation of estimation accuracy and query efficiency decisively propels real-world applications that rely on stream processing. For example, emerging QoS systems based on bandwidth reservation [17] must quickly identify flows that overuse their reservation, and require the highly efficient and highly accurate flow-size estimation which only the sketches in this paper can guarantee.…”
Section: Discussionmentioning
confidence: 99%
“…In the longer term, small-burst attacks might be effectively countered by DDoS defense systems that restrict flow creation. For example, COLIBRI [4] relies on source authentication and paid per-flow reservations, which limits the number of flows over which attack traffic can be distributed. Given this restriction, the adversary is forced to create medium-sized bursts in each flow, which are then again detectable.…”
Section: Discussionmentioning
confidence: 99%
“…In the mitigation component, the forwarding is adapted in order to block, rate-limit, or deprioritize the suspicious flows. Another approach is followed by COLIBRI [4], which is based on source authentication and flow-based reservations. Whenever a flow overuses its reservation, the flow is blocked.…”
Section: Problem Statement a Backgroundmentioning
confidence: 99%
See 2 more Smart Citations