Self-Adaptive Sampling for Network Traffic Measurement

被引:26
作者
Du, Yang [1 ]
Huang, He [1 ]
Sun, Yu-E [2 ]
Chen, Shigang [3 ]
Gao, Guoju [1 ]
机构
[1] Soochow Univ, Sch Comp Sci & Technol, Suzhou, Peoples R China
[2] Soochow Univ, Sch Rail Transportat, Suzhou, Peoples R China
[3] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
来源
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021) | 2021年
基金
中国国家自然科学基金;
关键词
Traffic measurement; self-adaptive sampling; size estimation; spread estimation; FLOW STATISTICS;
D O I
10.1109/INFOCOM42981.2021.9488425
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Per-flow traffic measurement in the high-speed network plays an important role in many practical applications. Due to the limited on-chip memory and the mismatch between off-chip memory speed and line rate, sampling-based methods select and forward a part of flow traffic to off-chip memory, complementing sketch-based solutions in estimation accuracy and online query support. However, most current work uses the same sampling probability for all flows, overlooking that the sampling rates different flows require to meet the same accuracy constraint are different. It leads to a waste in storage and communication resources. In this paper, we present self-adaptive sampling, a framework to sample each flow with a probability adapted to flow size/spread. Then we propose two algorithms, SAS-LC and SAS-LOG, which are geared towards per-flow spread estimation and per-flow size estimation by using different compression functions. Experimental results based on real Internet traces show that, when compared to NDS in per-flow spread estimation, SAS-LC can save around 10% on-chip space and reduce up to 40% communication cost for large flows. Moreover, SAS-LOG can save 40% on-chip space and reduce up to 96% communication cost for large flows than NDS in per-flow size estimation.
引用
收藏
页数:10
相关论文
共 39 条
[1]  
Abusnaina A, 2020, IEEE INFOCOM SER, P2459, DOI [10.1109/infocom41043.2020.9155465, 10.1109/INFOCOM41043.2020.9155465]
[2]   Soteria: Detecting Adversarial Examples in Control Flow Graph-based Malware Classifiers [J].
Alasmary, Hisham ;
Abusnaina, Ahmed ;
Jang, Rhongho ;
Abuhamad, Mohammed ;
Anwar, Afsah ;
Nyang, DaeHun ;
Mohaisen, David .
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, :888-898
[3]  
[Anonymous], The caida ucsd anonymized internet traces 2015
[4]  
Braverman V., 2018, LIPIcs, P1
[5]   Remote Sensing Image Scene Classification: Benchmark and State of the Art [J].
Cheng, Gong ;
Han, Junwei ;
Lu, Xiaoqiang .
PROCEEDINGS OF THE IEEE, 2017, 105 (10) :1865-1883
[6]   Identifying and Estimating Persistent Items in Data Streams [J].
Dai, Haipeng ;
Shahzad, Muhammad ;
Liu, Alex X. ;
Li, Meng ;
Zhong, Yuankun ;
Chen, Guihai .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (06) :2429-2442
[7]  
Dimitropoulos X, 2008, ACM SIGCOMM COMP COM, V38, P7, DOI 10.1145/1341431.1341433
[8]   Learn more, sample less: Control of volume and variance in network measurement [J].
Duffield, N ;
Lund, C ;
Thorup, M .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (05) :1756-1775
[9]  
Duffield N., 2004, Performance Evaluation Review, V32, P85, DOI 10.1145/1012888.1005699
[10]   New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice [J].
Estan, C ;
Varghese, G .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2003, 21 (03) :270-313