-
Indecomposable involutive set-theoretical solutions to the Yang-Baxter equation of size $p^2$
Authors:
Carsten Dietzel,
Silvia Properzi,
Senne Trappeniers
Abstract:
The quantum Yang-Baxter equation is a braiding condition on vector spaces which is of high relevance in several fields of mathematics, such as knot theory and quantum group theory. Their combinatorial counterpart are set-theoretic solutions to the Yang--Baxter equation, whose investigation is strongly driven by the study of algebraic objects called (skew) braces. In this article, we focus on indec…
▽ More
The quantum Yang-Baxter equation is a braiding condition on vector spaces which is of high relevance in several fields of mathematics, such as knot theory and quantum group theory. Their combinatorial counterpart are set-theoretic solutions to the Yang--Baxter equation, whose investigation is strongly driven by the study of algebraic objects called (skew) braces. In this article, we focus on indecomposable involutive non-degenerate set-theoretic solutions to the Yang-Baxter equation. More specifically, through a thorough analysis of their associated braces, we give a full classification of those which are of size $p^2$, for $p$ a prime.
△ Less
Submitted 17 May, 2024; v1 submitted 27 March, 2024;
originally announced March 2024.
-
Decomposition and Structure theorems for Garside-like groups with modular lattice structure
Authors:
Carsten Dietzel
Abstract:
Despite being a vast generalization of Garside groups, right $\ell$-groups with noetherian lattice structure and strong order unit share a lot of the properties of Garside groups. In the present work, we prove that every modular noetherian right $\ell$-group with strong order unit decomposes as a direct product of beams, which are sublattices that correspond to the directly indecomposable factors…
▽ More
Despite being a vast generalization of Garside groups, right $\ell$-groups with noetherian lattice structure and strong order unit share a lot of the properties of Garside groups. In the present work, we prove that every modular noetherian right $\ell$-group with strong order unit decomposes as a direct product of beams, which are sublattices that correspond to the directly indecomposable factors of the strong order interval. Furthermore, we show that the beams of dimension $δ\geq 4$ can be coordinatized by the $R$-lattices in $Q^δ$, where $Q$ is a noncommutative discrete valuation field with valuation ring $R$. In particular, this gives a precise description of a very big family of modular Garside groups.
△ Less
Submitted 8 April, 2023;
originally announced April 2023.
-
Indecomposable set-theoretical solutions to the Yang--Baxter equation on a set of size $pq$
Authors:
Carsten Dietzel,
Raul Sastriques Guardiola
Abstract:
Let $p$ and $q$ be different prime numbers. Using recent results of Cedó and Okniński, we describe isomorphism classes of indecomposable set-theoretic solutions to the Yang--Baxter equation of cardinality $pq$.
Let $p$ and $q$ be different prime numbers. Using recent results of Cedó and Okniński, we describe isomorphism classes of indecomposable set-theoretic solutions to the Yang--Baxter equation of cardinality $pq$.
△ Less
Submitted 3 June, 2023; v1 submitted 9 February, 2023;
originally announced February 2023.
-
On the enumeration of finite $L$-algebras
Authors:
C. Dietzel,
P. Menchón,
L. Vendramin
Abstract:
We use Constraint Satisfaction Methods to construct and enumerate finite $L$-algebras up to isomorphism. These objects were recently introduced by Rump and appear in Garside theory, algebraic logic, and the study of the combinatorial Yang-Baxter equation. There are 377322225 isomorphism classes of $L$-algebras of size eight. The database constructed suggest the existence of bijections between cert…
▽ More
We use Constraint Satisfaction Methods to construct and enumerate finite $L$-algebras up to isomorphism. These objects were recently introduced by Rump and appear in Garside theory, algebraic logic, and the study of the combinatorial Yang-Baxter equation. There are 377322225 isomorphism classes of $L$-algebras of size eight. The database constructed suggest the existence of bijections between certain classes of $L$-algebras and well-known combinatorial objects. On the one hand, we prove that Bell numbers enumerate isomorphism classes of finite linear $L$-algebras. On the other hand, we also prove that finite regular $L$-algebras are in bijective correspondence with infinite-dimensional Young diagrams.
△ Less
Submitted 2 July, 2023; v1 submitted 10 June, 2022;
originally announced June 2022.
-
DDoS Never Dies? An IXP Perspective on DDoS Amplification Attacks
Authors:
Daniel Kopp,
Christoph Dietzel,
Oliver Hohlfeld
Abstract:
DDoS attacks remain a major security threat to the continuous operation of Internet edge infrastructures, web services, and cloud platforms. While a large body of research focuses on DDoS detection and protection, to date we ultimately failed to eradicate DDoS altogether. Yet, the landscape of DDoS attack mechanisms is even evolving, demanding an updated perspective on DDoS attacks in the wild. In…
▽ More
DDoS attacks remain a major security threat to the continuous operation of Internet edge infrastructures, web services, and cloud platforms. While a large body of research focuses on DDoS detection and protection, to date we ultimately failed to eradicate DDoS altogether. Yet, the landscape of DDoS attack mechanisms is even evolving, demanding an updated perspective on DDoS attacks in the wild. In this paper, we identify up to 2608 DDoS amplification attacks at a single day by analyzing multiple Tbps of traffic flows at a major IXP with a rich ecosystem of different networks. We observe the prevalence of well-known amplification attack protocols (e.g., NTP, CLDAP), which should no longer exist given the established mitigation strategies. Nevertheless, they pose the largest fraction on DDoS amplification attacks within our observation and we witness the emergence of DDoS attacks using recently discovered amplification protocols (e.g., OpenVPN, ARMS, Ubiquity Discovery Protocol). By analyzing the impact of DDoS on core Internet infrastructure, we show that DDoS can overload backbone-capacity and that filtering approaches in prior work omit 97% of the attack traffic.
△ Less
Submitted 7 March, 2021;
originally announced March 2021.
-
The Lockdown Effect: Implications of the COVID-19 Pandemic on Internet Traffic
Authors:
Anja Feldmann,
Oliver Gasser,
Franziska Lichtblau,
Enric Pujol,
Ingmar Poese,
Christoph Dietzel,
Daniel Wagner,
Matthias Wichtlhuber,
Juan Tapiador,
Narseo Vallina-Rodriguez,
Oliver Hohlfeld,
Georgios Smaragdakis
Abstract:
Due to the COVID-19 pandemic, many governments imposed lock downs that forced hundreds of millions of citizens to stay at home. The implementation of confinement measures increased Internet traffic demands of residential users, in particular, for remote working, entertainment, commerce, and education, which, as a result, caused traffic shifts in the Internet core. In this paper, using data from a…
▽ More
Due to the COVID-19 pandemic, many governments imposed lock downs that forced hundreds of millions of citizens to stay at home. The implementation of confinement measures increased Internet traffic demands of residential users, in particular, for remote working, entertainment, commerce, and education, which, as a result, caused traffic shifts in the Internet core. In this paper, using data from a diverse set of vantage points (one ISP, three IXPs, and one metropolitan educational network), we examine the effect of these lockdowns on traffic shifts. We find that the traffic volume increased by 15-20% almost within a week--while overall still modest, this constitutes a large increase within this short time period. However, despite this surge, we observe that the Internet infrastructure is able to handle the new volume, as most traffic shifts occur outside of traditional peak hours. When looking directly at the traffic sources, it turns out that, while hypergiants still contribute a significant fraction of traffic, we see (1) a higher increase in traffic of non-hypergiants, and (2) traffic increases in applications that people use when at home, such as Web conferencing, VPN, and gaming. While many networks see increased traffic demands, in particular, those providing services to residential users, academic networks experience major overall decreases. Yet, in these networks, we can observe substantial increases when considering applications associated to remote working and lecturing.
△ Less
Submitted 5 October, 2020; v1 submitted 25 August, 2020;
originally announced August 2020.
-
Right $\ell$-groups associated with von Neumann algebras
Authors:
Carsten Dietzel
Abstract:
In [Rum18], Rump defined and characterized noncommutative universal groups $G(X)$ for generalized orthomodular lattices $X$.
We give an explicit construction of $G(X)$ in terms of \emph{pure paraunitary groups} when $X$ is the projection lattice of a von Neumann algebra. The results given here extend some of those in [Die19].
In [Rum18], Rump defined and characterized noncommutative universal groups $G(X)$ for generalized orthomodular lattices $X$.
We give an explicit construction of $G(X)$ in terms of \emph{pure paraunitary groups} when $X$ is the projection lattice of a von Neumann algebra. The results given here extend some of those in [Die19].
△ Less
Submitted 30 January, 2020; v1 submitted 21 January, 2020;
originally announced January 2020.
-
O Peer, Where Art Thou? Uncovering Remote Peering Interconnections at IXPs
Authors:
George Nomikos,
Vasileios Kotronis,
Pavlos Sermpezis,
Petros Gigis,
Lefteris Manassakis,
Christoph Dietzel,
Stavros Konstantaras,
Xenofontas Dimitropoulos,
Vasileios Giotsas
Abstract:
Internet eXchange Points (IXPs) are Internet hubs that mainly provide the switching infrastructure to interconnect networks and exchange traffic. While the initial goal of IXPs was to bring together networks residing in the same city or country, and thus keep local traffic local, this model is gradually shifting. Many networks connect to IXPs without having physical presence at their switching inf…
▽ More
Internet eXchange Points (IXPs) are Internet hubs that mainly provide the switching infrastructure to interconnect networks and exchange traffic. While the initial goal of IXPs was to bring together networks residing in the same city or country, and thus keep local traffic local, this model is gradually shifting. Many networks connect to IXPs without having physical presence at their switching infrastructure. This practice, called Remote Peering, is changing the Internet topology and economy, and has become the subject of a contentious debate within the network operators' community. However, despite the increasing attention it attracts, the understanding of the characteristics and impact of remote peering is limited. In this work, we introduce and validate a heuristic methodology for discovering remote peers at IXPs. We (i) identify critical remote peering inference challenges, (ii) infer remote peers with high accuracy (>95%) and coverage (93%) per IXP, and (iii) characterize different aspects of the remote peering ecosystem by applying our methodology to 30 large IXPs. We observe that remote peering is a significantly common practice in all the studied IXPs; for the largest IXPs, remote peers account for 40% of their member base. We also show that today, IXP growth is mainly driven by remote peering, which contributes two times more than local peering.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
DDoS Hide & Seek: On the Effectiveness of a Booter Services Takedown
Authors:
Daniel Kopp,
Matthias Wichtlhuber,
Ingmar Poese,
Jair Santanna,
Oliver Hohlfeld,
Christoph Dietzel
Abstract:
Booter services continue to provide popular DDoS-as-a-service platforms and enable anyone irrespective of their technical ability, to execute DDoS attacks with devastating impact. Since booters are a serious threat to Internet operations and can cause significant financial and reputational damage, they also draw the attention of law enforcement agencies and related counter activities. In this pape…
▽ More
Booter services continue to provide popular DDoS-as-a-service platforms and enable anyone irrespective of their technical ability, to execute DDoS attacks with devastating impact. Since booters are a serious threat to Internet operations and can cause significant financial and reputational damage, they also draw the attention of law enforcement agencies and related counter activities. In this paper, we investigate booter-based DDoS attacks in the wild and the impact of an FBI takedown targeting 15 booter websites in December 2018 from the perspective of a major IXP and two ISPs. We study and compare attack properties of multiple booter services by launching Gbps-level attacks against our own infrastructure. To understand spatial and temporal trends of the DDoS traffic originating from booters we scrutinize 5 months, worth of inter-domain traffic. We observe that the takedown only leads to a temporary reduction in attack traffic. Additionally, one booter was found to quickly continue operation by using a new domain for its website.
△ Less
Submitted 16 September, 2019;
originally announced September 2019.
-
On a theorem of Hildebrand
Authors:
Carsten Dietzel
Abstract:
We prove that for each multiplicative subgroup $A$ of finite index in $\mathbb{Q}^+$, the set of integers $a$ with $a, a+1 \in A$ is an IP-set. This generalizes a theorem of Hildebrand concerning completely multiplicative functions taking values in the $k$-th roots of unity.
We prove that for each multiplicative subgroup $A$ of finite index in $\mathbb{Q}^+$, the set of integers $a$ with $a, a+1 \in A$ is an IP-set. This generalizes a theorem of Hildebrand concerning completely multiplicative functions taking values in the $k$-th roots of unity.
△ Less
Submitted 2 October, 2018;
originally announced October 2018.
-
A right-invariant lattice-order on groups of paraunitary matrices
Authors:
Carsten Dietzel
Abstract:
In \cite{rump_goml}, Rump defined and characterized noncommutative universal groups $G(X)$ for generalized orthomodular lattices $X$.
We give an explicit description of $G(X)$ in terms of \emph{paraunitary} matrix groups, whenever $X$ is the orthomodular lattice of subspaces of a finite-dimensional $k$-vector space $V$ that is equipped with an anisotropic, symmetric $k$-bilinear form.
In \cite{rump_goml}, Rump defined and characterized noncommutative universal groups $G(X)$ for generalized orthomodular lattices $X$.
We give an explicit description of $G(X)$ in terms of \emph{paraunitary} matrix groups, whenever $X$ is the orthomodular lattice of subspaces of a finite-dimensional $k$-vector space $V$ that is equipped with an anisotropic, symmetric $k$-bilinear form.
△ Less
Submitted 18 June, 2018;
originally announced June 2018.
-
Braces of order $p^2q$
Authors:
Carsten Dietzel
Abstract:
In this article we classify the left braces of order $p^2q$ where $p,q$ are primes fulfilling $q > p+1$. This classification includes a proof of three conjectures of Guarnieri and Vendramin (\cite[Conjectures 6.2-6.4]{Vendramin_skew}) concerning the number of isomorphism classes of left braces of order $p^2q$ for certain values of $p,q$.
In this article we classify the left braces of order $p^2q$ where $p,q$ are primes fulfilling $q > p+1$. This classification includes a proof of three conjectures of Guarnieri and Vendramin (\cite[Conjectures 6.2-6.4]{Vendramin_skew}) concerning the number of isomorphism classes of left braces of order $p^2q$ for certain values of $p,q$.
△ Less
Submitted 24 February, 2018; v1 submitted 21 January, 2018;
originally announced January 2018.
-
A First Look at QUIC in the Wild
Authors:
Jan Rüth,
Ingmar Poese,
Christoph Dietzel,
Oliver Hohlfeld
Abstract:
For the first time since the establishment of TCP and UDP, the Internet transport layer is subject to a major change by the introduction of QUIC. Initiated by Google in 2012, QUIC provides a reliable, connection-oriented low-latency and fully encrypted transport. In this paper, we provide the first broad assessment of QUIC usage in the wild. We monitor the entire IPv4 address space since August 20…
▽ More
For the first time since the establishment of TCP and UDP, the Internet transport layer is subject to a major change by the introduction of QUIC. Initiated by Google in 2012, QUIC provides a reliable, connection-oriented low-latency and fully encrypted transport. In this paper, we provide the first broad assessment of QUIC usage in the wild. We monitor the entire IPv4 address space since August 2016 and about 46% of the DNS namespace to detected QUIC-capable infrastructures. Our scans show that the number of QUIC-capable IPs has more than tripled since then to over 617.59 K. We find around 161K domains hosted on QUIC-enabled infrastructure, but only 15K of them present valid certificates over QUIC. Second, we analyze one year of traffic traces provided by MAWI, one day of a major European tier-1 ISP and from a large IXP to understand the dominance of QUIC in the Internet traffic mix. We find QUIC to account for 2.6% to 9.1% of the current Internet traffic, depending on the vantage point. This share is dominated by Google pushing up to 42.1% of its traffic via QUIC.
△ Less
Submitted 24 February, 2019; v1 submitted 16 January, 2018;
originally announced January 2018.
-
A generalization of Schur's theorem and its application to consecutive power residues
Authors:
Carsten Dietzel
Abstract:
This article provides a proof of a generalization of Schur's theorem on the partition regularity of the equation x+y=z, which involves a divisibility condition. This generalization will be utilized to prove the existence of 'small' consecutive power residues modulo p, where p is a sufficiently large prime.
This article provides a proof of a generalization of Schur's theorem on the partition regularity of the equation x+y=z, which involves a divisibility condition. This generalization will be utilized to prove the existence of 'small' consecutive power residues modulo p, where p is a sufficiently large prime.
△ Less
Submitted 28 September, 2013;
originally announced September 2013.