首页 > 最新文献

NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium最新文献

英文 中文
A declarative approach for service enablement on hybrid cloud orchestration engines 用于在混合云编排引擎上实现服务的声明性方法
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406175
Neeraj Asthana, Tom Chefalas, A. Karve, A. Segal, Mahika Dubey, Sai Zeng
The rapidly increasing complexity and scale of hybrid cloud environments requires improved service management capabilities in orchestration and automation. Current methods focus on provisioning infrastructure but lack functionality for consistently enabling and performing operational activities on managed services. We propose a data-driven approach to dynamically generate Orchestration Engine plugins from service descriptor metadata. Our approach extends Orchestration Engines by representing managed services as code within reusable blueprints in order to accelerate service deployments and ease management activities. In our work, we provide a data model and system architecture to allow service providers to easily author and publish resource definitions for a wide range of public and private services. These definitions may be combined into solution blueprints, forming a declarative and reusable representation of a managed workload. After provisioning a workload, administrators can view service instance data and invoke operational activities. For evaluation, we describe the authoring and orchestration of a hybrid cloud workload and discuss the strengths of our solution versus current methods.
混合云环境的复杂性和规模的快速增长需要在编排和自动化方面改进服务管理能力。当前的方法侧重于提供基础设施,但缺乏一致地启用和执行托管服务上的操作活动的功能。我们提出了一种数据驱动的方法,从服务描述符元数据动态生成编排引擎插件。我们的方法通过将托管服务表示为可重用蓝图中的代码来扩展编排引擎,从而加速服务部署并简化管理活动。在我们的工作中,我们提供了一个数据模型和系统架构,以允许服务提供者轻松地为广泛的公共和私有服务编写和发布资源定义。这些定义可以组合到解决方案蓝图中,形成托管工作负载的声明性和可重用表示。在提供工作负载之后,管理员可以查看服务实例数据并调用操作活动。为了进行评估,我们描述了混合云工作负载的编写和编排,并讨论了我们的解决方案与当前方法的优势。
{"title":"A declarative approach for service enablement on hybrid cloud orchestration engines","authors":"Neeraj Asthana, Tom Chefalas, A. Karve, A. Segal, Mahika Dubey, Sai Zeng","doi":"10.1109/NOMS.2018.8406175","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406175","url":null,"abstract":"The rapidly increasing complexity and scale of hybrid cloud environments requires improved service management capabilities in orchestration and automation. Current methods focus on provisioning infrastructure but lack functionality for consistently enabling and performing operational activities on managed services. We propose a data-driven approach to dynamically generate Orchestration Engine plugins from service descriptor metadata. Our approach extends Orchestration Engines by representing managed services as code within reusable blueprints in order to accelerate service deployments and ease management activities. In our work, we provide a data model and system architecture to allow service providers to easily author and publish resource definitions for a wide range of public and private services. These definitions may be combined into solution blueprints, forming a declarative and reusable representation of a managed workload. After provisioning a workload, administrators can view service instance data and invoke operational activities. For evaluation, we describe the authoring and orchestration of a hybrid cloud workload and discuss the strengths of our solution versus current methods.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75428483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Load-aware potential-based routing for the edge communication of smart grid with content-centric network 基于负载感知电位的内容中心网络智能电网边缘通信路由
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406187
Xiaotong Wang, Lanlan Rui, Hui Guo, Xue-song Qiu
With the development of Internet of Things, there are more and more devices and applications at the edge of the smart grid. To enhance the quality of service, further processing of the smart grid to achieve load balancing is regarded as a critical step. The most interesting element in smart grid communications is data itself regardless of the data source. The emergency of Content-Centric network (CCN) just meets the demands and addresses the problems. First we model the smart grid with Content-Centric Network, and concentrate on the edge communication. Then we propose a load-aware potential-based routing (LAPBR) algorithm and evaluate its performances. The simulations results demonstrate the stability and robustness of LAPBR.
随着物联网的发展,智能电网边缘的设备和应用越来越多。为了提高服务质量,对智能电网进行进一步处理以实现负载均衡是至关重要的一步。智能电网通信中最有趣的元素是数据本身,而不管数据源是什么。以内容为中心的应急网络(CCN)正是满足了这一需求,解决了这一问题。首先用内容中心网络对智能电网进行建模,重点研究其边缘通信。在此基础上,提出了一种基于负载感知电位的路由算法,并对其性能进行了评价。仿真结果表明了该方法的稳定性和鲁棒性。
{"title":"Load-aware potential-based routing for the edge communication of smart grid with content-centric network","authors":"Xiaotong Wang, Lanlan Rui, Hui Guo, Xue-song Qiu","doi":"10.1109/NOMS.2018.8406187","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406187","url":null,"abstract":"With the development of Internet of Things, there are more and more devices and applications at the edge of the smart grid. To enhance the quality of service, further processing of the smart grid to achieve load balancing is regarded as a critical step. The most interesting element in smart grid communications is data itself regardless of the data source. The emergency of Content-Centric network (CCN) just meets the demands and addresses the problems. First we model the smart grid with Content-Centric Network, and concentrate on the edge communication. Then we propose a load-aware potential-based routing (LAPBR) algorithm and evaluate its performances. The simulations results demonstrate the stability and robustness of LAPBR.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74522485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANs qos感知自适应A-MPDU聚合调度器,用于在启用聚合的wlan上增强VoIP容量
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406149
Shinnazar Seytnazarov, Young-Tak Kim
Currently available aggregation-enabled wireless local area network (WLAN) implementations do not apply aggregate MAC protocol data unit (A-MPDU) aggregation to real-time voice over Internet protocol (VoIP) traffic because of its strict end-to-end delay requirements. When the number of VoIP sessions in WLAN increases, both mobile station (MS) and access point (AP) face heavy voice packet losses leading to unacceptable quality of service (QoS). Therefore, VoIP capacity of aggregation-enabled WLANs like IEEE 802.11n and 802.11ac is very limited under currently available implementations. In this paper, we propose a QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANs, which adaptively applies A-MPDU aggregation to voice traffic at both MS and AP nodes, considering dynamic contention in WLAN, delay in backbone network, and end-to-end QoS requirements of real-time voice traffic. Performance evaluations of the proposed scheme showed that it can achieve as much as 5.3 times bigger capacity compared to the existing implementations, while delivering all voice packets to destination with less than 150ms end-to-end delay and less than 50ms average jitter.1
目前可用的支持聚合的无线局域网(WLAN)实现由于对端到端时延的严格要求,无法将聚合MAC协议数据单元(A-MPDU)聚合应用于实时VoIP (voice over Internet protocol)业务。当无线局域网的VoIP会话数量增加时,移动站(MS)和接入点(AP)都会面临严重的语音包丢失,从而导致无法接受的服务质量(QoS)。因此,在目前可用的实现下,IEEE 802.11n和802.11ac等支持聚合的wlan的VoIP容量非常有限。在本文中,我们提出了一种QoS感知的自适应a - mpdu聚合调度器,用于在支持聚合的WLAN上增强VoIP容量,该调度器考虑到WLAN中的动态争用、骨干网的延迟以及实时语音流量的端到端QoS要求,自适应地将a - mpdu聚合应用于MS和AP节点的语音流量。性能评估表明,与现有实现相比,该方案可以实现高达5.3倍的容量,同时以小于150ms的端到端延迟和小于50ms的平均抖动将所有语音数据包传输到目的地
{"title":"QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANs","authors":"Shinnazar Seytnazarov, Young-Tak Kim","doi":"10.1109/NOMS.2018.8406149","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406149","url":null,"abstract":"Currently available aggregation-enabled wireless local area network (WLAN) implementations do not apply aggregate MAC protocol data unit (A-MPDU) aggregation to real-time voice over Internet protocol (VoIP) traffic because of its strict end-to-end delay requirements. When the number of VoIP sessions in WLAN increases, both mobile station (MS) and access point (AP) face heavy voice packet losses leading to unacceptable quality of service (QoS). Therefore, VoIP capacity of aggregation-enabled WLANs like IEEE 802.11n and 802.11ac is very limited under currently available implementations. In this paper, we propose a QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANs, which adaptively applies A-MPDU aggregation to voice traffic at both MS and AP nodes, considering dynamic contention in WLAN, delay in backbone network, and end-to-end QoS requirements of real-time voice traffic. Performance evaluations of the proposed scheme showed that it can achieve as much as 5.3 times bigger capacity compared to the existing implementations, while delivering all voice packets to destination with less than 150ms end-to-end delay and less than 50ms average jitter.1","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88815758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Adaptive configuration of lora networks for dense IoT deployments 面向密集物联网部署的lora网络自适应配置
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406255
Mariusz Słabicki, Gopika Premsankar, M. D. Francesco
Large-scale Internet of Things (IoT) deployments demand long-range wireless communications, especially in urban and metropolitan areas. LoRa is one of the most promising technologies in this context due to its simplicity and flexibility. Indeed, deploying LoRa networks in dense IoT scenarios must achieve two main goals: efficient communications among a large number of devices and resilience against dynamic channel conditions due to demanding environmental settings (e.g., the presence of many buildings). This work investigates adaptive mechanisms to configure the communication parameters of LoRa networks in dense IoT scenarios. To this end, we develop FLoRa, an open-source framework for end-to-end LoRa simulations in OMNeT++. We then implement and evaluate the Adaptive Data Rate (ADR) mechanism built into LoRa to dynamically manage link parameters for scalable and efficient network operations. Extensive simulations show that ADR is effective in increasing the network delivery ratio under stable channel conditions, while keeping the energy consumption low. Our results also show that the performance of ADR is severely affected by a highly-varying wireless channel. We thereby propose an improved version of the original ADR mechanism to cope with variable channel conditions. Our proposed solution significantly increases both the reliability and the energy efficiency of communications over a noisy channel, almost irrespective of the network size. Finally, we show that the delivery ratio of very dense networks can be further improved by using a network-aware approach, wherein the link parameters are configured based on the global knowledge of the network.
大规模物联网(IoT)部署需要远程无线通信,特别是在城市和大都市地区。由于其简单性和灵活性,LoRa是这方面最有前途的技术之一。事实上,在密集的物联网场景中部署LoRa网络必须实现两个主要目标:大量设备之间的高效通信以及由于苛刻的环境设置(例如,存在许多建筑物)而对动态信道条件的弹性。本工作研究了在密集物联网场景下配置LoRa网络通信参数的自适应机制。为此,我们开发了FLoRa,这是一个在omnet++中进行端到端LoRa模拟的开源框架。然后,我们实现和评估内置于LoRa中的自适应数据速率(ADR)机制,以动态管理链路参数,以实现可扩展和高效的网络运营。大量的仿真表明,在稳定信道条件下,ADR可以有效地提高网络投递率,同时保持较低的能耗。我们的研究结果还表明,高度变化的无线信道严重影响ADR的性能。因此,我们提出了原始ADR机制的改进版本,以应对可变的通道条件。我们提出的解决方案大大提高了在噪声信道上通信的可靠性和能效,几乎与网络大小无关。最后,我们证明了通过使用网络感知方法可以进一步提高非常密集网络的传输率,其中链路参数是基于网络的全局知识配置的。
{"title":"Adaptive configuration of lora networks for dense IoT deployments","authors":"Mariusz Słabicki, Gopika Premsankar, M. D. Francesco","doi":"10.1109/NOMS.2018.8406255","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406255","url":null,"abstract":"Large-scale Internet of Things (IoT) deployments demand long-range wireless communications, especially in urban and metropolitan areas. LoRa is one of the most promising technologies in this context due to its simplicity and flexibility. Indeed, deploying LoRa networks in dense IoT scenarios must achieve two main goals: efficient communications among a large number of devices and resilience against dynamic channel conditions due to demanding environmental settings (e.g., the presence of many buildings). This work investigates adaptive mechanisms to configure the communication parameters of LoRa networks in dense IoT scenarios. To this end, we develop FLoRa, an open-source framework for end-to-end LoRa simulations in OMNeT++. We then implement and evaluate the Adaptive Data Rate (ADR) mechanism built into LoRa to dynamically manage link parameters for scalable and efficient network operations. Extensive simulations show that ADR is effective in increasing the network delivery ratio under stable channel conditions, while keeping the energy consumption low. Our results also show that the performance of ADR is severely affected by a highly-varying wireless channel. We thereby propose an improved version of the original ADR mechanism to cope with variable channel conditions. Our proposed solution significantly increases both the reliability and the energy efficiency of communications over a noisy channel, almost irrespective of the network size. Finally, we show that the delivery ratio of very dense networks can be further improved by using a network-aware approach, wherein the link parameters are configured based on the global knowledge of the network.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91373774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 206
The smallest software defined network testbed in the world: Performance and security 世界上最小的软件定义网络测试平台:性能和安全性
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406116
Song Wang, K. G. Chavez, K. Sithamparanathan, Paul Zanna
Zodiac-FX is the first OpenFlow switch designed to sit on a desk, not in a datacenter. In this demo, we present Zodiac-FX the world's smallest OpenFlow Software Defined Network Switch. Our main objective is to showcase the usage and functionalities of Zodiac-FX in handling OpenFlow protocol. We will also demonstrate SDN sEcure COntrol and Data Plane (SECOD), an SDN secure controller algorithm to detect and defend SDN against DoS attacks. We will demonstrate Zodiac-FX and SECOD value via experiments within real traffic and Denial- of-Service (DoS) attacks allowing the audience to interact with the complete toolkit system.
Zodiac-FX是第一款OpenFlow交换机,设计用于办公桌上,而不是数据中心。在这个演示中,我们展示了世界上最小的OpenFlow软件定义网络交换机Zodiac-FX。我们的主要目标是展示Zodiac-FX在处理OpenFlow协议时的用法和功能。我们还将演示SDN安全控制和数据平面(SECOD),这是一种用于检测和保护SDN免受DoS攻击的SDN安全控制器算法。我们将通过真实流量和拒绝服务(DoS)攻击中的实验演示Zodiac-FX和SECOD值,允许观众与完整的工具包系统进行交互。
{"title":"The smallest software defined network testbed in the world: Performance and security","authors":"Song Wang, K. G. Chavez, K. Sithamparanathan, Paul Zanna","doi":"10.1109/NOMS.2018.8406116","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406116","url":null,"abstract":"Zodiac-FX is the first OpenFlow switch designed to sit on a desk, not in a datacenter. In this demo, we present Zodiac-FX the world's smallest OpenFlow Software Defined Network Switch. Our main objective is to showcase the usage and functionalities of Zodiac-FX in handling OpenFlow protocol. We will also demonstrate SDN sEcure COntrol and Data Plane (SECOD), an SDN secure controller algorithm to detect and defend SDN against DoS attacks. We will demonstrate Zodiac-FX and SECOD value via experiments within real traffic and Denial- of-Service (DoS) attacks allowing the audience to interact with the complete toolkit system.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80758472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting malicious authentication events trustfully 信任地检测恶意身份验证事件
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406295
Georgios Kaiafas, Georgios Varisteas, S. Lagraa, R. State, Duy Cu Nguyen, Thorsten Ries, M. Ourdane
Anomaly detection on security logs is receiving more and more attention. Authentication events are an important component of security logs, and being able to produce trustful and accurate predictions minimizes the effort of cyber-experts to stop false attacks. Observed events are classified into Normal, for legitimate user behavior, and Malicious, for malevolent actions. These classes are consistently excessively imbalanced which makes the classification problem harder; in the commonly used Los Alamos dataset, the malicious class comprises only 0.00033% of the total. This work proposes a novel method to extract advanced composite features, and a supervised learning technique for classifying authentication logs trustfully; the models are Random Forest, LogitBoost, Logistic Regression, and ultimately Majority Voting which leverages the predictions of the previous models and gives the final prediction for each authentication event. We measure the performance of our experiments by using the False Negative Rate and False Positive Rate. In overall we achieve 0 False Negative Rate (i.e. no attack was missed), and on average a False Positive Rate of 0.0019.
安全日志异常检测越来越受到人们的重视。身份验证事件是安全日志的重要组成部分,能够产生可信和准确的预测,可以最大限度地减少网络专家阻止虚假攻击的努力。观察到的事件分为正常(Normal)和恶意(Malicious)两类,前者代表合法用户行为,后者代表恶意行为。这些类总是极度不平衡,这使得分类问题更加困难;在常用的Los Alamos数据集中,恶意类仅占总数的0.00033%。本文提出了一种提取高级复合特征的新方法,并提出了一种可信分类认证日志的监督学习技术;这些模型是Random Forest、LogitBoost、Logistic Regression和最终的Majority Voting,后者利用之前模型的预测并给出每个身份验证事件的最终预测。我们使用假阴性率和假阳性率来衡量实验的性能。总的来说,我们实现了0假阴性率(即没有错过攻击),平均假阳性率为0.0019。
{"title":"Detecting malicious authentication events trustfully","authors":"Georgios Kaiafas, Georgios Varisteas, S. Lagraa, R. State, Duy Cu Nguyen, Thorsten Ries, M. Ourdane","doi":"10.1109/NOMS.2018.8406295","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406295","url":null,"abstract":"Anomaly detection on security logs is receiving more and more attention. Authentication events are an important component of security logs, and being able to produce trustful and accurate predictions minimizes the effort of cyber-experts to stop false attacks. Observed events are classified into Normal, for legitimate user behavior, and Malicious, for malevolent actions. These classes are consistently excessively imbalanced which makes the classification problem harder; in the commonly used Los Alamos dataset, the malicious class comprises only 0.00033% of the total. This work proposes a novel method to extract advanced composite features, and a supervised learning technique for classifying authentication logs trustfully; the models are Random Forest, LogitBoost, Logistic Regression, and ultimately Majority Voting which leverages the predictions of the previous models and gives the final prediction for each authentication event. We measure the performance of our experiments by using the False Negative Rate and False Positive Rate. In overall we achieve 0 False Negative Rate (i.e. no attack was missed), and on average a False Positive Rate of 0.0019.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83558289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A blockchain-based PKI management framework 基于区块链的PKI管理框架
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406325
A. Yakubov, Wazen M. Shbair, Anders Wallbom, David Sanda, R. State
Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information exchange over the Internet. However, PKI is exposed to risks due to potential failures of Certificate Authorities (CAs) that may be used to issue unauthorized certificates for end-users. Many recent breaches show that if a CA is compromised, the security of the corresponding end-users will be in risk. As an emerging solution, Blockchain technology potentially resolves the problems of traditional PKI systems - in particular, elimination of single point-of-failure and rapid reaction to CAs shortcomings. Blockchain has the ability to store and manage digital certificates within a public and immutable ledger, resulting in a fully traceable history log. In this paper we designed and developed a blockchain-based PKI management framework for issuing, validating and revoking X.509 certificates. Evaluation and experimental results confirm that the proposed framework provides more reliable and robust PKI systems with modest maintenance costs.
公钥基础设施(Public-Key Infrastructure, PKI)是促进互联网上安全信息交换的基础技术。但是,由于证书颁发机构(ca)的潜在故障,PKI暴露在风险中,这些故障可能用于向最终用户颁发未经授权的证书。最近的许多违规行为表明,如果CA受到损害,相应的最终用户的安全性将处于危险之中。作为一种新兴的解决方案,区块链技术有可能解决传统PKI系统的问题,特别是消除单点故障和对ca的快速反应缺点。区块链能够在公共和不可变的分类账中存储和管理数字证书,从而产生完全可追溯的历史日志。在本文中,我们设计并开发了一个基于区块链的PKI管理框架,用于颁发、验证和撤销X.509证书。评估和实验结果证实,该框架提供了更可靠和健壮的PKI系统,维护成本适中。
{"title":"A blockchain-based PKI management framework","authors":"A. Yakubov, Wazen M. Shbair, Anders Wallbom, David Sanda, R. State","doi":"10.1109/NOMS.2018.8406325","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406325","url":null,"abstract":"Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information exchange over the Internet. However, PKI is exposed to risks due to potential failures of Certificate Authorities (CAs) that may be used to issue unauthorized certificates for end-users. Many recent breaches show that if a CA is compromised, the security of the corresponding end-users will be in risk. As an emerging solution, Blockchain technology potentially resolves the problems of traditional PKI systems - in particular, elimination of single point-of-failure and rapid reaction to CAs shortcomings. Blockchain has the ability to store and manage digital certificates within a public and immutable ledger, resulting in a fully traceable history log. In this paper we designed and developed a blockchain-based PKI management framework for issuing, validating and revoking X.509 certificates. Evaluation and experimental results confirm that the proposed framework provides more reliable and robust PKI systems with modest maintenance costs.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88531473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Multi-operator backup power sharing in wireless base stations 无线基站中多运营商备用电源共享
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406244
Minh N. H. Nguyen, Nguyen H. Tran, M. A. Islam, Chuan Pham, Shaolei Ren, C. Hong
Installation of backup power supply plays a vital role in maintaining communication services which can save billions of dollars as well as human lives during natural disasters. Due to the higher capital and operational expense compared to public power, pooling and sharing the backup power supplies can be an economical solution since the backup power capacity can be sized based on the aggregate demand of co-located operators. However, how to pool and share the backup power at multi-operator cellular sites in a fair manner should be considered due to the limited capacity and high user demands. In this paper, we adopt the Nash Bargaining Solution (NBS) of a bargaining problem which can guarantee the fairness of backup power sharing and design a decentralized algorithm approach with lim­ited information exchange among the operators. Our simulation demonstrates that the sharing the backup power reduces the average delay and requires less BS power consumption than the non-sharing approach, especially for high traffic load scenarios. In addition, we also extend the formulation with respect to admission control for very high traffic demand cases.
安装备用电源在维持通信服务方面起着至关重要的作用,在自然灾害期间可以节省数十亿美元和人命。由于与公共电力相比,备用电源的资本和运营成本更高,因此,由于备用电源容量可以根据共址运营商的总需求进行调整,因此集中和共享备用电源可能是一种经济的解决方案。然而,由于容量有限,用户需求高,如何在多运营商蜂窝站点公平地汇集和共享备用电源是必须考虑的问题。本文采用能保证备用电源共享公平性的议价问题的纳什议价解(NBS),设计了一种算子间信息交换有限的去中心化算法。仿真结果表明,与非共享方式相比,共享备用电源降低了平均延迟,并且所需的BS功耗更小,特别是在高流量负载场景下。此外,我们也将公式扩展到交通需求非常大的情况下的准入控制。
{"title":"Multi-operator backup power sharing in wireless base stations","authors":"Minh N. H. Nguyen, Nguyen H. Tran, M. A. Islam, Chuan Pham, Shaolei Ren, C. Hong","doi":"10.1109/NOMS.2018.8406244","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406244","url":null,"abstract":"Installation of backup power supply plays a vital role in maintaining communication services which can save billions of dollars as well as human lives during natural disasters. Due to the higher capital and operational expense compared to public power, pooling and sharing the backup power supplies can be an economical solution since the backup power capacity can be sized based on the aggregate demand of co-located operators. However, how to pool and share the backup power at multi-operator cellular sites in a fair manner should be considered due to the limited capacity and high user demands. In this paper, we adopt the Nash Bargaining Solution (NBS) of a bargaining problem which can guarantee the fairness of backup power sharing and design a decentralized algorithm approach with lim­ited information exchange among the operators. Our simulation demonstrates that the sharing the backup power reduces the average delay and requires less BS power consumption than the non-sharing approach, especially for high traffic load scenarios. In addition, we also extend the formulation with respect to admission control for very high traffic demand cases.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90775537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Passive os fingerprinting methods in the jungle of wireless networks 被动操作系统指纹识别方法在无线网络丛林
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406262
Martin Laštovička, Tomás Jirsík, Pavel Čeleda, Stanislav Špaček, Daniel Filakovsky
Operating system fingerprinting methods are well- known in the domain of static networks and managed environments. Yet few studies tackled this challenge in real networks, where users can bring and connect any device. We evaluate the performance of three OS fingerprinting methods on a large dataset collected from university wireless network. Our results show that method based on HTTP User-agents is the most accurate but can identify only low portion of the traffic. TCP/IP parameters method proved to be the opposite with high coverage but low accuracy. We also implemented a new method based on detection of communication to OS-specific domains. Its performance is comparable to the two established ones. Next, we discuss the impacts of traffic encryption and embracing new protocols such as IPv6 or HTTP/2.0 on OS fingerprinting. Our findings suggest that OS identification based on specific domain detection is viable and corresponds to the current directions of network traffic evolution, while methods based on TCP/IP parameters and User-agents will become ineffective in the future.
操作系统指纹识别方法在静态网络和管理环境领域是众所周知的。然而,很少有研究在用户可以携带和连接任何设备的真实网络中解决这一挑战。我们在从大学无线网络收集的大型数据集上评估了三种操作系统指纹识别方法的性能。我们的结果表明,基于HTTP user -agent的方法是最准确的,但只能识别一小部分流量。结果表明,TCP/IP参数法与之相反,覆盖率高,精度低。我们还实现了一种基于检测到os特定域的通信的新方法。其性能可与两款既有机型相媲美。接下来,我们将讨论流量加密和采用新协议(如IPv6或HTTP/2.0)对操作系统指纹的影响。我们的研究结果表明,基于特定域检测的操作系统识别是可行的,并且符合当前网络流量演变的方向,而基于TCP/IP参数和user -agent的方法将在未来变得无效。
{"title":"Passive os fingerprinting methods in the jungle of wireless networks","authors":"Martin Laštovička, Tomás Jirsík, Pavel Čeleda, Stanislav Špaček, Daniel Filakovsky","doi":"10.1109/NOMS.2018.8406262","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406262","url":null,"abstract":"Operating system fingerprinting methods are well- known in the domain of static networks and managed environments. Yet few studies tackled this challenge in real networks, where users can bring and connect any device. We evaluate the performance of three OS fingerprinting methods on a large dataset collected from university wireless network. Our results show that method based on HTTP User-agents is the most accurate but can identify only low portion of the traffic. TCP/IP parameters method proved to be the opposite with high coverage but low accuracy. We also implemented a new method based on detection of communication to OS-specific domains. Its performance is comparable to the two established ones. Next, we discuss the impacts of traffic encryption and embracing new protocols such as IPv6 or HTTP/2.0 on OS fingerprinting. Our findings suggest that OS identification based on specific domain detection is viable and corresponds to the current directions of network traffic evolution, while methods based on TCP/IP parameters and User-agents will become ineffective in the future.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90463497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Toward real-time network-wide cyber situational awareness 走向实时的全网网络态势感知
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406166
Tomás Jirsík, Pavel Čeleda
In today's complex computer networks, we are constantly facing a risk of data loss, system compromise, or intellectual property theft. The complexity of the networks hinders their effective defense. A Network-wide Cyber Situational Awareness (NwCSA) has been introduced to assist a network security administrator with network security. The concept, how-ever, faces several challenges that hinder an efficient application of the NwCSA in a real-world environment. The challenges include the overload of raw data, low speed of reaction, and a lack of context and unified view on a network. In this paper, we present a novel framework that faces above mentioned challenges. The framework leverages a distributed data stream processing system and methods for real-time big data processing. The framework is evaluated with respect to stated requirements on systems for NwCSA. Moreover, we present a prototype framework implementation and provide lessons learned from its real-world deployment.
在当今复杂的计算机网络中,我们不断面临着数据丢失、系统泄露或知识产权被盗的风险。网络的复杂性阻碍了它们的有效防御。一种网络范围的网络态势感知(NwCSA)已经被引入,以协助网络安全管理员进行网络安全。然而,这一概念面临着一些挑战,阻碍了NwCSA在现实环境中的有效应用。面临的挑战包括原始数据过载、反应速度慢、缺乏上下文和网络上的统一视图。在本文中,我们提出了一个面对上述挑战的新框架。该框架利用分布式数据流处理系统和方法进行实时大数据处理。该框架是根据NwCSA系统的规定要求进行评估的。此外,我们还提供了一个原型框架实现,并提供了从其实际部署中吸取的经验教训。
{"title":"Toward real-time network-wide cyber situational awareness","authors":"Tomás Jirsík, Pavel Čeleda","doi":"10.1109/NOMS.2018.8406166","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406166","url":null,"abstract":"In today's complex computer networks, we are constantly facing a risk of data loss, system compromise, or intellectual property theft. The complexity of the networks hinders their effective defense. A Network-wide Cyber Situational Awareness (NwCSA) has been introduced to assist a network security administrator with network security. The concept, how-ever, faces several challenges that hinder an efficient application of the NwCSA in a real-world environment. The challenges include the overload of raw data, low speed of reaction, and a lack of context and unified view on a network. In this paper, we present a novel framework that faces above mentioned challenges. The framework leverages a distributed data stream processing system and methods for real-time big data processing. The framework is evaluated with respect to stated requirements on systems for NwCSA. Moreover, we present a prototype framework implementation and provide lessons learned from its real-world deployment.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76575305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1