Multiscale Energy Network Tomography

被引:0
作者
Feng, Yixiao [1 ]
Duffield, Nick [1 ]
机构
[1] Texas A&M Univ, College Stn, TX 77843 USA
来源
2022 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) | 2022年
关键词
Network tomography; Wavelet analysis; Network measurement; INFERENCE; ATTACKS;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Much effort and ingenuity has been applied to develop tomographic methods to derive link-level performance statistics (packet delay and loss rates) from end-to-end measurements. However, there has been recognition in recent years that network anomalies may manifest with more detailed spectral properties beyond these aggregate performance statistics. This motivates us to study whether network tomography can be used to attribute spectral properties observed in end-to-end measurements to local network regions, which would then be indicated as potential attack targets. Although spectral properties have been used to characterize network traffic and protocol and serve as features for anomaly detection, no current methods exist to localize these features to specific network links. In this paper we show how a tomographic analysis of end-to-end measurements can be used to estimate the wavelet energy of internal link delays. The proposed estimator, used for assessing link-level performance, is able to locate the link and scale with the highest energy that might be contributed by anomalies or congestion. We evaluate our method through world-wide realistic RTT measurements that shows a high estimation accuracy (100%) on identifying links/scales with the highest energy and small mean relative errors (<0.1).
引用
收藏
页数:9
相关论文
共 42 条
  • [1] [Anonymous], 2019, CAIDA UCSD IPV4 ROUT
  • [2] Arya V., 2008, INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, P276
  • [3] Multicast inference of temporal loss characteristics
    Arya, Vijay
    Duffield, N. G.
    Veitch, Darryl
    [J]. PERFORMANCE EVALUATION, 2007, 64 (9-12) : 1169 - 1180
  • [4] Arya V, 2012, Arxiv, DOI arXiv:1108.1377
  • [5] Graph reconstruction from path correlation data
    Berkolaiko, Gregory
    Duffield, Nick
    Ettehad, Mahmood
    Manousakis, Kyriakos
    [J]. INVERSE PROBLEMS, 2019, 35 (01)
  • [6] Cáceres R, 1999, IEEE T INFORM THEORY, V45, P2462, DOI 10.1109/18.796384
  • [7] Callegari C., 2011, P 4 INT S APPL SCI B
  • [8] Slowcomm: Design, development and performance evaluation of a new slow DoS attack
    Cambiaso, Enrico
    Papaleo, Gianluca
    Aiello, Maurizio
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 35 : 23 - 31
  • [9] Chen Y., 2005, ACM T INFORM SYST SE, V3
  • [10] Clark D, 2014, MEASUREMENT ANAL INT