首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
Deadlock Prevention in Payment Channel Networks 支付渠道网络中的僵局预防
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1109/TNSM.2024.3435484
Neeraj Sharma;Kalpesh Kapoor
The use of blockchain-based cryptocurrencies has significantly increased over the last ten years; nevertheless, the broader acceptance of these currencies is hindered by scaling challenges. Payment Channel Networks (PCN), which operates as a layer two solution, presents itself as a viable option for augmenting the scalability of a blockchain network. In order to reduce the time and cost associated with the on-chain settlement, users have the option to conduct off-chain transactions through payment channels within their network. The growth of the PCN is expected to be accompanied by a corresponding increase in the number of transactions. However, the current distributed routing algorithms are unable to manage several simultaneous transactions due to deadlocks efficiently. We illustrate the possibility of deadlock in distributed routing algorithms. We prove that routing two transactions in PCN is NP-complete by reducing it from a two-commodity flow problem. In contrast to earlier work that avoided deadlock by exploiting locking or priority queues, our work emphasizes routing algorithms to avoid conditions for deadlock. We enhance the routing choices to minimize the number of saturated links that can cause deadlock. Resource allocation graphs are used to illustrate the necessary and sufficient conditions required for transactions to be in a deadlock. We also show how the dynamic behavior of resources can affect the deadlock situation in future timestamps. The deadlock trilemma and the relation between concurrency, resources, and deadlocks have also been discussed. The experimental evaluation shows that the proposed methodology yields an improvement in transaction count in the Speedy and the Webflow algorithms by 41% and 27%, respectively.
在过去十年中,基于区块链的加密货币的使用大幅增加;然而,这些货币被更广泛地接受却受到扩展性挑战的阻碍。支付通道网络(PCN)作为第二层解决方案,是增强区块链网络可扩展性的可行选择。为了减少与链上结算相关的时间和成本,用户可以选择通过其网络内的支付渠道进行链下交易。PCN 的增长预计会伴随着交易数量的相应增加。然而,目前的分布式路由算法无法有效管理因死锁而同时发生的多个交易。我们说明了分布式路由算法中出现死锁的可能性。我们通过将 PCN 中的两个事务路由问题简化为双商品流问题,证明在 PCN 中路由两个事务是 NP-完全的。与早期通过利用锁定或优先队列来避免死锁的工作不同,我们的工作强调通过路由算法来避免死锁条件。我们改进了路由选择,以尽量减少可能导致死锁的饱和链接数量。我们使用资源分配图来说明事务陷入僵局所需的必要条件和充分条件。我们还展示了资源的动态行为如何影响未来时间戳的死锁情况。我们还讨论了死锁三难以及并发、资源和死锁之间的关系。实验评估表明,所提出的方法使 Speedy 算法和 Webflow 算法的事务计数分别提高了 41% 和 27%。
{"title":"Deadlock Prevention in Payment Channel Networks","authors":"Neeraj Sharma;Kalpesh Kapoor","doi":"10.1109/TNSM.2024.3435484","DOIUrl":"10.1109/TNSM.2024.3435484","url":null,"abstract":"The use of blockchain-based cryptocurrencies has significantly increased over the last ten years; nevertheless, the broader acceptance of these currencies is hindered by scaling challenges. Payment Channel Networks (PCN), which operates as a layer two solution, presents itself as a viable option for augmenting the scalability of a blockchain network. In order to reduce the time and cost associated with the on-chain settlement, users have the option to conduct off-chain transactions through payment channels within their network. The growth of the PCN is expected to be accompanied by a corresponding increase in the number of transactions. However, the current distributed routing algorithms are unable to manage several simultaneous transactions due to deadlocks efficiently. We illustrate the possibility of deadlock in distributed routing algorithms. We prove that routing two transactions in PCN is NP-complete by reducing it from a two-commodity flow problem. In contrast to earlier work that avoided deadlock by exploiting locking or priority queues, our work emphasizes routing algorithms to avoid conditions for deadlock. We enhance the routing choices to minimize the number of saturated links that can cause deadlock. Resource allocation graphs are used to illustrate the necessary and sufficient conditions required for transactions to be in a deadlock. We also show how the dynamic behavior of resources can affect the deadlock situation in future timestamps. The deadlock trilemma and the relation between concurrency, resources, and deadlocks have also been discussed. The experimental evaluation shows that the proposed methodology yields an improvement in transaction count in the Speedy and the Webflow algorithms by 41% and 27%, respectively.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5164-5177"},"PeriodicalIF":4.7,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141870556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized FlexEthernet for Inter-Domain Traffic Restoration 优化的 FlexEthernet 用于域间流量恢复
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1109/TNSM.2024.3434955
Dahina Koulougli;Kim Khoa Nguyen;Mohamed Cheriet
Restoring traffic in multi-layer multi-domain networks (MLMD) can be inefficient and expensive due to the reconfiguration of both intra-domain and inter-domain paths under limited resources and information sharing. This often results in traffic loss and resource over-provisioning within the MLMD, leading to sub-optimal restoration throughput and high costs. In this study, we harness FlexEthernet (FlexE) on inter-domain links to maximize the restoration throughput at minimum cost. FlexE link aggregation is an effective technique to deal with the costly impact of alternative domain rerouting that allows diverting traffic over aggregated links parallel to the failed ones, without disrupting the intra-domain connections. Additionally, FlexE helps increase network reutilization by leveraging time division multiplexing (TDM) to flexibly shift affected traffic to underutilized aggregated links. However, scheduling traffic migration in FlexE is a challenging issue that has not been fully investigated in the literature. In this paper, we initially formulate the FlexE-based traffic restoration problem as a mixed integer non-linear program (MINLP) and then introduce an approximation algorithm to efficiently solve this problem in polynomial time. Furthermore, we propose a supervised learning approach to predict the optimal restoration policy for large-size instances. Experimental results show that our solution restores up to 14% more traffic than a state-of-the-art approach.
由于要在有限的资源和信息共享条件下重新配置域内和域间路径,因此在多层多域网络(MLMD)中恢复流量可能效率低下且成本高昂。这往往会造成 MLMD 内的流量损失和资源过度配置,从而导致次优的恢复吞吐量和高昂的成本。在本研究中,我们利用域间链路上的 FlexEthernet(FlexE),以最小的成本获得最大的恢复吞吐量。FlexE 链路聚合是一种有效的技术,可在不中断域内连接的情况下,通过与故障链路平行的聚合链路分流流量,从而应对替代域重定向带来的高成本影响。此外,FlexE 还可利用时分复用(TDM)技术,将受影响的流量灵活转移到利用率较低的聚合链路上,从而有助于提高网络的再利用率。然而,在 FlexE 中调度流量迁移是一个具有挑战性的问题,文献中尚未对此进行充分研究。在本文中,我们首先将基于 FlexE 的流量恢复问题表述为混合整数非线性程序 (MINLP),然后引入了一种近似算法,以在多项式时间内高效解决该问题。此外,我们还提出了一种监督学习方法,用于预测大型实例的最优恢复策略。实验结果表明,与最先进的方法相比,我们的解决方案最多可多恢复 14% 的流量。
{"title":"Optimized FlexEthernet for Inter-Domain Traffic Restoration","authors":"Dahina Koulougli;Kim Khoa Nguyen;Mohamed Cheriet","doi":"10.1109/TNSM.2024.3434955","DOIUrl":"10.1109/TNSM.2024.3434955","url":null,"abstract":"Restoring traffic in multi-layer multi-domain networks (MLMD) can be inefficient and expensive due to the reconfiguration of both intra-domain and inter-domain paths under limited resources and information sharing. This often results in traffic loss and resource over-provisioning within the MLMD, leading to sub-optimal restoration throughput and high costs. In this study, we harness FlexEthernet (FlexE) on inter-domain links to maximize the restoration throughput at minimum cost. FlexE link aggregation is an effective technique to deal with the costly impact of alternative domain rerouting that allows diverting traffic over aggregated links parallel to the failed ones, without disrupting the intra-domain connections. Additionally, FlexE helps increase network reutilization by leveraging time division multiplexing (TDM) to flexibly shift affected traffic to underutilized aggregated links. However, scheduling traffic migration in FlexE is a challenging issue that has not been fully investigated in the literature. In this paper, we initially formulate the FlexE-based traffic restoration problem as a mixed integer non-linear program (MINLP) and then introduce an approximation algorithm to efficiently solve this problem in polynomial time. Furthermore, we propose a supervised learning approach to predict the optimal restoration policy for large-size instances. Experimental results show that our solution restores up to 14% more traffic than a state-of-the-art approach.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5001-5017"},"PeriodicalIF":4.7,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141870558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Queue Information for Scalable Delay-Constrained Routing in Deterministic Networks 利用队列信息实现确定性网络中可扩展的延迟受限路由选择
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-29 DOI: 10.1109/TNSM.2024.3435769
Jakob Miserez;Didier Colle;Mario Pickavet;Wouter Tavernier
Next-generation Internet will require strict end-to-end delay guarantees to support upcoming latency-sensitive applications. The IEEE 802.1 Time-Sensitive Networking (TSN) standard has become the de-facto solution for Ethernet-based L2 networks to support applications with strict latency, jitter and packet loss requirements. The IETF DetNet Working Group tries to expand on TSN to support real-time applications over larger-scale L3 networks. This paper proposes control and routing strategies that provide latency guarantees in L3 networks without requiring time synchronization among nodes. The proposed strategies include a link-state routing protocol and several exploration-based protocols that exploit queue-level information and network calculus to provide latency guarantees. Additionally, the use of queueing delay budgets enables independence among flows, while enabling fine-grained routing. This allows to make better routing decisions and to support applications with diverse latency requirements. Moreover, traffic shaping is only required at the network ingress. The strategies are evaluated extensively and compared in a simulation environment in multiple large-scale scenarios, considering acceptance rate, network utilization, path dissemination time, control overhead, and memory consumption, as well as how these metrics evolve w.r.t. different network scales. Experimental results demonstrate that representative delay-constrained traffic demands can be accommodated adequately by queue-level link-state routing protocols only in smaller-scale networks. In larger-scale network scenarios, breadth-first exploration-based protocols are required to provide stable performance w.r.t. acceptance rate and path dissemination times at the cost of only linearly increasing control overhead and memory footprint.
下一代互联网需要严格的端到端延迟保证,以支持即将到来的延迟敏感型应用。IEEE 802.1 时敏网络(TSN)标准已成为基于以太网的 L2 网络的实际解决方案,以支持对延迟、抖动和丢包有严格要求的应用。IETF DetNet 工作组试图扩展 TSN,以支持更大规模 L3 网络上的实时应用。本文提出了在 L3 网络中提供延迟保证的控制和路由策略,而不要求节点间的时间同步。提出的策略包括一个链路状态路由协议和几个基于探索的协议,这些协议利用队列级信息和网络计算来提供延迟保证。此外,队列延迟预算的使用实现了流之间的独立性,同时实现了细粒度路由。这样就能做出更好的路由决策,并支持具有不同延迟要求的应用。此外,只需要在网络入口处进行流量整形。我们在仿真环境中对这些策略进行了广泛评估,并在多个大规模场景中进行了比较,考虑了接受率、网络利用率、路径传播时间、控制开销和内存消耗,以及这些指标在不同网络规模下的演变情况。实验结果表明,只有在较小规模的网络中,队列级链路状态路由协议才能充分满足具有代表性的延迟受限流量需求。在较大规模的网络场景中,基于广度优先探索的协议需要以线性增加的控制开销和内存占用为代价,在接受率和路径传播时间方面提供稳定的性能。
{"title":"Exploiting Queue Information for Scalable Delay-Constrained Routing in Deterministic Networks","authors":"Jakob Miserez;Didier Colle;Mario Pickavet;Wouter Tavernier","doi":"10.1109/TNSM.2024.3435769","DOIUrl":"10.1109/TNSM.2024.3435769","url":null,"abstract":"Next-generation Internet will require strict end-to-end delay guarantees to support upcoming latency-sensitive applications. The IEEE 802.1 Time-Sensitive Networking (TSN) standard has become the de-facto solution for Ethernet-based L2 networks to support applications with strict latency, jitter and packet loss requirements. The IETF DetNet Working Group tries to expand on TSN to support real-time applications over larger-scale L3 networks. This paper proposes control and routing strategies that provide latency guarantees in L3 networks without requiring time synchronization among nodes. The proposed strategies include a link-state routing protocol and several exploration-based protocols that exploit queue-level information and network calculus to provide latency guarantees. Additionally, the use of queueing delay budgets enables independence among flows, while enabling fine-grained routing. This allows to make better routing decisions and to support applications with diverse latency requirements. Moreover, traffic shaping is only required at the network ingress. The strategies are evaluated extensively and compared in a simulation environment in multiple large-scale scenarios, considering acceptance rate, network utilization, path dissemination time, control overhead, and memory consumption, as well as how these metrics evolve w.r.t. different network scales. Experimental results demonstrate that representative delay-constrained traffic demands can be accommodated adequately by queue-level link-state routing protocols only in smaller-scale networks. In larger-scale network scenarios, breadth-first exploration-based protocols are required to provide stable performance w.r.t. acceptance rate and path dissemination times at the cost of only linearly increasing control overhead and memory footprint.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5260-5272"},"PeriodicalIF":4.7,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10614378","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141873177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Latency-Aware Resource Allocation and Offloading Strategy With Improved Prioritization and DDQN for Edge-Enabled UDNs 针对边缘 UDN 的改进优先级和 DDQN 的新型延迟感知资源分配和卸载策略
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-26 DOI: 10.1109/TNSM.2024.3434457
Nidhi Sharma;Krishan Kumar
Driven by the vision of 6G, the need for diverse computation-intensive and delay-sensitive tasks continues to rise. The integration of mobile edge computing with the ultra-dense network is not only capable of handling traffic from a large number of smart devices but also delivers substantial processing capabilities to the users. This combined network is expected as an effective solution for meeting the latency-critical requirement and will enhance the quality of user experience. Nevertheless, when a massive number of devices offload tasks to edge servers, the problem of channel interference, network load and energy shortage of user devices (UDs) would increase. Therefore, we investigate the joint uplink and downlink resource allocation and task offloading optimization problem in terms of minimizing the overall task delay while sustaining the UD battery life. Thus, to achieve long-term gains while making quick decisions, we propose an improved double deep Q-network scheme named Prioritized double deep Q-network. In this, the prioritized experience replay has been improved by considering the experience freshness factor along with temporal difference error to achieve fast and efficient learning. Extensive numerical results prove the efficacy of the proposed scheme by analyzing delay and energy consumption. Especially, our scheme can considerably decrease the delay by 11.86%, 26.22%, 48.56%, and 61.04% compared to the OELO scheme, DQN scheme, LOS, and EOS, respectively, when the number of UDs varied from 30 to 180.
在6G愿景的推动下,对各种计算密集型和延迟敏感型任务的需求持续上升。移动边缘计算与超密集网络的融合,不仅能够处理来自大量智能设备的流量,还能为用户提供大量的处理能力。这种组合网络有望成为满足延迟关键需求的有效解决方案,并将提高用户体验的质量。然而,当大量设备将任务卸载到边缘服务器时,会增加信道干扰、网络负载和用户设备(UDs)能量不足的问题。因此,我们从最小化整体任务延迟的同时保持UD电池寿命的角度出发,研究了联合上下行资源分配和任务卸载优化问题。因此,为了在快速决策的同时获得长期收益,我们提出了一种改进的双深度q网络方案,称为优先级双深度q网络。其中,通过考虑体验新鲜度因子和时间差误差对优先体验重放进行了改进,实现了快速高效的学习。大量的数值结果通过分析时延和能耗证明了该方案的有效性。尤其在UDs数量从30到180的范围内,与OELO方案、DQN方案、LOS方案和EOS方案相比,我们的方案可以显著降低时延,分别降低11.86%、26.22%、48.56%和61.04%。
{"title":"A Novel Latency-Aware Resource Allocation and Offloading Strategy With Improved Prioritization and DDQN for Edge-Enabled UDNs","authors":"Nidhi Sharma;Krishan Kumar","doi":"10.1109/TNSM.2024.3434457","DOIUrl":"10.1109/TNSM.2024.3434457","url":null,"abstract":"Driven by the vision of 6G, the need for diverse computation-intensive and delay-sensitive tasks continues to rise. The integration of mobile edge computing with the ultra-dense network is not only capable of handling traffic from a large number of smart devices but also delivers substantial processing capabilities to the users. This combined network is expected as an effective solution for meeting the latency-critical requirement and will enhance the quality of user experience. Nevertheless, when a massive number of devices offload tasks to edge servers, the problem of channel interference, network load and energy shortage of user devices (UDs) would increase. Therefore, we investigate the joint uplink and downlink resource allocation and task offloading optimization problem in terms of minimizing the overall task delay while sustaining the UD battery life. Thus, to achieve long-term gains while making quick decisions, we propose an improved double deep Q-network scheme named Prioritized double deep Q-network. In this, the prioritized experience replay has been improved by considering the experience freshness factor along with temporal difference error to achieve fast and efficient learning. Extensive numerical results prove the efficacy of the proposed scheme by analyzing delay and energy consumption. Especially, our scheme can considerably decrease the delay by 11.86%, 26.22%, 48.56%, and 61.04% compared to the OELO scheme, DQN scheme, LOS, and EOS, respectively, when the number of UDs varied from 30 to 180.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6260-6272"},"PeriodicalIF":4.7,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Dynamically Meeting Performance Objectives on a Service Mesh 动态满足服务网格性能目标的框架
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-26 DOI: 10.1109/TNSM.2024.3434328
Forough Shahab Samani;Rolf Stadler
We present a framework for achieving end-to-end management objectives for multiple services that concurrently execute on a service mesh. We apply reinforcement learning (RL) techniques to train an agent that periodically performs control actions to reallocate resources. We develop and evaluate the framework using a laboratory testbed where we run information and computing services on a service mesh, supported by the Istio and Kubernetes platforms. We investigate different management objectives that include end-to-end delay bounds on service requests, throughput objectives, cost-related objectives, and service differentiation. Our framework supports the design of a control agent for a given management objective. The management objective is defined first and then mapped onto available control actions. Several types of control actions can be executed simultaneously, which allows for efficient resource utilization. Second, the framework separates the learning of the system model and the operating region from the learning of the control policy. By first learning the system model and the operating region from testbed traces, we can instantiate a simulator and train the agent for different management objectives. Third, the use of a simulator shortens the training time by orders of magnitude compared with training the agent on the testbed. We evaluate the learned policies on the testbed and show the effectiveness of our approach in several scenarios. In one scenario, we design a controller that achieves the management objectives with 50% less system resources than Kubernetes HPA autoscaling.
我们提出了一个框架,用于实现在服务网格上并发执行的多个服务的端到端管理目标。我们应用强化学习(RL)技术来训练一个智能体,它定期执行控制动作来重新分配资源。我们使用实验室测试平台来开发和评估框架,在Istio和Kubernetes平台的支持下,在服务网格上运行信息和计算服务。我们研究了不同的管理目标,包括服务请求的端到端延迟界限、吞吐量目标、与成本相关的目标和服务差异化。我们的框架支持为给定的管理目标设计控制代理。首先定义管理目标,然后将其映射到可用的控制操作上。可以同时执行几种类型的控制操作,从而实现有效的资源利用。其次,该框架将系统模型和操作区域的学习与控制策略的学习分离开来。通过首先从试验台轨迹中学习系统模型和操作区域,我们可以实例化模拟器并针对不同的管理目标训练代理。第三,与在测试台上训练智能体相比,使用模拟器的训练时间缩短了几个数量级。我们在测试台上评估了学习到的策略,并在几个场景中展示了我们的方法的有效性。在一个场景中,我们设计了一个控制器,它比Kubernetes HPA自动伸缩少50%的系统资源来实现管理目标。
{"title":"A Framework for Dynamically Meeting Performance Objectives on a Service Mesh","authors":"Forough Shahab Samani;Rolf Stadler","doi":"10.1109/TNSM.2024.3434328","DOIUrl":"10.1109/TNSM.2024.3434328","url":null,"abstract":"We present a framework for achieving end-to-end management objectives for multiple services that concurrently execute on a service mesh. We apply reinforcement learning (RL) techniques to train an agent that periodically performs control actions to reallocate resources. We develop and evaluate the framework using a laboratory testbed where we run information and computing services on a service mesh, supported by the Istio and Kubernetes platforms. We investigate different management objectives that include end-to-end delay bounds on service requests, throughput objectives, cost-related objectives, and service differentiation. Our framework supports the design of a control agent for a given management objective. The management objective is defined first and then mapped onto available control actions. Several types of control actions can be executed simultaneously, which allows for efficient resource utilization. Second, the framework separates the learning of the system model and the operating region from the learning of the control policy. By first learning the system model and the operating region from testbed traces, we can instantiate a simulator and train the agent for different management objectives. Third, the use of a simulator shortens the training time by orders of magnitude compared with training the agent on the testbed. We evaluate the learned policies on the testbed and show the effectiveness of our approach in several scenarios. In one scenario, we design a controller that achieves the management objectives with 50% less system resources than Kubernetes HPA autoscaling.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"5992-6007"},"PeriodicalIF":4.7,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10612769","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P4-PSFP: P4-Based Per-Stream Filtering and Policing for Time-Sensitive Networking P4-PSFP:基于 P4 的时间敏感型网络每流过滤和 Policing
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-26 DOI: 10.1109/TNSM.2024.3434337
Fabian Ihle;Steffen Lindner;Michael Menth
Time-Sensitive Networking (TSN) extends Ethernet to enable real-time communication. In TSN, bounded latency and zero congestion-based packet loss are achieved through mechanisms such as the Credit-Based Shaper (CBS) for bandwidth shaping and the Time-Aware Shaper (TAS) for traffic scheduling. Generally, TSN requires streams to be explicitly admitted before being transmitted. To ensure that admitted traffic conforms with the traffic descriptors indicated for admission control, Per-Stream Filtering and Policing (PSFP) has been defined. For credit-based metering, well-known token bucket policers are applied. However, time-based metering requires time-dependent switch behavior and time synchronization with sub-microsecond precision. While TSN-capable switches support various TSN traffic shaping mechanisms, a full implementation of PSFP is still not available. To bridge this gap, we present a P4-based implementation of PSFP on a 100 Gb/s per port hardware switch. We explain the most interesting aspects of the PSFP implementation whose code is available on GitHub. We demonstrate credit-based and time-based policing and synchronization capabilities to validate the functionality and effectiveness of P4-PSFP. The implementation scales up to 35840 streams depending on the stream identification method. P4-PSFP can be used in practice as long as appropriate TSN switches lack this function. Moreover, its implementation may be helpful for other P4-based hardware implementations that require time synchronization.
时敏网络(TSN)扩展了以太网,实现了实时通信。在 TSN 中,通过用于带宽整形的 "基于信用的整形器"(CBS)和用于流量调度的 "时间感知整形器"(TAS)等机制,可实现有界延迟和基于拥塞的零数据包丢失。一般来说,TSN 要求数据流在传输前必须明确接入。为确保接纳的流量符合为接纳控制而指定的流量描述符,定义了每流过滤和极化(PSFP)。对于基于信用的计量,采用了众所周知的令牌桶策略。但是,基于时间的计量需要与时间相关的交换机行为和亚微秒精度的时间同步。虽然支持 TSN 的交换机支持各种 TSN 流量整形机制,但 PSFP 的全面实施仍然不可用。为了弥补这一差距,我们在每端口 100 Gb/s 的硬件交换机上介绍了基于 P4 的 PSFP 实现。我们解释了 PSFP 实现中最有趣的方面,其代码可在 GitHub 上获取。我们演示了基于信用和基于时间的警戒和同步功能,以验证 P4-PSFP 的功能和有效性。根据流识别方法的不同,该实现可扩展至 35840 个流。只要适当的 TSN 交换机缺乏这一功能,P4-PSFP 就能在实践中使用。此外,它的实现可能有助于其他需要时间同步的基于 P4 的硬件实现。
{"title":"P4-PSFP: P4-Based Per-Stream Filtering and Policing for Time-Sensitive Networking","authors":"Fabian Ihle;Steffen Lindner;Michael Menth","doi":"10.1109/TNSM.2024.3434337","DOIUrl":"10.1109/TNSM.2024.3434337","url":null,"abstract":"Time-Sensitive Networking (TSN) extends Ethernet to enable real-time communication. In TSN, bounded latency and zero congestion-based packet loss are achieved through mechanisms such as the Credit-Based Shaper (CBS) for bandwidth shaping and the Time-Aware Shaper (TAS) for traffic scheduling. Generally, TSN requires streams to be explicitly admitted before being transmitted. To ensure that admitted traffic conforms with the traffic descriptors indicated for admission control, Per-Stream Filtering and Policing (PSFP) has been defined. For credit-based metering, well-known token bucket policers are applied. However, time-based metering requires time-dependent switch behavior and time synchronization with sub-microsecond precision. While TSN-capable switches support various TSN traffic shaping mechanisms, a full implementation of PSFP is still not available. To bridge this gap, we present a P4-based implementation of PSFP on a 100 Gb/s per port hardware switch. We explain the most interesting aspects of the PSFP implementation whose code is available on GitHub. We demonstrate credit-based and time-based policing and synchronization capabilities to validate the functionality and effectiveness of P4-PSFP. The implementation scales up to 35840 streams depending on the stream identification method. P4-PSFP can be used in practice as long as appropriate TSN switches lack this function. Moreover, its implementation may be helpful for other P4-based hardware implementations that require time synchronization.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5273-5290"},"PeriodicalIF":4.7,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Cell Resource Allocation Mechanism Based on Interference Control in Indoor Multicolor VLC-WiFi Heterogeneous Networks 基于室内多色 VLC-WiFi 异构网络干扰控制的多小区资源分配机制
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1109/TNSM.2024.3432148
Huanlin Liu;Yang Hu;Yong Chen;Haonan Chen;Bingchuan Huang;Huiling Zhou;Shiqi Yi
Heterogeneous networks based on multicolor visible light communication (VLC) and wireless fidelity (WiFi) have been considered as a key technology to achieve the capacity target in the future 6G mobile communication. However, the inter-cell interference (ICI) pattern in the multi-cell VLC scenario degrades the performance of the heterogeneous networks. To solve this problem, a multi-cell resource allocation mechanism based on interference control (MCRAMIC) is proposed, which includes a preparatory phase and an execution phase. Firstly, according to the different locations and data rate requirements of varied user equipments (UEs), the VLC access point (AP) selection algorithm based on interference avoidance and the UE priority assessment algorithm based on the requirement of UE are proposed.Then, according to the influence factor and priority factor, the multi-cell resource allocation algorithm based on interference control is proposed. According to the algorithm, the candidate VLC AP sets of the UEs are determined firstly, and the VLC APs and lightwave bands are selected for the UEs in turn. Meanwhile, some UEs are connected to the WiFi AP. Finally, the lightwave bands are further allocated to the UEs. Numeric results show that the proposed MCRAMIC outperforms the centralized resource allocation algorithm based on link conflict graph (LCG) and the resource allocation algorithm based on hypergraph theory in terms of the system throughput, UE satisfaction and service fairness.
基于多色可见光通信(VLC)和无线保真(WiFi)的异构网络被认为是实现未来 6G 移动通信容量目标的关键技术。然而,多小区可见光通信场景中的小区间干扰(ICI)模式会降低异构网络的性能。为解决这一问题,本文提出了一种基于干扰控制的多小区资源分配机制(MCRAMIC),包括准备阶段和执行阶段。首先,根据不同用户设备(UE)的不同位置和数据速率要求,提出了基于干扰规避的 VLC 接入点(AP)选择算法和基于 UE 要求的 UE 优先级评估算法;然后,根据影响因素和优先级因素,提出了基于干扰控制的多小区资源分配算法。根据该算法,首先确定 UE 的候选 VLC AP 集,然后依次为 UE 选择 VLC AP 和光波频段。同时,将部分 UE 连接到 WiFi AP。最后,进一步为 UE 分配光波频段。数值结果表明,在系统吞吐量、UE满意度和服务公平性方面,所提出的MCRAMIC优于基于链路冲突图(LCG)的集中式资源分配算法和基于超图理论的资源分配算法。
{"title":"Multi-Cell Resource Allocation Mechanism Based on Interference Control in Indoor Multicolor VLC-WiFi Heterogeneous Networks","authors":"Huanlin Liu;Yang Hu;Yong Chen;Haonan Chen;Bingchuan Huang;Huiling Zhou;Shiqi Yi","doi":"10.1109/TNSM.2024.3432148","DOIUrl":"10.1109/TNSM.2024.3432148","url":null,"abstract":"Heterogeneous networks based on multicolor visible light communication (VLC) and wireless fidelity (WiFi) have been considered as a key technology to achieve the capacity target in the future 6G mobile communication. However, the inter-cell interference (ICI) pattern in the multi-cell VLC scenario degrades the performance of the heterogeneous networks. To solve this problem, a multi-cell resource allocation mechanism based on interference control (MCRAMIC) is proposed, which includes a preparatory phase and an execution phase. Firstly, according to the different locations and data rate requirements of varied user equipments (UEs), the VLC access point (AP) selection algorithm based on interference avoidance and the UE priority assessment algorithm based on the requirement of UE are proposed.Then, according to the influence factor and priority factor, the multi-cell resource allocation algorithm based on interference control is proposed. According to the algorithm, the candidate VLC AP sets of the UEs are determined firstly, and the VLC APs and lightwave bands are selected for the UEs in turn. Meanwhile, some UEs are connected to the WiFi AP. Finally, the lightwave bands are further allocated to the UEs. Numeric results show that the proposed MCRAMIC outperforms the centralized resource allocation algorithm based on link conflict graph (LCG) and the resource allocation algorithm based on hypergraph theory in terms of the system throughput, UE satisfaction and service fairness.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5707-5717"},"PeriodicalIF":4.7,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value Assessment 基于去中心化动态声誉价值评估的区块链跨链交易方法
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-25 DOI: 10.1109/TNSM.2024.3433414
Xiaoxuan Hu;Yaochen Ling;Jialin Hua;Zhenjiang Dong;Yanfei Sun;Jin Qi
With the vigorous development of the blockchain industry, cross-chain transactions can effectively solve the problem of “islands of value” caused by the inability to interact between different chains. However, security risks in reputation management caused by cross-chain transactions implemented through notary solutions have always existed. Consequently, this paper proposes a blockchain cross-chain transaction method based on decentralized dynamic reputation value assessment. The notary election phase addresses the issue of the continually changing behavior of notaries in actual transactions by designing a dynamic evaluation window mechanism based on an RNN. Moreover, a reputation-rating decay mechanism is introduced to avoid the problem of reputation value recovery caused by malicious notaries being inactive for a long time. Relative to alternative reputation assessment models, the proposed method offers a thorough evaluation of user behavior and effectively identifies malicious activities in real-time. Finally, the method was tested by deploying it on the Ethereum blockchain. Our approach offers more dynamic settings for window parameters, adapting to changes in notary behavior and reducing the number of detections within the same timeframe by approximately 59.14%. The weight factor settings are also optimized, allowing for adjustments based on specific situations to achieve accurate reputation values. Overall, this method not only enhances the security of cross-chain transactions but also reduces operational costs by 53.3% compared to traditional technologies.
随着区块链产业的蓬勃发展,跨链交易可以有效解决因不同链之间无法交互而造成的 "价值孤岛 "问题。然而,通过公证方案实现的跨链交易在信誉管理方面的安全隐患一直存在。因此,本文提出了一种基于去中心化动态信誉价值评估的区块链跨链交易方法。在公证人选举阶段,通过设计基于 RNN 的动态评估窗口机制,解决了公证人在实际交易中行为不断变化的问题。此外,还引入了信誉评级衰减机制,以避免因恶意公证人长期不活跃而导致的信誉值恢复问题。与其他声誉评估模型相比,所提出的方法能对用户行为进行全面评估,并能有效地实时识别恶意活动。最后,我们在以太坊区块链上对该方法进行了测试。我们的方法为窗口参数提供了更动态的设置,能适应公证人行为的变化,并将同一时间段内的检测次数减少了约 59.14%。权重因子设置也得到了优化,可根据具体情况进行调整,以实现准确的信誉值。总体而言,与传统技术相比,该方法不仅提高了跨链交易的安全性,还将运营成本降低了 53.3%。
{"title":"A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value Assessment","authors":"Xiaoxuan Hu;Yaochen Ling;Jialin Hua;Zhenjiang Dong;Yanfei Sun;Jin Qi","doi":"10.1109/TNSM.2024.3433414","DOIUrl":"10.1109/TNSM.2024.3433414","url":null,"abstract":"With the vigorous development of the blockchain industry, cross-chain transactions can effectively solve the problem of “islands of value” caused by the inability to interact between different chains. However, security risks in reputation management caused by cross-chain transactions implemented through notary solutions have always existed. Consequently, this paper proposes a blockchain cross-chain transaction method based on decentralized dynamic reputation value assessment. The notary election phase addresses the issue of the continually changing behavior of notaries in actual transactions by designing a dynamic evaluation window mechanism based on an RNN. Moreover, a reputation-rating decay mechanism is introduced to avoid the problem of reputation value recovery caused by malicious notaries being inactive for a long time. Relative to alternative reputation assessment models, the proposed method offers a thorough evaluation of user behavior and effectively identifies malicious activities in real-time. Finally, the method was tested by deploying it on the Ethereum blockchain. Our approach offers more dynamic settings for window parameters, adapting to changes in notary behavior and reducing the number of detections within the same timeframe by approximately 59.14%. The weight factor settings are also optimized, allowing for adjustments based on specific situations to achieve accurate reputation values. Overall, this method not only enhances the security of cross-chain transactions but also reduces operational costs by 53.3% compared to traditional technologies.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5597-5612"},"PeriodicalIF":4.7,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10609432","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Presync: An Efficient Transaction Synchronization Protocol to Accelerate Block Propagation PRESYNC:加速区块传播的高效事务同步协议
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1109/TNSM.2024.3432334
Yixin Li;Liang Liang;Yunjian Jia;Wanli Wen
Block propagation is a critical step in the consensus process, which determines the fork rate and transaction throughput of public blockchain systems. To accelerate block propagation, existing block relay protocols reduce the block size using transaction hashes, which requires the receiver to reconstruct the block based on the transactions in its mempool. Hence, their performance is highly affected by the number of transactions missed by mempools, especially in the P2P network with frequent arrival and departure of nodes. In this paper, we introduce Presync, a transaction synchronization protocol that can reduce the difference of transactions between the block and the mempool with controllable bandwidth overhead. It allows mining pool servers to synchronize the transactions in candidate blocks before the propagation of a valid block. Low-bandwidth mode provides a lightweight synchronization by identifying the unsynchronized transactions, so that the missing transactions can be detected with a low redundancy. High-bandwidth mode conducts a full synchronization of the candidate block using short hashes, and the Merkle root is utilized to match the valid block. We study the performance of Presync through stochastic modeling and experimental evaluations. The results illustrate that low and high-bandwidth modes can respectively reduce the end-to-end delay of compact block by 60% and 78% with bandwidth usages 25KB and 63KB, in a network with 5 active pool servers and 2/3 online probability of full nodes.
区块传播是共识过程中的一个关键步骤,它决定了公共区块链系统的分叉率和交易吞吐量。为了加速区块传播,现有的区块中继协议使用交易哈希值缩小区块大小,这就要求接收方根据其内存池中的交易重建区块。因此,它们的性能会受到内存池遗漏交易数量的严重影响,尤其是在节点频繁到达和离开的 P2P 网络中。在本文中,我们介绍了一种交易同步协议--Presync,它可以在带宽开销可控的情况下减少区块与内存池之间的交易差异。它允许矿池服务器在传播有效区块之前同步候选区块中的事务。低带宽模式通过识别未同步的交易,提供轻量级同步,从而以较低的冗余度检测到丢失的交易。高带宽模式使用短哈希值对候选块进行完全同步,并利用梅克尔根匹配有效块。我们通过随机建模和实验评估研究了 Presync 的性能。结果表明,在有 5 个活动池服务器和 2/3 全节点在线概率的网络中,低带宽模式和高带宽模式在带宽使用量为 25KB 和 63KB 的情况下,可分别将紧凑区块的端到端延迟减少 60% 和 78%。
{"title":"Presync: An Efficient Transaction Synchronization Protocol to Accelerate Block Propagation","authors":"Yixin Li;Liang Liang;Yunjian Jia;Wanli Wen","doi":"10.1109/TNSM.2024.3432334","DOIUrl":"10.1109/TNSM.2024.3432334","url":null,"abstract":"Block propagation is a critical step in the consensus process, which determines the fork rate and transaction throughput of public blockchain systems. To accelerate block propagation, existing block relay protocols reduce the block size using transaction hashes, which requires the receiver to reconstruct the block based on the transactions in its mempool. Hence, their performance is highly affected by the number of transactions missed by mempools, especially in the P2P network with frequent arrival and departure of nodes. In this paper, we introduce Presync, a transaction synchronization protocol that can reduce the difference of transactions between the block and the mempool with controllable bandwidth overhead. It allows mining pool servers to synchronize the transactions in candidate blocks before the propagation of a valid block. Low-bandwidth mode provides a lightweight synchronization by identifying the unsynchronized transactions, so that the missing transactions can be detected with a low redundancy. High-bandwidth mode conducts a full synchronization of the candidate block using short hashes, and the Merkle root is utilized to match the valid block. We study the performance of Presync through stochastic modeling and experimental evaluations. The results illustrate that low and high-bandwidth modes can respectively reduce the end-to-end delay of compact block by 60% and 78% with bandwidth usages 25KB and 63KB, in a network with 5 active pool servers and 2/3 online probability of full nodes.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5582-5596"},"PeriodicalIF":4.7,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network BCDM:基于二进制网络的 IPv6 网络 DDoS 事件早期监控机制
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-22 DOI: 10.1109/TNSM.2024.3431701
Yufu Wang;Xingwei Wang;Qiang Ni;Wenjuan Yu;Min Huang
The rapid adoption of IPv6 has increased network access scale while also escalating the threat of Distributed Denial of Service (DDoS) attacks. By the time a DDoS attack is recognized, the overwhelming volume of attack traffic has already made mitigation extremely difficult. Therefore, continuous network monitoring is essential for early warning and defense preparation against DDoS attacks, requiring both sensitive perception of network changes when DDoS occurs and reducing monitoring overhead to adapt to network resource constraints. In this paper, we propose a novel DDoS incident monitoring mechanism that uses macro-level network traffic behavior as a monitoring anchor to detect subtle malicious behavior indicative of the existence of DDoS traffic in the network. This behavior feature can be abstracted from our designed traffic matrix sample by aggregating continuous IPv6 traffic. Compared to IPv4, the fixed-length header of IPv6 allows more efficient packet parsing in preprocessing. As the decision core of monitoring, we construct a lightweight Binary Convolution DDoS Monitoring (BCDM) model, compressed by binarized convolutional filters and hierarchical pooling strategies, which can detect the malicious behavior abstracted from input traffic matrix if DDoS traffic is involved, thereby signaling an ongoing DDoS attack. Experiment on IPv6 replayed CIC-DDoS2019 shows that BCDM, being lightweight in terms of parameter quantity and computational complexity, achieves monitoring accuracies of 90.9%, 96.4%, and 100% when DDoS incident intensities are as low as 6%, 10%, and 15%, respectively, significantly outperforming comparison methods.
IPv6 的快速应用在扩大网络访问规模的同时,也加剧了分布式拒绝服务(DDoS)攻击的威胁。当 DDoS 攻击被识别出来时,巨大的攻击流量已经使缓解变得极为困难。因此,持续的网络监控对于针对 DDoS 攻击的早期预警和防御准备至关重要,既需要在 DDoS 发生时敏锐地感知网络变化,又需要减少监控开销以适应网络资源限制。在本文中,我们提出了一种新颖的 DDoS 事件监控机制,该机制使用宏观层面的网络流量行为作为监控锚,以检测表明网络中存在 DDoS 流量的细微恶意行为。这种行为特征可以通过聚合连续的 IPv6 流量从我们设计的流量矩阵样本中抽象出来。与 IPv4 相比,IPv6 的固定长度报头允许在预处理中更有效地解析数据包。作为监控的决策核心,我们构建了一个轻量级二值化卷积 DDoS 监控(BCDM)模型,该模型由二值化卷积滤波器和分层池策略压缩而成,可检测从输入流量矩阵中抽象出的是否涉及 DDoS 流量的恶意行为,从而发出正在进行的 DDoS 攻击信号。在 IPv6 重放 CIC-DDoS2019 上的实验表明,BCDM 在参数数量和计算复杂度方面都很轻便,当 DDoS 事件强度低至 6%、10% 和 15%时,其监测准确率分别达到 90.9%、96.4% 和 100%,明显优于对比方法。
{"title":"BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network","authors":"Yufu Wang;Xingwei Wang;Qiang Ni;Wenjuan Yu;Min Huang","doi":"10.1109/TNSM.2024.3431701","DOIUrl":"10.1109/TNSM.2024.3431701","url":null,"abstract":"The rapid adoption of IPv6 has increased network access scale while also escalating the threat of Distributed Denial of Service (DDoS) attacks. By the time a DDoS attack is recognized, the overwhelming volume of attack traffic has already made mitigation extremely difficult. Therefore, continuous network monitoring is essential for early warning and defense preparation against DDoS attacks, requiring both sensitive perception of network changes when DDoS occurs and reducing monitoring overhead to adapt to network resource constraints. In this paper, we propose a novel DDoS incident monitoring mechanism that uses macro-level network traffic behavior as a monitoring anchor to detect subtle malicious behavior indicative of the existence of DDoS traffic in the network. This behavior feature can be abstracted from our designed traffic matrix sample by aggregating continuous IPv6 traffic. Compared to IPv4, the fixed-length header of IPv6 allows more efficient packet parsing in preprocessing. As the decision core of monitoring, we construct a lightweight Binary Convolution DDoS Monitoring (BCDM) model, compressed by binarized convolutional filters and hierarchical pooling strategies, which can detect the malicious behavior abstracted from input traffic matrix if DDoS traffic is involved, thereby signaling an ongoing DDoS attack. Experiment on IPv6 replayed CIC-DDoS2019 shows that BCDM, being lightweight in terms of parameter quantity and computational complexity, achieves monitoring accuracies of 90.9%, 96.4%, and 100% when DDoS incident intensities are as low as 6%, 10%, and 15%, respectively, significantly outperforming comparison methods.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 5","pages":"5873-5887"},"PeriodicalIF":4.7,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1