首页 > 最新文献

2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
Increasing the trustworthiness of commodity hardware through software 通过软件提高商品硬件的可信度
Kevin Elphinstone, Yanyan Shen
Advances in formal software verification has produced an operating system that is guaranteed mathematically to be correct and enforce access isolation. Such an operating system could potentially consolidate safety and security critical software on a single device where previously multiple devices were used. One of the barriers to consolidation on commodity hardware is the lack of hardware dependability features. A hardware fault triggered by cosmic rays, alpha particle strikes, etc. potentially invalidates the strong mathematical guarantees. This paper discusses improving the trustworthiness of commodity hardware to enable a verified microkernel to be used in some situations previously needing separate computers. We explore leveraging multicore processors to provide redundancy, and report the results of our initial performance investigation.
正式软件验证的进步已经产生了一种操作系统,它在数学上保证是正确的,并强制执行访问隔离。这样的操作系统可能会在单个设备上整合安全和安全关键软件,而以前使用多个设备。商品硬件整合的障碍之一是缺乏硬件可靠性特性。由宇宙射线、α粒子撞击等触发的硬件故障可能会使强大的数学保证失效。本文讨论了提高商品硬件的可信度,使经过验证的微内核能够在以前需要单独计算机的某些情况下使用。我们探讨了利用多核处理器来提供冗余,并报告了初步性能调查的结果。
{"title":"Increasing the trustworthiness of commodity hardware through software","authors":"Kevin Elphinstone, Yanyan Shen","doi":"10.1109/DSN.2013.6575328","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575328","url":null,"abstract":"Advances in formal software verification has produced an operating system that is guaranteed mathematically to be correct and enforce access isolation. Such an operating system could potentially consolidate safety and security critical software on a single device where previously multiple devices were used. One of the barriers to consolidation on commodity hardware is the lack of hardware dependability features. A hardware fault triggered by cosmic rays, alpha particle strikes, etc. potentially invalidates the strong mathematical guarantees. This paper discusses improving the trustworthiness of commodity hardware to enable a verified microkernel to be used in some situations previously needing separate computers. We explore leveraging multicore processors to provide redundancy, and report the results of our initial performance investigation.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125803618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Network traffic anomaly detection based on growing hierarchical SOM 基于增长分层SOM的网络流量异常检测
Shin-Ying Huang, Yennun Huang
Network anomaly detection aims to detect patterns in a given network traffic data that do not conform to an established normal behavior. Distinguishing different anomaly patterns from large amount of data can be a challenge, let alone visualizing them in a comparative perspective. Recently, the unsupervised learning method such as the K-means [3], self-organizing map (SOM) [2], and growing hierarchical self-organizing map (GHSOM) [1] have been shown to be able to facilitate network anomaly detection [4][5]. However, there is no study addressing both mining and detecting task. This study leverages the advantage of GHSOM to analyze the network traffic data and visualize the distribution of attack patterns with hierarchical relationship. In the mining stage, the geometric distances between each pattern and its descriptive information are revealed in the topological space. The density and the sample size of each node can help to detect anomalous network traffic. In the detecting stage, this study extends the traditional GHSOM and uses the support vector machine (SVM) [6] to classify network traffic data into the predefined categories. The proposed approach achieves (1) help understand the behaviors of anomalous network traffic data (2) provide effective classification rule to facilitate network anomaly detection and (3) accumulate network anomaly detection knowledge for both mining and detecting purpose. The public dataset and the private dataset are used to evaluate the proposed approach. The expected result is to confirm that the proposed approach can help understand network traffic data, and the detecting mechanism is effective for identifying anomalous behavior.
网络异常检测的目的是检测给定网络流量数据中不符合既定正常行为的模式。从大量数据中区分不同的异常模式可能是一项挑战,更不用说从比较的角度对它们进行可视化了。近年来,K-means[3]、自组织映射(SOM)[2]和增长层次自组织映射(GHSOM)[1]等无监督学习方法已被证明能够促进网络异常检测[4][5]。然而,目前还没有同时解决挖掘和探测任务的研究。本研究利用GHSOM的优势,分析网络流量数据,可视化具有层次关系的攻击模式分布。在挖掘阶段,每个模式及其描述信息之间的几何距离在拓扑空间中显示出来。每个节点的密度和样本大小可以帮助检测异常网络流量。在检测阶段,本研究扩展了传统的GHSOM,使用支持向量机(SVM)[6]将网络流量数据分类到预定义的类别中。该方法实现了(1)有助于理解异常网络流量数据的行为(2)提供有效的分类规则,便于网络异常检测;(3)积累网络异常检测知识,便于挖掘和检测。使用公共数据集和私有数据集来评估所提出的方法。预期的结果是证实了所提出的方法可以帮助理解网络流量数据,并且检测机制对于识别异常行为是有效的。
{"title":"Network traffic anomaly detection based on growing hierarchical SOM","authors":"Shin-Ying Huang, Yennun Huang","doi":"10.1109/DSN.2013.6575338","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575338","url":null,"abstract":"Network anomaly detection aims to detect patterns in a given network traffic data that do not conform to an established normal behavior. Distinguishing different anomaly patterns from large amount of data can be a challenge, let alone visualizing them in a comparative perspective. Recently, the unsupervised learning method such as the K-means [3], self-organizing map (SOM) [2], and growing hierarchical self-organizing map (GHSOM) [1] have been shown to be able to facilitate network anomaly detection [4][5]. However, there is no study addressing both mining and detecting task. This study leverages the advantage of GHSOM to analyze the network traffic data and visualize the distribution of attack patterns with hierarchical relationship. In the mining stage, the geometric distances between each pattern and its descriptive information are revealed in the topological space. The density and the sample size of each node can help to detect anomalous network traffic. In the detecting stage, this study extends the traditional GHSOM and uses the support vector machine (SVM) [6] to classify network traffic data into the predefined categories. The proposed approach achieves (1) help understand the behaviors of anomalous network traffic data (2) provide effective classification rule to facilitate network anomaly detection and (3) accumulate network anomaly detection knowledge for both mining and detecting purpose. The public dataset and the private dataset are used to evaluate the proposed approach. The expected result is to confirm that the proposed approach can help understand network traffic data, and the detecting mechanism is effective for identifying anomalous behavior.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123759709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Availability study on cloud computing environments: Live migration as a rejuvenation mechanism 云计算环境的可用性研究:动态迁移作为一种恢复机制
M. Melo, P. Maciel, J. Araujo, Rúbens de Souza Matos Júnior, C. Araújo
With the increasing adoption of cloud computing environments, studies about high availability in those systems became more and more significant. Software rejuvenation is an important mechanism to improve system availability. This paper presents a comprehensive availability model to evaluate the utilization of the live migration mechanism to enable VMM rejuvenation with minimum service interruption. Live migrations are performed observing a time-based trigger. We evaluate five different scenarios, with distinct time intervals for triggering the rejuvenation. The results show that the live migration can significantly reduce the system downtime.
随着云计算环境的日益普及,对这些系统的高可用性的研究变得越来越重要。软件再生是提高系统可用性的重要机制。本文提出了一个综合的可用性模型来评估动态迁移机制的利用,以使VMM在最小的服务中断下恢复。实时迁移是观察基于时间的触发器执行的。我们评估了五种不同的情况,有不同的时间间隔触发复壮。结果表明,动态迁移可以显著减少系统停机时间。
{"title":"Availability study on cloud computing environments: Live migration as a rejuvenation mechanism","authors":"M. Melo, P. Maciel, J. Araujo, Rúbens de Souza Matos Júnior, C. Araújo","doi":"10.1109/DSN.2013.6575322","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575322","url":null,"abstract":"With the increasing adoption of cloud computing environments, studies about high availability in those systems became more and more significant. Software rejuvenation is an important mechanism to improve system availability. This paper presents a comprehensive availability model to evaluate the utilization of the live migration mechanism to enable VMM rejuvenation with minimum service interruption. Live migrations are performed observing a time-based trigger. We evaluate five different scenarios, with distinct time intervals for triggering the rejuvenation. The results show that the live migration can significantly reduce the system downtime.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133696600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Evasive bots masquerading as human beings on the web 在网络上伪装成人类的逃避机器人
Jinghe Jin, A. Offutt, Nan Zheng, Feng Mao, Aaron Koehl, Haining Wang
Web bots such as crawlers are widely used to automate various online tasks over the Internet. In addition to the conventional approach of human interactive proofs such as CAPTCHAs, a more recent approach of human observational proofs (HOP) has been developed to automatically distinguish web bots from human users. Its design rationale is that web bots behave intrinsically differently from human beings, allowing them to be detected. This paper escalates the battle against web bots by exploring the limits of current HOP-based bot detection systems. We develop an evasive web bot system based on human behavioral patterns. Then we prototype a general web bot framework and a set of flexible de-classifier plugins, primarily based on application-level event evasion. We further abstract and define a set of benchmarks for measuring our system's evasion performance on contemporary web applications, including social network sites. Our results show that the proposed evasive system can effectively mimic human behaviors and evade detectors by achieving high similarities between human users and evasive bots.
诸如爬虫之类的网络机器人被广泛用于在互联网上自动执行各种在线任务。除了传统的人类交互证明方法(如captcha)之外,最近还开发了一种人类观察证明(HOP)方法,用于自动区分网络机器人和人类用户。它的设计原理是,网络机器人的行为本质上与人类不同,因此可以被检测到。本文通过探索当前基于hop的机器人检测系统的局限性,升级了与网络机器人的战斗。我们开发了一个基于人类行为模式的回避网络机器人系统。然后,我们原型化了一个通用的web bot框架和一组灵活的去分类器插件,主要基于应用级事件规避。我们进一步抽象并定义了一组基准,用于测量我们的系统在当代web应用程序(包括社交网站)上的逃避性能。我们的研究结果表明,所提出的规避系统可以有效地模仿人类行为,并通过实现人类用户和规避机器人之间的高度相似性来逃避检测器。
{"title":"Evasive bots masquerading as human beings on the web","authors":"Jinghe Jin, A. Offutt, Nan Zheng, Feng Mao, Aaron Koehl, Haining Wang","doi":"10.1109/DSN.2013.6575366","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575366","url":null,"abstract":"Web bots such as crawlers are widely used to automate various online tasks over the Internet. In addition to the conventional approach of human interactive proofs such as CAPTCHAs, a more recent approach of human observational proofs (HOP) has been developed to automatically distinguish web bots from human users. Its design rationale is that web bots behave intrinsically differently from human beings, allowing them to be detected. This paper escalates the battle against web bots by exploring the limits of current HOP-based bot detection systems. We develop an evasive web bot system based on human behavioral patterns. Then we prototype a general web bot framework and a set of flexible de-classifier plugins, primarily based on application-level event evasion. We further abstract and define a set of benchmarks for measuring our system's evasion performance on contemporary web applications, including social network sites. Our results show that the proposed evasive system can effectively mimic human behaviors and evade detectors by achieving high similarities between human users and evasive bots.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133180092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Generative software-based memory error detection and correction for operating system data structures 基于生成软件的操作系统数据结构内存错误检测与校正
C. Borchert, Horst Schirmeier, O. Spinczyk
Recent studies indicate that the number of system failures caused by main memory errors is much higher than expected. In contrast to the commonly used hardware-based countermeasures, for example using ECC memory, software-based fault-tolerance measures are much more flexible and can exploit application knowledge, such as the criticality of specific data structures. This paper presents a software-based memory error protection approach, which we used to harden the eCos operating system in a case study. The main benefits of our approach are the flexibility to choose from an extensible toolbox of easily pluggable error detection and correction schemes as well as its very low runtime overhead, which totals in a range of 0.09-1.7 %. The implementation is based on aspect-oriented programming and exploits the object-oriented program structure of eCos to identify well-suited code locations for the insertion of generative fault-tolerance measures.
最近的研究表明,由主存错误引起的系统故障数量远远高于预期。与常用的基于硬件的对策(例如使用ECC存储器)相比,基于软件的容错措施更加灵活,可以利用应用知识,例如特定数据结构的临界性。本文提出了一种基于软件的内存错误保护方法,并通过实例对eCos操作系统进行了加固。我们的方法的主要优点是可以灵活地从易于插入的错误检测和纠正方案的可扩展工具箱中进行选择,并且运行时开销非常低,总计在0.09- 1.7%的范围内。该实现基于面向方面的编程,并利用eCos的面向对象程序结构来识别适合插入生成容错措施的代码位置。
{"title":"Generative software-based memory error detection and correction for operating system data structures","authors":"C. Borchert, Horst Schirmeier, O. Spinczyk","doi":"10.1109/DSN.2013.6575308","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575308","url":null,"abstract":"Recent studies indicate that the number of system failures caused by main memory errors is much higher than expected. In contrast to the commonly used hardware-based countermeasures, for example using ECC memory, software-based fault-tolerance measures are much more flexible and can exploit application knowledge, such as the criticality of specific data structures. This paper presents a software-based memory error protection approach, which we used to harden the eCos operating system in a case study. The main benefits of our approach are the flexibility to choose from an extensible toolbox of easily pluggable error detection and correction schemes as well as its very low runtime overhead, which totals in a range of 0.09-1.7 %. The implementation is based on aspect-oriented programming and exploits the object-oriented program structure of eCos to identify well-suited code locations for the insertion of generative fault-tolerance measures.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123849220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Towards SDN enabled network control delegation in clouds 在云中实现SDN网络控制委派
Muhammad Salman Malik, Mirko Montanari, J. Huh, R. Bobba, R. Campbell
In today's IaaS clouds users only get a logical view of the underlying network and have limited control. Delegating more control to end users would be beneficial but would also raise security concerns for the provider. Emerging Software Defined Networking (SDN) technologies have the capabilities to facilitate delegation of network controls and provide some level of network abstractions to end users. However, any delegation solution should try to balance the level of controls delegated to end users with the security constraints of the provider. In this paper, we propose a SDN-based framework to facilitate delegation of some network controls to end users, providing the means to monitor and configure their own slices of the underlying networks. Using two instantiations of this framework, we illustrate the tradeoffs between security and the level of network abstractions provided to end users.
在今天的IaaS云中,用户只能获得底层网络的逻辑视图,并且控制有限。将更多控制权委托给最终用户是有益的,但也会引起提供商的安全担忧。新兴的软件定义网络(SDN)技术能够促进网络控制的委派,并为最终用户提供某种程度的网络抽象。但是,任何委托解决方案都应该尝试在委托给最终用户的控制级别与提供者的安全约束之间取得平衡。在本文中,我们提出了一个基于sdn的框架,以方便将一些网络控制委派给最终用户,提供监控和配置他们自己的底层网络切片的方法。使用该框架的两个实例,我们说明了安全性和提供给最终用户的网络抽象级别之间的权衡。
{"title":"Towards SDN enabled network control delegation in clouds","authors":"Muhammad Salman Malik, Mirko Montanari, J. Huh, R. Bobba, R. Campbell","doi":"10.1109/DSN.2013.6575320","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575320","url":null,"abstract":"In today's IaaS clouds users only get a logical view of the underlying network and have limited control. Delegating more control to end users would be beneficial but would also raise security concerns for the provider. Emerging Software Defined Networking (SDN) technologies have the capabilities to facilitate delegation of network controls and provide some level of network abstractions to end users. However, any delegation solution should try to balance the level of controls delegated to end users with the security constraints of the provider. In this paper, we propose a SDN-based framework to facilitate delegation of some network controls to end users, providing the means to monitor and configure their own slices of the underlying networks. Using two instantiations of this framework, we illustrate the tradeoffs between security and the level of network abstractions provided to end users.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129572919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Complementing static and dynamic analysis approaches for better network defense 补充静态和动态分析方法,提高网络防御能力
H. Pareek, N. S. C. Babu
This paper presents a novel approach to prevent execution of malicious files on host system present in the network. For preventing a malicious file at gateway level, it is required to do reassembly of packets which in turn reduces the network performance by huge margins. This work combines static and dynamic analysis approaches and implements a minimal agent based system to prevent malicious files and in turn increase the dependability using existing systems.
本文提出了一种防止网络中主机系统上恶意文件执行的新方法。为了在网关级防止恶意文件,需要对数据包进行重新组装,这反过来又极大地降低了网络性能。这项工作结合了静态和动态分析方法,实现了一个基于最小代理的系统来防止恶意文件,从而提高了现有系统的可靠性。
{"title":"Complementing static and dynamic analysis approaches for better network defense","authors":"H. Pareek, N. S. C. Babu","doi":"10.1109/DSN.2013.6575334","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575334","url":null,"abstract":"This paper presents a novel approach to prevent execution of malicious files on host system present in the network. For preventing a malicious file at gateway level, it is required to do reassembly of packets which in turn reduces the network performance by huge margins. This work combines static and dynamic analysis approaches and implements a minimal agent based system to prevent malicious files and in turn increase the dependability using existing systems.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"13 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113961944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing memory exhaustion failures in Virtual Machines in a cloud environment 解决云环境中虚拟机的内存耗尽故障
J. A. Molina, Shivakant Mishra
With the expansion of the cloud computing usage over a wide range of areas and different kinds of users, the cloud providers are taking full advantage of all their resources as much as they can. Memory is the most expensive resource in terms of oversubscribing and this has resulted in high price to the end user. Furthermore, performing swapping in Virtual Machines (VM) is expensive, so the cloud provider usually do not offer any swapping space for its systems. As a consequence, when a VM runs out of memory, user processes are killed. This scenario in the cloud environment is especially critical, since the user loses all of his/her execution time and, by extension, the money invested in this computation. This paper addresses this critical problem by providing a kernel extension that monitors the memory requirements of a VM and prevents the out of memory state by creating swapping space dynamically. The paper describes the design and implementation of a preliminary prototype of this kernel extensions and evaluates its performance.
随着云计算的使用扩展到广泛的领域和不同类型的用户,云提供商正在尽可能地充分利用他们所有的资源。就超额订购而言,内存是最昂贵的资源,这导致了最终用户的高价格。此外,在虚拟机(VM)中执行交换非常昂贵,因此云提供商通常不为其系统提供任何交换空间。因此,当虚拟机内存不足时,用户进程将被终止。这种场景在云环境中尤为关键,因为用户会损失所有的执行时间,并且由此扩展,还会损失在此计算上的投资。本文通过提供一个内核扩展来解决这个关键问题,该扩展监视VM的内存需求,并通过动态创建交换空间来防止内存不足状态。本文描述了该内核扩展的一个初步原型的设计和实现,并对其性能进行了评价。
{"title":"Addressing memory exhaustion failures in Virtual Machines in a cloud environment","authors":"J. A. Molina, Shivakant Mishra","doi":"10.1109/DSN.2013.6575330","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575330","url":null,"abstract":"With the expansion of the cloud computing usage over a wide range of areas and different kinds of users, the cloud providers are taking full advantage of all their resources as much as they can. Memory is the most expensive resource in terms of oversubscribing and this has resulted in high price to the end user. Furthermore, performing swapping in Virtual Machines (VM) is expensive, so the cloud provider usually do not offer any swapping space for its systems. As a consequence, when a VM runs out of memory, user processes are killed. This scenario in the cloud environment is especially critical, since the user loses all of his/her execution time and, by extension, the money invested in this computation. This paper addresses this critical problem by providing a kernel extension that monitors the memory requirements of a VM and prevents the out of memory state by creating swapping space dynamically. The paper describes the design and implementation of a preliminary prototype of this kernel extensions and evaluates its performance.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115172073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Operating SECDED-based caches at ultra-low voltage with FLAIR 使用FLAIR在超低电压下操作基于秒的缓存
Moinuddin K. Qureshi, Zeshan A. Chishti
Voltage scaling is often limited by bit failures in large on-chip caches. Prior approaches for enabling cache operation at low voltages rely on correcting cache lines with multi-bit failures. Unfortunately, multi-bit Error Correcting Codes (ECC) incur significant storage overhead and complex logic. Our goal is to develop solutions that enable ultra-low voltage operation while incurring minimal changes to existing SECDED-based cache designs. We exploit the observation that only a small percentage of cache lines have multi-bit failures. We propose FLexible And Introspective Replication (FLAIR) that performs two-way replication for part of the cache during testing to maintain robustness, and disables lines with multi-bit failures after testing. FLAIR leverages the correction features of existing SECDED code to greatly improve on simple two-way replication. FLAIR provides a Vmin of 485mv (similar to ECC-8) and maintains robustness to soft-error, while incurring a storage overhead of only one bit per cache line.
在大型片上高速缓存中,电压缩放常常受到位故障的限制。先前在低电压下启用缓存操作的方法依赖于纠正具有多比特故障的缓存线路。不幸的是,多比特纠错码(ECC)带来了巨大的存储开销和复杂的逻辑。我们的目标是开发超低电压运行的解决方案,同时对现有的基于seced的缓存设计进行最小的更改。我们利用了只有一小部分缓存线路有多位故障的观察结果。我们提出灵活和内省复制(FLAIR),在测试期间对部分缓存执行双向复制以保持稳健性,并在测试后禁用具有多比特故障的线路。FLAIR利用现有SECDED代码的校正功能,大大改进了简单的双向复制。FLAIR提供了485mv的Vmin(类似于ECC-8),并保持了对软错误的稳健性,同时每条缓存线仅产生一个比特的存储开销。
{"title":"Operating SECDED-based caches at ultra-low voltage with FLAIR","authors":"Moinuddin K. Qureshi, Zeshan A. Chishti","doi":"10.1109/DSN.2013.6575314","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575314","url":null,"abstract":"Voltage scaling is often limited by bit failures in large on-chip caches. Prior approaches for enabling cache operation at low voltages rely on correcting cache lines with multi-bit failures. Unfortunately, multi-bit Error Correcting Codes (ECC) incur significant storage overhead and complex logic. Our goal is to develop solutions that enable ultra-low voltage operation while incurring minimal changes to existing SECDED-based cache designs. We exploit the observation that only a small percentage of cache lines have multi-bit failures. We propose FLexible And Introspective Replication (FLAIR) that performs two-way replication for part of the cache during testing to maintain robustness, and disables lines with multi-bit failures after testing. FLAIR leverages the correction features of existing SECDED code to greatly improve on simple two-way replication. FLAIR provides a Vmin of 485mv (similar to ECC-8) and maintains robustness to soft-error, while incurring a storage overhead of only one bit per cache line.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125090268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Fitting second-order acyclic Marked Markovian Arrival Processes 二阶无环标记马尔可夫到达过程的拟合
Andrea Sansottera, G. Casale, P. Cremonesi
Markovian Arrival Processes (MAPs) are a tractable class of point-processes useful to model correlated time series, such as those commonly found in network traces and system logs used in performance analysis and reliability evaluation. Marked MAPs (MMAPs) generalize MAPs by further allowing the modeling of multi-class traces, possibly with cross-correlation between multi-class arrivals. In this paper, we present analytical formulas to fit second-order acyclic MMAPs with an arbitrary number of classes. We initially define closed-form formulas to fit second-order MMAPs with two classes, where the underlying MAP is in canonical form. Our approach leverages forward and backward moments, which have recently been defined, but never exploited jointly for fitting. Then, we show how to sequentially apply these formulas to fit an arbitrary number of classes. Representative examples and trace-driven simulation using storage traces show the effectiveness of our approach for fitting empirical datasets.
马尔可夫到达过程(MAPs)是一类易于处理的点过程,可用于为相关时间序列建模,例如在性能分析和可靠性评估中使用的网络跟踪和系统日志中常见的时间序列。标记map (mmap)通过进一步允许多类轨迹建模来推广map,可能在多类到达之间具有相互关联。本文给出了拟合具有任意数目类的二阶无环mmap的解析公式。我们最初定义封闭形式的公式来拟合具有两个类的二阶mmap,其中底层MAP是规范形式。我们的方法利用了向前和向后的时刻,这两个时刻最近才被定义,但从未被共同利用来进行拟合。然后,我们将展示如何依次应用这些公式来拟合任意数量的类。代表性的例子和使用存储轨迹的轨迹驱动模拟表明了我们的方法在拟合经验数据集方面的有效性。
{"title":"Fitting second-order acyclic Marked Markovian Arrival Processes","authors":"Andrea Sansottera, G. Casale, P. Cremonesi","doi":"10.1109/DSN.2013.6575347","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575347","url":null,"abstract":"Markovian Arrival Processes (MAPs) are a tractable class of point-processes useful to model correlated time series, such as those commonly found in network traces and system logs used in performance analysis and reliability evaluation. Marked MAPs (MMAPs) generalize MAPs by further allowing the modeling of multi-class traces, possibly with cross-correlation between multi-class arrivals. In this paper, we present analytical formulas to fit second-order acyclic MMAPs with an arbitrary number of classes. We initially define closed-form formulas to fit second-order MMAPs with two classes, where the underlying MAP is in canonical form. Our approach leverages forward and backward moments, which have recently been defined, but never exploited jointly for fitting. Then, we show how to sequentially apply these formulas to fit an arbitrary number of classes. Representative examples and trace-driven simulation using storage traces show the effectiveness of our approach for fitting empirical datasets.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123301407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1