首页 > 最新文献

NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium最新文献

英文 中文
SSH Kernel: A Jupyter Extension Specifically for Remote Infrastructure Administration SSH内核:专门用于远程基础设施管理的Jupyter扩展
Pub Date : 2020-01-01 DOI: 10.1109/NOMS47738.2020.9110404
Masaru Ueno, Yuji Imai
{"title":"SSH Kernel: A Jupyter Extension Specifically for Remote Infrastructure Administration","authors":"Masaru Ueno, Yuji Imai","doi":"10.1109/NOMS47738.2020.9110404","DOIUrl":"https://doi.org/10.1109/NOMS47738.2020.9110404","url":null,"abstract":"","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"30 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72959253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual emulation for Ethereum's virtual machine 以太坊虚拟机的可视化仿真
Pub Date : 2018-07-09 DOI: 10.1109/NOMS.2018.8406332
Robert Norvill, Beltran Borja Fiz Pontiveros, R. State, A. Cullen
In this work we present E-EVM, a tool that emulates and visualises the execution of smart contracts on the Ethereum Virtual Machine. By working with the readily available bytecode of smart contracts we are able to display the program's control flow graph, opcodes and stack for each step of contract execution. This tool is designed to aid the user's understanding of the Etheruem Virtual Machine as well as aid the analysis of any given smart contract. As such, it functions as both an analysis and a learning tool. It allows the user to view the code in each block of a smart contract and follow possible control flow branches. It is able to detect loops and suggest optimisation candidates. It is possible to step through a contract one opcode at a time. E-EVM achieved an average of 85.6% code coverage when tested.
在这项工作中,我们介绍了E-EVM,这是一种在以太坊虚拟机上模拟和可视化智能合约执行的工具。通过使用智能合约的字节码,我们能够显示程序的控制流图、操作码和合约执行的每个步骤的堆栈。该工具旨在帮助用户理解以太坊虚拟机,并帮助分析任何给定的智能合约。因此,它既是一个分析工具,也是一个学习工具。它允许用户查看智能合约的每个块中的代码,并遵循可能的控制流分支。它能够检测循环并建议优化候选。可以一次对一个操作码执行一个合约。E-EVM在测试时平均达到了85.6%的代码覆盖率。
{"title":"Visual emulation for Ethereum's virtual machine","authors":"Robert Norvill, Beltran Borja Fiz Pontiveros, R. State, A. Cullen","doi":"10.1109/NOMS.2018.8406332","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406332","url":null,"abstract":"In this work we present E-EVM, a tool that emulates and visualises the execution of smart contracts on the Ethereum Virtual Machine. By working with the readily available bytecode of smart contracts we are able to display the program's control flow graph, opcodes and stack for each step of contract execution. This tool is designed to aid the user's understanding of the Etheruem Virtual Machine as well as aid the analysis of any given smart contract. As such, it functions as both an analysis and a learning tool. It allows the user to view the code in each block of a smart contract and follow possible control flow branches. It is able to detect loops and suggest optimisation candidates. It is possible to step through a contract one opcode at a time. E-EVM achieved an average of 85.6% code coverage when tested.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76269053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Analyzing throughput and stability in cellular networks 蜂窝网络的吞吐量和稳定性分析
Pub Date : 2018-07-09 DOI: 10.1109/NOMS.2018.8406261
Ermias Andargie Walelgne, J. Manner, Vaibhav Bajpai, J. Ott
The throughput of a cellular network depends on a number of factors such as radio technology, limitations of device hardware (e.g., chipsets, antennae), physical layer effects (interference, fading, etc.), node density and demand, user mobility, and the infrastructure of Mobile Network Operators (MNO). Therefore, understanding and identifying the key factors of cellular network performance that affect end-users experience is a challenging task. We use a dataset collected using netradar, a platform that measures cellular network performance crowd- sourced from mobile user devices. Using this dataset we develop a methodology (a classifier using a machine learning approach) for understanding cellular network performance. We examine key characteristics of cellular networks related to throughput from the perspective of mobile user activity, MNO, smartphone models, link stability, location and time of day. We perform a network-wide correlation and statistical analysis to obtain a basic understanding of the influence of individual factors. We use a machine learning approach to identify the important features and to understand the relationship between different ones. These features are then used to build a model to classify the stability of cellular network based on the data reception characteristics of the user. We show that it is possible to classify reasons for network instability using minimal cellular network metrics with up to 90% of accuracy.
蜂窝网络的吞吐量取决于许多因素,如无线电技术、设备硬件(如芯片组、天线)的限制、物理层效应(干扰、衰落等)、节点密度和需求、用户移动性以及移动网络运营商(MNO)的基础设施。因此,理解和确定影响终端用户体验的蜂窝网络性能的关键因素是一项具有挑战性的任务。我们使用使用netradar收集的数据集,这是一个测量蜂窝网络性能的平台,来自移动用户设备。使用这个数据集,我们开发了一种方法(使用机器学习方法的分类器)来理解蜂窝网络的性能。我们从移动用户活动、MNO、智能手机型号、链路稳定性、位置和时间的角度研究了与吞吐量相关的蜂窝网络的关键特征。我们进行了网络范围内的相关和统计分析,以获得对个体因素影响的基本了解。我们使用机器学习方法来识别重要的特征,并理解不同特征之间的关系。然后利用这些特征建立基于用户数据接收特征的蜂窝网络稳定性分类模型。我们表明,可以使用最小的蜂窝网络指标对网络不稳定的原因进行分类,准确率高达90%。
{"title":"Analyzing throughput and stability in cellular networks","authors":"Ermias Andargie Walelgne, J. Manner, Vaibhav Bajpai, J. Ott","doi":"10.1109/NOMS.2018.8406261","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406261","url":null,"abstract":"The throughput of a cellular network depends on a number of factors such as radio technology, limitations of device hardware (e.g., chipsets, antennae), physical layer effects (interference, fading, etc.), node density and demand, user mobility, and the infrastructure of Mobile Network Operators (MNO). Therefore, understanding and identifying the key factors of cellular network performance that affect end-users experience is a challenging task. We use a dataset collected using netradar, a platform that measures cellular network performance crowd- sourced from mobile user devices. Using this dataset we develop a methodology (a classifier using a machine learning approach) for understanding cellular network performance. We examine key characteristics of cellular networks related to throughput from the perspective of mobile user activity, MNO, smartphone models, link stability, location and time of day. We perform a network-wide correlation and statistical analysis to obtain a basic understanding of the influence of individual factors. We use a machine learning approach to identify the important features and to understand the relationship between different ones. These features are then used to build a model to classify the stability of cellular network based on the data reception characteristics of the user. We show that it is possible to classify reasons for network instability using minimal cellular network metrics with up to 90% of accuracy.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"58 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2018-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84702230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Network events in a large commercial network: What can we learn? 大型商业网络中的网络事件:我们能学到什么?
Pub Date : 2018-07-09 DOI: 10.1109/NOMS.2018.8406289
Antoine Messager, G. Parisis, R. Harper, P. Tee, I. Kiss, L. Berthouze
ISP and commercial networks are complex and thus difficult to characterise and manage. Network operators rely on a continuous flow of event log messages to identify and handle service outages. However, there is little published information about such events and how they are typically exploited. In this paper, we describe in as much detail as possible the event logs and network topology of a major commercial network. Through analysing the network topology, textual information of events and time of events, we highlight opportunities and challenges brought by such data. In particular, we suggest that the development of methods for inferring functional connectivity could unlock more of the informational value of event log messages and assist network management operators.
ISP和商业网络是复杂的,因此难以描述和管理。网络运营商依靠连续的事件日志消息流来识别和处理服务中断。然而,关于此类事件以及它们通常如何被利用的公开信息很少。在本文中,我们尽可能详细地描述了一个主要商业网络的事件日志和网络拓扑结构。通过对网络拓扑、事件文本信息和事件时间的分析,突出这些数据带来的机遇和挑战。特别是,我们建议开发推断功能连通性的方法,可以释放事件日志消息的更多信息价值,并帮助网络管理运营商。
{"title":"Network events in a large commercial network: What can we learn?","authors":"Antoine Messager, G. Parisis, R. Harper, P. Tee, I. Kiss, L. Berthouze","doi":"10.1109/NOMS.2018.8406289","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406289","url":null,"abstract":"ISP and commercial networks are complex and thus difficult to characterise and manage. Network operators rely on a continuous flow of event log messages to identify and handle service outages. However, there is little published information about such events and how they are typically exploited. In this paper, we describe in as much detail as possible the event logs and network topology of a major commercial network. Through analysing the network topology, textual information of events and time of events, we highlight opportunities and challenges brought by such data. In particular, we suggest that the development of methods for inferring functional connectivity could unlock more of the informational value of event log messages and assist network management operators.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"16 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87170593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Telephony Denial of Service defense at data plane (TDoSD@DP) 数据面的电话拒绝服务防御(TDoSD@DP)
Pub Date : 2018-07-06 DOI: 10.1109/NOMS.2018.8406281
Aldo Febro, Hannan Xiao, Joseph Spring
The Session Initiation Protocol (SIP) is an application-layer control protocol used to establish and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an attacker causes a Telephony Denial of Service (TDoS) incident, during which legitimate users are unable to use telephony services. Legacy TDoS defense is typically implemented as network appliances and not sufficiently deployed to enable early detection. To make TDoS defense more widely deployed and yet affordable, this paper presents TDoSD@DP where TDoS detection and mitigation is programmed at the data plane so that it can be enabled on every switch port and therefore serves as distributed SIP sensors. With this approach, the damage is isolated at a particular switch and bandwidth saved by not sending attack packets further upstream. Experiments have been performed to track the SIP state machine and to limit the number of active SIP session per port. The results show that TDoSD@DP was able to detect and mitigate ongoing INVITE flood attack, protecting the SIP server, and limiting the damage to a local switch. Bringing the TDoS defense function to the data plane provides a novel data plane application that operates at the SIP protocol and a novel approach for TDoS defense implementation.
会话发起协议(SIP)是一个应用层控制协议,用于建立和终止全局部署的呼叫。攻击者发送大量SIP INVITE报文,导致合法用户无法使用电话业务的TDoS (telephone Denial of Service)事件。传统的TDoS防御通常作为网络设备来实现,并且没有充分部署以支持早期检测。为了使TDoS防御更广泛地部署并且价格合理,本文提出了TDoSD@DP,其中TDoS检测和缓解在数据平面编程,以便它可以在每个交换机端口上启用,因此可以用作分布式SIP传感器。使用这种方法,损害被隔离在特定的交换机上,并且由于不向上游发送攻击数据包而节省了带宽。已经执行了一些实验来跟踪SIP状态机并限制每个端口的活动SIP会话的数量。结果表明,TDoSD@DP能够检测和减轻正在进行的INVITE洪水攻击,保护SIP服务器,并限制对本地交换机的损害。将TDoS防御功能引入数据平面提供了一个在SIP协议下操作的新颖数据平面应用程序,并为TDoS防御实现提供了一种新的方法。
{"title":"Telephony Denial of Service defense at data plane (TDoSD@DP)","authors":"Aldo Febro, Hannan Xiao, Joseph Spring","doi":"10.1109/NOMS.2018.8406281","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406281","url":null,"abstract":"The Session Initiation Protocol (SIP) is an application-layer control protocol used to establish and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an attacker causes a Telephony Denial of Service (TDoS) incident, during which legitimate users are unable to use telephony services. Legacy TDoS defense is typically implemented as network appliances and not sufficiently deployed to enable early detection. To make TDoS defense more widely deployed and yet affordable, this paper presents TDoSD@DP where TDoS detection and mitigation is programmed at the data plane so that it can be enabled on every switch port and therefore serves as distributed SIP sensors. With this approach, the damage is isolated at a particular switch and bandwidth saved by not sending attack packets further upstream. Experiments have been performed to track the SIP state machine and to limit the number of active SIP session per port. The results show that TDoSD@DP was able to detect and mitigate ongoing INVITE flood attack, protecting the SIP server, and limiting the damage to a local switch. Bringing the TDoS defense function to the data plane provides a novel data plane application that operates at the SIP protocol and a novel approach for TDoS defense implementation.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87361731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Cachalot: A network-aware, cooperative cache network for geo-distributed, data-intensive applications Cachalot:一种网络感知的协作缓存网络,用于地理分布的数据密集型应用程序
Pub Date : 2018-07-06 DOI: 10.1109/NOMS.2018.8406273
Fan Jiang, C. Castillo, S. Ahalt
Collaborative and data-intensive applications are hosted on geo-distributed infrastructures to exploit computing resources at scale. However, these applications typically incur massive data transfers over bandwidth-constrained wide- area networks (WANs) which impose significant performance overhead. Conventional distributed computing platforms (e.g., Spark) leverage caching to avoid duplicate executions of common computations and thus reduce network traffic. However, these techniques were developed for data center environments and therefore lack advanced network-aware mechanisms to support high-performance, data-intensive applications over the WAN in geo-distributed environments. Hence, we develop Cachalot - a novel network-aware, cooperative cache network for caching datasets generated by common computations shared among geo- distributed, data-intensive applications. We perform a simulation- based deep evaluation using both synthetic and real traces. The experimental results indicate Cachalot speeds up data-intensive applications by over 50%, reducing network traffic by up to 60%; and, outperforms state-of-the-art baselines by over 20% in geo-distributed environments for various common user-driven performance metrics.
协作和数据密集型应用程序托管在地理分布式基础设施上,以大规模地利用计算资源。然而,这些应用程序通常会在带宽受限的广域网(wan)上产生大量数据传输,从而带来显著的性能开销。传统的分布式计算平台(例如,Spark)利用缓存来避免重复执行公共计算,从而减少网络流量。然而,这些技术是为数据中心环境开发的,因此缺乏先进的网络感知机制来支持地理分布环境中WAN上的高性能、数据密集型应用程序。因此,我们开发了Cachalot——一种新颖的网络感知、协作缓存网络,用于缓存由地理分布的、数据密集型应用程序之间共享的公共计算生成的数据集。我们使用合成轨迹和真实轨迹进行了基于仿真的深度评估。实验结果表明,Cachalot将数据密集型应用程序的速度提高了50%以上,将网络流量减少了60%;并且,在地理分布环境中,对于各种常见的用户驱动的性能指标,其性能比最先进的基线高出20%以上。
{"title":"Cachalot: A network-aware, cooperative cache network for geo-distributed, data-intensive applications","authors":"Fan Jiang, C. Castillo, S. Ahalt","doi":"10.1109/NOMS.2018.8406273","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406273","url":null,"abstract":"Collaborative and data-intensive applications are hosted on geo-distributed infrastructures to exploit computing resources at scale. However, these applications typically incur massive data transfers over bandwidth-constrained wide- area networks (WANs) which impose significant performance overhead. Conventional distributed computing platforms (e.g., Spark) leverage caching to avoid duplicate executions of common computations and thus reduce network traffic. However, these techniques were developed for data center environments and therefore lack advanced network-aware mechanisms to support high-performance, data-intensive applications over the WAN in geo-distributed environments. Hence, we develop Cachalot - a novel network-aware, cooperative cache network for caching datasets generated by common computations shared among geo- distributed, data-intensive applications. We perform a simulation- based deep evaluation using both synthetic and real traces. The experimental results indicate Cachalot speeds up data-intensive applications by over 50%, reducing network traffic by up to 60%; and, outperforms state-of-the-art baselines by over 20% in geo-distributed environments for various common user-driven performance metrics.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"5 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2018-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89813106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation and experimental demonstration of SDN-enabled flexi-grid optical domain controller based on NETCONF/YANG 基于NETCONF/YANG的sdn柔性网格光域控制器评估与实验演示
Pub Date : 2018-07-06 DOI: 10.1109/NOMS.2018.8406170
Bogdan-Mihai Andrus, A. Autenrieth, T. Szyrkowiec, J. Olmos, I. Monroy
Flexible spectrum assignment in Elastic Optical Networks (EON) has emerged as a potential solution for allowing dynamic and elastic management of available bandwidth resources. In this paper, we demonstrate and evaluate our developed flexi-grid optical domain controller based on NETCONF/YANG. Our proposed modular architecture, based on Finite State Machines (FSMs), allows the flexibility to deploy the controller either in a centralized or in a distributed state for on the fly encrypted device management connections. A testbed composed of two physical Sliceable Bandwidth Variable Transponders (SBVTs) and an emulated flexi-grid optical network was used for our software evaluation. Controller startup and synchronization time, as well as media channel setup time are evaluated to compare the two deployment options and assess network scaling effects. Results demonstrate that our software is scalable by maintaining a relatively constant startup time on the networks tested (i.e., 1 to 64 nodes) in both deployment options. Software scalability is also supported by the media channel setup time, which presents a modest log scale growth when increasing the number of nodes from one to 64.
弹性光网络(EON)中的灵活频谱分配已成为允许动态和弹性管理可用带宽资源的潜在解决方案。本文对基于NETCONF/YANG的柔性网格光域控制器进行了演示和评价。我们提出的模块化架构,基于有限状态机(FSMs),允许灵活地将控制器部署在集中式或分布式状态,用于动态加密设备管理连接。一个由两个物理可切片带宽可变转发器(sbvt)和一个模拟柔性网格光网络组成的测试平台用于我们的软件评估。对控制器启动和同步时间以及媒体通道设置时间进行评估,以比较两种部署选项并评估网络扩展效果。结果表明,在两种部署选项中,通过在测试网络(即1到64个节点)上保持相对恒定的启动时间,我们的软件是可扩展的。媒体通道设置时间也支持软件可伸缩性,当节点数量从1增加到64时,它呈现适度的对数尺度增长。
{"title":"Evaluation and experimental demonstration of SDN-enabled flexi-grid optical domain controller based on NETCONF/YANG","authors":"Bogdan-Mihai Andrus, A. Autenrieth, T. Szyrkowiec, J. Olmos, I. Monroy","doi":"10.1109/NOMS.2018.8406170","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406170","url":null,"abstract":"Flexible spectrum assignment in Elastic Optical Networks (EON) has emerged as a potential solution for allowing dynamic and elastic management of available bandwidth resources. In this paper, we demonstrate and evaluate our developed flexi-grid optical domain controller based on NETCONF/YANG. Our proposed modular architecture, based on Finite State Machines (FSMs), allows the flexibility to deploy the controller either in a centralized or in a distributed state for on the fly encrypted device management connections. A testbed composed of two physical Sliceable Bandwidth Variable Transponders (SBVTs) and an emulated flexi-grid optical network was used for our software evaluation. Controller startup and synchronization time, as well as media channel setup time are evaluated to compare the two deployment options and assess network scaling effects. Results demonstrate that our software is scalable by maintaining a relatively constant startup time on the networks tested (i.e., 1 to 64 nodes) in both deployment options. Software scalability is also supported by the media channel setup time, which presents a modest log scale growth when increasing the number of nodes from one to 64.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"98 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77029476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Economic incentives on DNSSEC deployment: Time to move from quantity to quality 部署DNSSEC的经济激励:从数量转向质量
Pub Date : 2018-07-06 DOI: 10.1109/NOMS.2018.8406223
Tho V. Le, R. V. Rijswijk-Deij, Luca Allodi, Nicola Zannone
The security extensions to the DNS (DNSSEC) currently cover approximately 3% of all domains worldwide. In response to the low deployment of DNSSEC, a few top-level domains started offering 'per-domain' economic incentives to encourage adoption of the protocol by offering a yearly discount on each signed domain. However, it remains unclear whether these incentives are well-balanced and foster the overall security of the infrastructure as well as its deployment at scale. In this paper we argue that, in the presence of fixed costs of deployment, misaligned 'per-domain' incentives may have the collateral effect of encouraging large operators to massively deploy unsecure implementations of DNSSEC, whereas smaller operators, for which the effect of the economic incentive is negli­gible, may not significantly benefit from it. To investigate this, we study the security of DNSSEC deployment at scale, particularly in TLDs that offer economic incentives. We find that the security of DNSSEC implementations in the wild poorly reflects standard recommendations, particularly for tasks that cannot be solved by triggering a flag in the DNS software service (e.g. key rollover). Further, we find that, on average, large operators deploy weak DNSSEC security more frequently than small DNSSEC operators, suggesting that current incentives are ineffective in promoting a secure adoption and in deterring insecure implementations. We conclude the paper with actionable recommendations for TLD registry operators to improve the alignment of economic incentives with secure DNSSEC requirements.
DNS的安全扩展(DNSSEC)目前覆盖了全球约3%的域名。为了应对DNSSEC的低部署,一些顶级域名开始提供“每个域名”的经济激励措施,通过为每个签署的域名提供年度折扣来鼓励采用该协议。然而,目前尚不清楚这些激励措施是否平衡,是否能促进基础设施的整体安全以及大规模部署。在本文中,我们认为,在存在固定部署成本的情况下,不一致的“每域”激励可能会产生鼓励大型运营商大规模部署不安全的DNSSEC实施的附带效应,而较小的运营商,其经济激励的影响可以忽略不计,可能不会从中显著受益。为了调查这一点,我们研究了大规模部署DNSSEC的安全性,特别是在提供经济激励的顶级域名中。我们发现DNSSEC实现的安全性很差地反映了标准建议,特别是对于无法通过触发DNS软件服务中的标志来解决的任务(例如密钥轮转)。此外,我们发现,平均而言,大型运营商比小型DNSSEC运营商更频繁地部署弱DNSSEC安全性,这表明目前的激励措施在促进安全采用和阻止不安全实施方面是无效的。最后,我们为TLD注册管理运营商提供了可行的建议,以改善经济激励与安全DNSSEC要求的一致性。
{"title":"Economic incentives on DNSSEC deployment: Time to move from quantity to quality","authors":"Tho V. Le, R. V. Rijswijk-Deij, Luca Allodi, Nicola Zannone","doi":"10.1109/NOMS.2018.8406223","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406223","url":null,"abstract":"The security extensions to the DNS (DNSSEC) currently cover approximately 3% of all domains worldwide. In response to the low deployment of DNSSEC, a few top-level domains started offering 'per-domain' economic incentives to encourage adoption of the protocol by offering a yearly discount on each signed domain. However, it remains unclear whether these incentives are well-balanced and foster the overall security of the infrastructure as well as its deployment at scale. In this paper we argue that, in the presence of fixed costs of deployment, misaligned 'per-domain' incentives may have the collateral effect of encouraging large operators to massively deploy unsecure implementations of DNSSEC, whereas smaller operators, for which the effect of the economic incentive is negli­gible, may not significantly benefit from it. To investigate this, we study the security of DNSSEC deployment at scale, particularly in TLDs that offer economic incentives. We find that the security of DNSSEC implementations in the wild poorly reflects standard recommendations, particularly for tasks that cannot be solved by triggering a flag in the DNS software service (e.g. key rollover). Further, we find that, on average, large operators deploy weak DNSSEC security more frequently than small DNSSEC operators, suggesting that current incentives are ineffective in promoting a secure adoption and in deterring insecure implementations. We conclude the paper with actionable recommendations for TLD registry operators to improve the alignment of economic incentives with secure DNSSEC requirements.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"27 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2018-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73073732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed control framework for mapreduce cloud on cloud computing 基于云计算的mapreduce云分布式控制框架
Pub Date : 2018-07-06 DOI: 10.1109/NOMS.2018.8406180
Tzu-Chi Huang, Kuo-Chih Chu, Guo-Hao Huang, Yan-Chen Shen, C. Shieh
A MapReduce cloud becomes a key to the success of cloud computing today. However, a MapReduce cloud uses a single Master node as the brain to manage tasks distributed over Slave nodes for controlling the entire progress of the application execution. Accordingly, a MapReduce cloud easily overloads the Master node with reports sent from Slave nodes at run time to harm performance. Besides, a MapReduce cloud makes the Master node a single failure point to suspend the application execution when the Master node cannot work. A MapReduce cloud can use the Distributed Control Framework (DCF) proposed in this paper to improve both performance and fault tolerance, because DCF shifts most works of a Master node to a DCF Master Agent coexisting in each Slave node and allows Slave nodes to join or leave a cloud at run time without interrupting the application execution. According to observations on experiments with various applications in this paper, a MapReduce cloud can use DCF to have better performance and fault tolerance in comparison to a native MapReduce cloud.
MapReduce云成为当今云计算成功的关键。然而,MapReduce云使用单个Master节点作为大脑来管理分布在Slave节点上的任务,以控制应用程序执行的整个进程。因此,MapReduce云在运行时很容易让从节点发送的报告使主节点过载,从而影响性能。此外,MapReduce云使Master节点成为单个故障点,在Master节点无法工作时暂停应用程序的执行。MapReduce云可以使用本文提出的分布式控制框架(DCF)来提高性能和容错性,因为DCF将主节点的大部分工作转移到每个从节点中共存的DCF主代理上,并允许从节点在运行时加入或离开云,而不会中断应用程序的执行。根据本文对各种应用的实验观察,与原生MapReduce云相比,使用DCF的MapReduce云具有更好的性能和容错能力。
{"title":"Distributed control framework for mapreduce cloud on cloud computing","authors":"Tzu-Chi Huang, Kuo-Chih Chu, Guo-Hao Huang, Yan-Chen Shen, C. Shieh","doi":"10.1109/NOMS.2018.8406180","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406180","url":null,"abstract":"A MapReduce cloud becomes a key to the success of cloud computing today. However, a MapReduce cloud uses a single Master node as the brain to manage tasks distributed over Slave nodes for controlling the entire progress of the application execution. Accordingly, a MapReduce cloud easily overloads the Master node with reports sent from Slave nodes at run time to harm performance. Besides, a MapReduce cloud makes the Master node a single failure point to suspend the application execution when the Master node cannot work. A MapReduce cloud can use the Distributed Control Framework (DCF) proposed in this paper to improve both performance and fault tolerance, because DCF shifts most works of a Master node to a DCF Master Agent coexisting in each Slave node and allows Slave nodes to join or leave a cloud at run time without interrupting the application execution. According to observations on experiments with various applications in this paper, a MapReduce cloud can use DCF to have better performance and fault tolerance in comparison to a native MapReduce cloud.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"34 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82702793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managed edge computing on Internet-of-Things devices for smart city applications 在智慧城市应用的物联网设备上管理边缘计算
Pub Date : 2018-07-06 DOI: 10.1109/NOMS.2018.8406133
Yu-Chen Hsieh, Hua-Jun Hong, P. Tsai, Yu-Rong Wang, Qiuxi Zhu, Md Yusuf Sarwar Uddin, N. Venkatasubramanian, Cheng-Hsin Hsu
We demonstrate a managed edge computing platform for Internet-of-Things (IoT) devices, which supports dynamic deployment of virtualized containers running distributed analytics. We build a model city, and install multiple Raspberry Pis as minions, and a mini PC as the master. Through the web dashboard on the master, we show how users can remotely monitor, manage, and upgrade the IoT analytics and devices. Multiple concrete IoT analytics, namely: (i) air quality monitor, (ii) sound classifier, and (iii) image recognizer are demonstrated. Several sample measurements on deployment speed, Quality-of- Service (QoS) achievements, and event-driven mechanisms are also carried out on the testbed.
我们展示了一个用于物联网(IoT)设备的托管边缘计算平台,该平台支持运行分布式分析的虚拟容器的动态部署。我们建立了一个模型城市,并安装了多个树莓派作为随从,并安装了一个迷你PC作为主人。通过主机上的web仪表板,我们向用户展示了如何远程监控、管理和升级物联网分析和设备。演示了多种具体的物联网分析,即:(i)空气质量监视器,(ii)声音分类器和(iii)图像识别器。在测试平台上对部署速度、服务质量(QoS)成就和事件驱动机制进行了几个样例测量。
{"title":"Managed edge computing on Internet-of-Things devices for smart city applications","authors":"Yu-Chen Hsieh, Hua-Jun Hong, P. Tsai, Yu-Rong Wang, Qiuxi Zhu, Md Yusuf Sarwar Uddin, N. Venkatasubramanian, Cheng-Hsin Hsu","doi":"10.1109/NOMS.2018.8406133","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406133","url":null,"abstract":"We demonstrate a managed edge computing platform for Internet-of-Things (IoT) devices, which supports dynamic deployment of virtualized containers running distributed analytics. We build a model city, and install multiple Raspberry Pis as minions, and a mini PC as the master. Through the web dashboard on the master, we show how users can remotely monitor, manage, and upgrade the IoT analytics and devices. Multiple concrete IoT analytics, namely: (i) air quality monitor, (ii) sound classifier, and (iii) image recognizer are demonstrated. Several sample measurements on deployment speed, Quality-of- Service (QoS) achievements, and event-driven mechanisms are also carried out on the testbed.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"34 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2018-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91473650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1