|
[1] “Github DDoS attack.” https://githubengineering.com/ddos-incident-report/. [2] “Netflow.” http://www.cisco.com/c/en/us/tech/quality-of-service-qos/netflow/index.html. [3] “Software-Defined Networking (SDN) Definition.” https://www.opennetworking.org/ sdn-resources/sdn-definition. [Online]. [4] D. Kreutz, F. M. Ramos, P. E. Verissimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig, “Software-defined networking: A comprehensive survey,” Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76, 2015. [5] L. Jose, M. Yu, and J. Rexford, “Online measurement of large traffic aggregates on commodity switches.,” in Hot-ICE, 2011. [6] M. A. da Cruz, L. C. e Silva, S. Correa, and K. V. Cardoso, “Accurate online detection of bidimensional hierarchical heavy hitters in software-defined networks,” in Communications (LATINCOM), 2013 IEEE Latin-America Conference on, pp. 1–6, IEEE, 2013. [7] Y. Afek, A. Bremler-Barr, S. L. Feibish, and L. Schiff, “Detecting heavy flows in the sdn match and action model,” Computer Networks, vol. 136, pp. 1–12, 2018. [8] R. Harrison, Q. Cai, A. Gupta, and J. Rexford, “Network-wide heavy hitter detection with commodity switches,” in Proceedings of the Symposium on SDN Research, p. 8, ACM, 2018. [9] V. Sivaraman, S. Narayana, O. Rottenstreich, S. Muthukrishnan, and J. Rexford, “Heavy-hitter detection entirely in the data plane,” in Proceedings of the Symposium on SDN Research, pp. 164–176, ACM, 2017. [10] A. Metwally, D. Agrawal, and A. El Abbadi, “Efficient computation of frequent and top-k elements in data streams,” in International Conference on Database Theory, pp. 398–412, Springer, 2005. [11] G. Cormode and S. Muthukrishnan, “An improved data stream summary: the countmin sketch and its applications,” Journal of Algorithms, vol. 55, no. 1, pp. 58–75, 2005. [12] C. Estan and G. Varghese, New directions in traffic measurement and accounting, vol. 32. ACM, 2002. [13] G. S. Manku and R. Motwani, “Approximate frequency counts over data streams,” in VLDB’02: Proceedings of the 28th International Conference on Very Large Databases, pp. 346–357, Elsevier, 2002. [14] J. S. Vitter, “Random sampling with a reservoir,” ACM Transactions on Mathematical Software (TOMS), vol. 11, no. 1, pp. 37–57, 1985. [15] K. Yi and Q. Zhang, “Optimal tracking of distributed heavy hitters and quantiles,” Algorithmica, vol. 65, no. 1, pp. 206–223, 2013. [16] “The CAIDA UCSD Anonymized Internet Traces 2015.” http://www.caida.org/data/ passive/passive_2015_dataset.xml. [17] “editcap tool.” https://www.wireshark.org/docs/man-pages/editcap.html. [18] “scapy.” https://scapy.net/. [19] “tcpreplay tool.” https://tcpreplay.appneta.com/. [20] “OpenFlow.” https://www.opennetworking.org/sdn-resources/openflow. [Online]. [21] “RabbitMQ .” https://www.rabbitmq.com/. [22] M. Mitzenmacher, T. Steinke, and J. Thaler, “Hierarchical heavy hitters with the space saving algorithm,” in 2012 Proceedings of the Fourteenth Workshop on Algorithm Engineering and Experiments (ALENEX), pp. 160–174, SIAM, 2012. [23] G. Cormode, S. Muthukrishnan, K. Yi, and Q. Zhang, “Optimal sampling from distributed streams,” in Proceedings of the twenty-ninth ACM SIGMOD-SIGACTSIGART symposium on Principles of database systems, pp. 77–86, ACM, 2010. [24] B. Kveton, S. Muthukrishnan, H. T. Vu, and Y. Xian, “Finding subcube heavy hitters in analytics data streams,” in Proceedings of the 2018 World Wide Web Conference on World Wide Web, pp. 1705–1714, International World Wide Web Conferences Steering Committee, 2018.
|