首页 > 最新文献

2023 IEEE 9th International Conference on Network Softwarization (NetSoft)最新文献

英文 中文
Autonomous Network Management in Multi-Domain 6G Networks based on Graph Neural Networks 基于图神经网络的多域6G网络自治网络管理
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175480
Kaan Aykurt, W. Kellerer
Sixth-generation (6G) networks propose integrating multiple networks and domains while improving network performance. Hence, today’s networks are becoming increasingly larger and more complex. Traditional methods to manage networks are facing significant challenges as the topology sizes, traffic patterns, and network domains are changing.This paper presents the state-of-the-art in literature for network management and proposes a research plan for an autonomous network management framework fueled by the Digital Twin (DT) paradigm. Unlike the existing methods such as Queuing Theory (QT) or network simulation studies, the proposed framework relies on state-of-the-art Graph Neural Networks (GNNs) for network performance analysis. We argue that seamless integration of networks while improving performance guarantees can be achieved via autonomous management of networks and present a research plan in this paper.
第六代(6G)网络在提高网络性能的同时,提出了集成多个网络和多个域的方案。因此,今天的网络正变得越来越大,越来越复杂。随着网络拓扑规模、网络流量模式和网络域的不断变化,传统的网络管理方法面临着巨大的挑战。本文介绍了网络管理的最新文献,并提出了一个由数字孪生(DT)范式推动的自主网络管理框架的研究计划。与排队论(QT)或网络仿真研究等现有方法不同,所提出的框架依赖于最先进的图神经网络(gnn)进行网络性能分析。我们认为通过网络的自治管理可以实现网络的无缝集成,同时提高性能保证,并提出了研究计划。
{"title":"Autonomous Network Management in Multi-Domain 6G Networks based on Graph Neural Networks","authors":"Kaan Aykurt, W. Kellerer","doi":"10.1109/NetSoft57336.2023.10175480","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175480","url":null,"abstract":"Sixth-generation (6G) networks propose integrating multiple networks and domains while improving network performance. Hence, today’s networks are becoming increasingly larger and more complex. Traditional methods to manage networks are facing significant challenges as the topology sizes, traffic patterns, and network domains are changing.This paper presents the state-of-the-art in literature for network management and proposes a research plan for an autonomous network management framework fueled by the Digital Twin (DT) paradigm. Unlike the existing methods such as Queuing Theory (QT) or network simulation studies, the proposed framework relies on state-of-the-art Graph Neural Networks (GNNs) for network performance analysis. We argue that seamless integration of networks while improving performance guarantees can be achieved via autonomous management of networks and present a research plan in this paper.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"140 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114096908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P4-LISP: A P4-Based High-Performance Router for the Locator/Identifier Separation Protocol P4-LISP:基于p4的定位符/标识符分离协议高性能路由器
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175405
Benjamin Steinert, Marco Häberle, Jan-Oliver Nick, D. Farinacci, M. Menth
The networking paradigm locator/identifier split decouples locating and identifying functionality of addresses. Thereby it improves multi-homing, fail-over, mobility, traffic engineering over the Internet, and routing scalability.The Locator/Identifier Separation Protocol (LISP) is a prominent incarnation of that paradigm which recently became an Internet standard. However, existing LISP implementations are either proprietary or have limited performance, which makes their deployment difficult in high-speed networks. Programming Protocol-independent Packet Processors (P4) is a programming language that facilitates the implementation of custom data plane processing on high-performance switches with line rates of up to 400 Gbit/s.In this work, we present P4-LISP, an open-source P4-based proof of concept implementation of a high-performance LISP router. It supports all relevant features such as ITR, ETR, RTR, P-ITR, P-ETR, NAT-traversal, LISP-NAT, and mobile nodes. As control plane, the open-source implementation lispers.net has been integrated on the switch. Security features are added to protect the control plane from being overloaded by the high-performance data plane. The paper describes the architecture of P4-LISP in detail and extensively evaluates performance, functionality, controller performance, and overload protection.
网络范例定位器/标识符分离解耦了地址的定位和标识功能。因此,它改进了多宿主、故障转移、移动性、Internet上的流量工程和路由可伸缩性。定位符/标识符分离协议(Locator/Identifier Separation Protocol, LISP)是该范式的突出体现,它最近已成为互联网标准。然而,现有的LISP实现要么是专有的,要么性能有限,这使得它们很难在高速网络中部署。P4 (Programming Protocol-independent Packet Processors)是一种编程语言,可在线路速率高达400gbit /s的高性能交换机上实现自定义数据平面处理。在这项工作中,我们提出了P4-LISP,这是一个基于开源p4的高性能LISP路由器的概念验证实现。支持ITR、ETR、RTR、P-ITR、P-ETR、nat遍历、LISP-NAT、移动节点等所有相关特性。作为控制平面,在交换机上集成了开源实现lispers.net。为了防止控制平面被高性能数据平面过载,增加了安全特性。本文详细描述了P4-LISP的体系结构,并对其性能、功能、控制器性能和过载保护进行了广泛的评估。
{"title":"P4-LISP: A P4-Based High-Performance Router for the Locator/Identifier Separation Protocol","authors":"Benjamin Steinert, Marco Häberle, Jan-Oliver Nick, D. Farinacci, M. Menth","doi":"10.1109/NetSoft57336.2023.10175405","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175405","url":null,"abstract":"The networking paradigm locator/identifier split decouples locating and identifying functionality of addresses. Thereby it improves multi-homing, fail-over, mobility, traffic engineering over the Internet, and routing scalability.The Locator/Identifier Separation Protocol (LISP) is a prominent incarnation of that paradigm which recently became an Internet standard. However, existing LISP implementations are either proprietary or have limited performance, which makes their deployment difficult in high-speed networks. Programming Protocol-independent Packet Processors (P4) is a programming language that facilitates the implementation of custom data plane processing on high-performance switches with line rates of up to 400 Gbit/s.In this work, we present P4-LISP, an open-source P4-based proof of concept implementation of a high-performance LISP router. It supports all relevant features such as ITR, ETR, RTR, P-ITR, P-ETR, NAT-traversal, LISP-NAT, and mobile nodes. As control plane, the open-source implementation lispers.net has been integrated on the switch. Security features are added to protect the control plane from being overloaded by the high-performance data plane. The paper describes the architecture of P4-LISP in detail and extensively evaluates performance, functionality, controller performance, and overload protection.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129551018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards High Precision End-to-End Video Streaming from Drones using Packet Trimming 向高精度端到端视频流从无人机使用包修剪
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175495
Emre Karakis, S. Clayman, Mustafa Tuker, Elif Bozkaya, M. Sayıt
The emergence of a number of network communication facilities such as Network Function Virtualization (NFV), Software Defined Networking (SDN), the Internet of Things (IoT), Unmanned Aerial Vehicles (UAV), and in-network packet processing, holds a potential to meet the low latency, high precision requirements of various future multimedia applications. However, this raises the corresponding issues of how all of these elements can be used together in future networking environments, including newly developed protocols and techniques. This paper describes the architecture of an end-to-end video streaming platform for video surveillance, consisting of a UAV network domain, an edge server implementing in-network packet trimming operations with the use of Big Packet Protocol (BPP), utilization of Scalable Video Coding (SVC) and multiple video clients which connect to a network managed by an SDN controller. A Virtualized Edge Function at the drone edge utilizes SVC and in communication with the Drone Control Unit to manage the transmitted video quality. Experimental results show the potential that future multimedia applications can achieve the required high precision with the use of future network components and the consideration of their interactions.
网络功能虚拟化(NFV)、软件定义网络(SDN)、物联网(IoT)、无人机(UAV)和网络内分组处理等一系列网络通信设施的出现,有可能满足未来各种多媒体应用的低延迟、高精度要求。然而,这就提出了相应的问题,即在未来的网络环境中,包括新开发的协议和技术,如何将所有这些元素一起使用。本文描述了用于视频监控的端到端视频流平台的体系结构,包括无人机网络域、使用大包协议(BPP)实现网络内分组裁剪操作的边缘服务器、可扩展视频编码(SVC)的利用以及连接到由SDN控制器管理的网络的多个视频客户端。无人机边缘的虚拟化边缘功能利用SVC和与无人机控制单元的通信来管理传输的视频质量。实验结果表明,利用未来网络组件并考虑它们之间的相互作用,未来的多媒体应用有可能达到所要求的高精度。
{"title":"Towards High Precision End-to-End Video Streaming from Drones using Packet Trimming","authors":"Emre Karakis, S. Clayman, Mustafa Tuker, Elif Bozkaya, M. Sayıt","doi":"10.1109/NetSoft57336.2023.10175495","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175495","url":null,"abstract":"The emergence of a number of network communication facilities such as Network Function Virtualization (NFV), Software Defined Networking (SDN), the Internet of Things (IoT), Unmanned Aerial Vehicles (UAV), and in-network packet processing, holds a potential to meet the low latency, high precision requirements of various future multimedia applications. However, this raises the corresponding issues of how all of these elements can be used together in future networking environments, including newly developed protocols and techniques. This paper describes the architecture of an end-to-end video streaming platform for video surveillance, consisting of a UAV network domain, an edge server implementing in-network packet trimming operations with the use of Big Packet Protocol (BPP), utilization of Scalable Video Coding (SVC) and multiple video clients which connect to a network managed by an SDN controller. A Virtualized Edge Function at the drone edge utilizes SVC and in communication with the Drone Control Unit to manage the transmitted video quality. Experimental results show the potential that future multimedia applications can achieve the required high precision with the use of future network components and the consideration of their interactions.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"35 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133071668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latency-Aware Kubernetes Scheduling for Microservices Orchestration at the Edge 边缘微服务编排的延迟感知Kubernetes调度
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175431
C. Centofanti, Walter Tiberti, A. Marotta, F. Graziosi, D. Cassioli
Network and computing infrastructures are nowadays challenged to meet the increasingly stringent requirements of novel applications. One of the most critical aspect is optimizing the latency perceived by the end-user accessing the services. New network architectures offer a natural framework for the efficient orchestration of microservices. However, how to incorporate accurate latency metrics into orchestration decisions still represents an open challenge.In this work we propose a novel architectural approach to perform scheduling operations in Kubernetes environment. Existing approaches proposed the collection of network metrics, e.g. latency between nodes in the cluster, via purposely-built external measurement services deployed in the cluster. Compared to other approaches the proposed one: (i) collects performance metrics at the application layer instead of network layer; (ii) relies on latency measurements performed inside the service of interest instead of utilizing external measurement services; (iii) takes scheduling decisions based on effective end-user perceived latency instead of considering the latency between cluster nodes.We show the effectiveness of our approach by adopting an iterative discovery strategy able to dynamically determine which node operates with the lowest latency for the Kubernetes pod placement.
网络和计算基础设施现在面临着挑战,以满足新应用日益严格的要求。最关键的方面之一是优化访问服务的最终用户感知到的延迟。新的网络架构为微服务的高效编排提供了一个自然的框架。然而,如何将准确的延迟度量合并到编排决策中仍然是一个开放的挑战。在这项工作中,我们提出了一种在Kubernetes环境中执行调度操作的新架构方法。现有的方法是通过部署在集群中的专门构建的外部测量服务来收集网络指标,例如集群中节点之间的延迟。与其他方法相比,本文提出的方法:(1)在应用层而不是网络层收集性能指标;(ii)依赖于相关服务内部执行的延迟测量,而不是利用外部测量服务;(iii)基于有效的终端用户感知延迟而不是考虑集群节点之间的延迟做出调度决策。我们通过采用迭代发现策略来展示我们方法的有效性,该策略能够动态地确定Kubernetes pod放置的哪个节点以最低的延迟运行。
{"title":"Latency-Aware Kubernetes Scheduling for Microservices Orchestration at the Edge","authors":"C. Centofanti, Walter Tiberti, A. Marotta, F. Graziosi, D. Cassioli","doi":"10.1109/NetSoft57336.2023.10175431","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175431","url":null,"abstract":"Network and computing infrastructures are nowadays challenged to meet the increasingly stringent requirements of novel applications. One of the most critical aspect is optimizing the latency perceived by the end-user accessing the services. New network architectures offer a natural framework for the efficient orchestration of microservices. However, how to incorporate accurate latency metrics into orchestration decisions still represents an open challenge.In this work we propose a novel architectural approach to perform scheduling operations in Kubernetes environment. Existing approaches proposed the collection of network metrics, e.g. latency between nodes in the cluster, via purposely-built external measurement services deployed in the cluster. Compared to other approaches the proposed one: (i) collects performance metrics at the application layer instead of network layer; (ii) relies on latency measurements performed inside the service of interest instead of utilizing external measurement services; (iii) takes scheduling decisions based on effective end-user perceived latency instead of considering the latency between cluster nodes.We show the effectiveness of our approach by adopting an iterative discovery strategy able to dynamically determine which node operates with the lowest latency for the Kubernetes pod placement.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114568794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automating the configuration of firewalls and channel protection systems in virtual networks 在虚拟网络中自动配置防火墙和通道保护系统
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175466
Daniele Bringhenti, R. Sisto, Fulvio Valenza
Network virtualization has revolutionized the traditional approaches for security configuration. If in the past error-prone and unoptimized manual operations were performed by human beings, nowadays automated methodologies are employed for establishing the configuration of virtual security functions that can enforce the requested security properties. However, these techniques can only perform the automatic configuration of a single function type at a time. This restriction may be excessively limiting, because the configuration of some functions may directly impact others, and they cannot be configured in sequence. In light of these considerations, the paper investigates the stated problem for the two most commonly used security functions, packet filtering firewalls and channel protection systems. It also proposes a preliminary approach to automatically perform their joint intent-based configuration, by defining the problem through a Maximum Satisfiability Modulo Theories formulation.
网络虚拟化彻底改变了传统的安全配置方法。如果在过去容易出错和未优化的手动操作是由人工执行的,那么现在使用自动化方法来建立可以强制执行所请求的安全属性的虚拟安全功能的配置。然而,这些技术一次只能执行单个函数类型的自动配置。这个限制可能是过度的限制,因为一些功能的配置可能直接影响其他功能,并且它们不能按顺序配置。鉴于这些考虑,本文研究了两种最常用的安全功能,包过滤防火墙和通道保护系统的陈述问题。通过最大可满足模数理论公式定义问题,提出了一种自动执行基于意图的联合配置的初步方法。
{"title":"Automating the configuration of firewalls and channel protection systems in virtual networks","authors":"Daniele Bringhenti, R. Sisto, Fulvio Valenza","doi":"10.1109/NetSoft57336.2023.10175466","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175466","url":null,"abstract":"Network virtualization has revolutionized the traditional approaches for security configuration. If in the past error-prone and unoptimized manual operations were performed by human beings, nowadays automated methodologies are employed for establishing the configuration of virtual security functions that can enforce the requested security properties. However, these techniques can only perform the automatic configuration of a single function type at a time. This restriction may be excessively limiting, because the configuration of some functions may directly impact others, and they cannot be configured in sequence. In light of these considerations, the paper investigates the stated problem for the two most commonly used security functions, packet filtering firewalls and channel protection systems. It also proposes a preliminary approach to automatically perform their joint intent-based configuration, by defining the problem through a Maximum Satisfiability Modulo Theories formulation.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115546831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
X-IO: A High-performance Unified I/O Interface using Lock-free Shared Memory Processing X-IO:使用无锁共享内存处理的高性能统一I/O接口
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175428
Shixiong Qi, Han-Sing Tsai, Yu-Sheng Liu, K. Ramakrishnan, Jyh-cheng Chen
Cloud-native microservice applications use different communication paradigms to network microservices, including both synchronous and asynchronous I/O for exchanging data. Existing solutions depend on kernel-based networking, incurring significant overheads. The interdependence between microservices for these applications involves considerable communication, including contention between multiple concurrent flows or user sessions. In this paper, we design X-IO, a high-performance unified I/O interface that is built on top of shared memory processing with lock-free producer/consumer rings, eliminating kernel networking overheads and contention. X-IO offers a feature-rich interface. X-IO’s zero-copy interface supports building provides truly zero-copy data transfers between microservices, achieving high performance. X-IO also provides a POSIX-like socket interface using HTTP/REST API to achieve seamless porting of microservices to X-IO, without any change to the application code. X-IO supports concurrent connections for microservices that require distinct user sessions operating in parallel. Our preliminary experimental results show that X-IO’s zero-copy interfaces achieve 2.8x-4.1x performance improvement compared to kernel-based interfaces. Its socket interfaces outperform kernel TCP sockets and achieve performance close to UNIX-domain sockets. The HTTP/REST APIs in X-IO perform 1.4 x-2.3 x better than kernel-based alternatives with concurrent connections.
云原生微服务应用程序使用不同的通信范式来连接微服务,包括用于交换数据的同步和异步I/O。现有的解决方案依赖于基于内核的网络,产生了大量的开销。这些应用程序的微服务之间的相互依赖涉及大量通信,包括多个并发流或用户会话之间的争用。在本文中,我们设计了X-IO,一个高性能的统一I/O接口,它建立在无锁的生产者/消费者环的共享内存处理之上,消除了内核网络开销和争用。X-IO提供了一个功能丰富的界面。X-IO的零复制接口支持构建,在微服务之间提供真正的零复制数据传输,实现高性能。X-IO还提供了一个使用HTTP/REST API的类似posix的套接字接口,以实现微服务到X-IO的无缝移植,而无需更改应用程序代码。X-IO支持微服务的并发连接,这些微服务需要不同的用户会话并行运行。我们的初步实验结果表明,与基于内核的接口相比,X-IO的零复制接口的性能提高了2.8 -4.1倍。它的套接字接口性能优于内核TCP套接字,性能接近unix域套接字。x- io中的HTTP/REST api在并发连接方面的性能比基于内核的替代方案好1.4 -2.3倍。
{"title":"X-IO: A High-performance Unified I/O Interface using Lock-free Shared Memory Processing","authors":"Shixiong Qi, Han-Sing Tsai, Yu-Sheng Liu, K. Ramakrishnan, Jyh-cheng Chen","doi":"10.1109/NetSoft57336.2023.10175428","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175428","url":null,"abstract":"Cloud-native microservice applications use different communication paradigms to network microservices, including both synchronous and asynchronous I/O for exchanging data. Existing solutions depend on kernel-based networking, incurring significant overheads. The interdependence between microservices for these applications involves considerable communication, including contention between multiple concurrent flows or user sessions. In this paper, we design X-IO, a high-performance unified I/O interface that is built on top of shared memory processing with lock-free producer/consumer rings, eliminating kernel networking overheads and contention. X-IO offers a feature-rich interface. X-IO’s zero-copy interface supports building provides truly zero-copy data transfers between microservices, achieving high performance. X-IO also provides a POSIX-like socket interface using HTTP/REST API to achieve seamless porting of microservices to X-IO, without any change to the application code. X-IO supports concurrent connections for microservices that require distinct user sessions operating in parallel. Our preliminary experimental results show that X-IO’s zero-copy interfaces achieve 2.8x-4.1x performance improvement compared to kernel-based interfaces. Its socket interfaces outperform kernel TCP sockets and achieve performance close to UNIX-domain sockets. The HTTP/REST APIs in X-IO perform 1.4 x-2.3 x better than kernel-based alternatives with concurrent connections.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115812669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NetSoft PhD Symposium NetSoft博士研讨会
Pub Date : 2023-06-19 DOI: 10.1109/netsoft57336.2023.10175445
{"title":"NetSoft PhD Symposium","authors":"","doi":"10.1109/netsoft57336.2023.10175445","DOIUrl":"https://doi.org/10.1109/netsoft57336.2023.10175445","url":null,"abstract":"","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122457464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Retraining of AI/ML Model for Beyond 5G Networks: A Predictive Approach 超5G网络AI/ML模型的自适应再训练:一种预测方法
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175451
Venkateswarlu Gudepu, Venkatarami Reddy Chintapalli, P. Castoldi, L. Valcarenghi, T. B. Reddy, K. Kondepu
Beyond fifth-generation (B5G) networks (namely 6G) aim to support high data rates, low-latency applications, and massive machine communications. Integrating Artificial Intelligence (AI) and Machine Learning (ML) models are essential for addressing the network’s increasing complexity and dynamic nature. However, dynamic service demands of B5G cause the AI/ML models performance degradation, resulting in violations of Service Level Agreements (SLA), over-or under-provisioning of resources, etc. To address the performance degradation of the AI/ML models, retraining is essential. Existing threshold and periodic retraining approaches have potential disadvantages such as SLA violations and inefficient resource utilization for setting a threshold parameter in a dynamic environment. This paper presents a novel algorithm that predicts when to retrain AI/ML models using an unsupervised classifier. The proposed predictive approach is evaluated for a Quality of Service (QoS) prediction use case on the Open RAN Software Community (OSC) platform and compared to the threshold approach. The results show that the proposed predictive approach outperforms the threshold approach.
超过第五代(B5G)网络(即6G)旨在支持高数据速率,低延迟应用程序和大规模机器通信。集成人工智能(AI)和机器学习(ML)模型对于解决网络日益增加的复杂性和动态性至关重要。然而,B5G的动态业务需求会导致AI/ML模型性能下降,从而导致违反服务水平协议(SLA)、资源供应过剩或不足等问题。为了解决AI/ML模型的性能下降问题,再训练是必不可少的。现有的阈值和定期再训练方法存在潜在的缺点,例如违反SLA以及在动态环境中设置阈值参数时资源利用率低下。本文提出了一种使用无监督分类器预测何时重新训练AI/ML模型的新算法。在开放RAN软件社区(OSC)平台上对所提出的预测方法进行了服务质量(QoS)预测用例的评估,并与阈值方法进行了比较。结果表明,所提出的预测方法优于阈值方法。
{"title":"Adaptive Retraining of AI/ML Model for Beyond 5G Networks: A Predictive Approach","authors":"Venkateswarlu Gudepu, Venkatarami Reddy Chintapalli, P. Castoldi, L. Valcarenghi, T. B. Reddy, K. Kondepu","doi":"10.1109/NetSoft57336.2023.10175451","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175451","url":null,"abstract":"Beyond fifth-generation (B5G) networks (namely 6G) aim to support high data rates, low-latency applications, and massive machine communications. Integrating Artificial Intelligence (AI) and Machine Learning (ML) models are essential for addressing the network’s increasing complexity and dynamic nature. However, dynamic service demands of B5G cause the AI/ML models performance degradation, resulting in violations of Service Level Agreements (SLA), over-or under-provisioning of resources, etc. To address the performance degradation of the AI/ML models, retraining is essential. Existing threshold and periodic retraining approaches have potential disadvantages such as SLA violations and inefficient resource utilization for setting a threshold parameter in a dynamic environment. This paper presents a novel algorithm that predicts when to retrain AI/ML models using an unsupervised classifier. The proposed predictive approach is evaluated for a Quality of Service (QoS) prediction use case on the Open RAN Software Community (OSC) platform and compared to the threshold approach. The results show that the proposed predictive approach outperforms the threshold approach.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122831396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phish Me If You Can – Lexicographic Analysis and Machine Learning for Phishing Websites Detection with PHISHWEB Phish Me如果你可以-词典分析和机器学习的网络钓鱼网站检测与PHISHWEB
Pub Date : 2023-06-19 DOI: 10.1109/netsoft57336.2023.10175503
Lucas Torrealba Aravena, P. Casas, Javier Bustos-Jiménez, Germán Capdehourat, M. Findrik
We introduce PHISHWEB, a novel approach to website phishing detection, which detects and categorizes malicious websites through a progressive, multi-layered analysis. PHISHWEB’s detection includes forged domains such as homoglyph and typosquatting, as well as automatically generated domains through DGA technology. The focus of PHISHWEB is on lexicographic-based analysis of the domain name itself, improving applicability and scalability of the approach. Preliminary results on the application of PHISHWEB to multiple open domain-name datasets show precision and recall results above 90%. We additionally extend PHISHWEB’s detection of DGA domains through Machine Learning (ML), using a small set of highly specialized lexicographic domain features. Results on the detection of DGA domains show that, for a false alarm rate below 1%, the ML-extension of PHISHWEB improves non-ML PHISHWEB DGA detector as well as state-of-the-art by at least 60%, realizing precision and recall values of 93.1% and 84.8%, respectively. Finally, we also present preliminary results on the application of PHISHWEB to real, in the wild DNS requests collected at large mobile and fixed-line operational networks, discussing some of the findings.
我们介绍了PHISHWEB,一种新的网站网络钓鱼检测方法,它通过渐进的多层分析来检测和分类恶意网站。PHISHWEB的检测包括伪造域,如同音异义和打字,以及通过DGA技术自动生成的域。PHISHWEB的重点是对域名本身进行基于词典编纂的分析,提高该方法的适用性和可扩展性。将PHISHWEB应用于多个开放域名数据集的初步结果表明,准确率和查全率均在90%以上。我们还通过机器学习(ML)扩展了PHISHWEB对DGA域的检测,使用了一小组高度专业化的词典学域特征。DGA域的检测结果表明,在虚警率低于1%的情况下,PHISHWEB的ml扩展将非ml PHISHWEB DGA检测器和最先进的DGA检测器提高了至少60%,准确率和召回率分别达到93.1%和84.8%。最后,我们还介绍了PHISHWEB在实际应用中的初步结果,在大型移动和固定线路运营网络中收集的野生DNS请求中,讨论了一些发现。
{"title":"Phish Me If You Can – Lexicographic Analysis and Machine Learning for Phishing Websites Detection with PHISHWEB","authors":"Lucas Torrealba Aravena, P. Casas, Javier Bustos-Jiménez, Germán Capdehourat, M. Findrik","doi":"10.1109/netsoft57336.2023.10175503","DOIUrl":"https://doi.org/10.1109/netsoft57336.2023.10175503","url":null,"abstract":"We introduce PHISHWEB, a novel approach to website phishing detection, which detects and categorizes malicious websites through a progressive, multi-layered analysis. PHISHWEB’s detection includes forged domains such as homoglyph and typosquatting, as well as automatically generated domains through DGA technology. The focus of PHISHWEB is on lexicographic-based analysis of the domain name itself, improving applicability and scalability of the approach. Preliminary results on the application of PHISHWEB to multiple open domain-name datasets show precision and recall results above 90%. We additionally extend PHISHWEB’s detection of DGA domains through Machine Learning (ML), using a small set of highly specialized lexicographic domain features. Results on the detection of DGA domains show that, for a false alarm rate below 1%, the ML-extension of PHISHWEB improves non-ML PHISHWEB DGA detector as well as state-of-the-art by at least 60%, realizing precision and recall values of 93.1% and 84.8%, respectively. Finally, we also present preliminary results on the application of PHISHWEB to real, in the wild DNS requests collected at large mobile and fixed-line operational networks, discussing some of the findings.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122092463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach 量化云基础设施中的安全风险:数据驱动的方法
Pub Date : 2023-06-19 DOI: 10.1109/NetSoft57336.2023.10175501
Sousan Tarahomi, Ralph Holz, A. Sperotto
Businesses increasingly outsource their ICT services to cloud environments, mostly driven by considerations about costs, processes and security. However concerns around cloud exposure against cyber-security attacks are also growing. This bring about the question if the cloud really makes us more secure, or if it merely changes the type of threats we are exposed to. This PhD project aims at addressing this question by focusing on cloud infrastructure security. Using Internet measurements, we will take a data-driven approach to identify vulnerabilities and single points of failure in cloud infrastructure. Based on our analysis, we will propose solutions to mitigate these vulnerabilities and enhance the overall security of cloud environments.
越来越多的企业将其ICT服务外包给云环境,主要是出于对成本、流程和安全性的考虑。然而,人们对云暴露以抵御网络安全攻击的担忧也在增加。这就带来了一个问题,云计算是否真的让我们更安全,或者它是否只是改变了我们面临的威胁类型。这个博士项目旨在通过关注云基础设施安全来解决这个问题。使用互联网测量,我们将采用数据驱动的方法来识别云基础设施中的漏洞和单点故障。根据我们的分析,我们将提出解决方案来缓解这些漏洞,并增强云环境的整体安全性。
{"title":"Quantifying Security Risks in Cloud Infrastructures: A Data-driven Approach","authors":"Sousan Tarahomi, Ralph Holz, A. Sperotto","doi":"10.1109/NetSoft57336.2023.10175501","DOIUrl":"https://doi.org/10.1109/NetSoft57336.2023.10175501","url":null,"abstract":"Businesses increasingly outsource their ICT services to cloud environments, mostly driven by considerations about costs, processes and security. However concerns around cloud exposure against cyber-security attacks are also growing. This bring about the question if the cloud really makes us more secure, or if it merely changes the type of threats we are exposed to. This PhD project aims at addressing this question by focusing on cloud infrastructure security. Using Internet measurements, we will take a data-driven approach to identify vulnerabilities and single points of failure in cloud infrastructure. Based on our analysis, we will propose solutions to mitigate these vulnerabilities and enhance the overall security of cloud environments.","PeriodicalId":223208,"journal":{"name":"2023 IEEE 9th International Conference on Network Softwarization (NetSoft)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 IEEE 9th International Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1