Anat Bremler-Barr: Publications

See also: [ Google Scholar | DBLP | IEEE | ACM ].

Referred Conferences:

  • S. Landau Feibish, Y. Afek, A. Bremler-Barr, E. Cohen, M. Shagam, "Mitigating DNS random subdomain DDoS attacks by distinct heavy Hitters sketches" , in HotWeb 2017. [ppt]

  • A. Bremler-Barr, D. Hay, I. Moyal, and L. Schiff, "Load Balancing Memcached Traffic Using Software Defined Networking", in IFIP Networking 2017. [ppt]

  • A. Bremler-Barr, E. Broshþ, M. Sides, "DDoS Attack on Cloud Auto-scaling Mechanisms" , in INFOCOM 2017. [ppt]

  • Y. Afek, A. Bremler-Barr, L. Shafir, "Network Anti-Spoofing with SDN Data plane", in INFOCOM 2017. [ppt]

  • A. Bremler-Barr, Y. Harchol, D. Hay, "OpenBox: A Software-Defined Framework for Developing, Deploying, and Managing Network Functions" , in SIGCOMM, August 2016. [ ppt ]

  • A. Bremler-Barr, Y. Harchol, D. Hay, Y. Hel-Or, "Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications" , in SPAA, July 2016. [ppt]

  • A. Bremler-Barr, D. Hay, D. Krauthgamer, S. Tzur David, "Scalable URL Matching with Small Memory Footprint" , in IFIP Networking, May 2016. [ppt]

  • A. Atary, A. Bremler-Barr, "Efficient Round-Trip Time Monitoring in OpenFlow Networks" , in INFOCOM, April 2016 . [ppt]

  • A. Bremler-Barr, Y. Harchol, D. Hay, "OpenBox: Enabling Innovation in Middlebox Applications", in ACM SIGCOMM HotMiddleboxes, August 2015.[ppt]

  • A. Bremler-Barr, Y. Harchol, D. Hay, Y. Hel-Or, " Ultra-Fast Similarity Search Using Ternary Content Addressable Memory", in ACM DaMoN, June 2015. [ppt]

  • Y. Afek, A. Bremler-Barr, L. Schiff, "ORange: Multi field openflow based range classifier" , in ACM/IEEE ANCS, May 2015. [ppt].

  • M. Becchi, A. Bremler-Barr, D. Hay, O. Kochba, Y. Koral,"Accelerating Regular Expression Matching Over Compressed HTTP", in IEEE INFOCOM, April 201.5 [ ppt ]

  • A. Bremler-Barr, S. Tzur David, Y. Harchol, D. Hay,"Leveraging Traffic Repetitions for High-Speed Deep Packet Inspection" , in IEEE INFOCOM, April 2015 .[ ppt]

  • A. Bremler-Barr, Y. Harchol, D. Hay, Y. Koral, "Deep Packet Inspection as a Service" , in CoNEXT 2014. [ppt]

  • Y. Afek, A. Bremler-Barr, S. Landau Feibish, "Automated Signature Extraction for High Volume Attacks", in ANCS 2013. [ppt]

  • Y. Afek, A. Bremler-Barr, L. Schiff, “Space Efficient Priority Queues: The TCAM Case ",in SPAA 2013 [ppt]

  • Y. Afek, A. Bremler-Barr, D. Hay, Y. Harchol, Y. Koral, “MCA2: Multi Core Architecture for Mitigating Complexity Attacks ", in ANCS 2012. [ppt]

  • U. Ben-Porat, A. Bremler-Barr, H. Levy and B. Plattner," On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks ", in Networking 2012.

  • A. Bremler-Barr, S. Tzur-David, D. Hay, Y. Koral," Decompression-Free Inspection: DPI for Shared Dictionary Compression over HTTP ", in IEEE INFOCOM 2012. [ppt]

  • U. Ben-Porat, Anat Bremler-Barr and Hanoch Levy," Network and Computer Performance in Malicious Environments: The Good, the Bad and the Ugly ", in NETGCoop 2011. [ppt]

  • A. Bremler-Barr, Y. Koral and V. Zigdon, " Shift-Based Pattern Matching for Compressed Web Traffic ", in IEEE HPSR, 2011. [ppt]

  • A. Bremler-Barr, Y. Harcol and D.Hay , " Space-time tradeoffs in Software-based Deep Packet Inspection ", in IEEE HPSR, 2011. [ppt]

  • A. Bremler-Barr, O. Dekel, R. Golschmidt, H. Levy, " Controlling P2P applications via Address Harvesting: the Skype story ", in HOTP2P, 2011 [ppt]

  • Y. Afek, A. Bremler-Barr, Y. Koral, " Efficient Processing of Multi-Connection Compressed Web Traffic ", in NETWOKING, 2011. [ppt]

  • A. Bremler-Barr, R. Golschmidt , " On the stability of Skype Super Nodes ", in TMA workshop, 2011 [ppt]

  • U. Ben-Porat, B. Plattner, A. Bremler-Barr, H. Levy, " On the Vulnerability of Proportional Fairness scheduler to retransmission attacks ", in INFOCOM, 2011. [ppt]

  • A. Bremler-Barr, D.Hay and Y. Koral " CompactDFA: Generic State Machine Compression for Scalable Pattern Matching ", in INFOCOM, 2010. [ppt]

  • A. Bremler-Barr, Y. Koral " Accelerating Multi-patterns Matching on Compressed HTTP Traffic ", in INFOCOM, 2009. [ppt]

  • A. Bremler-Barr, D. Hay, D. Hendler, R. Roth, " PEDS: A Parallel Error Detection Scheme for TCAM Devices ", in INFOCOM, 2009. Best paper award runner-up. (Announcement) [ppt]

  • U. Ben-Porat, Anat Bremler-Barr, Hanoch Levy " On the Exploitation of CDF Based Wireless Scheduling in INFOCOM 2009. [ppt]

  • A. Bremler-Barr, D. Hay, D. Hendler, B. Ferber, " Layered Interval Codes for TCAM-based Classification ", (poster session) in SIGMERTRICS, 2008; (full paper) in INFOCOM, 2009. [ppt]

  • U. Ben-Porat, A. Bremler-Barr, H. Levy, " The Vulnerability of Network Mechanisms to Sophisticated DDOS attacks " in INFOCOM 2008 (mini-conference). [ppt]

  • A. Bremler–Barr , O. Mokryn, J. Kangasharju, N. Chen and Y. Shavitt " Bringing Order To BGP: Decreasing Convergence Message Complexity " in PODC 2007 (brief announcment). [ppt]

  • A. Bremler-Barr and D. Hendler " Efficient TCAM-based Packet Classification using Gray Code ", Improved BGP Convergence via Ghost Flushing . [ppt]

  • A. Bremler-Barr, R. Halacmi-Bekel and J. Kangasharju, " Unregister Attacks in SIP ", in NPSec workshop . [ppt]

  • A. Bremler-Barr, H. Levy and N. Halachmi, " Aggressiveness Protective Fair Queueing for Bursty Applications ", (short paper) in IWQoS , 2006. [ppt]

  • A. Bremler-Barr and H. Levy " Spoofing Prevention Method ", Brief Announcement in PODC 2004, full paper in INFOCOM 2005 . [ppt]

  • A. Bremler-Barr and L. Epstein, " Path layout on tree networks: Tight bounds in different label switching model ", in SIROCCO 2004.

  • A. Bremler-Barr, Y. Afek, and S. Schwarts, " Improved BGP convergence via Ghost Flushing. ", in INFOCOM 2003. [ppt]

  • Y. Afek, A. Bremler-Barr and O. Ben-Shalom, " On the structure and application of BGP Policy Atoms ”, in Internet Measurement Workshop, 2002. [ppt]

  • A. Bremler-Barr, E. Cohen, H. Kaplan, and Y. Mansour, "On the predictability and by-passability of end to end delays. ", in the Internet Measurement Workshop, 2002. [ppt]

  • A. Bremler-Barr, Y. Afek, H. Kaplan, E. Cohen, and M. Merrit , "Restoration by Path Concatenation: Fast recovery of MPLS paths", in SIGMETRIC 2001 (abstract) full paper in PODC, 2001. [ppt]

  • A. Bremler-Barr, Y. Afek, "Trainet: a new label switching scheme" in INFOCOM, 2000.

  • A. Bremler-Barr, Y. Afek and S. Har-Peled , "Routing with a Clue", in SIGCOMM, 1999. [ppt]

  • Y. Afek and A. Bremler, "Self-Stabilizing Unidirectional Network Algorithms by Power Supply", in SODA, 1997.

  • Workshop and Posters:

  • Y. Afek, A. Bremler-Barr, H. Nussbacher, D. Touitou, "Diversion and Sieving Techniques to Defeat DDOS ", in NANOG-23 2001 [abstract]

  • Y. Afek, R. Brooks, N. Fischbach, P. Quinn, A. Friedrich, M. Binderberger, A. Bremler-Barr, B. Elgar, R. Hermoni, "MPLS-Based Synchronous Traffic Shunt " , in NANOG, 2003.[abstract]

  • N. Cohen, A. Bremler-Barr, "Graph-based Cloud Resource Cleanup", in ACM SoCC Poster Session, August 2015 [poster].

  • Y. Afek, A. Bremler-Barr, L. Schiff Cross-Entrance Consistent Range Classifier with OpenFlow" , in ONS 2014 and HotSDN 2014

  • M. Sides, A. Bremler-Barr, E. Rosensweig, "Yo-Yo Attack - Vulnerability in auto-scaling mechanism" , in ACM SIGCOMM Poster Session, August 2015.[poster].

  • Y. Afek, A. Bremler-Barr, S. Landau Feibish, L. Schiff,"Sampling and Large Flow Detection in SDN" , in ACM SIGCOMM Poster Session, August 2015. [poster].

  • Journals Papers:

  • Y. Afek, A. Bremler-Barr, S. Landau Feibish, " Zero-Day Signature Extraction for High Volume Attacks", accepted to IEEE/ACM Transactions on Networking, 2019.

  • Y. Afek, A. Bremler-Barr, S. Landau Feibish, L. Schieff, " Detecting Heavy Flows in the SDN Match and Action Model",in Computer Networks, 2018.

  • A. Bremler-Barr, Y. Harchol, D. Hay, Y. Hel-Or, "Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications ",in IEEE/ACM Transactions on Networking 26(2): 835-850.

  • Y. Afek, A. Bremler-Barr, Y. Harchol, D. Hay, Y. Koral, “ Making DPI Engines Resilient to Algorithmic Complexity Attacks ", in IEEE/ACM Transactions on Networking, Volume 24, Issue 6, 2016.

  • Y. Afek, A. Bremler-Barr, L. Schiff, “ Recursive design of hardware priority queues ", in Computer Networks 66: 52-67, 2014.

  • U. Ben-Porat, A. Bremler-Barr, H. Levy, “ Computer and Network Performance: Graduating from the 'Age of Innocence' ", in Computer Networks 66: 68-81, 2014.

  • A. Bremler-Barr, D. Hay and Y. Koral, “ CompactDFA: Scalable Pattern Matching using Longest Prefix Match solution ", in IEEE/ACM Transaction on Networking, 2013.

  • U. Ben-Porat, A. Bremler-Barr, H. Levy , “ On the Exploitation of CDF based Wireless Scheduling ", in special issue on cyber security science of Computer Networks 2012.

  • A. Breml1er-Barr, D. Hay, D. Hendler, “ Layered Interval Codes for TCAM-based Classification ", Computer Networks, special issue on Challenges in High-Performance Switching and Routing in the Future Internet,56(13):3023-3039, 2012.

  • Y.Afek, A. Bremler-Barr, Y. Koral , “ Space Efficient Deep Packet Inspection of Compressed Web Traffic ", Computer Communication, 35(7): 810-819, 2012.

  • U. Ben-Porat, A. Bremler-Barr, H. Levy “ Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks ", IEEE Transactions on Computers 2012.

  • A. Bremler-Barr, Y. Koral , “ Accelerating Multi-patterns Matching on Compressed HTTP Traffic ", IEEE/ACM Transactions on Networking, 20(3): 970-983, 2012.

  • A. Bremler-Barr, D. Hendler “Space-Efficient TCAM-based Classification Using Gray Coding ", IEEE Transactions on Computers, 61(1): 18-30, 2012.

  • A. Bremler-Barr, D. Hay, D. Hendler, R. Roth, “PEDS: A Parallel Error Detection Scheme for TCAM Devices ”, IEEE/ACM Transactions on Networking, 18(5): 1665-1675 2010.

  • A. Bremler–Barr , O. Mokryn, J. Kangasharju, N. Chen and Y. Shavitt“ “Bringing Order To BGP: Decreasing Convergence Message Complexity ” , Journal of computer Networks, 53(12): 2241-2256, August 2009.

  • A. Bremler-Barr and L. Epstein “ Path layout on tree networks: Bounds in different label switching models " , Nord. J. Comput. 14(1-2): 109-125, 2007.

  • A. Bremler-Barr, H. Levy and N. Halachmi, “Protecting Bursty Applications Against Traffic Aggressiveness ”, in Computer Networks 2007, Volume 51 , Issue 13:3864-3877, 2007.

  • A. Bremler-Barr, Y. Afek, and S. Schwarts, “ Improved BGP Convergence via Ghost Flushing ”, IEEE Journal on Selected Areas in Communications, 22(10): 1933-1948, 2004.

  • A. Bremler-Barr, E. Cohen, H. Kaplan, and Y. Mansour, “On the predictability and by-passability of end to end delays ”, IEEE Journal on Selected Areas in Communications, 21(6): 961-978 2003.

  • A. Bremler-Barr, Y.Afek, H.Kaplan, E. Cohen, and M. Merrit, “Restoration by Path Concatenation: Fast recovery of MPLS paths ”, Special Issue of Distributed Computing, 15:273-283. 2002.

  • Y. Afek and A. Bremler and S.Har-Peled, “Routing with a clue” IEEE/ACM Transactions on Networking, vol. 9 pp. 693-705. Dec. 2001.

  • Y. Afek and A. Bremler, “ Self-Stabilizing Unidirectional Network Algorithms by Power Supply ”. In Special Issue for Self-stabilizing, Chicago Journel of Theoretical Computer Science, Dec. 1998.

  • Technical Reports

  • Y. Afek and A. Bremler-Barr and S. Schwartz “Explicit Edge Withdrawal in BGP” (Shemer Schwartz, thesis manuscript) 2003

  • A. Bremler-Barr, Y. Mansour, and Y. Rosenbaum, " "Towards automatic root cause analysis of connection degradation" " (Y. Rosenbum, thesis manuscript) 2005.

  • Udi Ben-Porat1, Anat Bremler-Barr, Hanoch Levy, and Bernhard Plattner, “ On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks ” Technical Report 2012

  • Patents:

  • Y. Afek, A. Bremler-Barr, S. Har-Peled “Method for fast IP-lookup - routing with a clue”, United States Patent Application 6876655, 2005

  • Y. Afek, A. Bremler-Barr, S. Har-Peled, “Method for Fast Multi-Dimensional Packet Classification”, United States Patent Application 6,633,860, 2003

  • Yehuda Afek, Anat Bremler-Barr, Dan Touitou, Methods and apparatus for protecting against overload conditions on nodes of a distributed network, United States Patent Application 20020083175, 2002 .

  • Anat Bremler-Barr, Keren Horvitz, Dan Touitou, Rafi Tzadikario, Yehuda Afek, Weighted fair queuing-based methods and apparatus for protecting against overload conditions on nodes of a distributed network, United States Patent Application 20030076848, 2003.

  • Guy Pazi, Anat Bremler-Barr, Rami Rivlin, Dan Touitou, Protecting against distributed denial of service attacks (PCT/IL02/00714, 10/232,993) , United States Patent Application 20030076848, 2003.

  • Anat Bremler-Barr, Touitou Dan, Rafi Zadikario, Yehuda Afek, Protecting against malicious traffic (PCT/IL02/00996) 2002.

  • Rafi Zadikario, Dan Touitou, Anat Bremler-Barr, Protecting against and stopping the spread of malicious worm traffic on the Internet, (60/445,605), United States Patent Application 20030076848, 2003

  • Anat Bremler-Barr, Dan Touitou, Rami Rivlin, Detecting and protecting against worm traffic on a network, United States Patent Application 20030076848, 2005

  • Anat Bremler-Bar, Hank Nussbacher, Roi Hermoni, Selective diversion and injection of communication traffic, United States Patent Application 20030076848, 2006.

  • Anat Bremler-Barr, O. Dekel, H. Levy, "Detecting and controlling peer-to-peer traffic", US Patent App. 12/739,738, year 2010

  • Anat Bremler-Barr, David Hay, Danny Hendler and Ron M. Roth. “Efficient detection of errors in associative memory" U.S. Patent 20120117431A1, 2010

  • Anat Bremler-Barr, David Hay and Yaron Koral, "State machine compression for scalable pattern matching", US Patent 8,504,510, year 2012.

  • A Bremler-Barr, Y. Koral, V. Zigdon, " Multi-pattern matching in compressed communication traffic" US Patent 8,458,354, year 2012.

  • Anat Bremler-Barr, David Hay, Yaron Koral, Yotam Harchol, "Method and System for providing Deep Packet Inspection as a service", US Application No. 15/321,472 national phase of PCT/IL2015/050641, submitted year 2015.

  • Anat Bremler-Barr, "Detecting and filtering unauthorized traffic to networks with IoT devices", PCT/IB2017/058054 , submitted year 2017

  • [ old publication site]