faaShark: An End-to-End Network Traffic Analysis System Atop Serverless Computing

被引:2
|
作者
Zhao, Hongyu [1 ]
Pan, Shanxing [1 ]
Cai, Zinuo [1 ]
Chen, Xinglei [1 ]
Jin, Lingxiao [1 ]
Gao, Honghao [2 ]
Wan, Shaohua [3 ]
Ma, Ruhui [1 ]
Guan, Haibing [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] Shanghai Univ, Sch Comp Engn & Sci, Shanghai 200444, Peoples R China
[3] Univ Elect Sci & Technol China, Shenzhen Inst Adv Study, Shenzhen 610054, Peoples R China
关键词
Network traffic analysis; cloud computing; serverless computing; distributed training; cold start;
D O I
10.1109/TNSE.2023.3294406
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The prosperity of the Internet has made network traffic analysis increasingly indispensable in network operation. With the development of machine learning, more researchers and engineers are using deep learning models for network traffic analysis. However, the rapidly growing data size and model complexity make resource scheduling a serious limitation, which is why cloud computing services are typically required for network analysis. To leverage the advantages of serverless platforms, we propose faaShark, an end-to-end network traffic analysis system based on a serverless computing platform. faaShark adapts distributed training to fully utilize the flexibility of serverless platforms. Additionally, we design a cold start optimization algorithm to reduce the hit rate of cold start when serving pretrained models to handle network analysis requests. Our extensive experiments evaluate the impact of several parameters of distributed training and confirm the effectiveness of our cold start optimization algorithm when building such a network analysis system atop serverless computing frameworks.
引用
收藏
页码:2473 / 2484
页数:12
相关论文
共 50 条
  • [21] End-to-End Mobile Network Slice Embedding Leveraging Edge Computing
    Fendt, Andrea
    Mannweiler, Christian
    Ludwig, Katja
    Schmelz, Lars Christoph
    Bauer, Bernhard
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [22] AXNet: ApproXimate computing using an end-to-end trainable neural network
    Peng, Zhenghao
    Chen, Xuyang
    Xu, Chengwen
    Jing, Naifeng
    Liang, Xiaoyao
    Lu, Cewu
    Jiang, Li
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [23] End-to-end programmable computing systems
    Yao Xiao
    Guixiang Ma
    Nesreen K. Ahmed
    Mihai Capotă
    Theodore L. Willke
    Shahin Nazarian
    Paul Bogdan
    Communications Engineering, 2 (1):
  • [24] End-to-End Network Traffic Reconstruction Via Network Tomography Based on Compressive Sensing
    Nie, Laisen
    Jiang, Dingde
    Guo, Lei
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2015, 23 (03) : 709 - 730
  • [25] End-to-End Network Traffic Reconstruction Via Network Tomography Based on Compressive Sensing
    Laisen Nie
    Dingde Jiang
    Lei Guo
    Journal of Network and Systems Management, 2015, 23 : 709 - 730
  • [26] An end-to-end administrative document analysis system
    Hamza, Hatem
    Belaid, Yolande
    Belaid, Abdel
    Chaudhuri, Bidyut B.
    PROCEEDINGS OF THE 8TH IAPR INTERNATIONAL WORKSHOP ON DOCUMENT ANALYSIS SYSTEMS, 2008, : 175 - 182
  • [27] Network analysis on Skype end-to-end video quality
    Exarchakos, George
    Druda, Luca
    Menkovski, Vlado
    Liotta, Antonio
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2015, 11 (01) : 17 - +
  • [28] Deterministic end-to-end delay analysis in an avionics network
    Zhou, Hairui
    Li, Jian
    Hu, Chengchen
    Ji, Xiaoqiang
    He, Lina
    Hu, Fei
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART G-JOURNAL OF AEROSPACE ENGINEERING, 2013, 227 (10) : 1583 - 1595
  • [29] On exploiting long range dependence of network traffic in measuring cross traffic on an end-to-end basis
    He, GH
    Hou, JC
    IEEE INFOCOM 2003: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2003, : 1858 - 1868
  • [30] End-to-end encrypted network traffic classification method based on deep learning
    Tian S.
    Gong F.
    Mo S.
    Li M.
    Wu W.
    Xiao D.
    Journal of China Universities of Posts and Telecommunications, 2020, 27 (03): : 21 - 30