首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure MACPABE:基于多权限的CP - ABE,具有高效的属性撤销功能,适用于支持物联网的医疗保健基础设施
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2022-04-15 DOI: 10.1002/nem.2200
Sangjukta Das, S. Namasudra
The Internet of Things (IoT) technology along with cloud computing has gained much attention in recent years for its potential to upgrade conventional healthcare systems. Outsourcing healthcare data to a cloud environment from IoT devices is very essential as IoT devices are lightweight. To maintain confidentiality and to achieve fine‐grained access control, the ciphertext policy attribute‐based encryption (CP‐ABE) technique is utilized very often in an IoT‐based healthcare system for encrypting patients' healthcare data. However, an attribute revocation may affect the other users with the same attribute set, as well as the entire system due to its security concerns. This paper proposes a novel CP‐ABE‐based fine‐grained access control scheme to solve the attribute revocation problem. The proposed technique includes multiple attribute authorities to reduce the work overhead of having a single authority in the traditional CP‐ABE systems. In addition, the proposed scheme outsources the decryption process to a decryption assistant entity to reduce the decryption overhead of the end‐users. To prove the efficiency of the proposed scheme, both formal security analysis and performance comparisons are presented in this paper. Results and discussion prove the effectiveness of the proposed scheme over some well‐known schemes.
近年来,物联网(IoT)技术以及云计算因其升级传统医疗系统的潜力而受到广泛关注。将医疗保健数据从物联网设备外包到云环境是非常必要的,因为物联网设备是轻量级的。为了保持机密性并实现细粒度访问控制,在基于物联网的医疗保健系统中,经常使用基于密文策略属性的加密(CP - ABE)技术来加密患者的医疗保健数据。但是,由于其安全性问题,属性撤销可能会影响具有相同属性集的其他用户以及整个系统。针对属性撤销问题,提出了一种基于CP - ABE的细粒度访问控制方案。提出的技术包括多个属性权限,以减少传统CP - ABE系统中单一权限的工作开销。此外,该方案将解密过程外包给解密辅助实体,以减少最终用户的解密开销。为了证明该方案的有效性,本文给出了形式安全分析和性能比较。结果和讨论证明了该方案比一些已知方案的有效性。
{"title":"MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure","authors":"Sangjukta Das, S. Namasudra","doi":"10.1002/nem.2200","DOIUrl":"https://doi.org/10.1002/nem.2200","url":null,"abstract":"The Internet of Things (IoT) technology along with cloud computing has gained much attention in recent years for its potential to upgrade conventional healthcare systems. Outsourcing healthcare data to a cloud environment from IoT devices is very essential as IoT devices are lightweight. To maintain confidentiality and to achieve fine‐grained access control, the ciphertext policy attribute‐based encryption (CP‐ABE) technique is utilized very often in an IoT‐based healthcare system for encrypting patients' healthcare data. However, an attribute revocation may affect the other users with the same attribute set, as well as the entire system due to its security concerns. This paper proposes a novel CP‐ABE‐based fine‐grained access control scheme to solve the attribute revocation problem. The proposed technique includes multiple attribute authorities to reduce the work overhead of having a single authority in the traditional CP‐ABE systems. In addition, the proposed scheme outsources the decryption process to a decryption assistant entity to reduce the decryption overhead of the end‐users. To prove the efficiency of the proposed scheme, both formal security analysis and performance comparisons are presented in this paper. Results and discussion prove the effectiveness of the proposed scheme over some well‐known schemes.","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 9-10","pages":""},"PeriodicalIF":1.5,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50802311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
MACPABE: Multi-Authority-based CP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure MACPABE:基于多权威机构的CP-ABE,用于物联网医疗基础设施的高效属性撤销
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2022-04-15 DOI: 10.1002/nem.2200
Sangjukta Das, Suyel Namasudra

The Internet of Things (IoT) technology along with cloud computing has gained much attention in recent years for its potential to upgrade conventional healthcare systems. Outsourcing healthcare data to a cloud environment from IoT devices is very essential as IoT devices are lightweight. To maintain confidentiality and to achieve fine-grained access control, the ciphertext policy attribute-based encryption (CP-ABE) technique is utilized very often in an IoT-based healthcare system for encrypting patients' healthcare data. However, an attribute revocation may affect the other users with the same attribute set, as well as the entire system due to its security concerns. This paper proposes a novel CP-ABE-based fine-grained access control scheme to solve the attribute revocation problem. The proposed technique includes multiple attribute authorities to reduce the work overhead of having a single authority in the traditional CP-ABE systems. In addition, the proposed scheme outsources the decryption process to a decryption assistant entity to reduce the decryption overhead of the end-users. To prove the efficiency of the proposed scheme, both formal security analysis and performance comparisons are presented in this paper. Results and discussion prove the effectiveness of the proposed scheme over some well-known schemes.

物联网(IoT)技术和云计算近年来因其升级传统医疗系统的潜力而备受关注。将医疗保健数据从物联网设备外包到云环境是非常重要的,因为物联网设备是轻量级的。为了保持机密性并实现细粒度的访问控制,基于密文策略属性的加密(CP-ABE)技术在基于物联网的医疗保健系统中经常用于加密患者的医疗保健数据。然而,出于安全考虑,属性撤销可能会影响具有相同属性集的其他用户,以及整个系统。针对属性撤销问题,本文提出了一种新的基于CP-ABE的细粒度访问控制方案。所提出的技术包括多个属性权限,以减少传统CP-ABE系统中具有单个权限的工作开销。此外,所提出的方案将解密过程外包给解密辅助实体,以减少最终用户的解密开销。为了证明该方案的有效性,本文进行了形式化安全分析和性能比较。结果和讨论证明了所提方案相对于一些著名方案的有效性。
{"title":"MACPABE: Multi-Authority-based CP-ABE with efficient attribute revocation for IoT-enabled healthcare infrastructure","authors":"Sangjukta Das,&nbsp;Suyel Namasudra","doi":"10.1002/nem.2200","DOIUrl":"https://doi.org/10.1002/nem.2200","url":null,"abstract":"<p>The Internet of Things (IoT) technology along with cloud computing has gained much attention in recent years for its potential to upgrade conventional healthcare systems. Outsourcing healthcare data to a cloud environment from IoT devices is very essential as IoT devices are lightweight. To maintain confidentiality and to achieve fine-grained access control, the ciphertext policy attribute-based encryption (CP-ABE) technique is utilized very often in an IoT-based healthcare system for encrypting patients' healthcare data. However, an attribute revocation may affect the other users with the same attribute set, as well as the entire system due to its security concerns. This paper proposes a novel CP-ABE-based fine-grained access control scheme to solve the attribute revocation problem. The proposed technique includes multiple attribute authorities to reduce the work overhead of having a single authority in the traditional CP-ABE systems. In addition, the proposed scheme outsources the decryption process to a decryption assistant entity to reduce the decryption overhead of the end-users. To prove the efficiency of the proposed scheme, both formal security analysis and performance comparisons are presented in this paper. Results and discussion prove the effectiveness of the proposed scheme over some well-known schemes.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A cost-effective and load-balanced controller placement method in software-defined networks 软件定义网络中一种经济有效且负载均衡的控制器布置方法
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2022-03-17 DOI: 10.1002/nem.2199
Mili Dhar, Bidyut K. Bhattacharyya, Mrinal Kanti Debbarma, Swapan Debbarma

A network incorporates nodes, and each node can communicate with each other through some links. An efficient way to maintain the communication between nodes is to divide a network into several subnetworks, called clusters. We have developed a new clustering algorithm and applied our method for the controller placement in software-defined networks (SDNs). Placing a controller in its appropriate location by balancing the loads and optimizing the latency even in case of a failure scenario becomes a challenging task. Thus, we have proposed a multi-controller placement algorithm that can minimize the average (Sw-Co) latency in such a way that the network switches are fairly distributed over clusters. This distribution helps to balance loads of switches among controllers even in the case of a controller failure scenario. We have also simulated three other existing algorithms for comparison. Experiment results show that our algorithm is a cost-effective solution as compared with other existing algorithms. We have also shown that our proposed method balanced loads of switches between controllers in a SDN network and generates lower average (Sw-Co) latency with and without a controller failure.

网络由节点组成,每个节点可以通过一些链路相互通信。维护节点间通信的一种有效方法是将网络划分为若干个子网络,称为集群。我们开发了一种新的聚类算法,并将我们的方法应用于软件定义网络(sdn)中的控制器放置。即使在出现故障的情况下,通过平衡负载和优化延迟来将控制器放置在适当的位置成为一项具有挑战性的任务。因此,我们提出了一种多控制器放置算法,该算法可以最小化平均(Sw-Co)延迟,从而使网络交换机在集群上公平分布。即使在控制器发生故障的情况下,这种分布也有助于平衡控制器之间的交换机负载。我们还模拟了另外三种现有算法进行比较。实验结果表明,与现有算法相比,该算法具有较高的性价比。我们还表明,我们提出的方法可以平衡SDN网络中控制器之间的交换机负载,并在控制器故障和不故障的情况下产生更低的平均(Sw-Co)延迟。
{"title":"A cost-effective and load-balanced controller placement method in software-defined networks","authors":"Mili Dhar,&nbsp;Bidyut K. Bhattacharyya,&nbsp;Mrinal Kanti Debbarma,&nbsp;Swapan Debbarma","doi":"10.1002/nem.2199","DOIUrl":"10.1002/nem.2199","url":null,"abstract":"<div>\u0000 \u0000 <p>A network incorporates nodes, and each node can communicate with each other through some links. An efficient way to maintain the communication between nodes is to divide a network into several subnetworks, called clusters. We have developed a new clustering algorithm and applied our method for the controller placement in software-defined networks (SDNs). Placing a controller in its appropriate location by balancing the loads and optimizing the latency even in case of a failure scenario becomes a challenging task. Thus, we have proposed a multi-controller placement algorithm that can minimize the average (Sw-Co) latency in such a way that the network switches are fairly distributed over clusters. This distribution helps to balance loads of switches among controllers even in the case of a controller failure scenario. We have also simulated three other existing algorithms for comparison. Experiment results show that our algorithm is a cost-effective solution as compared with other existing algorithms. We have also shown that our proposed method balanced loads of switches between controllers in a SDN network and generates lower average (Sw-Co) latency with and without a controller failure.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41842639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent detection of vulnerable functions in software through neural embedding-based code analysis 通过基于神经嵌入的代码分析,智能检测软件中的脆弱功能
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2022-03-14 DOI: 10.1002/nem.2198
Peng Zeng, Guanjun Lin, Jun Zhang, Ying Zhang

Software vulnerability is a fundamental problem in cybersecurity, which poses severe threats to the secure operation of devices and systems. In this paper, we propose a new vulnerability detection framework of employing advanced neural embedding. For example, CodeBERT is a large-scale pre-trained embedding model for natural language and programming language. It achieves state-of-the-art performance on various natural language processing and code analysis tasks, demonstrating improved generalization ability compared with conventional models. The proposed framework encapsulates CodeBERT as a code representation generator and combines it with transfer learning to conduct cross-project vulnerability detection. Considering the problem of lacking code embedding models on C source code, we extract the knowledge from C source code to fine-tune the pre-trained embedding model, so as to better facilitate the detection of function-level vulnerabilities in C open-source projects. To address the severe data imbalance issue in real-world scenarios, we introduce code argumentation idea and use a large number of synthetic vulnerability data to further improve the robustness of the detection method. Experimental results show that the proposed vulnerability detection framework achieves better performance than existing methods.

软件漏洞是网络安全中的一个根本问题,对设备和系统的安全运行构成严重威胁。在本文中,我们提出了一个新的漏洞检测框架,采用先进的神经嵌入。例如,CodeBERT是一个用于自然语言和编程语言的大规模预训练嵌入模型。它在各种自然语言处理和代码分析任务上实现了最先进的性能,与传统模型相比,它的泛化能力有所提高。所提出的框架将CodeBERT封装为代码表示生成器,并将其与迁移学习相结合,以进行跨项目漏洞检测。考虑到C源代码缺乏代码嵌入模型的问题,我们从C源代码中提取知识,对预先训练的嵌入模型进行微调,以更好地帮助检测C开源项目中的功能级漏洞。为了解决现实场景中严重的数据不平衡问题,我们引入了代码论证思想,并使用大量的合成漏洞数据来进一步提高检测方法的稳健性。实验结果表明,所提出的漏洞检测框架比现有方法具有更好的性能。
{"title":"Intelligent detection of vulnerable functions in software through neural embedding-based code analysis","authors":"Peng Zeng,&nbsp;Guanjun Lin,&nbsp;Jun Zhang,&nbsp;Ying Zhang","doi":"10.1002/nem.2198","DOIUrl":"10.1002/nem.2198","url":null,"abstract":"<div>\u0000 \u0000 <p>Software vulnerability is a fundamental problem in cybersecurity, which poses severe threats to the secure operation of devices and systems. In this paper, we propose a new vulnerability detection framework of employing advanced neural embedding. For example, CodeBERT is a large-scale pre-trained embedding model for natural language and programming language. It achieves state-of-the-art performance on various natural language processing and code analysis tasks, demonstrating improved generalization ability compared with conventional models. The proposed framework encapsulates CodeBERT as a code representation generator and combines it with transfer learning to conduct cross-project vulnerability detection. Considering the problem of lacking code embedding models on C source code, we extract the knowledge from C source code to fine-tune the pre-trained embedding model, so as to better facilitate the detection of function-level vulnerabilities in C open-source projects. To address the severe data imbalance issue in real-world scenarios, we introduce code argumentation idea and use a large number of synthetic vulnerability data to further improve the robustness of the detection method. Experimental results show that the proposed vulnerability detection framework achieves better performance than existing methods.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2022-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46281158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cost-effective and accurate flow statistics collection in OpenFlow-based SDN 基于openflow的SDN高效准确的流量统计数据采集
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2022-02-28 DOI: 10.1002/nem.2197
Binghao Yan, Qinrang Liu, Jianliang Shen, Dong Liang, Xingyu Liu

Network resource scheduling and optimization require the acquisition of status information as a basis. High-cost solutions lead to more resource consumption but only bring negligible benefits. To address this challenge, this paper proposes a novel statistics collection method adapted to OpenFlow-based SDN, which can reduce the measurement cost while ensuring the statistical accuracy. First, based on the complex network theory, we propose multi-path weighted closeness centrality (MWCC) to perform importance ranking on network switching nodes, which helps us select top-k key nodes for statistical collection to reduce the overhead. Second, we propose an adaptive flow rule timeout mechanism AFRT. AFRT continuously optimizes the rule timeout values based on statistical results, further balancing flow table overhead and statistical accuracy. A series of simulation results on real network topologies verify the superiority of the proposed method in terms of communication cost, statistical accuracy, and time consumption, compared with the existing representative methods.

网络资源的调度和优化需要状态信息的获取作为基础。高成本的解决方案会消耗更多的资源,但带来的效益却微不足道。针对这一挑战,本文提出了一种适合于基于openflow的SDN的新型统计采集方法,在保证统计准确性的同时降低了测量成本。首先,基于复杂网络理论,我们提出了多路径加权接近中心性(MWCC)对网络交换节点进行重要度排序,帮助我们选择top-k的关键节点进行统计收集,减少了开销。其次,提出了自适应流规则超时机制AFRT。AFRT根据统计结果不断优化规则超时值,进一步平衡流表开销和统计精度。在实际网络拓扑上的一系列仿真结果验证了该方法在通信成本、统计精度和时间消耗等方面优于现有代表性方法。
{"title":"Cost-effective and accurate flow statistics collection in OpenFlow-based SDN","authors":"Binghao Yan,&nbsp;Qinrang Liu,&nbsp;Jianliang Shen,&nbsp;Dong Liang,&nbsp;Xingyu Liu","doi":"10.1002/nem.2197","DOIUrl":"10.1002/nem.2197","url":null,"abstract":"<div>\u0000 \u0000 <p>Network resource scheduling and optimization require the acquisition of status information as a basis. High-cost solutions lead to more resource consumption but only bring negligible benefits. To address this challenge, this paper proposes a novel statistics collection method adapted to OpenFlow-based SDN, which can reduce the measurement cost while ensuring the statistical accuracy. First, based on the complex network theory, we propose multi-path weighted closeness centrality (MWCC) to perform importance ranking on network switching nodes, which helps us select top-k key nodes for statistical collection to reduce the overhead. Second, we propose an adaptive flow rule timeout mechanism AFRT. AFRT continuously optimizes the rule timeout values based on statistical results, further balancing flow table overhead and statistical accuracy. A series of simulation results on real network topologies verify the superiority of the proposed method in terms of communication cost, statistical accuracy, and time consumption, compared with the existing representative methods.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48361423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation 基于优化辅助深度学习的无线传感器网络双层信任评估入侵检测系统
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2022-02-01 DOI: 10.1002/nem.2196
Ranjeet B. Kagade, Santhosh Jayagopalan

Nowadays, owing to the openness of transmission medium, wireless sensor networks (WSNs) suffer from a variety of attacks, together with DoS attacks, tampering attacks, sinkhole attacks, and so on. Therefore, an effectual system is necessary for recognizing the intrusions in WSN. This paper aims to set up a novel intrusion detection system (IDS) via a deep learning model. Initially, optimal cluster head (CH) is selected among the sensor nodes, from which the sensor nodes that have high energy will be prioritized to act as CH. In this proposed work, the CH selection is evaluated optimally by not only considering the energy parameter, further under the constraints like delay and distance. For optimal selection, a novel approach named as self-improved sea lion optimization (SI-SLnO) model is introduced in this work. As per the proposed strategy, the trust of CH and nodes is evaluated based on a multidimensional two-tier hierarchical trust model by considering content trust, honesty trust, and interactive trust. Finally, the deep learning-based intrusion detection takes place via optimized neural network (NN), where the training is done by the proposed SI-SLnO algorithm via the optimal weight tuning process. At last, the supremacy of the developed approach is examined via evaluation over numerous extant techniques.

目前,由于传输介质的开放性,无线传感器网络受到各种攻击,如DoS攻击、篡改攻击、天坑攻击等。因此,需要一个有效的系统来识别无线传感器网络中的入侵。本文旨在通过深度学习模型建立一种新的入侵检测系统。首先,在传感器节点中选择最优簇头(CH),并优先选择能量较高的传感器节点作为簇头。在本文中,不仅考虑能量参数,而且考虑延迟和距离等约束条件,对簇头的选择进行最优评估。为了进行优化选择,本文提出了一种新的方法——自改进海狮优化模型。根据所提出的策略,基于考虑内容信任、诚实信任和交互信任的多维两层分层信任模型对CH和节点的信任进行评估。最后,通过优化的神经网络(NN)进行基于深度学习的入侵检测,其中的训练由所提出的SI-SLnO算法通过最优权值调整过程完成。最后,通过对众多现有技术的评价来检验所开发方法的优越性。
{"title":"Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation","authors":"Ranjeet B. Kagade,&nbsp;Santhosh Jayagopalan","doi":"10.1002/nem.2196","DOIUrl":"10.1002/nem.2196","url":null,"abstract":"<p>Nowadays, owing to the openness of transmission medium, wireless sensor networks (WSNs) suffer from a variety of attacks, together with DoS attacks, tampering attacks, sinkhole attacks, and so on. Therefore, an effectual system is necessary for recognizing the intrusions in WSN. This paper aims to set up a novel intrusion detection system (IDS) via a deep learning model. Initially, optimal cluster head (CH) is selected among the sensor nodes, from which the sensor nodes that have high energy will be prioritized to act as CH. In this proposed work, the CH selection is evaluated optimally by not only considering the energy parameter, further under the constraints like delay and distance. For optimal selection, a novel approach named as self-improved sea lion optimization (SI-SLnO) model is introduced in this work. As per the proposed strategy, the trust of CH and nodes is evaluated based on a multidimensional two-tier hierarchical trust model by considering content trust, honesty trust, and interactive trust. Finally, the deep learning-based intrusion detection takes place via optimized neural network (NN), where the training is done by the proposed SI-SLnO algorithm via the optimal weight tuning process. At last, the supremacy of the developed approach is examined via evaluation over numerous extant techniques.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49480396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A secure cross-organizational container deployment approach to enable ad hoc collaborations 一种安全的跨组织容器部署方法,支持临时协作
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2021-12-30 DOI: 10.1002/nem.2194
Laurens Van Hoye, Tim Wauters, Filip De Turck, Bruno Volckaert

When organizations need to collaborate urgently, for example, in the case of an emergency situation, it is needed to deploy software components into the different domains in order to allow crucial data to be exchanged. The ad hoc aspect is important as it does not allow the participating organizations to negotiate entire workflows and/or contracts upfront. To enable these ad hoc cross-organizational collaborations, a container orchestration platform, like Kubernetes, can be used to quickly deploy pods of containers in a cross-organizational overlay network, even fully automated. Although this is technically feasible, there may be a trust issue from the perspective of a participating organization when an external organization is capable of deploying any software inside its network domain. This concern is examined and resolved in this article, by proposing an extension to the existing deployment scheme used in vanilla Kubernetes. It allows the participating organizations to assess whether a suggested deployment conforms to the goal of the project and to maintain an overview of all activities related to a single collaboration. This intermediate step prevents an honest organization against potentially malicious behaviour of external entities, either the orchestrator and/or the other organizations, solving the aforementioned trust issue. Evaluation of the implemented prototype shows that a secure collaboration, which requires at most tens of containers, can be attained with sub-second deployment overheads per container, apart from the required manual interventions for trust management purposes.

当组织需要紧急协作时,例如,在紧急情况下,需要将软件组件部署到不同的域中,以便交换关键数据。临时方面很重要,因为它不允许参与组织预先协商整个工作流和/或合同。为了实现这些特别的跨组织协作,可以使用Kubernetes这样的容器编排平台在跨组织的覆盖网络中快速部署容器,甚至是完全自动化的。尽管这在技术上是可行的,但从参与组织的角度来看,当外部组织能够在其网络域内部署任何软件时,可能存在信任问题。本文通过对现有Kubernetes中使用的部署方案进行扩展,研究并解决了这个问题。它允许参与组织评估建议的部署是否符合项目的目标,并维护与单个协作相关的所有活动的概述。这个中间步骤可以防止诚实的组织对抗外部实体(编排者和/或其他组织)的潜在恶意行为,从而解决前面提到的信任问题。对实现的原型的评估表明,除了出于信任管理目的所需的手动干预之外,安全协作(最多需要数十个容器)可以通过每个容器的次秒部署开销获得。
{"title":"A secure cross-organizational container deployment approach to enable ad hoc collaborations","authors":"Laurens Van Hoye,&nbsp;Tim Wauters,&nbsp;Filip De Turck,&nbsp;Bruno Volckaert","doi":"10.1002/nem.2194","DOIUrl":"10.1002/nem.2194","url":null,"abstract":"<div>\u0000 \u0000 <p>When organizations need to collaborate urgently, for example, in the case of an emergency situation, it is needed to deploy software components into the different domains in order to allow crucial data to be exchanged. The ad hoc aspect is important as it does not allow the participating organizations to negotiate entire workflows and/or contracts upfront. To enable these ad hoc cross-organizational collaborations, a container orchestration platform, like Kubernetes, can be used to quickly deploy pods of containers in a cross-organizational overlay network, even fully automated. Although this is technically feasible, there may be a trust issue from the perspective of a participating organization when an external organization is capable of deploying any software inside its network domain. This concern is examined and resolved in this article, by proposing an extension to the existing deployment scheme used in vanilla Kubernetes. It allows the participating organizations to assess whether a suggested deployment conforms to the goal of the project and to maintain an overview of all activities related to a single collaboration. This intermediate step prevents an honest organization against potentially malicious behaviour of external entities, either the orchestrator and/or the other organizations, solving the aforementioned trust issue. Evaluation of the implemented prototype shows that a secure collaboration, which requires at most tens of containers, can be attained with sub-second deployment overheads per container, apart from the required manual interventions for trust management purposes.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2021-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45935536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
amulog: A general log analysis framework for comparison and combination of diverse template generation methods* 一个通用的日志分析框架,用于比较和组合不同的模板生成方法*
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2021-12-19 DOI: 10.1002/nem.2195
Satoru Kobayashi, Yuya Yamashiro, Kazuki Otomo, Kensuke Fukuda

One of the ways to analyze unstructured log messages from large-scale IT systems is to classify log messages with log templates generated by template generation methods. However, there is currently no common knowledge pertained to the comparison and practical use of log template generation methods because they are implemented on the basis of diverse environments. To this end, we design and implement amulog, a general log analysis framework for comparing and combining diverse log template generation methods. Amulog consists of three key functions: (1) parsing log messages into headers and segmented messages, (2) classifying the log messages using a scalable template-matching method, and (3) storing the structured data in a database. This framework helps us easily utilize time-series data corresponding to the log templates for further analysis. We evaluate amulog with a log dataset collected from a nation-wide academic network and demonstrate that it classifies the log data in a reasonable amount of time even with over 100,000 log template candidates. The template-matching method in amulog also reduces 75% processing time for template generation and keeps the accuracy when combined with an existing structure-based template generation method. In order to show the effectiveness of amulog in comparing log template generation methods, we demonstrate that the appropriate template generation methods and accuracy metrics largely depend on the purpose of further analysis by comparing the accuracy of six existing log template generation methods with 10 different accuracy metrics on amulog.

对大型IT系统的非结构化日志消息进行分析的方法之一是使用模板生成方法生成的日志模板对日志消息进行分类。但是,目前还没有关于日志模板生成方法的比较和实际使用的通用知识,因为它们是在不同的环境中实现的。为此,我们设计并实现了一个通用的日志分析框架amulog,用于比较和组合多种日志模板生成方法。Amulog包括三个关键功能:(1)将日志消息解析为头消息和分段消息;(2)使用可扩展的模板匹配方法对日志消息进行分类;(3)将结构化数据存储在数据库中。该框架帮助我们轻松地利用与日志模板相对应的时间序列数据进行进一步分析。我们使用从全国学术网络收集的日志数据集来评估amulog,并证明即使有超过100,000个日志模板候选,它也可以在合理的时间内对日志数据进行分类。amulog中的模板匹配方法将模板生成的处理时间缩短了75%,并与现有的基于结构的模板生成方法结合使用时保持了精度。为了证明amulog在比较日志模板生成方法方面的有效性,我们通过比较amulog上现有的6种日志模板生成方法和10种不同精度指标的精度,证明了合适的模板生成方法和精度指标在很大程度上取决于进一步分析的目的。
{"title":"amulog: A general log analysis framework for comparison and combination of diverse template generation methods*","authors":"Satoru Kobayashi,&nbsp;Yuya Yamashiro,&nbsp;Kazuki Otomo,&nbsp;Kensuke Fukuda","doi":"10.1002/nem.2195","DOIUrl":"10.1002/nem.2195","url":null,"abstract":"<div>\u0000 \u0000 <p>One of the ways to analyze unstructured log messages from large-scale IT systems is to classify log messages with log templates generated by template generation methods. However, there is currently no common knowledge pertained to the comparison and practical use of log template generation methods because they are implemented on the basis of diverse environments. To this end, we design and implement amulog, a general log analysis framework for comparing and combining diverse log template generation methods. Amulog consists of three key functions: (1) parsing log messages into headers and segmented messages, (2) classifying the log messages using a scalable template-matching method, and (3) storing the structured data in a database. This framework helps us easily utilize time-series data corresponding to the log templates for further analysis. We evaluate amulog with a log dataset collected from a nation-wide academic network and demonstrate that it classifies the log data in a reasonable amount of time even with over 100,000 log template candidates. The template-matching method in amulog also reduces 75% processing time for template generation and keeps the accuracy when combined with an existing structure-based template generation method. In order to show the effectiveness of amulog in comparing log template generation methods, we demonstrate that the appropriate template generation methods and accuracy metrics largely depend on the purpose of further analysis by comparing the accuracy of six existing log template generation methods with 10 different accuracy metrics on amulog.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2021-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47971543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard 基于Hyperledger Fabric和Wireguard的隐私保护分布式智能电网系统
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2021-12-03 DOI: 10.1002/nem.2193
Shixiong Yao, Xingjian Tian, Jiageng Chen, Yi Xiong

Smart grid has drawn a lot of attention and investment in recent years, which not only helps the modern generation and distribution of traditional power but also highly widens the application of renewable energy sources. However, the main challenges in the application of smart grid are 1. the privacy preservation of users' information and 2. the trustful transmission channel among peers. In order to solve these problems, VPN and blockchain can be considered since they have some features perfectly suitable for these situations. In this paper, we propose a smart grid system based on WireGuard and Hyperledger Fabric to solve the problems mentioned above. And we also implement the whole system and give a view by web application. What's more, all the functionalities are displayed and tested, including building a smart device simulator, deploying data visualization and making some performance evaluations about transactions and WireGuard communication. Experiment results show that the introduction of WireGuard into network infrastructure does not cause too much loss of bandwidth and delay, but it ensures a certain degree of communication security. And Fabric provides the consistency and traceability of transactions in smart grid system.

智能电网近年来吸引了大量的关注和投资,它不仅有助于传统电力的现代发电和配电,而且极大地拓宽了可再生能源的应用。然而,智能电网应用面临的主要挑战是1。用户信息的隐私保护。对等体之间可靠的传输通道。为了解决这些问题,可以考虑VPN和区块链,因为它们具有完全适合这些情况的一些功能。为了解决上述问题,本文提出了一种基于WireGuard和Hyperledger Fabric的智能电网系统。并通过web应用程序实现了整个系统并给出了视图。此外,所有功能都经过了展示和测试,包括构建智能设备模拟器、部署数据可视化以及对交易和WireGuard通信进行一些性能评估。实验结果表明,在网络基础设施中引入WireGuard不会造成太大的带宽和延迟损失,但它确保了一定程度的通信安全。Fabric提供了智能电网系统中事务的一致性和可追溯性。
{"title":"Privacy Preserving distributed smart grid system based on Hyperledger Fabric and Wireguard","authors":"Shixiong Yao,&nbsp;Xingjian Tian,&nbsp;Jiageng Chen,&nbsp;Yi Xiong","doi":"10.1002/nem.2193","DOIUrl":"10.1002/nem.2193","url":null,"abstract":"<div>\u0000 \u0000 <p>Smart grid has drawn a lot of attention and investment in recent years, which not only helps the modern generation and distribution of traditional power but also highly widens the application of renewable energy sources. However, the main challenges in the application of smart grid are 1. the privacy preservation of users' information and 2. the trustful transmission channel among peers. In order to solve these problems, VPN and blockchain can be considered since they have some features perfectly suitable for these situations. In this paper, we propose a smart grid system based on WireGuard and Hyperledger Fabric to solve the problems mentioned above. And we also implement the whole system and give a view by web application. What's more, all the functionalities are displayed and tested, including building a smart device simulator, deploying data visualization and making some performance evaluations about transactions and WireGuard communication. Experiment results show that the introduction of WireGuard into network infrastructure does not cause too much loss of bandwidth and delay, but it ensures a certain degree of communication security. And Fabric provides the consistency and traceability of transactions in smart grid system.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"33 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47627517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Block diffusion delay attack and its countermeasures in a Bitcoin network 比特币网络中的块扩散延迟攻击及其对策
IF 1.5 4区 计算机科学 Q2 Computer Science Pub Date : 2021-11-02 DOI: 10.1002/nem.2190
Masahiro Sasabe, Masanari Yamamoto, Yuanyu Zhang, Shoji Kasahara

In the Bitcoin system, transactions and their collections (i.e., blocks) are distributed over a peer-to-peer (P2P) network (i.e., Bitcoin network) constructed by participating nodes. Each node maintains a distributed ledger (i.e., blockchain) consisting of retrieved blocks. Therefore, speedy block distribution over the Bitcoin network is essential for all nodes to reach a global consensus on the blockchain. On the other hand, Bitcoin clients are developed as open source software, and thus they can be modified by malicious users. Existing work has pointed out that an attacker can delay the block propagation between neighboring nodes by exploiting the regular timeout mechanism for unexpected slow block transfer caused by temporal network trouble. In this paper, we focus on block diffusion delay attacks, where multiple attackers collude with a specific miner (i.e., a special node that creates new blocks and broadcasts these blocks to the other miners) to disturb the propagation of blocks generated by competing miners. Through simulation experiments, we first reveal that about 30% of honest nodes cannot normally retrieve a block when there are only 1% of the nodes in the system are high-degree adversary nodes in the system. This indicates that the malicious miner colluding with the attackers can intentionally delay the diffusion of the block mined by the competing miner, so as to win the competitive block diffusion even if it loses at the competitive block mining. To alleviate the block diffusion delay attack, we propose two kinds of countermeasures: a proactive approach that is a speedy recovery method from the interruption by adjusting the timeout value and a reactive approach that is a block retrieval node selection method based on the past download rate from each neighbor. Through simulation experiments, we show the countermeasures can effectively alleviate the risk.

在比特币系统中,交易及其集合(即区块)分布在由参与节点构建的点对点(P2P)网络(即比特币网络)上。每个节点维护一个由检索块组成的分布式分类账(即区块链)。因此,比特币网络上的快速区块分配对于所有节点在区块链上达成全球共识至关重要。另一方面,比特币客户端是作为开源软件开发的,因此可以被恶意用户修改。已有研究指出,攻击者可以利用网络暂态故障导致的块传输异常缓慢的规则超时机制,延迟相邻节点之间的块传播。在本文中,我们关注块扩散延迟攻击,其中多个攻击者与特定的矿工(即创建新块并将这些块广播给其他矿工的特殊节点)串通,以干扰竞争矿工生成的块的传播。通过仿真实验,我们首先揭示了当系统中只有1%的节点是高度敌对节点时,大约30%的诚实节点无法正常检索块。这表明恶意矿工与攻击者串通,可以故意延迟竞争矿工挖出的区块扩散,从而即使在竞争区块挖掘中失败,也能赢得竞争区块扩散。为了减轻块扩散延迟攻击,我们提出了两种对策:一种是主动方法,即通过调整超时值从中断中快速恢复的方法;另一种是被动方法,即基于每个邻居过去的下载速率选择块检索节点的方法。通过仿真实验,证明了所提出的对策能够有效地降低风险。
{"title":"Block diffusion delay attack and its countermeasures in a Bitcoin network","authors":"Masahiro Sasabe,&nbsp;Masanari Yamamoto,&nbsp;Yuanyu Zhang,&nbsp;Shoji Kasahara","doi":"10.1002/nem.2190","DOIUrl":"10.1002/nem.2190","url":null,"abstract":"<div>\u0000 \u0000 <p>In the Bitcoin system, transactions and their collections (i.e., blocks) are distributed over a peer-to-peer (P2P) network (i.e., Bitcoin network) constructed by participating nodes. Each node maintains a distributed ledger (i.e., blockchain) consisting of retrieved blocks. Therefore, speedy block distribution over the Bitcoin network is essential for all nodes to reach a global consensus on the blockchain. On the other hand, Bitcoin clients are developed as open source software, and thus they can be modified by malicious users. Existing work has pointed out that an attacker can delay the block propagation between neighboring nodes by exploiting the regular timeout mechanism for unexpected slow block transfer caused by temporal network trouble. In this paper, we focus on block diffusion delay attacks, where multiple attackers collude with a specific miner (i.e., a special node that creates new blocks and broadcasts these blocks to the other miners) to disturb the propagation of blocks generated by competing miners. Through simulation experiments, we first reveal that about 30% of honest nodes cannot normally retrieve a block when there are only 1% of the nodes in the system are high-degree adversary nodes in the system. This indicates that the malicious miner colluding with the attackers can intentionally delay the diffusion of the block mined by the competing miner, so as to win the competitive block diffusion even if it loses at the competitive block mining. To alleviate the block diffusion delay attack, we propose two kinds of countermeasures: a proactive approach that is a speedy recovery method from the interruption by adjusting the timeout value and a reactive approach that is a block retrieval node selection method based on the past download rate from each neighbor. Through simulation experiments, we show the countermeasures can effectively alleviate the risk.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"32 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46194281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1