首页 > 最新文献

IEEE Transactions on Network and Service Management最新文献

英文 中文
IoTDL2AIDS: Toward IoT-Based System Architecture Supporting Distributed LSTM Learning for Adaptive IDS on UAS IoTDL2AIDS:基于物联网的系统架构,支持分布式 LSTM 学习,实现无人机系统上的自适应 IDS
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1109/TNSM.2024.3448312
Amar Rasheed;Mohamed Baza;Gautam Srivastava;Narashimha Karpoor;Cihan Varol
The rapid proliferation of Unmanned Aircraft Systems (UAS) introduces new threats to national security. UAS technologies have dramatically revolutionized legitimate business operations while providing powerful weaponizing systems to malicious actors and criminals. Due to their inherited wireless capabilities, they are an easy target for cyber threats. In response to this challenge, the implementation of many Intrusion Detection Systems (IDS), which support anomaly detection on UAS, have been proposed in the past. However, such systems often require offline training with heavy processing, making them unsuitable for UAS deployment. This is pertinent for drone systems that support dynamic changes in mission operational tasks. This paper presents a novel system architecture that utilizes sensing systems capabilities available on existing IoT infrastructure for supporting rapid infield adaptive models’ training and parameters estimation services for UAS. We have devised a cluster-oriented distributed training algorithm based on LSTM with mini-batch gradient descent, with hundreds of IoT platforms per cluster collaboratively performing model parameters estimation tasks. The proposed architecture is based on deploying a multilayer system that facilitates secure dissemination of power consumption behavioral patterns for the flight sensing system between the UAS layer and the IoT layer. The model was implemented and deployed on a real IoT-enabled platform based on NXP-Kinetis K64–120 MHz. Furthermore, model training and validation were performed by applying various datasets contaminated with different percentages of malicious data. Our anomaly detection model achieved high prediction accuracy with an ROC-AUC score of 0.9332. The model maintains minimal power consumption overheads and low training time during the processing of a data batch.
无人机系统(UAS)的快速发展给国家安全带来了新的威胁。无人机技术极大地改变了合法的商业运作,同时为恶意行为者和罪犯提供了强大的武器化系统。由于其继承的无线功能,它们很容易成为网络威胁的目标。为了应对这一挑战,过去已经提出了许多支持UAS异常检测的入侵检测系统(IDS)的实现。然而,此类系统通常需要进行大量处理的离线训练,这使得它们不适合无人机部署。这与支持任务操作任务动态变化的无人机系统有关。本文提出了一种新的系统架构,该架构利用现有物联网基础设施上可用的传感系统功能,支持无人机系统的快速内场自适应模型训练和参数估计服务。我们设计了一种基于LSTM的基于小批量梯度下降的面向集群的分布式训练算法,每个集群有数百个物联网平台协同执行模型参数估计任务。所提出的架构基于部署多层系统,该系统有助于在无人机系统层和物联网层之间安全地传播飞行传感系统的功耗行为模式。该模型在基于NXP-Kinetis K64-120 MHz的真实物联网支持平台上实现和部署。此外,通过应用被不同百分比的恶意数据污染的各种数据集来进行模型训练和验证。我们的异常检测模型预测精度较高,ROC-AUC得分为0.9332。该模型在处理批数据期间保持最小的功耗开销和较低的训练时间。
{"title":"IoTDL2AIDS: Toward IoT-Based System Architecture Supporting Distributed LSTM Learning for Adaptive IDS on UAS","authors":"Amar Rasheed;Mohamed Baza;Gautam Srivastava;Narashimha Karpoor;Cihan Varol","doi":"10.1109/TNSM.2024.3448312","DOIUrl":"10.1109/TNSM.2024.3448312","url":null,"abstract":"The rapid proliferation of Unmanned Aircraft Systems (UAS) introduces new threats to national security. UAS technologies have dramatically revolutionized legitimate business operations while providing powerful weaponizing systems to malicious actors and criminals. Due to their inherited wireless capabilities, they are an easy target for cyber threats. In response to this challenge, the implementation of many Intrusion Detection Systems (IDS), which support anomaly detection on UAS, have been proposed in the past. However, such systems often require offline training with heavy processing, making them unsuitable for UAS deployment. This is pertinent for drone systems that support dynamic changes in mission operational tasks. This paper presents a novel system architecture that utilizes sensing systems capabilities available on existing IoT infrastructure for supporting rapid infield adaptive models’ training and parameters estimation services for UAS. We have devised a cluster-oriented distributed training algorithm based on LSTM with mini-batch gradient descent, with hundreds of IoT platforms per cluster collaboratively performing model parameters estimation tasks. The proposed architecture is based on deploying a multilayer system that facilitates secure dissemination of power consumption behavioral patterns for the flight sensing system between the UAS layer and the IoT layer. The model was implemented and deployed on a real IoT-enabled platform based on NXP-Kinetis K64–120 MHz. Furthermore, model training and validation were performed by applying various datasets contaminated with different percentages of malicious data. Our anomaly detection model achieved high prediction accuracy with an ROC-AUC score of 0.9332. The model maintains minimal power consumption overheads and low training time during the processing of a data batch.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6059-6081"},"PeriodicalIF":4.7,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142187219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Packet Loss in Real-Time Communications: Can ML Tame its Unpredictable Nature? 实时通信中的数据包丢失:ML 能否驯服其不可预测的特性?
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1109/tnsm.2024.3442616
Tailai Song, Gianluca Perna, Paolo Garza, Michela Meo, Maurizio Matteo Munafò
{"title":"Packet Loss in Real-Time Communications: Can ML Tame its Unpredictable Nature?","authors":"Tailai Song, Gianluca Perna, Paolo Garza, Michela Meo, Maurizio Matteo Munafò","doi":"10.1109/tnsm.2024.3442616","DOIUrl":"https://doi.org/10.1109/tnsm.2024.3442616","url":null,"abstract":"","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"13 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142187222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAC-PP: Jointly Optimizing Privacy Protection and Computation Offloading for Mobile Edge Computing SAC-PP:为移动边缘计算联合优化隐私保护和计算卸载
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1109/TNSM.2024.3447753
Shigen Shen;Xuanbin Hao;Zhengjun Gao;Guowen Wu;Yizhou Shen;Hong Zhang;Qiying Cao;Shui Yu
The emergence of mobile edge computing (MEC) imposes an unprecedented pressure on privacy protection, although it helps the improvement of computation performance including energy consumption and computation delay by computation offloading. To this end, we concern about the privacy protection in the MEC system with a curious edge server. We present a deep reinforcement learning (DRL)-driven computation offloading strategy designed to concurrently optimize privacy protection and computation cost. We investigate the potential privacy breaches resulting from offloading patterns, propose an attack model of privacy theft, and correspondingly define an analytical measure to assess privacy protection levels. In pursuit of an ideal computation offloading approach, we propose an algorithm, SAC-PP, which integrates actor-critic, off-policy, and maximum entropy to improve the efficiency of learning processes. We explore the sensitivity of SAC-PP to hyperparameters and the results demonstrate its stability, which facilitates application and deployment in real environments. The relationship between privacy protection and computation cost is analyzed with different reward factors. Compared with benchmarks, the empirical results from simulations illustrate that the proposed computation offloading approach exhibits enhanced learning speed and overall performance.
移动边缘计算(MEC)的出现给隐私保护带来了前所未有的压力,尽管它通过计算卸载有助于提高计算性能,包括能耗和计算延迟。为此,我们关注MEC系统中带有好奇边缘服务器的隐私保护问题。我们提出了一种深度强化学习(DRL)驱动的计算卸载策略,旨在同时优化隐私保护和计算成本。我们研究了卸载模式可能导致的隐私泄露,提出了一种隐私盗窃的攻击模型,并定义了一种评估隐私保护水平的分析方法。为了追求理想的计算卸载方法,我们提出了一种算法,SAC-PP,它集成了行为者批评,off-policy和最大熵来提高学习过程的效率。我们探讨了SAC-PP对超参数的敏感性,结果证明了它的稳定性,便于在实际环境中的应用和部署。分析了不同奖励因素下隐私保护与计算成本的关系。与基准测试结果相比,仿真的经验结果表明,所提出的计算卸载方法具有更高的学习速度和整体性能。
{"title":"SAC-PP: Jointly Optimizing Privacy Protection and Computation Offloading for Mobile Edge Computing","authors":"Shigen Shen;Xuanbin Hao;Zhengjun Gao;Guowen Wu;Yizhou Shen;Hong Zhang;Qiying Cao;Shui Yu","doi":"10.1109/TNSM.2024.3447753","DOIUrl":"10.1109/TNSM.2024.3447753","url":null,"abstract":"The emergence of mobile edge computing (MEC) imposes an unprecedented pressure on privacy protection, although it helps the improvement of computation performance including energy consumption and computation delay by computation offloading. To this end, we concern about the privacy protection in the MEC system with a curious edge server. We present a deep reinforcement learning (DRL)-driven computation offloading strategy designed to concurrently optimize privacy protection and computation cost. We investigate the potential privacy breaches resulting from offloading patterns, propose an attack model of privacy theft, and correspondingly define an analytical measure to assess privacy protection levels. In pursuit of an ideal computation offloading approach, we propose an algorithm, SAC-PP, which integrates actor-critic, off-policy, and maximum entropy to improve the efficiency of learning processes. We explore the sensitivity of SAC-PP to hyperparameters and the results demonstrate its stability, which facilitates application and deployment in real environments. The relationship between privacy protection and computation cost is analyzed with different reward factors. Compared with benchmarks, the empirical results from simulations illustrate that the proposed computation offloading approach exhibits enhanced learning speed and overall performance.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6190-6203"},"PeriodicalIF":4.7,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142187218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Adaptive Anomaly Detection in Industrial IoT Environments 工业物联网环境中的实时自适应异常检测
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-21 DOI: 10.1109/TNSM.2024.3447532
Mahsa Raeiszadeh;Amin Ebrahimzadeh;Roch H. Glitho;Johan Eker;Raquel A. F. Mini
To ensure reliability and service availability, next-generation networks are expected to rely on automated anomaly detection systems powered by advanced machine learning methods with the capability of handling multi-dimensional data. Such multi-dimensional, heterogeneous data occurs mostly in today’s Industrial Internet of Things (IIoT), where real-time detection of anomalies is critical to prevent impending failures and resolve them in a timely manner. However, existing anomaly detection methods often fall short of effectively coping with the complexity and dynamism of multi-dimensional data streams in IIoT. In this paper, we propose an adaptive method for detecting anomalies in IIoT streaming data utilizing a multi-source prediction model and concept drift adaptation. The proposed anomaly detection algorithm merges a prediction model into a novel drift adaptation method resulting in accurate and efficient anomaly detection that exhibits improved scalability. Our trace-driven evaluations indicate that the proposed method outperforms the state-of-the-art anomaly detection methods by achieving up to an 89.71% accuracy (in terms of Area under the Curve (AUC)) while meeting the given efficiency and scalability requirements.
为了确保可靠性和服务可用性,下一代网络将依赖于由先进的机器学习方法驱动的自动异常检测系统,该系统具有处理多维数据的能力。这种多维异构数据主要出现在当今的工业物联网(IIoT)中,实时检测异常对于防止即将发生的故障并及时解决故障至关重要。然而,现有的异常检测方法往往不能有效应对工业物联网中多维数据流的复杂性和动态性。在本文中,我们提出了一种自适应方法,利用多源预测模型和概念漂移自适应来检测IIoT流数据中的异常。该异常检测算法将预测模型与一种新的漂移自适应方法相结合,实现了准确、高效的异常检测,并具有更好的可扩展性。我们的跟踪驱动评估表明,所提出的方法优于最先进的异常检测方法,在满足给定效率和可扩展性要求的情况下,达到高达89.71%的准确率(就曲线下面积(AUC)而言)。
{"title":"Real-Time Adaptive Anomaly Detection in Industrial IoT Environments","authors":"Mahsa Raeiszadeh;Amin Ebrahimzadeh;Roch H. Glitho;Johan Eker;Raquel A. F. Mini","doi":"10.1109/TNSM.2024.3447532","DOIUrl":"10.1109/TNSM.2024.3447532","url":null,"abstract":"To ensure reliability and service availability, next-generation networks are expected to rely on automated anomaly detection systems powered by advanced machine learning methods with the capability of handling multi-dimensional data. Such multi-dimensional, heterogeneous data occurs mostly in today’s Industrial Internet of Things (IIoT), where real-time detection of anomalies is critical to prevent impending failures and resolve them in a timely manner. However, existing anomaly detection methods often fall short of effectively coping with the complexity and dynamism of multi-dimensional data streams in IIoT. In this paper, we propose an adaptive method for detecting anomalies in IIoT streaming data utilizing a multi-source prediction model and concept drift adaptation. The proposed anomaly detection algorithm merges a prediction model into a novel drift adaptation method resulting in accurate and efficient anomaly detection that exhibits improved scalability. Our trace-driven evaluations indicate that the proposed method outperforms the state-of-the-art anomaly detection methods by achieving up to an 89.71% accuracy (in terms of Area under the Curve (AUC)) while meeting the given efficiency and scalability requirements.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6839-6856"},"PeriodicalIF":4.7,"publicationDate":"2024-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142187223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QSKA: A Quantum Secured Privacy-Preserving Mutual Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication QSKA:一种基于能源互联网的车辆与电网通信的量子安全隐私保护互认证方案
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-20 DOI: 10.1109/TNSM.2024.3445972
Kumar Prateek;Soumyadev Maity;Neetesh Saxena
Energy Internet is well-known nowadays for enabling bidirectional V2G communication; however, with communication and computation abilities, V2G systems become vulnerable to cyber-attacks and unauthorised access. An authentication protocol verifies the identity of an entity, establishes trust, and allows access to authorized resources while preventing unauthorized access. Research challenges for vehicle-to-grid authentication protocols include quantum security, privacy, resilience to attacks, and interoperability. The majority of authentication protocols in V2G systems are based on public-key cryptography and depend on some hard problems like integer factorization and discrete logs to guarantee security, which can be easily broken by a quantum adversary. Besides, ensuring both information security and entity privacy is equally crucial in V2G scenarios. Consequently, this work proposes a quantum-secured privacy-preserving key authentication and communication (QSKA) protocol using superdense coding and a hash function for unconditionally secure V2G communication and privacy. QSKA uses a password-based authentication mechanism, enabling V2G entities to securely transfer passwords using superdense coding. The QSKA security verification is performed in proof-assistant Coq. The security analysis and performance evaluation of the QSKA show its resiliency against well-known security attacks and reveal its enhanced reliability and efficiency with respect to state-of-the-art protocols in terms of computation, communication, and energy overhead.
目前,能源互联网以实现双向V2G通信而闻名;然而,由于通讯和计算能力,V2G系统很容易受到网络攻击和未经授权的访问。身份验证协议验证实体的身份,建立信任,允许访问授权的资源,同时防止未经授权的访问。车辆到电网认证协议的研究挑战包括量子安全性、隐私性、抗攻击能力和互操作性。V2G系统中的大多数身份验证协议都基于公钥加密,并依赖于一些难题(如整数分解和离散日志)来保证安全性,这很容易被量子对手破坏。此外,在V2G场景中,确保信息安全和实体隐私同样重要。因此,本工作提出了一种量子安全的隐私保护密钥认证和通信(QSKA)协议,该协议使用超密集编码和哈希函数,用于无条件安全的V2G通信和隐私。QSKA使用基于密码的身份验证机制,使V2G实体能够使用超密集编码安全地传输密码。QSKA安全验证在证明辅助Coq中执行。QSKA的安全性分析和性能评估显示了它对众所周知的安全攻击的弹性,并揭示了它在计算、通信和能量开销方面相对于最先进的协议具有更高的可靠性和效率。
{"title":"QSKA: A Quantum Secured Privacy-Preserving Mutual Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication","authors":"Kumar Prateek;Soumyadev Maity;Neetesh Saxena","doi":"10.1109/TNSM.2024.3445972","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3445972","url":null,"abstract":"Energy Internet is well-known nowadays for enabling bidirectional V2G communication; however, with communication and computation abilities, V2G systems become vulnerable to cyber-attacks and unauthorised access. An authentication protocol verifies the identity of an entity, establishes trust, and allows access to authorized resources while preventing unauthorized access. Research challenges for vehicle-to-grid authentication protocols include quantum security, privacy, resilience to attacks, and interoperability. The majority of authentication protocols in V2G systems are based on public-key cryptography and depend on some hard problems like integer factorization and discrete logs to guarantee security, which can be easily broken by a quantum adversary. Besides, ensuring both information security and entity privacy is equally crucial in V2G scenarios. Consequently, this work proposes a quantum-secured privacy-preserving key authentication and communication (QSKA) protocol using superdense coding and a hash function for unconditionally secure V2G communication and privacy. QSKA uses a password-based authentication mechanism, enabling V2G entities to securely transfer passwords using superdense coding. The QSKA security verification is performed in proof-assistant Coq. The security analysis and performance evaluation of the QSKA show its resiliency against well-known security attacks and reveal its enhanced reliability and efficiency with respect to state-of-the-art protocols in terms of computation, communication, and energy overhead.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6810-6826"},"PeriodicalIF":4.7,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142859253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FloRa: Flow Table Low-Rate Overflow Reconnaissance and Detection in SDN SDN中的流表低速率溢出侦察和检测
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-20 DOI: 10.1109/TNSM.2024.3446178
Ankur Mudgal;Abhishek Verma;Munesh Singh;Kshira Sagar Sahoo;Erik Elmroth;Monowar Bhuyan
SDN has evolved to revolutionize next-generation networks, offering programmability for on-the-fly service provisioning, primarily supported by the OpenFlow (OF) protocol. The limited storage capacity of Ternary Content Addressable Memory (TCAM) for storing flow tables in OF switches introduces vulnerabilities, notably the Low-Rate Flow Table Overflow (LOFT) attacks. LOFT exploits the flow table’s storage capacity by occupying a substantial amount of space with malicious flow, leading to a gradual degradation in the flow-forwarding performance of OF switches. To mitigate this threat, we propose FloRa, a machine learning-based solution designed for monitoring and detecting LOFT attacks in SDN. FloRa continuously examines and determines the status of the flow table by closely examining the features of the flow table entries. When suspicious activity is identified, FloRa promptly activates the machine-learning based detection module. The module monitors flow properties, identifies malicious flows, and blacklists them, facilitating their eviction from the flow table. Incorporating novel features such as Packet Arrival Frequency, Content Relevance Score, and Possible Spoofed IP along with Cat Boost employed as the attack detection method. The proposed method reduces CPU overhead, memory overhead, and classification latency significantly and achieves a detection accuracy of 99.49% which is more than the state-of-the-art methods to the best of our knowledge. This approach not only protects the integrity of the flow tables but also guarantees the uninterrupted flow of legitimate traffic. Experimental results indicate the effectiveness of FloRa in LOFT attack detection, ensuring uninterrupted data forwarding and continuous availability of flow table resources in SDN.
SDN已经发展成为革命性的下一代网络,为即时服务提供可编程性,主要由OpenFlow (OF)协议支持。用于存储流表的三元内容可寻址存储器(TCAM)的存储容量有限,在of交换机中引入了漏洞,特别是低速率流表溢出(LOFT)攻击。LOFT通过恶意流占用大量空间来利用流表的存储容量,导致of交换机的流转发性能逐渐下降。为了减轻这种威胁,我们提出了FloRa,这是一种基于机器学习的解决方案,旨在监测和检测SDN中的LOFT攻击。FloRa通过仔细检查流表条目的特征,不断检查和确定流表的状态。当发现可疑活动时,FloRa会立即激活基于机器学习的检测模块。该模块监视流属性,识别恶意流,并将其列入黑名单,以便将其从流表中删除。结合新颖的特征,如数据包到达频率、内容相关性评分和可能被欺骗的IP,以及使用Cat Boost作为攻击检测方法。该方法显著降低了CPU开销、内存开销和分类延迟,检测准确率达到99.49%,超过了目前已知的最先进的方法。这种方法不仅保护了流表的完整性,而且保证了合法流量的不间断流动。实验结果表明了FloRa在LOFT攻击检测中的有效性,保证了SDN中数据转发不中断和流表资源的持续可用性。
{"title":"FloRa: Flow Table Low-Rate Overflow Reconnaissance and Detection in SDN","authors":"Ankur Mudgal;Abhishek Verma;Munesh Singh;Kshira Sagar Sahoo;Erik Elmroth;Monowar Bhuyan","doi":"10.1109/TNSM.2024.3446178","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3446178","url":null,"abstract":"SDN has evolved to revolutionize next-generation networks, offering programmability for on-the-fly service provisioning, primarily supported by the OpenFlow (OF) protocol. The limited storage capacity of Ternary Content Addressable Memory (TCAM) for storing flow tables in OF switches introduces vulnerabilities, notably the Low-Rate Flow Table Overflow (LOFT) attacks. LOFT exploits the flow table’s storage capacity by occupying a substantial amount of space with malicious flow, leading to a gradual degradation in the flow-forwarding performance of OF switches. To mitigate this threat, we propose FloRa, a machine learning-based solution designed for monitoring and detecting LOFT attacks in SDN. FloRa continuously examines and determines the status of the flow table by closely examining the features of the flow table entries. When suspicious activity is identified, FloRa promptly activates the machine-learning based detection module. The module monitors flow properties, identifies malicious flows, and blacklists them, facilitating their eviction from the flow table. Incorporating novel features such as Packet Arrival Frequency, Content Relevance Score, and Possible Spoofed IP along with Cat Boost employed as the attack detection method. The proposed method reduces CPU overhead, memory overhead, and classification latency significantly and achieves a detection accuracy of 99.49% which is more than the state-of-the-art methods to the best of our knowledge. This approach not only protects the integrity of the flow tables but also guarantees the uninterrupted flow of legitimate traffic. Experimental results indicate the effectiveness of FloRa in LOFT attack detection, ensuring uninterrupted data forwarding and continuous availability of flow table resources in SDN.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6670-6683"},"PeriodicalIF":4.7,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Feature Aggregation for Web Service Recommendations 针对网络服务推荐的群体特征聚合
IF 5.3 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1109/tnsm.2024.3444275
Yong Xiao, Jianxun Liu, Guosheng Kang, Buqing Cao
{"title":"Group Feature Aggregation for Web Service Recommendations","authors":"Yong Xiao, Jianxun Liu, Guosheng Kang, Buqing Cao","doi":"10.1109/tnsm.2024.3444275","DOIUrl":"https://doi.org/10.1109/tnsm.2024.3444275","url":null,"abstract":"","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"27 1","pages":""},"PeriodicalIF":5.3,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142187225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DLLF-2EN: Energy-Efficient Next Generation Mobile Network With Deep Learning-Based Load Forecasting DLLF-2EN:基于深度学习负载预测的高能效下一代移动网络
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1109/TNSM.2024.3445369
Xin Wang;Jianhui Lv;Adam Slowik;B. D. Parameshachari;Keqin Li;Chien-Ming Chen;Saru Kumari
The exponential growth of mobile data traffic in next generation networks has led to a significant increase in energy consumption, posing critical challenges for network operators. We propose DLLF-2EN, a novel energy-efficient framework that integrates deep learning-based load forecasting, an advanced power consumption model, and a comprehensive energy-saving strategy to address this issue. The load forecasting technique utilizes deep convolutional neural network and long short-term memory model, which is based on deep learning. This model is capable of capturing the spatiotemporal dependencies present in network traffic data. The power consumption model accurately characterizes the base stations’ static and dynamic power consumption components, facilitating the assessment of energy efficiency under various network scenarios. The energy-saving strategy combines base station sleep mode with discontinuous transmission and reception, as well as lightweight transmission of common signals, dynamically adapting the network operation based on the predicted traffic load. Furthermore, DLLF-2EN incorporates an intelligent power management system that leverages machine learning algorithms to continuously monitor the network, analyze collected data, and make optimal energy-saving decisions in real-time. Simulation demonstrate that the superior performance of DLLF-2EN in terms of load forecasting accuracy and energy efficiency compared to state-of-the-art baseline methods. The proposed framework represents a comprehensive solution for energy-efficient and sustainable next generation mobile networks, addressing the critical challenges of minimizing energy consumption while meeting the growing demands for high-quality mobile services.
下一代网络中移动数据流量的指数级增长导致能源消耗的显著增加,给网络运营商带来了严峻的挑战。为了解决这一问题,我们提出了一种新的节能框架DLLF-2EN,它集成了基于深度学习的负荷预测、先进的功耗模型和全面的节能策略。负荷预测技术采用深度卷积神经网络和基于深度学习的长短期记忆模型。该模型能够捕获网络流量数据中存在的时空依赖关系。该功耗模型准确表征了基站的静态和动态功耗组成部分,便于对各种网络场景下的能效进行评估。该节能策略将基站休眠模式与不连续收发、常用信号轻量传输相结合,根据预测的业务负载动态适应网络运行。此外,DLLF-2EN集成了智能电源管理系统,该系统利用机器学习算法持续监控网络,分析收集的数据,并实时做出最佳节能决策。仿真结果表明,与最先进的基线方法相比,DLLF-2EN在负荷预测精度和能源效率方面具有优越的性能。拟议的框架代表了节能和可持续的下一代移动网络的全面解决方案,解决了最大限度地减少能源消耗的关键挑战,同时满足了对高质量移动服务日益增长的需求。
{"title":"DLLF-2EN: Energy-Efficient Next Generation Mobile Network With Deep Learning-Based Load Forecasting","authors":"Xin Wang;Jianhui Lv;Adam Slowik;B. D. Parameshachari;Keqin Li;Chien-Ming Chen;Saru Kumari","doi":"10.1109/TNSM.2024.3445369","DOIUrl":"10.1109/TNSM.2024.3445369","url":null,"abstract":"The exponential growth of mobile data traffic in next generation networks has led to a significant increase in energy consumption, posing critical challenges for network operators. We propose DLLF-2EN, a novel energy-efficient framework that integrates deep learning-based load forecasting, an advanced power consumption model, and a comprehensive energy-saving strategy to address this issue. The load forecasting technique utilizes deep convolutional neural network and long short-term memory model, which is based on deep learning. This model is capable of capturing the spatiotemporal dependencies present in network traffic data. The power consumption model accurately characterizes the base stations’ static and dynamic power consumption components, facilitating the assessment of energy efficiency under various network scenarios. The energy-saving strategy combines base station sleep mode with discontinuous transmission and reception, as well as lightweight transmission of common signals, dynamically adapting the network operation based on the predicted traffic load. Furthermore, DLLF-2EN incorporates an intelligent power management system that leverages machine learning algorithms to continuously monitor the network, analyze collected data, and make optimal energy-saving decisions in real-time. Simulation demonstrate that the superior performance of DLLF-2EN in terms of load forecasting accuracy and energy efficiency compared to state-of-the-art baseline methods. The proposed framework represents a comprehensive solution for energy-efficient and sustainable next generation mobile networks, addressing the critical challenges of minimizing energy consumption while meeting the growing demands for high-quality mobile services.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6515-6526"},"PeriodicalIF":4.7,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142187226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Optimization of Microservice Deployment and Routing in Edge via Multi-Objective Deep Reinforcement Learning 通过多目标深度强化学习对边缘微服务部署和路由进行联合优化
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1109/TNSM.2024.3443872
Menglan Hu;Hao Wang;Xiaohui Xu;Jianwen He;Yi Hu;Tianping Deng;Kai Peng
Edge computing technologies with container-based microservice architectures promise to provide stable and low-latency services for large-scale and complex edge applications. However, due to the limited CPU and storage resources in edge computing scenarios, the coarse-grained service deployment on edge nodes causes performance bottlenecks. In addition, the effective deployment of microservices is tightly correlated with request routing, but the current research ignores the joint optimization of multi-instance deployment and routing. In this paper, we first model the problem of jointly optimizing service deployment and routing in a dynamically changing environment with multi-edge network collaboration based on a queuing network analysis. Secondly, we design heuristic algorithms to scale microservice instances horizontally in dynamic user request states. In addition, we propose a reinforcement learning algorithm based on reward shaping (RSPPO) to minimize user waiting delay and edge network resource consumption. We also solve the microservice deployment and request routing problem for multi-edge collaboration to achieve load balancing among edge nodes. Finally, extensive experiments verify the significant and extensive effectiveness of our algorithm.
基于容器的微服务架构的边缘计算技术有望为大规模和复杂的边缘应用程序提供稳定和低延迟的服务。但是,由于边缘计算场景下CPU和存储资源有限,粗粒度业务部署在边缘节点上会造成性能瓶颈。此外,微服务的有效部署与请求路由密切相关,但目前的研究忽略了多实例部署和路由的联合优化。本文首先基于排队网络分析,对动态变化环境下多边缘网络协同下的业务部署和路由联合优化问题进行了建模。其次,我们设计了启发式算法来横向扩展动态用户请求状态下的微服务实例。此外,我们提出了一种基于奖励塑造(RSPPO)的强化学习算法,以最大限度地减少用户等待延迟和边缘网络资源消耗。解决了多边缘协作的微服务部署和请求路由问题,实现了边缘节点间的负载均衡。最后,通过大量的实验验证了该算法的显著和广泛的有效性。
{"title":"Joint Optimization of Microservice Deployment and Routing in Edge via Multi-Objective Deep Reinforcement Learning","authors":"Menglan Hu;Hao Wang;Xiaohui Xu;Jianwen He;Yi Hu;Tianping Deng;Kai Peng","doi":"10.1109/TNSM.2024.3443872","DOIUrl":"10.1109/TNSM.2024.3443872","url":null,"abstract":"Edge computing technologies with container-based microservice architectures promise to provide stable and low-latency services for large-scale and complex edge applications. However, due to the limited CPU and storage resources in edge computing scenarios, the coarse-grained service deployment on edge nodes causes performance bottlenecks. In addition, the effective deployment of microservices is tightly correlated with request routing, but the current research ignores the joint optimization of multi-instance deployment and routing. In this paper, we first model the problem of jointly optimizing service deployment and routing in a dynamically changing environment with multi-edge network collaboration based on a queuing network analysis. Secondly, we design heuristic algorithms to scale microservice instances horizontally in dynamic user request states. In addition, we propose a reinforcement learning algorithm based on reward shaping (RSPPO) to minimize user waiting delay and edge network resource consumption. We also solve the microservice deployment and request routing problem for multi-edge collaboration to achieve load balancing among edge nodes. Finally, extensive experiments verify the significant and extensive effectiveness of our algorithm.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6364-6381"},"PeriodicalIF":4.7,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142187224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-Edge-End Collaborative Intelligent Service Computation Offloading: A Digital Twin Driven Edge Coalition Approach for Industrial IoT 云-端协作智能服务计算卸载:面向工业物联网的数字孪生驱动边缘联盟方法
IF 4.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-19 DOI: 10.1109/TNSM.2024.3441231
Xiaohuan Li;Bitao Chen;Junchuan Fan;Jiawen Kang;Jin Ye;Xun Wang;Dusit Niyato
By using the intelligent edge computing technologies, a large number of computing tasks of end devices in Industrial Internet of Things (IIoT) can be offloaded to edge servers, which can effectively alleviate the burden and enhance the performance of IIoT. However, in large-scale multi-service-oriented IIoT scenarios, offloading service resources are heterogeneous and offloading requirements are mutually exclusive and time-varying, which reduce the offloading efficiency. In this paper, we propose a cloud-edge-end collaboration intelligent service computation offloading scheme based on Digital Twin (DT) driven Edge Coalition Formation (DECF) approach to improve the offloading efficiency and the total utility of edge servers, respectively. Firstly, we establish a DT model to obtain accurate digital representations of heterogeneous end devices and network state parameters in dynamic and complex IIoT scenarios. The DT model can capture time-varying requirements in a low latency manner. Secondly, we formulate two optimization problems to maximize the offloading throughput and total system utility. Finally, we convert the multi-objective optimization problems to a Stackelberg coalition game model and develop a distributed coalition formation approach to balance the two optimizing objectives. Simulation results indicate that, compared with the nearest coalition scheme and non-coalition scheme, the proposed approach achieves offloading throughput improvements of 11.5% and 148%, and enhances the overall utility by 12% and 170%, respectively.
通过使用智能边缘计算技术,可以将工业物联网(IIoT)中终端设备的大量计算任务卸载到边缘服务器上,有效减轻了工业物联网的负担,提高了工业物联网的性能。但在大规模多服务的工业物联网场景下,由于业务资源的异构性、卸载需求的互斥性和时变性,降低了卸载效率。本文提出了一种基于数字孪生(DT)驱动的边缘联盟形成(DECF)方法的云-边缘协作智能服务计算卸载方案,分别提高了边缘服务器的卸载效率和总效用。首先,我们建立了DT模型,以获得动态和复杂IIoT场景中异构终端设备和网络状态参数的准确数字表示。DT模型可以以低延迟的方式捕获随时间变化的需求。其次,我们提出了两个优化问题,以最大限度地提高卸载吞吐量和系统总效用。最后,我们将多目标优化问题转化为Stackelberg联盟博弈模型,并提出了一种平衡两个优化目标的分布式联盟形成方法。仿真结果表明,与最接近联盟方案和非联盟方案相比,该方法的卸载吞吐量分别提高了11.5%和148%,总体效用分别提高了12%和170%。
{"title":"Cloud-Edge-End Collaborative Intelligent Service Computation Offloading: A Digital Twin Driven Edge Coalition Approach for Industrial IoT","authors":"Xiaohuan Li;Bitao Chen;Junchuan Fan;Jiawen Kang;Jin Ye;Xun Wang;Dusit Niyato","doi":"10.1109/TNSM.2024.3441231","DOIUrl":"10.1109/TNSM.2024.3441231","url":null,"abstract":"By using the intelligent edge computing technologies, a large number of computing tasks of end devices in Industrial Internet of Things (IIoT) can be offloaded to edge servers, which can effectively alleviate the burden and enhance the performance of IIoT. However, in large-scale multi-service-oriented IIoT scenarios, offloading service resources are heterogeneous and offloading requirements are mutually exclusive and time-varying, which reduce the offloading efficiency. In this paper, we propose a cloud-edge-end collaboration intelligent service computation offloading scheme based on Digital Twin (DT) driven Edge Coalition Formation (DECF) approach to improve the offloading efficiency and the total utility of edge servers, respectively. Firstly, we establish a DT model to obtain accurate digital representations of heterogeneous end devices and network state parameters in dynamic and complex IIoT scenarios. The DT model can capture time-varying requirements in a low latency manner. Secondly, we formulate two optimization problems to maximize the offloading throughput and total system utility. Finally, we convert the multi-objective optimization problems to a Stackelberg coalition game model and develop a distributed coalition formation approach to balance the two optimizing objectives. Simulation results indicate that, compared with the nearest coalition scheme and non-coalition scheme, the proposed approach achieves offloading throughput improvements of 11.5% and 148%, and enhances the overall utility by 12% and 170%, respectively.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"21 6","pages":"6318-6330"},"PeriodicalIF":4.7,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10639522","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142187228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1