Reverse-Hashing-for-Highspeed-Network-Monitoring-A

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

ReverseHashingforHigh-speedNetworkMonitoring:Algorithms,Evaluation,andApplicationsRobertSchweller1,ZhichunLi1,YanChen1,YanGao1,AshishGupta1,YinZhang2,PeterDinda1,Ming-YangKao1,GokhanMemik11LabforInternetandSecurityTechnology(LIST),NorthwesternUniv.2UniversityofTexasatAustinTheSpreadofSapphire/SlammerWormsMotivation(onlinechangedetection)•Onlinenetworkanomaly/intrusiondetectionoverhighspeedlinks–Smallmemoryusage–Small#ofmemoryaccessperpacket–Scalabletolargekeyspacesize•Primitivesforonlineanomalydetection–Heavyhitters(lotsofpriorwork)–Heavychanges:enablerforaggregatequeriesovermultipledatastreams•Asymmetricroutingdemandsspatialaggregation•TimeSeriesAnalysis(TSA)needtemporalaggregationOutline•Backgroundonk-arysketch•Reversiblesketchproblem•Modularhashing•IPmangling•Reversehashing•Evaluation•Conclusion[Krishnamurthy,Sen,Zhang,Chen,2003]Firsttodetectflow-levelheavychangesinmassivedatastreamsatnetworktrafficspeedsK-arysketch1jH01K-1………k-arysketch1jH01K-1………hj(k)hH(k)h1(k)Update(k,u):Tj[hj(k)]+=u(forallj)Estimatev(S,k):sumofupdatesforkeykKKsumkhTjjj/11/)]([median[Krishnamurthy,Sen,Zhang,Chen,2003]APIs:+=abS=COMBINE(a,S1,b,S2):??•Mainproblem–CannotefficientlyreportkeyswithheavychangeINFERENCE(S,t)–Importantfunctionforanomalydetection!•OurContribution–Determinesetofkeysthathave“large”estimatesinasketchReverseSketchProblemReversiblesketchframeworkStreamingdatarecordingreversiblek-arysketchvaluestoredvalueModularhashingIPmanglingkeyHeavychangedetectionreversiblek-arysketchReversehashingReverseIPmanglingheavychangekeyschangethresholdOutline•Backgroundonk-arysketch•Reversiblesketchproblem•Modularhashing•IPmangling•Reversehashing•Evaluation•Conclusion•IntersectA1,A2,A3,A4,A5TakingIntersectionsH=5K=212#keys=232(IPaddresses)E[falsepositives]1Theproblemwithsimpleintersection•EachsetAicanbeverylarge!H=5K=212#keys=232(IPaddresses)|A1|=232/212=220Theproblemwithsimpleintersection•EachsetAicanbeverylarge!•Solution:ModularhashingModularhashingreducesthesetsize32bits8bits10010100101010111001010110100011010110001101h()12bitsModularhashingreducesthesetsize32bits8bits10010100101010111001010110100011h1()h2()h3()h4()010110001101010110001101GreatlyreducessizeofreversemappedsetsModularhashingreducesthesetsize12354b1b2b4b5b3A1:25*25*25*25Intersection:Only32elementsperwordset12354b1b2b4b5b3A1:25*25*25*25A2:25*25*25*25Intersection:ModularhashingreducesthesetsizeProblem:Toomanycollisions129.105.56.23129.105.56.28129.105.56.109129.105.56.35129.105.56.98...7.4.0.*32bits12bitsProblem:Toomanycollisions129.105.56.23129.105.56.28129.105.56.109129.105.56.35129.105.56.98...7.4.0.*32bits12bitsIPManglingwithGF(GaloisExtensionField)Solution:IPMangling:abijectivemappingfunctionforbreakingthekeyspacecontinuityOutline•Backgroundonk-arysketch•Reversiblesketchproblem•Modularhashing•IPmangling•Reversehashing•Evaluation•ConclusionHandlingMultipleIntersections…12354b1b2b4b5b3b3b1b2b4b52HdifferentintersectionsMuchmoredifficult–Solution:ReverseHashingalgorithms•Step1:Reversehashingforeachmodule•Step2:InferthewholekeythroughbucketindexmatchingamongcandidatesfromeachmoduleReverseHashingforEachModule12354H=5,r=1,K=212rtolerancelevel41231221211212AAAAA32wijA}5,2{}3,2{11211111AAGiirGI11candidatesetofthefirstwordinHashtableiAllpossiblevaluesofthefirstwordinthesketch1iGTakethefirstwordasanexample}3,2{}3,0{13213113AAG}10,9{}6,2{12212112AAG}8,2{}10,3{14214114AAG}9,6{}7,3{15215115AAG{2,3,5}{2,6,9,10}{0,2,3}{2,3,8,10}{3,6,7,9}{2}{2,3}BucketIndexMatrixofCandidatesH=5,r=1,K=212ForeachxinI1,wecangetB1(x),avectoroftheheavybucketsetswhichxhashesto.192.168.0.112354b11b21b42b51b32b31b12b22b41b5212354b11b21b42b51b32b31b12b22b41b52192.123.47.6212354b11b21b42b51b32b31b12b22b41b52192.*.*.*hashtotheredheavybuckets52514241322112111,,,)192(bbbbbbbbBPrefixExtensionAlgorithmI1I2B1B21504723636,3,19,4,115,241153315,27,3,22721048,7,359,45,12,19,3126,22,1+=150.72}8,7,3{}3{}5{}6,3,1{}9,4{}9,4,1{}5,1{}1{}2,1{}5,2{3*9,41247.72***5**morethanr=1Ignore!236.10431222Ignore!Pathdiscoveryalgorithm150.723*9,412236.10431222+=150.72.1823*412236.104.4931222150.72.323*9121823249314,312,137,19123126,22I3B3+=759,5,3142,12I4B43*412150.72.182.7531*22236.104.49.75PrefixExtensionAlgorithmRecap:Streamingdatarecordingreversiblek-arysketchvaluestoredvalueModularhashingIPmanglingkeyHeavychangedetectionreversiblek-arysketchReversehashingReverseIPmanglingheavychangekeyschangethreshold)(loglog/1nn)logloglog(nnnisthesizeofkeyspaceOutline•Backgroundonk-arysketch•Reversiblesketchproblem•Modularhashing•IPmangling•Reversehashing•Evaluation•ConclusionEvaluation•Dataset–AlargeUSISP(330MNetflowrecords)–NU(19MNetflowrecords)•Ef

1 / 41
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功