-
On the impact of VR/AR applications on optical transport networks: First experiments with Meta Quest 3 gaming and conferencing application
Authors:
C. de Quinto,
A. Navarro,
G. Otero,
N. Koneva,
J. A. Hernández,
M. Quagliotti,
A. Sánchez-Macian,
F. Arpanaei,
P. Reviriego,
Ó. González de Dios,
J. M. Rivas-Moscoso,
E. Riccardi,
D. Larrabeiti
Abstract:
With the advent of next-generation AR/VR headsets, many of them with affordable prices, telecom operators have forecasted an explosive growth of traffic in their networks. Penetration of AR/VR services and applications is estimated to grow exponentially in the next few years. This work attempts to shed light on the bandwidth capacity requirements and latency of popular AR/VR applications with four…
▽ More
With the advent of next-generation AR/VR headsets, many of them with affordable prices, telecom operators have forecasted an explosive growth of traffic in their networks. Penetration of AR/VR services and applications is estimated to grow exponentially in the next few years. This work attempts to shed light on the bandwidth capacity requirements and latency of popular AR/VR applications with four different real experimental settings on the Meta Quest 3 headsets, and their potential impact on the network.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
A Queuing Envelope Model for Estimating Latency Guarantees in Deterministic Networking Scenarios
Authors:
Nataliia Koneva,
Alfonso Sánchez-Macián,
José Alberto Hernández,
Farhad Arpanaei,
Óscar González de Dios
Abstract:
Accurate estimation of queuing delays is crucial for designing and optimizing communication networks, particularly in the context of Deterministic Networking (DetNet) scenarios. This study investigates the approximation of Internet queuing delays using an M/M/1 envelope model, which provides a simple methodology to find tight upper bounds of real delay percentiles. Real traffic statistics collecte…
▽ More
Accurate estimation of queuing delays is crucial for designing and optimizing communication networks, particularly in the context of Deterministic Networking (DetNet) scenarios. This study investigates the approximation of Internet queuing delays using an M/M/1 envelope model, which provides a simple methodology to find tight upper bounds of real delay percentiles. Real traffic statistics collected at large Internet Exchange Points (like Amsterdam and San Francisco) have been used to fit polynomial regression models for transforming packet queuing delays into the M/M/1 envelope models. We finally propose a methodology for providing delay percentiles in DetNet scenarios where tight latency guarantees need to be assured.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Reinforcement-Learning based routing for packet-optical networks with hybrid telemetry
Authors:
A. L. García Navarro,
Nataliia Koneva,
Alfonso Sánchez-Macián,
José Alberto Hernández,
Óscar González de Dios,
J. M. Rivas-Moscoso
Abstract:
This article provides a methodology and open-source implementation of Reinforcement Learning algorithms for finding optimal routes in a packet-optical network scenario. The algorithm uses measurements provided by the physical layer (pre-FEC bit error rate and propagation delay) and the link layer (link load) to configure a set of latency-based rewards and penalties based on such measurements. Then…
▽ More
This article provides a methodology and open-source implementation of Reinforcement Learning algorithms for finding optimal routes in a packet-optical network scenario. The algorithm uses measurements provided by the physical layer (pre-FEC bit error rate and propagation delay) and the link layer (link load) to configure a set of latency-based rewards and penalties based on such measurements. Then, the algorithm executes Q-learning based on this set of rewards for finding the optimal routing strategies. It is further shown that the algorithm dynamically adapts to changing network conditions by re-calculating optimal policies upon either link load changes or link degradation as measured by pre-FEC BER.
△ Less
Submitted 21 June, 2024; v1 submitted 18 June, 2024;
originally announced June 2024.
-
On optimizing Inband Telemetry systems for accurate latency-based service deployments
Authors:
Nataliia Koneva,
Alfonso Sánchez-Macián,
José Alberto Hernández,
Óscar González de Dios
Abstract:
The power of Machine Learning and Artificial Intelligence algorithms based on collected datasets, along with the programmability and flexibility provided by Software Defined Networking can provide the building blocks for constructing the so-called Zero-Touch Network and Service Management systems. However, the fuel towards this goal relies on the availability of sufficient and good-quality data co…
▽ More
The power of Machine Learning and Artificial Intelligence algorithms based on collected datasets, along with the programmability and flexibility provided by Software Defined Networking can provide the building blocks for constructing the so-called Zero-Touch Network and Service Management systems. However, the fuel towards this goal relies on the availability of sufficient and good-quality data collected from measurements and telemetry. This article provides a telemetry methodology to collect accurate latency measurements, as a first step toward building intelligent control planes that make correct decisions based on precise information.
△ Less
Submitted 21 June, 2024; v1 submitted 18 June, 2024;
originally announced June 2024.
-
Count-Min sketches for Telemetry: analysis of performance in P4 implementations
Authors:
José A. Hernández,
Davide Scano,
Filippo Cugini,
Gonzalo Martínez,
Natalia Koneva,
Alvaro Sánchez-Macián,
Óscar González de Dios
Abstract:
Monitoring streams of packets at 100~Gb/s and beyond requires using compact and efficient hashing-techniques like HyperLogLog (HLL) or Count-Min Sketch (CMS). In this work, we evaluate the uses and applications of Count-Min Sketch for Metro Networks employing P4-based packet-optical nodes. We provide dimensioning rules for CMS at 100~Gb/s and 400~Gb/s and evaluate its performance in a real impleme…
▽ More
Monitoring streams of packets at 100~Gb/s and beyond requires using compact and efficient hashing-techniques like HyperLogLog (HLL) or Count-Min Sketch (CMS). In this work, we evaluate the uses and applications of Count-Min Sketch for Metro Networks employing P4-based packet-optical nodes. We provide dimensioning rules for CMS at 100~Gb/s and 400~Gb/s and evaluate its performance in a real implementation testbed.
△ Less
Submitted 21 June, 2024; v1 submitted 18 June, 2024;
originally announced June 2024.
-
PTHelper: An open source tool to support the Penetration Testing process
Authors:
Jacobo Casado de Gracia,
Alfonso Sánchez-Macián
Abstract:
Offensive security is one of the state of the art measures to protect enterprises and organizations. Penetration testing, broadly called pentesting, is a branch of offensive security designed to find, rate and exploit these vulnerabilities, in order to assess the security posture of an organization. This process is often time-consuming and the quantity of information that pentesters need to manage…
▽ More
Offensive security is one of the state of the art measures to protect enterprises and organizations. Penetration testing, broadly called pentesting, is a branch of offensive security designed to find, rate and exploit these vulnerabilities, in order to assess the security posture of an organization. This process is often time-consuming and the quantity of information that pentesters need to manage might also be difficult to handle. This project takes a practical approach to solve the automation of pentesting and proposes a usable tool, called PTHelper. This open-source tool has been designed in a modular way to be easily upgradable by the pentesting community, and uses state of the art tools and artificial intelligence to achieve its objective.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Deepfake Detection and the Impact of Limited Computing Capabilities
Authors:
Paloma Cantero-Arjona,
Alfonso Sánchez-Macián
Abstract:
The rapid development of technologies and artificial intelligence makes deepfakes an increasingly sophisticated and challenging-to-identify technique. To ensure the accuracy of information and control misinformation and mass manipulation, it is of paramount importance to discover and develop artificial intelligence models that enable the generic detection of forged videos. This work aims to addres…
▽ More
The rapid development of technologies and artificial intelligence makes deepfakes an increasingly sophisticated and challenging-to-identify technique. To ensure the accuracy of information and control misinformation and mass manipulation, it is of paramount importance to discover and develop artificial intelligence models that enable the generic detection of forged videos. This work aims to address the detection of deepfakes across various existing datasets in a scenario with limited computing resources. The goal is to analyze the applicability of different deep learning techniques under these restrictions and explore possible approaches to enhance their efficiency.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Threat Trekker: An Approach to Cyber Threat Hunting
Authors:
Ángel Casanova Bienzobas,
Alfonso Sánchez-Macián
Abstract:
Threat hunting is a proactive methodology for exploring, detecting and mitigating cyberattacks within complex environments. As opposed to conventional detection systems, threat hunting strategies assume adversaries have infiltrated the system; as a result they proactively search out any unusual patterns or activities which might indicate intrusion attempts.
Historically, this endeavour has been…
▽ More
Threat hunting is a proactive methodology for exploring, detecting and mitigating cyberattacks within complex environments. As opposed to conventional detection systems, threat hunting strategies assume adversaries have infiltrated the system; as a result they proactively search out any unusual patterns or activities which might indicate intrusion attempts.
Historically, this endeavour has been pursued using three investigation methodologies: (1) Hypothesis-Driven Investigations; (2) Indicator of Compromise (IOC); and (3) High-level machine learning analysis-based approaches. Therefore, this paper introduces a novel machine learning paradigm known as Threat Trekker. This proposal utilizes connectors to feed data directly into an event streaming channel for processing by the algorithm and provide feedback back into its host network.
Conclusions drawn from these experiments clearly establish the efficacy of employing machine learning for classifying more subtle attacks.
△ Less
Submitted 6 October, 2023;
originally announced October 2023.
-
Approximate Membership Query Filters with a False Positive Free Set
Authors:
Pedro Reviriego,
Alfonso Sánchez-Macián,
Stefan Walzer,
Peter C. Dillinger
Abstract:
In the last decade, significant efforts have been made to reduce the false positive rate of approximate membership checking structures. This has led to the development of new structures such as cuckoo filters and xor filters. Adaptive filters that can react to false positives as they occur to avoid them for future queries to the same elements have also been recently developed. In this paper, we pr…
▽ More
In the last decade, significant efforts have been made to reduce the false positive rate of approximate membership checking structures. This has led to the development of new structures such as cuckoo filters and xor filters. Adaptive filters that can react to false positives as they occur to avoid them for future queries to the same elements have also been recently developed. In this paper, we propose a new type of static filters that completely avoid false positives for a given set of negative elements and show how they can be efficiently implemented using xor probing filters. Several constructions of these filters with a false positive free set are proposed that minimize the memory and speed overheads introduced by avoiding false positives. The proposed filters have been extensively evaluated to validate their functionality and show that in many cases both the memory and speed overheads are negligible. We also discuss several use cases to illustrate the potential benefits of the proposed filters in practical applications.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.