CCR Papers from April 2016

Find a CCR issue:
  • Olivier Bonaventure
    As announced in the previous issue, this is the last issue of Computer Communication Review to be printed on paper. It could become a collector in a few years, so keep it in a safe place once you've read it of course. 
     
    Starting from the July 2016 issue, CCR will only be available online. The papers will be archived on the ACM Digital Library. They will also be posted on http://www.sigcomm.org. We are exploring other delivery methods to improve your online reading experience. We hope that having an online publication will allow us to better serve the community.
     
    This issue contains three technical contributions and two editorials. “On the Interplay of Link-Flooding Attacks and Traffic Engineering” discusses a specific type of denial of service attack where an attacker tries to disconnect some targets by overloading key links in their target’s neighborhood. “Attacking NTP's Authenticated Broadcast Mode” analyses the security problems that can occur when the Network Time Protocol (NTP) is used in broadcast mode. “Paxos Made Switch-y” proposes an implementation of the Paxos distributed consensus protocol in P4. The first editorial, “Global Measurements: Practice and Experience (Report on Dagstuhl Seminar #16012)” summarizes the lessons learned from a recent workshop on global Internet measurements. The second editorial, “Towards Considering Relationships between Values and Networks” looks at the interactions between human rights and the technology that we develop. It reminds us that when we decide to carry out research on a given topic, our research results may have a broader impact than simply a series of papers published in conference proceedings, journals or online libraries. Some of our work can influence, in one direction or another, the evolution of our society and some of our design choices may have a huge impact in the long term. I encourage you to read this editorial and then take some time to think about your ongoing work and the impact that it could have on values such as human 
     
    Repeatability, Replicability & Reproducibility 
     
    Scientific papers such as those published in CCR are expected to contain enough information to allow other researchers to obtain similar results. This is what differentiates scientific publications to blog posts or articles that appear in trade magazines.
     
    In practice, for experimental papers, describing all the experiments in enough details to ensure that they can be completely reproduced can be challenging given our page limits. 
     
    The ACM publications board has recently discussed this problem and came up with an interesting classification that applies to experimental papers. This classification provides a precise definition for three words: Repeatability, Replicability and Reproducibility that could be considered as synonyms by nonnative English speakers like me.
     
    The first level is Repeatability. A measurement described in an article is considered to be repeatable if the same team can obtain the same results with the same setup in multiple trials. For an experimental paper, this implies that the software used for the experiment produces the same results multiple times. This is the basic level and we expect that all CCR papers are repeatable. 
     
    The second level is Replicability. An article is considered to be replicable if a different team than the authors of the paper can obtain the same results as those stated in the paper by using the same software, datasets, etc. as those used for the paper. Replication of research results is obviously facilitated if the artifacts used to write the paper are available. The ACM Digital Library provides a permanent storage for all the papers published in CCR and our conferences. In addition to storing pdf versions of the articles and the associated metadata, it is now possible to associate artifacts to each published article. These artifacts contain additional material related to the article such as datasets, proofs for some theorems, multimedia sequences, software (source code or binaries), … These artifacts are important to ease the replication and the reproduction of our published research results. Some papers already include links to author's web pages for some of these artifacts. However, these links are rarely permanent and they often disappear after a few months or years. Starting with this issue of CCR, the authors of accepted papers will be encouraged to provide artifacts that will be linked to the paper in the ACM Digital Library. Two papers published in this issue already provide such artifacts. 
     
    The third level is Reproducibility. An article is considered to be reproducible if an independent group can implement the solution described in a paper and obtain similar results as those described in the paper without using the paper's artifacts. Reproducing an experimental paper is not a simple job since it often requires an engineering effort to implement the software used for all experiments. However, it is a very important step in the validation of new scientific results. As a community, we do not frequently encourage the reproduction of previous articles since we usually focus on original results. I believe that we could also learn a lot from articles that reproduce important results. I hope that future CCR issues will contain such papers. 
     
    Last year’s reviewers 
     
    CCR heavily depends on reviewers who agree to spend time to comment submitted papers. Their feedback is often very detailed and it clearly contributes to the quality of the papers that you read. While preparing this editorial, I checked the submission site and found that last year 150 members of our community agreed to review one or more papers for CCR: Cedric Adjih, Mohamed Ahmed, Mark Allman, Luigi Atzori, Brice Augustuin, Ihsan Ayyub Qazi, Jingwen Bai, Aruna Balasubramanian, Nicola Baldo, Sujata Banerjee, Theophilus Benson, Robert Beverly, Nevil Brownlee, Ed Bugnion, Giovanna Carofiglio, Antonio Carzaniga, Pedro Casas, Kai Chen, Chih-Chuan Cheng, David Choffnes, Antonio Cianfrani, Jon Crowcroft, Italo Cunha, Alberto Dainotti, Lara Deek, Shuo Deng, Luca Deri, Xenofontas Dimitropoulos, Ning Ding, Yongsheng Ding, Nandita Dukkipati, Alessandro Finamore, Davide Frey, Timur Friedman, Xinwen Fu, Erol Gelenbe, Aaron Gember-Jacobson, Minas Gjoka, Lukasz Golab, Andrea Goldsmith, Sergey Gorbunov, Tim Griffin, Arjun Guha, Saikat Guha, Deniz Gunduz, Chuanxiong Guo, Berk Gurakan, Gonna Gursun, Hamed Haddadi, Emir Halepovic, Sangjin Han, David Hay, Oliver Hohlfeld, Shengchun Huang, Asim Jamshed, R.C. Jin, Abdul Kabbani, Michalis Kallitsis, Naga Katta, Ethan Katz-Bassett, Eric Keller, Manjur Kolhar, Balachander Krishnamurthy, Kun Tan, Mirja Kuhlewind, Anh Le, Jungwoo Lee, Zhenhua Liu, Matthew Luckie, Sajjad Ahmad Madani, Olaf Maennel, John Maheswaran, Petri Mahonen, Saverio Mascolo, Deepak Merugu, Jelena Mirkovic, Vishal Misra, Radhika Mittal, Tal Mizrahi, Amitav Mukherjee, Dragos Niculescu, Nick Nikiforakis, Dave Oran, Chiara Orsini, Patrick P. C. Lee, Christos Papadopoulos, Dimitris Papadopoulos, Craig Partridge, Peter Peresini, Ben Pfaff, Guillaume Pierre, David Plonka, Ingmar Poese, Lucian Popa, Ihsan Qazi, Zafar Qazi, Feng Qian, Costin Raiciu, Bhaskaran Raman, Fernando Ramos, Ashwin Rao, Ravishankar Ravindran, Mark Reitblatt, James Roberts, Franziska Roesner, Dario Rossi, Michele Rossi, Mario Sanchez, Stuart Schechter, Fabian Schneider, Julius Schulz-Zander, Sayandeep Sen, Soumya Sen, Zubair Shafiq, Craig Shue, Georgos Siganos, Georgios Smaragdakis, Joel Sommers, Alex Sprintson, Stephen Strowes, Srikanth Sundaresan, Muhammad Talha Naeem Qureshi, Vamsi Talla, Boon Thau Loo, Brian Trammel, Martino Trevisan, Narseo Vallina-Rodriguez, Roland van Rijswijk-Deij, Matteo Varvello, Aravindan Vijayaraghavan, Stefano Vissicchio, Ashish Vulimiri, Mythili Vutukuru, Nick Weaver, Michael Welzl, James Westall, Erik Wilde, Walter Willinger, Craig Wills, Rolf Winter, Bernard Wong, Wenfei Wu, Matthias Wählisch, Di Xie, Teck Yoong Chai, Yan Zhang and Haitao Zhao. 
     
    As you can see from this list, producing CCR relies on the efforts of a large number of members of our community. Our Associate Editors selected these reviewers. They usually serve for a period of three years. Dr. Hitesh Ballani has finished his tenure. I would like to thank him for all the efforts he put in handling CCR papers and I welcome Prof. Costin Raiciu from University Politehnica of Bucharest (Romania) who joins our Editorial board.
     
  • Dimitrios Gkounis, Vasileios Kotronis, Christos Liaskos, Xenofontas Dimitropoulos

    Link-flooding attacks have the potential to disconnect even entire countries from the Internet. Moreover, newly proposed indirect link-flooding attacks, such as “Crossfire”, are extremely hard to expose and, subsequently, mitigate effectively. Traffic Engineering (TE) is the network’s natural way of mitigating link overload events, balancing the load and restoring connectivity. This work poses the question: Do we need a new kind of TE to expose an attack as well? The key idea is that a carefully crafted, attack-aware TE could force the attacker to follow improbable traffic patterns, revealing his target and his identity over time. We show that both existing and novel TE modules can efficiently expose the attack, and study the benefits of each approach. We implement defense prototypes using simulation mechanisms and evaluate them extensively on multiple real topologies.

    Katerina Argyraki
  • Aanchal Malhotra, Sharon Goldberg

    We identify two attacks on the Network Time Protocol (NTP)’s cryptographically-authenticated broadcast mode. First, we present a replay attack that allows an on-path attacker to indefinitely stick a broadcast client to a specific time. Second, we present a denial-of-service (DoS) attack that allows an off-path attacker to prevent a broadcast client from ever updating its system clock; to do this, the attacker sends the client a single malformed broadcast packet per query interval. Our DoS attack also applies to all other NTP modes that are ‘ephemeral’ or ‘preemptable’ (including manycast, pool, etc). We then use network measurements to give evidence that NTP’s broadcast and other ephemeral/preemptable modes are being used in the wild. We conclude by discussing why NTP’s current implementation of symmetric-key cryptographic authentication does not provide security in broadcast mode, and make some recommendations to improve the current state of affairs.

    Alberto Dainotti
  • Huynh Tu Dang, Marco Canini, Fernando Pedone, Robert Soulé

    The Paxos protocol is the foundation for building many fault-tolerant distributed systems and services. This paper posits that there are significant performance benefits to be gained by implementing Paxos logic in network devices. Until recently, the notion of a switchbased implementation of Paxos would be a daydream. However, new flexible hardware is on the horizon that will provide customizable packet processing pipelines needed to implement Paxos. While this new hardware is still not readily available, several vendors and consortia have made the programming languages that target these devices public. This paper describes an implementation of Paxos in one of those languages, P4. Implementing Paxos provides a critical use case for P4, and will help drive the requirements for data plane languages in general. In the long term, we imagine that consensus could someday be offered as a network service, just as point-to-point communication is provided today.

    Matteo Varvello
  • Carsten Orwat, Roland Bless

    Many technical systems of the Information and Communication Technology (ICT) sector enable, structure and/or constrain social interactions. Thereby, they influence or implement certain values, including human rights, and affect or raise conflicts among values. The ongoing developments toward an “Internet of everything” is likely to lead to further value conflicts. This trend illustrates that a better understanding of the relationships between social values and networks is urgently needed because it is largely unknown what values lie behind protocols, design principles, or technical and organizational options of the Internet. This paper focuses on the complex steps of realizing human rights in Internet architectures and protocols as well as in Internetbased products and services. Besides direct implementation of values in Internet protocols, there are several other options that can indirectly contribute to realizing human rights via political processes and market choices. Eventually, a better understanding of what values can be realized by networks in general, what technical measures may affect certain values, and where complementary institutional developments are needed may lead toward a methodology for considering technical and institutional systems together.

  • Vaibhav Bajpai, Arthur W. Berger, Philip Eardley, Jörg Ott, Jürgen Schönwälder

    This article summarises a 2.5 day long Dagstuhl seminar on Global Measurements: Practice and Experience held in January 2016. This seminar was a followup of the seminar on Global Measurement Frameworks held in 2013, which focused on the development of global Internet measurement platforms and associated metrics. The second seminar aimed at discussing the practical experience gained with building these global Internet measurement platforms. It brought together people who are actively involved in the design and maintenance of global Internet measurement platforms and who do research on the data delivered by such platforms. Researchers in this seminar have used data derived from global Internet measurement platforms in order to manage networks or services or as input for regulatory decisions. The entire set of presentations delivered during the seminar is made publicly available at [1].

  • Aditya Akella

    Dear students: This edition of the Student Mentoring Column focuses on various testbeds (for wired networking researching) and datasets. The questions below don't provide comprehensive coverage of either topic; as such, we may revisit them in future editions. I also hope to talk about wireless testbeds and datasets in a future column.
    I got plenty of help in preparing this edition. In particlar, many thanks to Aaron Gember-Jacobson (UW-Madison), Brighten Godfrey (UIUC), Ethan Katz-Bassett (USC), and Vyas Sekar (CMU).

Syndicate content