Detecting Heavy Hitter (HH) flows, i.e., flows exceeding a pre-determined threshold in a time window, is a fundamental task as it enables network management and security applications like DoS attack detection/prevention, flow-size aware routing, and QoS. The recent breakthroughs of programmable data planes has provided an unique opportunity: detect them directly in the data plane to enable fast control decisions. State-of-the-art solutions leverage either probabilistic data structures [1, 2] or prefix trees [3] to store flow counters directly in the programmable pipeline of switches. However, the former approach still depends on the intervention of a central controller to identify the HH flows from the hash-buckets, thus partially diminishi...
Since heavy flows account for a significant fraction of network traffic, being able to predict heavy...
Many attacks that threaten service providers and legitimate users are anomalous behaviors out of spe...
Many networking and security applications can benefit from exact detection of large flows over arbit...
Detecting Heavy Hitter (HH) flows, i.e., flows exceeding a pre-determined threshold in a time window...
The research community has recently proposed several solutions based on modern programmable switches...
In this paper we address the problem of counting the number of distinct header patterns (flows) seen...
In this paper we present a family of algorithms that address the problem of counting the number of d...
Abstract—Detecting heavy hitters is essential for many net-work management and security applications...
Programmable switches have been widely used to design network monitoring solutions that operate in t...
The advent of Software-Defined Networking with OpenFlow first, and subsequently the emergence of pro...
The ability to detect elephant flows in the forwarding device itself, i.e., a switch, facilitates th...
F1ows that have exceeded a given percentage of the last sliding window of N packets, denoted as heav...
none4siThe advent of Software-Defined Networking with OpenFlow first, and subsequently the emergence...
none4siThe advent of Software-Defined Networking with OpenFlow first, and subsequently the emergence...
As networks get more complex, the ability to track almost all the flows is becoming of paramount imp...
Since heavy flows account for a significant fraction of network traffic, being able to predict heavy...
Many attacks that threaten service providers and legitimate users are anomalous behaviors out of spe...
Many networking and security applications can benefit from exact detection of large flows over arbit...
Detecting Heavy Hitter (HH) flows, i.e., flows exceeding a pre-determined threshold in a time window...
The research community has recently proposed several solutions based on modern programmable switches...
In this paper we address the problem of counting the number of distinct header patterns (flows) seen...
In this paper we present a family of algorithms that address the problem of counting the number of d...
Abstract—Detecting heavy hitters is essential for many net-work management and security applications...
Programmable switches have been widely used to design network monitoring solutions that operate in t...
The advent of Software-Defined Networking with OpenFlow first, and subsequently the emergence of pro...
The ability to detect elephant flows in the forwarding device itself, i.e., a switch, facilitates th...
F1ows that have exceeded a given percentage of the last sliding window of N packets, denoted as heav...
none4siThe advent of Software-Defined Networking with OpenFlow first, and subsequently the emergence...
none4siThe advent of Software-Defined Networking with OpenFlow first, and subsequently the emergence...
As networks get more complex, the ability to track almost all the flows is becoming of paramount imp...
Since heavy flows account for a significant fraction of network traffic, being able to predict heavy...
Many attacks that threaten service providers and legitimate users are anomalous behaviors out of spe...
Many networking and security applications can benefit from exact detection of large flows over arbit...