首页 > 最新文献

NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium最新文献

英文 中文
Passive os fingerprinting prototype demonstration 被动os指纹识别原型演示
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406128
Martin Laštovička, Daniel Filakovsky
Operating system identification of communicating devices plays an important part in network protection. However, current networks are large and change often which implies the need for a system that will be able to continuously monitor the network and handle changes in identified operating systems. In this paper, we propose an architecture of an OS fingerprinting system based on passive network monitoring and a graph-based data model to store and present information about operating systems in the network. We implemented the proposed archi­tecture and tested it on the backbone network of Masaryk University. Our results suggest that it is suitable for monitoring a large network with tens of thousands of actively communicating devices.
通信设备的操作系统识别在网络保护中起着重要的作用。然而,当前的网络规模很大,而且经常发生变化,这意味着需要一个能够持续监控网络并处理已识别操作系统变化的系统。在本文中,我们提出了一种基于被动网络监控的操作系统指纹系统架构和基于图形的数据模型来存储和呈现网络中操作系统的信息。我们实现了所提出的架构,并在Masaryk大学的骨干网上进行了测试。我们的结果表明,它适用于监控具有数万个主动通信设备的大型网络。
{"title":"Passive os fingerprinting prototype demonstration","authors":"Martin Laštovička, Daniel Filakovsky","doi":"10.1109/NOMS.2018.8406128","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406128","url":null,"abstract":"Operating system identification of communicating devices plays an important part in network protection. However, current networks are large and change often which implies the need for a system that will be able to continuously monitor the network and handle changes in identified operating systems. In this paper, we propose an architecture of an OS fingerprinting system based on passive network monitoring and a graph-based data model to store and present information about operating systems in the network. We implemented the proposed archi­tecture and tested it on the backbone network of Masaryk University. Our results suggest that it is suitable for monitoring a large network with tens of thousands of actively communicating devices.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76724731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain orchestration and experimentation framework: A case study of KYC 区块链编排和实验框架:KYC案例研究
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406327
Wazen M. Shbair, M. Steichen, J. François, R. State
Conducting experiments to evaluate blockchain applications is a challenging task for developers, because there is a range of configuration parameters that control blockchain environment. Many public testnets (e.g. Rinkeby Ethereum) can be used for testing, however, we cannot adjust their parameters (e.g. Gas limit, Mining difficulty) to further the understanding of the application in question and of the employed blockchain. This paper proposes an easy to use orchestration framework over the Grid'5000 platform. Grid'5000 is a highly reconfigurable and controllable large-scale testbed. We developed a tool that facilitates nodes reservation, deployment and blockchain configuration over the Grid'5000 platform. In addition, our tool can fine-tune blockchain and network parameters before and between experiments. The proposed framework offers insights for private and consortium blockchain developers to identify performance bottlenecks and to assess the behavior of their applications in different circumstances.
对开发人员来说,进行实验来评估区块链应用程序是一项具有挑战性的任务,因为有一系列控制区块链环境的配置参数。许多公共测试网络(例如Rinkeby Ethereum)可以用于测试,但是,我们无法调整它们的参数(例如Gas限制,挖矿难度)来进一步理解所讨论的应用程序和所使用的区块链。本文提出了一个易于使用的基于Grid’5000平台的编排框架。Grid’5000是一个高度可重构和可控的大型测试平台。我们开发了一个工具,可以在Grid’5000平台上方便节点的保留、部署和区块链配置。此外,我们的工具可以在实验前和实验之间微调区块链和网络参数。拟议的框架为私人和联盟区块链开发人员提供了见解,以识别性能瓶颈并评估其应用程序在不同情况下的行为。
{"title":"Blockchain orchestration and experimentation framework: A case study of KYC","authors":"Wazen M. Shbair, M. Steichen, J. François, R. State","doi":"10.1109/NOMS.2018.8406327","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406327","url":null,"abstract":"Conducting experiments to evaluate blockchain applications is a challenging task for developers, because there is a range of configuration parameters that control blockchain environment. Many public testnets (e.g. Rinkeby Ethereum) can be used for testing, however, we cannot adjust their parameters (e.g. Gas limit, Mining difficulty) to further the understanding of the application in question and of the employed blockchain. This paper proposes an easy to use orchestration framework over the Grid'5000 platform. Grid'5000 is a highly reconfigurable and controllable large-scale testbed. We developed a tool that facilitates nodes reservation, deployment and blockchain configuration over the Grid'5000 platform. In addition, our tool can fine-tune blockchain and network parameters before and between experiments. The proposed framework offers insights for private and consortium blockchain developers to identify performance bottlenecks and to assess the behavior of their applications in different circumstances.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85015741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
EQuery: Enable event-driven declarative queries in programmable network measurement 查询:在可编程网络度量中启用事件驱动的声明性查询
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406142
Yongyi Ran, Xiaoban Wu, Peilong Li, Chen Xu, Yan Luo, Liang-Min Wang
Network measurement is critical in network management such as performance monitoring, diagnosis, and traffic engineering. However, conventional network measurement solutions are limited by simple and fixed functionalities as well as coarse-grained statistics which often fail to precisely illustrate network conditions. In this paper, we propose an event-driven declarative query language, EQuery, for programmable network management in order to design sophisticated measurement tasks and enable event mechanism to avoid human intervene. Furthermore, we design a compiler to support the query language on the EQuery Controller, which drives the chaining query workflow with nondeterministic finite automaton (NFA), and translates measurement jobs into low-level rules/states on the physical devices. Finally, we evaluate the effectiveness of our EQuery framework on a nation-wide operational network with real-time network statistics.
网络测量在网络性能监控、网络诊断、网络流量工程等网络管理中起着重要的作用。然而,传统的网络测量解决方案受到简单和固定的功能以及粗粒度统计数据的限制,这些统计数据往往无法准确地说明网络状况。在本文中,我们提出了一种事件驱动的声明性查询语言,EQuery,用于可编程网络管理,以设计复杂的测量任务,并使事件机制避免人为干预。此外,我们设计了一个编译器来支持query Controller上的查询语言,它驱动带有不确定性有限自动机(NFA)的链查询工作流,并将测量作业转换为物理设备上的低级规则/状态。最后,我们通过实时网络统计来评估我们的query框架在全国运营网络上的有效性。
{"title":"EQuery: Enable event-driven declarative queries in programmable network measurement","authors":"Yongyi Ran, Xiaoban Wu, Peilong Li, Chen Xu, Yan Luo, Liang-Min Wang","doi":"10.1109/NOMS.2018.8406142","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406142","url":null,"abstract":"Network measurement is critical in network management such as performance monitoring, diagnosis, and traffic engineering. However, conventional network measurement solutions are limited by simple and fixed functionalities as well as coarse-grained statistics which often fail to precisely illustrate network conditions. In this paper, we propose an event-driven declarative query language, EQuery, for programmable network management in order to design sophisticated measurement tasks and enable event mechanism to avoid human intervene. Furthermore, we design a compiler to support the query language on the EQuery Controller, which drives the chaining query workflow with nondeterministic finite automaton (NFA), and translates measurement jobs into low-level rules/states on the physical devices. Finally, we evaluate the effectiveness of our EQuery framework on a nation-wide operational network with real-time network statistics.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90864403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An architecture and implementation of automatic network slicing for microservices 微服务自动网络切片的体系结构与实现
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406193
Y. Minami, Atsushi Taniguchi, T. Kawabata, Norio Sakaida, K. Shimano
The concept of "Network slicing" enables us to provide an optimized logical infrastructure for each service. We construct multiple isolated logical infrastructures, slices, on a single physical infrastructure. Each slice accesses appropriate virtual network functions, a logical topology, isolated logical com-putational resources, and isolated logical network resources for the service to be provided. However, designing a service-specific slice is generally complicated. In general, service providers and slice providers are different. Therefore, service providers must design a slice optimized for their service and request slice construction from slice providers; slice providers need to understand a service to design a slice. This creates excessive time and cost overheads. We target automatic network slicing for services from the slice providers' point of view. In this paper, we assume that service providers develop their services from microservices. We show an architecture for automatic network slicing for microservices and implement it. We also discuss the issues revealed by our implementation efforts. This knowledge can be used to realize more general automatic network slicing for other service development methods. Automatic network slicing will provide slices more quickly and cheaply.
“网络切片”的概念使我们能够为每个服务提供优化的逻辑基础结构。我们在单个物理基础设施上构造多个隔离的逻辑基础设施,即片。每个切片访问适当的虚拟网络功能、逻辑拓扑、隔离的逻辑计算资源以及要提供的服务的隔离的逻辑网络资源。然而,设计特定于服务的片通常是复杂的。一般来说,服务提供者和切片提供者是不同的。因此,服务提供商必须为其服务设计一个优化的切片,并请求切片提供商构建切片;切片提供者需要理解服务来设计切片。这会造成过多的时间和成本开销。从切片提供商的角度来看,我们的目标是服务的自动网络切片。在本文中,我们假设服务提供者从微服务开发他们的服务。我们展示了一个微服务自动网络切片的架构并实现了它。我们还讨论了我们的执行工作所揭示的问题。这些知识可以用于实现其他业务开发方法的更通用的自动网络切片。自动网络切片将提供更快、更便宜的切片。
{"title":"An architecture and implementation of automatic network slicing for microservices","authors":"Y. Minami, Atsushi Taniguchi, T. Kawabata, Norio Sakaida, K. Shimano","doi":"10.1109/NOMS.2018.8406193","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406193","url":null,"abstract":"The concept of \"Network slicing\" enables us to provide an optimized logical infrastructure for each service. We construct multiple isolated logical infrastructures, slices, on a single physical infrastructure. Each slice accesses appropriate virtual network functions, a logical topology, isolated logical com-putational resources, and isolated logical network resources for the service to be provided. However, designing a service-specific slice is generally complicated. In general, service providers and slice providers are different. Therefore, service providers must design a slice optimized for their service and request slice construction from slice providers; slice providers need to understand a service to design a slice. This creates excessive time and cost overheads. We target automatic network slicing for services from the slice providers' point of view. In this paper, we assume that service providers develop their services from microservices. We show an architecture for automatic network slicing for microservices and implement it. We also discuss the issues revealed by our implementation efforts. This knowledge can be used to realize more general automatic network slicing for other service development methods. Automatic network slicing will provide slices more quickly and cheaply.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90678902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot 别偷我的无人机:用无人机蜜罐捕捉攻击者
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406119
Emmanouil Vasilomanolakis, Jörg Daubert, Dhanasekar Boopalan, M. Mühlhäuser
The increased utilization of Unmanned Aerial Vehicles (UAVs) in both personal as well as commercial and public safety scenarios has also opened the door to adversaries. In more details, such malicious activities may include the hijacking of the UAV (and its cargo), the theft of private information stored in the device, etc. In this paper, we introduce the idea of a honeypot that is specifically designed for the protection of UAVs. The honeypot, which is also capable of running on small portable devices, e.g., a Raspberry Pi, emulates a number of UAV-specific and UAV-tailored protocols, making it possible to lure adversaries into attacking it. Our system can assist into detecting active attackers in a certain area as well as into shedding light into the adversaries' techniques for compromising UAVs.
无人机(uav)在个人、商业和公共安全场景中的使用率越来越高,也为对手打开了大门。更详细地说,这种恶意活动可能包括劫持无人机(及其货物)、窃取存储在设备中的私人信息等。在本文中,我们介绍了专门为保护无人机而设计的蜜罐的思想。蜜罐也能够在小型便携式设备上运行,例如树莓派,模拟了许多无人机特定和无人机定制的协议,使其有可能引诱对手攻击它。我们的系统可以帮助探测某个区域的活跃攻击者,并揭示对手的无人机攻击技术。
{"title":"Don't steal my drone: Catching attackers with an unmanned aerial vehicle honeypot","authors":"Emmanouil Vasilomanolakis, Jörg Daubert, Dhanasekar Boopalan, M. Mühlhäuser","doi":"10.1109/NOMS.2018.8406119","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406119","url":null,"abstract":"The increased utilization of Unmanned Aerial Vehicles (UAVs) in both personal as well as commercial and public safety scenarios has also opened the door to adversaries. In more details, such malicious activities may include the hijacking of the UAV (and its cargo), the theft of private information stored in the device, etc. In this paper, we introduce the idea of a honeypot that is specifically designed for the protection of UAVs. The honeypot, which is also capable of running on small portable devices, e.g., a Raspberry Pi, emulates a number of UAV-specific and UAV-tailored protocols, making it possible to lure adversaries into attacking it. Our system can assist into detecting active attackers in a certain area as well as into shedding light into the adversaries' techniques for compromising UAVs.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83670633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How far can we push flow analysis to identify encrypted anonymity network traffic? 流量分析在识别加密匿名网络流量方面能走多远?
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406156
Khalid Shahbar, A. N. Zincir-Heywood
Anonymity networks provide privacy to the users by relaying their data to multiple destinations in order to reach the final destination anonymously. Multilayer of encryption is used to protect the users' privacy from attacks or even from the operators of the stations. In this research, we showed how flow analysis could be used to identify encrypted anonymity network traffic under four scenarios: (i) Identifying anonymity networks compared to normal background traffic; (ii) Identifying the type of applications used on the anonymity networks; (iii) Identifying traffic flow behaviors of the anonymity network users; and (iv) Identifying / profiling the users on an anonymity network based on the traffic flow behavior. In order to study these, we employ a machine learning based flow analysis approach and explore how far we can push such an approach.
匿名网络通过将用户的数据转发到多个目的地,以匿名方式到达最终目的地,从而为用户提供隐私。多层加密被用来保护用户的隐私不受攻击,甚至不受电台操作员的攻击。在本研究中,我们展示了如何在四种情况下使用流量分析来识别加密匿名网络流量:(i)将匿名网络与正常背景流量进行比较;查明匿名网络上使用的应用程序类型;(iii)识别匿名网络用户的流量行为;(iv)基于流量行为对匿名网络上的用户进行识别/分析。为了研究这些,我们采用了一种基于机器学习的流分析方法,并探索我们可以将这种方法推进多远。
{"title":"How far can we push flow analysis to identify encrypted anonymity network traffic?","authors":"Khalid Shahbar, A. N. Zincir-Heywood","doi":"10.1109/NOMS.2018.8406156","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406156","url":null,"abstract":"Anonymity networks provide privacy to the users by relaying their data to multiple destinations in order to reach the final destination anonymously. Multilayer of encryption is used to protect the users' privacy from attacks or even from the operators of the stations. In this research, we showed how flow analysis could be used to identify encrypted anonymity network traffic under four scenarios: (i) Identifying anonymity networks compared to normal background traffic; (ii) Identifying the type of applications used on the anonymity networks; (iii) Identifying traffic flow behaviors of the anonymity network users; and (iv) Identifying / profiling the users on an anonymity network based on the traffic flow behavior. In order to study these, we employ a machine learning based flow analysis approach and explore how far we can push such an approach.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84232030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Fast packet classification on OpenFlow switches using multiple R*-tree based bitmap intersection 基于多R*树的位图交集的OpenFlow交换机快速分组分类
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406227
Ding-Fong Huang, Chien Chen, Mahadevan Thanavel
In order to accomplish a stringent speed requirement for processing internet services such as Access Control List (ACL), Quality of Service (QoS), firewalls, etc., software based OpenFlow switches must have a fast packet classification capability. Even for hardware based OpenFlow switches, a limited size of Ternary Content Addressable Memory (TCAM) in the switch could be only enough for a forwarding table. Therefore, ACL, firewall tables, etc. need to be implemented by using the memory of the switch CPU. However, it has become a great challenge to build extremely effectively for next-generation software based packet classification that supports higher throughput and larger flow entries in OpenFlow switch. This paper first exploits a fast packet classification algorithm that forms a R*-Tree based Bitmap Intersection and secondly discusses an enhanced R*-Tree based Bitmap Intersection by using Bloom Filter and Multiple R*-Tree. The evaluation results show that the performance of the algorithm in OpenFlow switches is 4.42 times of Bitmap Intersection and 5.16 times of R*-Tree algorithm and consumes only 300 KB of memory space, which is much less than that of other methods. Finally, the use of multiple R*-Trees has further improved memory usage by about 30%.
为了满足处理诸如访问控制列表(ACL)、服务质量(QoS)、防火墙等互联网服务的严格速度要求,基于软件的OpenFlow交换机必须具有快速的数据包分类能力。即使对于基于硬件的OpenFlow交换机,交换机中有限大小的三元内容可寻址内存(TCAM)也只能容纳一个转发表。因此,ACL、防火墙表等需要使用交换机CPU的内存来实现。然而,如何在OpenFlow交换机中高效地构建支持更高吞吐量和更大流项的下一代基于软件的数据包分类已经成为一个巨大的挑战。本文首先提出了一种基于R*树的位图交集的快速分组分类算法,然后利用Bloom Filter和Multiple R*树讨论了基于R*树的位图交集的增强算法。评估结果表明,该算法在OpenFlow交换机中的性能是Bitmap Intersection算法的4.42倍、R*-Tree算法的5.16倍,且仅消耗300 KB的内存空间,远远小于其他方法。最后,使用多个R*- tree进一步提高了约30%的内存使用。
{"title":"Fast packet classification on OpenFlow switches using multiple R*-tree based bitmap intersection","authors":"Ding-Fong Huang, Chien Chen, Mahadevan Thanavel","doi":"10.1109/NOMS.2018.8406227","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406227","url":null,"abstract":"In order to accomplish a stringent speed requirement for processing internet services such as Access Control List (ACL), Quality of Service (QoS), firewalls, etc., software based OpenFlow switches must have a fast packet classification capability. Even for hardware based OpenFlow switches, a limited size of Ternary Content Addressable Memory (TCAM) in the switch could be only enough for a forwarding table. Therefore, ACL, firewall tables, etc. need to be implemented by using the memory of the switch CPU. However, it has become a great challenge to build extremely effectively for next-generation software based packet classification that supports higher throughput and larger flow entries in OpenFlow switch. This paper first exploits a fast packet classification algorithm that forms a R*-Tree based Bitmap Intersection and secondly discusses an enhanced R*-Tree based Bitmap Intersection by using Bloom Filter and Multiple R*-Tree. The evaluation results show that the performance of the algorithm in OpenFlow switches is 4.42 times of Bitmap Intersection and 5.16 times of R*-Tree algorithm and consumes only 300 KB of memory space, which is much less than that of other methods. Finally, the use of multiple R*-Trees has further improved memory usage by about 30%.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83650226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying performance bottlenecks in software data planes for cloud-based NFV services 识别基于云的NFV服务软件数据平面的性能瓶颈
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406161
Michel S. Bonfim, Rafael Roque, E. Coutinho, K. Dias, S. Fernandes
Network Function Visualization (NFV) is transforming the market for computer networks. Most proposed NFV solutions have been implemented and tested in cloud computing environments. In this context, both hardware and software-based features have been used to improve the performance of Virtual Network Functions (VNFs) by speeding up packet processing. However, there are still essential research challenges that need to be tackled to provide better performance experiences for NFV Services, such as detecting and diagnosing performance bottlenecks. However, due to the characteristics inherited from both Cloud and NFV environments, the detection and diagnose of performance problems is a complex task. In this work, we proposed PerfChecker, a monitoring tool that aims at detecting and diagnosing performance bottlenecks in Cloud-based NFV environments. We implemented a PerfChecker prototype for OpenStack and performed some experiments demonstrating that it can assist the cloud infrastructure operator to improve the performance of NFV services.
网络功能可视化(NFV)正在改变计算机网络市场。大多数提出的NFV解决方案已经在云计算环境中实现和测试。在这种情况下,基于硬件和基于软件的特性都被用于通过加速数据包处理来提高虚拟网络功能(VNFs)的性能。然而,要为NFV服务提供更好的性能体验,仍有一些重要的研究挑战需要解决,比如检测和诊断性能瓶颈。然而,由于云和NFV环境的特点,性能问题的检测和诊断是一项复杂的任务。在这项工作中,我们提出了PerfChecker,这是一个监控工具,旨在检测和诊断基于云的NFV环境中的性能瓶颈。我们为OpenStack实现了一个PerfChecker原型,并进行了一些实验,证明它可以帮助云基础设施运营商提高NFV服务的性能。
{"title":"Identifying performance bottlenecks in software data planes for cloud-based NFV services","authors":"Michel S. Bonfim, Rafael Roque, E. Coutinho, K. Dias, S. Fernandes","doi":"10.1109/NOMS.2018.8406161","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406161","url":null,"abstract":"Network Function Visualization (NFV) is transforming the market for computer networks. Most proposed NFV solutions have been implemented and tested in cloud computing environments. In this context, both hardware and software-based features have been used to improve the performance of Virtual Network Functions (VNFs) by speeding up packet processing. However, there are still essential research challenges that need to be tackled to provide better performance experiences for NFV Services, such as detecting and diagnosing performance bottlenecks. However, due to the characteristics inherited from both Cloud and NFV environments, the detection and diagnose of performance problems is a complex task. In this work, we proposed PerfChecker, a monitoring tool that aims at detecting and diagnosing performance bottlenecks in Cloud-based NFV environments. We implemented a PerfChecker prototype for OpenStack and performed some experiments demonstrating that it can assist the cloud infrastructure operator to improve the performance of NFV services.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89122531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Months into minutes: Rolling out changes faster with service management automation 从几个月到几分钟:通过服务管理自动化更快地推出更改
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406143
Alexander Keller, C. Dawson
Service Management Automation is widely regarded as the foundation for improving both productivity as well as quality of Service Delivery. For large Service Providers such as IBM Global Technology Services (GTS), Hybrid IT deployments present a variety of challenges in large deployments on a global scale. We describe an approach and our experiences to drastically improve the cycle times of change management, based on an extensive Service Request Catalog and a CMDB. We point out the key design points of our architecture and describe the tradeoffs we had to make, which we subsequently distill into a set of best practices.
服务管理自动化被广泛认为是提高生产力和服务交付质量的基础。对于像IBM Global Technology Services (GTS)这样的大型服务提供商,混合IT部署在全球范围内的大型部署中提出了各种各样的挑战。我们描述了一种基于广泛的服务请求目录和CMDB的方法和我们的经验,以大幅度改善变更管理的周期时间。我们指出了架构的关键设计点,并描述了我们必须做出的权衡,我们随后将其提炼成一组最佳实践。
{"title":"Months into minutes: Rolling out changes faster with service management automation","authors":"Alexander Keller, C. Dawson","doi":"10.1109/NOMS.2018.8406143","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406143","url":null,"abstract":"Service Management Automation is widely regarded as the foundation for improving both productivity as well as quality of Service Delivery. For large Service Providers such as IBM Global Technology Services (GTS), Hybrid IT deployments present a variety of challenges in large deployments on a global scale. We describe an approach and our experiences to drastically improve the cycle times of change management, based on an extensive Service Request Catalog and a CMDB. We point out the key design points of our architecture and describe the tradeoffs we had to make, which we subsequently distill into a set of best practices.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89319215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HoneyV: A virtualized honeynet system based on network softwarization HoneyV:基于网络软件化的虚拟化蜜网系统
Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406205
Bahman Rashidi, Carol J. Fung, Kevin W. Hamlen, Andrzej Kamisiński
Intrusion detection in modern enterprise networks faces challenges due to the increasing large volume of data and insufficient training data for anomaly detections. In this work, we propose a novel network topology for improved intrusion detection through multi-phase data monitoring system. Rather than the all-or-nothing approach to terminate all sessions identified as suspicious, the topology route traffic to different servers replicas with different monitoring intensity level based on their likelihood of attacks. This topology leverages recent advances in software-defined networking (SDN) to dynamically route such sessions into risk-appropriate computing environments. These environments offer enhanced training opportunities intrusion detection systems (IDSes) by exposing data streams that would not have been observable had the session merely been terminated at the first sign of maliciousness. They also afford defenders finer- grained risk management by supporting a continuum of endpoint environments, ranging from fully trusted, to semi-trusted, to fully untrusted, for example.
现代企业网络中的入侵检测面临着越来越大的数据量和不足的训练数据的挑战。在这项工作中,我们提出了一种新的网络拓扑结构,以改进通过多阶段数据监控系统的入侵检测。与终止所有被识别为可疑会话的全有或全无方法不同,拓扑根据攻击的可能性将流量路由到具有不同监控强度级别的不同服务器副本。这种拓扑利用了软件定义网络(SDN)的最新进展,将此类会话动态路由到适合风险的计算环境中。这些环境通过暴露数据流,为入侵检测系统(ids)提供了更好的培训机会,如果会话只是在第一次出现恶意迹象时终止,这些数据流就不会被观察到。它们还通过支持端点环境的连续体(例如,从完全可信、半可信到完全不可信),为防御者提供更细粒度的风险管理。
{"title":"HoneyV: A virtualized honeynet system based on network softwarization","authors":"Bahman Rashidi, Carol J. Fung, Kevin W. Hamlen, Andrzej Kamisiński","doi":"10.1109/NOMS.2018.8406205","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406205","url":null,"abstract":"Intrusion detection in modern enterprise networks faces challenges due to the increasing large volume of data and insufficient training data for anomaly detections. In this work, we propose a novel network topology for improved intrusion detection through multi-phase data monitoring system. Rather than the all-or-nothing approach to terminate all sessions identified as suspicious, the topology route traffic to different servers replicas with different monitoring intensity level based on their likelihood of attacks. This topology leverages recent advances in software-defined networking (SDN) to dynamically route such sessions into risk-appropriate computing environments. These environments offer enhanced training opportunities intrusion detection systems (IDSes) by exposing data streams that would not have been observable had the session merely been terminated at the first sign of maliciousness. They also afford defenders finer- grained risk management by supporting a continuum of endpoint environments, ranging from fully trusted, to semi-trusted, to fully untrusted, for example.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86484840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1