Skip to main content

Showing 1–10 of 10 results for author: Bachl, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2206.10561  [pdf, other

    cs.NI

    Fair Queuing Aware Congestion Control

    Authors: Maximilian Bachl

    Abstract: Fair queuing is becoming increasingly prevalent in the internet and has been shown to improve performance in many circumstances. Performance could be improved even more if endpoints could detect the presence of fair queuing on a certain path and adjust their congestion control accordingly. If fair queuing is detected, the congestion control would not have to take cross traffic into account, which… ▽ More

    Submitted 9 June, 2023; v1 submitted 21 June, 2022; originally announced June 2022.

  2. arXiv:2102.09980  [pdf, ps, other

    cs.CR cs.LG cs.NI cs.OS

    A flow-based IDS using Machine Learning in eBPF

    Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby

    Abstract: eBPF is a new technology which allows dynamically loading pieces of code into the Linux kernel. It can greatly speed up networking since it enables the kernel to process certain packets without the involvement of a userspace program. So far eBPF has been used for simple packet filtering applications such as firewalls or Denial of Service protection. We show that it is possible to develop a flow ba… ▽ More

    Submitted 4 March, 2022; v1 submitted 19 February, 2021; originally announced February 2021.

  3. arXiv:2010.08362  [pdf, other

    cs.NI

    Detecting Fair Queuing for Better Congestion Control

    Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby

    Abstract: Low delay is an explicit requirement for applications such as cloud gaming and video conferencing. Delay-based congestion control can achieve the same throughput but significantly smaller delay than loss-based one and is thus ideal for these applications. However, when a delay- and a loss-based flow compete for a bottleneck, the loss-based one can monopolize all the bandwidth and starve the delay-… ▽ More

    Submitted 19 February, 2021; v1 submitted 16 October, 2020; originally announced October 2020.

  4. arXiv:2007.13444  [pdf, other

    cs.LG cs.NI stat.ML

    EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection

    Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby

    Abstract: Fully Connected Neural Networks (FCNNs) have been the core of most state-of-the-art Machine Learning (ML) applications in recent years and also have been widely used for Intrusion Detection Systems (IDSs). Experimental results from the last years show that generally deeper neural networks with more layers perform better than shallow models. Nonetheless, with the growing number of layers, obtaining… ▽ More

    Submitted 15 October, 2020; v1 submitted 27 July, 2020; originally announced July 2020.

  5. LFQ: Online Learning of Per-flow Queuing Policies using Deep Reinforcement Learning

    Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby

    Abstract: The increasing number of different, incompatible congestion control algorithms has led to an increased deployment of fair queuing. Fair queuing isolates each network flow and can thus guarantee fairness for each flow even if the flows' congestion controls are not inherently fair. So far, each queue in the fair queuing system either has a fixed, static maximum size or is managed by an Active Queue… ▽ More

    Submitted 15 October, 2020; v1 submitted 6 July, 2020; originally announced July 2020.

    Journal ref: 2020 IEEE 45th Conference on Local Computer Networks (LCN)

  6. arXiv:2002.03872  [pdf, other

    cs.LG cs.CR cs.NI stat.ML

    SparseIDS: Learning Packet Sampling with Reinforcement Learning

    Authors: Maximilian Bachl, Fares Meghdouri, Joachim Fabini, Tanja Zseby

    Abstract: Recurrent Neural Networks (RNNs) have been shown to be valuable for constructing Intrusion Detection Systems (IDSs) for network data. They allow determining if a flow is malicious or not already before it is over, making it possible to take action immediately. However, considering the large number of packets that has to be inspected, for example in cloud/fog and edge computing, the question of com… ▽ More

    Submitted 4 May, 2020; v1 submitted 10 February, 2020; originally announced February 2020.

    Journal ref: 2020 IEEE Conference on Communications and Network Security (CNS), Avignon, France

  7. Explainability and Adversarial Robustness for RNNs

    Authors: Alexander Hartl, Maximilian Bachl, Joachim Fabini, Tanja Zseby

    Abstract: Recurrent Neural Networks (RNNs) yield attractive properties for constructing Intrusion Detection Systems (IDSs) for network data. With the rise of ubiquitous Machine Learning (ML) systems, malicious actors have been catching up quickly to find new ways to exploit ML vulnerabilities for profit. Recently developed adversarial ML techniques focus on computer vision and their applicability to network… ▽ More

    Submitted 19 February, 2020; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: Accepted at IEEE BigDataService 2020

    Journal ref: 2020 IEEE Sixth International Conference on Big Data Computing Service and Applications (BigDataService)

  8. Cocoa: Congestion Control Aware Queuing

    Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby

    Abstract: Recent model-based congestion control algorithms such as BBR use repeated measurements at the endpoint to build a model of the network connection and use it to achieve optimal throughput with low queuing delay. Conversely, applying this model-based approach to Active Queue Management (AQM) has so far received less attention. We propose the new AQM scheduler cocoa based on fair queuing, which adapt… ▽ More

    Submitted 22 November, 2019; v1 submitted 23 October, 2019; originally announced October 2019.

    Journal ref: Buffer Sizing Workshop (BS'19), December 2-3, 2019, Stanford, CA, USA

  9. arXiv:1909.07866  [pdf, other

    cs.CR cs.LG cs.NI

    Walling up Backdoors in Intrusion Detection Systems

    Authors: Maximilian Bachl, Alexander Hartl, Joachim Fabini, Tanja Zseby

    Abstract: Interest in poisoning attacks and backdoors recently resurfaced for Deep Learning (DL) applications. Several successful defense mechanisms have been recently proposed for Convolutional Neural Networks (CNNs), for example in the context of autonomous driving. We show that visualization approaches can aid in identifying a backdoor independent of the used classifier. Surprisingly, we find that common… ▽ More

    Submitted 5 April, 2020; v1 submitted 17 September, 2019; originally announced September 2019.

    Journal ref: 3rd ACM CoNEXT Workshop on Big DAta, Machine Learning and Artificial Intelligence for Data Communication Networks (Big-DAMA '19), December 9, 2019, Orlando, FL, USA

  10. arXiv:1907.05280  [pdf, other

    cs.CV cs.GR cs.LG eess.IV stat.ML

    City-GAN: Learning architectural styles using a custom Conditional GAN architecture

    Authors: Maximilian Bachl, Daniel C. Ferreira

    Abstract: Generative Adversarial Networks (GANs) are a well-known technique that is trained on samples (e.g. pictures of fruits) and which after training is able to generate realistic new samples. Conditional GANs (CGANs) additionally provide label information for subclasses (e.g. apple, orange, pear) which enables the GAN to learn more easily and increase the quality of its output samples. We use GANs to l… ▽ More

    Submitted 26 May, 2020; v1 submitted 3 July, 2019; originally announced July 2019.