首页 > 最新文献

2011 7th International Conference on Network and Service Management最新文献

英文 中文
Increasing data center network visibility with cisco NetFlow-Lite 使用cisco NetFlow-Lite提高数据中心网络可视性
Pub Date : 2011-10-24 DOI: 10.5555/2147671.2147716
L. Deri, Ellie Chou, Zach Cherian, Kedar Karmarkar, M. Patterson
NetFlow is the de-facto protocol used to collect IP traffic information by categorizing packets in flows and obtain important flow information, such as IP address, TCP/UDP ports, byte counts. With information obtained from NetFlow, IT managers can gain insights into the activities in the network. NetFlow has become a key tool for network troubleshooting, capacity planning, and anomaly detection. Due to its nature to examine every packet, NetFlow is often implemented on expensive custom ASIC or else suffer major performance hit for packet forwarding, thus limit the adoption. NetFlow-Lite bridges the gap as a lower-cost solution, providing the network visibility similar to those delivered by NetFlow. This paper describes the architecture and implementation of NetFlow-Lite, and how it integrates with nProbe to provide a scalable and easy-to-adopt solution. The validation phase carried on Catalyst 4948E switches has demonstrated that NetFlow-Lite can efficiently monitor high-speed networks and deliver results similar to those provided by NetFlow with satisfactory accuracy.
NetFlow是一种事实上的协议,它通过对流中的数据包进行分类,收集IP流量信息,获取重要的流信息,如IP地址、TCP/UDP端口、字节数等。利用从NetFlow获得的信息,IT经理可以深入了解网络中的活动。NetFlow已成为网络故障处理、容量规划和异常检测的重要工具。由于其检查每个数据包的性质,NetFlow通常在昂贵的定制ASIC上实现,否则会在数据包转发方面遭受重大性能打击,从而限制了采用。NetFlow- lite作为一种低成本的解决方案弥补了这一差距,提供了与NetFlow类似的网络可见性。本文介绍了NetFlow-Lite的架构和实现,以及它如何与nProbe集成以提供可扩展且易于采用的解决方案。在Catalyst 4948E交换机上进行的验证阶段表明,NetFlow- lite可以有效地监控高速网络,并提供与NetFlow相似的结果,并且具有令人满意的准确性。
{"title":"Increasing data center network visibility with cisco NetFlow-Lite","authors":"L. Deri, Ellie Chou, Zach Cherian, Kedar Karmarkar, M. Patterson","doi":"10.5555/2147671.2147716","DOIUrl":"https://doi.org/10.5555/2147671.2147716","url":null,"abstract":"NetFlow is the de-facto protocol used to collect IP traffic information by categorizing packets in flows and obtain important flow information, such as IP address, TCP/UDP ports, byte counts. With information obtained from NetFlow, IT managers can gain insights into the activities in the network. NetFlow has become a key tool for network troubleshooting, capacity planning, and anomaly detection. Due to its nature to examine every packet, NetFlow is often implemented on expensive custom ASIC or else suffer major performance hit for packet forwarding, thus limit the adoption. NetFlow-Lite bridges the gap as a lower-cost solution, providing the network visibility similar to those delivered by NetFlow. This paper describes the architecture and implementation of NetFlow-Lite, and how it integrates with nProbe to provide a scalable and easy-to-adopt solution. The validation phase carried on Catalyst 4948E switches has demonstrated that NetFlow-Lite can efficiently monitor high-speed networks and deliver results similar to those provided by NetFlow with satisfactory accuracy.","PeriodicalId":178441,"journal":{"name":"2011 7th International Conference on Network and Service Management","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126828861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Internet Bad Neighborhoods: The spam case 互联网不良社区:垃圾邮件案例
Pub Date : 2011-10-24 DOI: 10.5555/2147671.2147681
G. Moura, R. Sadre, A. Pras
A significant part of current attacks on the Internet comes from compromised hosts that, usually, take part in botnets. Even though bots themselves can be distributed all over the world, there is evidence that most of the malicious hosts are, in fact, concentrated in small fractions of the IP address space, on certain networks. Based on that, the Bad Neighborhood concept was introduced. The general idea of Bad Neighborhoods is to rate a subnetwork by the number of malicious hosts that have been observed in that subnetwork. Even though Bad Neighborhoods were successfully employed in mail filtering, the very concept was not investigated in further details. Therefore, in this work we provide a closer look on it, by proposing four definitions for spam-based Bad Neighborhoods that take into account the way spammers operate. We apply the definitions to real world data sets and show that they provide valuable insight into the behavior of spammers and the networks hosting them. Among our findings, we show that 10% of the Bad Neighborhoods are responsible for the majority of spam.
目前对互联网的攻击有很大一部分来自通常参与僵尸网络的受损主机。尽管机器人本身可以分布在世界各地,但有证据表明,大多数恶意主机实际上集中在某些网络上的一小部分IP地址空间中。在此基础上,提出了Bad Neighborhood的概念。坏邻居的一般思想是根据在该子网中观察到的恶意主机的数量对该子网进行评级。尽管Bad Neighborhoods成功地应用于邮件过滤,但这个概念并没有得到进一步的详细研究。因此,在这项工作中,我们通过提出基于垃圾邮件的坏社区的四个定义,考虑到垃圾邮件发送者的运作方式,对其进行了更深入的研究。我们将这些定义应用于真实世界的数据集,并展示了它们对垃圾邮件发送者和承载它们的网络的行为提供了有价值的见解。在我们的研究结果中,我们发现10%的坏邻居是大多数垃圾邮件的罪魁祸首。
{"title":"Internet Bad Neighborhoods: The spam case","authors":"G. Moura, R. Sadre, A. Pras","doi":"10.5555/2147671.2147681","DOIUrl":"https://doi.org/10.5555/2147671.2147681","url":null,"abstract":"A significant part of current attacks on the Internet comes from compromised hosts that, usually, take part in botnets. Even though bots themselves can be distributed all over the world, there is evidence that most of the malicious hosts are, in fact, concentrated in small fractions of the IP address space, on certain networks. Based on that, the Bad Neighborhood concept was introduced. The general idea of Bad Neighborhoods is to rate a subnetwork by the number of malicious hosts that have been observed in that subnetwork. Even though Bad Neighborhoods were successfully employed in mail filtering, the very concept was not investigated in further details. Therefore, in this work we provide a closer look on it, by proposing four definitions for spam-based Bad Neighborhoods that take into account the way spammers operate. We apply the definitions to real world data sets and show that they provide valuable insight into the behavior of spammers and the networks hosting them. Among our findings, we show that 10% of the Bad Neighborhoods are responsible for the majority of spam.","PeriodicalId":178441,"journal":{"name":"2011 7th International Conference on Network and Service Management","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Enforcing security with behavioral fingerprinting 通过行为指纹来加强安全性
Pub Date : 2011-10-24 DOI: 10.5555/2147671.2147682
J. François, R. State, T. Engel, O. Festor
Although fingerprinting techniques are helpful for security assessment, they have limited support to advanced security related applications. We have developed a new security framework focusing especially on the authentication reinforcement and the automatic generation of stateful firewall rules based on behavioral fingerprinting. Such fingerprinting is highly effective in capturing sequential patterns in the behavior of a device. A new machine learning technique is also adapted to monitor high speed networks by evaluating both computational complexity and experimented performances.
虽然指纹识别技术对安全评估有帮助,但对高级安全相关应用的支持有限。我们开发了一个新的安全框架,特别关注身份验证增强和基于行为指纹的有状态防火墙规则的自动生成。这种指纹识别在捕捉设备行为的顺序模式方面非常有效。一种新的机器学习技术也适用于通过评估计算复杂性和实验性能来监测高速网络。
{"title":"Enforcing security with behavioral fingerprinting","authors":"J. François, R. State, T. Engel, O. Festor","doi":"10.5555/2147671.2147682","DOIUrl":"https://doi.org/10.5555/2147671.2147682","url":null,"abstract":"Although fingerprinting techniques are helpful for security assessment, they have limited support to advanced security related applications. We have developed a new security framework focusing especially on the authentication reinforcement and the automatic generation of stateful firewall rules based on behavioral fingerprinting. Such fingerprinting is highly effective in capturing sequential patterns in the behavior of a device. A new machine learning technique is also adapted to monitor high speed networks by evaluating both computational complexity and experimented performances.","PeriodicalId":178441,"journal":{"name":"2011 7th International Conference on Network and Service Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129928703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A service management architecture component model 服务管理体系结构组件模型
Pub Date : 2011-10-24 DOI: 10.5555/2147671.2147725
Jianwen Chen, R. Childress, Iain Mcintosh, George Africa, Arthur Sitaramayya
In this paper, we are proposing a four-layer enterprise architecture model for service management. The aim of the proposed architecture is to provide a framework for the automated, centralized, real-time enterprise service management solution. We developed a component model to address the functional requirements for different integrated service management functions.
在本文中,我们提出了一个用于服务管理的四层企业架构模型。所建议的体系结构的目的是为自动化、集中式、实时的企业服务管理解决方案提供一个框架。我们开发了一个组件模型来满足不同集成服务管理功能的功能需求。
{"title":"A service management architecture component model","authors":"Jianwen Chen, R. Childress, Iain Mcintosh, George Africa, Arthur Sitaramayya","doi":"10.5555/2147671.2147725","DOIUrl":"https://doi.org/10.5555/2147671.2147725","url":null,"abstract":"In this paper, we are proposing a four-layer enterprise architecture model for service management. The aim of the proposed architecture is to provide a framework for the automated, centralized, real-time enterprise service management solution. We developed a component model to address the functional requirements for different integrated service management functions.","PeriodicalId":178441,"journal":{"name":"2011 7th International Conference on Network and Service Management","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133344105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Criticality avoidance: A new paradigm for congestion control based on science of phase transition 临界避免:一种基于相变科学的拥塞控制新范式
Pub Date : 2011-10-24 DOI: 10.5555/2147671.2147720
S. Mau, A. Vashist, A. Poylisher, R. Chadha, C. Chiang
Network QoS control is generally difficult due to the complexity, dynamism, and limited measurability of networks. As an alternative, we seek a network phenomenon that is simple, universal and consequential to control. The result is a framework for proactive dynamic network congestion control that is based on the science of continuous phase transition. Key beneficial properties of continuous phase transition are its early onset warning signs and universality. The former allows the detection of proximity to congestion before its occurrence; while the latter implies that any criticality-based network control would likely be insensitive to network details and, in particular, not require any a-priori knowledge of the values of critical loads. Preliminary experimental results demonstrating these promises are presented.
由于网络的复杂性、动态性和有限的可测量性,网络QoS控制通常是困难的。作为另一种选择,我们寻求一种简单、普遍和重要的网络现象来控制。其结果是一个基于连续相变科学的主动动态网络拥塞控制框架。连续相变的关键有益特性是它的早期预警信号和普遍性。前者允许在拥塞发生之前检测到其接近程度;而后者意味着任何基于临界的网络控制都可能对网络细节不敏感,特别是不需要任何关于临界负载值的先验知识。初步的实验结果证明了这些前景。
{"title":"Criticality avoidance: A new paradigm for congestion control based on science of phase transition","authors":"S. Mau, A. Vashist, A. Poylisher, R. Chadha, C. Chiang","doi":"10.5555/2147671.2147720","DOIUrl":"https://doi.org/10.5555/2147671.2147720","url":null,"abstract":"Network QoS control is generally difficult due to the complexity, dynamism, and limited measurability of networks. As an alternative, we seek a network phenomenon that is simple, universal and consequential to control. The result is a framework for proactive dynamic network congestion control that is based on the science of continuous phase transition. Key beneficial properties of continuous phase transition are its early onset warning signs and universality. The former allows the detection of proximity to congestion before its occurrence; while the latter implies that any criticality-based network control would likely be insensitive to network details and, in particular, not require any a-priori knowledge of the values of critical loads. Preliminary experimental results demonstrating these promises are presented.","PeriodicalId":178441,"journal":{"name":"2011 7th International Conference on Network and Service Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 7th International Conference on Network and Service Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1