Rapid development has been witnessed in optimizing the performance of data centers over the past decade. However, such advances thriving in private data centers are rarely deployed in public-facing data centers. A maj...
详细信息
ISBN:
(纸本)9798350351712;9798350351729
Rapid development has been witnessed in optimizing the performance of data centers over the past decade. However, such advances thriving in private data centers are rarely deployed in public-facing data centers. A major challenge is synchronizing optimization signals-such as flow sizes, server assignments, and load information-with the traffic they are intended to optimize, especially across networks controlled by different entities. In this paper, we propose CLOUDCOOKIE, a versatile signal carrier within internet protocols that ensures bidirectional signal presence without client-side cooperation. To exemplify CLOUDCOOKIE's benefits on public-facing data center traffic, we design a set of easy-to-deploy data center infrastructures, including load balancers and switches, to leverage application layer awareness and enable efficient flow packet scheduling and load balancing. Our evaluation shows that these advances synergistically optimize the 99(th) percentile of flow completion time by up to 20x for the majority of flows.
internet routers are a commons. While modest regulatory measures have generally been successful for Information Communication Technologies (ICT), this paper argues that the lack of regulation has hindered the technolo...
详细信息
ISBN:
(纸本)9781479917754
internet routers are a commons. While modest regulatory measures have generally been successful for Information Communication Technologies (ICT), this paper argues that the lack of regulation has hindered the technological evolution of the internet in some areas. This issue is examined through five internet problems, and the technological solutions adopted. The key contribution of this paper is the explanation of these issues and the identification of areas where misaligned incentives promote inadequate solutions or inaction. The paper reviews the available measures to encourage the adoption of globally beneficial internet technologies.
How can standards working groups protect internet users from pervasive monitoring, where users' data are being massively collected, aggregated, and analyzed?
How can standards working groups protect internet users from pervasive monitoring, where users' data are being massively collected, aggregated, and analyzed?
Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to internet transport and s...
详细信息
Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to internet transport and support wide-area communication. ICS now exchange insecure traffic on an inter-domain level, putting at risk not only common critical infrastructure but also the internet ecosystem (e.g., by DRDoS attacks). In this paper, we measure and analyze inter-domain ICS traffic at two central internet vantage points, an IXP and an ISP. These traffic observations are correlated with data from honeypots and internet-wide scans to separate industrial from non-industrial ICS traffic. We uncover mainly unprotected inter-domain ICS traffic and provide an in-depth view on internet-wide ICS communication. Our results can be used (i) to create precise filters for potentially harmful non-industrial ICS traffic and (ii) to detect ICS sending unprotected inter-domain ICS traffic, being vulnerable to eavesdropping and traffic manipulation attacks. Additionally, we survey recent security extensions of ICS protocols, of which we find very little deployment. We estimate an upper bound of the deployment status for ICS security protocols in the internet core.
A parser's job is to take unstructured, opaque data and convert it to a structured, semantically meaningful format. As such, parsers often operate at the border between untrusted data sources (e.g., the internet) ...
详细信息
ISBN:
(纸本)9781479951031
A parser's job is to take unstructured, opaque data and convert it to a structured, semantically meaningful format. As such, parsers often operate at the border between untrusted data sources (e.g., the internet) and the soft, chewy center of computer systems, where performance and security are paramount. A firewall, for instance, is precisely a trust-creating parser for internet protocols, permitting valid packets to pass through and dropping or actively rejecting malformed packets. Despite the prevalence of finite state machines (FSMs) in both protocol specifications and protocol implementations, they have gained little traction in parser code for such protocols. Typical reasons for avoiding the FSM computation model claim poor performance, poor scalability, poor expressibility, and difficult or time-consuming programming. In this research report, we present our motivations for and designs of finite state machines to parse a variety of existing internet protocols, both binary and ASCII. Our hand-written parsers explicitly optimize around L1 cache hit latency, branch misprediction penalty, and program-wide memory overhead to achieve aggressive performance and scalability targets. Our work demonstrates that such parsers are, contrary to popular belief, sufficiently expressive for meaningful protocols, sufficiently performant for high-throughput applications, and sufficiently simple to construct and maintain. We hope that, in light of other research demonstrating the security benefits of such parsers over more complex, Turing-complete codes, our work serves as evidence that certain "practical" reasons for avoiding FSM-based parsers are invalid.
We present the age control protocol ACP + , a transport layer protocol that regulates the rate at which update packets carrying information from a source are sent over the internet to a monitor. The source would like ...
详细信息
We present the age control protocol ACP + , a transport layer protocol that regulates the rate at which update packets carrying information from a source are sent over the internet to a monitor. The source would like to minimize the average age of information at the monitor. Extensive experimentation helps shed light on age control over the current internet and its implications for sources sending updates over a shared wireless access to monitors in the cloud. Surprisingly, age minimizing rates over fast internet paths are about 0.5 Mbps, which is a small fraction, for example, of link rates supported by WiFi wireless access technology. We also show that congestion control algorithms employed by the Transmission Control Protocol (TCP), including hybrid approaches that achieve higher throughputs at lower delays than traditional loss-based congestion control, are unsuitable for age control.
Real open network environments include the traffic generated by known applications or protocols, which have been previously identified and labeled, and unknown network traffic that cannot be identified based on existi...
详细信息
To provide communication services over internet Protocol networks, it is necessary to develop, for each service, a mechanism for controlling voice and video sessions on the basis of the various types of participating ...
详细信息
This paper introduces security protection for the communication network from a legal perspective. The communication protocols of the communication network and their protocol reports were considered as texts. An intell...
详细信息
Moving signals between the worlds of serial digital interface (SDI) and internet Protocol (IP) is not exactly rocket science, but synchronizing these signals may prove to be a challenge. It is these cases that we will...
详细信息
暂无评论