Communication-Efficient Distributed Monitoring of Thresholded Counts Ram Keralapura, UC-Davis Graham Cormode, Bell Labs Jai Ramamirtham, Bell Labs.

Slides:



Advertisements
Similar presentations
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
Advertisements

Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
Adaptive Frequency Counting over Bursty Data Streams Bill Lin, Wai-Shing Ho, Ben Kao and Chun-Kit Chui Form CIDM07.
Efficient Constraint Monitoring Using Adaptive Thresholds Srinivas Kashyap, IBM T. J. Watson Research Center Jeyashankar Ramamirtham, Netcore Solutions.
Pegasus: Precision Hunting for Icebergs and Anomalies in Network Flows Sriharsha Gangam 1, Puneet Sharma 2, Sonia Fahmy 1 1 Purdue University, 2 HP Labs.
SLAW: A Mobility Model for Human Walks Lee et al..
Small-world Overlay P2P Network
Distributed Set-Expression Cardinality Estimation Abhinandan Das (Cornell U.) Sumit Ganguly (I.I.T. Kanpur) Minos Garofalakis (Bell Labs.) Rajeev Rastogi.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
Distributed Algorithms for Secure Multipath Routing
Probabilistic Aggregation in Distributed Networks Ling Huang, Ben Zhao, Anthony Joseph and John Kubiatowicz {hling, ravenben, adj,
Streaming Algorithms for Robust, Real- Time Detection of DDoS Attacks S. Ganguly, M. Garofalakis, R. Rastogi, K. Sabnani Krishan Sabnani Bell Labs Research.
1 In-Network PCA and Anomaly Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis § Michael Jordan* Anthony Joseph* Nina Taft § *UC Berkeley § Intel.
Adaptive Sampling for Sensor Networks Ankur Jain ٭ and Edward Y. Chang University of California, Santa Barbara DMSN 2004.
Self-Correlating Predictive Information Tracking for Large-Scale Production Systems Zhao, Tan, Gong, Gu, Wambolt Presented by: Andrew Hahn.
The Fourth WIM Meeting 1 Active Nearest Neighbor Queries for Moving Objects Jan Kolar, Igor Timko.
Chapter 10: Stream-based Data Management Title: Design, Implementation, and Evaluation of the Linear Road Benchmark on the Stream Processing Core Authors:
What ’ s Hot and What ’ s Not: Tracking Most Frequent Items Dynamically G. Cormode and S. Muthukrishman Rutgers University ACM Principles of Database Systems.
1 Toward Sophisticated Detection With Distributed Triggers Ling Huang* Minos Garofalakis § Joe Hellerstein* Anthony Joseph* Nina Taft § *UC Berkeley §
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
Count / Top-k Continuous Queries on P2P Networks 01/11/2006.
Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Dynamic Localization Control for Mobile Sensor Networks S. Tilak, V. Kolar, N. Abu-Ghazaleh, K. Kang (Computer Science Department, SUNY Binghamton)
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
SIGMOD'061 Energy-Efficient Monitoring of Extreme Values in Sensor Networks Adam Silberstein Kamesh Munagala Jun Yang Duke University.
Models and Issues in Data Streaming Presented By :- Ankur Jain Department of Computer Science 6/23/03 A list of relevant papers is available at
Top-k Monitoring in Wireless Sensor Networks Minji Wu, Jianliang Xu, Xueyan Tang, and Wang-Chien Lee IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,
1 Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking by: Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady ACM CCS '07 Presentation:
Distributed Denial of Service Attack and Prevention Andrew Barkley Quoc Thong Le Gia Matt Dingfield Yashodhan Gokhale.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Business Process Performance Prediction on a Tracked Simulation Model Andrei Solomon, Marin Litoiu– York University.
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Web Cache Replacement Policies: Properties, Limitations and Implications Fabrício Benevenuto, Fernando Duarte, Virgílio Almeida, Jussara Almeida Computer.
Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic Minho Sung Networking & Telecommunications Group College.
New Streaming Algorithms for Fast Detection of Superspreaders Shobha Venkataraman* Joint work with: Dawn Song*, Phillip Gibbons ¶,
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
Searching for Extremes Among Distributed Data Sources with Optimal Probing Zhenyu (Victor) Liu Computer Science Department, UCLA.
Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering Nithya N. Vijayakumar, Beth Plale DDE Lab, Indiana University {nvijayak,
1 EnviroStore: A Cooperative Storage System for Disconnected Operation in Sensor Networks Liqian Luo, Chengdu Huang, Tarek Abdelzaher John Stankovic INFOCOM.
Multi-hop-based Monte Carlo Localization for Mobile Sensor Networks
Distributed Classification in Peer-to-Peer Networks Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi Institute of Computing Technology, Chinese Academy of Sciences.
1 LD-Sketch: A Distributed Sketching Design for Accurate and Scalable Anomaly Detection in Network Data Streams Qun Huang and Patrick P. C. Lee The Chinese.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Energy-Efficient Monitoring of Extreme Values in Sensor Networks Loo, Kin Kong 10 May, 2007.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
1 A Framework for Measuring and Predicting the Impact of Routing Changes Ying Zhang Z. Morley Mao Jia Wang.
Secure In-Network Aggregation for Wireless Sensor Networks
KAIS T On the problem of placing Mobility Anchor Points in Wireless Mesh Networks Lei Wu & Bjorn Lanfeldt, Wireless Mesh Community Networks Workshop, 2006.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
SocialVoD: a Social Feature-based P2P System Wei Chang, and Jie Wu Presenter: En Wang Temple University, PA, USA IEEE ICPP, September, Beijing, China1.
Client Assignment in Content Dissemination Networks for Dynamic Data Shetal Shah Krithi Ramamritham Indian Institute of Technology Bombay Chinya Ravishankar.
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
Security System for KOREN/APII-Testbed
@ Carnegie Mellon Databases 1 Finding Frequent Items in Distributed Data Streams Amit Manjhi V. Shkapenyuk, K. Dhamdhere, C. Olston Carnegie Mellon University.
SCREAM: Sketch Resource Allocation for Software-defined Measurement Masoud Moshref, Minlan Yu, Ramesh Govindan, Amin Vahdat (CoNEXT’15)
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
Plethora: A Locality Enhancing Peer-to-Peer Network Ronaldo Alves Ferreira Advisor: Ananth Grama Co-advisor: Suresh Jagannathan Department of Computer.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
Continuous Monitoring of Distributed Data Streams over a Time-based Sliding Window MADALGO – Center for Massive Data Algorithmics, a Center of the Danish.
Constant Time Updates in Hierarchical Heavy Hitters
SLAW: A Mobility Model for Human Walks
Distributed Network Traffic Feature Extraction for a Real-time IDS
CHAPTER 3 Architectures for Distributed Systems
Introduction to Wireless Sensor Networks
Plethora: Infrastructure and System Design
Constant Time Updates in Hierarchical Heavy Hitters
Lu Tang , Qun Huang, Patrick P. C. Lee
Presentation transcript:

Communication-Efficient Distributed Monitoring of Thresholded Counts Ram Keralapura, UC-Davis Graham Cormode, Bell Labs Jai Ramamirtham, Bell Labs

June 28, 2006 Ram Keralapura, UCDavis 2 Introduction Monitoring is critical to managing distributed networked systems Main challenges:  Continuous  Distributed  Resource-constrained environments

June 28, 2006 Ram Keralapura, UCDavis 3 Thresholded Counts New fundamental class of problems “Tracking counts for an event beyond a given threshold value with user-specified accuracy” Motivating scenarios:  Total # of connections to a server when it exceeds the normal operational condition (ex, DDoS attacks)  Total traffic to a particular destination prefix when it exceeds the pre-defined limit  Tracking the total number of cars on a highway

June 28, 2006 Ram Keralapura, UCDavis 4 Thresholded Counts (cont’d) Two key properties  Threshold value  User specified tracking accuracy

June 28, 2006 Ram Keralapura, UCDavis 5 System Architecture Remote Site 1 Remote Site m Remote Site 2 Remote Site i Coordinator Site (Central Node) remote sites (or monitors) and a coordinator site (or central node) m Non-continuous updates Local thresholds at remote sites Counts can be positive, negative, or fractional Ignore network delays and losses

June 28, 2006 Ram Keralapura, UCDavis 6 Every remote monitor, maintains a set of local thresholds: Local count at monitor, should always lie between two neighboring thresholds Global estimate at the central node: Approach ii

June 28, 2006 Ram Keralapura, UCDavis 7 Approach (cont’d) Maximum error in the global estimate should satisfy: Two methods to set local thresholds  Static thresholding  Adaptive thresholding

June 28, 2006 Ram Keralapura, UCDavis 8 Static Thresholding Problem: For given values and, we have to determine such that, T  ),0[,,  jt ji

Uniform Proportional Monitor-1 Monitor-2 Monitor-3 Central Node Blended threshold assignment T  Max error = N 

June 28, 2006 Ram Keralapura, UCDavis 10 Static Thresholding (cont’d) Blended threshold assignment   uniform threshold assignment   proportional threshold assignment Complexity: 0  1 

June 28, 2006 Ram Keralapura, UCDavis 11 Adaptive Thresholding Every monitor maintains only two threshold values: and Problem: For given values and, and a threshold violation from monitor, determine for all the monitors such that, T  k iH t

Slack Monitor-1Monitor-2Monitor-3 Central Node Monitor-1Monitor-2Monitor-3 Central Node TN)1( ˆ  TN)1( ˆ  Basic Adaptive Algorithm

June 28, 2006 Ram Keralapura, UCDavis 13 Experimental Setup Built a simulator with monitoring nodes and a central node Implemented all the static and adaptive algorithms Data set: Public traces from NLANR m

June 28, 2006 Ram Keralapura, UCDavis 14 Count Accuracy

June 28, 2006 Ram Keralapura, UCDavis 15 Validating the Theoretical Model

June 28, 2006 Ram Keralapura, UCDavis 16 Comparing Costs – Static and Adaptive Cases

June 28, 2006 Ram Keralapura, UCDavis 17 Related Work Top-k monitoring [Babcock et al] Heavy-hitter definition Adaptive filters for continuous queries [Olston et al]  Distributed continuous queries but does not address the thresholded counts problem Distributed triggers [Jain et al]  Simplified version of the thresholded counts problem  Randomized algorithms with statistical guarantees Geometric approach for threshold functions [Sharfman et al]  Focus is mainly on non-linear functions

June 28, 2006 Ram Keralapura, UCDavis 18 Summary We defined a fundamental class of problems called “Thresholded Counts” We proposed algorithms to address the problem – static and adaptive Analyzed the complexities of these algorithms and provided proofs Using experiments, we showed the effectiveness of our algorithms

June 28, 2006 Ram Keralapura, UCDavis 19 Future Work Building the monitoring system for real networks to explore the practical aspects of our framework  Sensor networks  IP network monitoring Address scalability issues  For example, hierarchical monitoring architecture Extend for different query types with thresholded nature  For example, arithmetic combinations

June 28, 2006 Ram Keralapura, UCDavis 20 Thank you!! Questions?? Contact: