首页 > 最新文献

2022 IEEE 8th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
A Zero-Touch as-a-Service Active Monitoring Framework for Virtualized Network Environments 面向虚拟化网络环境的零接触即服务主动监控框架
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844069
Alireza Mohammadpour, C. Lombardo, R. Bolla, R. Bruschi, F. Davoli, Lorenzo Ivaldi
In order to fulfill the stringent requirements of 5G applications, measuring the performance of the VNFs composing the network slices is crucial to identify potential bottlenecks of the networks. However, since the VNF behavior is time varying and strongly depends on the infrastructure and hosting execution environment, the traditional traffic generators are not suited for the evaluation as their overhead, both in terms of deployment time and code complexity, may affect the results to the point of corruption. In order to overcome this issue, this paper presents a software traffic generator, based on TRex and executed in a VNF, which leverages on an automation framework to provide zero-touch as-a-Service active monitoring. Results show that the impact of this solution on the measured performance is negligible in terms of deployment time as well as required input lines.
为了满足5G应用的严格要求,测量组成网络片的VNFs的性能对于识别网络的潜在瓶颈至关重要。然而,由于VNF行为是时变的,并且强烈依赖于基础设施和主机执行环境,传统的流量生成器不适合进行评估,因为它们的开销(在部署时间和代码复杂性方面)可能会影响结果到崩溃的程度。为了克服这个问题,本文提出了一个基于TRex并在VNF中执行的软件流量生成器,它利用自动化框架提供零接触即服务主动监控。结果表明,就部署时间和所需的输入线路而言,该解决方案对测量性能的影响可以忽略不计。
{"title":"A Zero-Touch as-a-Service Active Monitoring Framework for Virtualized Network Environments","authors":"Alireza Mohammadpour, C. Lombardo, R. Bolla, R. Bruschi, F. Davoli, Lorenzo Ivaldi","doi":"10.1109/NetSoft54395.2022.9844069","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844069","url":null,"abstract":"In order to fulfill the stringent requirements of 5G applications, measuring the performance of the VNFs composing the network slices is crucial to identify potential bottlenecks of the networks. However, since the VNF behavior is time varying and strongly depends on the infrastructure and hosting execution environment, the traditional traffic generators are not suited for the evaluation as their overhead, both in terms of deployment time and code complexity, may affect the results to the point of corruption. In order to overcome this issue, this paper presents a software traffic generator, based on TRex and executed in a VNF, which leverages on an automation framework to provide zero-touch as-a-Service active monitoring. Results show that the impact of this solution on the measured performance is negligible in terms of deployment time as well as required input lines.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123058477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trading off Power Consumption and Delay in the Execution of Network Functions by Dynamic Activation of Processing Units 通过动态激活处理单元来权衡网络功能执行中的功耗和延迟
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844039
R. Bolla, R. Bruschi, A. Carrega, F. Davoli, C. Lombardo
Beside increasing flexibility and programmability, the current network “softwarization” trend is believed to be beneficial also in respect of energy efficiency, owing to the consolidation of resources made possible by virtualized networking components. However, the widespread use of general-purpose hardware may jeopardize energy saving, unless proper control strategies are put in operation. In this context, the paper addresses a “smart sleeping” control problem, where computing resources in multi-core processors executing network functions are modelled as multi-server queues, and the number of active processing units (either physical or virtual) can be dynamically adjusted by parametric control over a time scale compatible with the long-term dynamics of the traffic flows that require processing. We show that, on average, up to 25% of processing capacity of a network node can be turned off in the presence of bursty traffic with low load without significantly affecting packet latency.
除了增加灵活性和可编程性外,目前的网络“软件化”趋势据信在能源效率方面也有好处,因为虚拟化的网络组件可以整合资源。然而,通用硬件的广泛使用可能会危及节能,除非采取适当的控制策略。在这种情况下,本文解决了一个“智能睡眠”控制问题,其中执行网络功能的多核处理器中的计算资源被建模为多服务器队列,并且活动处理单元(物理或虚拟)的数量可以通过参数控制在与需要处理的流量的长期动态兼容的时间尺度上动态调整。我们表明,平均而言,在低负载的突发流量存在时,可以关闭网络节点高达25%的处理能力,而不会显着影响数据包延迟。
{"title":"Trading off Power Consumption and Delay in the Execution of Network Functions by Dynamic Activation of Processing Units","authors":"R. Bolla, R. Bruschi, A. Carrega, F. Davoli, C. Lombardo","doi":"10.1109/NetSoft54395.2022.9844039","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844039","url":null,"abstract":"Beside increasing flexibility and programmability, the current network “softwarization” trend is believed to be beneficial also in respect of energy efficiency, owing to the consolidation of resources made possible by virtualized networking components. However, the widespread use of general-purpose hardware may jeopardize energy saving, unless proper control strategies are put in operation. In this context, the paper addresses a “smart sleeping” control problem, where computing resources in multi-core processors executing network functions are modelled as multi-server queues, and the number of active processing units (either physical or virtual) can be dynamically adjusted by parametric control over a time scale compatible with the long-term dynamics of the traffic flows that require processing. We show that, on average, up to 25% of processing capacity of a network node can be turned off in the presence of bursty traffic with low load without significantly affecting packet latency.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134397669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerator-Resource Sharing with Offload-Mediated Proxy for vRAN 基于负载中介代理的vRAN加速器资源共享
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844114
Ikuo Otani, Kei Fujimoto, A. Shiraga
In a virtual radio access network (vRAN), accelerators are often used in general purpose servers. They can achieve very high performance in signal processing but at the same time consume high power. If accelerators can be shared by multiple vRAN applications, power consumption can be saved.In this paper, we proposed a method to satisfy five requirements in sharing vRAN accelerators by multiple applications: (a) accelerator sharing without application modification, (b) dynamic accelerator resource increasing and decreasing, (c) no need to consume accelerator resources to enable accelerator sharing, (d) minimum increase in power to enable accelerator sharing, and (e) minimum decrease in performance to enable accelerator sharing. Through pre-evaluation, it became clear that proxy architecture can achieve requirements (a)–(c), but it also causes power to increase. To reduce overheads, we proposed a proxy method in which the proxy itself and vRAN application can sleep as much as possible. We showed that this architecture can reduce power as low as a raw accelerator system without significantly degrading performance, which means accelerator sharing is feasible.
在虚拟无线接入网(vRAN)中,加速器常用于通用服务器。它们可以在信号处理方面达到很高的性能,但同时也消耗了很高的功率。如果加速器可以被多个vRAN应用程序共享,则可以节省功耗。在本文中,我们提出了一种方法,以满足多个应用共享vRAN加速器的五个要求:(a)不修改应用的加速器共享,(b)加速器资源的动态增减,(c)不需要消耗加速器资源来实现加速器共享,(d)功率的最小增加以实现加速器共享,(e)性能的最小下降以实现加速器共享。通过预评估,可以清楚地看到代理体系结构可以实现需求(a) - (c),但它也会导致能力的增加。为了减少开销,我们提出了一种代理方法,在这种方法中,代理本身和vRAN应用程序可以尽可能地休眠。我们证明了这种架构可以像原始加速器系统一样降低功耗,而不会显著降低性能,这意味着加速器共享是可行的。
{"title":"Accelerator-Resource Sharing with Offload-Mediated Proxy for vRAN","authors":"Ikuo Otani, Kei Fujimoto, A. Shiraga","doi":"10.1109/NetSoft54395.2022.9844114","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844114","url":null,"abstract":"In a virtual radio access network (vRAN), accelerators are often used in general purpose servers. They can achieve very high performance in signal processing but at the same time consume high power. If accelerators can be shared by multiple vRAN applications, power consumption can be saved.In this paper, we proposed a method to satisfy five requirements in sharing vRAN accelerators by multiple applications: (a) accelerator sharing without application modification, (b) dynamic accelerator resource increasing and decreasing, (c) no need to consume accelerator resources to enable accelerator sharing, (d) minimum increase in power to enable accelerator sharing, and (e) minimum decrease in performance to enable accelerator sharing. Through pre-evaluation, it became clear that proxy architecture can achieve requirements (a)–(c), but it also causes power to increase. To reduce overheads, we proposed a proxy method in which the proxy itself and vRAN application can sleep as much as possible. We showed that this architecture can reduce power as low as a raw accelerator system without significantly degrading performance, which means accelerator sharing is feasible.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116729161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backup Resource Allocation Model with Two-Stage Probabilistic Protection 具有两阶段概率保护的备份资源分配模型
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844070
Kento Yokouchi, Fujun He, E. Oki
This paper proposes a backup resource allocation model with two-stage probabilistic protection to minimize the total required backup capacity for multiple simultaneous failures of physical machines (PMs). Probabilistic protection ensures that the probability that the PM used for backup fails to backup due to lack of computing capacity does not exceed a given survivability parameter. The proposed model protects the primary virtual machines by allocating computing capacity to backup PMs with probabilistic protection. Since it is uncertain which primary PMs fail, we apply robust optimization to the probabilistic protection. By using a table that takes into account the survivability parameter and the failure probability of PMs, this proposed model is formulated as a mixed integer linear programming problem. The proposed model extends the probabilistic protection to two stages; the VMs that fail to be protected in the first stage are protected in the second stage to achieve the probabilistic protection with the final survivability parameter. This model can reduce the total required backup capacity compared to the conventional model with one-stage probabilistic protection.
为了使多台物理机同时发生故障时所需的备份容量最小,提出了一种带两阶段概率保护的备份资源分配模型。概率保护确保用于备份的PM由于缺乏计算能力而无法备份的概率不超过给定的生存性参数。该模型通过将计算能力分配给具有概率保护的备份虚拟机来保护主虚拟机。由于不确定哪些主pm会失败,我们将鲁棒优化应用于概率保护。利用考虑生存能力参数和失效概率的表格,将该模型表述为一个混合整数线性规划问题。该模型将概率保护扩展到两个阶段;对第一阶段保护失败的虚拟机进行第二阶段保护,实现最终生存能力参数的概率保护。与传统的一级概率保护模型相比,该模型可以减少所需的总备份容量。
{"title":"Backup Resource Allocation Model with Two-Stage Probabilistic Protection","authors":"Kento Yokouchi, Fujun He, E. Oki","doi":"10.1109/NetSoft54395.2022.9844070","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844070","url":null,"abstract":"This paper proposes a backup resource allocation model with two-stage probabilistic protection to minimize the total required backup capacity for multiple simultaneous failures of physical machines (PMs). Probabilistic protection ensures that the probability that the PM used for backup fails to backup due to lack of computing capacity does not exceed a given survivability parameter. The proposed model protects the primary virtual machines by allocating computing capacity to backup PMs with probabilistic protection. Since it is uncertain which primary PMs fail, we apply robust optimization to the probabilistic protection. By using a table that takes into account the survivability parameter and the failure probability of PMs, this proposed model is formulated as a mixed integer linear programming problem. The proposed model extends the probabilistic protection to two stages; the VMs that fail to be protected in the first stage are protected in the second stage to achieve the probabilistic protection with the final survivability parameter. This model can reduce the total required backup capacity compared to the conventional model with one-stage probabilistic protection.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123543726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Micro-Services for Ultra-Low Latency: An optimization Model for Service Function Chains Placement 利用微服务实现超低延迟:服务功能链布局的优化模型
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844040
Hichem Magnouche, G. Doyen, C. Prodhon
The evolution of the Internet tends toward ever requiring lower latency services. Cloud robotics or drone piloting are service use-cases in which the latency of traffic cannot exceed a few milliseconds. Reducing the latency can be achieved through several means, and micro-services deployed over virtual infrastructures appears as a promising way by enabling service chain reductions, micro-function mutualization and parallelism. However, the placement and routing of such components appears as an harder task to achieve as compared to monolithic approaches of the state of the art. Consequently, we propose in this paper a comprehensive optimization model in charge of placing micro-services in a virtualized network infrastructure, under ultra-low latency constraints while preserving resource consumption. By challenging our model with several realistic scenarios in terms of topology and service function chains (SFC), we demonstrate to what extent it improves the overall performance of SFC by especially minimizing the gap between the expected latency and the actual one, as compared to several competitors, thus making it a well-fitted approach for ultra-low latency services.
Internet的发展趋向于要求更低延迟的服务。云机器人或无人机驾驶是流量延迟不超过几毫秒的服务用例。减少延迟可以通过几种方式实现,通过支持服务链缩减、微功能互化和并行性,在虚拟基础设施上部署微服务似乎是一种很有前途的方式。然而,与目前的整体方法相比,这些组件的放置和路由似乎是一项更难实现的任务。因此,我们在本文中提出了一个综合优化模型,负责在超低延迟约束下将微服务放置在虚拟化网络基础设施中,同时保持资源消耗。通过在拓扑和服务功能链(SFC)方面的几个现实场景挑战我们的模型,我们展示了与几个竞争对手相比,它通过最小化预期延迟与实际延迟之间的差距,在多大程度上提高了SFC的整体性能,从而使其成为一种非常适合超低延迟服务的方法。
{"title":"Leveraging Micro-Services for Ultra-Low Latency: An optimization Model for Service Function Chains Placement","authors":"Hichem Magnouche, G. Doyen, C. Prodhon","doi":"10.1109/NetSoft54395.2022.9844040","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844040","url":null,"abstract":"The evolution of the Internet tends toward ever requiring lower latency services. Cloud robotics or drone piloting are service use-cases in which the latency of traffic cannot exceed a few milliseconds. Reducing the latency can be achieved through several means, and micro-services deployed over virtual infrastructures appears as a promising way by enabling service chain reductions, micro-function mutualization and parallelism. However, the placement and routing of such components appears as an harder task to achieve as compared to monolithic approaches of the state of the art. Consequently, we propose in this paper a comprehensive optimization model in charge of placing micro-services in a virtualized network infrastructure, under ultra-low latency constraints while preserving resource consumption. By challenging our model with several realistic scenarios in terms of topology and service function chains (SFC), we demonstrate to what extent it improves the overall performance of SFC by especially minimizing the gap between the expected latency and the actual one, as compared to several competitors, thus making it a well-fitted approach for ultra-low latency services.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129927942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-domain Denial-of-Service Attacks in Internet-of-Vehicles: Vulnerability Insights and Detection Performance 车联网中的多域拒绝服务攻击:漏洞洞察和检测性能
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844055
R. Sedar, Charalampos Kalalas, J. Alonso-Zarate, F. V. Gallego
The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges which involve security vulnerabilities and privacy breaches. In this context, denial-of-service (DoS) attacks may perniciously affect the normal operation of IoV systems by causing extensive periods of network unavailability where legitimate vehicles are prevented from accessing vehicular services. In this paper, we offer an in-depth vulnerability assessment of 5G-enabled IoV systems when DoS attack variants are launched at multiple network domains. We further evaluate the resilience of an IoV-tailored authentication mechanism against DoS attacks under various configurations. A data-driven detection scheme is also proposed to address DoS variants in the radio access network, which take the form of false data injection attacks on the exchanged vehicular information. Our performance assessment with the aid of an open-source dataset reveals that the proposed scheme is able to accurately detect DoS traffic originated from malicious vehicles.
革命性的车联网(IoV)范式在不经意间带来了涉及安全漏洞和隐私泄露的挑战。在这种情况下,拒绝服务(DoS)攻击可能会导致长时间的网络不可用,导致合法车辆无法访问车辆服务,从而对车联网系统的正常运行产生有害影响。在本文中,我们对在多个网络域启动DoS攻击变体时启用5g的车联网系统进行了深入的漏洞评估。我们进一步评估了iot定制认证机制在各种配置下抵御DoS攻击的弹性。提出了一种数据驱动的检测方案,以解决无线接入网中的DoS变体,这些变体采用对交换的车辆信息进行虚假数据注入攻击的形式。我们在开源数据集的帮助下进行的性能评估表明,所提出的方案能够准确检测来自恶意车辆的DoS流量。
{"title":"Multi-domain Denial-of-Service Attacks in Internet-of-Vehicles: Vulnerability Insights and Detection Performance","authors":"R. Sedar, Charalampos Kalalas, J. Alonso-Zarate, F. V. Gallego","doi":"10.1109/NetSoft54395.2022.9844055","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844055","url":null,"abstract":"The transformative Internet-of-Vehicles (IoV) paradigm comes inadvertently with challenges which involve security vulnerabilities and privacy breaches. In this context, denial-of-service (DoS) attacks may perniciously affect the normal operation of IoV systems by causing extensive periods of network unavailability where legitimate vehicles are prevented from accessing vehicular services. In this paper, we offer an in-depth vulnerability assessment of 5G-enabled IoV systems when DoS attack variants are launched at multiple network domains. We further evaluate the resilience of an IoV-tailored authentication mechanism against DoS attacks under various configurations. A data-driven detection scheme is also proposed to address DoS variants in the radio access network, which take the form of false data injection attacks on the exchanged vehicular information. Our performance assessment with the aid of an open-source dataset reveals that the proposed scheme is able to accurately detect DoS traffic originated from malicious vehicles.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"29 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122598099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting Data Exfiltration over Encrypted DNS 通过加密DNS检测数据泄露
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844067
Jacob Steadman, Sandra Scott-Hayward
Data breaches linked to individual and company information are exposed on an almost daily basis. With increasing media attention and visibility of this security issue, users are becoming more aware of privacy concerns related to their activity on the Internet. Fundamental to the operation of the Internet is the Domain Name System (DNS), which translates domain names to IP addresses enabling easy web browsing. Encrypted DNS has become popular to increase user privacy by ensuring that activity transmitted over domain queries is not visible to intermediary network devices between the client and the DNS endpoint. Unfortunately, this undermines the security services designed to analyse DNS traffic for the detection of exploitation of DNS for use as a covert communication and data exfiltration channel. In this work, we propose a solution, DoHxP, to enable protection of DNS over HTTPS (DoH) traffic from data exfiltration without compromising user privacy. Our results show that DoHxP successfully prevents up to 99.88% of the malicious DoH traffic from being transmitted outside of the network.
与个人和公司信息相关的数据泄露事件几乎每天都在发生。随着媒体对这个安全问题的关注和可见性的增加,用户越来越意识到与他们在Internet上的活动有关的隐私问题。互联网运作的基础是域名系统(DNS),它将域名转换为IP地址,方便浏览网页。通过确保通过域查询传输的活动对客户机和DNS端点之间的中间网络设备不可见,加密DNS已经变得流行,以增加用户隐私。不幸的是,这破坏了旨在分析DNS流量以检测利用DNS作为秘密通信和数据泄露通道的安全服务。在这项工作中,我们提出了一个解决方案,DoHxP,在不损害用户隐私的情况下,通过HTTPS (DoH)流量保护DNS免受数据泄露。我们的结果表明,DoHxP成功地阻止了高达99.88%的恶意DoH流量被传输到网络外。
{"title":"Detecting Data Exfiltration over Encrypted DNS","authors":"Jacob Steadman, Sandra Scott-Hayward","doi":"10.1109/NetSoft54395.2022.9844067","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844067","url":null,"abstract":"Data breaches linked to individual and company information are exposed on an almost daily basis. With increasing media attention and visibility of this security issue, users are becoming more aware of privacy concerns related to their activity on the Internet. Fundamental to the operation of the Internet is the Domain Name System (DNS), which translates domain names to IP addresses enabling easy web browsing. Encrypted DNS has become popular to increase user privacy by ensuring that activity transmitted over domain queries is not visible to intermediary network devices between the client and the DNS endpoint. Unfortunately, this undermines the security services designed to analyse DNS traffic for the detection of exploitation of DNS for use as a covert communication and data exfiltration channel. In this work, we propose a solution, DoHxP, to enable protection of DNS over HTTPS (DoH) traffic from data exfiltration without compromising user privacy. Our results show that DoHxP successfully prevents up to 99.88% of the malicious DoH traffic from being transmitted outside of the network.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"3 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120821241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Demo: Towards Software Defined Layer 4.5 Customization 演示:实现软件定义层4.5定制
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844104
Daniel Lukaszewski, G. Xie
We demonstrate a system prototype of a new software framework [1] for orchestration and continuous management of protocol customization of selected devices in an enterprise or data-center network. The prototype mainly consists of a network-wide customization orchestrator (NCO) that deploys sample customization modules to a pair of client-server hosts for insertion between the application and transport layers, termed Layer 4.5, and a device customization agent (DCA) installed at each host. In this demo, we show how our system can be used to customize multiple protocols on a client to match different network and server requirements.
我们展示了一个新的软件框架的系统原型[1],用于企业或数据中心网络中选定设备的协议定制的编排和持续管理。原型主要由一个网络范围的定制编排器(NCO)和一个安装在每个主机上的设备定制代理(DCA)组成,NCO将示例定制模块部署到一对客户机-服务器主机上,以便在应用程序层和传输层之间插入,称为Layer 4.5。在这个演示中,我们将展示如何使用我们的系统在客户机上定制多个协议,以匹配不同的网络和服务器需求。
{"title":"Demo: Towards Software Defined Layer 4.5 Customization","authors":"Daniel Lukaszewski, G. Xie","doi":"10.1109/NetSoft54395.2022.9844104","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844104","url":null,"abstract":"We demonstrate a system prototype of a new software framework [1] for orchestration and continuous management of protocol customization of selected devices in an enterprise or data-center network. The prototype mainly consists of a network-wide customization orchestrator (NCO) that deploys sample customization modules to a pair of client-server hosts for insertion between the application and transport layers, termed Layer 4.5, and a device customization agent (DCA) installed at each host. In this demo, we show how our system can be used to customize multiple protocols on a client to match different network and server requirements.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129123500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Intent Correctness with Automated Testing 通过自动化测试提高意图正确性
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844054
P. Alcock, Ben Simms, Will Fantom, Charalampos Rotsos, N. Race
Intent-based networking (IBN) systems have become the de-facto control abstraction to drive self-service, self-healing, and self-optimized capabilities in service delivery processes. Nonetheless, the operation complexity of modern network infrastructures make network practitioners apprehensive towards adoption in production, requiring further evidence for correctness. In this paper, we argue that testing, verification and monitoring should become first-class citizens in reference IBN architecture, in order to improve the detection errors during operations. Towards this goal, we present an extension for an intent architecture that allows IBN system to validate the correctness of network configuration using realistic network emulation. Furthermore, we present an intent use-case that ensure correct operation in hybrid networks.
基于意图的网络(IBN)系统已经成为驱动服务交付过程中的自服务、自修复和自优化功能的事实上的控制抽象。尽管如此,现代网络基础设施的操作复杂性使网络从业者对其在生产中的采用感到担忧,需要进一步的证据来证明其正确性。在本文中,我们认为测试、验证和监控应该成为参考IBN体系结构中的头等公民,以提高运行过程中的检测误差。为了实现这一目标,我们提出了一个意图体系结构的扩展,它允许IBN系统使用真实的网络仿真来验证网络配置的正确性。此外,我们提出了一个意图用例,以确保在混合网络中正确运行。
{"title":"Improving Intent Correctness with Automated Testing","authors":"P. Alcock, Ben Simms, Will Fantom, Charalampos Rotsos, N. Race","doi":"10.1109/NetSoft54395.2022.9844054","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844054","url":null,"abstract":"Intent-based networking (IBN) systems have become the de-facto control abstraction to drive self-service, self-healing, and self-optimized capabilities in service delivery processes. Nonetheless, the operation complexity of modern network infrastructures make network practitioners apprehensive towards adoption in production, requiring further evidence for correctness. In this paper, we argue that testing, verification and monitoring should become first-class citizens in reference IBN architecture, in order to improve the detection errors during operations. Towards this goal, we present an extension for an intent architecture that allows IBN system to validate the correctness of network configuration using realistic network emulation. Furthermore, we present an intent use-case that ensure correct operation in hybrid networks.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130654940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
End-to-end 5G network slice resource management and orchestration architecture 端到端5G网络切片资源管理和编排架构
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844088
Hiroki Baba, Shiku Hirai, Takayuki Nakamura, S. Kanemaru, Kensuke Takahashi, Taisuke Omoto, Shinsaku Akiyama, Senri Hirabaru
The orchestration and management of 5G network slicing (NS) requires cross-domain orchestration across 5G radio access network (RAN), 5G core network (CN), and transport network and also coordination of closed loops of each 5G network segment. We propose a resource orchestration and management architecture for end-to-end (E2E) 5G network slices to automate the flexible and high-performance NS’s management and orchestration. Through developing a prototype of the proposed architecture on an experimental 5G network, the effectiveness of our architecture is proven through prominent use cases certified by ETSI ZSM.
5G网络切片(NS)的编排和管理需要跨5G无线接入网(RAN)、5G核心网(CN)和传输网络的跨域编排,以及各5G网段闭环的协调。我们提出了一种端到端(E2E) 5G网络切片的资源编排和管理架构,以实现灵活、高性能的NS管理和编排自动化。通过在实验性5G网络上开发拟议架构的原型,通过ETSI ZSM认证的突出用例证明了我们架构的有效性。
{"title":"End-to-end 5G network slice resource management and orchestration architecture","authors":"Hiroki Baba, Shiku Hirai, Takayuki Nakamura, S. Kanemaru, Kensuke Takahashi, Taisuke Omoto, Shinsaku Akiyama, Senri Hirabaru","doi":"10.1109/NetSoft54395.2022.9844088","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844088","url":null,"abstract":"The orchestration and management of 5G network slicing (NS) requires cross-domain orchestration across 5G radio access network (RAN), 5G core network (CN), and transport network and also coordination of closed loops of each 5G network segment. We propose a resource orchestration and management architecture for end-to-end (E2E) 5G network slices to automate the flexible and high-performance NS’s management and orchestration. Through developing a prototype of the proposed architecture on an experimental 5G network, the effectiveness of our architecture is proven through prominent use cases certified by ETSI ZSM.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134027732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2022 IEEE 8th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1