Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ran Ben Basat is active.

Publication


Featured researches published by Ran Ben Basat.


acm special interest group on data communication | 2017

Constant Time Updates in Hierarchical Heavy Hitters

Ran Ben Basat; Gil Einziger; Roy Friedman; Marcelo Caggiani Luizelli; Erez Waisbard

Monitoring tasks, such as anomaly and DDoS detection, require identifying frequent flow aggregates based on common IP prefixes. These are known as hierarchical heavy hitters (HHH), where the hierarchy is determined based on the type of prefixes of interest in a given application. The per packet complexity of existing HHH algorithms is proportional to the size of the hierarchy, imposing significant overheads. In this paper, we propose a randomized constant time algorithm for HHH. We prove probabilistic precision bounds backed by an empirical evaluation. Using four real Internet packet traces, we demonstrate that our algorithm indeed obtains comparable accuracy and recall as previous works, while running up to 62 times faster. Finally, we extended Open vSwitch (OVS) with our algorithm and showed it is able to handle 13.8 million packets per second. In contrast, incorporating previous works in OVS only obtained 2.5 times lower throughput.


international conference on computer communications | 2017

Optimal elephant flow detection

Ran Ben Basat; Gil Einziger; Roy Friedman; Yaron Kassner

Monitoring the traffic volumes of elephant flows, including the total byte count per flow, is a fundamental capability for online network measurements. We present an asymptotically optimal algorithm for solving this problem in terms of both space and time complexity. This improves on previous approaches, which can only count the number of packets in constant time. We evaluate our work on real packet traces, demonstrating an up to X2.5 speedup compared to the best alternative.


international conference of distributed computing and networking | 2018

Fast Flow Volume Estimation

Ran Ben Basat; Gil Einziger; Roy Friedman

The increasing popularity of jumbo frames means growing variance in the size of packets transmitted in modern networks. Consequently, network monitoring tools must maintain explicit traffic volume statistics rather than settle for packet counting as before. We present constant time algorithms for volume estimations in streams and sliding windows, which are faster than previous work. Our solutions are formally analyzed and are extensively evaluated over multiple real-world packet traces as well as synthetic ones. For streams, we demonstrate a run-time improvement of up to 2.4X compared to the state of the art. On sliding windows, we exhibit a memory reduction of over 100X on all traces and an asymptotic runtime improvement to a constant. Finally, we apply our approach to hierarchical heavy hitters and achieve an empirical 2.4-7X speedup.


conference on computer communications workshops | 2017

Poster abstract: A sliding counting bloom filter

Ran Ben Basat; Gil Einziger; Roy Friedman; Yaron Kassner

Bloom filters and their variants support membership or multiplicity queries with a low probabilistic error. For many networking applications, recent data is more significant than older data, motivating the need for sliding window solutions. In this work, we introduce Sliding Window Approximate Membership Protocol (SWAMP), a simple algorithm for membership and multiplicity queries over sliding windows. SWAMP is the first approximate set membership sliding window algorithm that is memory succinct, i.e., up to a factor of (1 + 0(1)) from the information theoretic lower bound, for constant error probabilities. It also operates in constant time and supports multiplicity queries with no additional overheads. Finally, we evaluate the memory consumption of SWAMP on a wide range of parameters and show a 25–40% reduction compared to the state of the art sliding Bloom filters (that cannot count). In summary, SWAMP improves the memory consumption of its competitors and can also count.


acm international conference on systems and storage | 2017

Counting distinct elements over sliding windows

Eran Assaf; Ran Ben Basat; Gil Einziger; Roy Friedman; Yaron Kassner

In Distributed Denial of Service (DDoS) attacks, an attacker tries to disable a service with a flood of seemingly legitimate requests from multiple devices; this is usually accompanied by a sharp spike in the number of distinct IP addresses / flows accessing the system in a short time frame. Hence, the number of distinct elements over sliding windows is a fundamental signal in DDoS identification. Additionally, assessing whether a specific flow has recently accessed the system, known as the Set Membership problem, can help us identify the attacking parties. Here, we show how to extend the functionality of a state of the art algorithm for set membership over a W elements sliding window. We now also support estimation of the distinct flow count, using as little as log2 (W) additional bits.


scandinavian workshop on algorithm theory | 2016

Efficient Summing over Sliding Windows

Ran Ben Basat; Gil Einziger; Roy Friedman; Yaron Kassner

This paper considers the problem of maintaining statistic aggregates over the last W elements of a data stream. First, the problem of counting the number of 1s in the last W bits of a binary stream is considered. A lower bound of Omega(1/epsilon + log(W)) memory bits for Wepsilon-additive approximations is derived. This is followed by an algorithm whose memory consumption is O(1/epsilon + log(W)) bits, indicating that the algorithm is optimal and that the bound is tight. Next, the more general problem of maintaining a sum of the last W integers, each in the range of {0, 1, ..., R}, is addressed. The paper shows that approximating the sum within an additive error of RW epsilon can also be done using Theta(1/epsilon + log(W)) bits for epsilon = Omega(1/W). For epsilon = o(1/W), we present a succinct algorithm which uses B(1 + o(1)) bits, where B = Theta(W*log(1/(W*epsilon))) is the derived lower bound. We show that all lower bounds generalize to randomized algorithms as well. All algorithms process new elements and answer queries in O(1) worst-case time.


architectures for networking and communications systems | 2018

Network-wide routing-oblivious heavy hitters

Ran Ben Basat; Gil Einziger; Shir Landau Feibish; Jalil Moraney; Danny Raz

The recent introduction of SDN allows deploying new centralized network algorithms that dramatically improve the network operation. Many of these solutions rely on the assumption that the centralized controller merges data from different Network Monitoring Points (NMP) to obtain a network-wide view. This is far from trivial when the same packet may traverse through several NMPs. Therefore, existing solutions either assume that each packet is measured at exactly one NMP or that the routing of each packet is known. Another approach is to mark the sampled packets so that other NMPs are aware that the packet was already considered. We suggest the first network-wide and routing oblivious algorithms for three fundamental network monitoring problems. The suggested algorithms allow flexible NMP placement, require no control over edge routers, and are indifferent to network topology and routing. Moreover, they are based on passive measurements without modifying the traffic in any way. Formally, we provide a general, constant time framework that solves the distributed versions of the volume estimation, frequency estimation and heavy-hitters problems with provable guarantees. The evaluation of our scheme on real packet traces shows that we can achieve very accurate results using a very reasonable amount of memory. For example, using less than 60KB memory in each monitoring point we get a root square error of less than 0.01% of the packets for frequency estimation.


acm international conference on systems and storage | 2018

Space Efficient Elephant Flow Detection

Ran Ben Basat; Gil Einziger; Roy Friedman

Identifying the large flows in terms of byte volume, known as elephant flows, is a fundamental capability that many network algorithms require. While optimal solutions that find the largest flows in terms of packet-count are known [5], constant update time algorithms for byte-volume were only recently discovered [1, 2]. Here, we propose an improved variant of the DIMSUM algorithm [2] that reduces the space requirement by 50% while allowing O(1) update time.


Pervasive and Mobile Computing | 2018

Fast flow volume estimation

Ran Ben Basat; Gil Einziger; Roy Friedman

Abstract The increasing popularity of jumbo frames means growing variance in the size of packets transmitted in modern networks. Consequently, network monitoring tools must maintain explicit traffic volume statistics rather than settle for packet counting as before. We present constant time algorithms for volume estimations in streams and sliding windows, which are faster than previous work. Our solutions are formally analyzed and are extensively evaluated over multiple real-world packet traces as well as synthetic ones. For streams, we demonstrate a run-time improvement of up to 2.4X compared to the state of the art. On sliding windows, we exhibit a memory reduction of over 100X on all traces and an asymptotic runtime improvement to a constant. Finally, we apply our approach to hierarchical heavy hitters and achieve an empirical 2.4-7X speedup.


international conference on computer communications | 2017

Randomized admission policy for efficient top-k and frequency estimation

Ran Ben Basat; Gil Einziger; Roy Friedman; Yaron Kassner

Collaboration


Dive into the Ran Ben Basat's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Roy Friedman

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Yaron Kassner

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eran Assaf

Hebrew University of Jerusalem

View shared research outputs
Top Co-Authors

Avatar

Moshe Tennenholtz

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Oren Kurland

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ariel Orda

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Danny Raz

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Elad Kravi

Technion – Israel Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge