NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium 2018
DOI: 10.1109/noms.2018.8406200
|View full text |Cite
|
Sign up to set email alerts
|

Real-time detection, isolation and monitoring of elephant flows using commodity SDN system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…Recently developed methods suggest implementing auxiliary devices that can offload the burden caused by metering tens of thousands of active flows per second. 48,49 In switch-based approaches, 10,23,[50][51][52][53][54][55][56][57][58] the task of HHs identification is moved from the controller to the switches. 54,59 Research works aimed at the viability evaluation of switch-based HH classification has, however, shown that practical deployment of such techniques is minimal, mainly due to the high costs of hardware modifications the implementations require.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently developed methods suggest implementing auxiliary devices that can offload the burden caused by metering tens of thousands of active flows per second. 48,49 In switch-based approaches, 10,23,[50][51][52][53][54][55][56][57][58] the task of HHs identification is moved from the controller to the switches. 54,59 Research works aimed at the viability evaluation of switch-based HH classification has, however, shown that practical deployment of such techniques is minimal, mainly due to the high costs of hardware modifications the implementations require.…”
Section: Related Workmentioning
confidence: 99%
“…A general observation in the HH classification literature is that there is no consensus on what feature or set of features (e.g., size, duration, and rate) should be selected. In consequence, some techniques rely on size 7,8,63,[83][84][85] while other approaches use rate 50,69,86 or duration 50,51 as a threshold. Other features such as the number of packets transmitted in the flow 52 and specific data structures 87 are also used as a threshold.…”
Section: Challenges Of Threshold-based Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…This puts a requirement on the rule space of the switch. We know that a typical SDN switch in an enterprise network can hold about 55000 rules at a given time [7] and encounter up to 18000 new flows arriving per second at busy hours [8]. The switch cannot add new rules when its rule space is full.…”
Section: Background and Motivation A Packet Injection Attacksmentioning
confidence: 99%
“…Further, with TLS 1.3 and eSNI [30], this trend might soon be adopted by various content providers. In this work, for QUIC flows, we have used DNS information to tag a video server, and an empirical threshold of 4MB to identify elephant flows [31], presumably carrying video content from that server. However, with the adoption of DoH and DNSSEC, even this information might not be available for a network operator, thus making it very challenging to identify video flows.…”
Section: E Challenges and Limitationsmentioning
confidence: 99%