首页 > 最新文献

2017 13th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
Measuring exposure in DDoS protection services 测量DDoS防护服务中的暴露
Pub Date : 2017-11-30 DOI: 10.23919/CNSM.2017.8255991
M. Jonker, A. Sperotto
Denial-of-Service attacks have rapidly gained in popularity over the last decade. The increase in frequency, size, and complexity of attacks has made DDoS Protection Services (DPS) an attractive mitigation solution to which the protection of services can be outsourced. Despite a thriving market and increasing adoption of protection services, a DPS can often be bypassed, and direct attacks can be launched against the origin of a target. Many protection services leverage the Domain Name System (DNS) to protect, e.g., Web sites. When the DNS is misconfigured, the origin IP address of a target can leak to attackers, which defeats the purpose of outsourcing protection. We perform a large-scale analysis of this phenomenon by using three large data sets that cover a 16-month period: a data set of active DNS measurements; a DNS-based data set that focuses on DPS adoption; and a data set of DoS attacks inferred from backscatter traffic to a sizable darknet. We analyze nearly 11k Web sites on Alexa's top 1M that outsource protection, for eight leading DPS providers. Our results show that 40% of these Web sites expose the origin in the DNS. Moreover, we show that the origin of 19% of these Web sites is targeted after outsourcing protection.
在过去十年中,拒绝服务攻击迅速流行起来。攻击的频率、规模和复杂性的增加使得DDoS保护服务(DPS)成为一种有吸引力的缓解解决方案,可以将服务保护外包给它。尽管市场蓬勃发展,保护服务的采用也越来越多,但DPS通常可以被绕过,直接攻击可以针对目标的源头发起。许多保护服务利用域名系统(DNS)来保护,例如Web站点。当DNS配置错误时,目标的源IP地址可能会泄露给攻击者,从而破坏了外包保护的目的。我们通过使用覆盖16个月的三个大型数据集对这一现象进行大规模分析:活跃DNS测量数据集;侧重于DPS采用的基于dns的数据集;以及从反向散射流量推断到一个相当大的暗网的DoS攻击数据集。我们为八个领先的DPS提供商分析了Alexa前100万个外包保护的近11000个网站。我们的结果显示,这些网站中有40%在DNS中公开了来源。此外,我们表明,这些网站的19%的来源是外包保护后的目标。
{"title":"Measuring exposure in DDoS protection services","authors":"M. Jonker, A. Sperotto","doi":"10.23919/CNSM.2017.8255991","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255991","url":null,"abstract":"Denial-of-Service attacks have rapidly gained in popularity over the last decade. The increase in frequency, size, and complexity of attacks has made DDoS Protection Services (DPS) an attractive mitigation solution to which the protection of services can be outsourced. Despite a thriving market and increasing adoption of protection services, a DPS can often be bypassed, and direct attacks can be launched against the origin of a target. Many protection services leverage the Domain Name System (DNS) to protect, e.g., Web sites. When the DNS is misconfigured, the origin IP address of a target can leak to attackers, which defeats the purpose of outsourcing protection. We perform a large-scale analysis of this phenomenon by using three large data sets that cover a 16-month period: a data set of active DNS measurements; a DNS-based data set that focuses on DPS adoption; and a data set of DoS attacks inferred from backscatter traffic to a sizable darknet. We analyze nearly 11k Web sites on Alexa's top 1M that outsource protection, for eight leading DPS providers. Our results show that 40% of these Web sites expose the origin in the DNS. Moreover, we show that the origin of 19% of these Web sites is targeted after outsourcing protection.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131189086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enforcing free roaming among EU countries: An economic analysis 欧盟国家间强制自由漫游:一项经济分析
Pub Date : 2017-11-26 DOI: 10.23919/CNSM.2017.8255969
P. Maillé, B. Tuffin
In October 2015, the European parliament has decided to forbid roaming charges among EU mobile phone users, starting June 2017, as a first step toward the unification of the European digital market. In this paper, we aim at investigating the consequences of such a measure from an economic perspective. In particular, we analyze the effect of the willingness-to-pay heterogeneity among users (also due to wealth heterogeneity), and the fact that the roaming behavior is positively correlated with wealth. Considering a monopolistic operator, we compare the paid-roaming situation (with usage-based pricing) to the envisioned free-roaming from the point of view of the operator and of users. Our analysis suggests that imposing free roaming degrades the revenues of the operator but can also deter some users from subscribing. This is because paid roaming allows some partial market segmentation; hence we conclude that such (apparently beneficial) regulatory decisions must be taken with care.
2015年10月,欧洲议会决定从2017年6月起禁止欧盟手机用户的漫游费,这是欧洲数字市场统一的第一步。在本文中,我们旨在从经济学的角度调查这种措施的后果。特别地,我们分析了用户支付意愿异质性(也是由于财富异质性)的影响,以及漫游行为与财富正相关的事实。考虑到一个垄断的运营商,我们从运营商和用户的角度比较了付费漫游的情况(基于使用的定价)和设想的自由漫游。我们的分析表明,实行免费漫游会降低运营商的收入,但也会阻止一些用户订阅。这是因为付费漫游允许部分细分市场;因此,我们得出结论,必须谨慎对待这种(显然有益的)监管决定。
{"title":"Enforcing free roaming among EU countries: An economic analysis","authors":"P. Maillé, B. Tuffin","doi":"10.23919/CNSM.2017.8255969","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255969","url":null,"abstract":"In October 2015, the European parliament has decided to forbid roaming charges among EU mobile phone users, starting June 2017, as a first step toward the unification of the European digital market. In this paper, we aim at investigating the consequences of such a measure from an economic perspective. In particular, we analyze the effect of the willingness-to-pay heterogeneity among users (also due to wealth heterogeneity), and the fact that the roaming behavior is positively correlated with wealth. Considering a monopolistic operator, we compare the paid-roaming situation (with usage-based pricing) to the envisioned free-roaming from the point of view of the operator and of users. Our analysis suggests that imposing free roaming degrades the revenues of the operator but can also deter some users from subscribing. This is because paid roaming allows some partial market segmentation; hence we conclude that such (apparently beneficial) regulatory decisions must be taken with care.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"36 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128056591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A lightweight snapshot-based DDoS detector 基于快照的轻量级DDoS检测器
Pub Date : 2017-11-26 DOI: 10.23919/CNSM.2017.8256014
Gilles Roudière, P. Owezarski
Despite the efforts made from both the research community and the industry in inventing new methods to deal with distributed denial of service attacks, they stay a major threat in the Internet network. Those attacks are numerous, and can prevent, in most serious cases, the targeted system from answering any request from its clients. Detecting such attacks means dealing with several difficulties, such as their distributed nature or the several evasions techniques available to the attackers. The detection process has also a cost, which includes both the resources needed to perform the detection and the work of the network administrator. In this paper we introduce AATAC (Autonomous Algorithm for Traffic Anomaly Detection), an unsupervised DDoS detector that focuses on reducing the computational resources needed to process the traffic. It models the traffic using a set of regularly created snapshots. Each new snapshot is compared to this model using a k-NN based measure to detect significant deviations toward the usual traffic profile. Those snapshots are also used to provide the network administrator with an explicit and dynamic view of the traffic when an anomaly occurs. Our evaluation shows that AATAC is able to efficiently process real traces with low computational resources requirements, while achieving an efficient detection producing a low number of false-positives.
尽管研究团体和业界都在努力发明新的方法来处理分布式拒绝服务攻击,但它们仍然是Internet网络中的主要威胁。这些攻击数量众多,在大多数严重的情况下,可以阻止目标系统响应其客户端的任何请求。检测这类攻击意味着要处理一些困难,比如它们的分布式特性或攻击者可用的几种逃避技术。检测过程也有成本,包括执行检测所需的资源和网络管理员的工作。在本文中,我们介绍了AATAC(流量异常检测自治算法),这是一种无监督的DDoS检测器,专注于减少处理流量所需的计算资源。它使用一组定期创建的快照对流量进行建模。每个新快照都使用基于k-NN的度量与该模型进行比较,以检测与通常流量概况的显著偏差。这些快照还用于在发生异常时向网络管理员提供流量的显式动态视图。我们的评估表明,AATAC能够以较低的计算资源需求有效地处理真实轨迹,同时实现有效的检测,产生较少的误报。
{"title":"A lightweight snapshot-based DDoS detector","authors":"Gilles Roudière, P. Owezarski","doi":"10.23919/CNSM.2017.8256014","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256014","url":null,"abstract":"Despite the efforts made from both the research community and the industry in inventing new methods to deal with distributed denial of service attacks, they stay a major threat in the Internet network. Those attacks are numerous, and can prevent, in most serious cases, the targeted system from answering any request from its clients. Detecting such attacks means dealing with several difficulties, such as their distributed nature or the several evasions techniques available to the attackers. The detection process has also a cost, which includes both the resources needed to perform the detection and the work of the network administrator. In this paper we introduce AATAC (Autonomous Algorithm for Traffic Anomaly Detection), an unsupervised DDoS detector that focuses on reducing the computational resources needed to process the traffic. It models the traffic using a set of regularly created snapshots. Each new snapshot is compared to this model using a k-NN based measure to detect significant deviations toward the usual traffic profile. Those snapshots are also used to provide the network administrator with an explicit and dynamic view of the traffic when an anomaly occurs. Our evaluation shows that AATAC is able to efficiently process real traces with low computational resources requirements, while achieving an efficient detection producing a low number of false-positives.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122624250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Connectivity extraction in cloud infrastructures 云基础设施中的连通性提取
Pub Date : 2017-11-26 DOI: 10.23919/CNSM.2017.8256010
P. Mensah, S. Dubus, Wael Kanoun, C. Morin, G. Piolle, Eric Totel
For management and security purposes, cloud providers should know the connectivity graph between virtual machines. Since traditional methods used in physical networks produce incomplete results and are hardly usable in the Cloud, we propose to use information provided by a Cloud Management Software and an SDN controller, to compute the connectivity graph in those environments. Our approach shows an exact, complete and up-to-date connectivity graphs computation on a representative infrastructure, in reasonable time.
出于管理和安全的目的,云提供商应该知道虚拟机之间的连接图。由于在物理网络中使用的传统方法会产生不完整的结果,并且很难在云中使用,因此我们建议使用云管理软件和SDN控制器提供的信息来计算这些环境中的连接图。我们的方法在合理的时间内显示了代表性基础设施上精确、完整和最新的连接图计算。
{"title":"Connectivity extraction in cloud infrastructures","authors":"P. Mensah, S. Dubus, Wael Kanoun, C. Morin, G. Piolle, Eric Totel","doi":"10.23919/CNSM.2017.8256010","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256010","url":null,"abstract":"For management and security purposes, cloud providers should know the connectivity graph between virtual machines. Since traditional methods used in physical networks produce incomplete results and are hardly usable in the Cloud, we propose to use information provided by a Cloud Management Software and an SDN controller, to compute the connectivity graph in those environments. Our approach shows an exact, complete and up-to-date connectivity graphs computation on a representative infrastructure, in reasonable time.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115209463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An evolutionary controllers' placement algorithm for reliable SDN networks 可靠SDN网络的演化控制器布局算法
Pub Date : 2017-11-26 DOI: 10.23919/CNSM.2017.8256047
Jean-Michel Sanner, Y. H. Aoul, M. Ouzzif, G. Rubino
SDN controllers placement in TelCo networks are generally multi-objective and multi-constrained problems. The solutions proposed in the literature usually model the placement problem by providing a mixed integer linear program (MILP). Their performances are, however, quickly limited for large sized networks, due to the significant increase in the computational delays. In order to avoid the inherent complexity of optimal approaches and the lack of flexibility of heuristics, we propose in this paper a genetic algorithm designed from the NSGA II framework that aims to deal with the controller placement problem. Genetic algorithms can, indeed, be both multi-objective, multi-constraints and can be designed to be computed in parallel. They constitute a real opportunity to find good solutions to this category of problems. Furthermore, the proposed algorithm can be easily adapted to manage dynamic placements scenarios. The goal chosen, in this work, is to maximize the clusters average connectivity and to balance the control's load between clusters, in a way to improve the networks' reliability. The evaluation results on a set of network topologies demonstrated very good performances, which achieve optimal results for small networks.
电信网络中SDN控制器的布置通常是一个多目标、多约束的问题。文献中提出的解决方案通常通过提供混合整数线性规划(MILP)来模拟放置问题。然而,由于计算延迟的显著增加,它们的性能在大型网络中很快受到限制。为了避免最优方法固有的复杂性和启发式方法缺乏灵活性,本文提出了一种基于NSGA II框架设计的遗传算法,旨在处理控制器放置问题。事实上,遗传算法可以是多目标、多约束的,并且可以设计成并行计算的。它们构成了为这类问题找到良好解决办法的真正机会。此外,该算法可以很容易地适应管理动态放置场景。本文选择的目标是最大化集群的平均连通性,平衡集群间的控制负载,从而提高网络的可靠性。在一组网络拓扑结构上的评估结果显示了非常好的性能,对于小型网络达到了最优结果。
{"title":"An evolutionary controllers' placement algorithm for reliable SDN networks","authors":"Jean-Michel Sanner, Y. H. Aoul, M. Ouzzif, G. Rubino","doi":"10.23919/CNSM.2017.8256047","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256047","url":null,"abstract":"SDN controllers placement in TelCo networks are generally multi-objective and multi-constrained problems. The solutions proposed in the literature usually model the placement problem by providing a mixed integer linear program (MILP). Their performances are, however, quickly limited for large sized networks, due to the significant increase in the computational delays. In order to avoid the inherent complexity of optimal approaches and the lack of flexibility of heuristics, we propose in this paper a genetic algorithm designed from the NSGA II framework that aims to deal with the controller placement problem. Genetic algorithms can, indeed, be both multi-objective, multi-constraints and can be designed to be computed in parallel. They constitute a real opportunity to find good solutions to this category of problems. Furthermore, the proposed algorithm can be easily adapted to manage dynamic placements scenarios. The goal chosen, in this work, is to maximize the clusters average connectivity and to balance the control's load between clusters, in a way to improve the networks' reliability. The evaluation results on a set of network topologies demonstrated very good performances, which achieve optimal results for small networks.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120960520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Anomaly detection for openstack services with process-related topological analysis openstack服务异常检测与进程相关的拓扑分析
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255977
T. Niwa, Yuki Kasuya, T. Kitahara
OpenStack has become the de-facto standard open source software for managing virtualized infrastructure for NFV, however, operators are facing increased complexity of fault management for OpenStack due to its black-box modular architecture and half-yearly version updates. This hinders operators from promptly identifying the root cause of failure or anomalies in OpenStack services. In this paper, we propose an anomaly detection framework for OpenStack in order to identify the root process of anomalies underlying OpenStack services. The framework utilizes a process relational graph and an anomaly detection technique with a centroid-based clustering algorithm. We demonstrate experiments with regards to two use cases and prove the framework to enable discovery of the root process that is responsible for the anomalous situation.
OpenStack已经成为NFV虚拟化基础设施管理的事实上的标准开源软件,然而,由于OpenStack的黑盒模块化架构和半年一次的版本更新,运营商面临着越来越复杂的故障管理。这将导致操作人员无法及时发现OpenStack服务故障或异常的根本原因。本文提出了一种OpenStack异常检测框架,用于识别OpenStack服务异常的根进程。该框架利用过程关系图和基于质心聚类算法的异常检测技术。我们演示了关于两个用例的实验,并证明了该框架能够发现导致异常情况的根进程。
{"title":"Anomaly detection for openstack services with process-related topological analysis","authors":"T. Niwa, Yuki Kasuya, T. Kitahara","doi":"10.23919/CNSM.2017.8255977","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255977","url":null,"abstract":"OpenStack has become the de-facto standard open source software for managing virtualized infrastructure for NFV, however, operators are facing increased complexity of fault management for OpenStack due to its black-box modular architecture and half-yearly version updates. This hinders operators from promptly identifying the root cause of failure or anomalies in OpenStack services. In this paper, we propose an anomaly detection framework for OpenStack in order to identify the root process of anomalies underlying OpenStack services. The framework utilizes a process relational graph and an anomaly detection technique with a centroid-based clustering algorithm. We demonstrate experiments with regards to two use cases and prove the framework to enable discovery of the root process that is responsible for the anomalous situation.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Arena: Adaptive real-time update anomaly prediction in cloud systems 竞技场:云系统中的自适应实时更新异常预测
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256031
Shaohan Huang, Carol J. Fung, Chang Liu, Shupeng Zhang, Guang Wei, Zhongzhi Luan, D. Qian
In current cloud systems, their monitoring relies strongly on rule-based and supervised-learning-based detection methods for anomaly detection. These methods require either some knowledge provided by an expert system or monitoring data to be labeled as a training set. In practice, the systems behavior changes over time. It is difficult to adjust the rules or re-train detection model for these methods. In this paper, we present an Adaptive REal-time update uNsupervised Anomaly prediction system (Arena) for cloud systems. Arena uses a clustering technique based on a density spatial clustering algorithm to identify clusters and outliers. We propose two prediction strategies to improve the ability to predict anomaly and a real-time update strategy by adding new monitoring points into Arenas model. To improve the prediction efficiency and reduce the scale of the model, we adopt a pruning method to remove redundant points. The anomaly data used in the experiments was collected from the Yahoo Lab and the component based system of enterprise T. The experimental results show that our proposed methods can achieve high prediction accuracy compared to existing methods. Realtime update strategy can improve the prediction performance. The pruning method can further reduce the scale of the model and demonstrates the prediction efficiency.
在当前的云系统中,它们的监控严重依赖于基于规则和基于监督学习的检测方法来进行异常检测。这些方法要么需要专家系统提供的一些知识,要么需要将监控数据标记为训练集。在实践中,系统的行为会随着时间而变化。对于这些方法,很难调整规则或重新训练检测模型。本文提出了一种用于云系统的自适应实时更新无监督异常预测系统(Arena)。Arena使用基于密度空间聚类算法的聚类技术来识别聚类和离群值。我们提出了两种预测策略来提高异常预测能力,并通过在Arenas模型中增加新的监测点来实时更新策略。为了提高预测效率和减小模型的规模,我们采用剪枝的方法去除冗余点。实验中使用的异常数据来自雅虎实验室和t企业基于组件的系统,实验结果表明,与现有方法相比,我们提出的方法可以达到较高的预测精度。实时更新策略可以提高预测性能。剪枝方法可以进一步减小模型的规模,证明了预测的有效性。
{"title":"Arena: Adaptive real-time update anomaly prediction in cloud systems","authors":"Shaohan Huang, Carol J. Fung, Chang Liu, Shupeng Zhang, Guang Wei, Zhongzhi Luan, D. Qian","doi":"10.23919/CNSM.2017.8256031","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256031","url":null,"abstract":"In current cloud systems, their monitoring relies strongly on rule-based and supervised-learning-based detection methods for anomaly detection. These methods require either some knowledge provided by an expert system or monitoring data to be labeled as a training set. In practice, the systems behavior changes over time. It is difficult to adjust the rules or re-train detection model for these methods. In this paper, we present an Adaptive REal-time update uNsupervised Anomaly prediction system (Arena) for cloud systems. Arena uses a clustering technique based on a density spatial clustering algorithm to identify clusters and outliers. We propose two prediction strategies to improve the ability to predict anomaly and a real-time update strategy by adding new monitoring points into Arenas model. To improve the prediction efficiency and reduce the scale of the model, we adopt a pruning method to remove redundant points. The anomaly data used in the experiments was collected from the Yahoo Lab and the component based system of enterprise T. The experimental results show that our proposed methods can achieve high prediction accuracy compared to existing methods. Realtime update strategy can improve the prediction performance. The pruning method can further reduce the scale of the model and demonstrates the prediction efficiency.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121279074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation toolbox for studying energy consumption in wired networks 研究有线网络能耗的仿真工具箱
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256037
Anne-Cécile Orgerie, B. Amersho, Timothée Haudebourg, M. Quinson, M. Rifai, Dino Lopez Pacheco, L. Lefèvre
Networking infrastructures are considered to consume as much energy as terminal end-user equipment or datacenters. While energy consumption of wireless networks is a matter of concern since their beginning, it is not the case for wired networks as they do not rely on batteries, but on plugged equipment. Yet, facing growing consumption, energy-efficient techniques start to be implemented in wired networks. However, measuring the end-to-end energy consumption of wired networking infrastructures remains a real challenge for network operators and scientists. This article presents the ECOFEN (Energy Consumption mOdel For End-to-end Networks) framework which allows to support precise simulation of energy consumption of large-scale complex wired networks. The experimental validation shows that Ecofen provides accurate energy consumption values.
网络基础设施被认为消耗的能源与终端终端用户设备或数据中心一样多。虽然无线网络的能源消耗从一开始就是一个令人担忧的问题,但有线网络却不是这样,因为它们不依赖于电池,而是依赖于插电设备。然而,面对日益增长的消费,节能技术开始在有线网络中实施。然而,对于网络运营商和科学家来说,测量有线网络基础设施的端到端能耗仍然是一个真正的挑战。本文介绍了ECOFEN(端到端网络能耗模型)框架,该框架支持大规模复杂有线网络能耗的精确模拟。实验验证表明,Ecofen提供了准确的能耗值。
{"title":"Simulation toolbox for studying energy consumption in wired networks","authors":"Anne-Cécile Orgerie, B. Amersho, Timothée Haudebourg, M. Quinson, M. Rifai, Dino Lopez Pacheco, L. Lefèvre","doi":"10.23919/CNSM.2017.8256037","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256037","url":null,"abstract":"Networking infrastructures are considered to consume as much energy as terminal end-user equipment or datacenters. While energy consumption of wireless networks is a matter of concern since their beginning, it is not the case for wired networks as they do not rely on batteries, but on plugged equipment. Yet, facing growing consumption, energy-efficient techniques start to be implemented in wired networks. However, measuring the end-to-end energy consumption of wired networking infrastructures remains a real challenge for network operators and scientists. This article presents the ECOFEN (Energy Consumption mOdel For End-to-end Networks) framework which allows to support precise simulation of energy consumption of large-scale complex wired networks. The experimental validation shows that Ecofen provides accurate energy consumption values.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"127 45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114453929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Distributed-collaborative managed dash video services 分布式协同管理的dash视频服务
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256001
Kemal E. Sahin, K. Bagci, A. Tekalp
We propose a new distributed-collaborative managed DASH video service architecture over software defined networks (SDN) that enables fair and stable video quality to heterogeneous resolution clients. The proposed service is managed by the video service provider (VSP) in collaboration with the network service provider (NSP), where groups of clients sharing a network slice with a reserved throughput collaborate with each other to compute their own fair-share bitrates. Our novel distributed service architecture allows each client to share its buffer status with other clients in the same collaboration group so that each client can estimate a group-buffer-status aware fair-share bitrate, enforce this rate by TCP receive-window size control over a network slice reserved for the group, and perform application-level DASH video rate adaptation that is consistent with this enforced fair bitrate. Experimental results show that the proposed collaborative video service outperforms the traditional competitive DASH clients in terms of (i) minimizing quality fluctuations per client, (ii) fairness among heterogeneous DASH clients, and (iii) maximizing the total goodput of reserved network slice.
本文提出了一种基于软件定义网络(SDN)的分布式协同管理的DASH视频服务架构,该架构能够为异构分辨率客户端提供公平稳定的视频质量。建议的服务由视频服务提供商(VSP)与网络服务提供商(NSP)合作管理,其中客户端组共享具有保留吞吐量的网络切片,彼此协作以计算自己的公平共享比特率。我们新颖的分布式服务架构允许每个客户端与同一协作组中的其他客户端共享其缓冲状态,以便每个客户端可以估计组缓冲状态感知的公平共享比特率,通过TCP接收窗口大小控制为组保留的网络片强制执行此速率,并执行与此强制执行的公平比特率一致的应用级DASH视频速率适应。实验结果表明,本文提出的协同视频服务在(i)最小化每个客户端质量波动、(ii)异构DASH客户端之间的公平性以及(iii)最大化保留网络切片的总goodput方面优于传统的竞争性DASH客户端。
{"title":"Distributed-collaborative managed dash video services","authors":"Kemal E. Sahin, K. Bagci, A. Tekalp","doi":"10.23919/CNSM.2017.8256001","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256001","url":null,"abstract":"We propose a new distributed-collaborative managed DASH video service architecture over software defined networks (SDN) that enables fair and stable video quality to heterogeneous resolution clients. The proposed service is managed by the video service provider (VSP) in collaboration with the network service provider (NSP), where groups of clients sharing a network slice with a reserved throughput collaborate with each other to compute their own fair-share bitrates. Our novel distributed service architecture allows each client to share its buffer status with other clients in the same collaboration group so that each client can estimate a group-buffer-status aware fair-share bitrate, enforce this rate by TCP receive-window size control over a network slice reserved for the group, and perform application-level DASH video rate adaptation that is consistent with this enforced fair bitrate. Experimental results show that the proposed collaborative video service outperforms the traditional competitive DASH clients in terms of (i) minimizing quality fluctuations per client, (ii) fairness among heterogeneous DASH clients, and (iii) maximizing the total goodput of reserved network slice.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123652455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive and distributed monitoring mechanism in software-defined networks 软件定义网络中的自适应分布式监控机制
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256003
X. Phan, I. D. Martinez-Casanueva, K. Fukuda
Network traffic monitoring is an important factor to ensure the controllability and manageability of software-defined network (SDN). The current monitoring mechanism of SDN requires switches to request the controller for instructions to install flow entries for every new incoming flow. For finegrained monitoring, which requires many flow entries in switches' flow tables, this mechanism creates a non-trivial delay in the forwarding of switches and overhead in the control channel. Our previous work presented SDN-Mon, a monitoring framework that supports fine-grained monitoring for SDN. In this paper, we discuss the aspect of monitoring the flows in a distributed manner. We believe that a distributed monitoring capability enhances the monitoring scalability for SDN. We propose a mechanism that supports SDN to distribute the monitoring load over multiple switches in the network, in which it prevents flows monitoring duplication and balances the monitoring load over switches in the network. With the proposed mechanism, each switch handles much less monitoring load; and the overhead at switches, the control channel, and the controller caused by the monitoring duplication is eliminated. We implement the proposal and integrate it to SDN-Mon to enable a scalable and distributed monitoring capability in SDN. Experimental results show that the proposed mechanism significantly reduces the amount of monitoring load per switch, while the monitoring load is well balanced over switches in the network, with only an acceptable polling and processing overhead.
网络流量监控是保证软件定义网络(SDN)可控性和可管理性的重要因素。当前SDN的监控机制要求交换机向控制器请求指令,为每一个新的传入流安装流项。对于需要在交换机流表中包含许多流项的细粒度监控,这种机制在交换机的转发和控制通道中的开销中造成了不小的延迟。我们之前的工作介绍了SDN- mon,这是一个支持对SDN进行细粒度监控的监控框架。本文讨论了以分布式方式监控流的问题。我们认为分布式监控能力增强了SDN监控的可扩展性。我们提出了一种支持SDN的机制,将监控负载分配到网络中的多个交换机上,防止流量监控重复,平衡网络中交换机的监控负载。采用该机制,每个交换机处理的监控负载大大减少;并且消除了由于监控重复而造成的开关、控制通道和控制器的开销。我们实现了该方案并将其集成到SDN- mon中,以实现SDN中可扩展的分布式监控功能。实验结果表明,该机制显著减少了每台交换机的监控负载,同时监控负载在网络中的交换机之间很好地平衡,只有可接受的轮询和处理开销。
{"title":"Adaptive and distributed monitoring mechanism in software-defined networks","authors":"X. Phan, I. D. Martinez-Casanueva, K. Fukuda","doi":"10.23919/CNSM.2017.8256003","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256003","url":null,"abstract":"Network traffic monitoring is an important factor to ensure the controllability and manageability of software-defined network (SDN). The current monitoring mechanism of SDN requires switches to request the controller for instructions to install flow entries for every new incoming flow. For finegrained monitoring, which requires many flow entries in switches' flow tables, this mechanism creates a non-trivial delay in the forwarding of switches and overhead in the control channel. Our previous work presented SDN-Mon, a monitoring framework that supports fine-grained monitoring for SDN. In this paper, we discuss the aspect of monitoring the flows in a distributed manner. We believe that a distributed monitoring capability enhances the monitoring scalability for SDN. We propose a mechanism that supports SDN to distribute the monitoring load over multiple switches in the network, in which it prevents flows monitoring duplication and balances the monitoring load over switches in the network. With the proposed mechanism, each switch handles much less monitoring load; and the overhead at switches, the control channel, and the controller caused by the monitoring duplication is eliminated. We implement the proposal and integrate it to SDN-Mon to enable a scalable and distributed monitoring capability in SDN. Experimental results show that the proposed mechanism significantly reduces the amount of monitoring load per switch, while the monitoring load is well balanced over switches in the network, with only an acceptable polling and processing overhead.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132313248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2017 13th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1