CCLab: Adversarial Testing of Learning- and Non-Learning-Based Congestion Controllers
Pith reviewed 2026-05-22 06:08 UTC · model grok-4.3
The pith
Learning-based congestion controllers prove more robust than traditional ones when facing adversarial perturbations to inputs or network conditions.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
An RL-based adversarial agent, constrained to keep perturbations realistic and bounded, can be run in closed loop with a congestion-control policy to produce systematic feature-level or environment-level attacks. When this agent is applied to both learning-based and traditional controllers, the learning-based group exhibits smaller performance drops; moreover, retraining any controller on the resulting adversarial traces produces policies that outperform prior learning-based controllers under both attack and standard conditions.
What carries the argument
The RL-based adversarial agent that generates bounded perturbations on input signals or external network conditions while enforcing explicit realism constraints.
If this is right
- Both learning-based and non-learning-based congestion controllers suffer measurable performance loss under the generated adversarial conditions.
- Learning-based controllers, on average, degrade less than traditional human-designed algorithms.
- Controllers retrained on the adversarial traces outperform existing learning-based controllers in both challenging and normal network settings.
- Closed-loop adversarial evaluation can surface vulnerabilities that standard benchmarks miss.
Where Pith is reading between the lines
- Networks operating in environments with frequent signal corruption or load variation may benefit from preferring learning-based controllers.
- Adversarial trace generation could be added as a routine step when certifying new congestion controllers for deployment.
- The same closed-loop testing pattern may transfer to robustness evaluation of other feedback-based network mechanisms such as routing or traffic shaping.
Load-bearing premise
The bounded perturbations produced by the RL agent remain realistic enough to reflect plausible real-world noise or interference without violating the underlying network dynamics.
What would settle it
Replicating the exact adversarial test suite on a physical testbed with a fresh collection of learning-based and traditional controllers and observing that traditional controllers suffer smaller throughput or latency degradation would falsify the robustness ordering.
Figures
read the original abstract
Congestion controllers (CCs) are critical to network performance, and yet their robustness under adverse conditions remains insufficiently understood. While recent learning-based CCs have demonstrated strong performance in controlled environments, it is unclear how they compare to traditional CCs when controllers' input signals are corrupted or when environmental conditions become systematically challenging. In this paper, we introduce CCLab, an adversarial testing framework for systematically evaluating the robustness of both learning-based and non-learning-based CCs. CCLab includes a reinforcement learning (RL)-based adversarial agent that operates in a closed loop with the congestion control policy, generating bounded perturbations either on input signals (feature-level) or on external network conditions (environment-level), while preserving realism through explicit constraints. Using this framework, we compare learning-based CCs with non-learning-based CCs under both feature-level and environment-level adversarial conditions. While both types of CCs suffer from performance degradation under adversarial testing, we find that learning-based CCs, in general, are more robust than traditional human-designed algorithms. Finally, we show that our adversarial traces can be used to train more robust CCs that outperform existing learning-based CCs under both challenging and normal conditions.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces CCLab, an adversarial testing framework for congestion controllers (CCs) that employs a reinforcement learning-based adversarial agent operating in closed loop. The agent generates bounded perturbations either on input signals (feature-level) or external network conditions (environment-level), subject to explicit constraints intended to preserve realism. Through this framework the authors compare learning-based and non-learning-based CCs, report that both families degrade under attack but that learning-based controllers are generally more robust, and demonstrate that the generated adversarial traces can be used to retrain CCs that outperform prior learning-based designs under both adversarial and normal conditions.
Significance. If the fairness and realism of the perturbations are established, the work would be significant for network protocol design by supplying a systematic, reproducible method for robustness evaluation of CCs and a concrete technique for hardening learning-based controllers. The closed-loop RL adversary and the dual feature/environment attack surfaces constitute clear technical contributions.
major comments (2)
- [§4.2] §4.2 (Environment-Level Perturbations): The explicit constraints on allowable ranges for delay, loss, and bandwidth are load-bearing for the headline robustness comparison. Without a quantitative validation (e.g., overlap statistics with real traces or a sensitivity analysis) showing that these ranges do not extend into regimes outside the support of traditional CC design assumptions, the observed advantage for learning-based controllers could arise from distributional mismatch rather than intrinsic robustness differences.
- [§5.1] §5.1 and Table 3: The performance-degradation tables report point estimates without variance across random seeds or statistical significance tests. Because the central claim is a general ordering between two families of controllers, the absence of these measures leaves open whether the reported gaps are robust or sensitive to particular adversarial-agent initializations.
minor comments (2)
- [Abstract] Abstract: the qualifier 'in general' is imprecise; the manuscript should state the precise conditions (network scenarios, attack budgets, CC implementations) under which the robustness ordering holds.
- [Figure 2] Figure 2: axis labels and legend entries are too small for readability; enlarge or add a supplementary high-resolution version.
Simulated Author's Rebuttal
We thank the referee for the constructive comments, which help clarify the presentation of our robustness claims. We address each major comment below and describe the revisions we will make to strengthen the manuscript.
read point-by-point responses
-
Referee: [§4.2] §4.2 (Environment-Level Perturbations): The explicit constraints on allowable ranges for delay, loss, and bandwidth are load-bearing for the headline robustness comparison. Without a quantitative validation (e.g., overlap statistics with real traces or a sensitivity analysis) showing that these ranges do not extend into regimes outside the support of traditional CC design assumptions, the observed advantage for learning-based controllers could arise from distributional mismatch rather than intrinsic robustness differences.
Authors: We agree that quantitative validation of the perturbation ranges is necessary to support the claim that robustness differences are intrinsic. The ranges were derived from commonly cited real-network variation bounds in the CC literature, but we did not include direct distributional comparisons in the original submission. In the revision we will add overlap statistics (e.g., Wasserstein distance or support overlap) between the perturbed environments and publicly available real traces (CAIDA, M-Lab), together with a sensitivity analysis that varies the constraint bounds while preserving the reported ordering. These additions will be placed in §4.2 and a new appendix. revision: yes
-
Referee: [§5.1] §5.1 and Table 3: The performance-degradation tables report point estimates without variance across random seeds or statistical significance tests. Because the central claim is a general ordering between two families of controllers, the absence of these measures leaves open whether the reported gaps are robust or sensitive to particular adversarial-agent initializations.
Authors: We concur that variance estimates and significance tests are required to substantiate the family-level ordering. The original experiments used single runs for each controller-adversary pair. In the revised manuscript we will re-execute the evaluation suite over at least five independent random seeds for both the RL adversary and the CC policies, report means with standard deviations in Table 3, and include paired statistical tests (Wilcoxon signed-rank) with p-values to confirm that the performance gaps between learning-based and non-learning-based controllers remain significant under both attack types. revision: yes
Circularity Check
No significant circularity; empirical framework is self-contained
full rationale
The paper introduces CCLab as an RL-based adversarial testing framework that applies bounded perturbations under explicit realism constraints, then reports comparative robustness results between learning-based and traditional CCs from those experiments. No derivation chain reduces a claimed prediction or uniqueness result to a fitted parameter or self-citation by construction. The central finding (learning-based CCs degrade less) is presented as an observed outcome of the closed-loop tests rather than a tautological restatement of inputs. The framework relies on external network models and standard RL training, with no load-bearing self-referential definitions or ansatz smuggling visible in the abstract or described structure. This is a standard empirical evaluation paper whose results stand or fall on the experimental setup and data, not on internal redefinition.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Perturbations preserve realism through explicit constraints
invented entities (1)
-
RL-based adversarial agent
no independent evidence
Reference graph
Works this paper leans on
-
[1]
Classic meets modern: A pragmatic learning-based congestion control for the internet,
S. Abbasloo, C.-Y . Yen, and H. J. Chao, “Classic meets modern: A pragmatic learning-based congestion control for the internet,” inProc. of SIGCOMM, 2020
work page 2020
-
[2]
Canopy: Property-driven learning for congestion control,
C. Yang, D. Saxena, R. Dwivedula, K. Mahajan, S. Chaudhuri, and A. Akella, “Canopy: Property-driven learning for congestion control,” inProc. of EuroSys, 2026
work page 2026
-
[3]
Computers can learn from the heuristic designs and master internet congestion control,
C.-Y . Yen, S. Abbasloo, and H. J. Chao, “Computers can learn from the heuristic designs and master internet congestion control,” inProc. of SIGCOMM, 2023
work page 2023
-
[4]
A deep reinforcement learning perspective on internet congestion control,
N. Jay, N. Rotman, B. Godfrey, M. Schapira, and A. Tamar, “A deep reinforcement learning perspective on internet congestion control,” in Proc. of ICML, 2019
work page 2019
-
[5]
PCC vivace: Online-learning congestion control,
M. Dong, T. Meng, D. Zarchy, E. Arslan, Y . Gilad, B. Godfrey, and M. Schapira, “PCC vivace: Online-learning congestion control,” inProc. of NSDI, 2018
work page 2018
-
[6]
L. Giacomoni and G. Parisis, “Reinforcement learning-based congestion control: A systematic evaluation of fairness, efficiency and responsive- ness,” inProc. of INFOCOM, 2024
work page 2024
-
[7]
Learning-based vs human- derived congestion control: An in-depth experimental study,
M. Mazilu, L. Giacomoni, and G. Parisis, “Learning-based vs human- derived congestion control: An in-depth experimental study,”arXiv, 2025
work page 2025
-
[8]
Advnet: Revealing performance issues in network protocols by generating adversarial environments,
S. S. Ahmed, W. Sentosa, Y . Zhang, Y . Lebendiker, M. Shnaiderman, T. Gilad, N. H. Jay, P. B. Godfrey, and M. Schapira, “Advnet: Revealing performance issues in network protocols by generating adversarial environments,” inProc. of ACM CoNEXT, 2026
work page 2026
-
[9]
Cc-fuzz: genetic algorithm-based fuzzing for stress testing congestion control algorithms,
D. Ray and S. Seshan, “Cc-fuzz: genetic algorithm-based fuzzing for stress testing congestion control algorithms,” inProc. of ACM HotNets, 2022
work page 2022
-
[10]
Robustifying network protocols with adversarial examples,
T. Gilad, N. H. Jay, M. Shnaiderman, B. Godfrey, and M. Schapira, “Robustifying network protocols with adversarial examples,” inProc. of HotNets, 2019
work page 2019
-
[11]
Tcp vegas: New techniques for congestion detection and avoidance,
L. S. Brakmo, S. W. O’malley, and L. L. Peterson, “Tcp vegas: New techniques for congestion detection and avoidance,” inProc. of SIGCOMM, 1994
work page 1994
-
[12]
Bbr: Congestion-based congestion control,
N. Cardwell, Y . Cheng, C. S. Gunn, S. H. Yeganeh, and V . Jacobson, “Bbr: Congestion-based congestion control,”Communications of the ACM, 2017
work page 2017
-
[13]
Cubic: a new tcp-friendly high-speed tcp variant,
S. Ha, I. Rhee, and L. Xu, “Cubic: a new tcp-friendly high-speed tcp variant,”ACM SIGOPS operating systems review, 2008
work page 2008
-
[14]
Tcp-lp: A distributed algorithm for low priority data transfer,
A. Kuzmanovic and E. W. Knightly, “Tcp-lp: A distributed algorithm for low priority data transfer,” inProc. of INFOCOM, 2003
work page 2003
-
[15]
Binary increase congestion control (bic) for fast long-distance networks,
L. Xu, K. Harfoush, and I. Rhee, “Binary increase congestion control (bic) for fast long-distance networks,” inProc. of INFOCOM, 2004
work page 2004
-
[16]
Highspeed tcp for large congestion windows,
S. Floyd, “Highspeed tcp for large congestion windows,” Tech. Rep., 2003
work page 2003
-
[17]
H-tcp: Tcp for high-speed and long-distance networks,
D. Leith and R. Shorten, “H-tcp: Tcp for high-speed and long-distance networks,” inProc. of PFLDnet, 2004
work page 2004
-
[18]
Tcp hybla: a tcp enhancement for heteroge- neous networks,
C. Caini and R. Firrincieli, “Tcp hybla: a tcp enhancement for heteroge- neous networks,”International journal of satellite communications and networking, 2004
work page 2004
-
[19]
Scalable tcp: Improving performance in highspeed wide area networks,
T. Kelly, “Scalable tcp: Improving performance in highspeed wide area networks,”ACM SIGCOMM computer communication Review, 2003
work page 2003
-
[20]
Tcp veno: Tcp enhancement for transmission over wireless access networks,
C. P. Fu and S. C. Liew, “Tcp veno: Tcp enhancement for transmission over wireless access networks,”IEEE Journal on selected areas in communications, 2003
work page 2003
-
[21]
Revisiting tcp congestion control using delay gradients,
D. A. Hayes and G. Armitage, “Revisiting tcp congestion control using delay gradients,” inProc. of Networking, 2011
work page 2011
-
[22]
Tcp-illinois: A loss and delay-based congestion control algorithm for high-speed networks,
S. Liu, T. Bas ¸ar, and R. Srikant, “Tcp-illinois: A loss and delay-based congestion control algorithm for high-speed networks,” inProc. of ValueTools, 2006
work page 2006
-
[23]
Yeah-tcp: yet another highspeed tcp,
A. Baiocchi, A. P. Castellani, F. Vacircaet al., “Yeah-tcp: yet another highspeed tcp,” inProc. of PFLDnet, 2007
work page 2007
-
[24]
Tcp westwood: Bandwidth estimation for enhanced transport over wireless links,
S. Mascolo, C. Casetti, M. Gerla, M. Y . Sanadidi, and R. Wang, “Tcp westwood: Bandwidth estimation for enhanced transport over wireless links,” inProc. of MobiCom, 2001
work page 2001
-
[25]
M. Alizadeh, A. Greenberg, D. A. Maltz, J. Padhye, P. Patel, B. Prab- hakar, S. Sengupta, and M. Sridharan, “Data center tcp (dctcp),” inProc. of SIGCOMM, 2010
work page 2010
-
[26]
Glider: rethinking congestion control with deep reinforcement learning,
Z. Xia, L. Wu, F. Wang, X. Liao, H. Hu, J. Wu, and D. Wu, “Glider: rethinking congestion control with deep reinforcement learning,”World Wide Web, 2023
work page 2023
-
[27]
Toward fair and efficient congestion control: Machine learning aided congestion control (mlacc),
A. Elbery, Y . Lian, and G. Li, “Toward fair and efficient congestion control: Machine learning aided congestion control (mlacc),” inProc. of APNet, 2023
work page 2023
-
[28]
Mahimahi: accurate Record-and-Replay for HTTP,
R. Netravali, A. Sivaraman, S. Das, A. Goyal, K. Winstein, J. Mick- ens, and H. Balakrishnan, “Mahimahi: accurate Record-and-Replay for HTTP,” inProc. of USENIX Security, 2015
work page 2015
-
[29]
AdvNet: Revealing Performance Issues in Network Protocols by Generating Adversarial Environments
S. S. Ahmed, W. Sentosa, Y . Zhang, Y . Lebendiker, M. Shnaiderman, T. Gilad, N. H. Jay, B. Godfrey, and M. Schapira, “Advnet: Revealing performance issues in network protocols by generating adversarial environments,”arXiv preprint arXiv:2605.00755, 2026
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[30]
The menlo report: Ethical principles guiding information and communication technology research,
E. Kenneally and D. Dittrich, “The menlo report: Ethical principles guiding information and communication technology research,”Available at SSRN 2445102, 2012. APPENDIX A. Feature-Level Manipulation: Real-world Traces To validate the generality of our findings beyond Canopy simulated traces, we repeat the feature-level adversarial ex- periments on Canopy ...
work page 2012
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.