Anat Bremler-Barr: Publications

See also: [ Google Scholar | DBLP | IEEE | ACM ].

Referred Conferences:

  1. Shir Landau Feibish, Yehuda Afek, Anat Bremler-Barr, Edith Cohen, Michal Shagam, "Mitigating DNS random subdomain DDoS attacks by distinct heavy Hitters sketches". HotWeb 2017 [technical report ][abstract]

  2. Anat Bremler-Barr, David Hay, Idan Moyal, and Liron Schiff, "Load Balancing Memcached Traffic Using Software Defined Networking". IFIP Networking 2017
    [pdf][slides][abstract]
  3. Anat Bremler-Barr, Eli Broshþ, Mor Sides, "DDoS Attack on Cloud Auto-scaling Mechanisms". in INFOCOM 2017
    [pdf][slides][abstract]
  4. Yehuda Afek, Anat Bremler-Barr, Lior Shafir, "Network Anti-Spoofing with SDN Data plane". in INFOCOM 2017
    [pdf][slides][technical report][abstract]
  5. Anat Bremler-Barr, Yotam Harchol, David Hay, "OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions", in SIGCOMM, August 2016
    [pdf][slides][abstract]
  6. Anat Bremler-Barr, Yotam Harchol, David Hay, Yacov Hel-Or, "Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications", in SPAA, July 2016
    [pdf][slides][technical report][abstract]
  7. Anat Bremler-Barr, David Hay, Daniel Krauthgamer, Shimrit Tzur David, "Scalable URL Matching with Small Memory Footprint", in IFIP Networking, May 2016
    [pdf][slides][abstract]
  8. Alon Atari, Anat Bremler-Barr, "Efficient Round-Trip Time Monitoring in OpenFlow Networks", in INFOCOM, April 2016
    [pdf][slides][abstract]
  9. Netanel Cohen, Anat Bremler-Barr, "Graph-based Cloud Resource Cleanup", in ACM SoCC Poster Session, August 2015
    [poster]
  10. Mor Sides, Anat Bremler-Barr, Elisha Rosensweig, "Yo-Yo Attack - Vulnerability in auto-scaling mechanism", in ACM SIGCOMM Poster Session, August 2015
    [pdf] [poster]
  11. Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schiff, "Sampling and Large Flow Detection in SDN", in ACM SIGCOMM Poster Session, August 2015
    [pdf] [poster]
  12. Anat Bremler-Barr, Yotam Harchol, David Hay, "OpenBox: Enabling Innovation in Middlebox Applications", in ACM SIGCOMM HotMiddleboxes, August 2015
    [pdf][slides][abstract]
  13. Anat Bremler-Barr, Yotam Harchol, David Hay, Yacov Hel-Or, "Ultra-Fast Similarity Search Using Ternary Content Addressable Memory", in ACM DaMoN, June 2015
    [pdf][slides][abstract]
  14. Yehuda Afek, Anat Bremler-Barr, and Liron Schiff, "ORange: Multi field openflow based range classifier", in ACM/IEEE ANCS, May 2015
    [pdf][slides][abstract]
  15. Michela Becchi, Anat Bremler-Barr, David Hay, Omer Kochba, Yaron Koral, "Accelerating Regular Expression Matching Over Compressed HTTP". In IEEE INFOCOM, April 2015
    [pdf][slides][abstract]
  16. Anat Bremler-Barr, Shimrit Tzur David, Yotam Harchol, David Hay, "Leveraging Traffic Repetitions for High-Speed Deep Packet Inspection". In IEEE INFOCOM, April 2015
    [pdf][slides][abstract]
  17. Anat Bremler-Barr, Yotam Harchol, David Hay, Yaron Koral, "Deep Packet Inspection as a Service". in ACM CoNEXT, December 2014
    [pdf][slides][abstract]
  18. Y. Afek, A. Bremler-Barr, S. Landau Feibish, "Automated Signature Extraction for High Volume Attacks", in ANCS 2013 [ppt].

  19. Y. Afek, A. Bremler-Barr, L. Schiff, “Space Efficient Priority Queues: The TCAM Case ",in SPAA 2013 [ppt].

  20. Y. Afek, A. Bremler-Barr, D. Hay, Y. Harchol, Y. Koral, “MCA2: Multi Core Architecture for Mitigating Complexity Attacks ", in ANCS 2012 [ppt].

  21. U. Ben-Porat, A. Bremler-Barr, H. Levy and B. Plattner," On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks ", in Networking 2012

  22. A. Bremler-Barr, S. Tzur-David, D. Hay, Y. Koral," Decompression-Free Inspection: DPI for Shared Dictionary Compression over HTTP ", in IEEE INFOCOM 2012 [ppt]

  23. U. Ben-Porat, Anat Bremler-Barr and Hanoch Levy," Network and Computer Performance in Malicious Environments: The Good, the Bad and the Ugly ", in NETGCoop 2011 [ppt]

  24. A. Bremler-Barr, Y. Koral and V. Zigdon, " Shift-Based Pattern Matching for Compressed Web Traffic ", in IEEE HPSR, 2011 [ppt]

  25. A. Bremler-Barr, Y. Harcol and D.Hay , " Space-time tradeoffs in Software-based Deep Packet Inspection ", in IEEE HPSR, 2011 [ppt]

  26. A. Bremler-Barr, O. Dekel, R. Golschmidt, H. Levy, " Controlling P2P applications via Address Harvesting: the Skype story ", in HOTP2P, 2011 [ppt]

  27. Y. Afek, A. Bremler-Barr, Y. Koral, " Efficient Processing of Multi-Connection Compressed Web Traffic ", in NETWOKING, 2011 [ppt]

  28. A. Bremler-Barr, R. Golschmidt , " On the stability of Skype Super Nodes ", in TMA workshop, 2011 [ppt]

  29. U. Ben-Porat, B. Plattner, A. Bremler-Barr, H. Levy, " On the Vulnerability of Proportional Fairness scheduler to retransmission attacks ", in INFOCOM, 2011 [ppt]

  30. A. Bremler-Barr, D.Hay and Y. Koral " CompactDFA: Generic State Machine Compression for Scalable Pattern Matching ", in INFOCOM, 2010 [ppt]

  31. A. Bremler-Barr, Y. Koral " Accelerating Multi-patterns Matching on Compressed HTTP Traffic ", in INFOCOM, 2009 [ppt]

  32. A. Bremler-Barr, D. Hay, D. Hendler, R. Roth, " PEDS: A Parallel Error Detection Scheme for TCAM Devices ", in INFOCOM, 2009. Best paper award runner-up. (Announcement) [ppt]

  33. U. Ben-Porat, Anat Bremler-Barr, Hanoch Levy " On the Exploitation of CDF Based Wireless Scheduling in INFOCOM 2009. [ppt]

  34. A. Bremler-Barr, D. Hay, D. Hendler, B. Ferber, " Layered Interval Codes for TCAM-based Classification ", (poster session) in SIGMERTRICS, 2008; (full paper) in INFOCOM, 2009 [ppt]

  35. U. Ben-Porat, A. Bremler-Barr, H. Levy, " The Vulnerability of Network Mechanisms to Sophisticated DDOS attacks " in INFOCOM 2008 (mini-conference). [ppt]

  36. A. Bremler–Barr , O. Mokryn, J. Kangasharju, N. Chen and Y. Shavitt " Bringing Order To BGP: Decreasing Convergence Message Complexity " in PODC 2007 (brief announcment) [ppt]

  37. A. Bremler-Barr and D. Hendler " Efficient TCAM-based Packet Classification using Gray Code ", Improved BGP Convergence via Ghost Flushing . [ppt]

  38. A. Bremler-Barr, R. Halacmi-Bekel and J. Kangasharju, " Unregister Attacks in SIP ", in NPSec workshop . [ppt]

  39. A. Bremler-Barr, H. Levy and N. Halachmi, " Aggressiveness Protective Fair Queueing for Bursty Applications ", (short paper) in IWQoS , 2006 [ppt]

  40. A. Bremler-Barr and H. Levy " Spoofing Prevention Method ", Brief Announcement in PODC 2004, full paper in INFOCOM 2005 . [ppt]

  41. A. Bremler-Barr and L. Epstein, " Path layout on tree networks: Tight bounds in different label switching model ", in SIROCCO 2004.

  42. Y. Afek, R. Brooks, N. Fischbach, P. Quinn, A. Friedrich, M. Binderberger, A. Bremler-Barr, B. Elgar, R. Hermoni, "MPLS-Based Synchronous Traffic Shunt " , in NANOG, 2003.[abstract]

  43. A. Bremler-Barr, Y. Afek, and S. Schwarts, " Improved BGP convergence via Ghost Flushing. ", in INFOCOM 2003. [ppt]

  44. Y. Afek, A. Bremler-Barr and O. Ben-Shalom, " On the structure and application of BGP Policy Atoms ”, in Internet Measurement Workshop, 2002. [ppt]

  45. A. Bremler-Barr, E. Cohen, H. Kaplan, and Y. Mansour, "On the predictability and by-passability of end to end delays. ", in the Internet Measurement Workshop, 2002. [ppt]

  46. Y. Afek, A. Bremler-Barr, H. Nussbacher, D. Touitou, "Diversion and Sieving Techniques to Defeat DDOS ", in NANOG-23 2001 [abstract]

  47. A. Bremler-Barr, Y. Afek, H. Kaplan, E. Cohen, and M. Merrit , "Restoration by Path Concatenation: Fast recovery of MPLS paths", in SIGMETRIC 2001 (abstract) full paper in PODC, 2001. [ppt]

  48. A. Bremler-Barr, Y. Afek, "Trainet: a new label switching scheme" in INFOCOM, 2000.

  49. A. Bremler-Barr, Y. Afek and S. Har-Peled , "Routing with a Clue", in SIGCOMM, 1999. [ppt]

  50. Y. Afek and A. Bremler, "Self-Stabilizing Unidirectional Network Algorithms by Power Supply", in SODA, 1997.

Journals Papers:

  1. Yehuda Afek, Anat Bremler-Barr, Shir Landau Feibish, Liron Schieff, "Detecting Heavy Flows in the SDN Match and Action Model", Computer Networks 2018

  2. Anat Bremler-Barr, Yotam Harchol, David Hay, Yacov Hel-Or, "Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications". Accepted to IEEE/ACM Transactions on Networking (January 2018)

  3. Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, Yaron Koral, "Making DPI Engines Resilient to Algorithmic Complexity Attacks". In IEEE/ACM Transactions on Networking, Volume 24, Issue 6, 2016.
    [pdf][abstract]
  4. Yehuda Afek, Anat Bremler-Barr, Liron Schiff, "Recursive design of hardware priority queues". In Computer Networks 66: 52-67, 2014.
    [pdf][abstract]
  5. Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy, "Computer and Network Performance: Graduating from the 'Age of Innocence'". In Computer Networks 66: 68-81, 2014.
    [pdf][abstract]
  6. A. Bremler-Barr, D. Hay and Y. Koral, “ CompactDFA: Scalable Pattern Matching using Longest Prefix Match solution ", accepted to IEEE/ACM Transaction on Networking, 2013

  7. U. Ben-Porat, A. Bremler-Barr, H. Levy , “ On the Exploitation of CDF based Wireless Scheduling ", accepted to special issue on cyber security science of Computer Networks 2012

  8. A. Breml1er-Barr, D. Hay, D. Hendler, “ Layered Interval Codes for TCAM-based Classification ", Computer Networks, special issue on Challenges in High-Performance Switching and Routing in the Future Internet,56(13):3023-3039, 72012.

  9. Y.Afek, A. Bremler-Barr, Y. Koral , “ Space Efficient Deep Packet Inspection of Compressed Web Traffic ", Computer Communication, 35(7): 810-819, 2012

  10. U. Ben-Porat, A. Bremler-Barr, H. Levy “ Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks ", IEEE Transactions on Computers 2012

  11. A. Bremler-Barr, Y. Koral , “ Accelerating Multi-patterns Matching on Compressed HTTP Traffic ", IEEE/ACM Transactions on Networking, 20(3): 970-983, 2012

  12. A. Bremler-Barr, D. Hendler “Space-Efficient TCAM-based Classification Using Gray Coding ", IEEE Transactions on Computers, 61(1): 18-30, 2012

  13. A. Bremler-Barr, D. Hay, D. Hendler, R. Roth, “PEDS: A Parallel Error Detection Scheme for TCAM Devices ”, IEEE/ACM Transactions on Networking, 18(5): 1665-1675 2010

  14. A. Bremler–Barr , O. Mokryn, J. Kangasharju, N. Chen and Y. Shavitt“ “Bringing Order To BGP: Decreasing Convergence Message Complexity ” , Journal of computer Networks, 53(12): 2241-2256, August 2009

  15. A. Bremler-Barr and L. Epstein “ Path layout on tree networks: Bounds in different label switching models " , Nord. J. Comput. 14(1-2): 109-125, 2007

  16. A. Bremler-Barr, H. Levy and N. Halachmi, “Protecting Bursty Applications Against Traffic Aggressiveness ”, in Computer Networks 2007, Volume 51 , Issue 13:3864-3877, 2007

  17. A. Bremler-Barr, Y. Afek, and S. Schwarts, “ Improved BGP Convergence via Ghost Flushing ”, IEEE Journal on Selected Areas in Communications, 22(10): 1933-1948, 2004.

  18. A. Bremler-Barr, E. Cohen, H. Kaplan, and Y. Mansour, “On the predictability and by-passability of end to end delays ”, IEEE Journal on Selected Areas in Communications, 21(6): 961-978 2003

  19. A. Bremler-Barr, Y.Afek, H.Kaplan, E. Cohen, and M. Merrit, “Restoration by Path Concatenation: Fast recovery of MPLS paths ”, Special Issue of Distributed Computing, 15:273-283. 2002.

  20. Y. Afek and A. Bremler and S.Har-Peled, “Routing with a clue” IEEE/ACM Transactions on Networking, vol. 9 pp. 693-705. Dec. 2001.

  21. Y. Afek and A. Bremler, “ Self-Stabilizing Unidirectional Network Algorithms by Power Supply ”. In Special Issue for Self-stabilizing, Chicago Journel of Theoretical Computer Science, Dec. 1998

Technical Reports

  1. Y. Afek and A. Bremler-Barr and S. Schwartz “Explicit Edge Withdrawal in BGP” (Shemer Schwartz, thesis manuscript) 2003

  2. A. Bremler-Barr, Y. Mansour, and Y. Rosenbaum, " "Towards automatic root cause analysis of connection degradation" " (Y. Rosenbum, thesis manuscript) 2005.

  3. Udi Ben-Porat1, Anat Bremler-Barr, Hanoch Levy, and Bernhard Plattner, “ On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks ” Technical Report 2012

Patents:

  1. Y. Afek, A. Bremler-Barr, S. Har-Peled “Method for fast IP-lookup - routing with a clue”, United States Patent Application 6876655, 2005

  2. Y. Afek, A. Bremler-Barr, S. Har-Peled, “Method for Fast Multi-Dimensional Packet Classification”, United States Patent Application 6,633,860, 2003

  3. Yehuda Afek, Anat Bremler-Barr, Dan Touitou, Methods and apparatus for protecting against overload conditions on nodes of a distributed network, United States Patent Application 20020083175, 2002 .

  4. Anat Bremler-Barr, Keren Horvitz, Dan Touitou, Rafi Tzadikario, Yehuda Afek, Weighted fair queuing-based methods and apparatus for protecting against overload conditions on nodes of a distributed network, United States Patent Application 20030076848, 2003.

  5. Guy Pazi, Anat Bremler-Barr, Rami Rivlin, Dan Touitou, Protecting against distributed denial of service attacks (PCT/IL02/00714, 10/232,993) , United States Patent Application 20030076848, 2003.

  6. Anat Bremler-Barr, Touitou Dan, Rafi Zadikario, Yehuda Afek, Protecting against malicious traffic (PCT/IL02/00996) submitted 2002.

  7. Rafi Zadikario, Dan Touitou, Anat Bremler-Barr, Protecting against and stopping the spread of malicious worm traffic on the Internet, (60/445,605) submitted 2003

  8. Anat Bremler-Barr, Dan Touitou, Rami Rivlin, Detecting and protecting against worm traffic on a network, United States Patent Application 20030076848, 2005

  9. Anat Bremler-Bar, Hank Nussbacher, Roi Hermoni, Selective diversion and injection of communication traffic, United States Patent Application 20030076848, 2006.

  10. Anat Bremler-Barr, O. Dekel, H. Levy, "Detecting and controlling peer-to-peer traffic", PCT 2008

  11. Anat Bremler-Barr, David Hay, Danny Hendler and Ron M. Roth. “TCAM with Fast Error Detection”. U.S. Provisional Patent Application No. 61/130,129. May 2008

  12. Anat Bremler-Barr, and Y. Koral "Accelerating Multi-patterns Matching on Compressed HTTP Traffic" Provisional Patent 2009

  13. Anat Bremler-Barr, David Hay and Yaron Koral "CompactDFA: "CompactDFA: Generic State Machine Compression for Scalable Pattern Matching", Provisional Patent 2010