首页 > 最新文献

International Journal of Network Management最新文献

英文 中文
REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation 补救:通过虚拟化提高网络和中间件的弹性
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-03 DOI: 10.1002/nem.2317
Lyn Hill, Charalampos Rotsos, Chris Edwards, David Hutchison

The increasing demand for low-latency, high-bandwidth connectivity has introduced novel challenges to delivering strong resilience guarantees in production network environments. Closed hardware platforms, known as middleboxes, that lack visibility and support for state retention remain a key challenge for continuous service delivery during network failures. These middleboxes rarely employ recovery mechanisms of their own, inspiring renewed interest in the field of NFV in recent years due to this gap within the industry. The increasing availability of VNF capabilities in modern infrastructures offers an opportunity to exploit the flexibility of software and use hybrid architectures to improve resilience. REMEDIATE is a high-availability service that propagates state between unmodified hardware middleboxes and backup PNF or VNF appliances. The platform utilises targeted packet mirroring to allow network devices to organically construct equivalent state and thus allow an easy transition between hardware and software. To demonstrate its viability, we have evaluated REMEDIATE against a wide range of common hardware middlebox use cases built using multiple open-source packet processing frameworks. Results show upwards of 90% matching state with no observable delay to normal traffic or impact on its functionality.

对低延迟、高带宽连接的需求不断增长,为在生产网络环境中提供强大的弹性保证带来了新的挑战。封闭的硬件平台(称为中间件)缺乏可见性和对状态保留的支持,这对网络故障期间的持续服务交付仍然是一个关键挑战。这些中间设备很少采用自己的恢复机制,由于行业内的差距,近年来激发了人们对NFV领域的兴趣。在现代基础设施中,VNF功能的可用性越来越高,这为利用软件的灵活性和使用混合架构来提高弹性提供了机会。REMEDIATE是一个高可用性服务,它在未修改的硬件中间件和备份PNF或VNF设备之间传播状态。该平台利用目标包镜像,允许网络设备有机地构建等效状态,从而实现硬件和软件之间的轻松转换。为了证明它的可行性,我们针对使用多个开源包处理框架构建的广泛的通用硬件中间件用例对REMEDIATE进行了评估。结果显示90%以上的匹配状态,没有观察到对正常交通的延迟或对其功能的影响。
{"title":"REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation","authors":"Lyn Hill,&nbsp;Charalampos Rotsos,&nbsp;Chris Edwards,&nbsp;David Hutchison","doi":"10.1002/nem.2317","DOIUrl":"https://doi.org/10.1002/nem.2317","url":null,"abstract":"<p>The increasing demand for low-latency, high-bandwidth connectivity has introduced novel challenges to delivering strong resilience guarantees in production network environments. Closed hardware platforms, known as middleboxes, that lack visibility and support for state retention remain a key challenge for continuous service delivery during network failures. These middleboxes rarely employ recovery mechanisms of their own, inspiring renewed interest in the field of NFV in recent years due to this gap within the industry. The increasing availability of VNF capabilities in modern infrastructures offers an opportunity to exploit the flexibility of software and use hybrid architectures to improve resilience. REMEDIATE is a high-availability service that propagates state between unmodified hardware middleboxes and backup PNF or VNF appliances. The platform utilises targeted packet mirroring to allow network devices to organically construct equivalent state and thus allow an easy transition between hardware and software. To demonstrate its viability, we have evaluated REMEDIATE against a wide range of common hardware middlebox use cases built using multiple open-source packet processing frameworks. Results show upwards of 90% matching state with no observable delay to normal traffic or impact on its functionality.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2317","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142764090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrum Allocation in 5G and Beyond Intelligent Ubiquitous Networks 5G及超越智能泛在网络的频谱分配
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-29 DOI: 10.1002/nem.2315
Banoth Ravi, Utkarsh Verma

Effective spectrum allocation in 5G and beyond intelligent ubiquitous networks is vital for predicting future frequency band needs and ensuring optimal network performance. As wireless communication evolves from 4G to 5G and beyond, it has brought about remarkable advancements in speed and connectivity. However, with the growing demand for higher data rates and increased network capacity, new challenges in managing and utilizing network frequencies have emerged. Accurately forecasting spectrum requirements is critical to addressing these challenges. This research explores how machine learning (ML) plays a pivotal role in optimizing network performance through intelligent decision-making, predictive analysis, and adaptive management of network resources. By leveraging ML algorithms, networks can autonomously self-optimize in real time, adjusting to changing conditions and improving performance in 5G and beyond. The effectiveness of our approach was demonstrated through an extensive case study, which showed that it not only meets spectrum requirements in various environments but also significantly reduces energy consumption by pinpointing the appropriate spectrum range for each location. These results underscore the approach's potential for enhancing spectrum management in future networks, offering a scalable and efficient solution to the challenges facing 5G and beyond.

5G及智能泛在网络之后的有效频谱分配对于预测未来频带需求和确保最佳网络性能至关重要。随着无线通信从4G演进到5G及以后,它在速度和连接方面带来了显着的进步。然而,随着对更高数据速率和网络容量的需求不断增长,在管理和利用网络频率方面出现了新的挑战。准确预测频谱需求对于应对这些挑战至关重要。本研究探讨了机器学习(ML)如何通过智能决策、预测分析和网络资源的自适应管理在优化网络性能方面发挥关键作用。通过利用机器学习算法,网络可以实时自主自我优化,适应不断变化的条件,提高5G及以后的性能。通过广泛的案例研究证明了我们方法的有效性,该方法不仅满足了各种环境下的频谱要求,而且通过精确定位每个位置的适当频谱范围,显著降低了能耗。这些结果强调了该方法在增强未来网络频谱管理方面的潜力,为5G及以后面临的挑战提供了可扩展和高效的解决方案。
{"title":"Spectrum Allocation in 5G and Beyond Intelligent Ubiquitous Networks","authors":"Banoth Ravi,&nbsp;Utkarsh Verma","doi":"10.1002/nem.2315","DOIUrl":"https://doi.org/10.1002/nem.2315","url":null,"abstract":"<div>\u0000 \u0000 <p>Effective spectrum allocation in 5G and beyond intelligent ubiquitous networks is vital for predicting future frequency band needs and ensuring optimal network performance. As wireless communication evolves from 4G to 5G and beyond, it has brought about remarkable advancements in speed and connectivity. However, with the growing demand for higher data rates and increased network capacity, new challenges in managing and utilizing network frequencies have emerged. Accurately forecasting spectrum requirements is critical to addressing these challenges. This research explores how machine learning (ML) plays a pivotal role in optimizing network performance through intelligent decision-making, predictive analysis, and adaptive management of network resources. By leveraging ML algorithms, networks can autonomously self-optimize in real time, adjusting to changing conditions and improving performance in 5G and beyond. The effectiveness of our approach was demonstrated through an extensive case study, which showed that it not only meets spectrum requirements in various environments but also significantly reduces energy consumption by pinpointing the appropriate spectrum range for each location. These results underscore the approach's potential for enhancing spectrum management in future networks, offering a scalable and efficient solution to the challenges facing 5G and beyond.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142758077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intent-Based Network Configuration Using Large Language Models 使用大型语言模型进行基于意图的网络配置
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-20 DOI: 10.1002/nem.2313
Nguyen Tu, Sukhyun Nam, James Won-Ki Hong

The increasing scale and complexity of network infrastructure present a huge challenge for network operators and administrators in performing network configuration and management tasks. Intent-based networking has emerged as a solution to simplify the configuration and management of networks. However, one of the most difficult tasks of intent-based networking is correctly translating high-level natural language intents into low-level network configurations. In this paper, we propose a general and effective approach to perform the network intent translation task using large language models with fine-tuning, dynamic in-context learning, and continuous learning. Fine-tuning allows a pretrained large language model to perform better on a specific task. In-context learning enables large language models to learn from the examples provided along with the actual intent. Continuous learning allows the system to improve overtime with new user intents. To demonstrate the feasibility of our approach, we present and evaluate it with two use cases: network formal specification translation and network function virtualization configuration. Our evaluation shows that with the proposed approach, we can achieve high intent translation accuracy as well as fast processing times using small large language models that can run on a single consumer-grade GPU.

网络基础设施的规模和复杂性不断增加,给网络运营商和管理员执行网络配置和管理任务带来了巨大挑战。基于意图的网络已成为简化网络配置和管理的一种解决方案。然而,基于意图的联网最困难的任务之一是正确地将高级自然语言意图转化为低级网络配置。在本文中,我们提出了一种通用而有效的方法,利用具有微调、动态上下文学习和持续学习功能的大型语言模型来完成网络意图翻译任务。微调可以使预先训练好的大型语言模型在特定任务中发挥更好的作用。上下文学习使大型语言模型能够从提供的示例和实际意图中学习。持续学习允许系统根据新的用户意图不断改进。为了证明我们的方法的可行性,我们介绍并评估了两个使用案例:网络形式规范翻译和网络功能虚拟化配置。我们的评估结果表明,利用所提出的方法,我们可以实现较高的意图翻译准确率,并利用可在单个消费级 GPU 上运行的小型大型语言模型实现快速处理。
{"title":"Intent-Based Network Configuration Using Large Language Models","authors":"Nguyen Tu,&nbsp;Sukhyun Nam,&nbsp;James Won-Ki Hong","doi":"10.1002/nem.2313","DOIUrl":"https://doi.org/10.1002/nem.2313","url":null,"abstract":"<div>\u0000 \u0000 <p>The increasing scale and complexity of network infrastructure present a huge challenge for network operators and administrators in performing network configuration and management tasks. Intent-based networking has emerged as a solution to simplify the configuration and management of networks. However, one of the most difficult tasks of intent-based networking is correctly translating high-level natural language intents into low-level network configurations. In this paper, we propose a general and effective approach to perform the network intent translation task using large language models with fine-tuning, dynamic in-context learning, and continuous learning. Fine-tuning allows a pretrained large language model to perform better on a specific task. In-context learning enables large language models to learn from the examples provided along with the actual intent. Continuous learning allows the system to improve overtime with new user intents. To demonstrate the feasibility of our approach, we present and evaluate it with two use cases: network formal specification translation and network function virtualization configuration. Our evaluation shows that with the proposed approach, we can achieve high intent translation accuracy as well as fast processing times using small large language models that can run on a single consumer-grade GPU.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MSC: A Unique Chameleon Hash-Based Off-Chain Storage Framework for Metaverse Applications
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-14 DOI: 10.1002/nem.2314
Chenxi Xiong, Ting Yang, Gang Mao

Blockchain has evolved into a secure and trustworthy environment for decentralized applications, offering the advantages of tamper-resistant, while simultaneously introducing on-chain overhead issues. The development of metaverse related smart contracts on blockchain has given rise to a compelling research inquiry concerning the secure reduction of on-chain storage overhead. In this research, the Metaverse Off-chain Storage Framework based on Chameleon hash (MSC), a unique framework for decentralized system based on chameleon hash, supports code or stored data updates without changing on-chain data is presented. The index of decentralized applications' data is calculated using the Chameleon hash to ensure that the index remains unchanged during the data modification process. Simultaneously, data can be stored outside of the blockchain with proper authentication mechanisms in place. The experimental results have shown that MSC exhibits reduced on-chain storage requirements when compared to similar frameworks. Furthermore, MSC significantly reduced overhead as compared to the direct storage of data within a smart contract.

区块链已发展成为去中心化应用的安全可信环境,具有防篡改的优势,但同时也带来了链上开销问题。区块链上元宇宙相关智能合约的发展,引发了有关安全减少链上存储开销的迫切研究探索。本研究提出了基于变色龙哈希的元宇宙链外存储框架(MSC),这是一种独特的基于变色龙哈希的去中心化系统框架,支持代码或存储数据更新而不改变链上数据。去中心化应用程序的数据索引使用变色龙哈希计算,以确保在数据修改过程中索引保持不变。同时,数据可以通过适当的认证机制存储在区块链之外。实验结果表明,与同类框架相比,MSC 可减少链上存储需求。此外,与在智能合约中直接存储数据相比,MSC 大大减少了开销。
{"title":"MSC: A Unique Chameleon Hash-Based Off-Chain Storage Framework for Metaverse Applications","authors":"Chenxi Xiong,&nbsp;Ting Yang,&nbsp;Gang Mao","doi":"10.1002/nem.2314","DOIUrl":"https://doi.org/10.1002/nem.2314","url":null,"abstract":"<p>Blockchain has evolved into a secure and trustworthy environment for decentralized applications, offering the advantages of tamper-resistant, while simultaneously introducing on-chain overhead issues. The development of metaverse related smart contracts on blockchain has given rise to a compelling research inquiry concerning the secure reduction of on-chain storage overhead. In this research, the Metaverse Off-chain Storage Framework based on Chameleon hash (MSC), a unique framework for decentralized system based on chameleon hash, supports code or stored data updates without changing on-chain data is presented. The index of decentralized applications' data is calculated using the Chameleon hash to ensure that the index remains unchanged during the data modification process. Simultaneously, data can be stored outside of the blockchain with proper authentication mechanisms in place. The experimental results have shown that MSC exhibits reduced on-chain storage requirements when compared to similar frameworks. Furthermore, MSC significantly reduced overhead as compared to the direct storage of data within a smart contract.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2314","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143114889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SentinelGuard Pro: Deploying Cutting-Edge FusionNet for Unerring Detection and Enforcement of Wrong Parking Incidents SentinelGuard Pro:部署先进的 FusionNet,准确无误地检测和执行错误停车事件
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-10 DOI: 10.1002/nem.2310
Vankadhara Rajyalakshmi, Kuruva Lakshmanna

Wrong parking incidents pose a pervasive challenge in urban environments, disrupting the smooth flow of traffic, compromising safety and contributing to various logistical issues. Unauthorized parking occurs when vehicles are parked in locations not designated for such purposes, leading to a myriad of problems for both authorities and the general public. This research introduces a pioneering approach to confront the persistent challenge of unauthorized parking incidents in urban environments. The study focuses on harnessing the advanced capabilities of the FusionNet model to enhance the accuracy of license plate detection. This paper introduces the YOLO v8 Model, a deep learning architecture designed to enhance urban parking management by accurately detecting vehicles parked in unauthorized slots. The objective is to enhance parking management efficiency by accurately detecting vehicles and their occupancy status in designated parking areas. The methodology begins with data collection and preprocessing of images of parking spaces, followed by the training of YOLO v8 to identify vehicles and parking spaces in real time. Leveraging a diverse dataset encompassing various parking scenarios, including instances of unauthorized parking, the model achieves an accuracy of 98.50% in identifying vehicles outside designated areas. This model segments characters from detected license plates, enabling the accurate extraction of alphanumeric information associated with each vehicle. The integrated system provides timely identification of parking violations and facilitates effective enforcement actions through captured license plate data. Results demonstrate the model's effectiveness in real-world scenarios, showcasing its potential for improving urban safety and efficiency. The implementation of FusionNet in the Python programming language, the proposed solution aims to streamline parking management, improve compliance with parking regulations and enhance overall urban mobility., with robust precision 96.17%, specificity 97.42% and sensitivity 96.19%, surpassing other MobileNet, CNN, ANN, DNN and EfficientNet models.

错误停车事件是城市环境中普遍存在的挑战,它扰乱了交通的顺畅流动,损害了安全,并导致各种后勤问题。当车辆停放在未指定的地点时,就会发生违章停车,从而给当局和公众带来无数问题。本研究采用一种开创性的方法来应对城市环境中长期存在的违章停车问题。研究重点是利用 FusionNet 模型的先进功能来提高车牌检测的准确性。本文介绍了 YOLO v8 模型,这是一种深度学习架构,旨在通过准确检测停放在未经授权停车位上的车辆来加强城市停车管理。其目的是通过准确检测指定停车区域内的车辆及其占用状态来提高停车管理效率。该方法首先对停车位图像进行数据收集和预处理,然后训练 YOLO v8 实时识别车辆和停车位。利用包含各种停车场景(包括未经授权的停车情况)的多样化数据集,该模型在识别指定区域外的车辆方面达到了 98.50% 的准确率。该模型可从检测到的车牌中分割字符,从而准确提取与每辆车相关的字母数字信息。集成系统可及时识别违章停车行为,并通过捕获的车牌数据促进有效的执法行动。研究结果证明了该模型在实际场景中的有效性,展示了其在提高城市安全和效率方面的潜力。通过在 Python 编程语言中实施 FusionNet,所提出的解决方案旨在简化停车管理、提高停车法规的合规性并增强城市的整体流动性。
{"title":"SentinelGuard Pro: Deploying Cutting-Edge FusionNet for Unerring Detection and Enforcement of Wrong Parking Incidents","authors":"Vankadhara Rajyalakshmi,&nbsp;Kuruva Lakshmanna","doi":"10.1002/nem.2310","DOIUrl":"https://doi.org/10.1002/nem.2310","url":null,"abstract":"<div>\u0000 \u0000 <p>Wrong parking incidents pose a pervasive challenge in urban environments, disrupting the smooth flow of traffic, compromising safety and contributing to various logistical issues. Unauthorized parking occurs when vehicles are parked in locations not designated for such purposes, leading to a myriad of problems for both authorities and the general public. This research introduces a pioneering approach to confront the persistent challenge of unauthorized parking incidents in urban environments. The study focuses on harnessing the advanced capabilities of the FusionNet model to enhance the accuracy of license plate detection. This paper introduces the YOLO v8 Model, a deep learning architecture designed to enhance urban parking management by accurately detecting vehicles parked in unauthorized slots. The objective is to enhance parking management efficiency by accurately detecting vehicles and their occupancy status in designated parking areas. The methodology begins with data collection and preprocessing of images of parking spaces, followed by the training of YOLO v8 to identify vehicles and parking spaces in real time. Leveraging a diverse dataset encompassing various parking scenarios, including instances of unauthorized parking, the model achieves an accuracy of 98.50% in identifying vehicles outside designated areas. This model segments characters from detected license plates, enabling the accurate extraction of alphanumeric information associated with each vehicle. The integrated system provides timely identification of parking violations and facilitates effective enforcement actions through captured license plate data. Results demonstrate the model's effectiveness in real-world scenarios, showcasing its potential for improving urban safety and efficiency. The implementation of FusionNet in the Python programming language, the proposed solution aims to streamline parking management, improve compliance with parking regulations and enhance overall urban mobility., with robust precision 96.17%, specificity 97.42% and sensitivity 96.19%, surpassing other MobileNet, CNN, ANN, DNN and EfficientNet models.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142724245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Massive Data HBase Storage Method for Electronic Archive Management 用于电子档案管理的海量数据 HBase 存储方法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-27 DOI: 10.1002/nem.2308
Huaquan Su, Junwei Li, Li Guo, Wanshuo Wang, Yongjiao Yang, You Wen, Kai Li, Pingyan Mo

The acceleration of the digitalization process in enterprise and university education management has generated a massive amount of electronic archive data. In order to improve the intelligence, storage quality, and efficiency of electronic records management and achieve efficient storage and fast retrieval of data storage models, this study proposes a massive data storage model based on HBase and its retrieval optimization scheme design. In addition, HDFS is introduced to construct a two-level storage structure and optimize values to improve the scalability and load balancing of HBase, and the retrieval efficiency of the HBase storage model is improved through SL-TCR and BF filters. The results indicated that HDFS could automatically recover data after node, network partition, and NameNode failures. The write time of HBase was 56 s, which was 132 and 246 s less than Cassandra and CockroachDB. The query latency was reduced by 23% and 32%, and the query time was reduced by 9988.51 ms, demonstrating high reliability and efficiency. The delay of BF-SL-TCL was 1379.28 s after 1000 searches, which was 224.78 and 212.74 s less than SL-TCL and Blockchain Retrieval Acceleration and reduced the delay under high search times. In summary, this storage model has obvious advantages in storing massive amounts of electronic archive data and has high security and retrieval efficiency, which provides important reference for the design of storage models for future electronic archive management. The storage model designed by the research institute has obvious advantages in storing massive electronic archive data, solving the problem of lack of scalability in electronic archive management when facing massive data, and has high security and retrieval efficiency. It has important reference for the design of storage models for future electronic archive management.

随着企业和高校教育管理数字化进程的加快,产生了海量的电子档案数据。为了提高电子档案管理的智能化、存储质量和效率,实现高效存储、快速检索的数据存储模型,本研究提出了基于HBase的海量数据存储模型及其检索优化方案设计。此外,引入 HDFS 构建两级存储结构并进行优化取值,以提高 HBase 的可扩展性和负载均衡性,并通过 SL-TCR 和 BF 过滤器提高 HBase 存储模型的检索效率。结果表明,HDFS能在节点、网络分区和NameNode故障后自动恢复数据。HBase 的写入时间为 56 秒,分别比 Cassandra 和 CockroachDB 短 132 秒和 246 秒。查询延迟分别减少了 23% 和 32%,查询时间减少了 9988.51 毫秒,表现出很高的可靠性和效率。BF-SL-TCL在1000次搜索后的延迟为1379.28 s,比SL-TCL和区块链检索加速分别减少了224.78和212.74 s,减少了高搜索次数下的延迟。综上所述,该存储模型在存储海量电子档案数据方面优势明显,具有较高的安全性和检索效率,为未来电子档案管理的存储模型设计提供了重要参考。该研究所设计的存储模型在存储海量电子档案数据方面具有明显优势,解决了电子档案管理在面对海量数据时缺乏可扩展性的问题,具有较高的安全性和检索效率。它对未来电子档案管理的存储模型设计具有重要的借鉴意义。
{"title":"Massive Data HBase Storage Method for Electronic Archive Management","authors":"Huaquan Su,&nbsp;Junwei Li,&nbsp;Li Guo,&nbsp;Wanshuo Wang,&nbsp;Yongjiao Yang,&nbsp;You Wen,&nbsp;Kai Li,&nbsp;Pingyan Mo","doi":"10.1002/nem.2308","DOIUrl":"https://doi.org/10.1002/nem.2308","url":null,"abstract":"<div>\u0000 \u0000 <p>The acceleration of the digitalization process in enterprise and university education management has generated a massive amount of electronic archive data. In order to improve the intelligence, storage quality, and efficiency of electronic records management and achieve efficient storage and fast retrieval of data storage models, this study proposes a massive data storage model based on HBase and its retrieval optimization scheme design. In addition, HDFS is introduced to construct a two-level storage structure and optimize values to improve the scalability and load balancing of HBase, and the retrieval efficiency of the HBase storage model is improved through SL-TCR and BF filters. The results indicated that HDFS could automatically recover data after node, network partition, and NameNode failures. The write time of HBase was 56 s, which was 132 and 246 s less than Cassandra and CockroachDB. The query latency was reduced by 23% and 32%, and the query time was reduced by 9988.51 ms, demonstrating high reliability and efficiency. The delay of BF-SL-TCL was 1379.28 s after 1000 searches, which was 224.78 and 212.74 s less than SL-TCL and Blockchain Retrieval Acceleration and reduced the delay under high search times. In summary, this storage model has obvious advantages in storing massive amounts of electronic archive data and has high security and retrieval efficiency, which provides important reference for the design of storage models for future electronic archive management. The storage model designed by the research institute has obvious advantages in storing massive electronic archive data, solving the problem of lack of scalability in electronic archive management when facing massive data, and has high security and retrieval efficiency. It has important reference for the design of storage models for future electronic archive management.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142737619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens 网络集中化在塑造数字主权中的作用:DNS 透视镜下的分析
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-24 DOI: 10.1002/nem.2309
Andrei C. Azevedo, Eder J. Scheid, Muriel F. Franco, Demétrio F. F. Boeira, Luciano Zembruzki, Lisandro Z. Granville

Centralization of Internet-based services in a few key players has been a topic of study in recent years. One of such services, the domain name system (DNS), is one of the pillars of the Internet, which allows users to access websites on the Internet through easy-to-remember domain names rather than complex numeric IP addresses. In this DNS context, the reliance on a small number of large DNS providers can lead to (a) risks of data breaches and disruption of service in the event of failures and (b) concerns about the digital sovereignty of countries regarding DNS hosting. As several essential services are provided through electronic government (E-Gov), it is highly important to be able to measure the digital sovereignty of a nation and the impacts that the lack of such feature can bring to its citizens. This work approaches the issue of DNS concentration on the Internet by presenting a solution to measure DNS hosting centralization and digital sovereignty in different countries, such as Brazil, India, China, Russia, and South Africa. With the data obtained through these measurements, relevant questions are answered, such as which are the top-10 DNS providers, if there is DNS centralization, and how dependent countries are on such providers to manage domains using their country code top-level domains (ccTLD). Future opportunities could investigate the impacts on sovereignty under the lens of other layers of the open systems interconnection (OSI) Network Sovereignty representation model presented in this work.

近年来,将基于互联网的服务集中到少数关键参与者手中一直是一个研究课题。域名系统(DNS)是此类服务之一,也是互联网的支柱之一,它允许用户通过易于记忆的域名而不是复杂的数字 IP 地址访问互联网上的网站。在域名系统方面,对少数大型域名系统提供商的依赖可能导致:(a) 数据外泄和服务中断 的风险,(b) 各国在域名系统托管方面的数字主权问题。由于一些基本服务是通过电子政务(E-Gov)提供的,因此能够衡量一个国家的数字主权以及缺乏这种功能可能给其公民带来的影响是非常重要的。这项工作通过提出一种解决方案来衡量 DNS 主机集中化和不同国家(如巴西、印度、中国、俄罗斯和南非)的数字主权,从而解决互联网上 DNS 集中化的问题。通过这些测量获得的数据,可以回答相关问题,如哪些是排名前十的 DNS 提供商,是否存在 DNS 集中化,以及各国在使用其国家代码顶级域 (ccTLD) 管理域名时对这些提供商的依赖程度。未来有机会可以从本研究中提出的开放系统互连 (OSI) 网络主权表示模型的其他层面来研究对主权的影响。
{"title":"The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens","authors":"Andrei C. Azevedo,&nbsp;Eder J. Scheid,&nbsp;Muriel F. Franco,&nbsp;Demétrio F. F. Boeira,&nbsp;Luciano Zembruzki,&nbsp;Lisandro Z. Granville","doi":"10.1002/nem.2309","DOIUrl":"https://doi.org/10.1002/nem.2309","url":null,"abstract":"<div>\u0000 \u0000 <p>Centralization of Internet-based services in a few key players has been a topic of study in recent years. One of such services, the domain name system (DNS), is one of the pillars of the Internet, which allows users to access websites on the Internet through easy-to-remember domain names rather than complex numeric IP addresses. In this DNS context, the reliance on a small number of large DNS providers can lead to (a) risks of data breaches and disruption of service in the event of failures and (b) concerns about the digital sovereignty of countries regarding DNS hosting. As several essential services are provided through electronic government (E-Gov), it is highly important to be able to measure the digital sovereignty of a nation and the impacts that the lack of such feature can bring to its citizens. This work approaches the issue of DNS concentration on the Internet by presenting a solution to measure DNS hosting centralization and digital sovereignty in different countries, such as Brazil, India, China, Russia, and South Africa. With the data obtained through these measurements, relevant questions are answered, such as which are the top-10 DNS providers, if there is DNS centralization, and how dependent countries are on such providers to manage domains using their country code top-level domains (ccTLD). Future opportunities could investigate the impacts on sovereignty under the lens of other layers of the open systems interconnection (OSI) Network Sovereignty representation model presented in this work.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142724177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight Flow-Based Policy Enforcement for SDN-Based Multi-Domain Communication 基于 SDN 的多域通信中基于流量的轻量级策略执行
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-23 DOI: 10.1002/nem.2312
Abdulhakim Sabur

Although software-defined networking (SDN) is commonly employed for intra-domain communication, inter-domain communication still heavily relies on conventional routing methods, specifically BGP-based routers. The BGP router plays a crucial role in managing control and data planes, but this traditional approach hinders the exploitation of SDN advantages. Previous studies demonstrated the use of BGP for inter-domain and end-to-end communication. This paper advocates for the adoption of a fully SDN-based data plane packet switching strategy through the introduction of LPEES, a lightweight policy framework tailored for SDN-based inter-domain communication. LPEES strategically confines BGP's functionality to the control plane, preserving SDN benefits. Evaluation results confirm the effectiveness of LPEES compared to the BGP routing approach, as measured by throughput and various network quality of service (QoS) metrics. Additionally, LPEES streamlines inter-domain communication by utilizing a trust-based routing policy approach that can establish trust between communicating domains. The presented solution's main advantage is that it loosens the burden on the administrator by requiring less human interference to check the inter-domain communication security and privacy. Our evaluations show LPEES outperform the BGP-based in terms of throughput as LPEES achieves a $$ sim $$27 Gbps versus $$ sim $$22 Gbps in the traditional approach. Based on our experiments, LPEES also enhances the communication delay by an average of $$ sim $$17% compared to the traditional BGP-based approach.

虽然软件定义网络(SDN)通常用于域内通信,但域间通信仍严重依赖传统路由方法,特别是基于 BGP 的路由器。BGP 路由器在管理控制平面和数据平面方面发挥着至关重要的作用,但这种传统方法阻碍了 SDN 优势的发挥。以前的研究表明,BGP 可用于域间和端到端通信。本文通过引入为基于 SDN 的域间通信量身定制的轻量级策略框架 LPEES,倡导采用完全基于 SDN 的数据平面数据包交换策略。LPEES 从战略上将 BGP 的功能限制在控制平面,保留了 SDN 的优势。通过吞吐量和各种网络服务质量(QoS)指标来衡量,评估结果证实了 LPEES 与 BGP 路由方法相比的有效性。此外,LPEES 采用基于信任的路由策略方法,可以在通信域之间建立信任,从而简化域间通信。该解决方案的主要优点是减轻了管理员的负担,减少了检查域间通讯安全性和隐私性的人工干预。我们的评估显示,LPEES 在吞吐量方面优于基于 BGP 的方案,LPEES 达到了 27 Gbps,而传统方案为 22 Gbps。根据我们的实验,与传统的基于 BGP 的方法相比,LPEES 还将通信延迟平均提高了 ∼ $ $ sim $ 17%。
{"title":"Lightweight Flow-Based Policy Enforcement for SDN-Based Multi-Domain Communication","authors":"Abdulhakim Sabur","doi":"10.1002/nem.2312","DOIUrl":"https://doi.org/10.1002/nem.2312","url":null,"abstract":"<div>\u0000 \u0000 <p>Although software-defined networking (SDN) is commonly employed for intra-domain communication, inter-domain communication still heavily relies on conventional routing methods, specifically BGP-based routers. The BGP router plays a crucial role in managing control and data planes, but this traditional approach hinders the exploitation of SDN advantages. Previous studies demonstrated the use of BGP for inter-domain and end-to-end communication. This paper advocates for the adoption of a fully SDN-based data plane packet switching strategy through the introduction of LPEES, a lightweight policy framework tailored for SDN-based inter-domain communication. LPEES strategically confines BGP's functionality to the control plane, preserving SDN benefits. Evaluation results confirm the effectiveness of LPEES compared to the BGP routing approach, as measured by throughput and various network quality of service (QoS) metrics. Additionally, LPEES streamlines inter-domain communication by utilizing a trust-based routing policy approach that can establish trust between communicating domains. The presented solution's main advantage is that it loosens the burden on the administrator by requiring less human interference to check the inter-domain communication security and privacy. Our evaluations show LPEES outperform the BGP-based in terms of throughput as LPEES achieves a <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>∼</mo>\u0000 </mrow>\u0000 <annotation>$$ sim $$</annotation>\u0000 </semantics></math>27 Gbps versus <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>∼</mo>\u0000 </mrow>\u0000 <annotation>$$ sim $$</annotation>\u0000 </semantics></math>22 Gbps in the traditional approach. Based on our experiments, LPEES also enhances the communication delay by an average of <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>∼</mo>\u0000 </mrow>\u0000 <annotation>$$ sim $$</annotation>\u0000 </semantics></math>17% compared to the traditional BGP-based approach.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142737594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomous Attack Mitigation Through Firewall Reconfiguration
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-20 DOI: 10.1002/nem.2307
Daniele Bringhenti, Francesco Pizzato, Riccardo Sisto, Fulvio Valenza

Packet filtering firewalls represent a main defense line against cyber attacks that target computer networks daily. However, the traditional manual approaches for their configuration are no longer applicable to next-generation networks, which have become much more complex after the introduction of virtualization paradigms. Some automatic strategies have been investigated in the literature to change that old-fashioned configuration approach, but they are not fully autonomous and still require several human interventions. In order to overcome these limitations, this paper proposes an autonomous approach for firewall reconfiguration where all steps are automated, from the derivation of the security requirements coming from the logs of IDSs to the deployment of the automatically computed configurations. A core component of this process is React-VEREFOO, which models the firewall reconfiguration problem as a Maximum Satisfiability Modulo Theories problem, allowing the combination of full automation, formal verification, and optimization in a single technique. An implementation of this proposal has undergone experimental validation to show its effectiveness and performance.

{"title":"Autonomous Attack Mitigation Through Firewall Reconfiguration","authors":"Daniele Bringhenti,&nbsp;Francesco Pizzato,&nbsp;Riccardo Sisto,&nbsp;Fulvio Valenza","doi":"10.1002/nem.2307","DOIUrl":"https://doi.org/10.1002/nem.2307","url":null,"abstract":"<p>Packet filtering firewalls represent a main defense line against cyber attacks that target computer networks daily. However, the traditional manual approaches for their configuration are no longer applicable to next-generation networks, which have become much more complex after the introduction of virtualization paradigms. Some automatic strategies have been investigated in the literature to change that old-fashioned configuration approach, but they are not fully autonomous and still require several human interventions. In order to overcome these limitations, this paper proposes an autonomous approach for firewall reconfiguration where all steps are automated, from the derivation of the security requirements coming from the logs of IDSs to the deployment of the automatically computed configurations. A core component of this process is React-VEREFOO, which models the firewall reconfiguration problem as a Maximum Satisfiability Modulo Theories problem, allowing the combination of full automation, formal verification, and optimization in a single technique. An implementation of this proposal has undergone experimental validation to show its effectiveness and performance.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2307","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143117635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security, Privacy, and Trust Management on Decentralized Systems and Networks 分散式系统和网络的安全、隐私和信任管理
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-15 DOI: 10.1002/nem.2311
Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen
<p>With the rapid growth of size and scale in current organization, decentralize systems are becoming dominant, which is an interconnected information system where no single entity or central server is employed as a sole authority, such as Internet of Things (IoT), smart home system, smart city system, and more. For such systems, sensors are important to gather and process data as the lower level components. However, with the distributed deployment, decentralized systems are facing various security, privacy, and trust issues. For instance, any compromised sensor may leak sensitive data or be used to infect other entities within the system. It is also a long-term challenge to establish trust among different nodes and defeat malicious insiders. Here, there is a requirement to develop suitable management schemes for decentralized systems and networks regarding security, privacy, and trust. This special issue focuses on the identification of security, privacy, and trust issues in decentralized systems and the development of effective solutions in handling security, privacy, and trust issues for decentralized systems, for example, IoT, cyber-physical systems (CPS), smart city, and smart home.</p><p>In the first contribution entitled “A security-enhanced equipment predictive maintenance solution for the ETO manufacturing,” Cao et al. proposed a security-enhanced predictive maintenance scheme specifically designed for ETO-type production equipment. This scheme can use the industrial Internet of Things (IIoT) technology to monitor machines and equipment, constructing prediction models using machine learning methods and reinforcing the security of the prediction system through adoption of a decentralized architecture with blockchain distributed storage. In this experiment, six supervised learning models were compared, and it was found that the model based on the random forest algorithm achieved an outstanding accuracy rate of 98.88%.</p><p>In the second contribution entitled “IGXSS: XSS payload detection model based on inductive GCN,” Wang et al. figured out that XSS is one of the most common web application attacks, in which an attacker can obtain private user information from IoT devices or cloud platforms. To address this issue, the authors proposed an XSS payload detection model based on inductive graph neural networks, shortly IGXSS (XSS payload detection model based on inductive GCN). The method aims to detect XSS payloads under an IoT environment by segmenting the samples as nodes and obtaining the feature matrix of nodes and edges.</p><p>In the third contribution entitled “Privacy-protected object detection through trustworthy image fusion,” Zhang et al. identified that user privacy may be leaked as infrared images may contain sensitive information. The authors then proposed a procedure for enhancing the database privacy, object detection based on multi-band infrared image datasets, and they utilized the transfer learning technique to migrate know
随着当前组织规模的快速增长,去中心化系统正成为主流,这是一种互联的信息系统,没有单一实体或中央服务器作为唯一权威,如物联网(IoT)、智能家居系统、智能城市系统等。对于此类系统,传感器作为底层组件,在收集和处理数据方面非常重要。然而,随着分布式部署的开展,分散式系统正面临着各种安全、隐私和信任问题。例如,任何受损的传感器都可能泄露敏感数据或被用来感染系统内的其他实体。在不同节点之间建立信任并击败恶意内部人员也是一项长期挑战。因此,有必要为分散式系统和网络开发合适的安全、隐私和信任管理方案。在第一篇题为《面向 ETO 制造业的安全增强型设备预测性维护解决方案》的论文中,Cao 等人提出了一种专为 ETO 型生产设备设计的安全增强型预测性维护方案。该方案可利用工业物联网(IIoT)技术监控机器设备,利用机器学习方法构建预测模型,并通过采用区块链分布式存储的去中心化架构来加强预测系统的安全性。在题为 "IGXSS:基于感应式GCN的XSS有效载荷检测模型 "的第二篇论文中,Wang等人发现XSS是最常见的网络应用攻击之一,攻击者可以从物联网设备或云平台获取用户隐私信息。为解决这一问题,作者提出了一种基于归纳图神经网络的 XSS 有效载荷检测模型,即 IGXSS(基于归纳图神经网络的 XSS 有效载荷检测模型)。该方法旨在通过将样本分割为节点,并获取节点和边的特征矩阵,从而检测物联网环境下的 XSS 有效载荷。在题为 "通过可信图像融合实现隐私保护对象检测 "的第三篇论文中,Zhang 等人指出,由于红外图像可能包含敏感信息,用户隐私可能会被泄露。作者随后提出了一种基于多波段红外图像数据集的增强数据库隐私、物体检测的程序,并利用迁移学习技术将从外部红外数据中学到的知识迁移到内部红外数据中。所提出的方法由几个步骤组成,包括多波段红外图像的数据预处理、多波段红外图像融合和物体检测。Manikandan 和 Sriramulu 在题为 "ASMTP:基于匿名安全信息令牌的协议辅助无人驾驶飞行器群的数据安全 "的第四篇论文中指出,在无人驾驶飞行器与无人驾驶飞行器(UAV-to-UAV)通信过程中,需要完美的前向保密性和不可抵赖性。作者提出了一种基于匿名安全信息令牌协议(ASMTP)的无人机蜂群通信协议。在题为 "智能电网中实现数据查询完整性的隐私保护数据聚合 "的第五篇论文中,Li 等人指出,智能电网系统应优先考虑隐私和安全问题。作者提出了一种旨在支持数据查询的隐私保护数据聚合方案。他们还开发了一种基于 Paillier 半同态加密的多级数据聚合机制,以便在控制中心实现用户数据的高效聚合。在题为 "医疗物联网框架中的安全和轻量级患者生存预测 "的第六篇论文中,Mittal 等人旨在探索客观数据和主观数据在预测术后结果中的相互作用,并以此帮助降低医疗物联网中的数据传输成本。
{"title":"Security, Privacy, and Trust Management on Decentralized Systems and Networks","authors":"Weizhi Meng,&nbsp;Sokratis K. Katsikas,&nbsp;Jiageng Chen,&nbsp;Chao Chen","doi":"10.1002/nem.2311","DOIUrl":"https://doi.org/10.1002/nem.2311","url":null,"abstract":"&lt;p&gt;With the rapid growth of size and scale in current organization, decentralize systems are becoming dominant, which is an interconnected information system where no single entity or central server is employed as a sole authority, such as Internet of Things (IoT), smart home system, smart city system, and more. For such systems, sensors are important to gather and process data as the lower level components. However, with the distributed deployment, decentralized systems are facing various security, privacy, and trust issues. For instance, any compromised sensor may leak sensitive data or be used to infect other entities within the system. It is also a long-term challenge to establish trust among different nodes and defeat malicious insiders. Here, there is a requirement to develop suitable management schemes for decentralized systems and networks regarding security, privacy, and trust. This special issue focuses on the identification of security, privacy, and trust issues in decentralized systems and the development of effective solutions in handling security, privacy, and trust issues for decentralized systems, for example, IoT, cyber-physical systems (CPS), smart city, and smart home.&lt;/p&gt;&lt;p&gt;In the first contribution entitled “A security-enhanced equipment predictive maintenance solution for the ETO manufacturing,” Cao et al. proposed a security-enhanced predictive maintenance scheme specifically designed for ETO-type production equipment. This scheme can use the industrial Internet of Things (IIoT) technology to monitor machines and equipment, constructing prediction models using machine learning methods and reinforcing the security of the prediction system through adoption of a decentralized architecture with blockchain distributed storage. In this experiment, six supervised learning models were compared, and it was found that the model based on the random forest algorithm achieved an outstanding accuracy rate of 98.88%.&lt;/p&gt;&lt;p&gt;In the second contribution entitled “IGXSS: XSS payload detection model based on inductive GCN,” Wang et al. figured out that XSS is one of the most common web application attacks, in which an attacker can obtain private user information from IoT devices or cloud platforms. To address this issue, the authors proposed an XSS payload detection model based on inductive graph neural networks, shortly IGXSS (XSS payload detection model based on inductive GCN). The method aims to detect XSS payloads under an IoT environment by segmenting the samples as nodes and obtaining the feature matrix of nodes and edges.&lt;/p&gt;&lt;p&gt;In the third contribution entitled “Privacy-protected object detection through trustworthy image fusion,” Zhang et al. identified that user privacy may be leaked as infrared images may contain sensitive information. The authors then proposed a procedure for enhancing the database privacy, object detection based on multi-band infrared image datasets, and they utilized the transfer learning technique to migrate know","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2311","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142642020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1