首页 > 最新文献

2017 13th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
Analyzing human mobility and social relationships from cellular network data 从蜂窝网络数据分析人类的流动性和社会关系
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256044
Zheng Liu, Yuanyuan Qiao, Siyan Tao, Wenhui Lin, Jie Yang
Due to geographic and social constraints, human mobility shows a high degree of temporal and spatial regularity. More recently, emerging data tagged with geographical information can be used to study human mobility patterns. People usually spend most of their time at a few key important locations, such as home and work places. And for users with a certain social connection-co-workers or co-life, they often stay at the same locations. In this paper, firstly, we use an algorithm to identify important locations. After that, we find that the similarity between the two trajectories is closely related to their proximity in the location-based social network, where users having the same important locations are connected. In order to embody social contacts in mobility, for hourly variations in mobility similarity, we apply unsupervised clustering method to identify four categories of social ties. Finally, we further propose the unsupervised method and supervised method to predict which new links will develop in a social location-based network. We believe our finding can contribute to urban planning especially in areas of functional zone, transportation infrastructure deployment and mobile network facilities development.
由于地理和社会的限制,人口流动表现出高度的时空规律性。最近,有地理信息标记的新兴数据可用于研究人类流动模式。人们通常把大部分时间花在几个关键的重要地点,比如家里和工作场所。对于有一定社会关系的用户——同事或共同生活的人,他们经常呆在同一个地方。在本文中,我们首先使用一种算法来识别重要位置。之后,我们发现两个轨迹之间的相似性与它们在基于位置的社交网络中的接近程度密切相关,在基于位置的社交网络中,具有相同重要位置的用户被连接在一起。为了体现流动性中的社会联系,对于流动性相似性的小时变化,我们应用无监督聚类方法来识别四类社会关系。最后,我们进一步提出了无监督方法和监督方法来预测在基于社交位置的网络中哪些新的链接将会发展。我们相信我们的发现可以为城市规划,特别是功能区,交通基础设施的部署和移动网络设施的发展做出贡献。
{"title":"Analyzing human mobility and social relationships from cellular network data","authors":"Zheng Liu, Yuanyuan Qiao, Siyan Tao, Wenhui Lin, Jie Yang","doi":"10.23919/CNSM.2017.8256044","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256044","url":null,"abstract":"Due to geographic and social constraints, human mobility shows a high degree of temporal and spatial regularity. More recently, emerging data tagged with geographical information can be used to study human mobility patterns. People usually spend most of their time at a few key important locations, such as home and work places. And for users with a certain social connection-co-workers or co-life, they often stay at the same locations. In this paper, firstly, we use an algorithm to identify important locations. After that, we find that the similarity between the two trajectories is closely related to their proximity in the location-based social network, where users having the same important locations are connected. In order to embody social contacts in mobility, for hourly variations in mobility similarity, we apply unsupervised clustering method to identify four categories of social ties. Finally, we further propose the unsupervised method and supervised method to predict which new links will develop in a social location-based network. We believe our finding can contribute to urban planning especially in areas of functional zone, transportation infrastructure deployment and mobile network facilities development.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129707721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhanced fast BSS transition on enterprise WLAN with SDN-based distribution system 利用基于sdn的分配系统增强企业无线局域网BSS的快速转换
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8256028
Hyundong Hwang, Young-Tak Kim
One of the challenges in QoS-aware realtime mobile multimedia service provisioning through WLANs is QoS-aware fast BSS (Basic Service Set) transition. Since most WiFi access points (APs) do not provide fast BSS transition (FT), changing currently connected AP to another takes several seconds during which mobile services are disrupted. In this paper, we propose an enhanced fast BSS transition scheme for seamless mobile broadband multimedia service provisioning and load balancing. The proposed scheme is based on i) cognitive management of WLAN ESS with SDN-based distribution system that allows checking for resource availability before selecting a candidate target AP, ii) QoS-aware roaming/handover with resource request over distribution system(DS), and iii) proactive forwarding table updates of SDN-based distribution system. The proposed scheme had been implemented and evaluated in a real IEEE 802.11n testbed environment, and the performance measurements showed enhanced QoS provisioning with minimized service disruption time and packet loss compared with existing approaches.1
通过无线局域网提供qos感知的实时移动多媒体业务面临的挑战之一是qos感知的快速BSS(基本服务集)转换。由于大多数WiFi接入点(AP)不提供快速BSS转换(FT),因此将当前连接的AP切换到另一个AP需要几秒钟,在此期间移动服务会中断。在本文中,我们提出了一种增强的快速BSS转换方案,用于移动宽带多媒体业务的无缝提供和负载均衡。该方案基于基于sdn的分发系统的WLAN ESS认知管理,允许在选择候选目标AP之前检查资源可用性;基于分配系统(DS)的资源请求的qos感知漫游/切换;以及基于sdn的分发系统的主动转发表更新。该方案已在真实的IEEE 802.11n测试平台环境中进行了实施和评估,性能测量结果表明,与现有方法相比,该方案在最大限度地减少业务中断时间和丢包的情况下提高了服务质量
{"title":"Enhanced fast BSS transition on enterprise WLAN with SDN-based distribution system","authors":"Hyundong Hwang, Young-Tak Kim","doi":"10.23919/CNSM.2017.8256028","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256028","url":null,"abstract":"One of the challenges in QoS-aware realtime mobile multimedia service provisioning through WLANs is QoS-aware fast BSS (Basic Service Set) transition. Since most WiFi access points (APs) do not provide fast BSS transition (FT), changing currently connected AP to another takes several seconds during which mobile services are disrupted. In this paper, we propose an enhanced fast BSS transition scheme for seamless mobile broadband multimedia service provisioning and load balancing. The proposed scheme is based on i) cognitive management of WLAN ESS with SDN-based distribution system that allows checking for resource availability before selecting a candidate target AP, ii) QoS-aware roaming/handover with resource request over distribution system(DS), and iii) proactive forwarding table updates of SDN-based distribution system. The proposed scheme had been implemented and evaluated in a real IEEE 802.11n testbed environment, and the performance measurements showed enhanced QoS provisioning with minimized service disruption time and packet loss compared with existing approaches.1","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125387397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AutoFocus: Automatically scoping the impact of anomalous service events AutoFocus:自动确定异常服务事件的影响范围
Pub Date : 2017-11-01 DOI: 10.23919/CNSM.2017.8255986
Ren Quinn, Zihui Ge, He Yan, J. Merwe
Networks, and the services they enable, are increasingly diverse and highly utilized. From DSL and fiber-to-the-home access networks, to cellular mobile networks, to contentdelivery networks; all require extensive monitoring in order to meet the increase of user expectations of the availability and quality of those services provided to them. The complexity of these networks and services require better management on the part of providers as the data resulting from service monitoring experiences an increase in dimensionality, making it difficult to fully interpret anomalies in the data. For example, anomaly detection generally says “I found an anomaly with mobile phone A in market Z”. But it is more useful to know what other phones and what other markets are also experiencing the same anomaly.
网络及其提供的服务越来越多样化,利用率也越来越高。从DSL和光纤入户接入网,到蜂窝移动网络,再到内容传送网络;所有这些都需要广泛的监测,以满足用户对提供给他们的服务的可得性和质量的日益增长的期望。这些网络和服务的复杂性需要提供商更好的管理,因为服务监控产生的数据的维度增加了,这使得很难完全解释数据中的异常。例如,异常检测通常说“我在Z市场发现了手机A的异常”。但了解哪些其他手机和哪些其他市场也经历了同样的异常情况更有用。
{"title":"AutoFocus: Automatically scoping the impact of anomalous service events","authors":"Ren Quinn, Zihui Ge, He Yan, J. Merwe","doi":"10.23919/CNSM.2017.8255986","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255986","url":null,"abstract":"Networks, and the services they enable, are increasingly diverse and highly utilized. From DSL and fiber-to-the-home access networks, to cellular mobile networks, to contentdelivery networks; all require extensive monitoring in order to meet the increase of user expectations of the availability and quality of those services provided to them. The complexity of these networks and services require better management on the part of providers as the data resulting from service monitoring experiences an increase in dimensionality, making it difficult to fully interpret anomalies in the data. For example, anomaly detection generally says “I found an anomaly with mobile phone A in market Z”. But it is more useful to know what other phones and what other markets are also experiencing the same anomaly.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133507332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NeuRoute: Predictive dynamic routing for software-defined networks NeuRoute:软件定义网络的预测动态路由
Pub Date : 2017-09-18 DOI: 10.23919/CNSM.2017.8256059
A. Azzouni, R. Boutaba, G. Pujolle
This paper introduces NeuRoute, a dynamic routing framework for Software Defined Networks (SDN) entirely based on machine learning, specifically, Neural Networks. Current SDN/OpenFlow controllers use a default routing based on Dijkstra's algorithm for shortest paths, and provide APIs to develop custom routing applications. NeuRoute is a controller-agnostic dynamic routing framework that (i) predicts traffic matrix in real time, (ii) uses a neural network to learn traffic characteristics and (iii) generates forwarding rules accordingly to optimize the network throughput. NeuRoute achieves the same results as the most efficient dynamic routing heuristic but in much less execution time.
本文介绍了NeuRoute,一个完全基于机器学习的软件定义网络(SDN)动态路由框架,特别是神经网络。当前的SDN/OpenFlow控制器使用基于Dijkstra最短路径算法的默认路由,并提供api来开发自定义路由应用程序。NeuRoute是一个控制器不可知的动态路由框架,它可以(i)实时预测流量矩阵,(ii)使用神经网络学习流量特征,(iii)生成相应的转发规则以优化网络吞吐量。NeuRoute实现了与最有效的动态路由启发式相同的结果,但执行时间要短得多。
{"title":"NeuRoute: Predictive dynamic routing for software-defined networks","authors":"A. Azzouni, R. Boutaba, G. Pujolle","doi":"10.23919/CNSM.2017.8256059","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256059","url":null,"abstract":"This paper introduces NeuRoute, a dynamic routing framework for Software Defined Networks (SDN) entirely based on machine learning, specifically, Neural Networks. Current SDN/OpenFlow controllers use a default routing based on Dijkstra's algorithm for shortest paths, and provide APIs to develop custom routing applications. NeuRoute is a controller-agnostic dynamic routing framework that (i) predicts traffic matrix in real time, (ii) uses a neural network to learn traffic characteristics and (iii) generates forwarding rules accordingly to optimize the network throughput. NeuRoute achieves the same results as the most efficient dynamic routing heuristic but in much less execution time.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Duopoly price competition in secondary spectrum markets 二级频谱市场的双寡头价格竞争
Pub Date : 2017-07-01 DOI: 10.23919/CNSM.2017.8256057
Xianwei Li, Bo Gu, Cheng Zhang, Zhi Liu, K. Yamori, Y. Tanaka
In this paper, we consider the problem of spectrum sharing in a Cognitive Radio Network (CRN) with spectrum holder, two secondary operators and secondary users (SUs). In the system model under consideration, the spectrum allocated to the two secondary operators can be shared by SUs, which means that secondary operators buy spectrum from spectrum holder and then sell spectrum access service to SUs. We model the relationship between secondary operators and SUs as a two-stage stackelberg game, where secondary operators make spectrum channel quality and price decisions in the first stage, and then the SUs make their spectrum demands decisions. The backward induction method is employed to solve the stackelberg game. Numerical results are performed to evaluate our analysis.
本文研究了具有频谱持有者、两个二级运营商和二级用户的认知无线网络(CRN)中的频谱共享问题。在考虑的系统模型中,分配给两个二级运营商的频谱可以由二级运营商共享,即二级运营商从频谱持有者手中购买频谱,然后将频谱接入业务出售给二级运营商。我们将二级运营商和运营商之间的关系建模为一个两阶段的stackelberg博弈,其中二级运营商在第一阶段做出频谱信道质量和价格决策,然后运营商做出频谱需求决策。采用逆向归纳法求解stackelberg对策。数值结果验证了我们的分析。
{"title":"Duopoly price competition in secondary spectrum markets","authors":"Xianwei Li, Bo Gu, Cheng Zhang, Zhi Liu, K. Yamori, Y. Tanaka","doi":"10.23919/CNSM.2017.8256057","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256057","url":null,"abstract":"In this paper, we consider the problem of spectrum sharing in a Cognitive Radio Network (CRN) with spectrum holder, two secondary operators and secondary users (SUs). In the system model under consideration, the spectrum allocated to the two secondary operators can be shared by SUs, which means that secondary operators buy spectrum from spectrum holder and then sell spectrum access service to SUs. We model the relationship between secondary operators and SUs as a two-stage stackelberg game, where secondary operators make spectrum channel quality and price decisions in the first stage, and then the SUs make their spectrum demands decisions. The backward induction method is employed to solve the stackelberg game. Numerical results are performed to evaluate our analysis.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127950171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cost- and energy-aware multi-flow mobile data offloading under time dependent pricing 时间依赖定价下具有成本和能源意识的多流移动数据卸载
Pub Date : 2017-07-01 DOI: 10.23919/CNSM.2017.8256055
Cheng Zhang, Bo Gu, Zhi Liu, K. Yamori, Y. Tanaka
Nowadays, mobile network operators (MNOs) are trying to deploy wireless local area network (LAN) to offload mobile data from their cellular networks to complementary wireless LAN for congestion relief and cost savings. However, these network-centric methods do not take into consideration mobile user's (MU's) interests of monetary cost, energy consumption, and applications' deadlines. How the MU decides whether to offload their traffic to a complementary wireless LAN is non-trivial and important issue. Previous studies assume that MNO adopts usage-based pricing for mobile data, which only cares about how much a MU consumes data but not when a MU consumes data. In this paper, we study the MU's policy to minimize his monetary cost and energy consumption under time-dependent pricing (TDP). We formulate MU's wireless LAN offloading problem as a finite-horizon discrete-time Markov decision process (MDP) and establish an optimal policy by a dynamic programming based algorithm. Extensive simulations are conducted to validate our proposed offloading algorithm.
目前,移动网络运营商(mno)正试图部署无线局域网(LAN),将移动数据从蜂窝网络转移到互补的无线局域网,以缓解拥塞和节省成本。然而,这些以网络为中心的方法并没有考虑到移动用户(MU)在货币成本、能源消耗和应用程序期限等方面的利益。MU如何决定是否将其流量分流到互补的无线局域网是一个非常重要的问题。以往的研究假设MNO对移动数据采用基于使用量的定价,只关心MU消耗了多少数据,而不关心MU什么时候消耗数据。本文研究了在时间依赖定价(TDP)条件下,个体用户的货币成本和能源消耗最小化的策略。将MU无线局域网卸载问题表述为一个有限视界离散马尔可夫决策过程,并利用基于动态规划的算法建立最优策略。大量的仿真验证了我们提出的卸载算法。
{"title":"Cost- and energy-aware multi-flow mobile data offloading under time dependent pricing","authors":"Cheng Zhang, Bo Gu, Zhi Liu, K. Yamori, Y. Tanaka","doi":"10.23919/CNSM.2017.8256055","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256055","url":null,"abstract":"Nowadays, mobile network operators (MNOs) are trying to deploy wireless local area network (LAN) to offload mobile data from their cellular networks to complementary wireless LAN for congestion relief and cost savings. However, these network-centric methods do not take into consideration mobile user's (MU's) interests of monetary cost, energy consumption, and applications' deadlines. How the MU decides whether to offload their traffic to a complementary wireless LAN is non-trivial and important issue. Previous studies assume that MNO adopts usage-based pricing for mobile data, which only cares about how much a MU consumes data but not when a MU consumes data. In this paper, we study the MU's policy to minimize his monetary cost and energy consumption under time-dependent pricing (TDP). We formulate MU's wireless LAN offloading problem as a finite-horizon discrete-time Markov decision process (MDP) and establish an optimal policy by a dynamic programming based algorithm. Extensive simulations are conducted to validate our proposed offloading algorithm.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122764491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Wireless LAN access point deployment and pricing with location-based advertising 无线局域网接入点部署和基于位置的广告定价
Pub Date : 2017-07-01 DOI: 10.23919/CNSM.2017.8255996
Cheng Zhang, Zhi Liu, Bo Gu, K. Yamori, Y. Tanaka
In order to improve the quality of service (QoS) for mobile users (MUs) and save investment cost for deploying new cellular base station, mobile network operators (MNOs) are deploying wireless local area network (LAN) access points (APs) to offload MU's traffic from cellular network to wireless LAN. However, offloading too much traffic from cellular network may impair MNO's profit since the cellular network price is higher than that of wireless LAN, whose price is low or even zero. Therefore, how to deploy wireless LAN APs to offload traffic without impairing MNO's profit is a critical problem for MNOs. As far as the authors understand, existing studies about deployment of wireless LAN APs do not consider MNO's profit and are usually in a heuristic manner. In this paper, we study the location-based advertising (LBA) leveraged wireless LAN deployment, where MNO may also collect revenue by selling LBA service in different locations to advertisers. We formulate MNO's profit maximization problem by considering different MU's demand in different locations, wireless LAN price for MUs, and revenue from LBA service. Extensive simulations are conducted to validate our analytical results.
为了提高移动用户(MU)的服务质量(QoS)和节省部署蜂窝基站的投资成本,移动网络运营商(mno)正在部署无线局域网(LAN)接入点(ap),将MU的业务从蜂窝网络转移到无线局域网。然而,蜂窝网络的价格高于无线局域网,而无线局域网的价格较低甚至为零,因此从蜂窝网络中卸载过多的流量可能会损害移动运营商的利润。因此,如何在不影响移动网络运营商利润的前提下部署无线局域网接入点来分流流量是移动网络运营商面临的一个关键问题。据作者所知,现有的关于无线局域网ap部署的研究没有考虑移动运营商的利润,而且通常是启发式的。在本文中,我们研究了基于位置的广告(LBA)利用无线局域网部署,其中MNO也可以通过在不同位置向广告商出售LBA服务来获取收入。考虑移动运营商在不同位置的不同需求、移动运营商的无线局域网价格和LBA业务的收益,提出了移动运营商的利润最大化问题。进行了大量的模拟来验证我们的分析结果。
{"title":"Wireless LAN access point deployment and pricing with location-based advertising","authors":"Cheng Zhang, Zhi Liu, Bo Gu, K. Yamori, Y. Tanaka","doi":"10.23919/CNSM.2017.8255996","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255996","url":null,"abstract":"In order to improve the quality of service (QoS) for mobile users (MUs) and save investment cost for deploying new cellular base station, mobile network operators (MNOs) are deploying wireless local area network (LAN) access points (APs) to offload MU's traffic from cellular network to wireless LAN. However, offloading too much traffic from cellular network may impair MNO's profit since the cellular network price is higher than that of wireless LAN, whose price is low or even zero. Therefore, how to deploy wireless LAN APs to offload traffic without impairing MNO's profit is a critical problem for MNOs. As far as the authors understand, existing studies about deployment of wireless LAN APs do not consider MNO's profit and are usually in a heuristic manner. In this paper, we study the location-based advertising (LBA) leveraged wireless LAN deployment, where MNO may also collect revenue by selling LBA service in different locations to advertisers. We formulate MNO's profit maximization problem by considering different MU's demand in different locations, wireless LAN price for MUs, and revenue from LBA service. Extensive simulations are conducted to validate our analytical results.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134524132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identification of communication devices from analysis of traffic patterns 从交通模式分析中识别通信设备
Pub Date : 2017-06-08 DOI: 10.23919/CNSM.2017.8256018
Hiroki Kawai, S. Ata, N. Nakamura, I. Oka
Recently, variety of communication devices such as printers, IP telephones, network cameras are used widely, with the support of networking in consumer electronics. As a spread of IoT (Internet of Things), the number of embed devices are significantly increasing, however, such devices have lack of capability on security. It is therefore desirable that a network identifies these devices to take appropriate operations. In this paper, we propose an identification method of communication devices from monitoring patterns of traffic, here we use statistical metrics such as packet inter-arrival time or packet size, and we apply a machine learning for the identification. Through evaluations using real traffic, we show that our method can achieve over 90% of identification to 9 commiunication devices.
近年来,打印机、IP电话、网络摄像机等各种通信设备得到了广泛的应用,在消费电子产品中得到了网络化的支持。随着物联网(IoT)的普及,嵌入式设备的数量显著增加,但这些设备的安全能力不足。因此,需要网络识别这些设备以采取适当的操作。在本文中,我们提出了一种从流量监控模式中识别通信设备的方法,在这里我们使用统计指标,如数据包间到达时间或数据包大小,并应用机器学习进行识别。通过对真实流量的评估,表明该方法对9种通信设备的识别率达到90%以上。
{"title":"Identification of communication devices from analysis of traffic patterns","authors":"Hiroki Kawai, S. Ata, N. Nakamura, I. Oka","doi":"10.23919/CNSM.2017.8256018","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8256018","url":null,"abstract":"Recently, variety of communication devices such as printers, IP telephones, network cameras are used widely, with the support of networking in consumer electronics. As a spread of IoT (Internet of Things), the number of embed devices are significantly increasing, however, such devices have lack of capability on security. It is therefore desirable that a network identifies these devices to take appropriate operations. In this paper, we propose an identification method of communication devices from monitoring patterns of traffic, here we use statistical metrics such as packet inter-arrival time or packet size, and we apply a machine learning for the identification. Through evaluations using real traffic, we show that our method can achieve over 90% of identification to 9 commiunication devices.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Can MPTCP secure Internet communications from man-in-the-middle attacks? MPTCP能保护互联网通信免受中间人攻击吗?
Pub Date : 2017-04-10 DOI: 10.23919/CNSM.2017.8255970
H. D. Nguyen, Chi-Dung Phung, Stefano Secci, Benevid Felix Silva, M. N. Lima
Multipath communications at the Internet scale have been a myth for a long time, with no actual protocol being deployed so that multiple paths could be taken by a same connection on the way towards an Internet destination. Recently, the Multipath Transmission Control Protocol (MPTCP) extension has been standardized and is undergoing rapid adoption in many different use-cases, from mobile to fixed access networks, from data-centers to core networks. Among its major benefits — i.e., reliability thanks to backup path rerouting, throughput increase thanks to link aggregation, and confidentiality being more difficult to intercept a full connection — the latter has attracted lower attention. How effective would be to use MPTCP to exploit multiple Internet-scale paths and decrease the probability of Man-in-the-Middle (MITM) attacks is a question which we try to answer. By analyzing the Autonomous System (AS) level graph, we identify which countries and regions show a higher level of robustness against MITM AS-level attacks, for example due to core cable tapping or route hijacking practices.
长期以来,互联网规模的多路径通信一直是一个神话,没有部署任何实际的协议,以便同一个连接在通往互联网目的地的途中可以采用多条路径。最近,多路径传输控制协议(MPTCP)扩展已经标准化,并正在许多不同的用例中迅速采用,从移动到固定接入网络,从数据中心到核心网络。在它的主要优点中——例如,由于备份路径重路由而增加的可靠性,由于链路聚合而增加的吞吐量,以及更难以拦截完整连接的机密性——后者受到的关注较少。如何有效地使用MPTCP利用多个互联网规模的路径和减少中间人(MITM)攻击的可能性是我们试图回答的问题。通过分析自治系统(AS)级别图,我们确定哪些国家和地区对MITM AS级攻击具有更高的鲁棒性,例如由于核心电缆窃听或路由劫持行为。
{"title":"Can MPTCP secure Internet communications from man-in-the-middle attacks?","authors":"H. D. Nguyen, Chi-Dung Phung, Stefano Secci, Benevid Felix Silva, M. N. Lima","doi":"10.23919/CNSM.2017.8255970","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255970","url":null,"abstract":"Multipath communications at the Internet scale have been a myth for a long time, with no actual protocol being deployed so that multiple paths could be taken by a same connection on the way towards an Internet destination. Recently, the Multipath Transmission Control Protocol (MPTCP) extension has been standardized and is undergoing rapid adoption in many different use-cases, from mobile to fixed access networks, from data-centers to core networks. Among its major benefits — i.e., reliability thanks to backup path rerouting, throughput increase thanks to link aggregation, and confidentiality being more difficult to intercept a full connection — the latter has attracted lower attention. How effective would be to use MPTCP to exploit multiple Internet-scale paths and decrease the probability of Man-in-the-Middle (MITM) attacks is a question which we try to answer. By analyzing the Autonomous System (AS) level graph, we identify which countries and regions show a higher level of robustness against MITM AS-level attacks, for example due to core cable tapping or route hijacking practices.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124689770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Charting an intent driven network 绘制一个意图驱动的网络
Pub Date : 2016-04-20 DOI: 10.23919/CNSM.2017.8255981
Y. Elkhatib, Gareth Tyson, G. Coulson
The strong divide between applications and the network control plane is desirable, but keeps the network in the dark regarding the ultimate purpose of applications and, as a result, is unable to optimize for these. An alternative approach is for applications to declare to the network their abstract desires; e.g. “I require group multicast”, or “I will run within a local domain and am latency sensitive”. Such an enriched semantic has the potential to enable the network to better fulfill application intent, while also helping optimize network resource usage across applications. We refer to this approach as intent driven networking (IDN). We sketch an incrementally-deployable design to serve as a stepping stone towards a practical realization of IDN within today's Internet.
应用程序和网络控制平面之间的强烈划分是可取的,但使网络对应用程序的最终目的一无所知,因此无法针对这些目的进行优化。另一种方法是应用程序向网络声明它们的抽象需求;例如,“我需要组播”,或者“我将在本地域中运行,并且对延迟敏感”。这种丰富的语义有可能使网络更好地实现应用程序意图,同时还有助于优化跨应用程序的网络资源使用。我们将这种方法称为意图驱动网络(IDN)。我们概述了一个可逐步部署的设计,作为在当今互联网中实现IDN的垫脚石。
{"title":"Charting an intent driven network","authors":"Y. Elkhatib, Gareth Tyson, G. Coulson","doi":"10.23919/CNSM.2017.8255981","DOIUrl":"https://doi.org/10.23919/CNSM.2017.8255981","url":null,"abstract":"The strong divide between applications and the network control plane is desirable, but keeps the network in the dark regarding the ultimate purpose of applications and, as a result, is unable to optimize for these. An alternative approach is for applications to declare to the network their abstract desires; e.g. “I require group multicast”, or “I will run within a local domain and am latency sensitive”. Such an enriched semantic has the potential to enable the network to better fulfill application intent, while also helping optimize network resource usage across applications. We refer to this approach as intent driven networking (IDN). We sketch an incrementally-deployable design to serve as a stepping stone towards a practical realization of IDN within today's Internet.","PeriodicalId":211611,"journal":{"name":"2017 13th International Conference on Network and Service Management (CNSM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117290826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2017 13th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1