Abstract

Detecting flows that have a large number of packets is an important function in network monitoring. Those flows known as elephants are typically few but account for a significant fraction of the traffic and it may be interesting to treat them differently. In high-speed networks, the number of flows can be very large and it is not practical to keep a list of the active flows. Instead, approximate data structures commonly referred to as sketches are used to detect elephant flows. The use of sketches significantly reduces the memory and computational effort needed to detect elephants at the cost of small inaccuracies in the detection. For example, the Count-Min Sketch (CMS) is widely used to estimate the frequency of elements in a set in general and the number of packets per flow in particular. However, the use of sketches also opens the door for an attacker to try to make that a specific flow that is not an elephant is detected as such. In this letter, an algorithm to perform such an attack on a Count-Min Sketch is presented and evaluated. The analysis and simulation results show that the attacker can create fake elephants even when he does not have any knowledge of how the Count-Min Sketch is implemented.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.