Research Roadmap Driven by Network Benchmarking Lab (NBL): Deep Packet Inspection, Traffic Forensics, Embedded Benchmarking, Software Defined Networking and Beyond

Ying-Dar Lin, Fellow, IEEE

Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan

ydlin@cs.nctu.edu.tw

June 2014


Abstract

Most researchers look for topics from the literature. But our research derived mostly from development, in turn driven by industrial projects or product testing. We spanned into the areas of cable TV networks, multi-hop cellular, Internet QoS, deep packet inspection, traffic forensics, embedded benchmarking, and software defined networking. Among them, our multi-hop cellular work was the first along this line and has a high impact on both academia and industry, with over 600 citations and standardizations in WLAN mesh (IEEE 802.11s), WiMAX (IEEE 802.16j), Bluetooth (IEEE 802.15.5), and 3GPP LTE-advanced. Side products from our research include a startup (L7 Networks Inc., in 2002), a test lab (Network Benchmarking Lab, NBL, since 2002), and a textbook “Computer Networks: An Open Source Approach” (McGraw-Hill, 2011). It is a perfect time to have my 20-year half-time report as we celebrate the 70th birthday of my Ph.D. thesis advisor, Prof. Mario Gerla. This report could serve as a reference for researchers in developing their own roadmap.

 

Keywords: research model, research roadmap, development and research, network research, deep packet inspection, traffic forensics, embedded benchmarking, software defined networking.

1.       Roadmap and Footprints

From Development to Research

Research topics in the academia are often drawn from three sources: literature repository, development projects, and industrial discussions. The literature repository accounts for the dominant percentage as it is the easiest way to find a topic by following a crowd of researchers. Your papers could also enjoy being well cited if you are slightly ahead of the crowd or the fever on the topic persists for many years. The only problem with this source might be minor improvement on existing problems defined by others or wasted resources on pseudo, instead of real, problems. On the other hand, deriving a research topic from a development effort is an expensive approach, where research is defined as the non-trivial parts within the development process. The virtue in return is a real problem with a feasible solution. The problem or the solution might be new to the academia and the industry. Researching a real problem from the industrial discussions is an inexpensive alternative. However, as there might not be real development involved, the research result might not be a feasible solution. How tight research and development should go together is a choice. I myself prefer a tighter relationship because after all the nature of data communications is engineering instead of pure science.

With the choice of a tighter relationship between research and development, over a half of my research topics derived from development projects. This is particularly true with the prevalence of Linux and open source resources since late 90s. A rule of thumb is if I don’t know how to develop it I would not research on it. My 20-year research career at National Chiao Tung University (NCTU) has spanned into several areas, including cable TV networks, wireless, Internet QoS, deep packet inspection, traffic forensics, and network and embedded testing. In addition to 102 journal papers, 51 conference papers, and 31 filed patents, 165 industry-oriented articles (in Chinese) and 3 books were written.

 

Cable and Multi-hop Cellular
   Triggered by the development of bi-directional coaxial cable TV networks in mid-90s and a project sponsored by a company were our research on hybrid fiber coaxial (HFC) networks, with some well cited works on minislot allocation and scheduling, including HFC protocol design [1], IEEE 802.14 standardization [2], combined allocation and scheduling [3], MPEG-aware scheduling [4], HFC protocol design and implementation issues [5], optimal minislot allocation [6], optimal ranging [7], uplink scheduling [8], and n-ary collision detection [9].

Inspired by the weakness and instability in the connectivity of ad hoc networks, we were the first to propose in the year 2000 the wireless architecture that combines cellular and ad hoc networking into multi-hop cellular. Multi-hop cellular [10] and multi-hop WLAN [11] have been cited over 600 times with many follow-up works, including two special issues and four main-stream industrial standards. Supported by an industry project, we later extended this direction of research into mesh networking, with a turn-key development [12], a design of multi-channel with fewer radios [13], and an experimental study [14].

 

Internet QoS
   Research works on Internet QoS were fostered by the surge of Internet growth in late 90s and early 2000s. With the abundant Linux and open source resources, we were able to prototype a QoS-enabled router. On that router, we developed and experimented a series of algorithms for (1) admission control (bandwidth brokers [15] and measurement-based admission control [16]), (2) scheduling (preemptive DRR [17], applying fair queuing to WLAN [18], applying fair queuing to request scheduling [19], request scheduling for DiffServ [20], multi-resource request scheduling for DiffServ [21], scheduling for GPRS [22], scheduling for WiMAX [23], DiffServ over network processors [24]), (3) classification (lookup-and-bypass classification [25]), (4) queue management (benchmarking bandwidth management techniques [26], TCP rate shaping [27], link load balancing [28], codec-aware VoIP playout [29]), (5) QoS routing (QoS routing granularity in MPLS [30], service-sensitive routing in MPLS [31]), (6) multicasting (RP relocation in PIM-SM [32]), and (7) TCP-friendly congestion control (comparing TCP-friendly congestion control schemes [33], TCP-equivalent rate control [34]). 

 

Deep Packet Inspection with Two Spin-offs
   While bandwidth became abundant and security issues arose in early 2000s, we moved the focus to deep packet inspection mainly for Internet security. The previous prototyped QoS-enabled router was turned into a 7-in-1 security gateway with routing, bandwidth management, NAT (Network Address Translation), firewall, VPN (Virtual Private Network), IDS (Intrusion Detection System), and content filtering (or called application firewall). The latter two and some other new functions require deep packet inspection on application headers and payloads, which is much slower than handling TCP/IP headers. To speed up deep packet inspection, we profiled many security packages (profiling string matching [35]), changed software architectures (integrated security gateway [36], content security gateway [37], in-kernel P2P management [38], stream-based anti-virus [39], scalable one-to-many streaming [40]), designed new algorithms for string matching (string matching for deep packet inspection [41], sub-linear string matching [42], content filtering with early decision [43]), and implemented string or classification matching into network processor (core-centric network processor [44], memory-intensive network processors [45], thread allocation in network processors [46], VPN over network processors [47]) and FPGA/SoC hardware (sub-linear string matching hardware with bloom filters [48], string matching automata with root hashing [49], scalable automata with indexing and hashing [50], automata in SoC [51]). In this stage, we built the d→R research model where Linux-based development (open source development [52], embedded Linux [53]) triggered research issues and the proposed solutions were evaluated through experiments on developed systems. The side effects of this research model include a start-up, L7 Networks Inc. (www.L7.com.tw) since 2002, and a test lab, Network Benchmarking Lab (NBL, www.nbl.org.tw) since 2002, examining and benchmarking security, switch/router, WLAN, and VoIP, and more recently LTE and handheld products.

 

Traffic Forensics at NBL
   NBL operations were purely development efforts without research until we established an on campus beta site in the dormitory network. Research issues arose when we started to use real traffic to test network products. Real traffic has been proved to be effective in triggering product defects which would otherwise become customer found defects instead of lab found defects. However, understanding and manipulating real traffic is non-trivial. Thus, another series of research were conducted, including testbed design (on campus beta site [54], NAT compatibility testbed [55-57], IPv6 beta site [58]), traffic replay (Socket Replay [59], WLAN Replay [60], ProxyReplay [61], Multi-Port Replay [62]), test coverage analysis and optimization [63], traffic forensics (PCAP Lib [64], bug traces [65]), intrusion analysis (taint tracker for buffer overflow detection [66], evasion through IDS [67], attack session extraction [68], false positive and negative analysis in intrusion detection [69], weighted voting [70]), malware analysis (secure malware analysis environment [71], active and passive malware collection [72], malware classification [73], botnet detection [74]), and security criteria [75]. Research along this track is still on-going and may continue for a few more years.

 

Embedded Benchmarking Lab (EBL)

In the meantime, to span from network devices to handheld client devices, we established another lab, Embedded Benchmarking Lab (EBL, www.ebl.org.tw) in 2011. EBL reviews smartphones and touchpads in terms of functionality, performance, power consumption, stability, and GUI smoothness. Another series of research works are being developed from EBL, which range from performance profiling (bottleneck analysis on Android applications [76], multi-resolution profiler on Android applications [77]), cloud offloading with time-and-energy awareness [78], Android malware detection [79], and smartphone GUI testing [80-81]. This is a relatively young research area with potentials of good impact on embedded systems in general, smartphones, tablets, and other handheld or future wearable devices. The concerned issues are usually not on protocol aspects but on software and hardware components in embedded systems.

 

Software Defined Networking (SDN)

           With the same process of research led by development, we are getting into an emerging area, namely software defined networking (SDN). We view SDN as the second wave of cloud computing happening to networking, with the control plane being centralized and virtualized into the cloud while leaving the data plane at the customer side. SDN deployment started from data centers and now expands to the model of “networking as a service” (NaaS) offered by the operators to enterprise and residential subscribers. By centralizing the control-plane software of routers and switches to the controller and its applications, and controlling the data-plane of these devices remotely, SDN reduces the capital expenditure (CAPEX) and operational expenditure (OPEX) because the devices become simpler and hence cheaper and number of administrators could be reduced. SDN also enables fast service orchestration because the data plane is highly programmable from the remote control plane at controllers and applications. It is deemed to bring the biggest change to the data communications industry in this decade.

We are in the process of developing an SDN solution to control and manage campus switches and Wi-Fi access points, a test lab with test capabilities on conformance, interoperability, performance, stability, and test tools. Through this development process, research issues are being identified and investigated. Among them, standardization plays the foundation role to evolve the OpenFlow, the southbound API between controllers and switches, converge the northbound API between controllers and applications, extend the basic SDN architecture by service chaining (SC) and network function virtualization (NFV) to accommodate value-added services, and test systems and products in terms of conformance, interoperability, performance, and functionality. Other advanced research issues include performance and scalability of switches, controllers, and applications, security of SDN itself and security services offered by SDN, and use cases in all possible domains from data centers, operators of wired and wireless infrastructures, enterprises, homes, down to smartphones, wearable computers, and machine-to-machine (M2M) systems. Though there are papers published or being published on SDN, generic architectures and algorithms, and solid modeling and analysis are yet to be researched.

The rest of this article is organized as follows. We highlight five results and their impacts in five short sections. Section 2 gives a closer look at multi-hop cellular. Section 3 expands the roadmap on deep packet inspection. Section 4 and Section 5 zoom into the operations of NBL and EBL. The textbook “Computer Networks: An Open Source Approach” [82] is briefed in Section 6. Learned lessons summarized in Section 7 could be useful career tips for junior researchers.

2. Multi-hop Cellular Communications

This work presents a new architecture, multi-hop cellular network (MCN), for wireless communications. MCN preserves the benefit of conventional single-hop cellular networks (SCN) where the service infrastructure is constructed by fixed bases, and it also incorporates the flexibility of ad-hoc networks where wireless transmission through mobile stations in multiple hops is allowed. MCN can reduce the required number of bases or improve the throughput performance, while limiting path vulnerability encountered in ad-hoc networks. In addition, MCN and SCN are analyzed, in terms of mean hop count, hop-by-hop throughput, end-to-end throughput, and mean number of channels (i.e. simultaneous transmissions) under different traffic localities and transmission ranges. Numerical results demonstrate that the throughput of MCN exceeds that of SCN, the former also increases as the transmission range decreases. The above results can be accounted for by the different orders, linear and square, at which the mean hop count and mean number of channels increase, respectively.

We were the first to propose the architecture and analyze the capacity of multi-hop cellular networking back in 2000. The concept of “relaying within a cell” started from our Infocom 2000 paper. We proposed the architecture that evolved from ad hoc and cellular networks. It has been proved mathematically that its capacity grows linearly as the transmission range decreases because the hop count and the number of channels grow linearly and quadratically, respectively. We also designed and implemented a WLAN prototype with multi-hop relaying to access points. Recently we combined the multiple channel concept with 802.11s mesh networking, where few radios switch between channels. The solution and its firmware were licensed to Realtek Semiconductor as a turn-key solution bundled with Realtek’s WLAN chipsets.

Since 2000, our Infocom paper has received over 600 citations from papers, patents, books, and special issues. It was included as a theme topic in at least two books: Next Generation Mobile Access Technologies (Haas and McLaughlin, Cambridge, 2007) and Ad Hoc Networks (Wu and Stojmenovic (editors), IEEE Computer Society, 2004). Two special issues have been dedicated to the concept of multi-hop cellular: IEEE Communications Magazine (2007) and EURASIP Journal on Advanced in Signal Processing (2008). The paper was cited by several patents (US 7,145,892 in 2006, EP 1,481,517 in 2006, etc.) and has served as the foundation of many other patents that utilize relaying within a cell. One recent Ph.D. dissertation in Finland (Doppler, 2010) investigated various relaying techniques within cellular systems, and started by citing our Infocom paper. The work on multi-hop cellular has had long lasting impact not only on academia but also on industry. Relaying within a cell or towards an access point or base station has been standardized in IEEE 802.11s (1.0 in 2006, 2.0 in 2008, 3.0 in 2009 and 2011), WiMAX (IEEE 802.16j-06/013r3 in 2007, IEEE C802.16m-08/1436r1 in 2008), Bluetooth (IEEE 802.15.5), and under development within 3GPP LTE-advanced.

3. Deep Packet Inspection

From 2000, we started an investigation of deep packet inspection (DPI) examining application headers and payloads of incoming packets for application-aware and malicious traffic management. In comparison with table lookup of destination IP address and 5-tuple (source/dest IP address and port number, protocol ID) done in routers and firewalls, DPI requires signature matching on the variable-length application header and payload to look for specific applications, intrusions, viruses, malware, and spam, a much heavier process than the traditional table lookup. We started from restructuring packet flows within Linux systems. Next we designed string matching algorithms that could scale well over tens of thousands of signatures, and then implemented the algorithms in hardware and SoC designs to scale to multi-Gbps in throughput. This research roadmap on DPI, software – algorithm – hardware – SoC, has interleaved development with research. The Linux-based development fostered a startup in 2002, L7 Networks Inc. L7 addressed the market of content-aware networking with DPI, and was later acquired by D-Link Corp.

After developing and researching DPI engines, we moved on to apply DPI to traffic forensics, in particular for product testing at NBL. We established the first “on campus beta site”, where potential defects could be detected earlier from “live” traffic at the beta site or from “replayed” traffic at NBL than at customer premises. NBL has developed the techniques of Beta Site (with redundancy for fast recovery), PCAP Lib (a classified library of packet traces), ILLT (In-Lab Live Testing, replay framework and tools), etc. Compared to the other test labs that depend solely on artificial traffic generated by test tools, NBL’s approach to use live and replayed real traffic, labeled RealFlow, is world-wide unique. It has opened a unique opportunity for traffic forensics research in academia and for real traffic testing in industry.

4. Network Benchmarking Lab (NBL)

Founded NBL in 2002, NBL started as a customized testing service provider, grew to be a test solution/tool provider from 2005, and added the world-wide unique RealFlow real traffic testing from 2007. It has served over 100 companies, tested over 600 products, grown to a staff of 23 full-time engineers plus 20 students, and has been 2/3-supported by industry and 1/3 by government agencies. Positioning itself as a real traffic test lab, NBL has also developed its research roadmap along beta site, packet trace library, in-lab replay testing, malware sample database, etc. Based on the local significance established in the first decade, NBL has a chance to establish its global significance in the next decade.

NBL is operated in a 3-line structure, where the 1st-line (mostly full-time engineers) test products, the 2nd-line (a mixture of engineers and students) develop tools, and the 3rd-line (mostly graduate students) research techniques. Students are arranged to help engineers in the 1st and 2nd lines for one year to get familiar with the products, tools, and development environments, which enables them to identify a research topic from the development work. Important milestones are listed as follows.

l   2001 — Pre-NBL: public benchmarking events with an IT magazine (2001~2010: security gateway, bandwidth manager, Web switch, ISP QoS, e-commerce, WLAN, CDN, IPv6 router, L2/L3 switch, VoIP, IDS, VoWLAN, 10G, Android smartphone, etc.)

l   2002 — Officially launched

l   2003 — MOU signed with UNH-IOL

l   2004 — First Plugfest (interoperability) in Taiwan

l   2007 — NCTU Beta Site established

l   2009 — First RealFlow certificate issued, Live SOHO launched

l   2010 — Live Security launched, PCAP Lib and ILLT released

l   2011 — ACTS (Automatic Control Test System) first version released, sister lab EBL (Embedded Benchmarking Lab) launched

l   2012 — ISO 17025 certified lab, NCC certified lab, NCC security criteria developed

 

5. Embedded Benchmarking Lab (EBL)

Following the same philosophy and footprint of NBL, EBL digs into handheld devices, including smartphones and tablets. These devices are client-side devices instead of networking devices, which means the industry served by EBL would be different from the one served by NBL. We consolidated a series of test methodologies and tools into EBL Test Suite v1.0 in the first three years with efforts on benchmarking, profiling, and optimization. In most cases, benchmarking, profiling, and optimization treat the devices as black boxes, grey boxes, and white boxes, respectively.

The overall objective is to provide methodologies and tools to cover all layers of smartphones. In particular, for Android systems, this could range from Java apps, Dalvik virtual machine, runtime library, Linux kernel, down to drivers and hardware.

 

6. Computer Networks: An Open Source Approach

Computer Networks undoubtedly is one of the key technologies of Information Technologies. Many textbooks are available on the shelves which adopted quite different approaches, from traditional, and sometimes dry, protocol descriptions to the application-driven top-down approach and the system-aspect approach. This book, as its title indicated, takes a different approach from that of previous books, i.e., an open source approach. Besides written with logic reasoning minds and emphasizing more on why a protocol is designed that way than how a protocol works, this book tries to fill the gap between knowledge and skills by tracing the source code such that readers could learn where and how the protocol designs could be implemented. We found this “open source approach” quite effective in building readers’ know-how on protocol implementation, which makes this book very unique.

This book adopts traditional bottom up approach when introducing the architecture of computer networks. It consists of eight chapters where chapter 1 covers network concepts and philosophies that even junior instructors might benefit from reading it, chapter 2 to chapter 6 covers the TCP/IP reference model. Chapter 7 and chapter 8 cover advanced topics on Internet QoS and security, respectively. The protocol description text is interleaved with 56 representative open source implementations, ranging from the Verilog or VHDL code of codec, modem, CRC32, CSMA/CD, and crypto, to the C code of adaptor driver, PPP daemon and driver, longest prefix matching, IP/TCP/UDP checksum, NAT, RIP/OSPF/BGP routing daemons, TCP slow-start and congestion avoidance, socket, popular packages supporting DNS, FTP, SMTP, POP3, SNMP, HTTP, SIP, streaming, P2P, to QoS features such as traffic shaper and scheduler, and security features such as firewall, VPN, and intrusion detection. In addition, each open source is explained in a systematic way, including overview, data structures, call flow, algorithm, and code tracing. Furthermore, each open source is followed by hands-on exercises to equip readers with system-awareness and hands-on skills.

At the end of each chapter, besides written exercises, this book also provides hands-on Linux-based exercises which echo its goal again. It also provides end-of-chapter FAQ to help readers identify key concepts of each chapter. It also embeds 69 sidebars of Historical Evolution (33), Principle in Action (26), and Performance Matters (10) to highlight evolutions, principles, and performance numbers, respectively.

As compared to the most popular textbook on computer networks written by Kurose and Ross, this book emphasizes less on socket programming and java programming on applications, and network simulations. Kurose and Ross’s book also spends more pages on discussing the underlying rationale on a specific topic, such as reliable transmission, which makes their book more suitable for undergraduate students. On the other hand, this book provides wider coverage on current technologies, especially on physical layer, Internet QoS, security, and wireless technologies, which makes it more suitable for senior undergraduate and graduate students in Computer Science or Electrical Engineering. We have maintained a Facebook community for Q&A at www.facebook.com/CNFBs, which is a plus for both instructors and students.

Here are two quotes from the book reviews: “The exposure to real life implementation details in this book is phenomenal...Definitely one of the better books written in the area of Computer Networks.”  “I have never seen a book giving such details on explaining the design and implementation of such practical systems...Those open source implementations are excellent demonstrations for practical networking systems.”

 

7. Lessons

There are several lessons accumulated over the past two decades and summarized as follows.

(1)       Development vs. Research

1.1           Build the depth of the research team with the front line on development and the back line on research, which helps identifying real problems and feasible solutions.

1.2           The best way to tightly couple both lines is to send researchers to the front line for quite a while before they do research in the back line.

1.3           Develop first, then research. Research is the non-trivial parts identified in the process of development.

1.4           The performance numbers on most (>90%) papers are from analysis or simulation. Very few are from the experiments on real implementations. The solutions on papers might not be feasible, and their problems might not be real either. There are very few societies in IEEE with a good balance between development and research, and, unfortunately, the communications society is not one of them.

1.5           The industry needs big development (i.e., products) and small research (i.e., patents), while the academia needs big research (i.e., papers) and small development (i.e., prototypes). To collaborate better, the industry needs to grow its research and the academia needs to grow its development.

(2)       Research Roadmap vs. Random Picks

2.1           Compared to random picks of topics, it is certainly better to form a research roadmap with a series of works addressing related problems in the same area, which helps researchers to construct deeper understanding about domain knowledge and related works.

2.2           However, don’t rule out the possibility of innovation out of imagination. The off-roadmap topics could be rewarding too as we often see more clearly what goes wrong than the existing players when we are newcomers to an issue.

(3)       Conferences vs. Journals/Magazines

3.1           In US, it is very common to clock research by conference deadlines. However, it is difficult in Taiwan due to the constraints on travel budget. One could publish a dozen of journal papers per year but not even three conference papers per year. Thus, in Taiwan, we are forced to abandon the conference-driven model and embrace the journal-driven model which does not have clear clock ticks.

3.2           The review process in journals and magazines has been shortened compared to last decade, due to the on-line processing. The time-to-publish in journals and magazines becomes more comparable to conferences. However, in the computer society and communications society, several top conferences appear to be more influential than journals and magazines.

(4)       Academic Services vs. Academic Cooperation

4.1           Academic services through editorial boards, program committees, or technical committees might or might not bring academic cooperation. But knowing the rules of the game certainly helps in planning the publication venues.

4.2           It takes extra effort to build and maintain the external or international cooperation. But it still pays to do so because it brings in new or different thoughts and resources.

(5)       Other Lessons

5.1           Duplicating others (e.g. UNH/IOL) has no value.

5.2           Real traffic testing is indeed unique.

5.3           A work with high impact on the industry might not have high impact on the academia, and vice versa.

5.4           A high-impact paper might be rejected in its early version.

5.5           Many papers in top journals or conferences have low impact eventually. The review process can screen regarding quality but usually not impact.


 

References

 

[1]         Ying-Dar Lin, Chia-Jen Wu, and Wei-Ming Yin, "PCUP: Pipelined Cyclic Upstream Protocol over Hybrid Fiber Coax," IEEE Network, Vol. 11, No. 1, pp.24-34, January/February 1997.

[2]         Ying-Dar Lin, "On IEEE 802.14 Medium Access Control Protocol," IEEE Communications Surveys, September 1998.

[3]         Ying-Dar Lin, Chen-Yu Huang, Wei-Ming Yin, "Allocation and Scheduling Algorithms for IEEE 802.14 and MCNS in Hybrid Fiber Coaxial Networks," IEEE Transactions on Broadcasting, Vol.44, No.4, pp. 427-435, December 1998.

[4]         Ying-Dar Lin and Chun-Mo Liu, "A Timestamp-Sensitive Scheduling Algorithm for MPEG-II Multiplexers in CATV Networks," IEEE Transactions on Broadcasting, Vol. 44, No.3, pp.336-345, September 1998.

[5]         Ying-Dar Lin, Wei-Ming Yin, Chen-Yu Huang, "An Investigation on HFC MAC Protocols: Design, Analysis, and Implementation Issues," IEEE Communications Surveys, vol.3, no.3, third quarter 2000.

[6]         Wei-Ming Yin and Ying-Dar Lin, "Statistically Optimized Minislot Allocation in Hybrid Fiber Coaxial Networks," IEEE Journal on Selected Areas in Communications, vol. 18, issue 9, pp.1764-1773, Sept. 2000.

[7]         Yeong-Sung Lin, Wei-Ming Yin, Ying-Dar Lin, Chih-Hao Lin, "Optimal Ranging Algorithms for Medium Access Control in Hybrid Fiber Coax Networks," IEICE Transactions on Communications, Vol.E85-B, No.10 October 2002.

[8]         Wei-Ming Yin, Chia-Jen Wu, Ying-Dar Lin, "Two-phase Minislot Scheduling Algorithm for HFC QoS Services Provisioning," IEICE Transactions on Communications, Vol.E85-B, No.3 March 2002.

[9]         Wei-Ming Yin and Ying-Dar Lin, "Interleaving Collision Resolution Engines in n-ary Tree Protocols," IEEE Communications Letters, Vol. 5, No. 12, December 2001.

[10]     Ying-Dar Lin and Yu-Ching Hsu, "Multihop Cellular: A New Architecture for Wireless Communications," IEEE INFOCOM, Tel Aviv, Israel, March 2000.

[11]     Ying-Dar Lin, Yu-Ching Hsu, Kuan-Wen Oyang, Dong-Su Yang, Tzu-Chieh Tsai, "Multihop Wireless IEEE 802.11 LANs: A Prototype Implementation," Journal of Communications and Networks, vol.2, no.4, Dec. 2000.

[12]     Ying-Dar Lin, Shiao-Li Tsao, Shun-Lee Chang, Shau-Yu Cheng, and Chia-Yu Ku, "Design Issues and Experimental Studies of Wireless LAN Mesh," IEEE Wireless Communications, Vol. 17, Issue 2, pp. 32-40, April 2010.

[13]     Chia-Yu Ku, Ying-Dar Lin, Shiao-Li Tsao, Yuan-Cheng Lai, "Utilizing Multiple Channels with Less Radios in Wireless Mesh Networks," IEEE Transactions on Vehicular Technology, Vol. 60, Issue 1, pp. 263-275, January 2011.

[14]     Ying-Dar Lin, Shun-Lee Chang, Jui-Hung Yeh, Shau-Yu Cheng, "Indoor Deployment of IEEE 802.11s Mesh Networks: Lessons and Guidelines," Ad Hoc Networks, May 2011.

[15]     Ying-Dar Lin, Cheng-Hsien Chang, Yu-Ching Hsu, "Bandwidth Brokers of Instantaneous and Book-Ahead Requests for Differentiated Services Networks," IEICE Transactions on Communications, Vol.E85-B, No.1, January 2002.

[16]     Chih-Chiang Chuang, Yea-Li Sun, Ying-Dar Lin, "Dynamic Resizing of Utilization Target in Measurement-Based Admission Control," Computer Communicatios, Vol. 24, Issues 11-15, pp.1097-1104, June 2001.

[17]     Shih-Chiang Tsao and Ying-Dar Lin, "Pre-order Deficit Round Robin: A New Scheduling Algorithm for Packet-switched Networks," Computer Networks, Vol. 35(2-3), pp. 287-305, 2001.

[18]     Huan-Yun Wei, Ching-Chuan Chiang, and Ying-Dar Lin, "Co-DRR: An Integrated Uplink and Downlink Scheduler for Bandwidth Management over Wireless LANs," IEICE Transactions on Communications, Vol E90-B, No. 12, pp. 2022-2033, August 2007.

[19]     Shih-Chiang Tsao, Yuan-Cheng Lai, Le-Chi Tsao, Ying-Dar Lin, "On Applying Fair Queuing Discipline to Schedule Requests at Access Gateway for Downlink Differential QoS," Computer Networks, Sep. 2008.

[20]     Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, Shuo-Yen Wen, Yuan-Cheng Lai, "Request Scheduling for Differentiated Web QoS at Website Gateways," Journal of Internet Technology, Vol 9, No. 3, Aug 2008.

[21]     Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, Ruo-Hua Feng, Yuan-Cheng Lai, "Multi-Resource Request Scheduling for Differentiated QoS at Website Gateways," Computer Communications, Vol. 31, Issue 10, pp. 1993-2004, June 2008.

[22]     Yu-Ching Hsu, Mei-Yen Chiang, Ying-Dar Lin, "Two-Stage Dynamic Uplink Channel and Slot Assignment for GPRS," IEICE Transactions on Communications, Vol.E85-A, No.1, January 2003.

[23]     Yi-Neng Lin, Che-Wen Wu, Ying-Dar Lin, Yuan-Cheng Lai, "Highest Urgency First (HUF): A Latency and Modulation Aware Bandwidth Allocation Algorithm for WiMAX Base Stations," Computer Communications, Volume 32, Issue 2, Pages 332-342, 12 February 2009.

[24]     Ying-Dar Lin, Yi-Neng Lin, Shun-Chin Yang, Yu-Sheng Lin, "DiffServ Edge Router over Network Processors: Implementation and Evaluation," IEEE Network, Special Issue on Network Processors, Vol. 17, Issue 4, pp. 28-34, July-Aug 2003. 

[25]     Ying-Dar Lin, Huan-Yun Wei, Kuo-Jui Wu, "Ordered Lookup with Bypass Matching for Scalable Per-Flow Classification in Layer 4 Routers," Computer Communications, Vol. 24, Issues 7-8, pp.667-676, April 2001.

[26]     Huan-Yun Wei and Ying-Dar Lin, "A Survey and Measurement-Based Comparison of Bandwidth Management Techniques," IEEE Communications Surveys and Tutorials, Vol.5 No.2, 4th Quarter 2003.

[27]     Huan-Yun Wei, Shih-Chiang Tsao, Ying-Dar Lin, "Assessing and Improving TCP Rate Shaping Over Edge Gateways," IEEE Transactions on Computers, Vol. 53, Issue 3, pp. 259-275, March 2004.

[28]     Ying-Dar Lin, Shih-Chiang Tsao, Un-Pio Leong, "On-the-Fly TCP Path Selection Algorithm in Access Link Load Balancing," Computer Communications, Vol. 30, Issue 2, pp. 351-357, January 2007.

[29]     Kuo-Kun Tseng, Ying-Dar Lin, Yuan-Cheng Lai, "Perceptual Codec and Interaction Aware Playout Algorithms and Quality Measurement for VoIP Systems," IEEE Transactions on Consumer Electronics, Vol. 50, Issue 1, pp. 297-305, Feb 2004.

[30]     Ying-Dar Lin, Nai-Bin Hsu, Ren-Hung Hwang, "QoS Routing Granularity in MPLS Networks," IEEE Communications Magazine, June 2002.

[31]     Nai-Bin Hsu, Ying-Dar Lin, Mao-Huang Lee, Tsern-Huei Lee, "Service-Sensitive Routing in DiffServ/MPLS Networks," IEICE Transactions on Communications, Vol. E84-B, No. 10, October 2001.

[32]     Ying-Dar Lin, Nai-Bin Hsu, Ren-Hung Hwang, "RP Relocation Extension to PIM-SM Multicast Routing," IETF Internet-Draft, draft-ydlin-pim-sm-rp-00.txt, April 2001; also RPIM-SM: Extending PIM-SM for RP Relocation, Computer Communications, Volume 25, Issue 18-1, December 2002, pp. 1774-1781.

[33]     Shih-Chiang Tsao, Yuan-Cheng Lai, and Ying-Dar Lin, "Taxonomy and Evaluation of TCP-Friendly Congestion-Control Schemes on Fairness, Aggressiveness, and Responsiveness," IEEE Network, Vol 21, No. 6, pp. 6-15, November/December 2007.

[34]     Shih-Chiang Tsao, Yuan-Cheng Lai, Ying-Dar Lin, "A Fast Converging TCP-Equivalent Window-Averaging Rate Control Scheme," 2012 International Symposium on Performance Evaluation of Computer and Telecommunications Systems (SPECTS), July 2012. (with Best Paper Award)

[35]     Po-Ching Lin, Zhi-Xiang Li, Ying-Dar Lin, Yuan-Cheng Lai, "Profiling and Accelerating String Matching Algorithms in Three Network Content Security Applications ," IEEE Communications Surveys and Tutorials, 2nd quarter, 2006.

[36]     Ying-Dar Lin, Huan-Yun Wei, Shao-Tang Yu, "Building an Integrated Security Gateway: Mechanisms, Performance Evaluation, Implementation, and Research Issues," IEEE Communication Surveys and Tutorials, Vol.4, No.1, third quarter, 2002.

[37]     Ying-Dar Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Cheng Lai, "Designing an Integrated Architecture for Network Content Security Gateways," IEEE Computer, Vol. 39, Issue 11, pp. 66-72, November 2006.

[38]     Ying-Dar Lin, Po-Ching Lin, Meng-Fu Tasi, Tsao-Jiang Chang and Yuan-Cheng Lai, "kP2PADM: An In-kernel Architecture of P2P Management Gateway," IEICE Transactions Information and Systems, vol.E91-D, No.10, Oct. 2008.

[39]     Ying-Dar Lin, Szu-Hao Chen, Po-Ching Lin and Yuang-Chen Lai, "A Stream-based Mail Proxy with Interleaved Decompression and Virus Scanning," Journal of Systems and Software, vol. 81, issue. 9, pp. 1517-1524, Sep. 2008.

[40]     Ying-Dar Lin, Chia-Yu Ku, Yuan-Cheng Lai, Chia-Fon Hung, "In-kernel Relay for Scalable One-to-Many Streaming," IEEE Multimedia, Volume 20, Issue 1, pp. 69-79, January-March 2013.

[41]     Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai and Tsern-Huei Lee, "Using String Matching for Deep Packet Inspection," IEEE Computer, Vol. 41, Issue 4, pp. 23-28, Apr. 2008.

[42]     Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai, Tsern-Huei Lee, "A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning," IEEE Transactions on Computers, Vol. 60, No. 4, pp. 594-601, April 2011.

[43]     Po-Ching Lin, Ming-Dao Liu, Ying-Dar Lin, Yuan-Cheng Lai, "Accelerating Web Content Filtering by the Early Decision Algorithm," IEICE Trans. Information and Systems, vol. E91-D, no. 2, Feb. 2008, pp. 251-257.

[44]     Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai, "Modeling and Analysis of Core-centric Network Processors," ACM Transactions on Embedded Computing Systems, Vol. 7, No. 4, Article 41, July 2008.

[45]     Yi-Neng Lin, Yao-Chung Chang, Ying-Dar Lin, and Yuan-Cheng Lai, "Resource Allocation in Network Processors for Memory Access Intensive Applications," Journal of Systems and Software, Vol. 80, Issue 7, July 2007.

[46]     Yi-Neng Lin, Ying-Dar Lin, and Yuan-Cheng Lai, "Thread Allocation in CMP-based Multithreaded Network Processors," Parallel Computing, vol. 36, issues 2-3, pp. 104-116, Feb./March 2010.

[47]     Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-Cheng Lai, "VPN Gateways over Network Processors: Implementation and Evaluation," Journal of Internet Technology, Vol. 11, No. 4, July 2010.

[48]     Po-Ching Lin, Ying-Dar Lin, Yi-Jun Zheng, Yuan-Cheng Lai and Tsern-Huei Lee, "Realizing a Sub-linear Time String-Matching Algorithm with a Hardware Accelerator Using Bloom Filters," IEEE Transactions on VLSI Systems, Vol. 17, No. 8, pp. 1008-1020, August 2009.

[49]     Kuo-Kun Tseng, Ying-Dar Lin, Tsern-Huei Lee, Yuan-Cheng Lai, "Deterministic High-Speed Root-Hashing Automaton Matching Coprocessor for Embedded Network Processor," ACM Computer Architecture News, Vol. 35, Issue 3, pp. 36-43, June 2007.

[50]     Kuo-Kun Tseng, Yuan-Cheng Lai, Ying-Dar Lin, Tsern-Huei Lee, "A Fast Scalable Automaton Matching Accelerator for Embedded Content Processors," ACM Transactions on Embedded Computing Systems, Vol. 8, No. 3, Article 19, April 2009.

[51]     Ying-Dar Lin, Kuo-Kun Tseng, Tseng-Huei Lee, Chen-Chou Hung, and Yuan-Cheng Lai, "A Platform-Based SoC Design and Implementation of Scalable Automaton Matching for Deep Packet Inspection," Journal of System Architecture, Vol 53, Issue 12, pp. 937-950, December 2007.

[52]     Ming-Wei Wu and Ying-Dar Lin, "Open Source Software Development: An Overview," IEEE Computer, pp.33-38, June 2001.

[53]     Chi-Heng Chou, Tsung-Hsien Yang, Shih-Chiang Tsao, and Ying-Dar Lin, "Standard Operating Procedures for Embedded Linux Systems," Linux Journal, Issue 160, pp. 88-92, Aug 2007.

[54]     Ying-Dar Lin, I-Wei Chen, Po-Ching Lin, Chang-Sheng Chen, Chun-Hung Hsu, "On Campus Beta Site: Architecture Designs, Operational Experience, and Top Product Defects," IEEE Communications Magazine, Vol. 48, Issue 12, December 2010.

[55]     Ying-Dar Lin, Chien-Chao Tseng, Cheng-Yuan Ho, and Yu-Hsien Wu, "How NAT-Compatible are VoIP Applications?," IEEE Communications Magazine, Vol. 48, Issue 12, pp. 58-65, December 2010.

[56]     Cheng-Yuan Ho, Fu-Yu Wang, Chien-Chao Tseng, Ying-Dar Lin, "NAT-Compatibility Testbed: An Environment to Automatically Verify Direct Connection Rate," IEEE Communications Letters, Vol. 15, Issue 1, pp. 4-6, January 2011.

[57]     Cheng-Yuan Ho, Chien-Chao Tseng, Fu-Yu Wang, Jui-Tang Wang, and Ying-Dar Lin, "To Call or to Be Called behind NATs Is Sensitive in Solving the Direct Connection Problem," IEEE Communications Letters, Vol. 15, Issue 1, pp. 94-96, January 2011.

[58]     Ying-Dar Lin, Ren-Hung Hwang, Raghavendra Kulkarni, Shiau-Huey Wang, Chinyang Henry Tseng, Chun-Hung Hsu, "On Campus IPv6 Beta Site: Requirements, Solutions, and Product Defect Evaluation," Journal of Internet Technology, to appear.

[59]     Ying-Dar Lin, Po-Ching Lin, Tsung-Huan Cheng, I-Wei Chen, Yuan-Cheng Lai, "Low-Storage Capture and Loss-Recovery Selective Replay of Real Flows," IEEE Communications Magazine, Volume 50, Issue 4, pp. 114-121, April 2012.

[60]     Chia-Yu Ku, Ying-Dar Lin, Yuan-Cheng Lai, Pei-Hsuan Li, Kate Ching-Ju Lin, "Real Traffic Replay over WLAN with Environment Emulation," IEEE Wireeless Communications and Networking Conference (WCNC 2012), Paris, France, April 2012.

[61]     Chun-Ying Huang, Ying-Dar Lin, Peng-Yu Liao, and Yuan-Cheng Lai, "Stateful Traffic Replay for Web Application Proxies," Security and Communication Networks, to appear.

[62]     Ying-Dar Lin, Po-Ching Lin, Yu-An Lin, Yuan-Cheng Lai, "On-The-Fly Capture and Replay Mechanisms for Multi-port Network Devices in Operational Networks," IEEE Transactions on Network and Service Management, Vol. 11, No. 2, June 2014.

[63]     Ying-Dar Lin, Chi-Heng Chou, Yuan-Cheng Lai, Tze-Yau Huang, Simon Chung, Jui-Tsun Hung, Frank C. Lin, "Test Coverage Optimization for Large Code Problems," Journal of Systems and Software, Volume 85, Issue 1, pp. 16-27, January 2012.

[64]     Ying-Dar Lin, Po-Ching Lin, Sheng-Hao Wang, I-Wei Chen, Yuan-Cheng Lai, "PCAPLib: A System of Extracting, Classifying, and Anonymizing Real Packet Traces," IEEE Systems Journal, to appear.

[65]     Ying-Dar Lin, Chun-Nan Lu, Yuan-Cheng Lai, Zongo Pawendtaore Eliezer, "Bug Traces: Identifying and Downsizing Packet Traces with Failures Triggered in Networking Devices," IEEE Communications Magazine, Volume 52, Issue 4, pp. 112-119, April 2014.

[66]     Ying-Dar Lin, Fan-Cheng Wu, Tze-Yau Huang, Yuan-Cheng Lai, Frank C. Lin, "Embedded TaintTracker: Lightweight Run-time Tracking of Taint Data Against Buffer Overflow Attacks," IEICE Transactions on Information and Systems, Vol. E94.D, No. 11, pp.2129-2138, 2011.

[67]     Tsung-Huan Cheng, Ying-Dar Lin, Yuan-Cheng Lai, Po-Ching Lin, "Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems," IEEE Communications Surveys and Tutorials, Volume 13, Issue 4, 2012.

[68]     I-Wei Chen, Po-Ching Lin, Tsung-Huan Cheng, Chi-Chung Luo, Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin, "Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems," International Journal of Network Security, Vol.14, No.5, pp. 243-250, September 2012.

[69]     Cheng-Yuan Ho, Ying-Dar Lin, Yuan-Cheng Lai, I-Wei Chen, Fu-Yu Wang and Wei-Hsuan Tai, "False Positives and Negatives from Real Traffic with Intrusion Detection/Prevention Systems," International Journal of Future Computer and Communication, Vol.1, No.2, August 2012.

[70]     Ying-Dar Lin, Yuan-Cheng Lai, Cheng-Yuan Ho, Wei-Hsuan Tai, "Creditability-based Weighted Voting for Reducing False Positives and Negatives in Intrusion Detection," Computers & Security, October 2013.

[71]     Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu, Yuan-Cheng Lai, "Secure and Transparent Network Traffic Replay, Redirect, Relay in a Dynamic Malware Analysis Environment," Security and Communication Networks, March 2014.

[72]     Ying-Dar Lin, Chia-Yin Lee, Yu-Sung Wu, Pei-Hsiu Ho, Fu-Yu Wang, Yi-Lang Tsai, "Active versus Passive Malware Collection," IEEE Computer, April 2014.

[73]     Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, Yuan-Cheng Lai, "Automatic Analysis and Classification of Obfuscated Bot Binaries," International Journal of Network Security, Vol. 16, No. 6, pp. 506-515, November 2014.

[74]     Kuochen Wang, Chun-Ying Huang, Li-Yang Tsai, Ying-Dar Lin, "Behavior-based Botnet Detection in Parallel," Security and Communication Networks, to appear.

[75]     Ying-Dar Lin, Chia-Yin Lee, Hao-Chuan Tsai, "Redefining Security Criteria for Networking Devices with Case Studies," IEEE Security & Privacy, January-February 2014.

[76]     Ying-Dar Lin, Cheng-Yuan Ho, Yuan-Cheng Lai, Tzu-Hsiung Du, Shun-Lee Chang, "Booting, Browsing and Streaming Time Profiling, and Bottleneck Analysis on Android-Based Systems," Journal of Network and Computer Applications (JNCA), March 2013.

[77]     Ying-Dar Lin, Kuei-Chung Chang, Yuan-Cheng Lai, Yu-Sheng Lai, "Reconfigurable Multi-Resolution Performance Profiling in Android Applications," IEICE Transactions on Information and Systems, Vol.E96-D, No.9, pp.2039-2046, September 2013.

[78]     Ying-Dar Lin, Edward T.-H. Chu, Yuan-Cheng Lai, and Ting-Jun Huang, "Time-and-Energy Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds," IEEE Systems Journal, November 2013.

[79]     Ying-Dar Lin, Yuan-Cheng Lai, Chien-Hung Chen, and Hao-Chuan Tsai, "Identifying Android Malicious Repackaged Applications by Thread-grained System Call Sequences," Computers & Security, August 2013.

[80]     Ying-Dar Lin, Edward T.-H. Chu, Shang-Che Yu, Yuan-Cheng Lai, "Improving Accuracy of Automated GUI Testing for Embedded Systems," IEEE Software, issue 99, January/February 2014.

[81]     Ying-Dar Lin, Jose F. Rojas, Edward T.-H. Chu, and Yuan-Cheng Lai, "On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices," IEEE Transactions on Software Engineering, to appear.

[82]     Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, "Computer Networks: An Open Source Approach," McGraw-Hill, February 2012.

Biography

 

Ying-Dar Lin is Distinguished Professor of Computer Science at National Chiao Tung University (NCTU) in Taiwan. He received his Ph.D. in Computer Science from UCLA in 1993. He served as the CEO of Telecom Technology Center during 2010-2011 and a visiting scholar at Cisco Systems in San Jose during 2007–2008. Since 2002, he has been the founder and director of Network Benchmarking Lab (NBL, www.nbl.org.tw), which reviews network products with real traffic. He also cofounded L7 Networks Inc. in 2002, which was later acquired by D-Link Corp. In May 2011, he founded Embedded Benchmarking Lab (www.ebl.org.tw) to extend into the review of handheld devices. His research interests include design, analysis, implementation, and benchmarking of network protocols and algorithms, quality of services, network security, deep packet inspection, P2P networking, and embedded hardware/software co-design. He recently stepped into software defined networking (SDN) and was appointed as a Research Associate from June 2014 by Open Networking Foundation (ONF). His work on “multi-hop cellular” was the first along this line, and has been cited over 600 times and standardized into WLAN mesh (IEEE 802.11s), WiMAX (IEEE 802.16j), Bluetooth (IEEE 802.15.5), and 3GPP LTE-Advanced. He was elevated to IEEE Fellow in 2013 for his contributions to multi-hop cellular communications and deep packet inspection. He is also an IEEE Distinguished Lecturer for 2014 & 2015, and currently on the editorial boards of IEEE Transactions on Computers, IEEE Computer, IEEE Network, IEEE Communications Magazine - Network Testing Series, IEEE Wireless Communications, IEEE Communications Surveys and Tutorials, IEEE Communications Letters, Computer Communications, Computer Networks, and IEICE Transactions on Information and Systems; and the lead guest editor of several special issues of IEEE journals and magazines. He published a textbook "Computer Networks: An Open Source Approach" (www.mhhe.com/lin), with Ren-Hung Hwang and Fred Baker (McGraw-Hill, 2011).