首页 > 最新文献

2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)最新文献

英文 中文
Honeypot testbed for network defence strategy evaluation 网络防御策略评估蜜罐试验台
Pub Date : 2017-08-05 DOI: 10.23919/INM.2017.7987397
Jana Medková, M. Husák, Martin Vizváry, Pavel Čeleda
In this paper, we describe a network defence strategy testbed, which could be utilized for testing the strategy decision logic against simulated attacks or real attackers. The testbed relies on a network of honeypots and the high level of logging and monitoring the honeypots provide. Its main advantage is that only the decision logic implementation is needed in order to test the strategy. The testbed also evaluates the tested network defence strategy. We demonstrate an example of network defence strategy implementation, the test setup, progress, and results. The source code of the testbed is available on GitHub.
本文描述了一个网络防御策略测试平台,该平台可用于测试网络防御策略的决策逻辑,以抵御模拟攻击或真实攻击。测试平台依赖于蜜罐网络和蜜罐提供的高水平的日志记录和监控。它的主要优点是只需要决策逻辑实现就可以测试策略。测试平台还对测试的网络防御策略进行了评估。我们展示了一个网络防御策略实施的例子,测试设置,进展和结果。测试平台的源代码可以在GitHub上获得。
{"title":"Honeypot testbed for network defence strategy evaluation","authors":"Jana Medková, M. Husák, Martin Vizváry, Pavel Čeleda","doi":"10.23919/INM.2017.7987397","DOIUrl":"https://doi.org/10.23919/INM.2017.7987397","url":null,"abstract":"In this paper, we describe a network defence strategy testbed, which could be utilized for testing the strategy decision logic against simulated attacks or real attackers. The testbed relies on a network of honeypots and the high level of logging and monitoring the honeypots provide. Its main advantage is that only the decision logic implementation is needed in order to test the strategy. The testbed also evaluates the tested network defence strategy. We demonstrate an example of network defence strategy implementation, the test setup, progress, and results. The source code of the testbed is available on GitHub.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exchanging security events: Which and how many alerts can we aggregate? 交换安全事件:我们可以聚合哪些和多少个警报?
Pub Date : 2017-08-05 DOI: 10.23919/INM.2017.7987340
M. Husák, Milan Cermák, Martin Laštovička, Jan Vykopal
The exchange of security alerts is a current trend in network security and incident response. Alerts from network intrusion detection systems are shared among organizations so that it is possible to see the “big picture” of current security situation. However, the quality and redundancy of the input data seem to be underrated. We present four use cases of aggregation of the alerts from network intrusion detection systems. Alerts from a sharing platform deployed in the Czech national research and education network were examined in a case study. Volumes of raw and aggregated data are presented and a rule of thumb is proposed: up to 85% of alerts can be aggregated. Finally, we discuss the practical implications of alert aggregation for the network intrusion detection system, such as (in)completeness of the alerts and optimal time windows for aggregation.
安全警报的交换是当前网络安全和事件响应的发展趋势。来自网络入侵检测系统的警报在组织之间共享,因此可以看到当前安全状况的“大局”。然而,输入数据的质量和冗余似乎被低估了。本文给出了网络入侵检测系统警报聚合的四个用例。在案例研究中审查了捷克国家研究和教育网络中部署的共享平台发出的警报。展示了大量的原始数据和聚合数据,并提出了一条经验法则:可以聚合多达85%的警报。最后,我们讨论了警报聚合对网络入侵检测系统的实际意义,如警报的完整性和聚合的最佳时间窗口。
{"title":"Exchanging security events: Which and how many alerts can we aggregate?","authors":"M. Husák, Milan Cermák, Martin Laštovička, Jan Vykopal","doi":"10.23919/INM.2017.7987340","DOIUrl":"https://doi.org/10.23919/INM.2017.7987340","url":null,"abstract":"The exchange of security alerts is a current trend in network security and incident response. Alerts from network intrusion detection systems are shared among organizations so that it is possible to see the “big picture” of current security situation. However, the quality and redundancy of the input data seem to be underrated. We present four use cases of aggregation of the alerts from network intrusion detection systems. Alerts from a sharing platform deployed in the Czech national research and education network were examined in a case study. Volumes of raw and aggregated data are presented and a rule of thumb is proposed: up to 85% of alerts can be aggregated. Finally, we discuss the practical implications of alert aggregation for the network intrusion detection system, such as (in)completeness of the alerts and optimal time windows for aggregation.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Network defence strategy evaluation: Simulation vs. live network 网络防御策略评估:模拟与实时网络
Pub Date : 2017-08-05 DOI: 10.23919/INM.2017.7987267
Jana Medková, M. Husák, Martin Drasar
A lot of research has been dedicated to finding an optimal strategy to defend network infrastructure. The proposed methods are usually evaluated using simulations, replayed attacks or testbed environments. However, these evaluation methods may give biased results, because in real life, attackers can follow a suboptimal strategy or react to a defence in an unexpected way. In this paper, we use a network of honeypots as a testing environment for evaluating network defence strategies. The honeypot network provides the opportunity to test a defence strategy against real attackers and is not as time and resource consuming as using white hat hackers. In our experiment, we use two different strategies to defend a group of honeypots in a live network and we compare these results to the results of a simulation with replayed attacks. We show that the results of the strategies in the simulation significantly differ from the results on the honeypot network which implies simulations are not sufficient for strategy evaluation. We also investigate how the attacker adapts to the responses taken by a defence strategy and how this change in behaviour affects the evaluation results.
许多研究都致力于寻找保护网络基础设施的最佳策略。所提出的方法通常使用模拟、重放攻击或测试平台环境进行评估。然而,这些评估方法可能会给出有偏差的结果,因为在现实生活中,攻击者可能会遵循次优策略或以意想不到的方式对防御做出反应。在本文中,我们使用一个蜜罐网络作为评估网络防御策略的测试环境。蜜罐网络提供了测试针对真实攻击者的防御策略的机会,并且不像使用白帽黑客那样耗费时间和资源。在我们的实验中,我们使用两种不同的策略来保护实时网络中的一组蜜罐,并将这些结果与具有重放攻击的模拟结果进行比较。结果表明,仿真结果与蜜罐网络上的结果存在显著差异,这意味着仿真不足以对策略进行评估。我们还研究了攻击者如何适应防御策略所采取的响应,以及这种行为变化如何影响评估结果。
{"title":"Network defence strategy evaluation: Simulation vs. live network","authors":"Jana Medková, M. Husák, Martin Drasar","doi":"10.23919/INM.2017.7987267","DOIUrl":"https://doi.org/10.23919/INM.2017.7987267","url":null,"abstract":"A lot of research has been dedicated to finding an optimal strategy to defend network infrastructure. The proposed methods are usually evaluated using simulations, replayed attacks or testbed environments. However, these evaluation methods may give biased results, because in real life, attackers can follow a suboptimal strategy or react to a defence in an unexpected way. In this paper, we use a network of honeypots as a testing environment for evaluating network defence strategies. The honeypot network provides the opportunity to test a defence strategy against real attackers and is not as time and resource consuming as using white hat hackers. In our experiment, we use two different strategies to defend a group of honeypots in a live network and we compare these results to the results of a simulation with replayed attacks. We show that the results of the strategies in the simulation significantly differ from the results on the honeypot network which implies simulations are not sufficient for strategy evaluation. We also investigate how the attacker adapts to the responses taken by a defence strategy and how this change in behaviour affects the evaluation results.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129818253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A graph-based representation of relations in network security alert sharing platforms 基于图的网络安全警报共享平台关系表示
Pub Date : 2017-08-05 DOI: 10.23919/INM.2017.7987399
M. Husák, Milan Cermák
In this paper, we present a framework for graph-based representation of relation between sensors and alert types in a security alert sharing platform. Nodes in a graph represent either sensors or alert types, while edges represent various relations between them, such as common type of reported alerts or duplicated alerts. The graph is automatically updated, stored in a graph database, and visualized. The resulting graph will be used by network administrators and security analysts as a visual guide and situational awareness tool in a complex environment of security alert sharing.
本文提出了一种基于图的安全警报共享平台中传感器与警报类型关系表示框架。图中的节点表示传感器或警报类型,而边表示它们之间的各种关系,例如常见类型的报告警报或重复警报。图形自动更新,存储在图形数据库中,并可视化。生成的图形将被网络管理员和安全分析师用作安全警报共享复杂环境中的视觉指南和态势感知工具。
{"title":"A graph-based representation of relations in network security alert sharing platforms","authors":"M. Husák, Milan Cermák","doi":"10.23919/INM.2017.7987399","DOIUrl":"https://doi.org/10.23919/INM.2017.7987399","url":null,"abstract":"In this paper, we present a framework for graph-based representation of relation between sensors and alert types in a security alert sharing platform. Nodes in a graph represent either sensors or alert types, while edges represent various relations between them, such as common type of reported alerts or duplicated alerts. The graph is automatically updated, stored in a graph database, and visualized. The resulting graph will be used by network administrators and security analysts as a visual guide and situational awareness tool in a complex environment of security alert sharing.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116064281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SDQ: Enabling rapid QoE experimentation using Software Defined Networking SDQ:使用软件定义网络实现快速QoE实验
Pub Date : 2017-07-24 DOI: 10.23919/INM.2017.7987353
L. Fawcett, Mu Mu, M. Broadbent, Nicholas Hart, N. Race
The emerging network paradigm of Software Defined Networking (SDN) has been increasingly adopted to improve the Quality of Experiences (QoE) across multiple HTTP adaptive streaming (HAS) instances. However, there is currently a gap between research and reality in this field. QoE models, which offer user-level context to network management processes, are often tested in a simulation environment. Such environments do not consider the effects that network protocols, client programs, and other real world factors may have on the outcomes. Ultimately, this can lead to models not functioning as expected in real networks. On the other hand, setting up an experiment that reflects reality is a time consuming process requiring expert knowledge. This paper shares designs and guidelines of an SDN experimentation framework (SDQ), which offers rapid evaluation of QoE models using real network infrastructures.
软件定义网络(SDN)的新兴网络范例已被越来越多地用于提高跨多个HTTP自适应流(has)实例的体验质量(QoE)。然而,目前该领域的研究与实际存在差距。QoE模型为网络管理过程提供用户级上下文,通常在模拟环境中进行测试。这样的环境没有考虑网络协议、客户端程序和其他现实世界因素可能对结果产生的影响。最终,这可能导致模型在实际网络中不能像预期的那样运行。另一方面,建立一个反映现实的实验是一个耗时的过程,需要专业知识。本文分享了SDN实验框架(SDQ)的设计和指导方针,该框架可以使用真实的网络基础设施对QoE模型进行快速评估。
{"title":"SDQ: Enabling rapid QoE experimentation using Software Defined Networking","authors":"L. Fawcett, Mu Mu, M. Broadbent, Nicholas Hart, N. Race","doi":"10.23919/INM.2017.7987353","DOIUrl":"https://doi.org/10.23919/INM.2017.7987353","url":null,"abstract":"The emerging network paradigm of Software Defined Networking (SDN) has been increasingly adopted to improve the Quality of Experiences (QoE) across multiple HTTP adaptive streaming (HAS) instances. However, there is currently a gap between research and reality in this field. QoE models, which offer user-level context to network management processes, are often tested in a simulation environment. Such environments do not consider the effects that network protocols, client programs, and other real world factors may have on the outcomes. Ultimately, this can lead to models not functioning as expected in real networks. On the other hand, setting up an experiment that reflects reality is a time consuming process requiring expert knowledge. This paper shares designs and guidelines of an SDN experimentation framework (SDQ), which offers rapid evaluation of QoE models using real network infrastructures.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Locality based approach to improve propagation delay on the Bitcoin peer-to-peer network 基于局部性的比特币点对点网络传播延迟改进方法
Pub Date : 2017-07-20 DOI: 10.23919/INM.2017.7987328
M. Sallal, Gareth Owenson, M. Adda
The delay overhead of transaction verification in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue which makes the system vulnerable to double spend attacks. In this paper, we propose a new approach, that is based on how the clusters are formulated and the nodes define their membership, to improve the transaction propagation delay in the Bitcoin network. In this approach, the locality of connectivity in the Bitcoin network is increased by grouping Bitcoin nodes based on their geographical location. We show, through simulations, that location based-distance better defines clustering structures that optimize the performance of the transaction propagation delay. A key reason behind this improvement is mainly due to the reduction of the communication link cost measured by the distance between nodes. Compared to the existing clustering protocol (BCBSN) that we proposed in our previous work, location based clustering is more effective at reducing the transaction propagation delay.
比特币是一种点对点的电子货币系统,其交易验证的延迟开销是一个复杂的问题,使得系统容易受到双花攻击。在本文中,我们提出了一种新的方法,基于如何制定集群和节点定义其成员资格,以改善比特币网络中的交易传播延迟。在这种方法中,通过根据比特币节点的地理位置分组比特币节点来增加比特币网络中连接的局部性。我们通过模拟表明,基于位置的距离可以更好地定义集群结构,从而优化事务传播延迟的性能。这种改进背后的一个关键原因主要是由于减少了以节点之间的距离衡量的通信链路成本。与我们在之前的工作中提出的现有聚类协议(BCBSN)相比,基于位置的聚类在减少事务传播延迟方面更有效。
{"title":"Locality based approach to improve propagation delay on the Bitcoin peer-to-peer network","authors":"M. Sallal, Gareth Owenson, M. Adda","doi":"10.23919/INM.2017.7987328","DOIUrl":"https://doi.org/10.23919/INM.2017.7987328","url":null,"abstract":"The delay overhead of transaction verification in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue which makes the system vulnerable to double spend attacks. In this paper, we propose a new approach, that is based on how the clusters are formulated and the nodes define their membership, to improve the transaction propagation delay in the Bitcoin network. In this approach, the locality of connectivity in the Bitcoin network is increased by grouping Bitcoin nodes based on their geographical location. We show, through simulations, that location based-distance better defines clustering structures that optimize the performance of the transaction propagation delay. A key reason behind this improvement is mainly due to the reduction of the communication link cost measured by the distance between nodes. Compared to the existing clustering protocol (BCBSN) that we proposed in our previous work, location based clustering is more effective at reducing the transaction propagation delay.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134082441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Distributed spatial indexing for the Internet of Things data management 面向物联网数据管理的分布式空间索引
Pub Date : 2017-06-24 DOI: 10.23919/INM.2017.7987467
Yasmin Fathy, P. Barnaghi, R. Tafazolli
The Internet of Things (IoT) has become a new enabler for collecting real-world observation and measurement data from the physical world. The IoT allows objects with sensing and network capabilities (i.e. Things and devices) to communicate with one another and with other resources (e.g. services) on the digital world. The heterogeneity, dynamicity and ad-hoc nature of underlying data, and services published by most of IoT resources make accessing and processing the data and services a challenging task. The IoT demands distributed, scalable, and efficient indexing solutions for large-scale distributed IoT networks. We describe a novel distributed indexing approach for IoT resources and their published data. The index structure is constructed by encoding the locations of IoT resources into geohashes and then building a quadtree on the minimum bounding box of the geohash representations. This allows to aggregate resources with similar geohashes and reduce the size of the index. We have evaluated our proposed solution on a large-scale dataset and our results show that the proposed approach can efficiently index and enable discovery of the IoT resources with 65% better response time than a centralised approach and with a high success rate (around 90% in the first few attempts).
物联网(IoT)已经成为从物理世界收集真实世界观察和测量数据的新推动者。物联网允许具有传感和网络功能的对象(即事物和设备)在数字世界中相互通信以及与其他资源(例如服务)通信。大多数物联网资源发布的底层数据和服务的异质性、动态性和即时性使得访问和处理数据和服务成为一项具有挑战性的任务。物联网需要大规模分布式物联网网络的分布式、可扩展和高效的索引解决方案。我们描述了一种新的物联网资源及其发布数据的分布式索引方法。通过将物联网资源的位置编码为geohash,然后在geohash表示的最小边界框上构建四叉树来构建索引结构。这允许聚合具有相似geohash的资源,并减少索引的大小。我们已经在大规模数据集上评估了我们提出的解决方案,我们的结果表明,所提出的方法可以有效地索引和发现物联网资源,响应时间比集中式方法快65%,成功率高(前几次尝试约为90%)。
{"title":"Distributed spatial indexing for the Internet of Things data management","authors":"Yasmin Fathy, P. Barnaghi, R. Tafazolli","doi":"10.23919/INM.2017.7987467","DOIUrl":"https://doi.org/10.23919/INM.2017.7987467","url":null,"abstract":"The Internet of Things (IoT) has become a new enabler for collecting real-world observation and measurement data from the physical world. The IoT allows objects with sensing and network capabilities (i.e. Things and devices) to communicate with one another and with other resources (e.g. services) on the digital world. The heterogeneity, dynamicity and ad-hoc nature of underlying data, and services published by most of IoT resources make accessing and processing the data and services a challenging task. The IoT demands distributed, scalable, and efficient indexing solutions for large-scale distributed IoT networks. We describe a novel distributed indexing approach for IoT resources and their published data. The index structure is constructed by encoding the locations of IoT resources into geohashes and then building a quadtree on the minimum bounding box of the geohash representations. This allows to aggregate resources with similar geohashes and reduce the size of the index. We have evaluated our proposed solution on a large-scale dataset and our results show that the proposed approach can efficiently index and enable discovery of the IoT resources with 65% better response time than a centralised approach and with a high success rate (around 90% in the first few attempts).","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134114691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Energy-efficient peer-to-peer networking for constrained-capacity mobile environments 有限容量移动环境的节能点对点网络
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987385
E. Harjula, T. Ojala, M. Ylianttila
Energy efficiency is a powerful measure for promoting sustainability in technological evolution and ensuring feasible battery life of mobile end-user devices. Peer-to-peer technology provides decentralized and self-organizing, but also energy-inefficient technology for distributing content between devices in networks that scale up almost infinitely. The dissertation [1] summarized in this paper makes four contributions towards enabling energy-aware peer-to-peer networking in mobile environments: 1) an empirical study for understanding the energy consumption characteristics of radio interfaces and typical composition of traffic in peer-to-peer networks, 2) a model for estimating the energy consumption of a mobile device with different traffic profiles, 3) a model for energy-aware load monitoring of mobile peer nodes, and 4) a mobile agent based virtual peers concept for energy-aware sharing of peer responsibilities between peer nodes in a subnet. The results give valuable insight into implementing energy-efficient peer-to-peer systems in mobile environments.
能源效率是促进技术发展的可持续性和确保移动终端用户设备可行的电池寿命的有力措施。点对点技术提供了去中心化和自组织,但也是一种能源效率低下的技术,用于在几乎无限扩展的网络中的设备之间分发内容。本文总结的论文[1]为在移动环境中实现能量感知的点对点网络做出了四个贡献:1)了解无线接口能耗特征和点对点网络中典型流量构成的实证研究;2)基于不同流量概况的移动设备能耗估算模型;3)基于能量感知的移动对等节点负载监控模型;4)基于移动代理的虚拟对等节点概念,在子网内对等节点之间实现能量感知的对等责任共享。结果为在移动环境中实施节能点对点系统提供了有价值的见解。
{"title":"Energy-efficient peer-to-peer networking for constrained-capacity mobile environments","authors":"E. Harjula, T. Ojala, M. Ylianttila","doi":"10.23919/INM.2017.7987385","DOIUrl":"https://doi.org/10.23919/INM.2017.7987385","url":null,"abstract":"Energy efficiency is a powerful measure for promoting sustainability in technological evolution and ensuring feasible battery life of mobile end-user devices. Peer-to-peer technology provides decentralized and self-organizing, but also energy-inefficient technology for distributing content between devices in networks that scale up almost infinitely. The dissertation [1] summarized in this paper makes four contributions towards enabling energy-aware peer-to-peer networking in mobile environments: 1) an empirical study for understanding the energy consumption characteristics of radio interfaces and typical composition of traffic in peer-to-peer networks, 2) a model for estimating the energy consumption of a mobile device with different traffic profiles, 3) a model for energy-aware load monitoring of mobile peer nodes, and 4) a mobile agent based virtual peers concept for energy-aware sharing of peer responsibilities between peer nodes in a subnet. The results give valuable insight into implementing energy-efficient peer-to-peer systems in mobile environments.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"4 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120812341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A cost-effective security management for clouds: A game-theoretic deception mechanism 一种经济有效的云安全管理:博弈论欺骗机制
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987269
Mohammad Taghi Adili, Amin Mohammadi, M. Manshaei, M. Rahman
The Information Technology (IT) is observing a rising shift toward cloud computing due to its attractive on-demand storage and computing capabilities that allow moving the computing and storage load from the owner's side to the service provider's place and enjoying the data or computed results efficiently anywhere anytime. This growing use of clouds also introduces significant security concerns, as sensitive data and critical applications are increasingly being moved to clouds. Recent work also reveals different security threats, e.g., side-channel attacks, against cloud services. In this work, we address the need of improved solutions for the security management of cloud computing. We propose a moving target-based deceptive defense mechanism where the moving target idea is centered on frequent migrations of the virtual machines (VMs). We make the moves cost-efficient by modeling the problem as a signaling game between the adversary and the VMs and introducing deceptions. We solve the game and obtain two Nash equilibria. These results illustrate the best possible moves by the adversary and the corresponding strategy for the VMs that should reduce the adversary's chance of being successful at most.
信息技术(IT)正在观察到云计算的上升趋势,因为它具有吸引力的按需存储和计算能力,可以将计算和存储负载从所有者一方转移到服务提供商的位置,并随时随地高效地享受数据或计算结果。随着敏感数据和关键应用程序越来越多地迁移到云上,云的使用也带来了重大的安全问题。最近的工作还揭示了针对云服务的不同安全威胁,例如侧通道攻击。在这项工作中,我们解决了改进云计算安全管理解决方案的需求。本文提出了一种基于移动目标的欺骗防御机制,该机制以虚拟机的频繁迁移为中心。通过将问题建模为对手和虚拟机之间的信号博弈并引入欺骗,我们使移动具有成本效益。我们解了这个博弈,得到了两个纳什均衡。这些结果说明了对手可能采取的最佳行动以及vm的相应策略,这些策略应该最大限度地减少对手成功的机会。
{"title":"A cost-effective security management for clouds: A game-theoretic deception mechanism","authors":"Mohammad Taghi Adili, Amin Mohammadi, M. Manshaei, M. Rahman","doi":"10.23919/INM.2017.7987269","DOIUrl":"https://doi.org/10.23919/INM.2017.7987269","url":null,"abstract":"The Information Technology (IT) is observing a rising shift toward cloud computing due to its attractive on-demand storage and computing capabilities that allow moving the computing and storage load from the owner's side to the service provider's place and enjoying the data or computed results efficiently anywhere anytime. This growing use of clouds also introduces significant security concerns, as sensitive data and critical applications are increasingly being moved to clouds. Recent work also reveals different security threats, e.g., side-channel attacks, against cloud services. In this work, we address the need of improved solutions for the security management of cloud computing. We propose a moving target-based deceptive defense mechanism where the moving target idea is centered on frequent migrations of the virtual machines (VMs). We make the moves cost-efficient by modeling the problem as a signaling game between the adversary and the VMs and introducing deceptions. We solve the game and obtain two Nash equilibria. These results illustrate the best possible moves by the adversary and the corresponding strategy for the VMs that should reduce the adversary's chance of being successful at most.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123540372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Lightweight virtualization as enabling technology for future smart cars 轻量级虚拟化作为未来智能汽车的支持技术
Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987466
Roberto Morabito, Riccardo Petrolo, V. Loscrí, N. Mitton, G. Ruggeri, A. Molinaro
Modern vehicles are equipped with several interconnected sensors on board for monitoring and diagnosis purposes; their availability is a main driver for the development of novel applications in the smart vehicle domain. In this paper, we propose a Docker container-based platform as solution for implementing customized smart car applications. Through a proof-of-concept prototype—developed on a Raspberry Pi3 board—we show that a container-based virtualization approach is not only viable but also effective and flexible in the management of several parallel processes running on On Board Unit. More specifically, the platform can take priority-based decisions by handling multiple inputs, e.g., data from the CANbus based on the OBD II codes, video from the on-board webcam, and so on. Results are promising for the development of future in-vehicle virtualized platforms.
现代车辆配备了多个相互连接的传感器,用于监测和诊断;它们的可用性是智能汽车领域新应用开发的主要驱动力。在本文中,我们提出了一个基于Docker容器的平台作为实现定制智能汽车应用的解决方案。通过在Raspberry Pi3板上开发的概念验证原型,我们证明了基于容器的虚拟化方法不仅可行,而且在管理on Board Unit上运行的多个并行进程方面是有效和灵活的。更具体地说,该平台可以通过处理多个输入来做出基于优先级的决策,例如,基于OBD II代码的can总线数据,来自车载网络摄像头的视频等等。研究结果为未来车载虚拟化平台的发展提供了前景。
{"title":"Lightweight virtualization as enabling technology for future smart cars","authors":"Roberto Morabito, Riccardo Petrolo, V. Loscrí, N. Mitton, G. Ruggeri, A. Molinaro","doi":"10.23919/INM.2017.7987466","DOIUrl":"https://doi.org/10.23919/INM.2017.7987466","url":null,"abstract":"Modern vehicles are equipped with several interconnected sensors on board for monitoring and diagnosis purposes; their availability is a main driver for the development of novel applications in the smart vehicle domain. In this paper, we propose a Docker container-based platform as solution for implementing customized smart car applications. Through a proof-of-concept prototype—developed on a Raspberry Pi3 board—we show that a container-based virtualization approach is not only viable but also effective and flexible in the management of several parallel processes running on On Board Unit. More specifically, the platform can take priority-based decisions by handling multiple inputs, e.g., data from the CANbus based on the OBD II codes, video from the on-board webcam, and so on. Results are promising for the development of future in-vehicle virtualized platforms.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"545 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125385740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
期刊
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1