{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:10:06Z","timestamp":1776399006225,"version":"3.51.2"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"CoNEXT1","license":[{"start":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T00:00:00Z","timestamp":1711584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Netw."],"published-print":{"date-parts":[[2024,3,28]]},"abstract":"<jats:p>Machine Learning (ML) shows promising potential for enhancing networking tasks by providing early traffic predictions. However, implementing an ML-enabled system is a challenging task due to network devices limited resources. While previous works have shown the feasibility of running simple ML models in the data plane, integrating them into a practical end-to-end system is not an easy task. It requires addressing issues related to resource management and model maintenance to ensure that the performance improvement justifies the system overhead. In this work, we propose DUMBO, a versatile end-to-end system to generate and exploit early flow size predictions at line rate. Our system seamlessly integrates and maintains a simple ML model that offers early coarse-grain flow size prediction in the data plane. We evaluate the proposed system on flow scheduling, per-flow packet inter-arrival time distribution, and flow size estimation using real traffic traces, and perform experiments using an FPGA prototype running on an AMD(R)-Xilinx(R) Alveo U280 SmartNIC. Our results show that DUMBO outperforms traditional state-of-the-art approaches by equipping network devices data planes with a lightweight ML model. Code is available at https:\/\/github.com\/cpt-harlock\/DUMBO.<\/jats:p>","DOI":"10.1145\/3649473","type":"journal-article","created":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T12:07:53Z","timestamp":1711627673000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Taming the Elephants: Affordable Flow Length Prediction in the Data Plane"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6327-340X","authenticated-orcid":false,"given":"Raphael","family":"Azorin","sequence":"first","affiliation":[{"name":"Huawei Technologies Co. Ltd &amp; EURECOM, Boulogne-Billancourt (Paris), France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7584-8952","authenticated-orcid":false,"given":"Andrea","family":"Monterubbiano","sequence":"additional","affiliation":[{"name":"University of Rome La Sapienza, Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1889-7675","authenticated-orcid":false,"given":"Gabriele","family":"Castellano","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd, Boulogne-Billancourt (Paris), France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8781-0775","authenticated-orcid":false,"given":"Massimo","family":"Gallo","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd, Boulogne-Billancourt (Paris), France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3626-6404","authenticated-orcid":false,"given":"Salvatore","family":"Pontarelli","sequence":"additional","affiliation":[{"name":"University of Rome La Sapienza, Rome, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3936-8876","authenticated-orcid":false,"given":"Dario","family":"Rossi","sequence":"additional","affiliation":[{"name":"Huawei Technologies Co. Ltd, Boulogne-Billancourt (Paris), France"}]}],"member":"320","published-online":{"date-parts":[[2024,3,28]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2006. The MAWI Working Group Traffic Archive. http:\/\/mawi.wide.ad.jp\/mawi\/."},{"key":"e_1_2_1_2_1","unstructured":"2019. The CAIDA Anonymized Internet Traces Dataset. https:\/\/www.caida.org\/catalog\/datasets\/passive_dataset\/."},{"key":"e_1_2_1_3_1","unstructured":"2023. AMD OpenNIC Project. https:\/\/github.com\/Xilinx\/open-nic."},{"key":"e_1_2_1_4_1","unstructured":"2024. DUMBO Simulator. https:\/\/github.com\/cpt-harlock\/DUMBO"},{"key":"e_1_2_1_5_1","unstructured":"2024. Open Neural Network Exchange (ONNX). https:\/\/github.com\/onnx\/onnx"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 2020 Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'20)","author":"Abbasloo Soheil","unstructured":"Soheil Abbasloo, Chen-Yu Yen, and H. Jonathan Chao. 2020. Classic Meets Modern: A Pragmatic Learning-Based Congestion Control for the Internet. In Proceedings of the 2020 Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'20). 632--647."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565009.3569520"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of IEEE International Conference on Computer Communications (INFOCOM).","author":"Tanyi-Jong Akem Aristide","year":"2023","unstructured":"Aristide Tanyi-Jong Akem, Michele Gucciardo, and Marco Fiore. 2023. Flowrest: Practical Flow-Level Inference in Programmable Switches with Random Forests. In Proceedings of IEEE International Conference on Computer Communications (INFOCOM)."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486031"},{"key":"e_1_2_1_10_1","volume-title":"Concrete problems in AI safety. arXiv preprint arXiv:1606.06565","author":"Amodei Dario","year":"2016","unstructured":"Dario Amodei, Chris Olah, Jacob Steinhardt, Paul Christiano, John Schulman, and Dan Man\u00e9. 2016. Concrete problems in AI safety. arXiv preprint arXiv:1606.06565 (2016)."},{"key":"e_1_2_1_11_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Arp Daniel","year":"2022","unstructured":"Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, and Konrad Rieck. 2022. Dos and don'ts of machine learning in computer security. In 31st USENIX Security Symposium (USENIX Security 22). 3971--3988."},{"key":"e_1_2_1_12_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI'20)","author":"Barbette Tom","year":"2020","unstructured":"Tom Barbette, Chen Tang, Haoran Yao, Dejan Kostic, Gerald Q Maguire Jr, Panagiotis Papadimitratos, and Marco Chiesa. 2020. A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI'20). USENIX, 667--683."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2982739"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3506713"},{"key":"e_1_2_1_17_1","volume-title":"Random Forests. Machine Learning 45","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman. 2001. Random Forests. Machine Learning 45 (2001)."},{"key":"e_1_2_1_18_1","unstructured":"Coralie Busse-Grawitz Roland Meier Alexander Dietm\u00fcller Tobias B\u00fchler and Laurent Vanbever. 2022. pForest: In-Network Inference with Random Forests. arXiv:1909.05680"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/3586589.3586815"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3610855"},{"key":"e_1_2_1_22_1","volume-title":"38th International Conference on Machine Learning. PMLR.","author":"Du Elbert","year":"2021","unstructured":"Elbert Du, Franklyn Wang, and Michael Mitzenmacher. 2021. Putting the \"Learning\" into Learning-Augmented Algorithms for Frequency Estimation. In 38th International Conference on Machine Learning. PMLR."},{"key":"e_1_2_1_23_1","volume-title":"Azure Accelerated Networking: SmartNICs in the Public Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI'18)","author":"Firestone Daniel","year":"2018","unstructured":"Daniel Firestone, Andrew Putnam, Sambhrama Mundkur, Derek Chiou, Alireza Dabagh, Mike Andrewartha, Hari Angepat, Vivek Bhanu, Adrian Caulfield, Eric Chung, et al. 2018. Azure Accelerated Networking: SmartNICs in the Public Cloud. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI'18). 51--66."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. 1--12","author":"Gao Peter X","year":"2019","unstructured":"Peter X Gao, Akshay Narayan, Gautam Kumar, Rachit Agarwal, Sylvia Ratnasamy, and Scott Shenker. 2019. pHost: Distributed near-optimal datacenter transport over commodity network fabric. In Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. 1--12."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/376284.375670"},{"key":"e_1_2_1_26_1","volume-title":"Learning-Based Frequency Estimation Algorithms. In International Conference on Learning Representations.","author":"Hsu Chen-Yu","year":"2019","unstructured":"Chen-Yu Hsu, Piotr Indyk, Dina Katabi, and Ali Vakilian. 2019. Learning-Based Frequency Estimation Algorithms. In International Conference on Learning Representations."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3289602.3293924"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22)","author":"Jacobs Arthur S.","unstructured":"Arthur S. Jacobs, Roman Beltiukov, Walter Willinger, Ronaldo A. Ferreira, Arpit Gupta, and Lisandro Z. Granville. 2022. AI\/ML and Network Security: The Emperor has no Clothes. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22)."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2016.17"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406591"},{"key":"e_1_2_1_31_1","unstructured":"Gautam Kumar Akshay Narayan and Peter Gao. 2016. YAPS Network Simulator. https:\/\/github.com\/NetSys\/simulator"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2015.225"},{"key":"e_1_2_1_33_1","volume-title":"Switchtree: in-network computing and traffic analyses with random forests. Neural Computing and Applications","author":"Lee Jong-Hyouk","year":"2020","unstructured":"Jong-Hyouk Lee and Kamal Singh. 2020. Switchtree: in-network computing and traffic analyses with random forests. Neural Computing and Applications (2020), 1--12."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342085"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14778\/3352063.3352135"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447868"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611976830.1"},{"key":"e_1_2_1_38_1","volume-title":"Memory-efficient Random Forests in FPGA SmartNICs. In Companion of the 19th International Conference on emerging Networking EXperiments and Technologies. 55--56","author":"Monterubbiano Andrea","year":"2023","unstructured":"Andrea Monterubbiano, Raphael Azorin, Gabriele Castellano, Massimo Gallo, Salvatore Pontarelli, and Dario Rossi. 2023. Memory-efficient Random Forests in FPGA SmartNICs. In Companion of the 19th International Conference on emerging Networking EXperiments and Technologies. 55--56."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626309"},{"key":"e_1_2_1_40_1","volume-title":"FlowBlaze: Stateful Packet Processing in Hardware. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI'19)","author":"Pontarelli Salvatore","year":"2019","unstructured":"Salvatore Pontarelli, Roberto Bifulco, Marco Bonola, Carmelo Cascone, Marco Spaziani, Valerio Bruschi, Davide Sanvito, Giuseppe Siracusano, Antonio Capone, Michio Honda, Felipe Huici, and Giuseppe Bianchi. 2019. FlowBlaze: Stateful Packet Processing in Hardware. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI'19). 531--548."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7785324"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582035"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165506"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544222"},{"key":"e_1_2_1_45_1","volume-title":"JMLR Workshop and Conference Proceedings, 1--18","author":"Settles Burr","year":"2011","unstructured":"Burr Settles. 2011. From theories to queries: Active learning in practice. In Active learning and experimental design workshop in conjunction with AISTATS 2010. JMLR Workshop and Conference Proceedings, 1--18."},{"key":"e_1_2_1_46_1","volume-title":"Re-architecting Traffic Analysis with Neural Network Interface Cards. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI'22)","author":"Siracusano Giuseppe","year":"2022","unstructured":"Giuseppe Siracusano, Salvator Galea, Davide Sanvito, Mohammad Malekzadeh, Gianni Antichi, Paolo Costa, Hamed Haddadi, and Roberto Bifulco. 2022. Re-architecting Traffic Analysis with Neural Network Interface Cards. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI'22). 513--533."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"e_1_2_1_48_1","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI'19)","author":"\u00d0ukic Vojislav","year":"2019","unstructured":"Vojislav \u00d0ukic, Sangeetha Abdu Jyothi, Muhsen Owaida, Ce Zhang, and Ankit Singla. 2019. Is advance knowledge of flow sizes a plausible assumption. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI'19). 565--580."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365864"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3094514"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3099442"},{"key":"e_1_2_1_53_1","volume-title":"IIsy: Practical in-network classification. arXiv preprint arXiv:2205.08243","author":"Zheng Changgang","year":"2022","unstructured":"Changgang Zheng, Zhaoqi Xiong, Thanh T Bui, Siim Kaupmees, Riyad Bensoussane, Antoine Bernabeu, Shay Vargaftik, Yaniv Ben-Itzhak, and Noa Zilberman. 2022. IIsy: Practical in-network classification. arXiv preprint arXiv:2205.08243 (2022)."},{"key":"e_1_2_1_54_1","volume-title":"Automating in-network machine learning. arXiv preprint arXiv:2205.08824","author":"Zheng Changgang","year":"2022","unstructured":"Changgang Zheng, Mingyuan Zang, Xinpeng Hong, Riyad Bensoussane, Shay Vargaftik, Yaniv Ben-Itzhak, and Noa Zilberman. 2022. Automating in-network machine learning. arXiv preprint arXiv:2205.08824 (2022)."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472716.3472846"}],"container-title":["Proceedings of the ACM on Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649473","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T20:31:15Z","timestamp":1755981075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,28]]},"references-count":55,"journal-issue":{"issue":"CoNEXT1","published-print":{"date-parts":[[2024,3,28]]}},"alternative-id":["10.1145\/3649473"],"URL":"https:\/\/doi.org\/10.1145\/3649473","relation":{},"ISSN":["2834-5509"],"issn-type":[{"value":"2834-5509","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,28]]},"assertion":[{"value":"2024-03-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}