Skip to main content

Showing 1–6 of 6 results for author: Feibish, S L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.14358  [pdf, ps, other

    cs.NI

    Measuring Round-Trip Response Latencies Under Asymmetric Routing

    Authors: Bhavana Vannarth Shobhana, Yen-lin Chien, Jonathan Diamant, Badri Nath, Shir Landau Feibish, Srinivas Narayana

    Abstract: Latency is a key indicator of Internet service performance. Continuously tracking the latency of client requests enables service operators to quickly identify bottlenecks, perform adaptive resource allocation or routing, and mitigate attacks. Passively measuring the response latency at intermediate vantage points is attractive since it provides insight into the experience of real clients without r… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

  2. arXiv:2402.11155  [pdf, other

    cs.NI

    Automated Optimization of Parameterized Data-Plane Programs with Parasol

    Authors: Mary Hogan, Devon Loehr, John Sonchack, Shir Landau Feibish, Jennifer Rexford, David Walker

    Abstract: Programmable data planes allow for sophisticated applications that give operators the power to customize the functionality of their networks. Deploying these applications, however, often requires tedious and burdensome optimization of their layout and design, in which programmers must manually write, compile, and test an implementation, adjust the design, and repeat. In this paper we present Paras… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

  3. arXiv:2311.02636  [pdf, other

    cs.NI

    Compact Data Structures for Network Telemetry

    Authors: Shir Landau Feibish, Zaoxing Liu, Jennifer Rexford

    Abstract: Collecting and analyzing of network traffic data (network telemetry) plays a critical role in managing modern networks. Network administrators analyze their traffic to troubleshoot performance and reliability problems, and to detect and block cyberattacks. However, conventional traffic-measurement techniques offer limited visibility into network conditions and rely on offline analysis. Fortunately… ▽ More

    Submitted 5 February, 2025; v1 submitted 5 November, 2023; originally announced November 2023.

  4. arXiv:2005.11542  [pdf, other

    cs.NI cs.DS

    Routing Oblivious Measurement Analytics

    Authors: Ran Ben Basat, Xiaoqi Chen, Gil Einziger, Shir Landau Feibish, Danny Raz, Minlan Yu

    Abstract: Network-wide traffic analytics are often needed for various network monitoring tasks. These measurements are often performed by collecting samples at network switches, which are then sent to the controller for aggregation. However, performing such analytics without ``overcounting'' flows or packets that traverse multiple measurement switches is challenging. Therefore, existing solutions often simp… ▽ More

    Submitted 25 May, 2020; v1 submitted 23 May, 2020; originally announced May 2020.

    Comments: To appear in IFIP Networking 2020

  5. arXiv:1702.08037  [pdf, other

    cs.NI

    Detecting Heavy Flows in the SDN Match and Action Model

    Authors: Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff

    Abstract: Efficient algorithms and techniques to detect and identify large flows in a high throughput traffic stream in the SDN match-and-action model are presented. This is in contrast to previous work that either deviated from the match and action model by requiring additional switch level capabilities or did not exploit the SDN data plane. Our construction has two parts; (a) how to sample in an SDN match… ▽ More

    Submitted 26 February, 2017; originally announced February 2017.

  6. arXiv:1612.02636  [pdf, other

    cs.CR cs.NI

    Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection

    Authors: Yehuda Afek, Anat Bremler-Barr, Edith Cohen, Shir Landau Feibish, Michal Shagam

    Abstract: Motivated by a recent new type of randomized Distributed Denial of Service (DDoS) attacks on the Domain Name Service (DNS), we develop novel and efficient distinct heavy hitters algorithms and build an attack identification system that uses our algorithms. Heavy hitter detection in streams is a fundamental problem with many applications, including detecting certain DDoS attacks and anomalies. A (c… ▽ More

    Submitted 8 December, 2016; originally announced December 2016.