Skip to main content

Showing 1–35 of 35 results for author: Sekar, V

.
  1. arXiv:2405.09442  [pdf, other

    cs.NI

    Network Function Capacity Reconnaissance by Remote Adversaries

    Authors: Aqsa Kashaf, Aidan Walsh, Maria Apostolaki, Vyas Sekar, Yuvraj Agarwal

    Abstract: There is anecdotal evidence that attackers use reconnaissance to learn the capacity of their victims before DDoS attacks to maximize their impact. The first step to mitigate capacity reconnaissance attacks is to understand their feasibility. However, the feasibility of capacity reconnaissance in network functions (NFs) (e.g., firewalls, NATs) is unknown. To this end, we formulate the problem of ne… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

  2. arXiv:2303.02014  [pdf, other

    cs.CR cs.LG

    Summary Statistic Privacy in Data Sharing

    Authors: Zinan Lin, Shuaiqi Wang, Vyas Sekar, Giulia Fanti

    Abstract: We study a setting where a data holder wishes to share data with a receiver, without revealing certain summary statistics of the data distribution (e.g., mean, standard deviation). It achieves this by passing the data through a randomization mechanism. We propose summary statistic privacy, a metric for quantifying the privacy risk of such a mechanism based on the worst-case probability of an adver… ▽ More

    Submitted 27 October, 2023; v1 submitted 3 March, 2023; originally announced March 2023.

  3. arXiv:2301.05688  [pdf, other

    math.OC cs.NI eess.SY

    CANE: A Cascade-Control Approach for Network-Assisted Video QoE Management

    Authors: Mehdi Hosseinzadeh, Karthick Shankar, Maria Apostolaki, Jay Ramachandran, Steven Adams, Vyas Sekar, Bruno Sinopoli

    Abstract: Prior efforts have shown that network-assisted schemes can improve the Quality-of-Experience (QoE) and QoE fairness when multiple video players compete for bandwidth. However, realizing network-assisted schemes in practice is challenging, as: i) the network has limited visibility into the client players' internal state and actions; ii) players' actions may nullify or negate the network's actions;… ▽ More

    Submitted 13 January, 2023; originally announced January 2023.

  4. arXiv:2211.06494  [pdf, ps, other

    cs.NI

    Rethinking Data-driven Networking with Foundation Models: Challenges and Opportunities

    Authors: Franck Le, Mudhakar Srivatsa, Raghu Ganti, Vyas Sekar

    Abstract: Foundational models have caused a paradigm shift in the way artificial intelligence (AI) systems are built. They have had a major impact in natural language processing (NLP), and several other domains, not only reducing the amount of required labeled data or even eliminating the need for it, but also significantly improving performance on a wide range of tasks. We argue foundation models can have… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

  5. arXiv:2209.04026  [pdf, other

    cs.CR

    SPIDER: A Practical Fuzzing Framework to Uncover Stateful Performance Issues in SDN Controllers

    Authors: Ao Li, Rohan Padhye, Vyas Sekar

    Abstract: Performance issues in software-defined network (SDN) controllers can have serious impacts on the performance and availability of networks. We specifically consider stateful performance issues, where a sequence of initial input messages drives an SDN controller into a state such that its performance degrades pathologically when processing subsequent messages. We identify key challenges in applying… ▽ More

    Submitted 8 September, 2022; originally announced September 2022.

  6. arXiv:2208.04927  [pdf, other

    cs.DB cs.DS

    Enabling Efficient and General Subpopulation Analytics in Multidimensional Data Streams

    Authors: Antonis Manousis, Zhuo Cheng, Ran Ben Basat, Zaoxing Liu, Vyas Sekar

    Abstract: Today's large-scale services (e.g., video streaming platforms, data centers, sensor grids) need diverse real-time summary statistics across multiple subpopulations of multidimensional datasets. However, state-of-the-art frameworks do not offer general and accurate analytics in real time at reasonable costs. The root cause is the combinatorial explosion of data subpopulations and the diversity of s… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Comments: To appear in VLDB 2022

  7. arXiv:2206.01349  [pdf, other

    cs.LG cs.AI cs.CR

    On the Privacy Properties of GAN-generated Samples

    Authors: Zinan Lin, Vyas Sekar, Giulia Fanti

    Abstract: The privacy implications of generative adversarial networks (GANs) are a topic of great interest, leading to several recent algorithms for training GANs with privacy guarantees. By drawing connections to the generalization properties of GANs, we prove that under some assumptions, GAN-generated samples inherently satisfy some (weak) privacy guarantees. First, we show that if a GAN is trained on m s… ▽ More

    Submitted 2 June, 2022; originally announced June 2022.

    Comments: AISTATS 2021

  8. arXiv:2205.08211  [pdf, other

    physics.med-ph eess.IV physics.app-ph

    Initial non-invasive in vivo sensing of the lung using time domain diffuse optics

    Authors: Antonio Pifferi, Massimo Miniati, Andrea Farina, Sanathana Konugolu Venkata Sekar, Pranav Lanka, Alberto Dalla Mora, Paola Taroni

    Abstract: Non-invasive in vivo sensing of the lung with light would help diagnose and monitor pulmonary disorders (caused by e.g. COVID-19, emphysema, immature lung tissue in infants). We investigated the possibility to probe the lung with time domain diffuse optics, taking advantage of the increased depth (few cm) reached by photons detected after a long (few ns) propagation time. An initial study on 5 hea… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: 15 pages, 15 figures, 1 Table

  9. arXiv:2204.03352  [pdf

    physics.flu-dyn physics.comp-ph

    Accurate near wall steady flow field prediction using Physics Informed Neural Network (PINN)

    Authors: Vinothkumar Sekar, Qinghua Jiang, Chang Shu, Boo Cheong Khoo

    Abstract: In this paper, Physics Informed Neural Network (PINN) is explored in order to obtain flow predictions near the wall region accurately with measurements (or sampling points) away from the wall. Often, in fluid mechanics experiments, it is difficult to perform velocity measurements near the wall accurately. Therefore, the present study reveals a new and elegant approach to recover the flow solutions… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

  10. arXiv:2203.10674  [pdf, other

    cs.LG cs.CR cs.NI eess.SY

    RareGAN: Generating Samples for Rare Classes

    Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar

    Abstract: We study the problem of learning generative adversarial networks (GANs) for a rare class of an unlabeled dataset subject to a labeling budget. This problem is motivated from practical applications in domains including security (e.g., synthesizing packets for DNS amplification attacks), systems and networking (e.g., synthesizing workloads that trigger high resource usage), and machine learning (e.g… ▽ More

    Submitted 20 March, 2022; originally announced March 2022.

    Comments: Published in AAAI 2022

  11. arXiv:2111.04563  [pdf, other

    cs.NI cs.AR

    A Roadmap for Enabling a Future-Proof In-Network Computing Data Plane Ecosystem

    Authors: Daehyeok Kim, Nikita Lazarev, Tommy Tracy, Farzana Siddique, Hun Namkung, James C. Hoe, Vyas Sekar, Kevin Skadron, Zhiru Zhang, Srinivasan Seshan

    Abstract: As the vision of in-network computing becomes more mature, we see two parallel evolutionary trends. First, we see the evolution of richer, more demanding applications that require capabilities beyond programmable switching ASICs. Second, we see the evolution of diverse data plane technologies with many other future capabilities on the horizon. While some point solutions exist to tackle the interse… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

    Comments: 6 pages, 3 figures

  12. arXiv:2101.09113  [pdf, ps, other

    cs.LG

    Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions

    Authors: Todd Huster, Jeremy E. J. Cohen, Zinan Lin, Kevin Chan, Charles Kamhoua, Nandi Leslie, Cho-Yu Jason Chiang, Vyas Sekar

    Abstract: Generative adversarial networks (GANs) are often billed as "universal distribution learners", but precisely what distributions they can represent and learn is still an open question. Heavy-tailed distributions are prevalent in many different domains such as financial risk-assessment, physics, and epidemiology. We observe that existing GAN architectures do a poor job of matching the asymptotic beha… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

  13. arXiv:2012.06001  [pdf, other

    cs.NI cs.DC

    Sketchy With a Chance of Adoption: Can Sketch-Based Telemetry Be Ready for Prime Time?

    Authors: Zaoxing Liu, Hun Namkung, Anup Agarwal, Antonis Manousis, Peter Steenkiste, Srinivasan Seshan, Vyas Sekar

    Abstract: Sketching algorithms or sketches have emerged as a promising alternative to the traditional packet sampling-based network telemetry solutions. At a high level, they are attractive because of their high resource efficiency and accuracy guarantees. While there have been significant recent advances in various aspects of sketching for networking tasks, many fundamental challenges remain unsolved that… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: 8 pages, 5 figures

  14. arXiv:2009.02773  [pdf, other

    cs.LG cs.CV stat.ML

    Why Spectral Normalization Stabilizes GANs: Analysis and Improvements

    Authors: Zinan Lin, Vyas Sekar, Giulia Fanti

    Abstract: Spectral normalization (SN) is a widely-used technique for improving the stability and sample quality of Generative Adversarial Networks (GANs). However, there is currently limited understanding of why SN is effective. In this work, we show that SN controls two important failure modes of GAN training: exploding and vanishing gradients. Our proofs illustrate a (perhaps unintentional) connection wit… ▽ More

    Submitted 7 April, 2021; v1 submitted 6 September, 2020; originally announced September 2020.

    Comments: 54 pages, 74 figures

  15. arXiv:2009.02457  [pdf, other

    cs.NI cs.DC

    Unleashing In-network Computing on Scientific Workloads

    Authors: Daehyeok Kim, Ankush Jain, Zaoxing Liu, George Amvrosiadis, Damian Hazen, Bradley Settlemyer, Vyas Sekar

    Abstract: Many recent efforts have shown that in-network computing can benefit various datacenter applications. In this paper, we explore a relatively less-explored domain which we argue can benefit from in-network computing: scientific workloads in high-performance computing. By analyzing canonical examples of HPC applications, we observe unique opportunities and challenges for exploiting in-network comput… ▽ More

    Submitted 5 September, 2020; originally announced September 2020.

    Comments: 8 pages, 3 figures

  16. arXiv:2002.10009  [pdf, other

    cs.CR

    Fighting Fire with Light: A Case for Defending DDoS Attacks Using the Optical Layer

    Authors: Matthew Hall, Ramakrishnan Durairajan, Vyas Sekar

    Abstract: The DDoS attack landscape is growing at an unprecedented pace. Inspired by the recent advances in optical networking, we make a case for optical layer-aware DDoS defense (O-LAD) in this paper. Our approach leverages the optical layer to isolate attack traffic rapidly via dynamic reconfiguration of (backup) wavelengths using ROADMs---bridging the gap between (a) evolution of the DDoS attack landsca… ▽ More

    Submitted 23 February, 2020; originally announced February 2020.

    Comments: 6 pages, 4 figures

  17. arXiv:1911.01812  [pdf, other

    cs.LG cs.CR cs.NI stat.ML

    Enhancing the Privacy of Federated Learning with Sketching

    Authors: Zaoxing Liu, Tian Li, Virginia Smith, Vyas Sekar

    Abstract: In response to growing concerns about user privacy, federated learning has emerged as a promising tool to train statistical models over networks of devices while kee** data localized. Federated learning methods run training tasks directly on user devices and do not share the raw user data with third parties. However, current methods still share model updates, which may contain private informatio… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

  18. arXiv:1911.00972  [pdf, other

    cs.LG cs.CR stat.ML

    Privacy for Free: Communication-Efficient Learning with Differential Privacy Using Sketches

    Authors: Tian Li, Zaoxing Liu, Vyas Sekar, Virginia Smith

    Abstract: Communication and privacy are two critical concerns in distributed learning. Many existing works treat these concerns separately. In this work, we argue that a natural connection exists between methods for communication reduction and privacy preservation in the context of distributed machine learning. In particular, we prove that Count Sketch, a simple method for data stream summarization, has inh… ▽ More

    Submitted 6 December, 2019; v1 submitted 3 November, 2019; originally announced November 2019.

  19. arXiv:1909.13403  [pdf, other

    cs.LG cs.DC cs.NI stat.ML

    Using GANs for Sharing Networked Time Series Data: Challenges, Initial Promise, and Open Questions

    Authors: Zinan Lin, Alankar Jain, Chen Wang, Giulia Fanti, Vyas Sekar

    Abstract: Limited data access is a longstanding barrier to data-driven research and development in the networked systems community. In this work, we explore if and how generative adversarial networks (GANs) can be used to incentivize data sharing by enabling a generic framework for sharing synthetic datasets with minimal expert knowledge. As a specific target, our focus in this paper is on time series datas… ▽ More

    Submitted 16 January, 2021; v1 submitted 29 September, 2019; originally announced September 2019.

    Comments: Published in IMC 2020. 20 pages, 26 figures

  20. arXiv:1904.01897  [pdf, other

    cs.SI

    affinity: A System for Latent User Similarity Comparison on Texting Data

    Authors: Tobias Eichinger, Felix Beierle, Sumsam Ullah Khan, Robin Middelanis, Veeraraghavan Sekar, Sam Tabibzadeh

    Abstract: In the field of social networking services, finding similar users based on profile data is common practice. Smartphones harbor sensor and personal context data that can be used for user profiling. Yet, one vast source of personal data, that is text messaging data, has hardly been studied for user profiling. We see three reasons for this: First, private text messaging data is not shared due to thei… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

  21. arXiv:1901.00955  [pdf, other

    cs.CR

    Practical Verifiable In-network Filtering for DDoS defense

    Authors: Deli Gong, Muoi Tran, Shweta Shinde, Hao **, Vyas Sekar, Prateek Saxena, Min Suk Kang

    Abstract: In light of ever-increasing scale and sophistication of modern DDoS attacks, it is time to revisit in-network filtering or the idea of empowering DDoS victims to install in-network traffic filters in the upstream transit networks. Recent proposals show that filtering DDoS traffic at a handful of large transit networks can handle volumetric DDoS attacks effectively. However, the innetwork filtering… ▽ More

    Submitted 14 January, 2019; v1 submitted 3 January, 2019; originally announced January 2019.

  22. arXiv:1806.08420  [pdf, other

    cs.NI

    Oh, What a Fragile Web We Weave: Third-party Service Dependencies In Modern Webservices and Implications

    Authors: Aqsa Kashaf, Carolina Zarate, Hanrou Wang, Yuvraj Agarwal, Vyas Sekar

    Abstract: The recent October 2016 DDoS attack on Dyn served as a wakeup call to the security community as many popular and independent webservices (e.g., Twitter, Spotify) were impacted. This incident raises a larger question on the fragility of modern webservices due to their dependence on third-party services. In this paper, we characterize the dependencies of popular webservices on third party services a… ▽ More

    Submitted 21 June, 2018; originally announced June 2018.

  23. arXiv:1711.04822  [pdf, other

    cs.CR

    Vulnerabilities of Electric Vehicle Battery Packs to Cyberattacks

    Authors: Shashank Sripad, Sekar Kulandaivel, Vikram Pande, Vyas Sekar, Venkatasubramanian Viswanathan

    Abstract: Electric Vehicles (EVs), like all modern vehicles, are entirely controlled by electronic devices embedded within networks that are exposed to the threat of cyberattacks. Cyber vulnerabilities are magnified with EVs due to unique risks associated with EV battery packs. Current batteries have well-known issues with specific energy, cost and fire-related safety risks. In this study, we develop a syst… ▽ More

    Submitted 8 September, 2019; v1 submitted 1 November, 2017; originally announced November 2017.

    Comments: 23 pages, 3 figures, 1 table, 9 pages of Supporting Information

  24. arXiv:1611.00469  [pdf, other

    cs.CR

    Shedding Light on the Adoption of Let's Encrypt

    Authors: Antonis Manousis, Roy Ragsdale, Ben Draffin, Adwiteeya Agrawal, Vyas Sekar

    Abstract: Let's Encrypt is a new entrant in the Certificate Authority ecosystem that offers free and automated certificate signing. It is visionary in its commitment to Certificate Transparency. In this paper, we shed light on the adoption patterns of Let's Encrypt "in the wild" and inform the future design and deployment of this exciting development in the security landscape. We analyze acquisition pattern… ▽ More

    Submitted 2 November, 2016; originally announced November 2016.

  25. arXiv:1608.08469  [pdf, other

    cs.MM cs.NI eess.SY

    On the Efficiency and Fairness of Multiplayer HTTP-based Adaptive Video Streaming

    Authors: Xiaoqi Yin, Mihovil Bartulović, Vyas Sekar, Bruno Sinopoli

    Abstract: User-perceived quality-of-experience (QoE) is critical in internet video delivery systems. Extensive prior work has studied the design of client-side bitrate adaptation algorithms to maximize single-player QoE. However, multiplayer QoE fairness becomes critical as the growth of video traffic makes it more likely that multiple players share a bottleneck in the network. Despite several recent propos… ▽ More

    Submitted 29 August, 2016; originally announced August 2016.

  26. arXiv:1603.04387  [pdf, other

    cs.NI

    NetMemex: Providing Full-Fidelity Traffic Archival

    Authors: Hyeontaek Lim, Vyas Sekar, Yoshihisa Abe, David G. Andersen

    Abstract: NetMemex explores efficient network traffic archival without any loss of information. Unlike NetFlow-like aggregation, NetMemex allows retrieving the entire packet data including full payload, which makes it useful in forensic analysis, networked and distributed system research, and network administration. Different from packet trace dumps, NetMemex performs sophisticated data compression for smal… ▽ More

    Submitted 14 March, 2016; originally announced March 2016.

    Comments: A reformatted version of the ACM SIGCOMM 2013 submission

  27. arXiv:1506.08501  [pdf, other

    cs.NI

    A New Approach to DDoS Defense using SDN and NFV

    Authors: Seyed K. Fayaz, Yoshiaki Tobioka, Vyas Sekar, Michael Bailey

    Abstract: Networks today rely on expensive and proprietary hard- ware appliances, which are deployed at fixed locations, for DDoS defense. This introduces key limitations with respect to flexibility (e.g., complex routing to get traffic to these "chokepoints") and elasticity in handling changing attack patterns. We observe an opportunity to ad- dress these limitations using new networking paradigms such as… ▽ More

    Submitted 5 August, 2015; v1 submitted 29 June, 2015; originally announced June 2015.

  28. arXiv:1506.05541  [pdf, other

    cs.NI

    Analyzing TCP Throughput Stability and Predictability with Implications for Adaptive Video Streaming

    Authors: Yi Sun, Xiaoqi Yin, Nanshu Wang, Junchen Jiang, Vyas Sekar, Yun **, Bruno Sinopoli

    Abstract: Recent work suggests that TCP throughput stability and predictability within a video viewing session can inform the design of better video bitrate adaptation algorithms. Despite a rich tradition of Internet measurement, however, our understanding of throughput stability and predictability is quite limited. To bridge this gap, we present a measurement study of throughput stability using a large-sca… ▽ More

    Submitted 17 June, 2015; originally announced June 2015.

  29. arXiv:1505.03356  [pdf, other

    cs.NI

    Scalable Testing of Context-Dependent Policies over Stateful Data Planes with Armstrong

    Authors: Seyed K. Fayaz, Yoshiaki Tobioka, Sagar Chaki, Vyas Sekar

    Abstract: Network operators today spend significant manual effort in ensuring and checking that the network meets their intended policies. While recent work in network verification has made giant strides to reduce this effort, they focus on simple reachability properties and cannot handle context-dependent policies (e.g., how many connections has a host spawned) that operators realize using stateful network… ▽ More

    Submitted 8 June, 2015; v1 submitted 13 May, 2015; originally announced May 2015.

  30. arXiv:1505.02056  [pdf, ps, other

    cs.NI

    DDA: Cross-Session Throughput Prediction with Applications to Video Bitrate Selection

    Authors: Junchen Jiang, Vyas Sekar, Yi Sun

    Abstract: User experience of video streaming could be greatly improved by selecting a high-yet-sustainable initial video bitrate, and it is therefore critical to accurately predict throughput before a video session starts. Inspired by previous studies that show similarity among throughput of similar sessions (e.g., those sharing same bottleneck link), we argue for a cross-session prediction approach, where… ▽ More

    Submitted 8 May, 2015; originally announced May 2015.

  31. arXiv:1504.07704  [pdf, other

    cs.NI

    Accelerating the Development of Software-Defined Network Optimization Applications Using SOL

    Authors: Victor Heorhiadi, Michael K. Reiter, Vyas Sekar

    Abstract: Software-defined networking (SDN) can enable diverse network management applications such as traffic engineering, service chaining, network function outsourcing, and topology reconfiguration. Realizing the benefits of SDN for these applications, however, entails addressing complex network optimizations that are central to these problems. Unfortunately, such optimization problems require significan… ▽ More

    Submitted 28 April, 2015; originally announced April 2015.

  32. arXiv:1406.5634  [pdf, other

    cs.NI

    A Framework to Quantify the Benefits of Network Functions Virtualization in Cellular Networks

    Authors: Zafar Ayyub Qazi, Vyas Sekar, Samir Das

    Abstract: Network functions virtualization (NFV) is an appealing vision that promises to dramatically reduce capital and operating expenses for cellular providers. However, existing efforts in this space leave open broad issues about how NFV deployments should be instantiated or how they should be provisioned. In this paper, we present an initial attempt at a framework that will help network operators syste… ▽ More

    Submitted 21 June, 2014; originally announced June 2014.

  33. arXiv:1305.0209  [pdf, ps, other

    cs.NI

    Stratos: A Network-Aware Orchestration Layer for Virtual Middleboxes in Clouds

    Authors: Aaron Gember, Anand Krishnamurthy, Saul St. John, Robert Grandl, Xiaoyang Gao, Ashok Anand, Theophilus Benson, Vyas Sekar, Aditya Akella

    Abstract: Enterprises want their in-cloud services to leverage the performance and security benefits that middleboxes offer in traditional deployments. Such virtualized deployments create new opportunities (e.g., flexible scaling) as well as new challenges (e.g., dynamics, multiplexing) for middlebox management tasks such as service composition and provisioning. Unfortunately, enterprises lack systematic to… ▽ More

    Submitted 11 March, 2014; v1 submitted 1 May, 2013; originally announced May 2013.

  34. arXiv:1209.0835  [pdf, other

    cs.SI cs.CY physics.soc-ph

    Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+

    Authors: Neil Zhenqiang Gong, Wenchang Xu, Ling Huang, Prateek Mittal, Emil Stefanov, Vyas Sekar, Dawn Song

    Abstract: Understanding social network structure and evolution has important implications for many aspects of network and system design including provisioning, bootstrap** trust and reputation systems via social networks, and defenses against Sybil attacks. Several recent results suggest that augmenting the social network structure with user attributes (e.g., location, employer, communities of interest) c… ▽ More

    Submitted 18 September, 2012; v1 submitted 4 September, 2012; originally announced September 2012.

    Comments: 14 pages, 19 figures. will appear in IMC'12

  35. arXiv:1206.1815  [pdf, other

    cs.NI

    CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks

    Authors: Udi Weinsberg, Athula Balachandran, Nina Taft, Gianluca Iannaccone, Vyas Sekar, Srinivasan Seshan

    Abstract: During a disaster scenario, situational awareness information, such as location, physical status and images of the surrounding area, is essential for minimizing loss of life, injury, and property damage. Today's handhelds make it easy for people to gather data from within the disaster area in many formats, including text, images and video. Studies show that the extreme anxiety induced by disasters… ▽ More

    Submitted 8 June, 2012; originally announced June 2012.