首页 > 最新文献

2022 IEEE 8th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum TRAILS:扩展TOSCA NFV配置文件,用于云到物联网连续体中的责任管理
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844027
Yacine Anser, Chrystel Gaber, Jean-Philippe Wary, S. N. Matheu-García, S. Bouzefrane
To address the growing amount of data generated by the Internet of Things (IoT), Network Functions Virtualization (NFV), 5G, Fog and Edge computing converge to form a Cloud-to-IoT continuum. This complex multi-layer architecture involves several actors among which responsibilities may be blurred. Existing profiles mostly describe deployment aspects and elude responsibility, accountability or liability characteristics. Moreover, the multiplicity of component profiles prevents uniform service management. This paper proposes TRAILS (sTakeholder Responsibility, AccountabIity and Liability deScriptor), an extension of the TOSCA NFV profile that merges the existing profiles and adds a description of the responsibilities and accountabilities of supply chain actors. This allows a uniform and liability-aware management of services involving IoT devices, fog, edge and cloud nodes. To show the usability of our model, we discuss the ecosystem around the generation of the proposed extension as well as its application in an ontology-based referencing module of a liability-aware service manager that we designed.
为了应对物联网(IoT)产生的越来越多的数据,网络功能虚拟化(NFV)、5G、雾和边缘计算将融合在一起,形成云到物联网的连续体。这个复杂的多层体系结构涉及几个参与者,其中的职责可能是模糊的。现有的概要文件大多描述了部署方面,并回避了责任、责任或责任特征。此外,组件配置文件的多样性妨碍了统一的服务管理。本文提出了TRAILS(利益相关者责任、责任和责任描述符),这是TOSCA NFV配置文件的扩展,它合并了现有的配置文件,并添加了供应链参与者的责任和责任的描述。这允许对涉及物联网设备、雾、边缘和云节点的服务进行统一和责任感知管理。为了展示我们模型的可用性,我们讨论了围绕拟议扩展生成的生态系统,以及它在我们设计的责任感知服务管理器的基于本体论的引用模块中的应用。
{"title":"TRAILS: Extending TOSCA NFV profiles for liability management in the Cloud-to-IoT continuum","authors":"Yacine Anser, Chrystel Gaber, Jean-Philippe Wary, S. N. Matheu-García, S. Bouzefrane","doi":"10.1109/NetSoft54395.2022.9844027","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844027","url":null,"abstract":"To address the growing amount of data generated by the Internet of Things (IoT), Network Functions Virtualization (NFV), 5G, Fog and Edge computing converge to form a Cloud-to-IoT continuum. This complex multi-layer architecture involves several actors among which responsibilities may be blurred. Existing profiles mostly describe deployment aspects and elude responsibility, accountability or liability characteristics. Moreover, the multiplicity of component profiles prevents uniform service management. This paper proposes TRAILS (sTakeholder Responsibility, AccountabIity and Liability deScriptor), an extension of the TOSCA NFV profile that merges the existing profiles and adds a description of the responsibilities and accountabilities of supply chain actors. This allows a uniform and liability-aware management of services involving IoT devices, fog, edge and cloud nodes. To show the usability of our model, we discuss the ecosystem around the generation of the proposed extension as well as its application in an ontology-based referencing module of a liability-aware service manager that we designed.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114771835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Probability-based dispatching framework for speed-test applications: design and implementation 基于概率的速度测试应用调度框架:设计与实现
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844078
Francesco D'Alterio, Marco Teodori, L. Rea, F. Matera
Speed-test applications come handy to validate the compliance of any established network connection against the pre-negotiated E2E QoS indicators, even though they have cope with strict requirements to provide correct measures to any user. Therefore Software-Defined Networking approaches can help these measurement instruments driving the choice in terms of paths and resources. In this framework we show a speed-test application which tackles the user-server assignation problem proposing a client-base dispatching framework which operates leveraging two sets of parameters named endogenous (measured by the client itself) and exogenous (requiring the interaction with external elements). Framework implementation is documented, for which step-by-step evaluation of such parameters is provided, followed by their context-dependent optimization via a stochastic gradient-descent approach properly tuned to operate in a real distributed speed-test facility.
速度测试应用程序可以方便地根据预先协商的端到端QoS指标验证任何已建立的网络连接的合规性,即使它们已经处理严格的要求以向任何用户提供正确的度量。因此,软件定义网络方法可以帮助这些测量工具在路径和资源方面驱动选择。在这个框架中,我们展示了一个速度测试应用程序,它解决了用户-服务器分配问题,提出了一个基于客户端的调度框架,该框架利用两组参数进行操作,称为内生参数(由客户端本身测量)和外源性参数(需要与外部元素交互)。框架实现是文档化的,提供了这些参数的逐步评估,然后通过随机梯度下降方法进行上下文相关的优化,适当调整以在真实的分布式速度测试设施中运行。
{"title":"Probability-based dispatching framework for speed-test applications: design and implementation","authors":"Francesco D'Alterio, Marco Teodori, L. Rea, F. Matera","doi":"10.1109/NetSoft54395.2022.9844078","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844078","url":null,"abstract":"Speed-test applications come handy to validate the compliance of any established network connection against the pre-negotiated E2E QoS indicators, even though they have cope with strict requirements to provide correct measures to any user. Therefore Software-Defined Networking approaches can help these measurement instruments driving the choice in terms of paths and resources. In this framework we show a speed-test application which tackles the user-server assignation problem proposing a client-base dispatching framework which operates leveraging two sets of parameters named endogenous (measured by the client itself) and exogenous (requiring the interaction with external elements). Framework implementation is documented, for which step-by-step evaluation of such parameters is provided, followed by their context-dependent optimization via a stochastic gradient-descent approach properly tuned to operate in a real distributed speed-test facility.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133591863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demonstration of Containerized Central Unit Live Migration in 5G Radio Access Network 5G无线接入网中集装箱化中央单元实时迁移的演示
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844071
Shunmugapriya Ramanathan, A. Bhattacharyya, K. Kondepu, M. Razo, M. Tacca, L. Valcarenghi, A. Fumagalli
The 5G Radio Access Network (RAN) architecture provides a split option, whereby a gNodeB Central Unit (gNB-CU) is connected to one or more gNB-Distributed Units (gNB- DUs). The CU is in turn connected to the 5G Core Network (CN) and its functions can be virtualized through software containers. This demonstration showcases live migration of a containerized Central Unit (CU) component in a Cloud-native 5G network without loss of service. In terms of resiliency, virtual function live migration can circumvent the failure of the server hosting the gNB-virtualized CU (gNB-vCU) that would otherwise cause an interruption of user-plane (UP) traffic and disconnection of User Equipment (UE). The proposed gNB-vCU container live migration technique reduces the end-user service temporary downtime by 50% when compared to the traditional backup/restore option.
5G无线接入网(RAN)架构提供了一个分离选项,即gNB中央单元(gNB- cu)连接到一个或多个gNB分布式单元(gNB- du)。CU与5G核心网(CN)相连,通过软件容器实现功能虚拟化。此演示展示了在不丢失服务的情况下,在云原生5G网络中实时迁移容器化中央单元(CU)组件。在弹性方面,虚拟功能热迁移可以避免承载gnb -虚拟化CU (gNB-vCU)的服务器发生故障,否则可能导致UP (User -plane)流量中断和UE (User Equipment)断连。与传统的备份/恢复选项相比,建议的gNB-vCU容器实时迁移技术将最终用户服务临时停机时间减少了50%。
{"title":"Demonstration of Containerized Central Unit Live Migration in 5G Radio Access Network","authors":"Shunmugapriya Ramanathan, A. Bhattacharyya, K. Kondepu, M. Razo, M. Tacca, L. Valcarenghi, A. Fumagalli","doi":"10.1109/NetSoft54395.2022.9844071","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844071","url":null,"abstract":"The 5G Radio Access Network (RAN) architecture provides a split option, whereby a gNodeB Central Unit (gNB-CU) is connected to one or more gNB-Distributed Units (gNB- DUs). The CU is in turn connected to the 5G Core Network (CN) and its functions can be virtualized through software containers. This demonstration showcases live migration of a containerized Central Unit (CU) component in a Cloud-native 5G network without loss of service. In terms of resiliency, virtual function live migration can circumvent the failure of the server hosting the gNB-virtualized CU (gNB-vCU) that would otherwise cause an interruption of user-plane (UP) traffic and disconnection of User Equipment (UE). The proposed gNB-vCU container live migration technique reduces the end-user service temporary downtime by 50% when compared to the traditional backup/restore option.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128870380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks 静态分析引导攻击下可编程数据平面的脆弱性研究
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844121
Conor Black, Sandra Scott-Hayward
Programmable network data planes are paving the way for networking innovations, with the ability to perform complex, stateful tasks defined in high-level languages such as P4. The enhanced capabilities of programmable data plane devices has made verification of their runtime behaviour, using established methods such as probe packets, impossible to scale beyond probabilistic detection. This has created a potential opportunity for an attacker, with access to a compromised device, to subtly alter its forwarding program to mishandle only a small subset of packets, evading probabilistic detection. In practice, such subtle binary instrumentation attacks require extensive knowledge of the forwarding program, yet it is unclear whether a static analysis of compiled P4 programs to obtain this knowledge can be fast and accurate enough for an on-device attack scenario. In this work, we investigate this possibility by implementing a static analysis of P4 programs compiled to BPF bytecode. This analysis gathers sufficient information for the attacker to identify appropriate (reliably correct) edits to the program. We found that, due to predictable compiler behaviours, our analysis remains accurate even when several program behaviours are abstracted away. Our evaluation of the analysis requirements shows that, from a defensive perspective, there is scope for selectively manipulating those instructions in P4-BPF programs that are critical to attack-focused analysis in order to increase its difficulty, without increasing the number of program instructions.
可编程网络数据平面能够执行用高级语言(如P4)定义的复杂的、有状态的任务,为网络创新铺平了道路。可编程数据平面设备的增强功能使得使用既定方法(如探测数据包)验证其运行时行为不可能扩展到概率检测之外。这为攻击者创造了一个潜在的机会,可以访问受损设备,巧妙地改变其转发程序,使其仅错误处理一小部分数据包,从而逃避概率检测。在实践中,这种微妙的二进制检测攻击需要对转发程序有广泛的了解,但目前尚不清楚的是,对编译后的P4程序进行静态分析,以获得这些知识,对于设备上的攻击场景来说,是否足够快速和准确。在这项工作中,我们通过实现编译成BPF字节码的P4程序的静态分析来研究这种可能性。该分析为攻击者收集了足够的信息,以识别对程序的适当(可靠正确)编辑。我们发现,由于可预测的编译器行为,即使在抽象掉一些程序行为时,我们的分析仍然是准确的。我们对分析需求的评估表明,从防御的角度来看,在不增加程序指令数量的情况下,可以有选择地操纵P4-BPF程序中的那些指令,这些指令对以攻击为重点的分析至关重要。
{"title":"Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks","authors":"Conor Black, Sandra Scott-Hayward","doi":"10.1109/NetSoft54395.2022.9844121","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844121","url":null,"abstract":"Programmable network data planes are paving the way for networking innovations, with the ability to perform complex, stateful tasks defined in high-level languages such as P4. The enhanced capabilities of programmable data plane devices has made verification of their runtime behaviour, using established methods such as probe packets, impossible to scale beyond probabilistic detection. This has created a potential opportunity for an attacker, with access to a compromised device, to subtly alter its forwarding program to mishandle only a small subset of packets, evading probabilistic detection. In practice, such subtle binary instrumentation attacks require extensive knowledge of the forwarding program, yet it is unclear whether a static analysis of compiled P4 programs to obtain this knowledge can be fast and accurate enough for an on-device attack scenario. In this work, we investigate this possibility by implementing a static analysis of P4 programs compiled to BPF bytecode. This analysis gathers sufficient information for the attacker to identify appropriate (reliably correct) edits to the program. We found that, due to predictable compiler behaviours, our analysis remains accurate even when several program behaviours are abstracted away. Our evaluation of the analysis requirements shows that, from a defensive perspective, there is scope for selectively manipulating those instructions in P4-BPF programs that are critical to attack-focused analysis in order to increase its difficulty, without increasing the number of program instructions.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Orchestration Software for Resource Constrained Datacenters: an Experimental Evaluation 资源受限数据中心的编排软件:实验评估
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844043
Alexandros Valantasis, N. Makris, T. Korakis
The evolution of the cloud-computing technology has allowed the instantiation of resources almost anywhere. Handheld devices, edge/fog resources, and core cloud datacenters comprise a resource continuum that can be used for hosting almost any service. The rise of micro-services has allowed any application to be hosted over any type of compute resource, regardless of the underlying hardware architecture. In this work, we focus on the far-edge devices that participate in the resource continuum, located at the network access or the fog, and are usually resource constrained. We evaluate two lightweight frameworks which can be used for orchestrating micro-services on top of them. Our evaluation presents experimental evidence in terms of their capabilities for instantiating/tear-down of network services, and their dynamic adaptation to external workloads by using the respective horizontal scaling solutions, when tested under the same experimental environment.
云计算技术的发展使得资源的实例化几乎可以在任何地方实现。手持设备、边缘/雾资源和核心云数据中心组成了一个资源连续体,可以用于托管几乎任何服务。微服务的兴起使得任何应用程序都可以托管在任何类型的计算资源上,而不考虑底层硬件架构。在这项工作中,我们将重点放在参与资源连续体的远端设备上,这些设备位于网络访问或雾中,通常是资源受限的。我们评估了两个轻量级框架,它们可以用于在它们之上编排微服务。在相同的实验环境下进行测试时,我们的评估提供了实验证据,证明了它们实例化/拆除网络服务的能力,以及它们通过使用各自的水平扩展解决方案对外部工作负载的动态适应。
{"title":"Orchestration Software for Resource Constrained Datacenters: an Experimental Evaluation","authors":"Alexandros Valantasis, N. Makris, T. Korakis","doi":"10.1109/NetSoft54395.2022.9844043","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844043","url":null,"abstract":"The evolution of the cloud-computing technology has allowed the instantiation of resources almost anywhere. Handheld devices, edge/fog resources, and core cloud datacenters comprise a resource continuum that can be used for hosting almost any service. The rise of micro-services has allowed any application to be hosted over any type of compute resource, regardless of the underlying hardware architecture. In this work, we focus on the far-edge devices that participate in the resource continuum, located at the network access or the fog, and are usually resource constrained. We evaluate two lightweight frameworks which can be used for orchestrating micro-services on top of them. Our evaluation presents experimental evidence in terms of their capabilities for instantiating/tear-down of network services, and their dynamic adaptation to external workloads by using the respective horizontal scaling solutions, when tested under the same experimental environment.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121515720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient Transparent Access to 5G Edge Services 高效透明地接入5G边缘服务
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844066
Josef Hammer, H. Hellwagner
Multi-access Edge Computing (MEC) is a central piece of 5G telecommunication systems and is essential to satisfy the challenging low-latency demands of future applications. MEC provides a cloud computing platform at the edge of the radio access network that developers can utilize for their applications. In [1] we argued that edge computing should be transparent to clients and introduced a solution to that end. This paper presents how to efficiently implement such a transparent approach, leveraging Software-Defined Networking. For high performance and scalability, our architecture focuses on three aspects: (i) a modular architecture that can easily be distributed onto multiple switches/controllers, (ii) multiple filter stages to avoid screening traffic not intended for the edge, and (iii) several strategies to keep the number of flows low to make the best use of the precious flow table memory in hardware switches. A performance evaluation is shown, with results from a real edge/fog testbed.
多接入边缘计算(MEC)是5G电信系统的核心部分,对于满足未来应用具有挑战性的低延迟需求至关重要。MEC在无线接入网络的边缘提供了一个云计算平台,开发人员可以将其用于他们的应用程序。在b[1]中,我们认为边缘计算应该对客户端透明,并为此引入了一个解决方案。本文介绍了如何利用软件定义网络有效地实现这种透明的方法。对于高性能和可扩展性,我们的架构侧重于三个方面:(i)一个模块化的架构,可以很容易地分布到多个交换机/控制器上,(ii)多个过滤阶段,以避免筛选不打算用于边缘的流量,以及(iii)几种策略,以保持低流量的数量,以充分利用硬件交换机中宝贵的流表内存。给出了一个性能评估,并给出了一个真实边缘/雾测试平台的结果。
{"title":"Efficient Transparent Access to 5G Edge Services","authors":"Josef Hammer, H. Hellwagner","doi":"10.1109/NetSoft54395.2022.9844066","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844066","url":null,"abstract":"Multi-access Edge Computing (MEC) is a central piece of 5G telecommunication systems and is essential to satisfy the challenging low-latency demands of future applications. MEC provides a cloud computing platform at the edge of the radio access network that developers can utilize for their applications. In [1] we argued that edge computing should be transparent to clients and introduced a solution to that end. This paper presents how to efficiently implement such a transparent approach, leveraging Software-Defined Networking. For high performance and scalability, our architecture focuses on three aspects: (i) a modular architecture that can easily be distributed onto multiple switches/controllers, (ii) multiple filter stages to avoid screening traffic not intended for the edge, and (iii) several strategies to keep the number of flows low to make the best use of the precious flow table memory in hardware switches. A performance evaluation is shown, with results from a real edge/fog testbed.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132573181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Feasibility of Network-layer Anonymity Protocols at Terabit Speeds using a Programmable Switch 使用可编程交换机实现太比特速度的网络层匿名协议的可行性
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844111
Yutaro Yoshinaka, Junji Takemasa, Y. Koizumi, T. Hasegawa
The paper presents a Tbps-class anonymity router that supports both an anonymity protocol and IP by leveraging a programmable switch. The key design issue is to place both the compute-intensive header decryption function for anonymity protocol forwarding and the memory-intensive IP forwarding function on the processing pipes of a switch with satisfying its hardware requirements. A prototype router on a programmable switch achieves Tbps-scale forwarding.
本文提出了一种利用可编程交换机同时支持匿名协议和IP的tps级匿名路由器。设计的关键问题是将计算密集型的匿名协议转发头解密功能和内存密集型的IP转发功能放在满足交换机硬件要求的处理管道上。可编程交换机上的路由器原型实现了tps级转发。
{"title":"Feasibility of Network-layer Anonymity Protocols at Terabit Speeds using a Programmable Switch","authors":"Yutaro Yoshinaka, Junji Takemasa, Y. Koizumi, T. Hasegawa","doi":"10.1109/NetSoft54395.2022.9844111","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844111","url":null,"abstract":"The paper presents a Tbps-class anonymity router that supports both an anonymity protocol and IP by leveraging a programmable switch. The key design issue is to place both the compute-intensive header decryption function for anonymity protocol forwarding and the memory-intensive IP forwarding function on the processing pipes of a switch with satisfying its hardware requirements. A prototype router on a programmable switch achieves Tbps-scale forwarding.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131292530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains 网络安全框架中的身份验证和授权:保护数字服务链的新方法
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844030
G. Grieco, D. Striccoli, G. Piro, R. Bolla, G. Boggia, L. Grieco
Digital services and digital service chains are the heart beating of the modern economy. Their composition involves several players, i.e., processes, software, devices, and many kinds of data exchanged among them. In such a scenario, it is important to guarantee data confidentiality, integrity, as well as authentication and authorization procedures between the communicating parties of a service chain. Cyber-security frameworks are explicitly designed for this purpose. They rely on the integration of different software modules, mutually interfaced to accomplish complex security tasks. Nevertheless, it is important to guarantee a high level of protection during data exchange among the modules. Currently, standardized authentication and authorization mechanisms are implemented through proprietary “As-a-Service” products, but the deployment of a mature on-premise solution is still missing. To bridge this gap, this contribution proposes an authentication and authorization module that automatically protects the information flowing among the modules of cyber-security frameworks. It guarantees resource availability only to authenticated subjects. Thus, their operations are confined in what actions they are authorized for. The proposed module has been implemented and tested in a real cyber-security framework under development into the H2020 GUARD project. Experimental tests show that the proposed module enables authentication and authorization procedure delegation among GUARD modules, which eases their implementation, while maximizing the flexibility of the set of access control policies and an efficient protection of the services.
数字服务和数字服务链是现代经济的命脉。它们的组成涉及几个参与者,即过程、软件、设备以及它们之间交换的多种数据。在这种情况下,重要的是要保证数据的机密性、完整性以及服务链通信各方之间的身份验证和授权过程。网络安全框架就是为此目的而明确设计的。它们依靠不同软件模块的集成,相互接口来完成复杂的安全任务。然而,在模块之间的数据交换期间,保证高水平的保护是很重要的。目前,标准化的身份验证和授权机制是通过专有的“即服务”产品实现的,但是仍然缺少成熟的本地解决方案的部署。为了弥补这一差距,本文提出了一个身份验证和授权模块,该模块可以自动保护网络安全框架模块之间流动的信息。它保证资源仅对经过身份验证的主体可用。因此,他们的操作仅限于他们被授权的行动。提出的模块已经在H2020 GUARD项目开发的真实网络安全框架中实施和测试。实验测试表明,该模块能够在GUARD模块之间实现认证和授权过程的委托,简化了各个模块的实现,同时最大限度地提高了访问控制策略集的灵活性和对服务的有效保护。
{"title":"Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains","authors":"G. Grieco, D. Striccoli, G. Piro, R. Bolla, G. Boggia, L. Grieco","doi":"10.1109/NetSoft54395.2022.9844030","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844030","url":null,"abstract":"Digital services and digital service chains are the heart beating of the modern economy. Their composition involves several players, i.e., processes, software, devices, and many kinds of data exchanged among them. In such a scenario, it is important to guarantee data confidentiality, integrity, as well as authentication and authorization procedures between the communicating parties of a service chain. Cyber-security frameworks are explicitly designed for this purpose. They rely on the integration of different software modules, mutually interfaced to accomplish complex security tasks. Nevertheless, it is important to guarantee a high level of protection during data exchange among the modules. Currently, standardized authentication and authorization mechanisms are implemented through proprietary “As-a-Service” products, but the deployment of a mature on-premise solution is still missing. To bridge this gap, this contribution proposes an authentication and authorization module that automatically protects the information flowing among the modules of cyber-security frameworks. It guarantees resource availability only to authenticated subjects. Thus, their operations are confined in what actions they are authorized for. The proposed module has been implemented and tested in a real cyber-security framework under development into the H2020 GUARD project. Experimental tests show that the proposed module enables authentication and authorization procedure delegation among GUARD modules, which eases their implementation, while maximizing the flexibility of the set of access control policies and an efficient protection of the services.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123150399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flexible Measurement Testbed for Evaluating Time-Sensitive Networking in Industrial Automation Applications 工业自动化应用中时间敏感网络评估的柔性测量试验台
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844050
Stefan Senk, Marian Ulbricht, J. Acevedo, Giang T. Nguyen, P. Seeling, F. Fitzek
Deterministic communications are required for industrial environments, yet their realization is a challenging task. Time-Sensitive Networking (TSN) is intended to enable deterministic communication over inexpensive Ethernet networks. Standardized by the IEEE TSN working group, TSN enables precise control of time synchronization, traffic shaping, reliability enhancements, and network administration to answer the demands of industrial control applications. Subsequently, there is a significant need to enable turnkey research and implementation efforts. However, a current lack of open-sourced testbed implementations to investigate and study the behavior of TSN network devices limits verification to simulation and theoretical models. We introduce a publicly available, flexible, and open-sourced measurement testbed for evaluating TSN in the context of industrial automation applications to address the need to perform real-world measurements. In this contribution, we describe our testbed combining Commercial-Off-The-Shelf (COTS) hardware and existing open-source tools as a platform for in-depth evaluation of TSN devices. Providing detailed TSN backgrounds, we describe an in-depth performance analysis for our implementation. For a common Tactile Internet scenario, we observe an accuracy of close to 5 ns achievable with our publicly available COTS setup.
工业环境需要确定性通信,但其实现是一项具有挑战性的任务。时间敏感网络(TSN)旨在通过廉价的以太网实现确定性通信。TSN由IEEE TSN工作组标准化,能够精确控制时间同步,流量整形,可靠性增强和网络管理,以满足工业控制应用的需求。随后,有必要进行交钥匙研究和实施工作。然而,目前缺乏开源的测试平台来调查和研究TSN网络设备的行为,限制了对仿真和理论模型的验证。我们引入了一个公开可用的、灵活的、开源的测量测试平台,用于在工业自动化应用的背景下评估TSN,以解决执行实际测量的需求。在这篇文章中,我们描述了我们的测试平台,结合了商用现货(COTS)硬件和现有的开源工具,作为深入评估TSN设备的平台。我们提供了详细的TSN背景,对我们的实现进行了深入的性能分析。对于常见的触觉互联网场景,我们观察到使用公开可用的COTS设置可以实现接近5 ns的精度。
{"title":"Flexible Measurement Testbed for Evaluating Time-Sensitive Networking in Industrial Automation Applications","authors":"Stefan Senk, Marian Ulbricht, J. Acevedo, Giang T. Nguyen, P. Seeling, F. Fitzek","doi":"10.1109/NetSoft54395.2022.9844050","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844050","url":null,"abstract":"Deterministic communications are required for industrial environments, yet their realization is a challenging task. Time-Sensitive Networking (TSN) is intended to enable deterministic communication over inexpensive Ethernet networks. Standardized by the IEEE TSN working group, TSN enables precise control of time synchronization, traffic shaping, reliability enhancements, and network administration to answer the demands of industrial control applications. Subsequently, there is a significant need to enable turnkey research and implementation efforts. However, a current lack of open-sourced testbed implementations to investigate and study the behavior of TSN network devices limits verification to simulation and theoretical models. We introduce a publicly available, flexible, and open-sourced measurement testbed for evaluating TSN in the context of industrial automation applications to address the need to perform real-world measurements. In this contribution, we describe our testbed combining Commercial-Off-The-Shelf (COTS) hardware and existing open-source tools as a platform for in-depth evaluation of TSN devices. Providing detailed TSN backgrounds, we describe an in-depth performance analysis for our implementation. For a common Tactile Internet scenario, we observe an accuracy of close to 5 ns achievable with our publicly available COTS setup.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114195681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Network Performance Benchmarking for Containerized Infrastructure in NFV environment NFV环境下容器化基础设施的网络性能基准测试
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844100
Minh-Ngoc Tran, Younghan Kim
Recently, container orchestration technology has been widely adopted by telco companies in network function virtualization (NFV) architecture. The communication between containerized virtual network functions (VNFs) is implemented by the networking models which contain switches and router functions in the host system. Different kinds of networking models which support packet acceleration features (OvS-DPDK, VPP, SR-IOV, eBPF, or combination), and different container deployment configurations (CPU isolation, NUMA alignment, service function chaining, inter-node networking technologies) have significant impacts on the performance of container network. This paper aims to accurately benchmark container network performance based on these aspects. Especially, we categorize and cover some missing models and configuration scenarios that were not presented in previous related works.
近年来,容器编排技术在网络功能虚拟化(NFV)体系结构中被电信公司广泛采用。容器化虚拟网络功能(VNFs)之间的通信是通过主机系统中包含交换机和路由器功能的组网模型来实现的。支持报文加速特性的不同组网模式(OvS-DPDK、VPP、SR-IOV、eBPF或组合)和不同的容器部署配置(CPU隔离、NUMA对齐、业务功能链、节点间组网技术)对容器网络的性能影响很大。本文旨在基于这些方面对容器网络性能进行准确的基准测试。特别地,我们对以前的相关工作中没有出现的一些缺失的模型和配置场景进行了分类和覆盖。
{"title":"Network Performance Benchmarking for Containerized Infrastructure in NFV environment","authors":"Minh-Ngoc Tran, Younghan Kim","doi":"10.1109/NetSoft54395.2022.9844100","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844100","url":null,"abstract":"Recently, container orchestration technology has been widely adopted by telco companies in network function virtualization (NFV) architecture. The communication between containerized virtual network functions (VNFs) is implemented by the networking models which contain switches and router functions in the host system. Different kinds of networking models which support packet acceleration features (OvS-DPDK, VPP, SR-IOV, eBPF, or combination), and different container deployment configurations (CPU isolation, NUMA alignment, service function chaining, inter-node networking technologies) have significant impacts on the performance of container network. This paper aims to accurately benchmark container network performance based on these aspects. Especially, we categorize and cover some missing models and configuration scenarios that were not presented in previous related works.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129681059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2022 IEEE 8th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1