首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
A2C Reinforcement Learning for Cryptocurrency Trading: Analyzing the Impact of Price Prediction Accuracy and Data Granularity 加密货币交易的A2C强化学习:分析价格预测准确性和数据粒度的影响
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-19 DOI: 10.1002/nem.70024
Changhoon Kang, Jongsoo Woo, James Won-Ki Hong

This paper investigates the application of the Advantage Actor–Critic (A2C) reinforcement learning model in cryptocurrency trading and portfolio management, focusing on the impact of price prediction accuracy and data granularity on model performance. The highly volatile and 24/7 operating cryptocurrency market presents unique challenges that require sophisticated trading strategies. Our study examines how varying levels of noise in price predictions affect the A2C model's ability to manage a diversified portfolio and generate returns, revealing that higher prediction accuracy leads to improved performance. Additionally, we explore the role of data granularity, finding that overly fine-grained data introduce excessive noise that impairs the model's performance, whereas data processed at 6- and 12-h intervals optimize trading efficiency and profitability. These findings show the importance of maintaining sufficient prediction accuracy and selecting appropriate data granularity to enhance the effectiveness of reinforcement learning models in cryptocurrency trading, providing valuable insights for developing robust artificial intelligence (AI)-driven trading strategies in volatile markets.

本文研究了优势参与者-评论家(A2C)强化学习模型在加密货币交易和投资组合管理中的应用,重点研究了价格预测准确性和数据粒度对模型性能的影响。高度波动和全天候运营的加密货币市场提出了独特的挑战,需要复杂的交易策略。我们的研究考察了价格预测中不同程度的噪声如何影响A2C模型管理多元化投资组合和产生回报的能力,揭示了更高的预测准确性导致更好的表现。此外,我们还探讨了数据粒度的作用,发现过于细粒度的数据会引入过多的噪声,从而损害模型的性能,而每隔6和12小时处理的数据会优化交易效率和盈利能力。这些发现表明了保持足够的预测准确性和选择适当的数据粒度以提高强化学习模型在加密货币交易中的有效性的重要性,为在波动的市场中开发强大的人工智能(AI)驱动的交易策略提供了有价值的见解。
{"title":"A2C Reinforcement Learning for Cryptocurrency Trading: Analyzing the Impact of Price Prediction Accuracy and Data Granularity","authors":"Changhoon Kang,&nbsp;Jongsoo Woo,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.70024","DOIUrl":"https://doi.org/10.1002/nem.70024","url":null,"abstract":"<div>\u0000 \u0000 <p>This paper investigates the application of the Advantage Actor–Critic (A2C) reinforcement learning model in cryptocurrency trading and portfolio management, focusing on the impact of price prediction accuracy and data granularity on model performance. The highly volatile and 24/7 operating cryptocurrency market presents unique challenges that require sophisticated trading strategies. Our study examines how varying levels of noise in price predictions affect the A2C model's ability to manage a diversified portfolio and generate returns, revealing that higher prediction accuracy leads to improved performance. Additionally, we explore the role of data granularity, finding that overly fine-grained data introduce excessive noise that impairs the model's performance, whereas data processed at 6- and 12-h intervals optimize trading efficiency and profitability. These findings show the importance of maintaining sufficient prediction accuracy and selecting appropriate data granularity to enhance the effectiveness of reinforcement learning models in cryptocurrency trading, providing valuable insights for developing robust artificial intelligence (AI)-driven trading strategies in volatile markets.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 5","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144869737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Survey of Lightning Network Technology and Research 闪电网络技术与研究综述
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-10 DOI: 10.1002/nem.70023
Changhoon Kang, Jongsoo Woo, James Won-Ki Hong

Bitcoin is the first decentralized digital currency built upon blockchain technology and has facilitated financial innovation and technological advancement. However, the growth in its popularity has uncovered the limitations of the blockchain technology, leading to issues such as transaction congestion, high transaction fees, and delayed confirmations. This has motivated the exploration of the Lightning Network, a payment channel network designed to enhance Bitcoin's scalability and transaction efficiency. Serving as a layer-2 protocol, the Lightning Network supports off-chain transactions, significantly reducing fees and enabling swift and cost-effective micro payments. This paper comprehensively examines the technology, open source implementations, and relevant research of the Bitcoin Lightning Network, covering key categories such as “network analysis,” “network security,” “payment routing,” “rebalancing,” and “network design and applications.” With the Lightning Network's increasing importance in the blockchain and financial domains, this survey provides a valuable resource for researchers seeking to explore this technology in greater depth.

比特币是第一个基于区块链技术的去中心化数字货币,促进了金融创新和技术进步。然而,区块链技术的普及暴露了它的局限性,导致了诸如交易拥塞、高交易费用和延迟确认等问题。这激发了对闪电网络的探索,闪电网络是一个旨在提高比特币可扩展性和交易效率的支付通道网络。作为第二层协议,闪电网络支持链下交易,大大降低了费用,实现了快速且具有成本效益的小额支付。本文全面考察了比特币闪电网络的技术、开源实现和相关研究,涵盖了“网络分析”、“网络安全”、“支付路由”、“再平衡”和“网络设计与应用”等关键类别。随着闪电网络在bb0和金融领域的重要性日益增加,这项调查为寻求更深入探索这项技术的研究人员提供了宝贵的资源。
{"title":"A Comprehensive Survey of Lightning Network Technology and Research","authors":"Changhoon Kang,&nbsp;Jongsoo Woo,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.70023","DOIUrl":"https://doi.org/10.1002/nem.70023","url":null,"abstract":"<div>\u0000 \u0000 <p>Bitcoin is the first decentralized digital currency built upon blockchain technology and has facilitated financial innovation and technological advancement. However, the growth in its popularity has uncovered the limitations of the blockchain technology, leading to issues such as transaction congestion, high transaction fees, and delayed confirmations. This has motivated the exploration of the Lightning Network, a payment channel network designed to enhance Bitcoin's scalability and transaction efficiency. Serving as a layer-2 protocol, the Lightning Network supports off-chain transactions, significantly reducing fees and enabling swift and cost-effective micro payments. This paper comprehensively examines the technology, open source implementations, and relevant research of the Bitcoin Lightning Network, covering key categories such as “network analysis,” “network security,” “payment routing,” “rebalancing,” and “network design and applications.” With the Lightning Network's increasing importance in the blockchain and financial domains, this survey provides a valuable resource for researchers seeking to explore this technology in greater depth.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 5","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144811187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS-Aware Load Balancing in Cloud Computing Based on Chronological Kookaburra Optimization Algorithm 基于时序Kookaburra优化算法的云计算qos感知负载均衡
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-29 DOI: 10.1002/nem.70020
Baskar K, Peter Soosai Anandaraj A, Ramesh P. S., Swedhaa Mathivanan

In cloud computing environments, user requests often lead to varying load conditions across the system, resulting in underloaded, overloaded, or balanced states. Both underloading and overloading can cause system inefficiencies, including increased power consumption, prolonged execution times, and higher machine failure rates. Therefore, effective load balancing (LB) becomes a critical aspect of task scheduling in cloud systems, whether at the level of virtual machines (VMs) or independently. To address these challenges, this paper proposes the Chronological Kookaburra Optimization Algorithm (ChKOA) for efficient LB in cloud computing (CC). The proposed ChKOA is the combination of chronological concept with the Kookaburra Optimization Algorithm (KOA). Initially, tasks are assigned to VMs in a round-robin manner. Based on specific VM parameters, the VMs are classified into overloaded and underloaded categories using deep embedded clustering (DEC). Tasks in overloaded VMs are prioritized and redistributed to underloaded VMs, considering factors such as supply, demand, capacity, predicted load, and key Quality of Service (QoS) metrics, including resource availability and reliability. Load prediction is performed using a Deep Residual Network (DRN). Simulation results demonstrate that the proposed ChKOA achieves a balanced load of 0.535, capacity utilization of 0.954, resource availability of 0.954, reliability of 0.936, and a computational cost of 0.327 s.

在云计算环境中,用户请求通常会导致整个系统的负载条件变化,从而导致负载不足、过载或平衡状态。负载过低和过载都会导致系统效率低下,包括增加功耗、延长执行时间和提高机器故障率。因此,有效的负载均衡(LB)成为云系统中任务调度的一个关键方面,无论是在虚拟机(vm)级别还是独立的级别。为了解决这些挑战,本文提出了时序Kookaburra优化算法(ChKOA),用于云计算(CC)中的高效负载均衡。所提出的ChKOA是时间顺序概念与Kookaburra优化算法(KOA)的结合。初始阶段,任务以循环方式分配给虚拟机。根据虚拟机的具体参数,采用DEC (deep embedded clustering)技术将虚拟机划分为负载过高和负载过低的类别。系统会综合考虑供需、容量、预测负载、资源可用性、可靠性等关键QoS指标,对负载过高的虚拟机进行优先级分配,并将任务重新分配给负载过低的虚拟机。负荷预测采用深度残差网络(DRN)进行。仿真结果表明,该算法的均衡负载为0.535,容量利用率为0.954,资源可用性为0.954,可靠性为0.936,计算成本为0.327 s。
{"title":"QoS-Aware Load Balancing in Cloud Computing Based on Chronological Kookaburra Optimization Algorithm","authors":"Baskar K,&nbsp;Peter Soosai Anandaraj A,&nbsp;Ramesh P. S.,&nbsp;Swedhaa Mathivanan","doi":"10.1002/nem.70020","DOIUrl":"https://doi.org/10.1002/nem.70020","url":null,"abstract":"<div>\u0000 \u0000 <p>In cloud computing environments, user requests often lead to varying load conditions across the system, resulting in underloaded, overloaded, or balanced states. Both underloading and overloading can cause system inefficiencies, including increased power consumption, prolonged execution times, and higher machine failure rates. Therefore, effective load balancing (LB) becomes a critical aspect of task scheduling in cloud systems, whether at the level of virtual machines (VMs) or independently. To address these challenges, this paper proposes the Chronological Kookaburra Optimization Algorithm (ChKOA) for efficient LB in cloud computing (CC). The proposed ChKOA is the combination of chronological concept with the Kookaburra Optimization Algorithm (KOA). Initially, tasks are assigned to VMs in a round-robin manner. Based on specific VM parameters, the VMs are classified into overloaded and underloaded categories using deep embedded clustering (DEC). Tasks in overloaded VMs are prioritized and redistributed to underloaded VMs, considering factors such as supply, demand, capacity, predicted load, and key Quality of Service (QoS) metrics, including resource availability and reliability. Load prediction is performed using a Deep Residual Network (DRN). Simulation results demonstrate that the proposed ChKOA achieves a balanced load of 0.535, capacity utilization of 0.954, resource availability of 0.954, reliability of 0.936, and a computational cost of 0.327 s.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 5","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144725705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing QUIC Performance in Heterogeneous Networks: A Proactive Connection Migration Approach 在异构网络中增强QUIC性能:一种主动连接迁移方法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-22 DOI: 10.1002/nem.70022
Lizhuang Tan, Xin Dong, Xiaochuan Gao, Peiying Zhang, Wei Su, James Won-Ki Hong

The Quick UDP Internet Connections (QUIC) protocol provides a secure, reliable, and low-latency communication foundation for HTTP/3. Connection migration is a key technology of QUIC. When the IP/Port of a connection changes, the connection ID is used to maintain a secure and uninterrupted connection. However, current connection migration is passive, designed to support mobile handover and weak network environments. In this paper, we propose proactive connection migration for QUIC (PCM-QUIC), which combines connection migration and online path selection, enabling QUIC to select the best quality transmission path while maintaining the connection. First, PCM-QUIC integrates the exploration of network quality across different paths into multiple user request actions. Then, considering response completion time and jitter, PCM-QUIC identifies the optimal access path for the current Internet service through online learning. In addition, we propose an upper confidence bound-based path selection algorithm with the goal of minimizing the confidence upper limit of the path reward. Experimental results show that, compared with the original QUIC, PCM-QUIC reduces the average response completion time by up to 59.43%.

QUIC (Quick UDP Internet Connections)协议为HTTP/3提供了安全、可靠、低时延的通信基础。连接迁移是QUIC的一项关键技术。当连接的IP/端口发生变化时,使用连接ID保持连接的安全性和不间断性。然而,目前的连接迁移是被动的,旨在支持移动切换和弱网络环境。本文提出了面向QUIC的主动连接迁移(PCM-QUIC),它将连接迁移与在线路径选择相结合,使QUIC能够在保持连接的同时选择最优质的传输路径。首先,PCM-QUIC将跨不同路径的网络质量探索集成到多个用户请求操作中。然后,考虑响应完成时间和抖动,PCM-QUIC通过在线学习识别当前互联网服务的最优访问路径。此外,我们提出了一种基于上置信度边界的路径选择算法,以最小化路径奖励的置信度上限为目标。实验结果表明,与原QUIC相比,PCM-QUIC的平均响应完成时间缩短了59.43%。
{"title":"Enhancing QUIC Performance in Heterogeneous Networks: A Proactive Connection Migration Approach","authors":"Lizhuang Tan,&nbsp;Xin Dong,&nbsp;Xiaochuan Gao,&nbsp;Peiying Zhang,&nbsp;Wei Su,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.70022","DOIUrl":"https://doi.org/10.1002/nem.70022","url":null,"abstract":"<div>\u0000 \u0000 <p>The Quick UDP Internet Connections (QUIC) protocol provides a secure, reliable, and low-latency communication foundation for HTTP/3. Connection migration is a key technology of QUIC. When the IP/Port of a connection changes, the connection ID is used to maintain a secure and uninterrupted connection. However, current connection migration is passive, designed to support mobile handover and weak network environments. In this paper, we propose proactive connection migration for QUIC (PCM-QUIC), which combines connection migration and online path selection, enabling QUIC to select the best quality transmission path while maintaining the connection. First, PCM-QUIC integrates the exploration of network quality across different paths into multiple user request actions. Then, considering response completion time and jitter, PCM-QUIC identifies the optimal access path for the current Internet service through online learning. In addition, we propose an upper confidence bound-based path selection algorithm with the goal of minimizing the confidence upper limit of the path reward. Experimental results show that, compared with the original QUIC, PCM-QUIC reduces the average response completion time by up to 59.43%.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 5","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144681053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial for the Special Issue on Research Trends in Network Operations and Management With Selected Papers From the 42nd Brazilian Symposium on Computer Networks and Distributed Systems 第42届巴西计算机网络和分布式系统研讨会论文集《网络运营和管理研究趋势》特刊社论
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-08 DOI: 10.1002/nem.70021
Célio Albuquerque, Magnos Martinello
<p>The Brazilian Symposium on Computer Network and Distributed Systems (SBRC) is an annual event held by the Brazilian Computer Society (SBC) and the Computer Network Laboratory (LARC). Over the course of more than four decades, SBRC has established itself as the most important Brazilian scientific event in computer networks and distributed systems, reaching international coverage with the presence of researchers, technicians and scientists from Latin America and the world. The 42nd edition of the symposium was held from May 20–24, 2024 in the city of Niterói, at the Fluminense Federal University.</p><p>In the first contribution, entitled “MTS-PolKA: Weighted Multipath Traffic Splitting With Source Routing for Elephant and Mice Flows,” dos Santos et al. present MTS-PolKA, a novel traffic engineering mechanism for datacenter networks that enhances packet-level traffic splitting across multiple paths. Unlike traditional methods like ECMP and WCMP, MTS-PolKA dynamically adjusts traffic division using source-routing labels embedded in packet headers—without requiring reconfiguration of network switches. Implemented in P4 and leveraging the Residue Number System (RNS), MTS-PolKA demonstrates improved flow stability, agility, and efficient multipath utilization through experiments in Mininet.</p><p>In the second paper, entitled “Performance and Resilience Impact of Microservice Granularity: An Empirical Evaluation using Service Weaver and Amazon EKS,” Medeiros Rêgo et al. study how service granularity affects performance and resilience in cloud-based microservice applications. Using the Service Weaver framework and deploying the Online Boutique app on Amazon EKS, the study reveals that finer granularity improves scalability but increases communication overhead, while cloud-native resilience features mitigate failures at the cost of performance, especially in tightly coupled configurations. Our findings emphasize the need to strike a careful balance between service granularity, performance, and resilience to build robust and efficient cloud-based microservice applications.</p><p>In the third contribution, entitled “Beyond Size: Investigating the Impact of Scaled-Down Network Telescopes on Threat Detection,” Camargo et al. examine how reducing IPv4 address space affects the effectiveness of network telescopes used in cyber threat intelligence. As IPv4 becomes scarcer, organizations face pressure to repurpose addresses, potentially weakening threat detection. By analyzing two telescopes, the research shows that even with a 50% reduction in space, it is still possible to detect around 80% of unique attack sources, and that address allocation patterns have minimal impact on detection accuracy.</p><p>In the fourth contribution, entitled “An Adaptive Routing Architecture for IoT Multipath Video Transmission,” Bhering et al. present a dynamic wireless multipath routing architecture designed to improve video application performance in multihop IoT networks. By
巴西计算机网络和分布式系统研讨会(SBRC)是由巴西计算机协会(SBC)和计算机网络实验室(LARC)举办的年度活动。在四十多年的历程中,SBRC已经成为巴西计算机网络和分布式系统领域最重要的科学盛会,来自拉丁美洲和世界各地的研究人员、技术人员和科学家参加了SBRC。第42届研讨会于2024年5月20日至24日在弗鲁米嫩塞联邦大学Niterói市举行。在第一篇题为“MTS-PolKA:大象和老鼠流的源路由加权多路径流量分割”的论文中,dos Santos等人提出了MTS-PolKA,这是一种用于数据中心网络的新型流量工程机制,可以增强跨多条路径的数据包级流量分割。与ECMP和WCMP等传统方法不同,MTS-PolKA使用嵌入在包头中的源路由标签动态调整流量划分,而不需要重新配置网络交换机。MTS-PolKA在P4中实现并利用剩余数系统(RNS),通过Mininet中的实验证明了改进的流稳定性、敏捷性和高效的多路径利用。在第二篇题为“微服务粒度对性能和弹性的影响:使用Service Weaver和Amazon EKS的经验评估”的论文中,Medeiros Rêgo等人研究了服务粒度如何影响基于云的微服务应用程序的性能和弹性。使用Service Weaver框架并在Amazon EKS上部署Online Boutique应用程序,研究表明,更细的粒度提高了可伸缩性,但增加了通信开销,而云原生弹性特性以性能为代价减轻了故障,特别是在紧密耦合配置中。我们的研究结果强调,需要在服务粒度、性能和弹性之间取得谨慎的平衡,以构建健壮而高效的基于云的微服务应用程序。在第三篇题为“超越规模:调查按比例缩小的网络望远镜对威胁检测的影响”的论文中,Camargo等人研究了减少IPv4地址空间如何影响网络威胁情报中使用的网络望远镜的有效性。随着IPv4变得越来越稀缺,组织面临着重新利用地址的压力,这可能会削弱威胁检测。通过分析两个望远镜,研究表明,即使空间减少50%,仍然有可能检测到大约80%的独特攻击源,并且地址分配模式对检测精度的影响最小。在第四篇题为“物联网多径视频传输的自适应路由架构”的论文中,hering等人提出了一种动态无线多径路由架构,旨在提高多跳物联网网络中的视频应用性能。该方法通过适应网络拓扑和视频流量特性的变化,提高了终端用户的体验质量。本文还概述了物联网中的无线视频应用,并对当前多路径路由选择机制进行了分类。在第五篇题为“QuantumNetSec:用于网络安全的量子机器学习”的论文中,Abreu等人介绍了一种结合量子和经典计算技术的新型入侵检测系统(IDS)。QuantumNetSec采用量子机器学习(QML)个性化方法来分析网络模式并检测恶意活动。该论文强调了量子增强网络安全解决方案的巨大潜力,展示了QuantumNetSec准确检测各种网络威胁的能力,为量子实用时代更具弹性和更有效的入侵检测系统铺平了道路。特邀编辑感谢《国际网络管理杂志》(IJNM)主编给我们组织本期特刊的机会,也感谢匿名审稿人在审稿过程中提供的宝贵帮助。最后,我们希望所有感兴趣的读者都喜欢阅读所选的论文,并发现它们对自己的研究有用。作者声明无利益冲突。
{"title":"Editorial for the Special Issue on Research Trends in Network Operations and Management With Selected Papers From the 42nd Brazilian Symposium on Computer Networks and Distributed Systems","authors":"Célio Albuquerque,&nbsp;Magnos Martinello","doi":"10.1002/nem.70021","DOIUrl":"https://doi.org/10.1002/nem.70021","url":null,"abstract":"&lt;p&gt;The Brazilian Symposium on Computer Network and Distributed Systems (SBRC) is an annual event held by the Brazilian Computer Society (SBC) and the Computer Network Laboratory (LARC). Over the course of more than four decades, SBRC has established itself as the most important Brazilian scientific event in computer networks and distributed systems, reaching international coverage with the presence of researchers, technicians and scientists from Latin America and the world. The 42nd edition of the symposium was held from May 20–24, 2024 in the city of Niterói, at the Fluminense Federal University.&lt;/p&gt;&lt;p&gt;In the first contribution, entitled “MTS-PolKA: Weighted Multipath Traffic Splitting With Source Routing for Elephant and Mice Flows,” dos Santos et al. present MTS-PolKA, a novel traffic engineering mechanism for datacenter networks that enhances packet-level traffic splitting across multiple paths. Unlike traditional methods like ECMP and WCMP, MTS-PolKA dynamically adjusts traffic division using source-routing labels embedded in packet headers—without requiring reconfiguration of network switches. Implemented in P4 and leveraging the Residue Number System (RNS), MTS-PolKA demonstrates improved flow stability, agility, and efficient multipath utilization through experiments in Mininet.&lt;/p&gt;&lt;p&gt;In the second paper, entitled “Performance and Resilience Impact of Microservice Granularity: An Empirical Evaluation using Service Weaver and Amazon EKS,” Medeiros Rêgo et al. study how service granularity affects performance and resilience in cloud-based microservice applications. Using the Service Weaver framework and deploying the Online Boutique app on Amazon EKS, the study reveals that finer granularity improves scalability but increases communication overhead, while cloud-native resilience features mitigate failures at the cost of performance, especially in tightly coupled configurations. Our findings emphasize the need to strike a careful balance between service granularity, performance, and resilience to build robust and efficient cloud-based microservice applications.&lt;/p&gt;&lt;p&gt;In the third contribution, entitled “Beyond Size: Investigating the Impact of Scaled-Down Network Telescopes on Threat Detection,” Camargo et al. examine how reducing IPv4 address space affects the effectiveness of network telescopes used in cyber threat intelligence. As IPv4 becomes scarcer, organizations face pressure to repurpose addresses, potentially weakening threat detection. By analyzing two telescopes, the research shows that even with a 50% reduction in space, it is still possible to detect around 80% of unique attack sources, and that address allocation patterns have minimal impact on detection accuracy.&lt;/p&gt;&lt;p&gt;In the fourth contribution, entitled “An Adaptive Routing Architecture for IoT Multipath Video Transmission,” Bhering et al. present a dynamic wireless multipath routing architecture designed to improve video application performance in multihop IoT networks. By ","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144582178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance and Resilience Impact of Microservice Granularity: An Empirical Evaluation Using Service Weaver and Amazon EKS 微服务粒度对性能和弹性的影响:使用Service Weaver和Amazon EKS的实证评估
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-24 DOI: 10.1002/nem.70019
Camila Medeiros Rêgo, Ricardo César Mendonça Filho, Nabor C. Mendonça

Determining the optimal granularity level for microservices applications is a critical challenge in modern software architecture. This study leverages the Service Weaver framework to investigate the performance and resilience implications of different service granularity configurations in a public cloud environment. We deployed multiple configurations of the Online Boutique microservice demo application on Amazon Elastic Kubernetes Service (EKS) and conducted a series of experiments to evaluate their behavior under varying workloads and failure conditions. Our results indicate that distributing services across multiple EKS nodes can significantly enhance scalability, particularly under high workloads, but at the cost of increased communication overhead. We also found that while cloud-native resilience mechanisms, such as automatic re-starts and retries, effectively mitigate frequent random failures, they tend to impose a notable performance overhead, especially in configurations with tightly coupled services. Our findings highlight the importance of carefully balancing service granularity with both performance and resilience considerations when designing robust cloud-based microservice applications.

确定微服务应用程序的最佳粒度级别是现代软件体系结构中的一个关键挑战。本研究利用Service Weaver框架来研究公共云环境中不同服务粒度配置对性能和弹性的影响。我们在Amazon Elastic Kubernetes Service (EKS)上部署了Online Boutique微服务演示应用程序的多个配置,并进行了一系列实验,以评估它们在不同工作负载和故障条件下的行为。我们的结果表明,跨多个EKS节点分布服务可以显著增强可伸缩性,特别是在高工作负载下,但代价是增加通信开销。我们还发现,虽然云原生弹性机制(如自动重新启动和重试)可以有效地减轻频繁的随机故障,但它们往往会带来显著的性能开销,特别是在紧密耦合服务的配置中。我们的研究结果强调了在设计健壮的基于云的微服务应用程序时,仔细平衡服务粒度与性能和弹性的重要性。
{"title":"Performance and Resilience Impact of Microservice Granularity: An Empirical Evaluation Using Service Weaver and Amazon EKS","authors":"Camila Medeiros Rêgo,&nbsp;Ricardo César Mendonça Filho,&nbsp;Nabor C. Mendonça","doi":"10.1002/nem.70019","DOIUrl":"https://doi.org/10.1002/nem.70019","url":null,"abstract":"<p>Determining the optimal granularity level for microservices applications is a critical challenge in modern software architecture. This study leverages the Service Weaver framework to investigate the performance and resilience implications of different service granularity configurations in a public cloud environment. We deployed multiple configurations of the Online Boutique microservice demo application on Amazon Elastic Kubernetes Service (EKS) and conducted a series of experiments to evaluate their behavior under varying workloads and failure conditions. Our results indicate that distributing services across multiple EKS nodes can significantly enhance scalability, particularly under high workloads, but at the cost of increased communication overhead. We also found that while cloud-native resilience mechanisms, such as automatic re-starts and retries, effectively mitigate frequent random failures, they tend to impose a notable performance overhead, especially in configurations with tightly coupled services. Our findings highlight the importance of carefully balancing service granularity with both performance and resilience considerations when designing robust cloud-based microservice applications.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144473050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QuantumNetSec: Quantum Machine Learning for Network Security QuantumNetSec:网络安全的量子机器学习
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1002/nem.70018
Diego Abreu, David Moura, Christian Esteve Rothenberg, Antônio Abelém

As the digital landscape becomes increasingly complex, traditional cybersecurity measures are struggling to keep pace with the growing sophistication of cyber threats. This escalating challenge calls for new, more robust solutions. In this context, quantum computing emerges as a powerful tool that can change our approach to network security. Our research addresses this by introducing QuantumNetSec, a novel intrusion detection system (IDS) that combines quantum and classical computing techniques. QuantumNetSec employs quantum machine learning (QML) personalized methodologies to analyze network patterns and detect malicious activities. Through detailed experimentation with publicly shared datasets, QuantumNetSec demonstrated superior performance in both binary and multiclass classification tasks. Our findings highlight the significant potential of quantum-enhanced cybersecurity solutions, showcasing QuantumNetSec's ability to accurately detect a wide range of cyber threats, paving the way for more resilient and effective IDSs in the age of quantum utility.

随着数字环境变得越来越复杂,传统的网络安全措施正在努力跟上日益复杂的网络威胁的步伐。这一不断升级的挑战需要新的、更强大的解决方案。在这种背景下,量子计算作为一种强大的工具出现,可以改变我们的网络安全方法。我们的研究通过引入量子网络安全来解决这个问题,量子网络安全是一种结合量子和经典计算技术的新型入侵检测系统(IDS)。QuantumNetSec采用量子机器学习(QML)个性化方法来分析网络模式并检测恶意活动。通过对公开共享数据集的详细实验,QuantumNetSec在二元和多类分类任务中都表现出了卓越的性能。我们的研究结果强调了量子增强网络安全解决方案的巨大潜力,展示了QuantumNetSec准确检测各种网络威胁的能力,为量子实用时代更具弹性和更有效的入侵防御系统铺平了道路。
{"title":"QuantumNetSec: Quantum Machine Learning for Network Security","authors":"Diego Abreu,&nbsp;David Moura,&nbsp;Christian Esteve Rothenberg,&nbsp;Antônio Abelém","doi":"10.1002/nem.70018","DOIUrl":"https://doi.org/10.1002/nem.70018","url":null,"abstract":"<p>As the digital landscape becomes increasingly complex, traditional cybersecurity measures are struggling to keep pace with the growing sophistication of cyber threats. This escalating challenge calls for new, more robust solutions. In this context, quantum computing emerges as a powerful tool that can change our approach to network security. Our research addresses this by introducing QuantumNetSec, a novel intrusion detection system (IDS) that combines quantum and classical computing techniques. QuantumNetSec employs quantum machine learning (QML) personalized methodologies to analyze network patterns and detect malicious activities. Through detailed experimentation with publicly shared datasets, QuantumNetSec demonstrated superior performance in both binary and multiclass classification tasks. Our findings highlight the significant potential of quantum-enhanced cybersecurity solutions, showcasing QuantumNetSec's ability to accurately detect a wide range of cyber threats, paving the way for more resilient and effective IDSs in the age of quantum utility.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 4","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144190844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Engineering Optimization in Hybrid Software-Defined Networks: A Mixed Integer Non-Linear Programming Model and Heuristic Algorithm 混合软件定义网络中的流量工程优化:一个混合整数非线性规划模型和启发式算法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-28 DOI: 10.1002/nem.70017
Samiullah Mehraban, Rajesh K. Yadav

In contemporary networking infrastructure, the integration of software-defined networking (SDN) concepts with traditional networking methodologies has given rise to hybrid software-defined networking (HSDN); as the current network infrastructure evolves, it combines the programmability of SDN with the established protocols of traditional network infrastructure. This paradigm shift introduces novel opportunities and challenges in traffic engineering (TE), necessitating innovative solutions to enhance network performance, resource utilization, and efficiency. In this study, we examined the challenges associated with TE in a hybrid SDN environment, where traditional network devices coexist alongside SDN nodes; we investigated the routing optimization of traffic engineering in a migrated hybrid network and formulated the problem as a mixed integer non-linear programming model. We proposed a heuristic algorithm (H-STE) that optimizes both the OSPF weight setting and the splitting ratio of SDN nodes in the hybrid environment. Extensive evaluations were conducted using real network topologies to validate our method. The results demonstrate that a 30% deployment ratio of SDN nodes significantly improves traffic engineering performance. Specifically, the Maximum Link Utilization (MLU) stabilizes at this ratio, indicating near-optimal network efficiency. This research provides valuable insights for researchers, practitioners, and network architects navigating SDN, hybrid SDN, and traffic engineering optimization.

在当代网络基础设施中,软件定义网络(SDN)概念与传统网络方法的融合产生了混合软件定义网络(HSDN);随着当前网络基础设施的发展,它将SDN的可编程性与传统网络基础设施的既定协议相结合。这种模式的转变为流量工程(TE)带来了新的机遇和挑战,需要创新的解决方案来提高网络性能、资源利用率和效率。在本研究中,我们研究了混合SDN环境中与TE相关的挑战,其中传统网络设备与SDN节点共存;研究了迁移混合网络中交通工程的路由优化问题,并将其表述为一个混合整数非线性规划模型。提出了一种启发式算法(H-STE)来优化混合环境下OSPF的权值设置和SDN节点的分割率。使用真实的网络拓扑进行了广泛的评估,以验证我们的方法。结果表明,30%的SDN节点部署比例显著提高了流量工程性能。具体来说,最大链路利用率(MLU)稳定在这个比率,表明接近最佳的网络效率。这项研究为研究人员、从业者和网络架构师导航SDN、混合SDN和流量工程优化提供了有价值的见解。
{"title":"Traffic Engineering Optimization in Hybrid Software-Defined Networks: A Mixed Integer Non-Linear Programming Model and Heuristic Algorithm","authors":"Samiullah Mehraban,&nbsp;Rajesh K. Yadav","doi":"10.1002/nem.70017","DOIUrl":"https://doi.org/10.1002/nem.70017","url":null,"abstract":"<div>\u0000 \u0000 <p>In contemporary networking infrastructure, the integration of software-defined networking (SDN) concepts with traditional networking methodologies has given rise to hybrid software-defined networking (HSDN); as the current network infrastructure evolves, it combines the programmability of SDN with the established protocols of traditional network infrastructure. This paradigm shift introduces novel opportunities and challenges in traffic engineering (TE), necessitating innovative solutions to enhance network performance, resource utilization, and efficiency. In this study, we examined the challenges associated with TE in a hybrid SDN environment, where traditional network devices coexist alongside SDN nodes; we investigated the routing optimization of traffic engineering in a migrated hybrid network and formulated the problem as a mixed integer non-linear programming model. We proposed a heuristic algorithm (H-STE) that optimizes both the OSPF weight setting and the splitting ratio of SDN nodes in the hybrid environment. Extensive evaluations were conducted using real network topologies to validate our method. The results demonstrate that a 30% deployment ratio of SDN nodes significantly improves traffic engineering performance. Specifically, the Maximum Link Utilization (MLU) stabilizes at this ratio, indicating near-optimal network efficiency. This research provides valuable insights for researchers, practitioners, and network architects navigating SDN, hybrid SDN, and traffic engineering optimization.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143883799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MTS-PolKA: Weighted Multipath Traffic Splitting With Source Routing for Elephant and Mice Flows MTS-PolKA:针对大象和小鼠流量的带源路由的加权多路径流量分流技术
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-16 DOI: 10.1002/nem.70016
Giancarlo O. dos Santos, Cristina K. Dominicini, Gilmar L. Vassoler, Rafael S. Guimarães, Isis Oliveira, Domingos Jose P. Paraiso, Rodolfo S. Villaça

Modern datacenter networks rely on multi-root tree topologies, to ensure efficient and reliable connectivity. However, traditional traffic engineering solutions like equal cost multiple path (ECMP) and weighted-cost multipath (WCMP) often fall short in addressing dynamic and heterogeneous traffic conditions. Specifically, these approaches struggle with asymmetric topologies and the allocation of elephant flows, which require more granular and agile traffic management. This paper introduces MTS-PolKA (Multipath Traffic Split Polynomial Key-based Architecture), a novel traffic splitting mechanism designed to enhance traffic engineering in datacenter networks. MTS-PolKA enables packet-level traffic distribution across multiple paths by embedding a source routing label in the packet header that dictates the per-flow traffic division profile. Unlike existing methods that require reconfiguring network tables at each switch, MTS-PolKA enables dynamic adjustments across all switches in the path through simple packet header modifications, significantly enhancing the agility and efficiency of traffic management. The implementation of MTS-PolKA on programmable switches using the P4 language, along with the residue number system (RNS) and M-PolKA architecture, showcases its potential through experiments conducted in the Mininet emulator. The results highlight the ability of MTS-PolKA to maintain flow stability, explore network multipaths, and enable rapid reconfigurations of traffic division profiles, enhancing the performance and efficiency of modern datacenter networks.

现代数据中心网络依赖于多根树拓扑结构,以确保高效可靠的连接。然而,传统的等代价多路径(ECMP)和加权代价多路径(WCMP)等交通工程解决方案在处理动态和异构交通条件时往往存在不足。具体来说,这些方法与不对称拓扑和大象流的分配作斗争,这需要更细粒度和敏捷的流量管理。本文介绍了MTS-PolKA (multi - path Traffic Split Polynomial keybased Architecture),这是一种新的流量分割机制,旨在增强数据中心网络中的流量工程。MTS-PolKA通过在包头中嵌入指定每流流量划分配置文件的源路由标签,支持跨多条路径的包级流量分配。与现有的需要在每个交换机上重新配置网络表的方法不同,MTS-PolKA通过简单的包头修改,可以在路径中的所有交换机上进行动态调整,大大提高了流量管理的灵活性和效率。使用P4语言在可编程交换机上实现MTS-PolKA,以及剩余数系统(RNS)和M-PolKA架构,通过在Mininet仿真器中进行的实验展示了其潜力。结果表明MTS-PolKA能够保持流量稳定性,探索网络多路径,实现流量划分配置文件的快速重新配置,提高现代数据中心网络的性能和效率。
{"title":"MTS-PolKA: Weighted Multipath Traffic Splitting With Source Routing for Elephant and Mice Flows","authors":"Giancarlo O. dos Santos,&nbsp;Cristina K. Dominicini,&nbsp;Gilmar L. Vassoler,&nbsp;Rafael S. Guimarães,&nbsp;Isis Oliveira,&nbsp;Domingos Jose P. Paraiso,&nbsp;Rodolfo S. Villaça","doi":"10.1002/nem.70016","DOIUrl":"https://doi.org/10.1002/nem.70016","url":null,"abstract":"<p>Modern datacenter networks rely on multi-root tree topologies, to ensure efficient and reliable connectivity. However, traditional traffic engineering solutions like equal cost multiple path (ECMP) and weighted-cost multipath (WCMP) often fall short in addressing dynamic and heterogeneous traffic conditions. Specifically, these approaches struggle with asymmetric topologies and the allocation of elephant flows, which require more granular and agile traffic management. This paper introduces MTS-PolKA (<i>Multipath Traffic Split Polynomial Key-based Architecture</i>), a novel traffic splitting mechanism designed to enhance traffic engineering in datacenter networks. MTS-PolKA enables packet-level traffic distribution across multiple paths by embedding a source routing label in the packet header that dictates the per-flow traffic division profile. Unlike existing methods that require reconfiguring network tables at each switch, MTS-PolKA enables dynamic adjustments across all switches in the path through simple packet header modifications, significantly enhancing the agility and efficiency of traffic management. The implementation of MTS-PolKA on programmable switches using the P4 language, along with the residue number system (RNS) and M-PolKA architecture, showcases its potential through experiments conducted in the Mininet emulator. The results highlight the ability of MTS-PolKA to maintain flow stability, explore network multipaths, and enable rapid reconfigurations of traffic division profiles, enhancing the performance and efficiency of modern datacenter networks.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143840790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of a Trust Mechanism to Enhance Security Protection in SDN-Based IoT Network 基于sdn的物联网网络信任机制的设计与开发
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-09 DOI: 10.1002/nem.70015
Pang-Wei Tsai, Chao-Wei Lee, Ting-Wen Wang

A reliable and trustworthy network is essential for ensuring efficient data transmission, particularly because the widespread adoption of the Internet of Things (IoT) requires management of a large and diverse set of smart devices. In addition, privacy and security concerns in IoT systems, such as access authentication, authorization, and accounting, have become increasingly important. Software-defined networking (SDN) offers a flexible and adaptive approach to network management and is a promising solution for addressing these challenges. Hence, this paper proposes a security mechanism that leverages the operational behaviors and characteristics of IoT devices to analyze their traffic flows using an SDN controller, thereby enhancing the overall security of IoT networks. The proposed architecture integrates a two-factor authentication process to prevent unauthorized access while utilizing SDN-based traffic monitoring to enforce fine-grained access control. Experimental results show that the implemented solution assists the SDN controller in detecting abnormal behaviors and triggering mitigation measures, thereby minimizing disruptions to normal traffic flows in testing scenarios.

可靠和值得信赖的网络对于确保高效的数据传输至关重要,特别是因为物联网(IoT)的广泛采用需要管理大量不同的智能设备。此外,物联网系统中的隐私和安全问题,如访问认证、授权和会计,变得越来越重要。软件定义网络(SDN)为网络管理提供了一种灵活和自适应的方法,是解决这些挑战的一种很有前途的解决方案。因此,本文提出了一种安全机制,利用物联网设备的运行行为和特性,利用SDN控制器分析物联网设备的流量流,从而提高物联网网络的整体安全性。所提出的体系结构集成了一个双因素身份验证过程,以防止未经授权的访问,同时利用基于sdn的流量监控来实施细粒度的访问控制。实验结果表明,实现的解决方案有助于SDN控制器检测异常行为并触发缓解措施,从而最大限度地减少测试场景中对正常流量的中断。
{"title":"Design and Development of a Trust Mechanism to Enhance Security Protection in SDN-Based IoT Network","authors":"Pang-Wei Tsai,&nbsp;Chao-Wei Lee,&nbsp;Ting-Wen Wang","doi":"10.1002/nem.70015","DOIUrl":"https://doi.org/10.1002/nem.70015","url":null,"abstract":"<div>\u0000 \u0000 <p>A reliable and trustworthy network is essential for ensuring efficient data transmission, particularly because the widespread adoption of the Internet of Things (IoT) requires management of a large and diverse set of smart devices. In addition, privacy and security concerns in IoT systems, such as access authentication, authorization, and accounting, have become increasingly important. Software-defined networking (SDN) offers a flexible and adaptive approach to network management and is a promising solution for addressing these challenges. Hence, this paper proposes a security mechanism that leverages the operational behaviors and characteristics of IoT devices to analyze their traffic flows using an SDN controller, thereby enhancing the overall security of IoT networks. The proposed architecture integrates a two-factor authentication process to prevent unauthorized access while utilizing SDN-based traffic monitoring to enforce fine-grained access control. Experimental results show that the implemented solution assists the SDN controller in detecting abnormal behaviors and triggering mitigation measures, thereby minimizing disruptions to normal traffic flows in testing scenarios.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143809511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1