Skip to main content

Showing 1–13 of 13 results for author: Bronzino, F

.
  1. arXiv:2406.02784  [pdf, other

    cs.NI

    Feasibility of State Space Models for Network Traffic Generation

    Authors: Andrew Chu, Xi Jiang, Shinan Liu, Arjun Bhagoji, Francesco Bronzino, Paul Schmitt, Nick Feamster

    Abstract: Many problems in computer networking rely on parsing collections of network traces (e.g., traffic prioritization, intrusion detection). Unfortunately, the availability and utility of these collections is limited due to privacy concerns, data staleness, and low representativeness. While methods for generating data to augment collections exist, they often fall short in replicating the quality of rea… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Comments: 7 pages, 3 figures, 4 tables

  2. arXiv:2405.11138  [pdf, other

    cs.NI cs.CY

    Spatial Models for Crowdsourced Internet Access Network Performance Measurements

    Authors: Taveesh Sharma, Paul Schmitt, Francesco Bronzino, Nick Feamster, Nicole Marwell

    Abstract: Despite significant investments in access network infrastructure, universal access to high-quality Internet connectivity remains a challenge. Policymakers often rely on large-scale, crowdsourced measurement datasets to assess the distribution of access network performance across geographic areas. These decisions typically rest on the assumption that Internet performance is uniformly distributed wi… ▽ More

    Submitted 21 May, 2024; v1 submitted 17 May, 2024; originally announced May 2024.

    Comments: 13 pages

  3. arXiv:2404.05564  [pdf, other

    cs.NI

    Optimal Flow Admission Control in Edge Computing via Safe Reinforcement Learning

    Authors: A. Fox, F. De Pellegrini, F. Faticanti, E. Altman, F. Bronzino

    Abstract: With the uptake of intelligent data-driven applications, edge computing infrastructures necessitate a new generation of admission control algorithms to maximize system performance under limited and highly heterogeneous resources. In this paper, we study how to optimally select information flows which belong to different classes and dispatch them to multiple edge servers where deployed applications… ▽ More

    Submitted 28 June, 2024; v1 submitted 8 April, 2024; originally announced April 2024.

  4. arXiv:2402.06099  [pdf, other

    cs.NI

    CATO: End-to-End Optimization of ML-Based Traffic Analysis Pipelines

    Authors: Gerry Wan, Shinan Liu, Francesco Bronzino, Nick Feamster, Zakir Durumeric

    Abstract: Machine learning has shown tremendous potential for improving the capabilities of network traffic analysis applications, often outperforming simpler rule-based heuristics. However, ML-based solutions remain difficult to deploy in practice. Many existing approaches only optimize the predictive performance of their models, overlooking the practical challenges of running them against network traffic… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

  5. arXiv:2310.08543  [pdf, other

    cs.NI

    NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation

    Authors: Xi Jiang, Shinan Liu, Aaron Gember-Jacobson, Arjun Nitin Bhagoji, Paul Schmitt, Francesco Bronzino, Nick Feamster

    Abstract: Datasets of labeled network traces are essential for a multitude of machine learning (ML) tasks in networking, yet their availability is hindered by privacy and maintenance concerns, such as data staleness. To overcome this limitation, synthetic network traces can often augment existing datasets. Unfortunately, current synthetic trace generation methods, which typically produce only aggregated flo… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  6. arXiv:2307.04009  [pdf, other

    cs.NI

    Internet Localization of Multi-Party Relay Users: Inherent Friction Between Internet Services and User Privacy

    Authors: Sean Flynn, Francesco Bronzino, Paul Schmitt

    Abstract: Internet privacy is increasingly important on the modern Internet. Users are looking to control the trail of data that they leave behind on the systems that they interact with. Multi-Party Relay (MPR) architectures lower the traditional barriers to adoption of privacy enhancing technologies on the Internet. MPRs are unique from legacy architectures in that they are able to offer privacy guarantees… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

  7. arXiv:2302.11718  [pdf, other

    cs.NI

    AC-DC: Adaptive Ensemble Classification for Network Traffic Identification

    Authors: Xi Jiang, Shinan Liu, Saloua Naama, Francesco Bronzino, Paul Schmitt, Nick Feamster

    Abstract: Accurate and efficient network traffic classification is important for many network management tasks, from traffic prioritization to anomaly detection. Although classifiers using pre-computed flow statistics (e.g., packet sizes, inter-arrival times) can be efficient, they may experience lower accuracy than techniques based on raw traffic, including packet captures. Past work on representation lear… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Comments: 13 pages body, 16 pages total, 7 figures body, 11 figures total

  8. arXiv:2109.03011  [pdf, other

    cs.NI cs.LG cs.PF

    LEAF: Navigating Concept Drift in Cellular Networks

    Authors: Shinan Liu, Francesco Bronzino, Paul Schmitt, Arjun Nitin Bhagoji, Nick Feamster, Hector Garcia Crespo, Timothy Coyle, Brian Ward

    Abstract: Operational networks commonly rely on machine learning models for many tasks, including detecting anomalies, inferring application performance, and forecasting demand. Yet, model accuracy can degrade due to concept drift, whereby the relationship between the features and the target to be predicted changes. Mitigating concept drift is an essential part of operationalizing machine learning models in… ▽ More

    Submitted 2 February, 2023; v1 submitted 7 September, 2021; originally announced September 2021.

    Journal ref: Proc. ACM Netw., Vol. 1, No. CoNEXT2, Article 7. Publication date: September 2023

  9. Characterizing Service Provider Response to the COVID-19 Pandemic in the United States

    Authors: Shinan Liu, Paul Schmitt, Francesco Bronzino, Nick Feamster

    Abstract: The COVID-19 pandemic has resulted in dramatic changes to the daily habits of billions of people. Users increasingly have to rely on home broadband Internet access for work, education, and other activities. These changes have resulted in corresponding changes to Internet traffic patterns. This paper aims to characterize the effects of these changes with respect to Internet service providers in the… ▽ More

    Submitted 1 November, 2020; originally announced November 2020.

    Journal ref: International Conference on Passive and Active Network Measurement (PAM 2021)

  10. arXiv:2010.14845  [pdf, ps, other

    cs.DC

    On the Deployability of Augmented Reality Using Embedded Edge Devices

    Authors: Ayoub Ben-Ameur, Andrea Araldo, Francesco Bronzino

    Abstract: Edge Computing exploits computational capabilities deployed at the very edge of the network to support applications with low latency requirements. Such capabilities can reside in small embedded devices that integrate dedicated hardware -- e.g., a GPU -- in a low cost package. But these devices have limited computing capabilities compared to standard server grade equipment. When deploying an Edge C… ▽ More

    Submitted 7 January, 2021; v1 submitted 28 October, 2020; originally announced October 2020.

    Comments: 6 pages, 12 figures, Accepted in IEEE CCNC 2021

    ACM Class: C.2.4

  11. arXiv:2010.14605  [pdf, other

    cs.NI cs.LG

    Traffic Refinery: Cost-Aware Data Representation for Machine Learning on Network Traffic

    Authors: Francesco Bronzino, Paul Schmitt, Sara Ayoubi, Hyojoon Kim, Renata Teixeira, Nick Feamster

    Abstract: Network management often relies on machine learning to make predictions about performance and security from network traffic. Often, the representation of the traffic is as important as the choice of the model. The features that the model relies on, and the representation of those features, ultimately determine model accuracy, as well as where and whether the model can be deployed in practice. Thus… ▽ More

    Submitted 7 June, 2021; v1 submitted 27 October, 2020; originally announced October 2020.

  12. arXiv:1901.05800  [pdf, other

    cs.NI

    Inferring Streaming Video Quality from Encrypted Traffic: Practical Models and Deployment Experience

    Authors: Paul Schmitt, Francesco Bronzino, Sara Ayoubi, Guilherme Martins, Renata Teixeira, Nick Feamster

    Abstract: Inferring the quality of streaming video applications is important for Internet service providers, but the fact that most video streams are encrypted makes it difficult to do so. We develop models that infer quality metrics (\ie, startup delay and resolution) for encrypted streaming video services. Our paper builds on previous work, but extends it in several ways. First, the model works in deploym… ▽ More

    Submitted 14 August, 2019; v1 submitted 17 January, 2019; originally announced January 2019.

  13. arXiv:1501.04328  [pdf, other

    cs.NI

    Exploiting Network Awareness to Enhance DASH Over Wireless

    Authors: Francesco Bronzino, Dragoslav Stojadinovic, Cedric Westphal, Dipankar Raychaudhuri

    Abstract: The introduction of Dynamic Adaptive Streaming over HTTP (DASH) helped reduce the consumption of resource in video delivery, but its client-based rate adaptation is unable to optimally use the available end-to-end network bandwidth. We consider the problem of optimizing the delivery of video content to mobile clients while meeting the constraints imposed by the available network resources. Observi… ▽ More

    Submitted 18 January, 2015; originally announced January 2015.