首页 > 最新文献

2023 IEEE 9th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
From Automation to Autonomous: Driving the Optical Network Management to Fixed Fifth-generation (F5G) Advanced 从自动化到自主:推动光网络管理向固定第五代(F5G)发展
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175446
Haomian Zheng, Yunbin Xu, I. Busi, R. Vilalta, R. Casellas, R. Muñoz, Jun Zhou
abstract-An autonomous optical network operates with little or no human involvement and has the capability to configure, oversee, and sustain itself without external intervention. This paper presents the latest advances of autonomous networking (AN) proposed in TM Forum for optical networks. Each step in the procedure for the operator’s daily work is mapped into the AN framework, with detailed features specified in each level. The solution is based on a standard architecture and data models specified in IETF, known as Abstraction and Control of Traffic Engineering Networks (ACTN). Use cases are presented and conducted. This paper presents the result in three typical use cases for optical network management and maintenances: optical service provisioning, healthy assurance, and intelligent alarm processing.
自主光网络在很少或没有人为参与的情况下运行,具有配置、监督和维持自身的能力,而无需外部干预。本文介绍了在TM光网络论坛上提出的自主网络(AN)的最新进展。操作人员日常工作流程中的每一步都映射到AN框架中,并在每个级别中指定详细的特征。该解决方案基于IETF指定的标准体系结构和数据模型,称为流量工程网络的抽象和控制(ACTN)。用例被呈现和执行。本文介绍了光网络管理和维护的三个典型用例:光业务发放、健康保障和智能告警处理。
{"title":"From Automation to Autonomous: Driving the Optical Network Management to Fixed Fifth-generation (F5G) Advanced","authors":"Haomian Zheng, Yunbin Xu, I. Busi, R. Vilalta, R. Casellas, R. Muñoz, Jun Zhou","doi":"10.1109/NetSoft57336.2023.10175446","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175446","url":null,"abstract":"abstract-An autonomous optical network operates with little or no human involvement and has the capability to configure, oversee, and sustain itself without external intervention. This paper presents the latest advances of autonomous networking (AN) proposed in TM Forum for optical networks. Each step in the procedure for the operator’s daily work is mapped into the AN framework, with detailed features specified in each level. The solution is based on a standard architecture and data models specified in IETF, known as Abstraction and Control of Traffic Engineering Networks (ACTN). Use cases are presented and conducted. This paper presents the result in three typical use cases for optical network management and maintenances: optical service provisioning, healthy assurance, and intelligent alarm processing.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Network Intrusion Detection: An Online Methodology for Performance Analysis 增强网络入侵检测:一种性能分析的在线方法
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175465
Simone Magnani, R. D. Corin, D. Siracusa
Machine learning models have been extensively proposed for classifying network flows as benign or malicious, either in-network or at the endpoints of the infrastructure. Typically, the performance of such models is assessed by evaluating the trained model against a portion of the available dataset. However, in a production scenario, these models are fed by a monitoring stage that collects information from flows and provides inputs to a filtering stage that eventually blocks malicious traffic. To the best of our knowledge, no work has analysed the entire pipeline, focusing on its performance in terms of both inputs (i.e., the information collected from each flow) and outputs (i.e., the system’s ability to prevent an attack from reaching the application layer).In this paper, we propose a methodology for evaluating the effectiveness of a Network Intrusion Detection System (NIDS) by placing the model evaluation test alongside an online test that simulates the entire monitoring-detection-mitigation pipeline. We assess the system’s outputs based on different input configurations, using state-of-the-art detection models and datasets. Our results highlight the importance of inputs for the throughput of the NIDS, which can decrease by more than 50% with heavier configurations. Furthermore, our research indicates that relying solely on the performance of the detection model may not be enough to evaluate the effectiveness of the entire NIDS process. Indeed, even when achieving near-optimal False Negative Rate (FNR) values (e.g., 0.01), a substantial amount of malicious traffic (e.g., 70%) may still successfully reach its target.
机器学习模型已被广泛提出用于将网络流分类为良性或恶意,无论是在网络内还是在基础设施的端点。通常,这些模型的性能是通过对可用数据集的一部分评估训练模型来评估的。然而,在生产场景中,这些模型由监控阶段提供,监控阶段从流中收集信息,并向过滤阶段提供输入,过滤阶段最终阻止恶意流量。据我们所知,还没有人分析过整个管道,重点关注其输入(即从每个流收集的信息)和输出(即系统防止攻击到达应用层的能力)方面的性能。在本文中,我们提出了一种评估网络入侵检测系统(NIDS)有效性的方法,方法是将模型评估测试与模拟整个监控-检测-缓解管道的在线测试放在一起。我们使用最先进的检测模型和数据集,根据不同的输入配置评估系统的输出。我们的结果强调了输入对NIDS吞吐量的重要性,在较重的配置下,NIDS的吞吐量可能会降低50%以上。此外,我们的研究表明,仅仅依靠检测模型的性能可能不足以评估整个NIDS过程的有效性。事实上,即使达到接近最佳的假阴性率(FNR)值(例如0.01),大量的恶意流量(例如70%)仍然可能成功到达其目标。
{"title":"Enhancing Network Intrusion Detection: An Online Methodology for Performance Analysis","authors":"Simone Magnani, R. D. Corin, D. Siracusa","doi":"10.1109/NetSoft57336.2023.10175465","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175465","url":null,"abstract":"Machine learning models have been extensively proposed for classifying network flows as benign or malicious, either in-network or at the endpoints of the infrastructure. Typically, the performance of such models is assessed by evaluating the trained model against a portion of the available dataset. However, in a production scenario, these models are fed by a monitoring stage that collects information from flows and provides inputs to a filtering stage that eventually blocks malicious traffic. To the best of our knowledge, no work has analysed the entire pipeline, focusing on its performance in terms of both inputs (i.e., the information collected from each flow) and outputs (i.e., the system’s ability to prevent an attack from reaching the application layer).In this paper, we propose a methodology for evaluating the effectiveness of a Network Intrusion Detection System (NIDS) by placing the model evaluation test alongside an online test that simulates the entire monitoring-detection-mitigation pipeline. We assess the system’s outputs based on different input configurations, using state-of-the-art detection models and datasets. Our results highlight the importance of inputs for the throughput of the NIDS, which can decrease by more than 50% with heavier configurations. Furthermore, our research indicates that relying solely on the performance of the detection model may not be enough to evaluate the effectiveness of the entire NIDS process. Indeed, even when achieving near-optimal False Negative Rate (FNR) values (e.g., 0.01), a substantial amount of malicious traffic (e.g., 70%) may still successfully reach its target.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122457942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building the Digital Twin of a MEC node: a Data Driven Approach 构建MEC节点的数字孪生:数据驱动方法
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175423
Riccardo Fedrizzi, Arturo Bellin, C. Costa, F. Granelli
Multi-access edge computing (MEC) represents an emerging solution to improve the performance of mobile networks by bringing computing resources closer to the edge of the network. However, MEC requires the implementation of virtualization and can be deployed using different hardware platforms, including COTS devices. In this highly heterogeneous scenario, the digital twin (DT), assisted by proper AI/ML solutions, is envisioned to play a crucial role in automated network management, operating as an intermediate and collaborative layer enabling the orchestration layer to better understand network behavior before making changes to the physical network. In this paper, we aim to develop a DT model that captures the behavior of a MEC node supporting services with varying workloads. In pursuit of this objective, we adopt a data-driven methodology that effectively learn a model predicting three critical key performance indicators (KPIs): throughput, computational load, and power consumption. To demonstrate the viability and potential of such approach, a measurement campaign is conducted on MEC nodes deployed with different virtualization environments (bare metal, virtual machine, and containerized), and the results are used to build the DT of each node. Furthermore, machine learning models, including k-nearest neighbors (KNN), support vector regression (SVR), and polynomial fitting (PF), are used to understand the amount of actual measurements required to achieve a suitably low KPI prediction error. The results of this study provide a basis for further research in the field of MEC DT models and carbon footprint-aware orchestration.
多接入边缘计算(MEC)代表了一种新兴的解决方案,通过使计算资源更接近网络边缘来提高移动网络的性能。但是,MEC需要实现虚拟化,并且可以使用不同的硬件平台进行部署,包括COTS设备。在这种高度异构的场景中,数字孪生(DT)在适当的AI/ML解决方案的辅助下,预计将在自动化网络管理中发挥关键作用,作为中间和协作层运行,使编排层能够在对物理网络进行更改之前更好地理解网络行为。在本文中,我们的目标是开发一个DT模型,该模型捕获支持不同工作负载服务的MEC节点的行为。为了实现这一目标,我们采用了一种数据驱动的方法,该方法可以有效地学习预测三个关键关键性能指标(kpi)的模型:吞吐量、计算负载和功耗。为了证明这种方法的可行性和潜力,在使用不同虚拟化环境(裸机、虚拟机和容器化)部署的MEC节点上进行了测量活动,并使用结果构建每个节点的DT。此外,机器学习模型,包括k近邻(KNN)、支持向量回归(SVR)和多项式拟合(PF),用于了解实现适当的低KPI预测误差所需的实际测量量。本研究结果为MEC - DT模型和碳足迹感知编排领域的进一步研究提供了基础。
{"title":"Building the Digital Twin of a MEC node: a Data Driven Approach","authors":"Riccardo Fedrizzi, Arturo Bellin, C. Costa, F. Granelli","doi":"10.1109/NetSoft57336.2023.10175423","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175423","url":null,"abstract":"Multi-access edge computing (MEC) represents an emerging solution to improve the performance of mobile networks by bringing computing resources closer to the edge of the network. However, MEC requires the implementation of virtualization and can be deployed using different hardware platforms, including COTS devices. In this highly heterogeneous scenario, the digital twin (DT), assisted by proper AI/ML solutions, is envisioned to play a crucial role in automated network management, operating as an intermediate and collaborative layer enabling the orchestration layer to better understand network behavior before making changes to the physical network. In this paper, we aim to develop a DT model that captures the behavior of a MEC node supporting services with varying workloads. In pursuit of this objective, we adopt a data-driven methodology that effectively learn a model predicting three critical key performance indicators (KPIs): throughput, computational load, and power consumption. To demonstrate the viability and potential of such approach, a measurement campaign is conducted on MEC nodes deployed with different virtualization environments (bare metal, virtual machine, and containerized), and the results are used to build the DT of each node. Furthermore, machine learning models, including k-nearest neighbors (KNN), support vector regression (SVR), and polynomial fitting (PF), are used to understand the amount of actual measurements required to achieve a suitably low KPI prediction error. The results of this study provide a basis for further research in the field of MEC DT models and carbon footprint-aware orchestration.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123763999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-Touch MEC Resources for Connected Autonomous Vehicles Managed by Federated Learning 基于联邦学习管理的互联自动驾驶汽车零接触MEC资源
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175494
Carlos Ruiz De Mendoza, C. Cervelló-Pastor
This paper presents a Ph.D. thesis proposal for a novel solution in optimizing the placement of Connected Autonomous Vehicles (CAVs) Virtual Network Functions (VNFs) requests in Edge Computing (EC) resources. Our Federated Deep Reinforcement Learning (FDRL) proposal will be designed to improve computation efficiency while minimizing service rejections and maximizing resource utilization, and ensuring the least costly path for CAVs. This approach will also be privacy-preserving, ensuring sensitive data remains secure and enables reliable, low-latency communication between CAVs, EC nodes, and the federated server. By utilizing distributed learning capabilities, FDRL allows multiple vehicles to learn from their local experience and make collective decisions, improving network systems performance.
本文提出了一项博士论文提案,该提案旨在优化连接自动驾驶汽车(cav)虚拟网络功能(VNFs)请求在边缘计算(EC)资源中的放置。我们的联邦深度强化学习(FDRL)提案旨在提高计算效率,同时最大限度地减少服务拒绝和最大化资源利用率,并确保自动驾驶汽车的成本最低的路径。这种方法还将保护隐私,确保敏感数据保持安全,并支持cav、EC节点和联邦服务器之间可靠、低延迟的通信。通过利用分布式学习能力,FDRL允许多辆车从本地经验中学习并做出集体决策,从而提高网络系统的性能。
{"title":"Zero-Touch MEC Resources for Connected Autonomous Vehicles Managed by Federated Learning","authors":"Carlos Ruiz De Mendoza, C. Cervelló-Pastor","doi":"10.1109/NetSoft57336.2023.10175494","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175494","url":null,"abstract":"This paper presents a Ph.D. thesis proposal for a novel solution in optimizing the placement of Connected Autonomous Vehicles (CAVs) Virtual Network Functions (VNFs) requests in Edge Computing (EC) resources. Our Federated Deep Reinforcement Learning (FDRL) proposal will be designed to improve computation efficiency while minimizing service rejections and maximizing resource utilization, and ensuring the least costly path for CAVs. This approach will also be privacy-preserving, ensuring sensitive data remains secure and enables reliable, low-latency communication between CAVs, EC nodes, and the federated server. By utilizing distributed learning capabilities, FDRL allows multiple vehicles to learn from their local experience and make collective decisions, improving network systems performance.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124417592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Virtual Machines and Bare Metal for CNFs at Resource-Constrained Network Edge 资源受限网络边缘CNFs的虚拟机和裸机比较
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175415
P. Veitch, Adam Broadbent, Arsham Farshad
A growing number of network functions built to run on commodity compute infrastructure, are increasingly adopting cloud native principles, and therefore often run inside containers. Containerised Network Functions (CNFs) can be hosted directly on the server’s host OS- Bare Metal (BM)- or can run inside a Virtual Machine (VM). The choice of BM or VM to host containers depends on many factors linked to security, tenant isolation, available resources and performance. This paper explores this important consideration by conducting comparative tests in a specific domain, namely at the network edge where resources are tightly constrained. Using a small form-factor micro server, we demonstrate how BM can clearly out-perform the use of a VM but that this occurs when there are distinct set-up dependencies around small fixed frame sizes and very stringent packet loss constraints. The performance margin is notably shrunk however, when a more realistic traffic load is used and non-zero packet loss permitted: the VM performance reaches within 89% of the BM throughput, while also achieving an average latency 14% lower than the BM setup. These results emphasise it is not simply a clear-cut case of BM always being “better”, with many other factors requiring attention including security and tenant isolation. We use the insights gleaned from lab testing alongside qualitative criteria to better inform design decisions around using VMs or BM to host CNFs.
为在商品计算基础设施上运行而构建的越来越多的网络功能越来越多地采用云原生原则,因此经常在容器内运行。容器化网络功能(cnf)可以直接托管在服务器的主机操作系统上——裸机(BM)——或者可以在虚拟机(VM)中运行。选择BM或VM来托管容器取决于与安全性、租户隔离、可用资源和性能相关的许多因素。本文通过在特定领域(即资源受到严格约束的网络边缘)进行比较测试来探讨这一重要考虑。使用一个小尺寸的微型服务器,我们演示了BM如何明显优于VM的使用,但是当围绕小固定帧大小和非常严格的数据包丢失约束存在明显的设置依赖时,就会发生这种情况。然而,当使用更现实的流量负载并且允许非零数据包丢失时,性能边际明显缩小:VM性能达到BM吞吐量的89%以内,同时实现比BM设置低14%的平均延迟。这些结果强调,并不是简单地说BM总是“更好”,还有许多其他因素需要注意,包括安全性和租户隔离。我们使用从实验室测试中收集的见解以及定性标准来更好地为围绕使用vm或BM托管CNFs的设计决策提供信息。
{"title":"Comparison of Virtual Machines and Bare Metal for CNFs at Resource-Constrained Network Edge","authors":"P. Veitch, Adam Broadbent, Arsham Farshad","doi":"10.1109/NetSoft57336.2023.10175415","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175415","url":null,"abstract":"A growing number of network functions built to run on commodity compute infrastructure, are increasingly adopting cloud native principles, and therefore often run inside containers. Containerised Network Functions (CNFs) can be hosted directly on the server’s host OS- Bare Metal (BM)- or can run inside a Virtual Machine (VM). The choice of BM or VM to host containers depends on many factors linked to security, tenant isolation, available resources and performance. This paper explores this important consideration by conducting comparative tests in a specific domain, namely at the network edge where resources are tightly constrained. Using a small form-factor micro server, we demonstrate how BM can clearly out-perform the use of a VM but that this occurs when there are distinct set-up dependencies around small fixed frame sizes and very stringent packet loss constraints. The performance margin is notably shrunk however, when a more realistic traffic load is used and non-zero packet loss permitted: the VM performance reaches within 89% of the BM throughput, while also achieving an average latency 14% lower than the BM setup. These results emphasise it is not simply a clear-cut case of BM always being “better”, with many other factors requiring attention including security and tenant isolation. We use the insights gleaned from lab testing alongside qualitative criteria to better inform design decisions around using VMs or BM to host CNFs.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126010749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Definition Of Digital Twin Network Data Model in The Context of Edge-Cloud Continuum
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175444
Syed Mohsan Raza, R. Minerva, N. Crespi, M. Karech
The telecommunications sector is devoting an initial interest in the representation of complex networks as Digital Twins. The concept of a Digital Twin Network (DTN) is a research topic, but it promises to be an important step for harmonizing different models of the Edge-Cloud Continuum. The DTN software framework aims at helping network operations by providing updated and complete views on the network or parts of it, and it also introduces the possibility to simulate the network behavior or to learn from network events history (Machine Learning) without jeopardizing the actual operations of resources. In addition, thanks to the representation capabilities of the DT, its usage in the network promises to support different stakeholders’ views on their virtualized and physical infrastructure. This work tries to consolidate a DTN data model representing the elements of the Edge-Cloud Continuum by providing a layered (horizontal) and segmented (vertical) view of the infrastructure to all the involved stakeholders. The DTN model is an ontology where the linked classes represent properties and relations of networked components. This work aims to design a flexible and extensible ontology that describes the Edge-Cloud continuum usable in the telecommunications as well in the Cloud (IT and web) industries creating a bridge between the two.
电信部门最初对将复杂网络表示为数字双胞胎(Digital Twins)很感兴趣。数字孪生网络(DTN)的概念是一个研究课题,但它有望成为协调边缘云连续体不同模型的重要一步。DTN软件框架旨在通过提供网络或部分网络的更新和完整视图来帮助网络运营,并且还引入了模拟网络行为或从网络事件历史(机器学习)中学习的可能性,而不会损害资源的实际操作。此外,由于DT的表示能力,它在网络中的使用承诺支持不同利益相关者对其虚拟和物理基础设施的看法。这项工作试图通过向所有相关利益相关者提供分层(水平)和分段(垂直)的基础设施视图,来巩固代表边缘云连续体元素的DTN数据模型。DTN模型是一个本体,其中链接的类表示网络组件的属性和关系。这项工作旨在设计一个灵活和可扩展的本体,描述在电信和云(IT和web)行业中可用的边缘云连续体,创建两者之间的桥梁。
{"title":"Definition Of Digital Twin Network Data Model in The Context of Edge-Cloud Continuum","authors":"Syed Mohsan Raza, R. Minerva, N. Crespi, M. Karech","doi":"10.1109/NetSoft57336.2023.10175444","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175444","url":null,"abstract":"The telecommunications sector is devoting an initial interest in the representation of complex networks as Digital Twins. The concept of a Digital Twin Network (DTN) is a research topic, but it promises to be an important step for harmonizing different models of the Edge-Cloud Continuum. The DTN software framework aims at helping network operations by providing updated and complete views on the network or parts of it, and it also introduces the possibility to simulate the network behavior or to learn from network events history (Machine Learning) without jeopardizing the actual operations of resources. In addition, thanks to the representation capabilities of the DT, its usage in the network promises to support different stakeholders’ views on their virtualized and physical infrastructure. This work tries to consolidate a DTN data model representing the elements of the Edge-Cloud Continuum by providing a layered (horizontal) and segmented (vertical) view of the infrastructure to all the involved stakeholders. The DTN model is an ontology where the linked classes represent properties and relations of networked components. This work aims to design a flexible and extensible ontology that describes the Edge-Cloud continuum usable in the telecommunications as well in the Cloud (IT and web) industries creating a bridge between the two.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125153415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Auction-based network slicing for 5G RAN 基于拍卖的5G RAN网络切片
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175440
L. M. M. Zorello, Kazem Eradatmand, Sebastian Troia, A. Pattavina, Yingqian Zhang, G. Maier
Network slicing is an important characteristic of 5G/6G networks that increases flexibility and enables different applications over a single infrastructure. The physical resources are partitioned to create virtualized networks, each dedicated to services with specific requirements. Several entities participate in network slicing, including Mobile Network Operators (MNOs), Mobile Virtual Network Operators (MVNOs), and users. An MNO owns the physical network infrastructure and the resources. MVNOs lease resources from the MNO and operate as service providers towards their subscribers. The goal of this work is to optimize the end-to-end network slicing process to provide services to users with a fair sharing of resources. We model this problem as a hierarchical combinatorial auction with a modified Vickrey-Clarke-Groves pricing mechanism. In the upper-level auction, an MNO is the seller supplying Network Slice to several MVNOs, who act as the bidders. In the lower-level auction, each MVNO holds an auction as a seller delivering services to their subscribed end-users, who play the role of bidders. We formulate and solve the Winner Determination Problem using mathematical programming and heuristic algorithms. The simulations show that the model can achieve fair sharing of resources, and it enables improving the MNO and MVNO revenue.
网络切片是5G/6G网络的一个重要特性,它可以提高灵活性,并在单个基础设施上实现不同的应用程序。将物理资源进行分区,创建虚拟网络,每个虚拟网络用于满足特定需求的业务。参与网络切片的实体包括移动网络运营商(MNOs)、移动虚拟网络运营商(MVNOs)和用户。MNO拥有物理网络基础设施和资源。mvno从MNO租用资源,并作为服务提供商对其用户进行操作。本工作的目标是优化端到端网络切片过程,以公平的资源共享方式为用户提供服务。我们将这一问题建模为带有改进的Vickrey-Clarke-Groves定价机制的分层组合拍卖。在高级拍卖中,MNO是向几个mvno提供网络切片的卖方,这些mvno充当竞标者。在较低级别的拍卖中,每个MVNO作为向其订阅的最终用户提供服务的卖方举行拍卖,而最终用户则扮演竞标者的角色。我们使用数学规划和启发式算法来制定和解决赢家判定问题。仿真结果表明,该模型能够实现资源的公平共享,提高了MNO和MVNO的收益。
{"title":"Auction-based network slicing for 5G RAN","authors":"L. M. M. Zorello, Kazem Eradatmand, Sebastian Troia, A. Pattavina, Yingqian Zhang, G. Maier","doi":"10.1109/NetSoft57336.2023.10175440","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175440","url":null,"abstract":"Network slicing is an important characteristic of 5G/6G networks that increases flexibility and enables different applications over a single infrastructure. The physical resources are partitioned to create virtualized networks, each dedicated to services with specific requirements. Several entities participate in network slicing, including Mobile Network Operators (MNOs), Mobile Virtual Network Operators (MVNOs), and users. An MNO owns the physical network infrastructure and the resources. MVNOs lease resources from the MNO and operate as service providers towards their subscribers. The goal of this work is to optimize the end-to-end network slicing process to provide services to users with a fair sharing of resources. We model this problem as a hierarchical combinatorial auction with a modified Vickrey-Clarke-Groves pricing mechanism. In the upper-level auction, an MNO is the seller supplying Network Slice to several MVNOs, who act as the bidders. In the lower-level auction, each MVNO holds an auction as a seller delivering services to their subscribed end-users, who play the role of bidders. We formulate and solve the Winner Determination Problem using mathematical programming and heuristic algorithms. The simulations show that the model can achieve fair sharing of resources, and it enables improving the MNO and MVNO revenue.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127218335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-FORCH: A Scalable Deep Reinforcement Learning-based Fog Computing Orchestrator DRL-FORCH:一个可扩展的基于深度强化学习的雾计算协调器
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175398
Nicola Di Cicco, Gaetano Francesco Pittalà, G. Davoli, D. Borsatti, W. Cerroni, C. Raffaelli, M. Tornatore
We consider the problem of designing and training a neural network-based orchestrator for fog computing service deployment. Our goal is to train an orchestrator able to optimize diversified and competing QoS requirements, such as blocking probability and service delay, while potentially supporting thousands of fog nodes. To cope with said challenges, we implement our neural orchestrator as a Deep Set (DS) network operating on sets of fog nodes, and we leverage Deep Reinforcement Learning (DRL) with invalid action masking to find an optimal trade-off between competing objectives. Illustrative numerical results show that our Deep Set-based policy generalizes well to problem sizes (i.e., in terms of numbers of fog nodes) up to two orders of magnitude larger than the ones seen during the training phase, outperforming both greedy heuristics and traditional Multi-Layer Perceptron (MLP)-based DRL. In addition, inference times of our DS-based policy are up to an order of magnitude faster than an MLP, allowing for excellent scalability and near real-time online decision-making.
我们考虑了为雾计算服务部署设计和训练一个基于神经网络的编排器的问题。我们的目标是训练一个能够优化多样化和竞争性QoS需求的编排器,例如阻塞概率和服务延迟,同时潜在地支持数千个雾节点。为了应对上述挑战,我们将神经编排器实现为在雾节点集上运行的深度集(DS)网络,并利用具有无效动作掩蔽的深度强化学习(DRL)在竞争目标之间找到最佳权衡。说明数值结果表明,我们基于深度集的策略可以很好地泛化到问题大小(即雾节点的数量),比训练阶段看到的问题大两个数量级,优于贪婪启发式和传统的基于多层感知器(MLP)的DRL。此外,我们基于ds的策略的推理时间比MLP快一个数量级,允许出色的可扩展性和接近实时的在线决策。
{"title":"DRL-FORCH: A Scalable Deep Reinforcement Learning-based Fog Computing Orchestrator","authors":"Nicola Di Cicco, Gaetano Francesco Pittalà, G. Davoli, D. Borsatti, W. Cerroni, C. Raffaelli, M. Tornatore","doi":"10.1109/NetSoft57336.2023.10175398","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175398","url":null,"abstract":"We consider the problem of designing and training a neural network-based orchestrator for fog computing service deployment. Our goal is to train an orchestrator able to optimize diversified and competing QoS requirements, such as blocking probability and service delay, while potentially supporting thousands of fog nodes. To cope with said challenges, we implement our neural orchestrator as a Deep Set (DS) network operating on sets of fog nodes, and we leverage Deep Reinforcement Learning (DRL) with invalid action masking to find an optimal trade-off between competing objectives. Illustrative numerical results show that our Deep Set-based policy generalizes well to problem sizes (i.e., in terms of numbers of fog nodes) up to two orders of magnitude larger than the ones seen during the training phase, outperforming both greedy heuristics and traditional Multi-Layer Perceptron (MLP)-based DRL. In addition, inference times of our DS-based policy are up to an order of magnitude faster than an MLP, allowing for excellent scalability and near real-time online decision-making.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A demonstration of VEREFOO: an automated framework for virtual firewall configuration VEREFOO的演示:一个虚拟防火墙配置的自动化框架
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175442
Daniele Bringhenti, R. Sisto, Fulvio Valenza
Nowadays, security automation exploits the agility characterizing network virtualization to replace the traditional error-prone human operations. This dynamism allows user-specified high-level intents to be rapidly refined into the concrete configuration rules which should be deployed on virtual security functions. In this revolutionary context, this paper proposes the demonstration of a novel security framework based on an optimized approach for the automatic orchestration of virtual distributed firewalls. The framework provides formal guarantees for the firewall configuration correctness and minimizes the size of the firewall allocation scheme and rule set. The framework produces rules that can be deployed on multiple types of real virtual function implementations, such as iptables, eBPF firewalls and Open vSwitch.
如今,安全自动化利用网络虚拟化的敏捷性来取代传统的易出错的人工操作。这种动态允许将用户指定的高级意图快速细化为应该部署在虚拟安全功能上的具体配置规则。在这种革命性的背景下,本文提出了一种基于虚拟分布式防火墙自动编排优化方法的新型安全框架的演示。该框架为防火墙配置的正确性提供了形式化的保证,并将防火墙分配方案和规则集的大小最小化。该框架生成的规则可以部署在多种类型的实际虚拟功能实现上,例如iptables、eBPF防火墙和Open vSwitch。
{"title":"A demonstration of VEREFOO: an automated framework for virtual firewall configuration","authors":"Daniele Bringhenti, R. Sisto, Fulvio Valenza","doi":"10.1109/NetSoft57336.2023.10175442","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175442","url":null,"abstract":"Nowadays, security automation exploits the agility characterizing network virtualization to replace the traditional error-prone human operations. This dynamism allows user-specified high-level intents to be rapidly refined into the concrete configuration rules which should be deployed on virtual security functions. In this revolutionary context, this paper proposes the demonstration of a novel security framework based on an optimized approach for the automatic orchestration of virtual distributed firewalls. The framework provides formal guarantees for the firewall configuration correctness and minimizes the size of the firewall allocation scheme and rule set. The framework produces rules that can be deployed on multiple types of real virtual function implementations, such as iptables, eBPF firewalls and Open vSwitch.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Zero-Touch and NFV-Based Full-Mesh VPNaaS Solution - Demo 零接触和基于nfv的全网格VPNaaS解决方案-演示
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175469
Daniel Gomes, Rafael Direito, Diogo Gomes, Rui L. Aguiar
NFV has risen to be a solution to abstract Network Functions from the hardware, providing numerous advantages to Network Operators. However, many challenges have appeared with the evolution of NFV. An example are the inter-domain scenarios where services are spanned across multiple independent domains. Using VPNs to interconnect all domains can attenuate the difficulties imposed by such scenarios. In this paper, we present a NFV-based solution for deploying full-mesh VPNs to interconnect different administrative domains, without manual intervention.
NFV已经成为一种从硬件中抽象网络功能的解决方案,为网络运营商提供了许多优势。然而,随着NFV的发展,也出现了许多挑战。一个例子是跨域场景,其中服务跨越多个独立的域。使用vpn连接所有域可以减轻这种情况带来的困难。在本文中,我们提出了一个基于nfv的解决方案,用于部署全网状vpn来互连不同的管理域,而无需人工干预。
{"title":"A Zero-Touch and NFV-Based Full-Mesh VPNaaS Solution - Demo","authors":"Daniel Gomes, Rafael Direito, Diogo Gomes, Rui L. Aguiar","doi":"10.1109/NetSoft57336.2023.10175469","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175469","url":null,"abstract":"NFV has risen to be a solution to abstract Network Functions from the hardware, providing numerous advantages to Network Operators. However, many challenges have appeared with the evolution of NFV. An example are the inter-domain scenarios where services are spanned across multiple independent domains. Using VPNs to interconnect all domains can attenuate the difficulties imposed by such scenarios. In this paper, we present a NFV-based solution for deploying full-mesh VPNs to interconnect different administrative domains, without manual intervention.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132484248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 9th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1