首页 > 最新文献

2017 International Conference on Computing, Networking and Communications (ICNC)最新文献

英文 中文
An efficient approach to prevent Battery Exhaustion Attack on BLE-based mesh networks 一种有效防止基于ble的网状网络电池耗尽攻击的方法
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876092
Zonglin Guo, I. Harris, Yutong Jiang, L. Tsaur
As the need for mesh networks for Internet of Things (IoT) applications grows, research in this field attracts more and more attention. Because IoT devices are primarily battery-driven, Bluetooth Low Energy (BLE) networking is appealing to conserve battery life. The importance of battery life in a mobile ad hoc network increases the sensitivity of the network to cyber-attacks intended to impact battery life. A Battery Exhaustion Attack can overwhelmingly exhaust the batteries of network nodes by making malicious service requests. In this paper, we present an intrusion detection and prevention approach for this type of attack. This approach requires the suspicious nodes to switch connection to the neighbors of its connected nodes periodically. When a suspicious node is identified as malicious, it is blacklisted to prevent future attacks. Even when a malicious node cannot be detected, its impact is distributed across the network in order to extend the overall network lifetime.
随着物联网(IoT)应用对网状网络需求的增长,该领域的研究越来越受到重视。由于物联网设备主要由电池驱动,低功耗蓝牙(BLE)网络在节省电池寿命方面很有吸引力。在移动自组织网络中,电池寿命的重要性增加了网络对旨在影响电池寿命的网络攻击的敏感性。电池耗尽攻击是指通过恶意的业务请求,使网络节点的电池大量耗尽。在本文中,我们提出了一种针对此类攻击的入侵检测和防御方法。这种方法要求可疑节点定期切换连接到其连接节点的邻居。当一个可疑节点被识别为恶意时,它被列入黑名单,以防止未来的攻击。即使无法检测到恶意节点,其影响也会分布在整个网络中,以延长整个网络的生命周期。
{"title":"An efficient approach to prevent Battery Exhaustion Attack on BLE-based mesh networks","authors":"Zonglin Guo, I. Harris, Yutong Jiang, L. Tsaur","doi":"10.1109/ICCNC.2017.7876092","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876092","url":null,"abstract":"As the need for mesh networks for Internet of Things (IoT) applications grows, research in this field attracts more and more attention. Because IoT devices are primarily battery-driven, Bluetooth Low Energy (BLE) networking is appealing to conserve battery life. The importance of battery life in a mobile ad hoc network increases the sensitivity of the network to cyber-attacks intended to impact battery life. A Battery Exhaustion Attack can overwhelmingly exhaust the batteries of network nodes by making malicious service requests. In this paper, we present an intrusion detection and prevention approach for this type of attack. This approach requires the suspicious nodes to switch connection to the neighbors of its connected nodes periodically. When a suspicious node is identified as malicious, it is blacklisted to prevent future attacks. Even when a malicious node cannot be detected, its impact is distributed across the network in order to extend the overall network lifetime.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127027013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Optical circuit granularity impact in TCP-dominant hybrid data center networks tcp主导混合数据中心网络中光电路粒度的影响
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876147
H. Rastegarfar, Kamran Keykhosravi, K. Szczerba, E. Agrell, L. LaComb, M. Glick
Hybrid networking, based on electronic packet switching and optical circuit switching, has been proposed to resolve the existing switching bottlenecks in data centers in an energy-efficient and cost-effective fashion. We consider the problem of resource provisioning in hybrid data centers in terms of optical circuit switching capacity and granularity. The number of fibers connected to server racks, the number of wavelengths per fiber, and the ratio of capacity provided by the optical circuit-switched portion of the network to that of the electronic packet-switched portion are crucial design parameters to be optimized during the data center planning phase. These parameters in conjunction with the additive-increase, multiplicative-decrease (AIMD) congestion control mechanism of the Transmission Control Protocol (TCP) pose a significant impact on data center network performance. In this paper, we examine the combined impact of optical bandwidth settings and TCP dynamics using event-driven simulations. Our analysis reveals the strong dependence of overall network throughput on channel capacity (i.e., the bit rate per wavelength channel) and points to the advantages of optical bandwidth consolidation employing higher-order modulation formats.
基于电子分组交换和光电路交换的混合网络以一种节能、经济的方式解决数据中心现有的交换瓶颈。本文从光路交换容量和粒度两个方面考虑混合数据中心的资源配置问题。连接到服务器机架的光纤数量、每根光纤的波长数量以及网络的光电路交换部分与电子分组交换部分提供的容量之比是在数据中心规划阶段需要优化的关键设计参数。这些参数与传输控制协议(TCP)的加性增加、乘性减少(AIMD)拥塞控制机制一起对数据中心网络性能产生重大影响。在本文中,我们使用事件驱动模拟研究了光带宽设置和TCP动态的综合影响。我们的分析揭示了整个网络吞吐量对信道容量(即每波长信道的比特率)的强烈依赖,并指出了采用高阶调制格式的光带宽整合的优势。
{"title":"Optical circuit granularity impact in TCP-dominant hybrid data center networks","authors":"H. Rastegarfar, Kamran Keykhosravi, K. Szczerba, E. Agrell, L. LaComb, M. Glick","doi":"10.1109/ICCNC.2017.7876147","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876147","url":null,"abstract":"Hybrid networking, based on electronic packet switching and optical circuit switching, has been proposed to resolve the existing switching bottlenecks in data centers in an energy-efficient and cost-effective fashion. We consider the problem of resource provisioning in hybrid data centers in terms of optical circuit switching capacity and granularity. The number of fibers connected to server racks, the number of wavelengths per fiber, and the ratio of capacity provided by the optical circuit-switched portion of the network to that of the electronic packet-switched portion are crucial design parameters to be optimized during the data center planning phase. These parameters in conjunction with the additive-increase, multiplicative-decrease (AIMD) congestion control mechanism of the Transmission Control Protocol (TCP) pose a significant impact on data center network performance. In this paper, we examine the combined impact of optical bandwidth settings and TCP dynamics using event-driven simulations. Our analysis reveals the strong dependence of overall network throughput on channel capacity (i.e., the bit rate per wavelength channel) and points to the advantages of optical bandwidth consolidation employing higher-order modulation formats.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125348573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Entropy-based network anomaly Detection 基于熵的网络异常检测
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876150
C. Callegari, S. Giordano, M. Pagano
Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to face unknown attacks and new security threats. In this paper we propose a novel intrusion detection system that performs anomaly detection by studying the variation in the entropy associated to the network traffic. To this aim, the traffic is first aggregated by means of random data structures (namely three-dimension reversible sketches) and then the entropy of different traffic descriptors is computed by using several definitions of entropy. The experimental results obtained over the MAWILab dataset validate the system and demonstrate the effectiveness of our proposal.
基于异常的入侵检测由于能够面对未知攻击和新的安全威胁而成为网络安全领域的一个重要研究课题。本文提出了一种新的入侵检测系统,该系统通过研究与网络流量相关的熵的变化来进行异常检测。为此,首先通过随机数据结构(即三维可逆草图)对流量进行聚合,然后利用熵的几种定义计算不同流量描述符的熵。在MAWILab数据集上获得的实验结果验证了系统的有效性。
{"title":"Entropy-based network anomaly Detection","authors":"C. Callegari, S. Giordano, M. Pagano","doi":"10.1109/ICCNC.2017.7876150","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876150","url":null,"abstract":"Anomaly-based Intrusion Detection is a key research topic in network security due to its ability to face unknown attacks and new security threats. In this paper we propose a novel intrusion detection system that performs anomaly detection by studying the variation in the entropy associated to the network traffic. To this aim, the traffic is first aggregated by means of random data structures (namely three-dimension reversible sketches) and then the entropy of different traffic descriptors is computed by using several definitions of entropy. The experimental results obtained over the MAWILab dataset validate the system and demonstrate the effectiveness of our proposal.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Energy-efficient sparse routing protocol for Delay Tolerant Networks 时延容忍网络的节能稀疏路由协议
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876234
Max Hastings, Shuhui Yang
In this paper we demonstrate how limiting the number of copies each message that a node can send out as seen in Spray And Wait can be combined with probabilistic protocols such as Prophet, ProphetV2, and one that we created called Sparse. By limiting the number of copies that each node can send out we allow the routing protocols to scale much better than before when the number of nodes and messages created are increased.
在本文中,我们演示了如何限制节点可以发送的每个消息的副本数量,如Spray And Wait中所见,可以与概率协议(如Prophet, ProphetV2和我们创建的称为Sparse的协议)相结合。通过限制每个节点可以发送的副本数量,当创建的节点和消息数量增加时,我们允许路由协议比以前更好地扩展。
{"title":"Energy-efficient sparse routing protocol for Delay Tolerant Networks","authors":"Max Hastings, Shuhui Yang","doi":"10.1109/ICCNC.2017.7876234","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876234","url":null,"abstract":"In this paper we demonstrate how limiting the number of copies each message that a node can send out as seen in Spray And Wait can be combined with probabilistic protocols such as Prophet, ProphetV2, and one that we created called Sparse. By limiting the number of copies that each node can send out we allow the routing protocols to scale much better than before when the number of nodes and messages created are increased.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Set reconciliation with an inaccurate oracle 设置与不准确的oracle对账
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876279
Mark Bilinski, Ryan Gabrys
In this work, we consider a variant of the set reconciliation problem where the estimate for the size of the symmetric difference may be inaccurate. Given this setup, we propose a new method to reconciling sets of data and we then compare our method to the Invertible Bloom Filter approach proposed by Eppstein et al. [2].
在这项工作中,我们考虑了集合调和问题的一个变体,其中对称差的大小估计可能是不准确的。鉴于这种设置,我们提出了一种新的方法来协调数据集,然后将我们的方法与Eppstein等人提出的可逆布隆过滤器方法进行比较。
{"title":"Set reconciliation with an inaccurate oracle","authors":"Mark Bilinski, Ryan Gabrys","doi":"10.1109/ICCNC.2017.7876279","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876279","url":null,"abstract":"In this work, we consider a variant of the set reconciliation problem where the estimate for the size of the symmetric difference may be inaccurate. Given this setup, we propose a new method to reconciling sets of data and we then compare our method to the Invertible Bloom Filter approach proposed by Eppstein et al. [2].","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132863495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of route partitioning scheme for hitless defragmentation in elastic optical networks 弹性光网络中用于无命中碎片整理的路由分割方案的性能
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876160
Seydou Ba, Bijoy Chand Chatterjee, E. Oki
The route partitioning scheme for hitless defragmentation have been introduced to increase the admissible traffic load in elastic optical networks. It facilitates the defragmentation of the spectrum through spectrum retuning. This paper further investigates the performance of the route partitioning scheme. For the heuristic algorithm, where we seek a maximum cut, we use the Goemans/Williamson relaxation algorithm, which has a 0.878 approximation factor for maximum cut. We implement the parallel retuning to speed up the retuning process, and investigate the effects of the network characteristics on the route partitioning performances. Results show that the approximation algorithm provides the optimal cut for most networks and that the route partitioning scheme with parallel retuning offers up to 9% added traffic load compared to the conventional one.
为增加弹性光网络中的可容许流量负荷,引入了用于无命中碎片整理的路由分割方案。它通过频谱重调整来促进频谱碎片化。本文进一步研究了路由分割方案的性能。在寻求最大切割的启发式算法中,我们使用了 Goemans/Williamson 松弛算法,该算法的最大切割近似系数为 0.878。我们采用并行重调整来加快重调整过程,并研究了网络特性对路由分割性能的影响。结果表明,近似算法为大多数网络提供了最优切割,与传统的路由分割方案相比,采用并行重调整的路由分割方案最多可增加 9% 的流量负载。
{"title":"Performance of route partitioning scheme for hitless defragmentation in elastic optical networks","authors":"Seydou Ba, Bijoy Chand Chatterjee, E. Oki","doi":"10.1109/ICCNC.2017.7876160","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876160","url":null,"abstract":"The route partitioning scheme for hitless defragmentation have been introduced to increase the admissible traffic load in elastic optical networks. It facilitates the defragmentation of the spectrum through spectrum retuning. This paper further investigates the performance of the route partitioning scheme. For the heuristic algorithm, where we seek a maximum cut, we use the Goemans/Williamson relaxation algorithm, which has a 0.878 approximation factor for maximum cut. We implement the parallel retuning to speed up the retuning process, and investigate the effects of the network characteristics on the route partitioning performances. Results show that the approximation algorithm provides the optimal cut for most networks and that the route partitioning scheme with parallel retuning offers up to 9% added traffic load compared to the conventional one.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127696984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PON bandwidth resource sharing schemes in a multi-operator scenario 多运营商场景下的PON带宽资源共享方案
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876161
Chengjun Li, W. Guo, Wei Wang, Weisheng Hu, Ming Xia
Passive optical network (PON) deployment requires significant capital and operational costs for operators to provide high network capacity and significant geographic coverage. Network sharing is desirable for operators to reduce the investment needed to deploy and operate PON networks. In this paper, we introduce a bandwidth resource sharing framework for XG-PONs among multiple operators. In this framework, each transmission convergence (TC) frame with fixed time slots (125us) is regarded as a bandwidth slice. We proposed two slice scheduling schemes for network infrastructure provider to assign slices to different operators. Our proposed scheme meets three key requirements of network virtualization: isolation, customization and efficient resource utilization. We analyze the details of this scheme and provide discrete event simulation results to support the analysis. Results show the efficacy in isolation and resource utilization and the flexibility of running different customized algorithms within slices on the same shared network equipment.
无源光网络(PON)的部署需要大量的资金和运营成本,以提供高容量的网络和显著的地理覆盖。网络共享是运营商减少部署和运营PON网络所需投资的理想选择。本文介绍了一种多运营商间的xg - pon带宽资源共享框架。在该框架中,每个具有固定时隙(125us)的传输收敛(TC)帧被视为一个带宽片。我们提出了两种网络基础设施提供商将分片分配给不同运营商的调度方案。我们提出的方案满足网络虚拟化的三个关键要求:隔离、自定义和有效的资源利用。我们分析了该方案的细节,并提供了离散事件仿真结果来支持分析。结果显示了隔离和资源利用率方面的有效性,以及在同一共享网络设备上的片内运行不同自定义算法的灵活性。
{"title":"PON bandwidth resource sharing schemes in a multi-operator scenario","authors":"Chengjun Li, W. Guo, Wei Wang, Weisheng Hu, Ming Xia","doi":"10.1109/ICCNC.2017.7876161","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876161","url":null,"abstract":"Passive optical network (PON) deployment requires significant capital and operational costs for operators to provide high network capacity and significant geographic coverage. Network sharing is desirable for operators to reduce the investment needed to deploy and operate PON networks. In this paper, we introduce a bandwidth resource sharing framework for XG-PONs among multiple operators. In this framework, each transmission convergence (TC) frame with fixed time slots (125us) is regarded as a bandwidth slice. We proposed two slice scheduling schemes for network infrastructure provider to assign slices to different operators. Our proposed scheme meets three key requirements of network virtualization: isolation, customization and efficient resource utilization. We analyze the details of this scheme and provide discrete event simulation results to support the analysis. Results show the efficacy in isolation and resource utilization and the flexibility of running different customized algorithms within slices on the same shared network equipment.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117032975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Intrinsic Mode Function based energy detector for spectrum sensing in cognitive radio 基于本征模函数的认知无线电频谱感知能量检测器
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876115
Mahdi H. Al-Badrawi, N. Kirsch, Bessam Z. Al-Jewad
In this paper, the filtering characteristics of Empirical Mode Decomposition (EMD) are used to create a blind and adaptive energy detector for single or multi-channel spectrum sensing. EMD is an adaptive tool that decomposes time-series signals into a set of modes called Intrinsic Mode Functions (IMF). Due to the EMD filtering behavior, the first IMF is mostly contaminated by noise from the received noisy signal. The proposed approach takes advantage of Cell Averaging Constant False Alarm Rate (CA-CFAR) as an optimal detector to enhance the probability of detection. Alternative to conventional CA-CFAR (which requires at least one nearby vacant channel for good noise estimation), the first IMF will be used as a training function for noise estimation purposes. Based on the first IMF characteristics in frequency domain, the noise floor of the received signal is estimated and a threshold is derived for a given false alarm rate. Simulations show the improvement of the proposed detector in comparison with other conventional detectors.
本文利用经验模态分解(EMD)的滤波特性,建立了一种单路或多路频谱感知的盲自适应能量检测器。EMD是一种自适应工具,它将时间序列信号分解成一组称为本征模态函数(IMF)的模态。由于EMD滤波的特性,第一个IMF大部分被接收到的噪声信号所污染。该方法利用单元平均恒虚警率(CA-CFAR)作为最优检测器,提高了检测概率。替代传统的CA-CFAR(需要至少一个附近的空信道才能进行良好的噪声估计),第一个IMF将被用作噪声估计目的的训练函数。基于IMF在频域的第一特征,估计接收信号的本底噪声,并对给定的虚警率导出阈值。仿真结果表明,与其他传统探测器相比,该探测器具有较好的性能。
{"title":"An Intrinsic Mode Function based energy detector for spectrum sensing in cognitive radio","authors":"Mahdi H. Al-Badrawi, N. Kirsch, Bessam Z. Al-Jewad","doi":"10.1109/ICCNC.2017.7876115","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876115","url":null,"abstract":"In this paper, the filtering characteristics of Empirical Mode Decomposition (EMD) are used to create a blind and adaptive energy detector for single or multi-channel spectrum sensing. EMD is an adaptive tool that decomposes time-series signals into a set of modes called Intrinsic Mode Functions (IMF). Due to the EMD filtering behavior, the first IMF is mostly contaminated by noise from the received noisy signal. The proposed approach takes advantage of Cell Averaging Constant False Alarm Rate (CA-CFAR) as an optimal detector to enhance the probability of detection. Alternative to conventional CA-CFAR (which requires at least one nearby vacant channel for good noise estimation), the first IMF will be used as a training function for noise estimation purposes. Based on the first IMF characteristics in frequency domain, the noise floor of the received signal is estimated and a threshold is derived for a given false alarm rate. Simulations show the improvement of the proposed detector in comparison with other conventional detectors.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127386083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enabling proactive self-healing by data mining network failure logs 通过数据挖掘网络故障日志实现主动自我修复
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876181
U. Hashmi, Arsalan Darbandi, A. Imran
Self-healing is a key desirable feature in emerging communication networks. While legacy self-healing mechanisms that are reactive in nature can minimize recovery time substantially, the recently conceived extremely low latency and high Quality of Experience (QoE) requirements call for self-healing mechanisms that are pro-active instead of reactive thereby enabling minimal recovery times. A corner stone in enabling proactive self-healing is predictive analytics of historical network failure logs (NFL). In current networks NFL data remains mostly dark, i.e., though they are stored but they are not exploited to their full potential. In this paper, we present a case study that investigates spatio-temporal trends in a large NFL database of a nationwide broadband operator. To discover hidden patterns in the data we leverage five different unsupervised pattern recognition and clustering along with density based outlier detection techniques namely: K-means clustering, Fuzzy C-means clustering, Local Outlier Factor, Local Outlier Probabilities and Kohonen's Self Organizing Maps. Results indicate that self-organizing maps with local outlier probabilities outperform K-means and Fuzzy C-means clustering in terms of sum of squared errors (SSE) and Davis Boulden index (DBI) values. Through an extensive data analysis leveraging a rich combination of the aforementioned techniques, we extract trends that can enable the operator to proactively tackle similar faults in future and improve QoE and recovery times and minimize operational costs, thereby paving the way towards proactive self-healing.
自修复是新兴通信网络的一个关键特性。虽然传统的自愈机制本质上是反应性的,可以极大地减少恢复时间,但最近设想的极低延迟和高体验质量(QoE)需求要求主动的自愈机制,而不是反应性的,从而实现最小的恢复时间。实现主动自我修复的基石是对历史网络故障日志(NFL)的预测分析。在目前的网络中,NFL数据大部分仍然是黑暗的,也就是说,虽然它们被存储,但它们没有被充分利用。在本文中,我们提出了一个案例研究,调查了一个全国性宽带运营商的大型NFL数据库的时空趋势。为了发现数据中的隐藏模式,我们利用五种不同的无监督模式识别和聚类以及基于密度的离群检测技术,即:K-means聚类,模糊C-means聚类,局部离群因子,局部离群概率和Kohonen的自组织图。结果表明,具有局部离群概率的自组织映射在误差平方和(SSE)和Davis Boulden指数(DBI)值方面优于K-means和模糊C-means聚类。通过利用上述技术的丰富组合进行广泛的数据分析,我们提取出趋势,使作业者能够主动解决未来类似的故障,提高QoE和恢复时间,最大限度地降低运营成本,从而为主动自我修复铺平道路。
{"title":"Enabling proactive self-healing by data mining network failure logs","authors":"U. Hashmi, Arsalan Darbandi, A. Imran","doi":"10.1109/ICCNC.2017.7876181","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876181","url":null,"abstract":"Self-healing is a key desirable feature in emerging communication networks. While legacy self-healing mechanisms that are reactive in nature can minimize recovery time substantially, the recently conceived extremely low latency and high Quality of Experience (QoE) requirements call for self-healing mechanisms that are pro-active instead of reactive thereby enabling minimal recovery times. A corner stone in enabling proactive self-healing is predictive analytics of historical network failure logs (NFL). In current networks NFL data remains mostly dark, i.e., though they are stored but they are not exploited to their full potential. In this paper, we present a case study that investigates spatio-temporal trends in a large NFL database of a nationwide broadband operator. To discover hidden patterns in the data we leverage five different unsupervised pattern recognition and clustering along with density based outlier detection techniques namely: K-means clustering, Fuzzy C-means clustering, Local Outlier Factor, Local Outlier Probabilities and Kohonen's Self Organizing Maps. Results indicate that self-organizing maps with local outlier probabilities outperform K-means and Fuzzy C-means clustering in terms of sum of squared errors (SSE) and Davis Boulden index (DBI) values. Through an extensive data analysis leveraging a rich combination of the aforementioned techniques, we extract trends that can enable the operator to proactively tackle similar faults in future and improve QoE and recovery times and minimize operational costs, thereby paving the way towards proactive self-healing.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125241841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Relation discovery of mobile network alarms with sequential pattern mining 基于顺序模式挖掘的移动网络报警关系发现
Pub Date : 1900-01-01 DOI: 10.1109/ICCNC.2017.7876155
Mihaela Lozonavu, Martha Vlachou-Konchylaki, Vincent A. Huang
In telecommunication network systems, there are a large number of interconnected components which also contain many subcomponents. Heavy rain, thunder or other factors can cause mal-function of the components or disconnections between the components which trigger alarms. Because of the interconnection of elements, triggered alarms may propagate to other components. This creates harsh challenges to network operators when it comes to root cause analysis. We address this issue by proposing a method on utilizing network alarms for automatic relation discovery between network nodes. By understanding how network elements or network problems are related to each other, a network operator can easily correlate the alarm events and treat clustered groups of alarms instead of specific events. In this study, we use the temporal and spatial aspects of alarm events to cluster network elements. Our results demonstrate that by analyzing the network alarms, a relationship graph showing the connections between different network elements and network problems can be automatically generated. Such relationship graphs can help network operators mining node dependencies and discovering insights within their network.
在电信网络系统中,存在大量互连的组件,这些组件还包含许多子组件。大雨、打雷或其他因素可能导致组件功能失常或组件之间断开,从而触发警报。由于各部件之间的互连,触发的告警可能会传播到其他部件。这给网络运营商在进行根本原因分析时带来了严峻的挑战。针对这一问题,我们提出了一种利用网络告警自动发现网络节点间关系的方法。通过了解网络元素或网络问题是如何相互关联的,网络操作员可以很容易地将报警事件关联起来,并处理群集的报警组,而不是特定的事件。在本研究中,我们使用报警事件的时间和空间方面来聚类网络元素。我们的研究结果表明,通过分析网络告警,可以自动生成不同网元与网络问题之间联系的关系图。这种关系图可以帮助网络运营商挖掘节点依赖关系,并在网络中发现洞察力。
{"title":"Relation discovery of mobile network alarms with sequential pattern mining","authors":"Mihaela Lozonavu, Martha Vlachou-Konchylaki, Vincent A. Huang","doi":"10.1109/ICCNC.2017.7876155","DOIUrl":"https://doi.org/10.1109/ICCNC.2017.7876155","url":null,"abstract":"In telecommunication network systems, there are a large number of interconnected components which also contain many subcomponents. Heavy rain, thunder or other factors can cause mal-function of the components or disconnections between the components which trigger alarms. Because of the interconnection of elements, triggered alarms may propagate to other components. This creates harsh challenges to network operators when it comes to root cause analysis. We address this issue by proposing a method on utilizing network alarms for automatic relation discovery between network nodes. By understanding how network elements or network problems are related to each other, a network operator can easily correlate the alarm events and treat clustered groups of alarms instead of specific events. In this study, we use the temporal and spatial aspects of alarm events to cluster network elements. Our results demonstrate that by analyzing the network alarms, a relationship graph showing the connections between different network elements and network problems can be automatically generated. Such relationship graphs can help network operators mining node dependencies and discovering insights within their network.","PeriodicalId":135028,"journal":{"name":"2017 International Conference on Computing, Networking and Communications (ICNC)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121813809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2017 International Conference on Computing, Networking and Communications (ICNC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1