Monitorability Bounds via Expander, Sparsifier and Random Walks - The Interplay Between On-Demand Monitoring and Anonymity (Extendend Abstract)

نویسندگان

  • Shlomi Dolev
  • Daniel Khankin
چکیده

Software-defined networking (SDN), network functions virtualization (NFV) and network virtualization (NV) build a mini-cosmos inside data-centers, cloud providers and enterprises. The network virtualization allows new on-demand management capabilities, in this work we demonstrate such a service, namely, on-demand efficient monitoring or anonymity. The proposed service is based on network virtualization of expanders or sparsifiers over the physical network. The defined virtual (or overlay) communication graphs coupled with a multi-hop extension of Valiant randomization based routing lets us monitor the entire traffic in the network, with a very few monitoring nodes. In particular, we show that using overlay network with expansion properties and Valiant randomized load balancing it is enough to place O(m) monitor nodes when the length of the overlay path (number of intermediate nodes chosen by Valiant’s routing procedure) is O(n/m). We propose two randomized routing methods to implement policies for sending messages, and we show that they facilitate efficient monitoring of the entire traffic, while avoiding traffic bottlenecks. We show that the traffic is distributed uniformly in the network and each monitor has equiprobable view of the network flow such that there is no preferable vertex for monitor location. In terms of complex networks, our result can be interpreted as a way to enforce the same betweenness centrality to all nodes in the network. Beyond on-demand monitoring, we have identified that our results are useful in serving the somewhat complement application, namely anonymity. Thus, we propose monitoring or anonymity services, which can be deployed and shut down on-demand. Our work is the first, as far as we know, to bring such on-demand infrastructure structuring using the cloud NV capability to existing monitoring or anonymity networks. Incorporating recent technological advances in networking in order to provide dynamic setup and reconfigurations of network topology for monitoring or anonymity services. We propose methods to theoretically improve services provided by existing anonymity networks, and optimize the degree of anonymity, in addition providing robustness and reliability to system usage and security. At last, we believe that, our constructions of overlay expanders and sparsifiers weighted network, that use several random walk trees are of independent interest.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Disjoint Paths in Expander Graphs via Random Walks: A Short Survey

There has been a significant amount of research lately on solving the edge disjoint path and related problems on expander graphs. We review the random walk approach of Broder, Frieze and Upfal.

متن کامل

Random and Pseudo-Random Walks on Graphs

Random walks on graphs have turned out to be a powerful tool in the design of algorithms and other applications. In particular, expander graphs, which are graphs on which random walks have particularly good properties, are extremely useful in complexity and other areas of computer science. In this chapter we study random walks on general regular graphs, leading to a the randomized logspace algo...

متن کامل

Random and Pseudo-Random Walks on Graphs

Random walks on graphs have turned out to be a powerful tool in the design of algorithms and other applications. In particular, expander graphs, which are graphs on which random walks have particularly good properties, are extremely useful in complexity and other areas of computer science. In this chapter we will study random walks on general graphs, leading to a the randomized logspace algorit...

متن کامل

Walks , and Expander Graphs

I have three goals for this lecture. The first is to introduce one of the most important familes of graphs: expander graphs. They are the source of much combinatorial power, and the counterexample to numerous conjectures. We will become acquainted with these graphs by examining random walks on them. To facilitate the analysis of random walks, we will examine these graphs through their adjacency...

متن کامل

t-Particle Random Walks and Recycling Random Bits in Parallel

We show that r pseudo-random bits can be obtained by concatenating t blocks of r=t pseudo-random bits, where the blocks are generated in parallel. This can be considered as a parallel version of 8] { recycling random bits by doing a random walk on an expander. The proof is based on the fact that t simultaneous independent random walks on an expander graph is equivalent to a random walk on a muc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017