Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Justine Sherry is active.

Publication


Featured researches published by Justine Sherry.


acm special interest group on data communication | 2012

Making middleboxes someone else's problem: network processing as a cloud service

Justine Sherry; Shaddi Hasan; Colin Scott; Arvind Krishnamurthy; Sylvia Ratnasamy; Vyas Sekar

Modern enterprises almost ubiquitously deploy middlebox processing services to improve security and performance in their networks. Despite this, we find that todays middlebox infrastructure is expensive, complex to manage, and creates new failure modes for the networks that use them. Given the promise of cloud computing to decrease costs, ease management, and provide elasticity and fault-tolerance, we argue that middlebox processing can benefit from outsourcing the cloud. Arriving at a feasible implementation, however, is challenging due to the need to achieve functional equivalence with traditional middlebox deployments without sacrificing performance or increasing network complexity. In this paper, we motivate, design, and implement APLOMB, a practical service for outsourcing enterprise middlebox processing to the cloud. Our discussion of APLOMB is data-driven, guided by a survey of 57 enterprise networks, the first large-scale academic study of middlebox deployment. We show that APLOMB solves real problems faced by network administrators, can outsource over 90% of middlebox hardware in a typical large enterprise network, and, in a case study of a real enterprise, imposes an average latency penalty of 1.1ms and median bandwidth inflation of 3.8%.


conference on emerging network experiment and technology | 2013

Low latency via redundancy

Ashish Vulimiri; Philip Brighten Godfrey; Radhika Mittal; Justine Sherry; Sylvia Ratnasamy; Scott Shenker

Low latency is critical for interactive networked applications. But while we know how to scale systems to increase capacity, reducing latency --- especially the tail of the latency distribution --- can be much more difficult. In this paper, we argue that the use of redundancy is an effective way to convert extra capacity into reduced latency. By initiating redundant operations across diverse resources and using the first result which completes, redundancy improves a systems latency even under exceptional conditions. We study the tradeoff with added system utilization, characterizing the situations in which replicating all tasks reduces mean latency. We then demonstrate empirically that replicating all operations can result in significant mean and tail latency reduction in real-world systems including DNS queries, database servers, and packet forwarding within networks.


acm special interest group on data communication | 2015

BlindBox: Deep Packet Inspection over Encrypted Traffic

Justine Sherry; Chang Lan; Raluca Ada Popa; Sylvia Ratnasamy

Many network middleboxes perform deep packet inspection (DPI), a set of useful tasks which examine packet payloads. These tasks include intrusion detection (IDS), exfiltration detection, and parental filtering. However, a long-standing issue is that once packets are sent over HTTPS, middleboxes can no longer accomplish their tasks because the payloads are encrypted. Hence, one is faced with the choice of only one of two desirable properties: the functionality of middleboxes and the privacy of encryption. We propose BlindBox, the first system that simultaneously provides {\em both} of these properties. The approach of BlindBox is to perform the deep-packet inspection {\em directly on the encrypted traffic. BlindBox realizes this approach through a new protocol and new encryption schemes. We demonstrate that BlindBox enables applications such as IDS, exfiltration detection and parental filtering, and supports real rulesets from both open-source and industrial DPI systems. We implemented BlindBox and showed that it is practical for settings with long-lived HTTPS connections. Moreover, its core encryption scheme is 3-6 orders of magnitude faster than existing relevant cryptographic schemes.


acm special interest group on data communication | 2015

Silo: Predictable Message Latency in the Cloud

Keon Jang; Justine Sherry; Hitesh Ballani; Toby Moncaster

Many cloud applications can benefit from guaranteed latency for their network messages, however providing such predictability is hard, especially in multi-tenant datacenters. We identify three key requirements for such predictability: guaranteed network bandwidth, guaranteed packet delay and guaranteed burst allowance. We present Silo, a system that offers these guarantees in multi-tenant datacenters. Silo leverages the tight coupling between bandwidth and delay: controlling tenant bandwidth leads to deterministic bounds on network queuing delay. Silo builds upon network calculus to place tenant VMs with competing requirements such that they can coexist. A novel hypervisor-based policing mechanism achieves packet pacing at sub-microsecond granularity, ensuring tenants do not exceed their allowances. We have implemented a Silo prototype comprising a VM placement manager and a Windows filter driver. Silo does not require any changes to applications, guest OSes or network switches. We show that Silo can ensure predictable message latency for cloud applications while imposing low overhead.


internet measurement conference | 2010

Resolving IP aliases with prespecified timestamps

Justine Sherry; Ethan Katz-Bassett; Mary Pimenova; Harsha V. Madhyastha; Thomas E. Anderson; Arvind Krishnamurthy

Operators and researchers want accurate router-level views of the Internet for purposes including troubleshooting and modeling. However, tools such as traceroute return IP addresses. Because routers may have dozens of IP addresses, or aliases, multiple measurements may return different addresses, obscuring whether they represent the same machine. While many techniques exist to address this issue by identifying some IP aliases, these techniques, even in combination, find only a subset of alias pairs. To improve this state, we design and evaluate a new alias resolution technique using the IP prespecified timestamp option. This option allows a sender to request timestamp val- ues from multiple IP addresses in the same probe. By careful arrangement of these IP addresses, we show that we can infer aliases in many cases. In this paper, we conduct a measurement study of how many routers support IP timestamps, demonstrating that enough honor the option to base our technique on it. Using our technique, and compared to the most accurate alias information available, we find that 94.7% of the aliases identified by our technique are true positives. Further, we show that our IP timestamp-based technique complements existing alias resolution techniques, providing significant gains by discovering previously unidentifiable aliases.


Proceedings of the 2012 ACM conference on CoNEXT student workshop | 2012

Meddle: middleboxes for increased transparency and control of mobile traffic

Ashwin Rao; Justine Sherry; Arnaud Legout; Arvind Krishnamurthy; Walid Dabbous; David R. Choffnes

Mobile networks are the most popular, fastest growing and least understood systems in today’s Internet ecosystem. Despite a large collection of privacy, policy and performance issues in mobile networks, users and researchers are faced with few options to characterize and address them. In this poster we present Meddle, a framework aimed at enhancing transparency in mobile networks and providing a platform that enables users (and researchers) control mobile traffic.


acm special interest group on data communication | 2016

Open Network Interfaces for Carrier Networks

Aurojit Panda; James Murphy McCauley; Amin Tootoonchian; Justine Sherry; Teemu Koponen; Syliva Ratnasamy; Scott Shenker

With the increasing prevalence of middleboxes, networks today are capable of doing far more than merely delivering packets. In fact, to realize their full potential for both supporting innovation and generating revenue, we should think of carrier networks as service-delivery platforms. This requires providing open interfaces that allow third-parties to leverage carrier-network infrastructures in building global-scale services. In this position paper, we take the first steps towards making this vision concrete by identifying a few such interfaces that are both simple-to-support and safe-to-deploy (for the carrier) while being flexibly useful (for third-parties).


networked systems design and implementation | 2010

Reverse traceroute

Ethan Katz-Bassett; Harsha V. Madhyastha; Vijay Kumar Adhikari; Colin Scott; Justine Sherry; Peter Van Wesep; Thomas E. Anderson; Arvind Krishnamurthy


acm special interest group on data communication | 2015

Rollback-Recovery for Middleboxes

Justine Sherry; Peter Gao; Soumya Basu; Aurojit Panda; Arvind Krishnamurthy; Christian Maciocco; Maziar Manesh; João Martins; Sylvia Ratnasamy; Luigi Rizzo; Scott Shenker


Archive | 2012

A Survey of Enterprise Middlebox Deployments

Justine Sherry; Sylvia Ratnasamy

Collaboration


Dive into the Justine Sherry's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Scott Shenker

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chang Lan

University of California

View shared research outputs
Top Co-Authors

Avatar

Radhika Mittal

University of California

View shared research outputs
Top Co-Authors

Avatar

Raluca Ada Popa

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Aurojit Panda

University of California

View shared research outputs
Top Co-Authors

Avatar

Colin Scott

University of California

View shared research outputs
Top Co-Authors

Avatar

Ethan Katz-Bassett

University of Southern California

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge