Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. HyperLogLog: Exponentially Bad in Adversarial Settings
 
conference paper

HyperLogLog: Exponentially Bad in Adversarial Settings

Paterson, Kenneth G.
•
Raynal, Mathilde  
January 1, 2022
2022 Ieee 7Th European Symposium On Security And Privacy (Euros&P 2022)
7th IEEE European Symposium on Security and Privacy (IEEE EuroS and P)

Computing the count of distinct elements in large data sets is a common task but naive approaches are memory-expensive. The HyperLogLog (HLL) algorithm (Flajolet et al., 2007) estimates a data set's cardinality while using significantly less memory than a naive approach, at the cost of some accuracy. This trade-off makes the HLL algorithm very attractive for a wide range of applications such as database management and network monitoring, where an exact count may not be needed. The HLL algorithm and variants of it are implemented in systems such as Redis and Google Big Query. Recently, the HLL algorithm has started to be proposed for use in scenarios where the inputs may be adversarially generated, for example counting social network users or detection of network scanning attacks. This prompts an examination of the performance of the HLL algorithm in the face of adversarial inputs. We show that in such a setting, the HLL algorithm's estimate of cardinality can be exponentially bad: when an adversary has access to the internals of the HLL algorithm and has some flexibility in choosing what inputs will be recorded, it can manipulate the cardinality estimate to be exponentially smaller than the true cardinality. We study both the original HLL algorithm and a more modern version of it (Ertl, 2017) that is used in Redis. We present experimental results confirming our theoretical analysis. Finally, we consider attack prevention: we show how to modify HLL in a simple way that provably prevents cardinality estimate manipulation attacks.

  • Details
  • Metrics
Type
conference paper
DOI
10.1109/EuroSP53844.2022.00018
Web of Science ID

WOS:000851574500010

Author(s)
Paterson, Kenneth G.
Raynal, Mathilde  
Date Issued

2022-01-01

Publisher

IEEE COMPUTER SOC

Publisher place

Los Alamitos

Published in
2022 Ieee 7Th European Symposium On Security And Privacy (Euros&P 2022)
ISBN of the book

978-1-6654-1614-6

Start page

154

End page

170

Subjects

Computer Science, Information Systems

•

Computer Science, Interdisciplinary Applications

•

Computer Science, Theory & Methods

•

Computer Science

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
SPRING  
Event nameEvent placeEvent date
7th IEEE European Symposium on Security and Privacy (IEEE EuroS and P)

Genoa, ITALY

Jun 06-10, 2022

Available on Infoscience
September 26, 2022
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/190973
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés