首页 > 最新文献

2022 IEEE 8th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
Encrypted Network Traffic Classification in SDN using Self-supervised Learning 基于自监督学习的SDN加密网络流量分类
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844082
Md. Shamim Towhid, Nashid Shahriar
Network traffic classification has a huge application in software-defined networking (SDN) where we talk about more control over the network traffic. With the increase of encrypted protocols in the network, the problem of traffic classification has become extremely challenging. Many researchers have proposed different techniques to do traffic classification. This demo paper presents an application of our proposed method for traffic classification in an SDN environment. The proposed method leverages one of the self-supervised learning approaches, an emerging field of deep learning, to classify network traffic. This paper shows that the proposed method can outperform the corresponding supervised approach by $sim 2$% in terms of accuracy using data collected from an SDN testbed. Furthermore, an SDN application is developed to show that the trained model is able to classify real-time traffic.
网络流量分类在软件定义网络(SDN)中有着巨大的应用,我们谈论对网络流量的更多控制。随着网络中加密协议的增多,流分类问题变得非常具有挑战性。许多研究人员提出了不同的流量分类技术。本文演示了我们提出的流量分类方法在SDN环境中的应用。该方法利用一种自监督学习方法(深度学习的新兴领域)对网络流量进行分类。本文使用从SDN试验台收集的数据表明,所提出的方法在精度方面优于相应的监督方法2 %。此外,开发了一个SDN应用程序,表明训练后的模型能够对实时流量进行分类。
{"title":"Encrypted Network Traffic Classification in SDN using Self-supervised Learning","authors":"Md. Shamim Towhid, Nashid Shahriar","doi":"10.1109/NetSoft54395.2022.9844082","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844082","url":null,"abstract":"Network traffic classification has a huge application in software-defined networking (SDN) where we talk about more control over the network traffic. With the increase of encrypted protocols in the network, the problem of traffic classification has become extremely challenging. Many researchers have proposed different techniques to do traffic classification. This demo paper presents an application of our proposed method for traffic classification in an SDN environment. The proposed method leverages one of the self-supervised learning approaches, an emerging field of deep learning, to classify network traffic. This paper shows that the proposed method can outperform the corresponding supervised approach by $sim 2$% in terms of accuracy using data collected from an SDN testbed. Furthermore, an SDN application is developed to show that the trained model is able to classify real-time traffic.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A model of capabilities of Network Security Functions 网络安全功能的能力模型
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844057
C. Basile, D. Canavese, L. Regano, Ignazio Pedone, A. Lioy
This paper presents a formal model of the features, named security capabilities, offered by the controls used for enforcing security policies in computer networks. It has been designed to support policy refinement and policy translation and address useful, practical tasks in a vendor-independent manner. The model adopts state-of-the-art design patterns and has been designed to be extensible. The model describes the actions that the controls can perform (e.g. deny packets or encrypt flows), the conditions to select on what to apply the actions, how to compose valid configuration rules from them, and how to build configurations from rules. It proved effective to model filtering controls and iptables.
本文提出了计算机网络中用于实施安全策略的控件所提供的功能(称为安全功能)的形式化模型。它旨在支持策略改进和策略转换,并以独立于供应商的方式处理有用的实际任务。该模型采用最先进的设计模式,并被设计为可扩展的。该模型描述了控件可以执行的操作(例如拒绝数据包或加密流),选择应用这些操作的条件,如何从它们组成有效的配置规则,以及如何从规则构建配置。事实证明,该方法对过滤控制和iptables建模是有效的。
{"title":"A model of capabilities of Network Security Functions","authors":"C. Basile, D. Canavese, L. Regano, Ignazio Pedone, A. Lioy","doi":"10.1109/NetSoft54395.2022.9844057","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844057","url":null,"abstract":"This paper presents a formal model of the features, named security capabilities, offered by the controls used for enforcing security policies in computer networks. It has been designed to support policy refinement and policy translation and address useful, practical tasks in a vendor-independent manner. The model adopts state-of-the-art design patterns and has been designed to be extensible. The model describes the actions that the controls can perform (e.g. deny packets or encrypt flows), the conditions to select on what to apply the actions, how to compose valid configuration rules from them, and how to build configurations from rules. It proved effective to model filtering controls and iptables.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124047529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Intent-based cognitive closed-loop management with built-in conflict handling 内置冲突处理的基于意图的认知闭环管理
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844074
A. C. Baktir, Amadeu do Nascimento Júnior, A. Zahemszky, Ankita Likhyani, D. Temesgene, D. Roeland, Elham Dehghan Biyar, Refik Fatih Ustok, Marin Orlic, Mirko D'Angelo
The ever-growing complexity in networks and the various future use cases with diverse, and often stringent performance requirements call for a higher level of automation. A tool to achieve this higher level of automation is intent-based management, where the human operator only communicates via high-level intents with the network. Intents are declarative in nature, they specify the desired state but don’t specify how to achieve it. The system will assure that the intents are fulfilled, by monitoring the behavior of the network, and adjusting its configurations if needed. In future networks that will serve multiple tenants and use cases at the same time, many intents will co-exist. As the resources are limited, conflicts may arise between intents. Therefore, a solution is needed for conflict detection and resolution. In this paper, we present a system that is capable of handling multiple intents and detecting and resolving conflicts at run-time. To show the feasibility, we implement our approach in an end-to-end prototype.
网络中不断增长的复杂性和未来各种各样的用例,以及通常严格的性能要求,要求更高级别的自动化。实现这种更高级别自动化的工具是基于意图的管理,其中人工操作员仅通过高级意图与网络进行通信。意图本质上是声明性的,它们指定期望的状态,但不指定如何实现它。系统将通过监视网络的行为,并在需要时调整其配置来确保实现意图。在未来的网络中,将同时为多个租户和用例提供服务,许多意图将共存。由于资源有限,意图之间可能会产生冲突。因此,需要一个解决方案来检测和解决冲突。在本文中,我们提出了一个能够处理多个意图并在运行时检测和解决冲突的系统。为了显示可行性,我们在端到端原型中实现了我们的方法。
{"title":"Intent-based cognitive closed-loop management with built-in conflict handling","authors":"A. C. Baktir, Amadeu do Nascimento Júnior, A. Zahemszky, Ankita Likhyani, D. Temesgene, D. Roeland, Elham Dehghan Biyar, Refik Fatih Ustok, Marin Orlic, Mirko D'Angelo","doi":"10.1109/NetSoft54395.2022.9844074","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844074","url":null,"abstract":"The ever-growing complexity in networks and the various future use cases with diverse, and often stringent performance requirements call for a higher level of automation. A tool to achieve this higher level of automation is intent-based management, where the human operator only communicates via high-level intents with the network. Intents are declarative in nature, they specify the desired state but don’t specify how to achieve it. The system will assure that the intents are fulfilled, by monitoring the behavior of the network, and adjusting its configurations if needed. In future networks that will serve multiple tenants and use cases at the same time, many intents will co-exist. As the resources are limited, conflicts may arise between intents. Therefore, a solution is needed for conflict detection and resolution. In this paper, we present a system that is capable of handling multiple intents and detecting and resolving conflicts at run-time. To show the feasibility, we implement our approach in an end-to-end prototype.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analytical Model for the Energy Efficiency in Low Power IoT Deployments 低功耗物联网部署中的能效分析模型
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844101
T. Hossfeld, Simon Raffeck, Frank Loh, Stefan Geissler
The recent rise of the Internet of Things (IoT) has given way to numerous challenges and research questions. One of the most critical issues in the area of low powered devices is the question of energy efficiency. Here, technologies like LoRa or Zigbee emerged, promising low power consumption while maintaining adequate performance. However, even when using these tailor made technologies, several configuration aspects need to be taken into account to provide high performance, energy efficient operation. To this end, we propose a generic model to compute the energy efficiency of wireless sensors under the assumption of perfect CSMA/CA channel access. We present numerical results for a typical LoRa device and highlight extensions towards other channel access mechanisms. Finally, we apply Kleinrock’s power metric to obtain ideal system configurations for varying load parameters.
最近物联网(IoT)的兴起带来了许多挑战和研究问题。低功率器件领域最关键的问题之一是能源效率问题。在这里,LoRa或Zigbee等技术出现了,它们承诺在保持足够性能的同时降低功耗。然而,即使使用这些量身定制的技术,也需要考虑几个配置方面,以提供高性能、节能的操作。为此,我们提出了一个通用模型来计算在完美的CSMA/CA信道接入假设下无线传感器的能量效率。我们给出了典型LoRa设备的数值结果,并强调了对其他通道访问机制的扩展。最后,我们应用Kleinrock的功率度量来获得不同负载参数下的理想系统配置。
{"title":"Analytical Model for the Energy Efficiency in Low Power IoT Deployments","authors":"T. Hossfeld, Simon Raffeck, Frank Loh, Stefan Geissler","doi":"10.1109/NetSoft54395.2022.9844101","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844101","url":null,"abstract":"The recent rise of the Internet of Things (IoT) has given way to numerous challenges and research questions. One of the most critical issues in the area of low powered devices is the question of energy efficiency. Here, technologies like LoRa or Zigbee emerged, promising low power consumption while maintaining adequate performance. However, even when using these tailor made technologies, several configuration aspects need to be taken into account to provide high performance, energy efficient operation. To this end, we propose a generic model to compute the energy efficiency of wireless sensors under the assumption of perfect CSMA/CA channel access. We present numerical results for a typical LoRa device and highlight extensions towards other channel access mechanisms. Finally, we apply Kleinrock’s power metric to obtain ideal system configurations for varying load parameters.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130417579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fault-tolerant Controller Placement Model based on Load-dependent Sojourn Time in Software-defined Network 软件定义网络中基于负载相关逗留时间的容错控制器布局模型
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844060
Shinji Noda, Takehiro Sato, E. Oki
This paper proposes a controller placement model that takes into account the load-dependent sojourn time at each controller while considering controller failures. The sojourn time is expressed by the queuing theory. The sojourn time varies depending on the amount of load arriving at each controller in the proposed model. The proposed model is formulated as a mixed integer second-order cone programming problem. The proposed model is compared with two baseline models presented in the previous research. In the baseline models, the sojourn time does not depend on the amount of load arriving at each controller. Numerical results show that the number of placed controllers becomes smaller in the proposed model than in the baseline models. This indicates that, since the sojourn time in the proposed model varies according to the amount of load at a controller, the effect of the load-dependent sojourn time at a controller tends not to become dominant over that of the propagation delay, which enables a switch to connect to more distant controller than that in the baseline models.
本文提出了一种控制器放置模型,该模型在考虑控制器失效的同时考虑了每个控制器的负载相关逗留时间。逗留时间用排队论表示。逗留时间取决于到达模型中每个控制器的负载量。该模型被表述为一个混合整数二阶锥规划问题。将该模型与已有的两种基线模型进行了比较。在基线模型中,停留时间不依赖于到达每个控制器的负载量。数值结果表明,与基线模型相比,该模型的控制器数量减少了。这表明,由于所提出模型中的逗留时间根据控制器上的负载量而变化,因此控制器上与负载相关的逗留时间的影响往往不会超过传播延迟的影响,这使得交换机能够连接到比基线模型中更远的控制器。
{"title":"Fault-tolerant Controller Placement Model based on Load-dependent Sojourn Time in Software-defined Network","authors":"Shinji Noda, Takehiro Sato, E. Oki","doi":"10.1109/NetSoft54395.2022.9844060","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844060","url":null,"abstract":"This paper proposes a controller placement model that takes into account the load-dependent sojourn time at each controller while considering controller failures. The sojourn time is expressed by the queuing theory. The sojourn time varies depending on the amount of load arriving at each controller in the proposed model. The proposed model is formulated as a mixed integer second-order cone programming problem. The proposed model is compared with two baseline models presented in the previous research. In the baseline models, the sojourn time does not depend on the amount of load arriving at each controller. Numerical results show that the number of placed controllers becomes smaller in the proposed model than in the baseline models. This indicates that, since the sojourn time in the proposed model varies according to the amount of load at a controller, the effect of the load-dependent sojourn time at a controller tends not to become dominant over that of the propagation delay, which enables a switch to connect to more distant controller than that in the baseline models.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating Disaggregated Network Services with eBPF: the Kubernetes Network Provider Use Case 使用eBPF创建分解的网络服务:Kubernetes网络提供程序用例
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844062
Federico Parola, Leonardo Di Giovanna, Giuseppe Ognibene, Fulvio Risso
The eBPF technology enables the creation of custom and highly efficient network services, running in the Linux kernel, tailored to the precise use case under consideration. However, the most prominent examples of such network services in eBPF follow a monolithic approach, in which all required code is created within the same program block. This makes the code hard to maintain, to extend, and difficult to reuse in other use cases. This paper leverages the Polycube framework to demonstrate that a disaggregated approach is feasible also with eBPF, with minimal overhead, introducing a larger degree of code reusability. This paper considers a complex network scenario, such as a complete network provider for Kubernetes, presenting the resulting architecture and a preliminary performance evaluation.
eBPF技术能够创建定制的高效网络服务,运行在Linux内核中,根据所考虑的精确用例进行定制。然而,eBPF中这种网络服务的最突出的例子遵循了一种单一的方法,在这种方法中,所有必需的代码都是在同一个程序块中创建的。这使得代码难以维护、扩展,并且难以在其他用例中重用。本文利用Polycube框架来证明分解方法在eBPF中也是可行的,开销最小,引入了更大程度的代码可重用性。本文考虑了一个复杂的网络场景,比如Kubernetes的一个完整的网络提供商,给出了最终的架构和初步的性能评估。
{"title":"Creating Disaggregated Network Services with eBPF: the Kubernetes Network Provider Use Case","authors":"Federico Parola, Leonardo Di Giovanna, Giuseppe Ognibene, Fulvio Risso","doi":"10.1109/NetSoft54395.2022.9844062","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844062","url":null,"abstract":"The eBPF technology enables the creation of custom and highly efficient network services, running in the Linux kernel, tailored to the precise use case under consideration. However, the most prominent examples of such network services in eBPF follow a monolithic approach, in which all required code is created within the same program block. This makes the code hard to maintain, to extend, and difficult to reuse in other use cases. This paper leverages the Polycube framework to demonstrate that a disaggregated approach is feasible also with eBPF, with minimal overhead, introducing a larger degree of code reusability. This paper considers a complex network scenario, such as a complete network provider for Kubernetes, presenting the resulting architecture and a preliminary performance evaluation.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129965798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FlexSFC: Flexible Resource Allocation and VNF Parallelism for Improved SFC Placement FlexSFC:灵活的资源分配和VNF并行性,用于改进SFC布局
Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844084
Sagar Agarwal, Venkatarami Reddy Chintapalli, T. B. Reddy
To reduce the processing delay from the sequentially running virtual network functions (VNFs) in a service function chain (SFC), network function parallelism (NFP) is introduced that allows VNFs of the SFC to run in parallel. Existing NFP solutions only focused on improving parallelism benefits without paying much attention to resource utilization while deploying VNFs of SFCs. We take advantage of resource-delay dependency to propose a flexible and efficient parallelized SFC placement mechanism called FlexSFC which determines the optimal SFC placement while reducing resource usage and meeting end-to-end delay guarantees of the SFCs deployed. Initial results show that FlexSFC guarantees the end-to-end delay requirement with better resource utilization and SFC acceptance rate than the state-of-the-art approaches.
为了减少业务功能链(SFC)中依次运行的虚拟网络功能(VNFs)所造成的处理延迟,引入了网络功能并行(network function parallelism, NFP),使SFC中的虚拟网络功能(VNFs)能够并行运行。现有的NFP解决方案在部署sfc的VNFs时,只关注提高并行性的好处,而不太关注资源利用率。我们利用资源延迟依赖性,提出了一种灵活高效的并行SFC放置机制,称为FlexSFC,该机制确定了最优的SFC放置,同时减少了资源使用并满足部署的SFC的端到端延迟保证。初步结果表明,与目前最先进的方法相比,FlexSFC保证了端到端延迟需求,具有更好的资源利用率和SFC接受率。
{"title":"FlexSFC: Flexible Resource Allocation and VNF Parallelism for Improved SFC Placement","authors":"Sagar Agarwal, Venkatarami Reddy Chintapalli, T. B. Reddy","doi":"10.1109/NetSoft54395.2022.9844084","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844084","url":null,"abstract":"To reduce the processing delay from the sequentially running virtual network functions (VNFs) in a service function chain (SFC), network function parallelism (NFP) is introduced that allows VNFs of the SFC to run in parallel. Existing NFP solutions only focused on improving parallelism benefits without paying much attention to resource utilization while deploying VNFs of SFCs. We take advantage of resource-delay dependency to propose a flexible and efficient parallelized SFC placement mechanism called FlexSFC which determines the optimal SFC placement while reducing resource usage and meeting end-to-end delay guarantees of the SFCs deployed. Initial results show that FlexSFC guarantees the end-to-end delay requirement with better resource utilization and SFC acceptance rate than the state-of-the-art approaches.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing 联邦模拟退火技术在协同环境下加速入侵检测
Pub Date : 2022-05-23 DOI: 10.48550/arXiv.2205.11519
H. N. C. Neto, Ivana Dusparic, D. M. F. Mattos, N. Fernandes
Fast identification of new network attack patterns is crucial for improving network security. Nevertheless, identifying an ongoing attack in a heterogeneous network is a non-trivial task. Federated learning emerges as a solution to collaborative training for an Intrusion Detection System (IDS). The federated learning-based IDS trains a global model using local machine learning models provided by federated participants without sharing local data. However, optimization challenges are intrinsic to federated learning. This paper proposes the Federated Simulated Annealing (FedSA) metaheuristic to select the hyperparameters and a subset of participants for each aggregation round in federated learning. FedSA optimizes hyperparameters linked to the global model convergence. The proposal reduces aggregation rounds and speeds up convergence. Thus, FedSA accelerates learning extraction from local models, requiring fewer IDS updates. The proposal assessment shows that the FedSA global model converges in less than ten communication rounds. The proposal requires up to 50% fewer aggregation rounds to achieve approximately 97% accuracy in attack detection than the conventional aggregation approach.
快速识别新的网络攻击模式对于提高网络安全至关重要。然而,在异构网络中识别正在进行的攻击是一项非常重要的任务。联邦学习是入侵检测系统(IDS)协作训练的一种解决方案。基于联邦学习的IDS使用联邦参与者提供的本地机器学习模型训练全局模型,而不共享本地数据。然而,优化挑战是联邦学习固有的。本文提出了联邦模拟退火(federacy退火,federsa)的元启发式方法来选择联邦学习中每个聚合轮的超参数和参与者子集。FedSA优化了与全局模型收敛相关的超参数。该方案减少了聚合轮数,加快了收敛速度。因此,federsa加速了从本地模型的学习提取,需要更少的IDS更新。提案评估表明,FedSA全球模型在不到10轮通信中收敛。与传统的聚合方法相比,该提议需要最多减少50%的聚合轮数来实现大约97%的攻击检测准确率。
{"title":"FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing","authors":"H. N. C. Neto, Ivana Dusparic, D. M. F. Mattos, N. Fernandes","doi":"10.48550/arXiv.2205.11519","DOIUrl":"https://doi.org/10.48550/arXiv.2205.11519","url":null,"abstract":"Fast identification of new network attack patterns is crucial for improving network security. Nevertheless, identifying an ongoing attack in a heterogeneous network is a non-trivial task. Federated learning emerges as a solution to collaborative training for an Intrusion Detection System (IDS). The federated learning-based IDS trains a global model using local machine learning models provided by federated participants without sharing local data. However, optimization challenges are intrinsic to federated learning. This paper proposes the Federated Simulated Annealing (FedSA) metaheuristic to select the hyperparameters and a subset of participants for each aggregation round in federated learning. FedSA optimizes hyperparameters linked to the global model convergence. The proposal reduces aggregation rounds and speeds up convergence. Thus, FedSA accelerates learning extraction from local models, requiring fewer IDS updates. The proposal assessment shows that the FedSA global model converges in less than ten communication rounds. The proposal requires up to 50% fewer aggregation rounds to achieve approximately 97% accuracy in attack detection than the conventional aggregation approach.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117128903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mission-Critical Public Safety Networking: An Intent-Driven Service Orchestration Perspective 关键任务公共安全网络:意图驱动的服务编排视角
Pub Date : 2022-05-08 DOI: 10.48550/arXiv.2205.03932
K. Mehmood, David Palma, Katina Kralevska
Intent-based networking (IBN) provides a promising approach for managing networks and orchestrating services in beyond 5th Generation (B5G) deployments using modern service-based architectures. Public safety (PS) services form the basis of keeping society functional, owing to the responsiveness and avail-ability throughout the network. The provisioning of these services requires efficient and agile network management techniques with low-overhead and embedded intelligence. IBN incorporates the service subscribers in a model-driven approach to provision different user-centric services. However, it requires domain-specific and contextual processing of intents for abstracted management of network functions. This work proposes an intent definition for PS services in B5G networks, as well as a processing and orchestration architecture for a push-to-talk (PTT) use case. The simulation results show that PTT services adhere to the key performance indicators of access time and mouth-to-ear latency bounded by approximately 250 and 150 milliseconds, respectively, with an additional overhead experienced during the intent processing in the range of 20-40 milliseconds. This validates the premise of IBN in providing flexible and scalable management and service orchestration solution for PS next generation networks.
基于意图的网络(IBN)提供了一种很有前途的方法,可以使用现代基于服务的体系结构在超过第5代(B5G)的部署中管理网络和编排服务。由于整个网络的响应性和可用性,公共安全服务构成了保持社会功能的基础。这些服务的提供需要具有低开销和嵌入式智能的高效、敏捷的网络管理技术。IBN将服务订阅者合并到模型驱动的方法中,以提供不同的以用户为中心的服务。然而,它需要针对特定领域和上下文的意图处理,以便对网络功能进行抽象管理。这项工作提出了B5G网络中PS服务的意图定义,以及一种用于一键通(PTT)用例的处理和编排架构。仿真结果表明,PTT业务符合访问时间和口到耳延迟的关键性能指标,分别约为250毫秒和150毫秒,并且在意图处理期间经历了20-40毫秒的额外开销。这验证了IBN为PS下一代网络提供灵活且可扩展的管理和服务编排解决方案的前提。
{"title":"Mission-Critical Public Safety Networking: An Intent-Driven Service Orchestration Perspective","authors":"K. Mehmood, David Palma, Katina Kralevska","doi":"10.48550/arXiv.2205.03932","DOIUrl":"https://doi.org/10.48550/arXiv.2205.03932","url":null,"abstract":"Intent-based networking (IBN) provides a promising approach for managing networks and orchestrating services in beyond 5th Generation (B5G) deployments using modern service-based architectures. Public safety (PS) services form the basis of keeping society functional, owing to the responsiveness and avail-ability throughout the network. The provisioning of these services requires efficient and agile network management techniques with low-overhead and embedded intelligence. IBN incorporates the service subscribers in a model-driven approach to provision different user-centric services. However, it requires domain-specific and contextual processing of intents for abstracted management of network functions. This work proposes an intent definition for PS services in B5G networks, as well as a processing and orchestration architecture for a push-to-talk (PTT) use case. The simulation results show that PTT services adhere to the key performance indicators of access time and mouth-to-ear latency bounded by approximately 250 and 150 milliseconds, respectively, with an additional overhead experienced during the intent processing in the range of 20-40 milliseconds. This validates the premise of IBN in providing flexible and scalable management and service orchestration solution for PS next generation networks.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126534698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the energy efficiency of Laser-based Optical Wireless Networks 基于激光的光无线网络的能量效率研究
Pub Date : 2022-03-21 DOI: 10.1109/NetSoft54395.2022.9844102
Walter Zibusiso Ncube, A. Qidan, T. El-Gorashi, J. Elmirghani
Optical wireless Communication (OWC) is a strong candidate in the next generation (6G) of cellular networks. In this paper, a laser-based optical wireless network is deployed in an indoor environment using Vertical Cavity Surface Emitting Lasers (VCSELS) as transmitters serving multiple users. Specifically, a commercially available low-cost VCSEL operating at S50nm wavelength is used. Considering the confined coverage area of each VCSEL, an array of VCSELs is designed to transmit data to multiple users through narrow beams taking into account eye safety regulations. To manage multi-user interference (MUI), Zero Forcing (ZF) is implemented to maximize the multiplexing gain of the network. The energy efficiency of the network is studied under different laser beam waists to find the effective laser beam size that results in throughput enhancement. The results show that the energy efficiency increases with the laser beam waist. Moreover, using micro lenses placed in front of the VCSELs leads to significant increase in the energy efficiency.
光无线通信(OWC)是下一代蜂窝网络(6G)的有力候选者。本文利用垂直腔面发射激光器(VCSELS)作为发射机服务于多个用户,在室内环境中部署了基于激光的光纤无线网络。具体来说,使用了商用的低成本VCSEL,工作波长为50nm。考虑到每个VCSEL的有限覆盖区域,设计了一组VCSEL,通过窄波束向多个用户传输数据,同时考虑到眼睛安全规定。为了管理多用户干扰(MUI),实现了零强迫(Zero Forcing, ZF)来最大化网络的多路复用增益。研究了不同激光束腰下网络的能量效率,找到了能提高吞吐量的有效激光束尺寸。结果表明,能量效率随光束束腰的增大而增大。此外,在vcsel前面使用微透镜可以显著提高能源效率。
{"title":"On the energy efficiency of Laser-based Optical Wireless Networks","authors":"Walter Zibusiso Ncube, A. Qidan, T. El-Gorashi, J. Elmirghani","doi":"10.1109/NetSoft54395.2022.9844102","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844102","url":null,"abstract":"Optical wireless Communication (OWC) is a strong candidate in the next generation (6G) of cellular networks. In this paper, a laser-based optical wireless network is deployed in an indoor environment using Vertical Cavity Surface Emitting Lasers (VCSELS) as transmitters serving multiple users. Specifically, a commercially available low-cost VCSEL operating at S50nm wavelength is used. Considering the confined coverage area of each VCSEL, an array of VCSELs is designed to transmit data to multiple users through narrow beams taking into account eye safety regulations. To manage multi-user interference (MUI), Zero Forcing (ZF) is implemented to maximize the multiplexing gain of the network. The energy efficiency of the network is studied under different laser beam waists to find the effective laser beam size that results in throughput enhancement. The results show that the energy efficiency increases with the laser beam waist. Moreover, using micro lenses placed in front of the VCSELs leads to significant increase in the energy efficiency.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116266705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2022 IEEE 8th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1