首页 > 最新文献

2017 13th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
An adaptive scaling mechanism for managing performance variations in network functions virtualization: A case study in an NFV-based EPC 用于管理网络功能虚拟化中性能变化的自适应扩展机制:基于nfv的EPC案例研究
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255982
Carlos Hernan Tobar Arteaga, Fulvio Risso, O. Rendón
The scaling is a fundamental task that allows addressing performance variations in Network Functions Virtualization (NFV). In the literature, several approaches propose scaling mechanisms that differ in the utilized technique (e.g., reactive, predictive and machine learning-based). The scaling in NFV must be accurate both at the time and the number of instances to be scaled, aiming at avoiding unnecessary procedures of provisioning and releasing of resources; however, achieving a high accuracy is a non-trivial task. In this paper, we propose for NFV an adaptive scaling mechanism based on Q-Learning and Gaussian Processes that are utilized by an agent to carry out an improvement strategy of a scaling policy, and therefore, to make better decisions for managing performance variations. We evaluate our mechanism by simulations, in a case study in a virtualized Evolved Packet Core, corroborating that it is more accurate than approaches based on static threshold rules and Q-Learning without a policy improvement strategy.
扩展是解决网络功能虚拟化(NFV)中性能变化的一项基本任务。在文献中,几种方法提出了不同于所使用技术的扩展机制(例如,反应性,预测性和基于机器学习的)。NFV中的扩展必须在时间和要扩展的实例数量上都是准确的,旨在避免不必要的资源供应和释放过程;然而,实现高准确度是一项不平凡的任务。在本文中,我们为NFV提出了一种基于Q-Learning和高斯过程的自适应缩放机制,该机制被智能体用来执行缩放策略的改进策略,从而为管理性能变化做出更好的决策。我们通过模拟来评估我们的机制,在一个虚拟的进化分组核心的案例研究中,证实它比基于静态阈值规则和没有策略改进策略的Q-Learning方法更准确。
{"title":"An adaptive scaling mechanism for managing performance variations in network functions virtualization: A case study in an NFV-based EPC","authors":"Carlos Hernan Tobar Arteaga, Fulvio Risso, O. Rendón","doi":"10.23919/CNSM.2017.8255982","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255982","url":null,"abstract":"The scaling is a fundamental task that allows addressing performance variations in Network Functions Virtualization (NFV). In the literature, several approaches propose scaling mechanisms that differ in the utilized technique (e.g., reactive, predictive and machine learning-based). The scaling in NFV must be accurate both at the time and the number of instances to be scaled, aiming at avoiding unnecessary procedures of provisioning and releasing of resources; however, achieving a high accuracy is a non-trivial task. In this paper, we propose for NFV an adaptive scaling mechanism based on Q-Learning and Gaussian Processes that are utilized by an agent to carry out an improvement strategy of a scaling policy, and therefore, to make better decisions for managing performance variations. We evaluate our mechanism by simulations, in a case study in a virtualized Evolved Packet Core, corroborating that it is more accurate than approaches based on static threshold rules and Q-Learning without a policy improvement strategy.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127575681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
ORCHESTRA: Virtualized and programmable orchestration of heterogeneous WLANs 异构无线局域网的虚拟化和可编程编排
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255999
Ensar Zeljković, Tom De Schepper, Patrick Bosch, Ian Vermeulen, J. Haxhibeqiri, J. Hoebeke, J. Famaey, Steven Latré
Local area networks (LANs) are employed by a plethora of heterogeneous consumer devices, equipped with the ability to connect to the Internet using a variety of different wireless network technologies. Existing solutions and the lower layers of the OSI stack are unfit to cope with this heterogeneity. For instance, dynamical inter-technology switching is user-of application-based. We propose the ORCHESTRA framework to manage the different devices in heterogeneous wireless local area networks (WLANs) and introduce capabilities such as packet-level dynamic and intelligent handovers (both inter- and intratechnology), load balancing, replication, and scheduling. The framework consists of a controller that is capable of communicating with both existing Software-Defined Networking (SDN) and Network Function Virtualization (NFV) controllers and with devices containing a newly introduced virtual Medium Access Control (MAC) layer. We show that the virtual MAC enables transparent and real-time inter-technology handovers and that our solution scales up to two thousands of clients.
局域网(lan)被大量的异构消费者设备所使用,这些设备配备了使用各种不同的无线网络技术连接到Internet的能力。现有的解决方案和OSI栈的底层不适合处理这种异构性。例如,动态技术间切换是基于用户的应用程序。我们建议使用ORCHESTRA框架来管理异构无线局域网(wlan)中的不同设备,并引入诸如包级动态和智能切换(技术间和技术内部)、负载平衡、复制和调度等功能。该框架由一个控制器组成,该控制器能够与现有的软件定义网络(SDN)和网络功能虚拟化(NFV)控制器以及包含新引入的虚拟介质访问控制(MAC)层的设备通信。我们表明,虚拟MAC可以实现透明和实时的技术间切换,并且我们的解决方案可以扩展到2000个客户端。
{"title":"ORCHESTRA: Virtualized and programmable orchestration of heterogeneous WLANs","authors":"Ensar Zeljković, Tom De Schepper, Patrick Bosch, Ian Vermeulen, J. Haxhibeqiri, J. Hoebeke, J. Famaey, Steven Latré","doi":"10.23919/CNSM.2017.8255999","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255999","url":null,"abstract":"Local area networks (LANs) are employed by a plethora of heterogeneous consumer devices, equipped with the ability to connect to the Internet using a variety of different wireless network technologies. Existing solutions and the lower layers of the OSI stack are unfit to cope with this heterogeneity. For instance, dynamical inter-technology switching is user-of application-based. We propose the ORCHESTRA framework to manage the different devices in heterogeneous wireless local area networks (WLANs) and introduce capabilities such as packet-level dynamic and intelligent handovers (both inter- and intratechnology), load balancing, replication, and scheduling. The framework consists of a controller that is capable of communicating with both existing Software-Defined Networking (SDN) and Network Function Virtualization (NFV) controllers and with devices containing a newly introduced virtual Medium Access Control (MAC) layer. We show that the virtual MAC enables transparent and real-time inter-technology handovers and that our solution scales up to two thousands of clients.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128384102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Delay-aware VNF placement and chaining based on a flexible resource allocation approach 基于灵活资源分配方法的延迟感知VNF放置和链接
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255993
Abdelhamid Alleg, T. Ahmed, M. Mosbah, R. Riggio, R. Boutaba
Network Function Virtualization (NFV) is a promising technology that is receiving significant attention in both academia and the industry. NFV paradigm proposes to decouple Network Functions (NFs) from dedicated hardware equipment, offering a better sharing of physical resources and providing more flexibility to network operators. However, in such environment, efficient management mechanisms are crucial to address the problem of Placement and Chaining of Virtual Network Functions (PC-VNF). In this paper, we introduce a PC-VNF model based on a flexible resource allocation approach that takes into account service requirements in terms of latency, in addition to traditional connectivity and resource utilization. This is particularly important for emerging 5G services such as ultrareliable, low latency and massive machine type communications. The end-to-end performance needs to meet the user expectations as well as service requirements to provide the desired QoS/QoE. Our main goal is to determine the optimal VNF placement minimizing resource consumption while providing specific latency (i.e., end-to-end delay) and avoiding violation of Service Level Agreements (SLA) by constraining allocated resources to a given VNF to reach its required performance. Results show that our approach achieves the required latency with better resources utilization compared to the classical approaches, with a reduction of up to 40% of resource consumption and a higher rate of accepted requests by recovering 15 to 60 % of the rejected requests.
网络功能虚拟化(NFV)是一项很有前途的技术,受到学术界和工业界的极大关注。NFV模式提出将网络功能(Network Functions, NFs)与专用硬件设备解耦,提供更好的物理资源共享,并为网络运营商提供更大的灵活性。然而,在这种环境下,有效的管理机制对于解决PC-VNF (Virtual Network Functions)的配置和链接问题至关重要。在本文中,我们介绍了一种基于灵活资源分配方法的PC-VNF模型,该模型除了考虑传统的连接性和资源利用率之外,还考虑了延迟方面的服务需求。这对于超可靠、低延迟和大规模机器类型通信等新兴5G服务尤其重要。端到端性能需要满足用户期望和服务需求,以提供所需的QoS/QoE。我们的主要目标是确定最佳的VNF布局,在提供特定延迟(即端到端延迟)的同时最大限度地减少资源消耗,并通过限制分配给给定VNF的资源来达到其所需的性能,从而避免违反服务水平协议(SLA)。结果表明,与传统方法相比,我们的方法实现了所需的延迟和更好的资源利用率,减少了高达40%的资源消耗,并通过恢复15%到60%的被拒绝请求来提高请求接受率。
{"title":"Delay-aware VNF placement and chaining based on a flexible resource allocation approach","authors":"Abdelhamid Alleg, T. Ahmed, M. Mosbah, R. Riggio, R. Boutaba","doi":"10.23919/CNSM.2017.8255993","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255993","url":null,"abstract":"Network Function Virtualization (NFV) is a promising technology that is receiving significant attention in both academia and the industry. NFV paradigm proposes to decouple Network Functions (NFs) from dedicated hardware equipment, offering a better sharing of physical resources and providing more flexibility to network operators. However, in such environment, efficient management mechanisms are crucial to address the problem of Placement and Chaining of Virtual Network Functions (PC-VNF). In this paper, we introduce a PC-VNF model based on a flexible resource allocation approach that takes into account service requirements in terms of latency, in addition to traditional connectivity and resource utilization. This is particularly important for emerging 5G services such as ultrareliable, low latency and massive machine type communications. The end-to-end performance needs to meet the user expectations as well as service requirements to provide the desired QoS/QoE. Our main goal is to determine the optimal VNF placement minimizing resource consumption while providing specific latency (i.e., end-to-end delay) and avoiding violation of Service Level Agreements (SLA) by constraining allocated resources to a given VNF to reach its required performance. Results show that our approach achieves the required latency with better resources utilization compared to the classical approaches, with a reduction of up to 40% of resource consumption and a higher rate of accepted requests by recovering 15 to 60 % of the rejected requests.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130255994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Evaluating the impact of SDN-induced frequent route changes on TCP flows 评估sdn路由频繁变化对TCP流的影响
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256021
Radu Carpa, M. Assunção, Olivier Glück, L. Lefèvre, J. Mignot
Traffic engineering technologies such as MPLS have been proposed to adjust the paths of data flows according to network availability. Although the time interval between traffic optimisations is often on the scale of hours or minutes, modern SDN techniques enable reconfiguring the network more frequently. It is argued, however, that changing the paths of TCP flows too often could severely impact their performance by incurring packet loss and reordering. This work analyses and evaluates the impact of frequent route changes on the performance of TCP flows. Experiments carried out on a network testbed show that rerouting a flow can affect its throughput when reassigning it a path either longer or shorter than the original path. Packet reordering has a negligible impact when compared to the increase of RTT. Moreover, constant rerouting influences the performance of the congestion control algorithm. Designed to assess the limits on SDN-induced reconfiguration, a scenario where the traffic is rerouted every 0.1s demonstrates that the throughput can be as low as 35% of that achieved without rerouting.
人们提出了MPLS等流量工程技术,根据网络的可用性调整数据流的路径。虽然流量优化之间的时间间隔通常是几小时或几分钟,但现代SDN技术可以更频繁地重新配置网络。然而,有人认为,过于频繁地改变TCP流的路径可能会导致数据包丢失和重新排序,从而严重影响它们的性能。这项工作分析和评估了频繁的路由变化对TCP流性能的影响。在网络测试平台上进行的实验表明,当重新分配比原始路径更长或更短的路径时,重新路由流会影响其吞吐量。与RTT的增加相比,数据包重排序的影响可以忽略不计。此外,不断重路由会影响拥塞控制算法的性能。设计用于评估sdn引起的重新配置的限制,在每0.1s重路由一次流量的场景中,吞吐量可以低至没有重路由时的35%。
{"title":"Evaluating the impact of SDN-induced frequent route changes on TCP flows","authors":"Radu Carpa, M. Assunção, Olivier Glück, L. Lefèvre, J. Mignot","doi":"10.23919/CNSM.2017.8256021","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256021","url":null,"abstract":"Traffic engineering technologies such as MPLS have been proposed to adjust the paths of data flows according to network availability. Although the time interval between traffic optimisations is often on the scale of hours or minutes, modern SDN techniques enable reconfiguring the network more frequently. It is argued, however, that changing the paths of TCP flows too often could severely impact their performance by incurring packet loss and reordering. This work analyses and evaluates the impact of frequent route changes on the performance of TCP flows. Experiments carried out on a network testbed show that rerouting a flow can affect its throughput when reassigning it a path either longer or shorter than the original path. Packet reordering has a negligible impact when compared to the increase of RTT. Moreover, constant rerouting influences the performance of the congestion control algorithm. Designed to assess the limits on SDN-induced reconfiguration, a scenario where the traffic is rerouted every 0.1s demonstrates that the throughput can be as low as 35% of that achieved without rerouting.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117212617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Attacking strategies and temporal analysis involving Facebook discussion groups 涉及Facebook讨论组的攻击策略和时间分析
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256040
Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, S. F. Wu, P. Mcdaniel, H. Çam
Online social network (OSN) discussion groups are exerting significant effects on political dialogue. In the absence of access control mechanisms, any user can contribute to any OSN thread. Individuals can exploit this characteristic to execute targeted attacks, which increases the potential for subsequent malicious behaviors such as phishing and malware distribution. These kinds of actions will also disrupt bridges among the media, politicians, and their constituencies. For the concern of Security Management, blending malicious cyberattacks with online social interactions has introduced a brand new challenge. In this paper we describe our proposal for a novel approach to studying and understanding the strategies that attackers use to spread malicious URLs across Facebook discussion groups. We define and analyze problems tied to predicting the potential for attacks focused on threads created by news media organizations. We use a mix of macro static features and the micro dynamic evolution of posts and threads to identify likely targets with greater than 90% accuracy. One of our secondary goals is to make such predictions within a short (10 minute) time frame. It is our hope that the data and analyses presented in this paper will support a better understanding of attacker strategies and footprints, thereby developing new system management methodologies in handing cyber attacks on social networks.
网络社交网络(OSN)讨论组对政治对话的影响越来越大。在没有访问控制机制的情况下,任何用户都可以对任何OSN线程进行贡献。个人可以利用这一特性来执行有针对性的攻击,这增加了后续恶意行为的可能性,例如网络钓鱼和恶意软件分发。这些行为也会破坏媒体、政客和他们的选民之间的桥梁。对于安全管理人员来说,将恶意网络攻击与在线社交活动相结合是一个全新的挑战。在本文中,我们提出了一种新的方法来研究和理解攻击者在Facebook讨论组中传播恶意url的策略。我们定义并分析了与预测潜在攻击有关的问题,这些攻击集中在新闻媒体组织创建的线程上。我们混合使用宏观静态特征和帖子和线程的微动态演变来识别可能的目标,准确率超过90%。我们的第二个目标之一是在短时间内(10分钟)做出这样的预测。我们希望本文中提供的数据和分析将有助于更好地理解攻击者的策略和足迹,从而开发新的系统管理方法来处理社交网络上的网络攻击。
{"title":"Attacking strategies and temporal analysis involving Facebook discussion groups","authors":"Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, S. F. Wu, P. Mcdaniel, H. Çam","doi":"10.23919/CNSM.2017.8256040","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256040","url":null,"abstract":"Online social network (OSN) discussion groups are exerting significant effects on political dialogue. In the absence of access control mechanisms, any user can contribute to any OSN thread. Individuals can exploit this characteristic to execute targeted attacks, which increases the potential for subsequent malicious behaviors such as phishing and malware distribution. These kinds of actions will also disrupt bridges among the media, politicians, and their constituencies. For the concern of Security Management, blending malicious cyberattacks with online social interactions has introduced a brand new challenge. In this paper we describe our proposal for a novel approach to studying and understanding the strategies that attackers use to spread malicious URLs across Facebook discussion groups. We define and analyze problems tied to predicting the potential for attacks focused on threads created by news media organizations. We use a mix of macro static features and the micro dynamic evolution of posts and threads to identify likely targets with greater than 90% accuracy. One of our secondary goals is to make such predictions within a short (10 minute) time frame. It is our hope that the data and analyses presented in this paper will support a better understanding of attacker strategies and footprints, thereby developing new system management methodologies in handing cyber attacks on social networks.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic algorithm selection for the logic of tasks in IoT stream processing systems 物联网流处理系统中任务逻辑的动态算法选择
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256009
Ehsan Poormohammady, J. Reelfs, Mirko Stoffers, Klaus Wehrle, Apostolos Papageorgiou
Various Internet of Things (IoT) and Industry 4.0 use cases, such as city-wide monitoring or machine control, require low-latency distributed processing of continuous data streams. This fact has boosted research on making Stream Processing Frameworks (SPFs) IoT-ready, meaning that their cloud and IoT service management mechanisms (e.g., task placement, load balancing, algorithm selection) need to consider new requirements, e.g., ultra low latency due to physical interactions. The algorithm selection problem refers to selecting dynamically which internal logic a deployed streaming task should use in case of various alternatives, but it is not sufficiently supported in current SPFs. To the best of our knowledge, this work is the first to add this capability to SPFs. Our solution is based on i) architectural extensions of typical SPF middleware, ii) a new schema for characterizing algorithmic performance in the targeted context, and iii) a streaming-specific optimization problem formulation. We implemented our solution as an extension to Apache Storm and demonstrate how it can reduce stream processing latency by up to a factor of 2.9 in the tested scenarios.
各种物联网(IoT)和工业4.0用例,如城市范围的监控或机器控制,需要对连续数据流进行低延迟的分布式处理。这一事实推动了流处理框架(SPFs)为物联网做好准备的研究,这意味着它们的云和物联网服务管理机制(例如,任务放置,负载平衡,算法选择)需要考虑新的要求,例如,由于物理交互而产生的超低延迟。算法选择问题是指在各种备选方案的情况下,动态选择已部署的流任务应该使用哪种内部逻辑,但在当前的spf中还没有得到充分的支持。据我们所知,这项工作是第一个将此功能添加到spf中的工作。我们的解决方案基于i)典型SPF中间件的架构扩展,ii)在目标上下文中描述算法性能的新模式,以及iii)特定于流的优化问题表述。我们将我们的解决方案作为Apache Storm的扩展来实现,并演示了它如何在测试场景中将流处理延迟减少2.9倍。
{"title":"Dynamic algorithm selection for the logic of tasks in IoT stream processing systems","authors":"Ehsan Poormohammady, J. Reelfs, Mirko Stoffers, Klaus Wehrle, Apostolos Papageorgiou","doi":"10.23919/CNSM.2017.8256009","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256009","url":null,"abstract":"Various Internet of Things (IoT) and Industry 4.0 use cases, such as city-wide monitoring or machine control, require low-latency distributed processing of continuous data streams. This fact has boosted research on making Stream Processing Frameworks (SPFs) IoT-ready, meaning that their cloud and IoT service management mechanisms (e.g., task placement, load balancing, algorithm selection) need to consider new requirements, e.g., ultra low latency due to physical interactions. The algorithm selection problem refers to selecting dynamically which internal logic a deployed streaming task should use in case of various alternatives, but it is not sufficiently supported in current SPFs. To the best of our knowledge, this work is the first to add this capability to SPFs. Our solution is based on i) architectural extensions of typical SPF middleware, ii) a new schema for characterizing algorithmic performance in the targeted context, and iii) a streaming-specific optimization problem formulation. We implemented our solution as an extension to Apache Storm and demonstrate how it can reduce stream processing latency by up to a factor of 2.9 in the tested scenarios.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125132543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MD-IDN: Multi-domain intent-driven networking in software-defined infrastructures MD-IDN:软件定义基础设施中的多域意图驱动网络
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256016
Saeed Arezoumand, Kristina Dzeparoska, H. Bannazadeh, A. Leon-Garcia
Intent-Driven Networking is recently gaining interest, with all major SDN control platforms now providing an intent Northbound Interface (NBI) as a high-level abstraction for network management. With these frameworks network operators can conveniently define “what needs to be done”, rather than “how it should be done”. Current IDN frameworks pose two main limitations that affect deployment in production grade and multi-domain networks. They are mainly concerned with a single network domain, and thus enabling end-to-end network intents over a multi-domain and large-scale setup is still a challenge. Furthermore, these frameworks do not consider any differentiation between user intents and provider intents, and a limited set of intent classes are available for both. In this paper we present MD-IDN, which provides an intent framework for the users of multi-domain cloud infrastructures. We first propose a graph-based abstraction model for user-defined intents and a generic intent compilation process. Then, we propose compilation algorithms to achieve scalability in multi-domain networks: First, user-defined intents get processed over an abstracted multi-graph of network domains and their interconnections, and a set of local intents will be generated for each of the involved domains. Afterwards, the local intents will be compiled and installed in local regions in parallel. MD-IDN is deployed as a public service in the SAVI Testbed over more than ten data centers spanning across Canada. In multi-domain environments, our experiments show that MD-IDN outperforms current practices that compile intents over a flat network topology.
意图驱动的网络最近引起了人们的兴趣,所有主要的SDN控制平台现在都提供意图北向接口(NBI)作为网络管理的高级抽象。有了这些框架,网络运营商可以方便地定义“需要做什么”,而不是“应该怎么做”。目前的IDN框架存在两个主要限制,影响在生产级和多域网络中的部署。它们主要关注单个网络域,因此在多域和大规模设置上实现端到端网络意图仍然是一个挑战。此外,这些框架没有考虑用户意图和提供者意图之间的任何区别,并且对两者都可用的一组有限的意图类。本文提出了MD-IDN,它为多域云基础设施的用户提供了一个意图框架。我们首先提出了一个基于图的用户定义意图抽象模型和一个通用的意图编译过程。然后,我们提出了在多域网络中实现可扩展性的编译算法:首先,在网络域及其相互联系的抽象多图上处理自定义意图,并为每个涉及的域生成一组本地意图;之后,本地意图将被并行编译并安装在本地区域中。MD-IDN作为公共服务部署在SAVI测试平台上,横跨加拿大的十多个数据中心。在多域环境中,我们的实验表明,MD-IDN优于当前在平面网络拓扑上编译意图的实践。
{"title":"MD-IDN: Multi-domain intent-driven networking in software-defined infrastructures","authors":"Saeed Arezoumand, Kristina Dzeparoska, H. Bannazadeh, A. Leon-Garcia","doi":"10.23919/CNSM.2017.8256016","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256016","url":null,"abstract":"Intent-Driven Networking is recently gaining interest, with all major SDN control platforms now providing an intent Northbound Interface (NBI) as a high-level abstraction for network management. With these frameworks network operators can conveniently define “what needs to be done”, rather than “how it should be done”. Current IDN frameworks pose two main limitations that affect deployment in production grade and multi-domain networks. They are mainly concerned with a single network domain, and thus enabling end-to-end network intents over a multi-domain and large-scale setup is still a challenge. Furthermore, these frameworks do not consider any differentiation between user intents and provider intents, and a limited set of intent classes are available for both. In this paper we present MD-IDN, which provides an intent framework for the users of multi-domain cloud infrastructures. We first propose a graph-based abstraction model for user-defined intents and a generic intent compilation process. Then, we propose compilation algorithms to achieve scalability in multi-domain networks: First, user-defined intents get processed over an abstracted multi-graph of network domains and their interconnections, and a set of local intents will be generated for each of the involved domains. Afterwards, the local intents will be compiled and installed in local regions in parallel. MD-IDN is deployed as a public service in the SAVI Testbed over more than ten data centers spanning across Canada. In multi-domain environments, our experiments show that MD-IDN outperforms current practices that compile intents over a flat network topology.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133751204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphs 跟踪坏人:使用核心攻击图跟踪多步骤攻击的有效取证方法
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256038
Martín Barrère, Rodrigo Vieira Steiner, Rabih Mohsen, Emil C. Lupu
In this paper, we describe an efficient methodology to guide investigators during network forensic analysis. To this end, we introduce the concept of core attack graph, a compact representation of the main routes an attacker can take towards specific network targets. Such compactness allows forensic investigators to focus their efforts on critical nodes that are more likely to be part of attack paths, thus reducing the overall number of nodes (devices, network privileges) that need to be examined. Nevertheless, core graphs also allow investigators to hierarchically explore the graph in order to retrieve different levels of summarised information. We have evaluated our approach over different network topologies varying parameters such as network size, density, and forensic evaluation threshold. Our results demonstrate that we can achieve the same level of accuracy provided by standard logical attack graphs while significantly reducing the exploration rate of the network.
在本文中,我们描述了一种有效的方法来指导调查人员在网络法医分析。为此,我们引入了核心攻击图的概念,这是攻击者通往特定网络目标的主要路由的紧凑表示。这种紧凑性使取证调查人员能够将精力集中在更有可能成为攻击路径一部分的关键节点上,从而减少需要检查的节点(设备、网络特权)的总数。然而,核心图也允许调查人员分层探索图,以便检索不同层次的汇总信息。我们已经在不同的网络拓扑、不同的参数(如网络大小、密度和取证评估阈值)上评估了我们的方法。我们的结果表明,我们可以达到标准逻辑攻击图提供的相同级别的准确性,同时显着降低网络的探索速度。
{"title":"Tracking the bad guys: An efficient forensic methodology to trace multi-step attacks using core attack graphs","authors":"Martín Barrère, Rodrigo Vieira Steiner, Rabih Mohsen, Emil C. Lupu","doi":"10.23919/CNSM.2017.8256038","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256038","url":null,"abstract":"In this paper, we describe an efficient methodology to guide investigators during network forensic analysis. To this end, we introduce the concept of core attack graph, a compact representation of the main routes an attacker can take towards specific network targets. Such compactness allows forensic investigators to focus their efforts on critical nodes that are more likely to be part of attack paths, thus reducing the overall number of nodes (devices, network privileges) that need to be examined. Nevertheless, core graphs also allow investigators to hierarchically explore the graph in order to retrieve different levels of summarised information. We have evaluated our approach over different network topologies varying parameters such as network size, density, and forensic evaluation threshold. Our results demonstrate that we can achieve the same level of accuracy provided by standard logical attack graphs while significantly reducing the exploration rate of the network.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"3 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A path planning method of wireless sensor networks based on service priority 一种基于服务优先级的无线传感器网络路径规划方法
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255984
Peng Li, Siya Xu, Kang Sun, Xue-song Qiu, F. Qi
Life-time represents the effective survival time of network, which is significant when measuring the performance of wireless sensor networks (WSNs). Therefore, it is so important to extend network life-time by planning appropriate path based on energy consumption and remaining energy of wireless sensors. In this paper, a path planning method of WSNs based on service priority is proposed, and a customized Dijkstra algorithm is used to solve this problem. This method minimizes the total energy consumption of network while balancing remaining energy of all nodes in network, and through the sacrifice of network delay in exchange for extension of life-time. The simulation results show that our method not only prolongs network life-time compared to shortest-path algorithm but also improves network reliability.
寿命是指网络的有效生存时间,在测量无线传感器网络的性能时具有重要意义。因此,根据无线传感器的能量消耗和剩余能量规划合适的路径来延长网络寿命是非常重要的。本文提出了一种基于服务优先级的无线传感器网络路径规划方法,并采用自定义Dijkstra算法解决该问题。该方法在平衡网络中所有节点剩余能量的同时,通过牺牲网络延迟来换取生命周期的延长,使网络总能耗最小化。仿真结果表明,与最短路径算法相比,该方法不仅延长了网络的寿命,而且提高了网络的可靠性。
{"title":"A path planning method of wireless sensor networks based on service priority","authors":"Peng Li, Siya Xu, Kang Sun, Xue-song Qiu, F. Qi","doi":"10.23919/CNSM.2017.8255984","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255984","url":null,"abstract":"Life-time represents the effective survival time of network, which is significant when measuring the performance of wireless sensor networks (WSNs). Therefore, it is so important to extend network life-time by planning appropriate path based on energy consumption and remaining energy of wireless sensors. In this paper, a path planning method of WSNs based on service priority is proposed, and a customized Dijkstra algorithm is used to solve this problem. This method minimizes the total energy consumption of network while balancing remaining energy of all nodes in network, and through the sacrifice of network delay in exchange for extension of life-time. The simulation results show that our method not only prolongs network life-time compared to shortest-path algorithm but also improves network reliability.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116347509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Network-integrated edge computing orchestrator for application placement 用于应用程序放置的网络集成边缘计算编排器
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256008
Vasileios Karagiannis, Apostolos Papageorgiou
In an effort to detach applications from centralized clouds with high latency responses, service providers turn their attention to edge computing solutions that offer low latency and improved user experience. Existing edge deployment strategies use network-related information as decision basis, but their design and their placement logic are biased by the assumption that the network cannot be controlled. In this paper, we design an orchestrator that operates within the telecom infrastructure and assumes cooperation with access and core network controllers. As a result, network adjustments can be requested, which leads to an orchestrator that participates in the provisioning of resources and solves an optimization problem that — contrary to the state of the art-performs sequential component placement and does not assume a known or fixed replication degree of the applications. Its function relies on heuristics, including one based on pre-computed shortest paths, which runs in polynomial time (i.e., much faster than an exhaustive search) and finds the optimal solution in approximately 99% of the tested scenarios.
为了将应用程序与具有高延迟响应的集中式云分离开来,服务提供商将注意力转向提供低延迟和改进用户体验的边缘计算解决方案。现有的边缘部署策略以网络相关信息作为决策依据,但其设计和部署逻辑存在网络无法控制的假设偏差。在本文中,我们设计了一个协调器,它在电信基础设施中运行,并假设与接入和核心网络控制器合作。因此,可以请求网络调整,这导致协调器参与资源供应并解决优化问题(与目前的状况相反),执行顺序组件放置,并且不假设应用程序的复制程度已知或固定。它的功能依赖于启发式,包括一个基于预先计算的最短路径的启发式,它在多项式时间内运行(即,比穷举搜索快得多),并在大约99%的测试场景中找到最优解。
{"title":"Network-integrated edge computing orchestrator for application placement","authors":"Vasileios Karagiannis, Apostolos Papageorgiou","doi":"10.23919/CNSM.2017.8256008","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256008","url":null,"abstract":"In an effort to detach applications from centralized clouds with high latency responses, service providers turn their attention to edge computing solutions that offer low latency and improved user experience. Existing edge deployment strategies use network-related information as decision basis, but their design and their placement logic are biased by the assumption that the network cannot be controlled. In this paper, we design an orchestrator that operates within the telecom infrastructure and assumes cooperation with access and core network controllers. As a result, network adjustments can be requested, which leads to an orchestrator that participates in the provisioning of resources and solves an optimization problem that — contrary to the state of the art-performs sequential component placement and does not assume a known or fixed replication degree of the applications. Its function relies on heuristics, including one based on pre-computed shortest paths, which runs in polynomial time (i.e., much faster than an exhaustive search) and finds the optimal solution in approximately 99% of the tested scenarios.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128302328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2017 13th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1