{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:40:13Z","timestamp":1743385213507,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819628636","type":"print"},{"value":"9789819628643","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-2864-3_27","type":"book-chapter","created":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:17:45Z","timestamp":1743383865000},"page":"337-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["2FA Sketch: Two-Factor Armor Sketch for Accurate and Efficient Heavy Hitter Detection in Data Streams"],"prefix":"10.1007","author":[{"given":"Xilai","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xinyi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Bingqing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Gaogang","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,29]]},"reference":[{"key":"27_CR1","unstructured":"The source codes of our and other related algorithms. https:\/\/github.com\/2FA-Sketch\/2FA-Sketch"},{"key":"27_CR2","unstructured":"The CAIDA Anonymized Internet Traces. http:\/\/www.caida.org\/data\/overview\/"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Basat, R.B., Einziger, G., Friedman, R., Kassner, Y.: Randomized admission policy for efficient top-k and frequency estimation. In: Proceedings of the IEEE INFOCOM, pp.\u00a01\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8057215"},{"issue":"1","key":"27_CR4","first-page":"72","volume":"21","author":"W Cai","year":"2023","unstructured":"Cai, W., Yang, S., Sun, G., Zhang, Q., Yu, H.: Adaptive load balancing for parameter servers in distributed machine learning over heterogeneous networks. ZTE Commun. 21(1), 72 (2023)","journal-title":"ZTE Commun."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Charikar, M., Chen, K., Farach-Colton, M.: Finding frequent items in data streams. Automata, languages and programming (2002)","DOI":"10.1007\/3-540-45465-9_59"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Cormode, G., Muthukrishnan, S.: An improved data stream summary: the count-min sketch and its applications. J. Algorithms 55(1) (2005)","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Dai, H., Meng, L., Liu, A.X.: Finding persistent items in distributed, datasets. In: Proceedings of the IEEE INFOCOM (2018)","DOI":"10.1109\/INFOCOM.2018.8486425"},{"issue":"4","key":"27_CR8","doi-asserted-by":"publisher","first-page":"289","DOI":"10.14778\/3025111.3025112","volume":"10","author":"H Dai","year":"2016","unstructured":"Dai, H., Shahzad, M., Liu, A.X., Zhong, Y.: Finding persistent items in data streams. Proc. VLDB Endow. 10(4), 289\u2013300 (2016)","journal-title":"Proc. VLDB Endow."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Dai, H., Zhong, Y., Liu, A.X., Wang, W., Li, M.: Noisy bloom filters for multi-set membership testing. In: Proceedings of the ACM SIGMETRICS, pp. 139\u2013151 (2016)","DOI":"10.1145\/2896377.2901451"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Estan, C., Varghese, G.: New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice. ACM Trans. Comput. Syst. (TOCS) 21(3) (2003)","DOI":"10.1145\/859716.859719"},{"issue":"2","key":"27_CR11","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1109\/TNET.2022.3199506","volume":"31","author":"J Huang","year":"2022","unstructured":"Huang, J., et al.: Chainsketch: an efficient and accurate sketch for heavy flow detection. IEEE\/ACM Trans. Netw. 31(2), 738\u2013753 (2022)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Huang, Q., et al.: Sketchvisor: robust network measurement for software packet processing. In: Proceedings of the 2017 ACM SIGCOMM Conference. ACM (2017)","DOI":"10.1145\/3098822.3098831"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Huang, Q., Lee, P.P.: Ld-sketch: a distributed sketching design for accurate and scalable anomaly detection in network data streams. In: Proceedings of the IEEE INFOCOM, pp. 1420\u20131428. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848076"},{"issue":"3","key":"27_CR14","first-page":"70","volume":"21","author":"Y Ji","year":"2023","unstructured":"Ji, Y., Han, J., Zhao, Y., Zhang, S., Gong, Z.: Log anomaly detection through gpt-2 for large scale systems. ZTE Commun. 21(3), 70 (2023)","journal-title":"ZTE Commun."},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Kim, D., Zhu, Y., Kim, C., Lee, J., Seshan, S.: Generic external memory for switch data planes. In: Proceedings of the 17th ACM Workshop on Hot Topics in Networks, pp.\u00a01\u20137 (2018)","DOI":"10.1145\/3286062.3286063"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Li, D., Cui, H., Hu, Y., Xia, Y., Wang, X.: Scalable data center multicast using multi-class bloom filter. In: 2011 19th IEEE International Conference on Network Protocols, pp. 266\u2013275. IEEE (2011)","DOI":"10.1109\/ICNP.2011.6089061"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Li, S., Huang, J., Zhang, W., Shao, J.: PA-Sketch: a fast and accurate sketch for differentiated flow estimation. In: 2023 IEEE 31st International Conference on Network Protocols, pp. 1\u201311. IEEE (2023)","DOI":"10.1109\/ICNP59255.2023.10355581"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Li, T., Chen, S., Ling, Y.: Per-flow traffic measurement through randomized counter sharing. IEEE\/ACM Trans. Netw. 20(5) (2012)","DOI":"10.1109\/TNET.2012.2192447"},{"key":"27_CR19","unstructured":"Li, Y., Miao, R., Kim, C., Yu, M.: Flowradar: a better netflow for data centers. In: Proceedings of the NSDI (2016)"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Lin, W., Li, C., Xu, L., Xie, K.: Enhanced network traffic anomaly detection: integration of tensor eigenvector centrality with low-rank recovery models. IEEE Trans. Serv. Comput. (2024)","DOI":"10.1109\/TSC.2024.3433580"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"McKee, S.A.: Reflections on the memory wall. In: Proceedings of the 1st Conference on Computing Frontiers, p.\u00a0162 (2004)","DOI":"10.1145\/977091.977115"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Metwally, A., Agrawal, D., El\u00a0Abbadi, A.: Efficient computation of frequent and top-k elements in data streams. In: Proceedings of the Springer ICDT (2005)","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Scouarnec, N.L.: Cuckoo++ hash tables: high-performance hash tables for networking applications. In: Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems, pp. 41\u201354 (2018)","DOI":"10.1145\/3230718.3232629"},{"issue":"2","key":"27_CR24","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TNET.2003.810316","volume":"11","author":"N Shroff","year":"2003","unstructured":"Shroff, N., et al.: A measurement-analytic approach for qos estimation in a network based on the dominant time scale. IEEE\/ACM Trans. Netw. 11(2), 222\u2013235 (2003)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Ting, D.: Data sketches for disaggregated subset sum and frequent item estimation. In: Proceedings of the 2018 International Conference on Management of Data, pp. 1129\u20131140 (2018)","DOI":"10.1145\/3183713.3183759"},{"issue":"8","key":"27_CR26","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1109\/LCOMM.2021.3077902","volume":"25","author":"M Wu","year":"2021","unstructured":"Wu, M., Huang, H., Sun, Y.E., Du, Y., Chen, S., Gao, G.: Activekeeper: an accurate and efficient algorithm for finding top-k elephant flows. IEEE Commun. Lett. 25(8), 2545\u20132549 (2021)","journal-title":"IEEE Commun. Lett."},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Yang, T., Gong, J., Zhang, H., Zou, L., Shi, L., Li, X.: Heavyguardian: separate and guard hot items in data streams. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2584\u20132593 (2018)","DOI":"10.1145\/3219819.3219978"},{"key":"27_CR28","doi-asserted-by":"crossref","unstructured":"Yang, T., et al.: Elastic sketch: adaptive and fast network-wide measurements. In: Proceedings of the 2018 ACM SIGCOMM Conference. ACM (2018)","DOI":"10.1145\/3230543.3230544"},{"issue":"5","key":"27_CR29","doi-asserted-by":"publisher","first-page":"1845","DOI":"10.1109\/TNET.2019.2933868","volume":"27","author":"T Yang","year":"2019","unstructured":"Yang, T., et al.: Heavykeeper: an accurate algorithm for finding top-$$ k $$ elephant flows. IEEE\/ACM Trans. Netw. 27(5), 1845\u20131858 (2019)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"27_CR30","doi-asserted-by":"crossref","unstructured":"Yu, J., et al.: Heavytracker: an efficient algorithm for heavy-hitter detection in high-speed networks. In: 2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS), pp. 362\u2013370. IEEE (2023)","DOI":"10.1109\/ICPADS56603.2022.00054"},{"key":"27_CR31","unstructured":"Yu, M., Jose, L., Miao, R.: Software defined traffic measurement with opensketch. In: Proceedings of the NSDI, vol.\u00a013 (2013)"},{"key":"27_CR32","unstructured":"Zhang, Q., Han, J., Cheng, L., Zhang, B., Gong, Z.: Approach to anomaly detection in microservice system with multi-source data streams. ZTE Commun. 20(3), 85\u201392 (2022)"},{"key":"27_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Cocosketch: high-performance sketch-based measurement over arbitrary partial key query. In: Proceedings of the 2021 ACM SIGCOMM Conference, pp. 207\u2013222 (2021)","DOI":"10.1145\/3452296.3472892"},{"key":"27_CR34","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s11432-010-0053-5","volume":"53","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Fang, B., Zhang, Y.: Identifying heavy hitters in high-speed network monitoring. Sci. China Inf. Sci. 53, 659\u2013676 (2010)","journal-title":"Sci. China Inf. Sci."},{"key":"27_CR35","doi-asserted-by":"crossref","unstructured":"Zheng, H., et al.: $$\\mu $$mon: empowering microsecond-level network monitoring with wavelets. In: Proceedings of the 2024 ACM SIGCOMM Conference, pp. 274\u2013290 (2024)","DOI":"10.1145\/3651890.3672236"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-2864-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T01:18:04Z","timestamp":1743383884000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-2864-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819628636","9789819628643"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-2864-3_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"29 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NPC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Network and Parallel Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"npc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}