{"id":"https://openalex.org/W4417337752","doi":"https://doi.org/10.1109/ton.2025.3644238","title":"Efficient Lightweight Coordinated Sampling for Dynamic Flows: Theory and Implementation","display_name":"Efficient Lightweight Coordinated Sampling for Dynamic Flows: Theory and Implementation","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W4417337752","doi":"https://doi.org/10.1109/ton.2025.3644238"},"language":null,"primary_location":{"id":"doi:10.1109/ton.2025.3644238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2025.3644238","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089673429","display_name":"M.J. Chen","orcid":"https://orcid.org/0000-0001-9595-770X"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mingming Chen","raw_affiliation_strings":["Department of Computer Science, Kansas State University, Manhattan, KS, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kansas State University, Manhattan, KS, USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073465096","display_name":"Thomas La Porta","orcid":"https://orcid.org/0000-0003-1295-4461"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thomas F. La Porta","raw_affiliation_strings":["Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055045569","display_name":"Trent Jaeger","orcid":"https://orcid.org/0000-0002-4964-1170"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Trent Jaeger","raw_affiliation_strings":["Department of Computer Science and Engineering, University of California, Riverside, Riverside, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of California, Riverside, Riverside, CA, USA","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086268637","display_name":"Srikanth V. Krishnamurthy","orcid":"https://orcid.org/0000-0002-6533-4381"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Srikanth V. Krishnamurthy","raw_affiliation_strings":["Department of Computer Science and Engineering, University of California, Riverside, Riverside, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, University of California, Riverside, Riverside, CA, USA","institution_ids":["https://openalex.org/I103635307"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5089673429"],"corresponding_institution_ids":["https://openalex.org/I189590672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44309539,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"34","issue":null,"first_page":"2287","last_page":"2302"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.7652000188827515,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.7652000188827515,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.1151999980211258,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.0357000008225441,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sampling","display_name":"Sampling (signal processing)","score":0.7422999739646912},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5562000274658203},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.48410001397132874},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47859999537467957},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.4708999991416931},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4097999930381775},{"id":"https://openalex.org/keywords/adaptive-sampling","display_name":"Adaptive sampling","score":0.4025999903678894}],"concepts":[{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.7422999739646912},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6924999952316284},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5562000274658203},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.519599974155426},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.48410001397132874},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47859999537467957},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.4708999991416931},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4097999930381775},{"id":"https://openalex.org/C2781395549","wikidata":"https://www.wikidata.org/wiki/Q4680762","display_name":"Adaptive sampling","level":3,"score":0.4025999903678894},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39079999923706055},{"id":"https://openalex.org/C51823790","wikidata":"https://www.wikidata.org/wiki/Q504353","display_name":"Greedy algorithm","level":2,"score":0.3799000084400177},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.3630000054836273},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.3603000044822693},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3522000014781952},{"id":"https://openalex.org/C52740198","wikidata":"https://www.wikidata.org/wiki/Q1539564","display_name":"Importance sampling","level":3,"score":0.2946999967098236},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.288100004196167},{"id":"https://openalex.org/C2986012078","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling interval","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.2669000029563904},{"id":"https://openalex.org/C170593435","wikidata":"https://www.wikidata.org/wiki/Q4128565","display_name":"Slice sampling","level":4,"score":0.26510000228881836},{"id":"https://openalex.org/C82152865","wikidata":"https://www.wikidata.org/wiki/Q7208505","display_name":"Poisson sampling","level":5,"score":0.25949999690055847}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ton.2025.3644238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2025.3644238","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8000996158","display_name":null,"funder_award_id":"W911NF-13-2-0045","funder_id":"https://openalex.org/F4320338456","funder_display_name":"DEVCOM Army Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320338456","display_name":"DEVCOM Army Research Laboratory","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W2611328","https://openalex.org/W1957146688","https://openalex.org/W1983860569","https://openalex.org/W1994926493","https://openalex.org/W1995995106","https://openalex.org/W1999049191","https://openalex.org/W2017524370","https://openalex.org/W2035395818","https://openalex.org/W2064574391","https://openalex.org/W2070670160","https://openalex.org/W2076680677","https://openalex.org/W2080379754","https://openalex.org/W2098281668","https://openalex.org/W2127455097","https://openalex.org/W2153987726","https://openalex.org/W2338293612","https://openalex.org/W2487095677","https://openalex.org/W2593720592","https://openalex.org/W2613070411","https://openalex.org/W2734887759","https://openalex.org/W2768553818","https://openalex.org/W2784153182","https://openalex.org/W2898218143","https://openalex.org/W2900975033","https://openalex.org/W2911430275","https://openalex.org/W2913095643","https://openalex.org/W2918214171","https://openalex.org/W3002749125","https://openalex.org/W3046981145","https://openalex.org/W3106796450","https://openalex.org/W3154256047","https://openalex.org/W3196328488","https://openalex.org/W4206780782","https://openalex.org/W4283208787","https://openalex.org/W4381946560","https://openalex.org/W4401751719"],"related_works":[],"abstract_inverted_index":{"As":[0],"cyber-attacks":[1],"on":[2,9,115,134,218],"networks":[3,189],"become":[4],"stealthier,":[5],"monitoring":[6],"techniques":[7],"relying":[8],"low-rate":[10],"packet":[11],"sampling":[12,30,49,59,84,88,97,132,147,174,183,198],"may":[13],"prove":[14],"insufficient":[15],"to":[16,35,46,62,94],"detect":[17],"attacks.":[18],"While":[19],"various":[20],"methods,":[21],"such":[22],"as":[23,201],"truncating":[24],"packets,":[25],"flow-based":[26],"sampling,":[27],"and":[28,39,53,68,90,123,138,159,193],"adaptive":[29],"rates,":[31],"have":[32],"been":[33],"proposed":[34],"enhance":[36],"detection":[37],"rates":[38,55],"ease":[40],"capability":[41],"limitations,":[42],"it":[43],"remains":[44],"challenging":[45],"perform":[47],"sufficient":[48],"at":[50,56],"line":[51],"speed":[52],"high":[54],"a":[57,79,130],"single":[58],"point":[60,199],"due":[61],"limited":[63],"CPU":[64],"or":[65],"bandwidth":[66],"capacity":[67],"fluctuating":[69],"network":[70,157],"traffic.":[71],"To":[72],"address":[73],"these":[74],"challenges,":[75],"we":[76],"propose":[77],"CoordSamp,":[78],"system":[80,213],"that":[81,118,140,190],"distributes":[82],"the":[83,99,126,141],"workload":[85],"across":[86],"multiple":[87,135,146],"points":[89,148],"coordinates":[91],"their":[92],"actions":[93],"avoid":[95],"duplicate":[96,153],"of":[98,173,182],"same":[100],"packet.":[101],"This":[102],"design":[103],"enables":[104],"scalable,":[105],"resource-aware":[106],"monitoring\u2014particularly":[107],"suited":[108],"for":[109,149],"dynamic,":[110],"agentless":[111],"cloud-based":[112],"environments\u2014relying":[113],"solely":[114],"network-level":[116],"deployment":[117,186],"can":[119],"be":[120],"dynamically":[121],"assigned":[122],"adjusted":[124],"by":[125],"provider.":[127],"We":[128,196],"develop":[129],"coordinated":[131],"algorithm":[133,142],"P4-programmable":[136],"switches":[137],"show":[139],"ensures":[143],"coordination":[144],"among":[145],"each":[150],"flow,":[151],"preventing":[152],"samples,":[154],"with":[155],"negligible":[156],"overhead":[158],"real-time":[160],"configurability.":[161],"At":[162],"its":[163],"core,":[164],"CoordSamp":[165],"separates":[166],"<italic":[167,176],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[168,177],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">offline":[169],"placement</i>\u2014the":[170],"budgeted":[171,202],"selection":[172],"points\u2014from":[175],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">online":[178],"allocation</i>\u2014the":[179],"capacity-aware":[180],"assignment":[181],"tasks\u2014allowing":[184],"practical":[185],"in":[187,209],"hybrid":[188],"combine":[191],"programmable":[192],"legacy":[194],"switches.":[195],"formulate":[197],"placement":[200,220],"maximum":[203],"multi-coverage":[204],"problems,":[205],"solving":[206],"them":[207],"optimally":[208],"pseudo-polynomial":[210],"time.":[211],"Our":[212],"far":[214],"outperforms":[215],"those":[216],"based":[217],"greedy":[219],"along":[221],"many":[222],"key":[223],"dimensions.":[224]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-15T00:00:00"}
