首页 > 最新文献

2022 18th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
ΔQ Generative Models: Modeling Time-Variation in Network Quality ΔQ生成模型:网络质量时变建模
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965128
Bjørn Ivar Teigen, N. Davies, P. Thompson, K. Ellefsen, T. Skeie, J. Tørresen
This work introduces a class of network performance models designed to capture variations in network quality on diverse timescales. By explicitly modeling how quality changes over time, the proposed models enable computation of performance metrics that are beyond the scope of steady-state methods such as Markov chains. We use the quality attenuation (ΔQ) metric to quantify network quality, and ΔQ generative models specify how quality attenuation varies over time. Variation over time is modeled using a finite state machine with timed state transitions. We show how the models can be used to shed light on practical problems by presenting novel results for the problem of buffer sizing. In addition to the buffer sizing results, this work presents the ΔQ generative model structure and the basic algorithms needed to work with the models.
这项工作介绍了一类网络性能模型,旨在捕捉不同时间尺度上网络质量的变化。通过显式地建模质量如何随时间变化,所提出的模型可以计算超出稳态方法(如马尔可夫链)范围的性能指标。我们使用质量衰减(ΔQ)度量来量化网络质量,ΔQ生成模型指定质量衰减如何随时间变化。使用具有定时状态转换的有限状态机对随时间的变化进行建模。我们展示了如何使用这些模型来阐明实际问题,通过提出缓冲区大小问题的新结果。除了缓冲区大小结果之外,本工作还介绍了ΔQ生成模型结构和使用模型所需的基本算法。
{"title":"ΔQ Generative Models: Modeling Time-Variation in Network Quality","authors":"Bjørn Ivar Teigen, N. Davies, P. Thompson, K. Ellefsen, T. Skeie, J. Tørresen","doi":"10.23919/CNSM55787.2022.9965128","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965128","url":null,"abstract":"This work introduces a class of network performance models designed to capture variations in network quality on diverse timescales. By explicitly modeling how quality changes over time, the proposed models enable computation of performance metrics that are beyond the scope of steady-state methods such as Markov chains. We use the quality attenuation (ΔQ) metric to quantify network quality, and ΔQ generative models specify how quality attenuation varies over time. Variation over time is modeled using a finite state machine with timed state transitions. We show how the models can be used to shed light on practical problems by presenting novel results for the problem of buffer sizing. In addition to the buffer sizing results, this work presents the ΔQ generative model structure and the basic algorithms needed to work with the models.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125004810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FED-UP: Federated Deep Reinforcement Learning-based UAV Path Planning against Hostile Defense System 基于联邦深度强化学习的无人机路径规划对抗敌方防御系统
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964907
Alvi Ataur Khalil, M. Rahman
In military operations, unmanned aerial vehicles (UAVs) have been heavily utilized in recent years. However, due to the antenna installment regulation, UAVs cannot be controlled by human operators in a restricted area. Hence, artificial intelligence (AI)-driven UAVs are the practical solution to this out-of-coverage problem. With the increased use of autonomous UAVs in military applications, defense systems are deployed to target and shoot down the enemy UAVs in operation. Thus, UAVs are needed to be trained, not only to achieve goals but also to avoid static and dynamic hostile defense systems. In this work, we propose FED-UP, a federated deep reinforcement learning (DRL)-based UAV path planning framework, that enables UAVs to carry out missions in a hostile environment with a dynamic defense system. The federated learning (FL) based training accelerates the reinforcement learning process and improves model performance. We additionally introduce significant reply memory buffer (SRMB) to quicken the training process more, by selecting the crucial experiences during the training period. The experimental results validate the efficiency of the proposed model in controlling UAVs in dynamic, hostile environments.
在军事行动中,无人驾驶飞行器(uav)近年来得到了大量的应用。然而,由于天线安装规则的限制,无人机无法在限定区域内由人工操作。因此,人工智能(AI)驱动的无人机是解决这一覆盖范围外问题的实际解决方案。随着自主无人机在军事应用中的使用越来越多,防御系统被部署来瞄准和击落作战中的敌方无人机。因此,需要对无人机进行训练,不仅要实现目标,还要避开静态和动态的敌方防御系统。在这项工作中,我们提出了一个基于联邦深度强化学习(DRL)的无人机路径规划框架FED-UP,该框架使无人机能够在具有动态防御系统的敌对环境中执行任务。基于联邦学习(FL)的训练加速了强化学习过程,提高了模型性能。此外,我们还引入了显著回复记忆缓冲(smrmb),通过选择培训期间的关键经验来加快培训过程。实验结果验证了该模型在动态敌对环境下控制无人机的有效性。
{"title":"FED-UP: Federated Deep Reinforcement Learning-based UAV Path Planning against Hostile Defense System","authors":"Alvi Ataur Khalil, M. Rahman","doi":"10.23919/CNSM55787.2022.9964907","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964907","url":null,"abstract":"In military operations, unmanned aerial vehicles (UAVs) have been heavily utilized in recent years. However, due to the antenna installment regulation, UAVs cannot be controlled by human operators in a restricted area. Hence, artificial intelligence (AI)-driven UAVs are the practical solution to this out-of-coverage problem. With the increased use of autonomous UAVs in military applications, defense systems are deployed to target and shoot down the enemy UAVs in operation. Thus, UAVs are needed to be trained, not only to achieve goals but also to avoid static and dynamic hostile defense systems. In this work, we propose FED-UP, a federated deep reinforcement learning (DRL)-based UAV path planning framework, that enables UAVs to carry out missions in a hostile environment with a dynamic defense system. The federated learning (FL) based training accelerates the reinforcement learning process and improves model performance. We additionally introduce significant reply memory buffer (SRMB) to quicken the training process more, by selecting the crucial experiences during the training period. The experimental results validate the efficiency of the proposed model in controlling UAVs in dynamic, hostile environments.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126022274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Flow-level Tail Latency Estimation and Verification based on Extreme Value Theory 基于极值理论的流级尾延迟估计与验证
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964525
Max Helm, Florian Wiedner, G. Carle
Modeling extreme latencies in communication net-works can contribute information to network planning and flow admission under service level agreements. Extreme Value Theory is such an approach that utilizes real-world measurement data. It is often applied without verifying the resulting model predictions on larger datasets. Here we show that such models can provide accurate predictions over larger datasets while being applied to 100 random network topologies and configurations. We found that applying derived models with a bounded tail to a twentyfold time period results in a prediction accuracy of 75% for extreme latency exceedances. Furthermore, we show that tail latency quantiles can be predicted on a flow level with median absolute percentage errors ranging from 0.7% to 16.8%. Therefore, we consider this approach to be useful for dimensioning networks under latency-constrained service level agreements.
对通信网络中的极端延迟进行建模,可以为服务水平协议下的网络规划和流量准入提供信息。极值理论就是这样一种利用真实世界测量数据的方法。它通常没有在更大的数据集上验证模型预测结果。在这里,我们展示了这样的模型可以在更大的数据集上提供准确的预测,同时应用于100个随机网络拓扑和配置。我们发现,将有界尾的衍生模型应用于20倍的时间段,对于极端延迟超出的预测精度为75%。此外,我们表明,尾部延迟分位数可以在流量水平上预测,中位数绝对百分比误差范围为0.7%至16.8%。因此,我们认为这种方法对于延迟受限的服务水平协议下的网络维化是有用的。
{"title":"Flow-level Tail Latency Estimation and Verification based on Extreme Value Theory","authors":"Max Helm, Florian Wiedner, G. Carle","doi":"10.23919/CNSM55787.2022.9964525","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964525","url":null,"abstract":"Modeling extreme latencies in communication net-works can contribute information to network planning and flow admission under service level agreements. Extreme Value Theory is such an approach that utilizes real-world measurement data. It is often applied without verifying the resulting model predictions on larger datasets. Here we show that such models can provide accurate predictions over larger datasets while being applied to 100 random network topologies and configurations. We found that applying derived models with a bounded tail to a twentyfold time period results in a prediction accuracy of 75% for extreme latency exceedances. Furthermore, we show that tail latency quantiles can be predicted on a flow level with median absolute percentage errors ranging from 0.7% to 16.8%. Therefore, we consider this approach to be useful for dimensioning networks under latency-constrained service level agreements.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131915370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning to Caching Under the Partial-feedback Regime 在部分反馈机制下学习缓存
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964551
Qingsong Liu, Yaoyu Zhang
We consider the caching problem in an online learning perspective, i.e., no model assumptions and prior knowledge for the file request sequence. Our goal is to design an efficient on-line caching policy with minimal regret, i.e, minimizing the total number of cache-miss with respect to the best static configuration in hindsight. Previous studies such as Follow-The-Perturbed-Leader (FTPL) caching policy, have provided some near-optimal results, but their theoretical performance guarantees only valid for the regime wherein all arrival requests could be seen by the cache, which is not the case in some practical scenarios like caching at cellular base station, content dissemination via DNS, etc. Hence our work study the partial-feedback regime wherein only requests for currently cached files are seen by the cache, which is more challenging and has not been studied before in the online learning perspective. We propose an online caching policy combining the FTPL with a novel popularity estimation procedure called Geometric Resampling (GR), and show that it yields the first sublinear regret guarantee in this regime. We also conduct numerical experiments to validate the theoretical guarantees of our caching policy.
我们从在线学习的角度考虑缓存问题,即没有模型假设和文件请求序列的先验知识。我们的目标是设计一个具有最小遗憾的高效在线缓存策略,也就是说,在事后的最佳静态配置中最小化cache-miss的总数。之前的一些研究,如跟随受扰领导者(FTPL)缓存策略,已经提供了一些接近最优的结果,但它们的理论性能保证只适用于所有到达请求都能被缓存看到的机制,而在一些实际场景中,如蜂窝基站缓存、通过DNS传播内容等,情况并非如此。因此,我们的工作研究了部分反馈机制,其中只有对当前缓存文件的请求才会被缓存看到,这更具挑战性,并且在在线学习的角度之前没有被研究过。我们提出了一种将FTPL与一种称为几何重采样(GR)的新颖流行度估计过程相结合的在线缓存策略,并表明它在该机制中产生了第一个次线性后悔保证。我们还进行了数值实验来验证我们的缓存策略的理论保证。
{"title":"Learning to Caching Under the Partial-feedback Regime","authors":"Qingsong Liu, Yaoyu Zhang","doi":"10.23919/CNSM55787.2022.9964551","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964551","url":null,"abstract":"We consider the caching problem in an online learning perspective, i.e., no model assumptions and prior knowledge for the file request sequence. Our goal is to design an efficient on-line caching policy with minimal regret, i.e, minimizing the total number of cache-miss with respect to the best static configuration in hindsight. Previous studies such as Follow-The-Perturbed-Leader (FTPL) caching policy, have provided some near-optimal results, but their theoretical performance guarantees only valid for the regime wherein all arrival requests could be seen by the cache, which is not the case in some practical scenarios like caching at cellular base station, content dissemination via DNS, etc. Hence our work study the partial-feedback regime wherein only requests for currently cached files are seen by the cache, which is more challenging and has not been studied before in the online learning perspective. We propose an online caching policy combining the FTPL with a novel popularity estimation procedure called Geometric Resampling (GR), and show that it yields the first sublinear regret guarantee in this regime. We also conduct numerical experiments to validate the theoretical guarantees of our caching policy.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124586208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PerfTrace: A New Multi-metric Network Performance Monitoring Tool PerfTrace:一种新的多度量网络性能监控工具
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964543
Yaozhong Liu, Long Pan, Chenglong Li, Lin He, Yirui Luo, Guanglei Song, Jiahai Yang, Zhiliang Wang
We present PerfTrace, an end-to-end tool for efficient, real-time, and multi-metric network performance monitoring. PerfTrace provides a high integration of different existing measurement functions, supporting the measurement of essential metrics such as latency, jitter, packet loss, and available bandwidth. More importantly, innovative schemes and algorithms are proposed to address the weaknesses of existing tools.After conducting comprehensive evaluations, we find that (i) PerfTrace measures one-way and two-way latency, jitter, and packet loss ∼9.4× faster and ∼3.6× more data-efficiently; (ii) PerfTrace measures available bandwidth in our testbed with minimal mean relative error (5.22%), outperforming all the tools compared (ranging from 8.17% to 37.24%). Meanwhile, PerfTrace consumes a more constant percentage of bandwidth resources than other tools when monitoring available bandwidth. PerfTrace’s data overhead is always only about 1/600 of the total bandwidth for a measurement frequency once per minute.
我们介绍PerfTrace,一个端到端工具,用于高效、实时和多度量的网络性能监控。PerfTrace提供了不同现有测量功能的高度集成,支持测量基本指标,如延迟,抖动,丢包和可用带宽。更重要的是,提出了创新的方案和算法来解决现有工具的弱点。在进行综合评估后,我们发现(i) PerfTrace测量单向和双向延迟、抖动和数据包丢失速度快~ 9.4倍,数据效率高~ 3.6倍;(ii) PerfTrace以最小的平均相对误差(5.22%)测量我们测试平台中的可用带宽,优于所有比较的工具(范围从8.17%到37.24%)。同时,在监控可用带宽时,PerfTrace占用的带宽资源百分比比其他工具更稳定。对于每分钟一次的测量频率,PerfTrace的数据开销始终仅为总带宽的1/600左右。
{"title":"PerfTrace: A New Multi-metric Network Performance Monitoring Tool","authors":"Yaozhong Liu, Long Pan, Chenglong Li, Lin He, Yirui Luo, Guanglei Song, Jiahai Yang, Zhiliang Wang","doi":"10.23919/CNSM55787.2022.9964543","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964543","url":null,"abstract":"We present PerfTrace, an end-to-end tool for efficient, real-time, and multi-metric network performance monitoring. PerfTrace provides a high integration of different existing measurement functions, supporting the measurement of essential metrics such as latency, jitter, packet loss, and available bandwidth. More importantly, innovative schemes and algorithms are proposed to address the weaknesses of existing tools.After conducting comprehensive evaluations, we find that (i) PerfTrace measures one-way and two-way latency, jitter, and packet loss ∼9.4× faster and ∼3.6× more data-efficiently; (ii) PerfTrace measures available bandwidth in our testbed with minimal mean relative error (5.22%), outperforming all the tools compared (ranging from 8.17% to 37.24%). Meanwhile, PerfTrace consumes a more constant percentage of bandwidth resources than other tools when monitoring available bandwidth. PerfTrace’s data overhead is always only about 1/600 of the total bandwidth for a measurement frequency once per minute.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122108611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CADLAD: Device-aware Bitrate Ladder Construction for HTTP Adaptive Streaming 用于HTTP自适应流的设备感知比特率阶梯结构
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964669
Minh Nguyen, Babak Taraghi, A. Bentaleb, Roger Zimmermann, C. Timmerer
In this paper, we introduce a CMCD-Aware per-Device bitrate LADder construction (CADLAD) that leverages the Common Media Client Data (CMCD) standard to address the above issues. CADLAD comprises components at both client and server sides. The client calculates the top bitrate (tb) — a CMCD parameter to indicate the highest bitrate that can be rendered at the client — and sends it to the server together with its device type and screen resolution. The server decides on a suitable bitrate ladder, whose maximum bitrate and resolution are based on CMCD parameters, to the client device with the purpose of providing maximum QoE while minimizing delivered data. CADLAD has two versions to work in Video on Demand (VoD) and live streaming scenarios. Our CADLAD is client agnostic; hence, it can work with any players and ABR algorithms at the client. The experimental results show that CADLAD is able to increase the QoE by 2.6x while saving 71% of delivered data, compared to an existing bitrate ladder of an available video dataset. We implement our idea within CAdViSE — an open-source testbed for reproducibility.
在本文中,我们介绍了一个CMCD感知的每设备比特率阶梯结构(CADLAD),它利用公共媒体客户端数据(CMCD)标准来解决上述问题。CADLAD包括客户端和服务器端的组件。客户端计算最高比特率(tb)——一个CMCD参数,用于指示客户端可以呈现的最高比特率——并将其与设备类型和屏幕分辨率一起发送给服务器。服务器决定一个合适的比特率阶梯,其最大比特率和分辨率是基于CMCD参数的,目的是提供最大的QoE,同时最小化交付的数据。CADLAD有两个版本,可用于视频点播(VoD)和直播场景。我们的CADLAD是客户不可知的;因此,它可以在客户端与任何播放器和ABR算法一起工作。实验结果表明,与现有的可用视频数据集的比特率阶梯相比,CADLAD能够将QoE提高2.6倍,同时节省71%的传输数据。我们在CAdViSE中实现了我们的想法——一个可重复性的开源测试平台。
{"title":"CADLAD: Device-aware Bitrate Ladder Construction for HTTP Adaptive Streaming","authors":"Minh Nguyen, Babak Taraghi, A. Bentaleb, Roger Zimmermann, C. Timmerer","doi":"10.23919/CNSM55787.2022.9964669","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964669","url":null,"abstract":"In this paper, we introduce a CMCD-Aware per-Device bitrate LADder construction (CADLAD) that leverages the Common Media Client Data (CMCD) standard to address the above issues. CADLAD comprises components at both client and server sides. The client calculates the top bitrate (tb) — a CMCD parameter to indicate the highest bitrate that can be rendered at the client — and sends it to the server together with its device type and screen resolution. The server decides on a suitable bitrate ladder, whose maximum bitrate and resolution are based on CMCD parameters, to the client device with the purpose of providing maximum QoE while minimizing delivered data. CADLAD has two versions to work in Video on Demand (VoD) and live streaming scenarios. Our CADLAD is client agnostic; hence, it can work with any players and ABR algorithms at the client. The experimental results show that CADLAD is able to increase the QoE by 2.6x while saving 71% of delivered data, compared to an existing bitrate ladder of an available video dataset. We implement our idea within CAdViSE — an open-source testbed for reproducibility.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123993350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Accelerating Causal Inference Based RCA Using Prior Knowledge From Functional Connectivity Inference 利用功能连接推理的先验知识加速基于因果推理的RCA
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964900
Giles Winchester, G. Parisis, Robert Harper, L. Berthouze
A crucial step in remedying faults within network infrastructures is to determine their root cause. However, the large-scale, complex and dynamic nature of modern networks makes causal inference-based root cause analysis (RCA) challenging in terms of scalability and knowledge drift over time. In this paper, we propose a framework that utilises the neuroscientific concept of functional connectivity – a graph representation of statistical dependencies between events – as a scalable approach to acquire and maintain prior knowledge for causal inference-based RCA approaches in dynamic networks. We demonstrate on both synthetic and real world data that our proposed approach can provide significant speedups to existing causal inference approaches without significant loss of accuracy. Finally, we discuss the impact of the choice of user-defined parameters on causal inference accuracy and conclude that the framework can safely be deployed in the real world.
修复网络基础设施中的故障的关键步骤是确定其根本原因。然而,现代网络的大规模、复杂和动态性使得基于因果推理的根本原因分析(RCA)在可扩展性和知识随时间漂移方面具有挑战性。在本文中,我们提出了一个框架,该框架利用功能连接的神经科学概念-事件之间统计依赖关系的图表示-作为一种可扩展的方法来获取和维护动态网络中基于因果推理的RCA方法的先验知识。我们在合成和真实世界的数据上证明,我们提出的方法可以在不显着损失准确性的情况下为现有的因果推理方法提供显着的加速。最后,我们讨论了用户定义参数的选择对因果推理精度的影响,并得出结论,该框架可以安全地部署在现实世界中。
{"title":"Accelerating Causal Inference Based RCA Using Prior Knowledge From Functional Connectivity Inference","authors":"Giles Winchester, G. Parisis, Robert Harper, L. Berthouze","doi":"10.23919/CNSM55787.2022.9964900","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964900","url":null,"abstract":"A crucial step in remedying faults within network infrastructures is to determine their root cause. However, the large-scale, complex and dynamic nature of modern networks makes causal inference-based root cause analysis (RCA) challenging in terms of scalability and knowledge drift over time. In this paper, we propose a framework that utilises the neuroscientific concept of functional connectivity – a graph representation of statistical dependencies between events – as a scalable approach to acquire and maintain prior knowledge for causal inference-based RCA approaches in dynamic networks. We demonstrate on both synthetic and real world data that our proposed approach can provide significant speedups to existing causal inference approaches without significant loss of accuracy. Finally, we discuss the impact of the choice of user-defined parameters on causal inference accuracy and conclude that the framework can safely be deployed in the real world.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128363087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Howdah: Load Profiling via In-Band Flow Classification and P4 Howdah:基于带内流分类和P4的负载分析
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964510
Antonino Angi, Alessio Sacco, Flavio Esposito, G. Marchetto, A. Clemm
The challenges of managing datacenter traffic increase with the complexity and variety of new Internet and Web applications. Efficient network management systems are often required to thwart delays and minimize failures. In this regard, it appears helpful to identify in advance the different classes of flows that (co)exist in the network, characterizing them into different types according to the different latency/bandwidth requirements. In this paper, we propose Howdah, a traffic identification and profiling mechanism that uses Machine Learning and a congestion-aware forwarding strategy to offer adaptation to different traffic classes with the support of programmable data-planes. With Howdah, sender and gateway elements inject in-band traffic information obtained using supervised learning. When a switch or a router receives a packet, it exploits such host-based traffic classification to adapt to a desirable traffic profile, for example, balancing the load. We compare our solutions against recent traffic engineering solutions and show the efficacy of cooperation between host traffic classification and P4-based switch forwarding policies, reducing packet transmission time in datacenter scenarios.
管理数据中心流量的挑战随着新的Internet和Web应用程序的复杂性和多样性而增加。通常需要高效的网络管理系统来阻止延迟和最小化故障。在这方面,提前识别网络中存在的不同类型的流似乎是有帮助的,根据不同的延迟/带宽要求将它们划分为不同的类型。在本文中,我们提出了Howdah,这是一种流量识别和分析机制,它使用机器学习和拥塞感知转发策略,在可编程数据平面的支持下提供对不同流量类别的适应。在Howdah中,发送方和网关元素注入通过监督学习获得的带内流量信息。当交换机或路由器接收到数据包时,它利用这种基于主机的流量分类来适应所需的流量配置文件,例如,平衡负载。我们将我们的解决方案与最近的流量工程解决方案进行了比较,并展示了主机流量分类与基于p4的交换机转发策略之间的协作效果,减少了数据中心场景下的数据包传输时间。
{"title":"Howdah: Load Profiling via In-Band Flow Classification and P4","authors":"Antonino Angi, Alessio Sacco, Flavio Esposito, G. Marchetto, A. Clemm","doi":"10.23919/CNSM55787.2022.9964510","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964510","url":null,"abstract":"The challenges of managing datacenter traffic increase with the complexity and variety of new Internet and Web applications. Efficient network management systems are often required to thwart delays and minimize failures. In this regard, it appears helpful to identify in advance the different classes of flows that (co)exist in the network, characterizing them into different types according to the different latency/bandwidth requirements. In this paper, we propose Howdah, a traffic identification and profiling mechanism that uses Machine Learning and a congestion-aware forwarding strategy to offer adaptation to different traffic classes with the support of programmable data-planes. With Howdah, sender and gateway elements inject in-band traffic information obtained using supervised learning. When a switch or a router receives a packet, it exploits such host-based traffic classification to adapt to a desirable traffic profile, for example, balancing the load. We compare our solutions against recent traffic engineering solutions and show the efficacy of cooperation between host traffic classification and P4-based switch forwarding policies, reducing packet transmission time in datacenter scenarios.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129116595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Traditional and GAN-based Approaches for the Synthesis of Wide Area Network Topologies 广域网拓扑综合的传统方法与基于gan的方法的比较
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964866
Katharina Dietz, Michael Seufert, T. Hossfeld
Wide Area Network (WAN) research benefits from the availability of realistic network topologies, e.g., as input to simulations, emulators, or testbeds. With the rise of Machine Learning (ML) and particularly Deep Learning (DL) methods, this demand for topologies, which can be used as training data, is greater than ever. However, public datasets are limited, thus, it is promising to generate synthetic graphs with realistic properties based on real topologies for the augmentation of existing data sets. As the generation of synthetic graphs has been in the focus of researchers of various applications fields since several decades, we have a variety of traditional model-dependent and model-independent graph generators at hand, as well as DL-based approaches, such as Generative Adversarial Networks (GANs). In this work, we adapt and evaluate these existing generators for the WAN use case, i.e., for generating synthetic WANs with realistic geographical distances between nodes. Moreover, we investigate a hierarchical graph synthesis approach, which divides the synthesis into local clusters. Finally, we compare the similarity of synthetic and real WAN topologies and discuss the suitability of the generators for data augmentation in the WAN use case.
广域网(WAN)研究得益于现实网络拓扑的可用性,例如,作为仿真、模拟器或试验台的输入。随着机器学习(ML),特别是深度学习(DL)方法的兴起,对可以用作训练数据的拓扑的需求比以往任何时候都要大。然而,公共数据集是有限的,因此,基于真实拓扑生成具有真实属性的合成图对于现有数据集的扩充是有希望的。几十年来,合成图的生成一直是各个应用领域研究人员关注的焦点,我们手头有各种传统的模型依赖和模型独立的图生成器,以及基于dl的方法,如生成对抗网络(GANs)。在这项工作中,我们针对广域网用例调整和评估了这些现有的生成器,即用于生成节点之间具有实际地理距离的合成广域网。此外,我们还研究了一种层次图合成方法,该方法将合成分为局部聚类。最后,我们比较了合成和真实广域网拓扑的相似性,并讨论了生成器在广域网用例中对数据增强的适用性。
{"title":"Comparing Traditional and GAN-based Approaches for the Synthesis of Wide Area Network Topologies","authors":"Katharina Dietz, Michael Seufert, T. Hossfeld","doi":"10.23919/CNSM55787.2022.9964866","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964866","url":null,"abstract":"Wide Area Network (WAN) research benefits from the availability of realistic network topologies, e.g., as input to simulations, emulators, or testbeds. With the rise of Machine Learning (ML) and particularly Deep Learning (DL) methods, this demand for topologies, which can be used as training data, is greater than ever. However, public datasets are limited, thus, it is promising to generate synthetic graphs with realistic properties based on real topologies for the augmentation of existing data sets. As the generation of synthetic graphs has been in the focus of researchers of various applications fields since several decades, we have a variety of traditional model-dependent and model-independent graph generators at hand, as well as DL-based approaches, such as Generative Adversarial Networks (GANs). In this work, we adapt and evaluate these existing generators for the WAN use case, i.e., for generating synthetic WANs with realistic geographical distances between nodes. Moreover, we investigate a hierarchical graph synthesis approach, which divides the synthesis into local clusters. Finally, we compare the similarity of synthetic and real WAN topologies and discuss the suitability of the generators for data augmentation in the WAN use case.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129282662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Online Framework for Adapting Security Policies in Dynamic IT Environments 动态IT环境中适应安全策略的在线框架
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964838
K. Hammar, R. Stadler
We present an online framework for learning and updating security policies in dynamic IT environments. It includes three components: a digital twin of the target system, which continuously collects data and evaluates learned policies; a system identification process, which periodically estimates system models based on the collected data; and a policy learning process that is based on reinforcement learning. To evaluate our framework, we apply it to an intrusion prevention use case that involves a dynamic IT infrastructure. Our results demonstrate that the framework automatically adapts security policies to changes in the IT infrastructure and that it outperforms a state-of-the-art method.
我们提出了一个在线框架,用于在动态IT环境中学习和更新安全策略。它包括三个组成部分:目标系统的数字孪生,它不断收集数据并评估学习策略;系统识别过程,根据收集到的数据定期估计系统模型;以及一个基于强化学习的策略学习过程。为了评估我们的框架,我们将其应用于一个涉及动态it基础设施的入侵防御用例。我们的结果表明,该框架可以自动调整安全策略以适应IT基础设施中的变化,并且优于最先进的方法。
{"title":"An Online Framework for Adapting Security Policies in Dynamic IT Environments","authors":"K. Hammar, R. Stadler","doi":"10.23919/CNSM55787.2022.9964838","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964838","url":null,"abstract":"We present an online framework for learning and updating security policies in dynamic IT environments. It includes three components: a digital twin of the target system, which continuously collects data and evaluates learned policies; a system identification process, which periodically estimates system models based on the collected data; and a policy learning process that is based on reinforcement learning. To evaluate our framework, we apply it to an intrusion prevention use case that involves a dynamic IT infrastructure. Our results demonstrate that the framework automatically adapts security policies to changes in the IT infrastructure and that it outperforms a state-of-the-art method.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126752238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2022 18th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1