A Difference Resolution Approach to Compressing Access Control Lists

Slides:



Advertisements
Similar presentations
Minimum Clique Partition Problem with Constrained Weight for Interval Graphs Jianping Li Department of Mathematics Yunnan University Jointed by M.X. Chen.
Advertisements

Greedy Algorithms.
1 Constraint Satisfaction Problems A Quick Overview (based on AIMA book slides)
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
An On-Chip IP Address Lookup Algorithm Author: Xuehong Sun and Yiqiang Q. Zhao Publisher: IEEE TRANSACTIONS ON COMPUTERS, 2005 Presenter: Yu Hao, Tseng.
Fast Firewall Implementation for Software and Hardware-based Routers Lili Qiu, Microsoft Research George Varghese, UCSD Subhash Suri, UCSB 9 th International.
IJCAI Russian Doll Search with Tree Decomposition Martí Sànchez, David Allouche, Simon de Givry, and Thomas Schiex INRA Toulouse, FRANCE.
Approximation Algorithms for Capacitated Set Cover Ravishankar Krishnaswamy (joint work with Nikhil Bansal and Barna Saha)
A Ternary Unification Framework for Optimizing TCAM-Based Packet Classification Systems Author: Eric Norige, Alex X. Liu, and Eric Torng Publisher: ANCS.
First Step Towards Automatic Correction of Firewall Policy Faults Fei Chen Alex X. Liu Computer Science and Engineering Michigan State University JeeHyun.
1 TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Department of Computer Science and Information Engineering National.
CS774. Markov Random Field : Theory and Application Lecture 17 Kyomin Jung KAIST Nov
Approximating Maximum Edge Coloring in Multigraphs
1 Energy Efficient Multi-match Packet Classification with TCAM Fang Yu
Privacy-Preserving Cross-Domain Network Reachability Quantification
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification Fang Yu 1 T. V. Lakshman 2 Martin Austin Motoyama 1 Randy H. Katz 1 1 EECS.
System-Wide Energy Minimization for Real-Time Tasks: Lower Bound and Approximation Xiliang Zhong and Cheng-Zhong Xu Dept. of Electrical & Computer Engg.
September 12, 2006IEEE PIMRC 2006, Helsinki, Finland1 On the Packet Header Size and Network State Tradeoff for Trajectory-Based Routing in Wireless Networks.
Finding a maximum independent set in a sparse random graph Uriel Feige and Eran Ofek.
Online Packet Switching Techniques and algorithms Yossi Azar Tel Aviv University.
Impact of Problem Centralization on Distributed Constraint Optimization Algorithms John P. Davin and Pragnesh Jay Modi Carnegie Mellon University School.
©2003/04 Alessandro Bogliolo Background Information theory Probability theory Algorithms.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Introduction to variable selection I Qi Yu. 2 Problems due to poor variable selection: Input dimension is too large; the curse of dimensionality problem.
1 Approximation Through Scaling Algorithms and Networks 2014/2015 Hans L. Bodlaender Johan M. M. van Rooij.
Bert Pluymers Johan Suykens, Bart De Moor Department of Electrotechnical Engineering (ESAT) Research Group SCD-SISTA Katholieke Universiteit Leuven, Belgium.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Minimizing Rulesets for TCAM Implementation.
An Improved Algorithm to Accelerate Regular Expression Evaluation Author: Michela Becchi, Patrick Crowley Publisher: 3rd ACM/IEEE Symposium on Architecture.
Packing Rectangles into Bins Nikhil Bansal (CMU) Joint with Maxim Sviridenko (IBM)
Approximation Algorithms
Packet Classifiers In Ternary CAMs Can Be Smaller Qunfeng Dong (University of Wisconsin-Madison) Suman Banerjee (University of Wisconsin-Madison) Jia Wang.
Palette: Distributing Tables in Software-Defined Networks Yossi Kanizo (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) and David Hay.
Stefan Mutter, Mark Hall, Eibe Frank University of Freiburg, Germany University of Waikato, New Zealand The 17th Australian Joint Conference on Artificial.
1 Short Term Scheduling. 2  Planning horizon is short  Multiple unique jobs (tasks) with varying processing times and due dates  Multiple unique jobs.
On Finding an Optimal TCAM Encoding Scheme for Packet Classification Ori Rottenstreich (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel)
Guaranteed Smooth Scheduling in Packet Switches Isaac Keslassy (Stanford University), Murali Kodialam, T.V. Lakshman, Dimitri Stiliadis (Bell-Labs)
Linear Models for Classification
Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs Author: Chad R. Meiners, Alex X. Liu, and Eric Torng Publisher: 2012 IEEE/ACM.
Computer Science 1 Systematic Structural Testing of Firewall Policies JeeHyun Hwang 1, Tao Xie 1, Fei Chen 2, and Alex Liu 2 North Carolina State University.
1 Approximation algorithms Algorithms and Networks 2015/2016 Hans L. Bodlaender Johan M. M. van Rooij TexPoint fonts used in EMF. Read the TexPoint manual.
1 Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs Author: Chad R. Meiners, Alex X. Liu, and Eric Torng Publisher: IEEE/ACM.
Intro. ANN & Fuzzy Systems Lecture 16. Classification (II): Practical Considerations.
Models of Greedy Algorithms for Graph Problems Sashka Davis, UCSD Russell Impagliazzo, UCSD SIAM SODA 2004.
Ch03-Algorithms 1. Algorithms What is an algorithm? An algorithm is a finite set of precise instructions for performing a computation or for solving a.
Chapter 8 PD-Method and Local Ratio (5) Equivalence This ppt is editored from a ppt of Reuven Bar-Yehuda. Reuven Bar-Yehuda.
Unconstrained Submodular Maximization Moran Feldman The Open University of Israel Based On Maximizing Non-monotone Submodular Functions. Uriel Feige, Vahab.
Design and Analysis of Approximation Algorithms
Image Processing Objectives To understand pixel based image processing
Contents Introduction Bus Power Model Related Works Motivation
Abolfazl Asudeh Azade Nazi Nan Zhang Gautam DaS
Checkpoint Presentation Vas Chellappa Matt Moore
Summary of lectures Introduction to Algorithm Analysis and Design (Chapter 1-3). Lecture Slides Recurrence and Master Theorem (Chapter 4). Lecture Slides.
Haim Kaplan and Uri Zwick
The Power of Two in Consistent Network Updates: Hard Loop Freedom, Easy Flow Migration Klaus-Tycho Förster and Roger Wattenhofer.
The Subset Sum Game Revisited
Yotam Harchol The Hebrew University of Jerusalem, Israel
An Agent-Based Algorithm for Generalized Graph Colorings
Paper Presentation by Bradley Hanna CSCE 715: Network System Security
مقالات إدارية حبيبات القهوة!!!! مبيعات قطاع الأعمال - الأحساء
A new and improved algorithm for online bin packing
Stability Analysis of MNCM Class of Algorithms and two more problems !
Weighted Interval Scheduling
What Color is it?.
Weighted Interval Scheduling
Alan Kuhnle*, Victoria G. Crawford, and My T. Thai
Yotam Harchol The Hebrew University of Jerusalem, Israel
Instructor: Aaron Roth
Lecture 16. Classification (II): Practical Considerations
Presentation transcript:

A Difference Resolution Approach to Compressing Access Control Lists James Daly, Alex Liu, Eric Torng Michigan State University INFOCOM 2013

Motivation Classifiers used for many applications Packet Forwarding Firewalls Quality of Service Classifiers are growing New threats New services

Motivation Classifier compression is an important problem Device imposed rule limits NetScreen-100 allows only 733 rules Simplifies rule management DIFANE [Yu et al. SIGCOMM 2010]

Background F1 F2 Color 1 3 White 1-3 5 1-5 Black F1 F2 Color 2 3 Black 2-4 1-5 Packet: [2, 4]

Classifier Definition Classifier : list of rules Tuple of d intervals over finite, discrete fields Decision (accept, deny, physical port number, etc.) Only first matching rule applies Classifiers equivalent if they give the same result for all inputs F1 F2 Color 1 3 White 1-3 5 1-5 Black F1 F2 Color 2 3 Black 1-3 White 2-4 1-5

Problem Definition Problem Input: classifier Output: smallest equivalent classifier NP-Hard F1 F2 Color 1 3 White 1-3 5 1-5 Black F1 F2 Color 2 3 Black 1-3 White 2-4 1-5 6

Prior Work Redundancy Removal [eg. Liu and Gouda. DBSec 2005] Iterated Strip Rule [Applegate et al. SODA 2007] Only two dimensions Approximation guarantee: O(min(n1/3, Opt1/2)) Firewall Compressor [Liu et al. INFOCOM 2008] Optimal weighted 1-D case Works on higher dimensions

Motivating Example

Dimension Reduction

FC: Fully Solve Each Row X Y Color 2 2-3 Green 5-6 Red 4-8 White 1-9 Black X Y Color 2 2-3 Green 5-6 Red 4-8 White 1-9 Black 4 5 6-7 Blue 3-8 1-4 X Y Color 2 2-3 Green 5-6 Red 4-8 White 1-9 Black 4 5 6-7 Blue 3-8

Diplomat: Identify and Resolve Differences X Y Color 2-3 2 Green

Diplomat: Identify and Resolve Differences X Y Color 2-3 2 Green

Diplomat: Identify and Resolve Differences X Y Color 2-3 2 Green 6-7 4 Blue X Y Color 2-3 2 Green

Diplomat: Identify and Resolve Differences X Y Color 2-3 2 Green 6-7 4 Blue 5-6 1-4 Red 3-8 White 1-9 Black X Y Color 2-3 2 Green 6-7 4 Blue

Higher Dimensions

Diplomat Three parts Base solver for the last row Resolver Scheduler Firewall Compressor for 1D case Diplomat otherwise Resolver Given two rows identify and resolve differences Merge rows together into one Scheduler Find best order to resolve rows

Different Resolvers F1 F2 Color 1 1-5 White 2 5-9 1-2 Black 4 6 8 1-9 1-1 1-5 White 1 6 Black 8

Scheduling Multi-row resolver: greedy schedule Single-row resolver: dynamic programming schedule

Dynamic Schedule Upper Bound Remaining Row 1 2 3 4 1:0 1:1 2:2 2:4 3:1 1:2 2:3 3:2 4:3 2:0 3:0 4:2 4:0 1 2 3 4 Source Row Lower Bound

Results Comparison of Firewall Compressor and Diplomat on 40 real-life classifiers Divided into sets based on size Diplomat requires 30% fewer rules on largest sets 2-D bounds: O(min(n1/3, Opt1/2)) Set Firewall Compressor Diplomat Small 67.4% 67.2% Medium 50.8% 45.7% Large 44.5% 30.2% All 56.1% 50.6% Mean Compression Ratio

Conclusion Diplomat offers significant improvements over Firewall Compressor because it focuses on the differences between rows Results are most pronounced on larger classifiers Can guarantee approximation bound for 2-D classifiers

Questions?