Skip to main content

Showing 1–20 of 20 results for author: Afek, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2109.12930  [pdf, ps, other

    cs.DC

    Distributed Computing With the Cloud

    Authors: Yehuda Afek, Gal Giladi, Boaz Patt-Shamir

    Abstract: We investigate the effect of omnipresent cloud storage on distributed computing. We specify a network model with links of prescribed bandwidth that connect standard processing nodes, and, in addition, passive storage nodes. Each passive node represents a cloud storage system, such as Dropbox, Google Drive etc. We study a few tasks in this model, assuming a single cloud node connected to all other… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: Full version. Proceedings version in SSS 2021

  2. arXiv:2008.04612  [pdf, other

    cs.DC cs.LG

    Holdout SGD: Byzantine Tolerant Federated Learning

    Authors: Shahar Azulay, Lior Raz, Amir Globerson, Tomer Koren, Yehuda Afek

    Abstract: This work presents a new distributed Byzantine tolerant federated learning algorithm, HoldOut SGD, for Stochastic Gradient Descent (SGD) optimization. HoldOut SGD uses the well known machine learning technique of holdout estimation, in a distributed fashion, in order to select parameter updates that are likely to lead to models with low loss values. This makes it more effective at discarding Byzan… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Comments: 12 pages, 2 figures

  3. arXiv:2005.09107  [pdf

    cs.CR

    NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities

    Authors: Yehuda Afek, Anat Bremler-Barr, Lior Shafir

    Abstract: This paper exposes a new vulnerability and introduces a corresponding attack, the NoneXistent Name Server Attack (NXNSAttack), that disrupts and may paralyze the DNS system, making it difficult or impossible for Internet users to access websites, web e-mail, online video chats, or any other online resource. The NXNSAttack generates a storm of packets between DNS resolvers and DNS authoritative nam… ▽ More

    Submitted 29 September, 2020; v1 submitted 18 May, 2020; originally announced May 2020.

  4. arXiv:1911.00253  [pdf, other

    cs.NI

    NFV-based IoT Security for Home Networks using MUD

    Authors: Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Abraham, Avraham Shalev

    Abstract: A new scalable ISP level system architecture to secure and protect all IoT devices in a large number of homes is presented. The system is based on whitelisting, as in the Manufacturer Usage Description (MUD) framework, implemented as a VNF. Unlike common MUD suggestions that place the whitelist application at the home/enterprise network, our approach is to place the enforcement upstream at the pro… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  5. arXiv:1910.09684  [pdf, ps, other

    math.CO cs.DC

    A King in every two consecutive tournaments

    Authors: Yehuda Afek, Eli Gafni, Nati Linial

    Abstract: We think of a tournament $T=([n], E)$ as a communication network where in each round of communication processor $P_i$ sends its information to $P_j$, for every directed edge $ij \in E(T)$. By Landau's theorem (1953) there is a King in $T$, i.e., a processor whose initial input reaches every other processor in two rounds or less. Namely, a processor $P_ν$ such that after two rounds of communication… ▽ More

    Submitted 21 October, 2019; originally announced October 2019.

  6. arXiv:1910.02239  [pdf, other

    cs.DC

    The Role of A-priori Information in Networks of Rational Agents

    Authors: Yehuda Afek, Yishay Mansour, Shaked Rafaeli, Moshe Sulamy

    Abstract: Until now, distributed algorithms for rational agents have assumed a-priori knowledge of $n$, the size of the network. This assumption is challenged here by proving how much a-priori knowledge is necessary for equilibrium in different distributed computing problems. Duplication - pretending to be more than one agent - is the main tool used by agents to deviate and increase their utility when not e… ▽ More

    Submitted 5 October, 2019; originally announced October 2019.

    Comments: This paper is the full version of the DISC 2018 paper. arXiv admin note: substantial text overlap with arXiv:1711.04728

  7. arXiv:1910.00975  [pdf, other

    cs.CR

    Eradicating Attacks on the Internal Network with Internal Network Policy

    Authors: Yehuda Afek, Anat Bremler-Barr, Alon Noy

    Abstract: In this paper we present three attacks on private internal networks behind a NAT and a corresponding new protection mechanism, Internal Network Policy, to mitigate a wide range of attacks that penetrate internal networks behind a NAT. In the attack scenario, a victim is tricked to visit the attacker's website, which contains a malicious script that lets the attacker access the victim's internal ne… ▽ More

    Submitted 3 October, 2019; v1 submitted 2 October, 2019; originally announced October 2019.

  8. arXiv:1909.03432  [pdf, other

    cs.DC

    Consensus in Equilibrium: Can One Against All Decide Fairly?

    Authors: Yehuda Afek, Itay Harel, Amit Jacob-Fanani, Moshe Sulamy

    Abstract: Is there an equilibrium for distributed consensus when all agents except one collude to steer the decision value towards their preference? If an equilibrium exists, then an $n-1$ size coalition cannot do better by deviating from the algorithm, even if it prefers a different decision value. We show that an equilibrium exists under this condition only if the number of agents in the network is odd an… ▽ More

    Submitted 8 September, 2019; originally announced September 2019.

  9. arXiv:1805.05660  [pdf, other

    cs.DC

    Selecting a Leader in a Network of Finite State Machines

    Authors: Yehuda Afek, Yuval Emek, Noa Kolikant

    Abstract: This paper studies a variant of the \emph{leader election} problem under the \emph{stone age} model (Emek and Wattenhofer, PODC 2013) that considers a network of $n$ randomized finite automata with very weak communication capabilities (a multi-frequency asynchronous generalization of the \emph{bee**} model's communication scheme). Since solving the classic leader election problem is impossible e… ▽ More

    Submitted 24 July, 2018; v1 submitted 15 May, 2018; originally announced May 2018.

    Comments: To appear in DISC 2018

  10. arXiv:1711.04728  [pdf, other

    cs.DC cs.GT

    Cheating by Duplication: Equilibrium Requires Global Knowledge

    Authors: Yehuda Afek, Shaked Rafaeli, Moshe Sulamy

    Abstract: The question of what global information must distributed rational agents a-priori know about the network in order for equilibrium to be possible is researched here. Until now, distributed algorithms with rational agents have assumed that $n$, the size of the network, is a-priori known to the participants. We investigate the above question, considering different distributed computing problems and s… ▽ More

    Submitted 8 April, 2018; v1 submitted 13 November, 2017; originally announced November 2017.

  11. arXiv:1709.06808  [pdf, ps, other

    cs.DC

    The Life in 1-Consensus

    Authors: Yehuda Afek, Eli Daian, Eli Gafni

    Abstract: This paper introduces the atomic Write and Read Next ($\text{WRN}_{k}$) deterministic shared memory object, that for any $k\ge3$, is stronger than read-write registers, but is unable to implement $2$-processor consensus. In particular, it refutes the conjecture claiming that every deterministic object of consensus number $1$ is computationally equivalent to read-write registers.

    Submitted 27 September, 2017; v1 submitted 20 September, 2017; originally announced September 2017.

    Comments: 8 pages

    ACM Class: C.1.4; C.2.4; E.1

  12. arXiv:1702.08037  [pdf, other

    cs.NI

    Detecting Heavy Flows in the SDN Match and Action Model

    Authors: Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff

    Abstract: Efficient algorithms and techniques to detect and identify large flows in a high throughput traffic stream in the SDN match-and-action model are presented. This is in contrast to previous work that either deviated from the match and action model by requiring additional switch level capabilities or did not exploit the SDN data plane. Our construction has two parts; (a) how to sample in an SDN match… ▽ More

    Submitted 26 February, 2017; originally announced February 2017.

  13. arXiv:1612.02636  [pdf, other

    cs.CR cs.NI

    Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection

    Authors: Yehuda Afek, Anat Bremler-Barr, Edith Cohen, Shir Landau Feibish, Michal Shagam

    Abstract: Motivated by a recent new type of randomized Distributed Denial of Service (DDoS) attacks on the Domain Name Service (DNS), we develop novel and efficient distinct heavy hitters algorithms and build an attack identification system that uses our algorithms. Heavy hitter detection in streams is a fundamental problem with many applications, including detecting certain DDoS attacks and anomalies. A (c… ▽ More

    Submitted 8 December, 2016; originally announced December 2016.

  14. arXiv:1507.00772  [pdf, ps, other

    cs.DC

    Optimal and Resilient Pheromone Utilization in Ant Foraging

    Authors: Yehuda Afek, Roman Kecher, Moshe Sulamy

    Abstract: Pheromones are a chemical substance produced and released by ants as means of communication. In this work we present the minimum amount of pheromones necessary and sufficient for a colony of ants (identical mobile agents) to deterministically find a food source (treasure), assuming that each ant has the computational capabilities of either a Finite State Machine (FSM) or a Turing Machine (TM). In… ▽ More

    Submitted 2 July, 2015; originally announced July 2015.

  15. arXiv:1506.07118  [pdf, ps, other

    cs.DC

    Idle Ants Have a Role

    Authors: Yehuda Afek, Deborah M. Gordon, Moshe Sulamy

    Abstract: Using elementary distributed computing techniques we suggest an explanation for two unexplained phenomena in regards to ant colonies, (a) a substantial amount of ants in an ant colony are idle, and (b) the observed low survivability of new ant colonies in nature. Ant colonies employ task allocation, in which ants progress from one task to the other, to meet changing demands introduced by the envir… ▽ More

    Submitted 20 May, 2016; v1 submitted 23 June, 2015; originally announced June 2015.

  16. arXiv:1208.0813  [pdf, ps, other

    math.CO cs.GT

    Musical chairs

    Authors: Yehuda Afek, Yakov Babichenko, Uriel Feige, Eli Gafni, Nati Linial, Benny Sudakov

    Abstract: In the {\em Musical Chairs} game $MC(n,m)$ a team of $n$ players plays against an adversarial {\em scheduler}. The scheduler wins if the game proceeds indefinitely, while termination after a finite number of rounds is declared a win of the team. At each round of the game each player {\em occupies} one of the $m$ available {\em chairs}. Termination (and a win of the team) is declared as soon as eac… ▽ More

    Submitted 3 August, 2012; originally announced August 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1106.2065

  17. arXiv:1206.0150  [pdf, other

    cs.DS cs.DC

    Bee** a Maximal Independent Set

    Authors: Yehuda Afek, Noga Alon, Ziv Bar-Joseph, Alejandro Cornejo, Bernhard Haeupler, Fabian Kuhn

    Abstract: We consider the problem of computing a maximal independent set (MIS) in an extremely harsh broadcast model that relies only on carrier sensing. The model consists of an anonymous broadcast network in which nodes have no knowledge about the topology of the network or even an upper bound on its size. Furthermore, it is assumed that an adversary chooses at which time slot each node wakes up. At each… ▽ More

    Submitted 1 June, 2012; originally announced June 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1108.1926

  18. arXiv:1203.6096  [pdf, ps, other

    cs.DC

    Asynchrony from Synchrony

    Authors: Yehuda Afek, Eli Gafni

    Abstract: We consider synchronous dynamic networks which like radio networks may have asymmetric communication links, and are affected by communication rather than processor failures. In this paper we investigate the minimal message survivability in a per round basis that allows for the minimal global cooperation, i.e., allows to solve any task that is wait-free read-write solvable. The paper completely cha… ▽ More

    Submitted 27 March, 2012; originally announced March 2012.

  19. arXiv:1106.2126  [pdf, ps, other

    cs.DC

    MIS on the fly

    Authors: Yehuda Afek, Noga Alon, Ziv Bar-Joseph

    Abstract: Humans are very good at optimizing solutions for specific problems. Biological processes, on the other hand, have evolved to handle multiple constrained distributed environments and so they are robust and adaptable. Inspired by observations made in a biological system we have recently presented a simple new randomized distributed MIS algorithm \cite{ZScience}. Here we extend these results by remov… ▽ More

    Submitted 10 June, 2011; originally announced June 2011.

    Comments: have been submitted for publication

  20. arXiv:1106.2065  [pdf, ps, other

    cs.DC

    Oblivious Collaboration

    Authors: Yehuda Afek, Yakov Babichenko, Uriel Feige, Eli Gafni, Nati Linial, Benny Sudakov

    Abstract: Communication is a crucial ingredient in every kind of collaborative work. But what is the least possible amount of communication required for a given task? We formalize this question by introducing a new framework for distributed computation, called {\em oblivious protocols}. We investigate the power of this model by considering two concrete examples, the {\em musical chairs} task $MC(n,m)$ and… ▽ More

    Submitted 10 June, 2011; originally announced June 2011.

    Comments: 25 pages