首页 > 最新文献

2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)最新文献

英文 中文
Model-based performance analysis of local re-execution scheme in offloading system 基于模型的卸载系统局部重执行方案性能分析
Qiushi Wang, Huaming Wu, K. Wolter
Offloading is a useful approach to save energy and time for mobile devices by migrating heavy computation to remote powerful servers. However, the unreliable wireless network constrains the implementation of offloading applications. The execution continuity is always interrupted by network failures. To deal with this problem, locally re-executing the pre-determined offloading task in the mobile device is a valid method. Challenges arise due to the best trade-off between costs and benefits of Local Re-execution. In this paper, using a Stochastic Activity Network model, we defined three metrics to investigate the performance of Local Re-execution, which is launched by different timeout values. Through comprehensively comparing the simulation results, we further explored the optimal timeout value for activating Local Re-execution, and reached the conclusion that the optimum is mainly controlled by the delay of network recovery.
卸载是一种有用的方法,通过将繁重的计算迁移到远程功能强大的服务器,可以为移动设备节省能源和时间。然而,不可靠的无线网络限制了卸载应用的实现。网络故障总是中断执行的连续性。为了解决这个问题,在移动设备上本地重新执行预定的卸载任务是一种有效的方法。挑战来自于本地重新执行的成本和收益之间的最佳权衡。在本文中,我们使用随机活动网络模型,定义了三个指标来研究由不同超时值启动的局部重执行的性能。通过综合比较仿真结果,我们进一步探索激活Local reexecution的最优超时值,得出最优值主要由网络恢复延迟控制的结论。
{"title":"Model-based performance analysis of local re-execution scheme in offloading system","authors":"Qiushi Wang, Huaming Wu, K. Wolter","doi":"10.1109/DSN.2013.6575325","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575325","url":null,"abstract":"Offloading is a useful approach to save energy and time for mobile devices by migrating heavy computation to remote powerful servers. However, the unreliable wireless network constrains the implementation of offloading applications. The execution continuity is always interrupted by network failures. To deal with this problem, locally re-executing the pre-determined offloading task in the mobile device is a valid method. Challenges arise due to the best trade-off between costs and benefits of Local Re-execution. In this paper, using a Stochastic Activity Network model, we defined three metrics to investigate the performance of Local Re-execution, which is launched by different timeout values. Through comprehensively comparing the simulation results, we further explored the optimal timeout value for activating Local Re-execution, and reached the conclusion that the optimum is mainly controlled by the delay of network recovery.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121037498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The architecture of a resilience infrastructure for computing and communication systems 计算和通信系统的弹性基础设施的体系结构
A. Avizienis
The resilience infrastructure is a physically and functionally separate add-on to a “Client” computing and/or communication system that provides resilience to the Client system. This short paper summarizes the main features of the architecture of a resilience infrastructure.
弹性基础设施是物理上和功能上独立的“客户端”计算和/或通信系统的附加组件,为客户端系统提供弹性。这篇短文总结了弹性基础设施体系结构的主要特征。
{"title":"The architecture of a resilience infrastructure for computing and communication systems","authors":"A. Avizienis","doi":"10.1109/DSN.2013.6575340","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575340","url":null,"abstract":"The resilience infrastructure is a physically and functionally separate add-on to a “Client” computing and/or communication system that provides resilience to the Client system. This short paper summarizes the main features of the architecture of a resilience infrastructure.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116493960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault-tolerance characteristics of data center network topologies using fault regions 使用故障区域的数据中心网络拓扑的容错特性
Yang Liu, J. Muppala
Data center networks (DCNs) are inherently failure-prone owing to the existence of many links, switches and servers. Many times the failures of the components may be correlated resulting a set of connected components failing together. This correlated failure behaviour could be captured through the use of fault regions [1]. This paper explores the effect of such failures in DCNs, using four topologies, viz., Fat Tree, DCell, FlatNet and BCube. We used two categories of metrics for evaluation: connection-oriented metrics, including aggregated bottleneck throughput (ABT), average path length (APL) and routing failure rate (RFR); and network size-oriented metrics, including Component Decomposition Number (CDN) and Smallest/Largest Component Size (SCS/LCS).
由于存在许多链路、交换机和服务器,数据中心网络(dcn)天生就容易发生故障。很多时候,组件的故障可能是相关的,导致一组连接的组件一起故障。这种相关的失效行为可以通过使用断层区域来捕获[1]。本文使用四种拓扑结构,即Fat Tree, DCell, FlatNet和BCube,探讨了这种故障对DCNs的影响。我们使用了两类指标进行评估:面向连接的指标,包括聚合瓶颈吞吐量(ABT)、平均路径长度(APL)和路由失败率(RFR);以及面向网络规模的度量,包括组件分解数(CDN)和最小/最大组件尺寸(SCS/LCS)。
{"title":"Fault-tolerance characteristics of data center network topologies using fault regions","authors":"Yang Liu, J. Muppala","doi":"10.1109/DSN.2013.6575321","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575321","url":null,"abstract":"Data center networks (DCNs) are inherently failure-prone owing to the existence of many links, switches and servers. Many times the failures of the components may be correlated resulting a set of connected components failing together. This correlated failure behaviour could be captured through the use of fault regions [1]. This paper explores the effect of such failures in DCNs, using four topologies, viz., Fat Tree, DCell, FlatNet and BCube. We used two categories of metrics for evaluation: connection-oriented metrics, including aggregated bottleneck throughput (ABT), average path length (APL) and routing failure rate (RFR); and network size-oriented metrics, including Component Decomposition Number (CDN) and Smallest/Largest Component Size (SCS/LCS).","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128119587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Geo-replicated storage with scalable deferred update replication 具有可伸缩延迟更新复制的地理复制存储
Daniele Sciascia, F. Pedone
Many current online services are deployed over geographically distributed sites (i.e., datacenters). Such distributed services call for geo-replicated storage, that is, storage distributed and replicated among many sites. Geographical distribution and replication can improve locality and availability of a service. Locality is achieved by moving data closer to the users. High availability is attained by replicating data in multiple servers and sites. This paper considers a class of scalable replicated storage systems based on deferred update replication with transactional properties. The paper discusses different ways to deploy scalable deferred update replication in geographically distributed systems, considers the implications of these deployments on user-perceived latency, and proposes solutions. Our results are substantiated by a series of microbenchmarks and a social network application.
许多当前的在线服务部署在地理上分散的站点(即数据中心)上。这种分布式服务需要地理复制存储,即在许多站点之间分布和复制的存储。地理分布和复制可以改善服务的局部性和可用性。通过将数据移动到离用户更近的地方来实现局部性。高可用性是通过在多个服务器和站点中复制数据实现的。本文研究了一类基于事务属性的延迟更新复制的可扩展复制存储系统。本文讨论了在地理分布系统中部署可伸缩延迟更新复制的不同方法,考虑了这些部署对用户感知延迟的影响,并提出了解决方案。我们的结果得到了一系列微基准测试和一个社交网络应用程序的证实。
{"title":"Geo-replicated storage with scalable deferred update replication","authors":"Daniele Sciascia, F. Pedone","doi":"10.1109/DSN.2013.6575360","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575360","url":null,"abstract":"Many current online services are deployed over geographically distributed sites (i.e., datacenters). Such distributed services call for geo-replicated storage, that is, storage distributed and replicated among many sites. Geographical distribution and replication can improve locality and availability of a service. Locality is achieved by moving data closer to the users. High availability is attained by replicating data in multiple servers and sites. This paper considers a class of scalable replicated storage systems based on deferred update replication with transactional properties. The paper discusses different ways to deploy scalable deferred update replication in geographically distributed systems, considers the implications of these deployments on user-perceived latency, and proposes solutions. Our results are substantiated by a series of microbenchmarks and a social network application.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125138292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Seamless kernel updates 无缝的内核更新
Maxim Siniavine, Ashvin Goel
Kernel patches are released frequently to fix bugs and security vulnerabilities. However, users and system administrators often delay installing these updates because they require a system reboot, which results in disruption of service and the loss of application state. Unfortunately, the longer a system remains out-of-date, the higher is the likelihood of system failure or a successful attack. Approaches, such as dynamic patching and hot swapping, have been proposed for updating the kernel. All of them either limit the types of updates that are supported, or require significant programming effort to manage. We have designed a system that checkpoints application-visible state, updates the kernel, and restores the application state thus minimizing disruption of service. By checkpointing high-level state, our system no longer depends on the precise implementation of a patch and can apply all backward compatible patches. Our results show that updates to major releases of the Linux kernel can be applied with minimal effort and no observable overhead.
经常发布内核补丁以修复错误和安全漏洞。但是,用户和系统管理员经常延迟安装这些更新,因为它们需要重新启动系统,这会导致服务中断和应用程序状态丢失。不幸的是,系统过期的时间越长,系统故障或成功攻击的可能性就越高。已经提出了更新内核的方法,例如动态补丁和热插拔。它们都限制了所支持的更新类型,或者需要大量的编程工作来管理。我们设计了一个检查应用程序可见状态、更新内核和恢复应用程序状态的系统,从而最大限度地减少服务中断。通过检查点高级状态,我们的系统不再依赖于补丁的精确实现,并且可以应用所有向后兼容的补丁。我们的结果表明,对Linux内核的主要版本进行更新只需要很少的工作量,并且没有明显的开销。
{"title":"Seamless kernel updates","authors":"Maxim Siniavine, Ashvin Goel","doi":"10.1109/DSN.2013.6575312","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575312","url":null,"abstract":"Kernel patches are released frequently to fix bugs and security vulnerabilities. However, users and system administrators often delay installing these updates because they require a system reboot, which results in disruption of service and the loss of application state. Unfortunately, the longer a system remains out-of-date, the higher is the likelihood of system failure or a successful attack. Approaches, such as dynamic patching and hot swapping, have been proposed for updating the kernel. All of them either limit the types of updates that are supported, or require significant programming effort to manage. We have designed a system that checkpoints application-visible state, updates the kernel, and restores the application state thus minimizing disruption of service. By checkpointing high-level state, our system no longer depends on the precise implementation of a patch and can apply all backward compatible patches. Our results show that updates to major releases of the Linux kernel can be applied with minimal effort and no observable overhead.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122906167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach 保证无线CPS中适当时间嵌入的安全规则:一种混合形式化建模方法
Feng Tan, Yufei Wang, Qixin Wang, Lei Bu, Rong L. Zheng, N. Suri
Cyber-Physical Systems (CPS) integrate discrete-time computing and continuous-time physical-world entities, which are often wirelessly interlinked. The use of wireless safety critical CPS (control, healthcare etc.) requires safety guarantees despite communication faults. This paper focuses on one important set of such safety rules: Proper-Temporal-Embedding (PTE). Our solution introduces hybrid automata to formally describe and analyze CPS design patterns. We propose a novel lease based design pattern, along with closed-form configuration constraints, to guarantee PTE safety rules under arbitrary wireless communication faults. We propose a formal methodology to transform the design pattern hybrid automata into specific wireless CPS designs. This methodology can effectively isolate physical world parameters from affecting the PTE safety of the resultant specific designs. We conduct a case study on laser tracheotomy wireless CPS to show that the resulting system is safe and can withstand communication disruptions.
信息物理系统(CPS)集成了离散时间计算和连续时间物理世界实体,它们通常是无线互联的。无线安全关键CPS(控制、医疗保健等)的使用需要安全保障,尽管存在通信故障。本文重点讨论了一组重要的安全规则:适当时间嵌入(PTE)。我们的解决方案引入混合自动机来形式化地描述和分析CPS设计模式。我们提出了一种新颖的基于租约的设计模式,以及封闭形式的配置约束,以保证任意无线通信故障下的PTE安全规则。我们提出了一种形式化的方法,将设计模式混合自动机转换为特定的无线CPS设计。这种方法可以有效地将物理世界参数与影响PTE安全性的具体设计隔离开来。我们进行了一个激光气管切开术无线CPS的案例研究,以表明所产生的系统是安全的,可以承受通信中断。
{"title":"Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach","authors":"Feng Tan, Yufei Wang, Qixin Wang, Lei Bu, Rong L. Zheng, N. Suri","doi":"10.1109/DSN.2013.6575357","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575357","url":null,"abstract":"Cyber-Physical Systems (CPS) integrate discrete-time computing and continuous-time physical-world entities, which are often wirelessly interlinked. The use of wireless safety critical CPS (control, healthcare etc.) requires safety guarantees despite communication faults. This paper focuses on one important set of such safety rules: Proper-Temporal-Embedding (PTE). Our solution introduces hybrid automata to formally describe and analyze CPS design patterns. We propose a novel lease based design pattern, along with closed-form configuration constraints, to guarantee PTE safety rules under arbitrary wireless communication faults. We propose a formal methodology to transform the design pattern hybrid automata into specific wireless CPS designs. This methodology can effectively isolate physical world parameters from affecting the PTE safety of the resultant specific designs. We conduct a case study on laser tracheotomy wireless CPS to show that the resulting system is safe and can withstand communication disruptions.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Distal: A framework for implementing fault-tolerant distributed algorithms 远端:实现容错分布式算法的框架
M. Biely, Pamela Delgado, Zarko Milosevic, A. Schiper
We introduce Distal, a new framework that simplifies turning pseudocode of fault tolerant distributed algorithms into efficient executable code. Without proper tool support, even small amounts of pseudocode normally ends up in several thousands of non-trivial lines of Java or C++. Distal is implemented as a library in Scala and consists of two main parts: a domain specific language (DSL) in which algorithms are expressed and an efficient messaging layer that deals with low level issues such as connection management, threading and (de)serialization. The DSL is designed such that implementations of distributed algorithms highly resemble the pseudocode found in research papers. By writing code that is close to the protocol description, one can be more convinced that the implemented system really reflects the protocol specification on paper. Distal does not only make it simple and intuitive to implement distributed algorithms but it also leads to efficient implementations.
我们介绍了一个新的框架,它简化了将容错分布式算法的伪代码转换为高效的可执行代码。如果没有适当的工具支持,即使是少量的伪代码通常也会变成数千行重要的Java或c++代码。远端是作为Scala中的库实现的,由两个主要部分组成:一个领域特定语言(DSL),其中表示算法;一个高效的消息传递层,用于处理连接管理、线程和(反)序列化等低级问题。DSL的设计使得分布式算法的实现与研究论文中发现的伪代码非常相似。通过编写接近协议描述的代码,可以更确信实现的系统确实反映了纸上的协议规范。远端不仅使分布式算法的实现变得简单和直观,而且还导致了高效的实现。
{"title":"Distal: A framework for implementing fault-tolerant distributed algorithms","authors":"M. Biely, Pamela Delgado, Zarko Milosevic, A. Schiper","doi":"10.1109/DSN.2013.6575306","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575306","url":null,"abstract":"We introduce Distal, a new framework that simplifies turning pseudocode of fault tolerant distributed algorithms into efficient executable code. Without proper tool support, even small amounts of pseudocode normally ends up in several thousands of non-trivial lines of Java or C++. Distal is implemented as a library in Scala and consists of two main parts: a domain specific language (DSL) in which algorithms are expressed and an efficient messaging layer that deals with low level issues such as connection management, threading and (de)serialization. The DSL is designed such that implementations of distributed algorithms highly resemble the pseudocode found in research papers. By writing code that is close to the protocol description, one can be more convinced that the implemented system really reflects the protocol specification on paper. Distal does not only make it simple and intuitive to implement distributed algorithms but it also leads to efficient implementations.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114137807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Consistency or latency? A quantitative analysis of replication systems based on replicated state machines 一致性还是延迟?基于复制状态机的复制系统的定量分析
Xu Wang, Hailong Sun, Ting Deng, J. Huai
Existing theories like CAP and PACELC have claimed that there are tradeoffs between some pairs of performance measures in distributed replication systems, such as consistency and latency. However, current systems take a very vague view on how to balance those tradeoffs, e.g. eventual consistency. In this work, we are concerned with providing a quantitative analysis on consistency and latency for widely-used replicated state machines(RSMs). Based on our presented generic RSM model called RSM-d, probabilistic models are built to quantify consistency and latency. We show that both are affected by d, which is the number of ACKs received by the coordinator before committing a write request. And we further define a payoff model through combining the consistency and latency models. Finally, with Monte Carlo based simulation, we validate our presented models and show the effectiveness of our solutions in terms of how to obtain an optimal tradeoff between consistency and latency.
CAP和PACELC等现有理论声称,在分布式复制系统中,存在一些性能度量对之间的权衡,例如一致性和延迟。然而,当前的系统对如何平衡这些权衡(例如最终一致性)的看法非常模糊。在这项工作中,我们关注的是为广泛使用的复制状态机(rsm)提供一致性和延迟的定量分析。基于我们提出的通用RSM模型RSM-d,建立了概率模型来量化一致性和延迟。我们展示了两者都受到d的影响,d是协调器在提交写请求之前收到的ack数。结合一致性模型和延迟模型,进一步定义了收益模型。最后,通过基于蒙特卡罗的仿真,我们验证了我们提出的模型,并展示了我们的解决方案在如何在一致性和延迟之间获得最佳权衡方面的有效性。
{"title":"Consistency or latency? A quantitative analysis of replication systems based on replicated state machines","authors":"Xu Wang, Hailong Sun, Ting Deng, J. Huai","doi":"10.1109/DSN.2013.6575361","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575361","url":null,"abstract":"Existing theories like CAP and PACELC have claimed that there are tradeoffs between some pairs of performance measures in distributed replication systems, such as consistency and latency. However, current systems take a very vague view on how to balance those tradeoffs, e.g. eventual consistency. In this work, we are concerned with providing a quantitative analysis on consistency and latency for widely-used replicated state machines(RSMs). Based on our presented generic RSM model called RSM-d, probabilistic models are built to quantify consistency and latency. We show that both are affected by d, which is the number of ACKs received by the coordinator before committing a write request. And we further define a payoff model through combining the consistency and latency models. Finally, with Monte Carlo based simulation, we validate our presented models and show the effectiveness of our solutions in terms of how to obtain an optimal tradeoff between consistency and latency.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design of event-based Intrusion Detection System on OpenFlow Network OpenFlow网络上基于事件的入侵检测系统设计
Yung-Li Hu, Wei-Bing Su, Li-ying Wu, Yennun Huang, S. Kuo
OpenFlow (OF) Network is a novel network architecture many famous cloud service providers have applied it to build their data center network. The difference between OF Network and traditional network architecture is the decoupling of controller planes and data planes for network management. Intrusion detection is very important in cloud computing to improve system security. Because OF network can improve the response time of an alert by efficiently configuring network flows, we design an event-based Intrusion Detection System (IDS) architecture on OF network.
OpenFlow (OF)网络是一种新颖的网络架构,许多著名的云服务提供商已将其应用于其数据中心网络的构建。OF网络与传统网络架构的不同之处在于网络管理的控制平面和数据平面解耦。在云计算中,入侵检测是提高系统安全性的重要手段。由于OF网络可以通过有效地配置网络流来提高告警的响应时间,我们在OF网络上设计了一种基于事件的入侵检测系统架构。
{"title":"Design of event-based Intrusion Detection System on OpenFlow Network","authors":"Yung-Li Hu, Wei-Bing Su, Li-ying Wu, Yennun Huang, S. Kuo","doi":"10.1109/DSN.2013.6575335","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575335","url":null,"abstract":"OpenFlow (OF) Network is a novel network architecture many famous cloud service providers have applied it to build their data center network. The difference between OF Network and traditional network architecture is the decoupling of controller planes and data planes for network management. Intrusion detection is very important in cloud computing to improve system security. Because OF network can improve the response time of an alert by efficiently configuring network flows, we design an event-based Intrusion Detection System (IDS) architecture on OF network.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133313559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Lumpability of fluid models with heterogeneous agent types 具有异质介质类型的流体模型的集总性
G. Iacobelli, M. Tribastone
Fluid models have gained popularity in the performance modeling of computing systems and communication networks. When the model under study consists of many different types of agents, the size of the associated system of ordinary differential equations (ODEs) increases with the number of types, making the analysis more difficult. We study this problem for a class of models where heterogeneity is expressed as a perturbation of certain parameters of the ODE vector field. We provide an a-priori bound that relates the solutions of the original, heterogenous model with that of an ODE system of smaller size which arises from aggregating system variables concerning different types of agents. By showing that this bound grows linearly with the intensity of the perturbation, we provide a formal justification to the intuitive possibility of neglecting small differences in agents' behavior as a means to reducing the dimensionality of the original system.
流体模型在计算系统和通信网络的性能建模中得到了广泛的应用。当所研究的模型由许多不同类型的智能体组成时,相关的常微分方程系统(ode)的大小随着类型的增加而增加,使分析变得更加困难。我们研究了一类模型的这一问题,其中异质性被表示为ODE向量场的某些参数的扰动。我们提供了一个先验界,将原始的异构模型的解与较小尺寸的ODE系统的解联系起来,该系统由涉及不同类型代理的系统变量聚合而成。通过表明该边界随扰动强度线性增长,我们为忽略代理行为中的微小差异作为降低原始系统维数的一种手段的直观可能性提供了形式证明。
{"title":"Lumpability of fluid models with heterogeneous agent types","authors":"G. Iacobelli, M. Tribastone","doi":"10.1109/DSN.2013.6575346","DOIUrl":"https://doi.org/10.1109/DSN.2013.6575346","url":null,"abstract":"Fluid models have gained popularity in the performance modeling of computing systems and communication networks. When the model under study consists of many different types of agents, the size of the associated system of ordinary differential equations (ODEs) increases with the number of types, making the analysis more difficult. We study this problem for a class of models where heterogeneity is expressed as a perturbation of certain parameters of the ODE vector field. We provide an a-priori bound that relates the solutions of the original, heterogenous model with that of an ODE system of smaller size which arises from aggregating system variables concerning different types of agents. By showing that this bound grows linearly with the intensity of the perturbation, we provide a formal justification to the intuitive possibility of neglecting small differences in agents' behavior as a means to reducing the dimensionality of the original system.","PeriodicalId":163407,"journal":{"name":"2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132741362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1