首页 > 最新文献

2022 18th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
PTP Security Measures and their Impact on Synchronization Accuracy PTP安全措施及其对同步精度的影响
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964658
F. Rezabek, Max Helm, Tizian Leonhardt, G. Carle
The Precision Time Protocol (PTP) synchronizes clocks in a network with high precision. The protocol finds use in many areas, such as smart manufacturing, intra-vehicular networks, and critical infrastructure. It becomes clear that striving for security is an important goal. If an attacker succeeds in disturbing the network synchronization, the impact can result in a cascading set of failures. Unfortunately, neither the previous two IEEE standards for PTP, nor the popular implementation linuxptp, feature or implement sufficient security options.This work focuses on implementing the security extensions for PTP based on the latest PTP standard IEEE 1588-2019 to minimize the threat of attacks and their possible impact. We provide a detailed analysis on PTP synchronicity and security. Based on that, we design and implement software-only tooling to quantify the PTP performance using commercial off-the-shelf hardware and open-source solutions on a linear topology with four to nine hops.The measurements compare the End-to-End (E2E) and Peer-to-Peer (P2P) delay calculation modes and the usage of Transparent Clocks (TC) in parts of the network. Both E2E and P2P show visible degradation of clock synchronization with each hop and standard deviations of 118.6 to 571 ns. The TCs perform better, demonstrating a standard deviation between 90 to 140 ns on four to nine hops. We evaluate different logSyncInterval values corresponding to different PTP profiles and do not observe a major impact on the clock behavior caused by the extensions. The measurement precision of the system is within ±40 ns.Our evaluation of the newly implemented security extensions to linuxptp shows that the security extensions do not have a significant impact on the clock synchronization and our approach is a feasible addition to PTP. Besides, our contributions can aid network managers in assessing their PTP synchronicity systematically.
PTP (Precision Time Protocol)是指在网络中对时钟进行高精度同步的协议。该协议可用于许多领域,如智能制造、车载网络和关键基础设施。显然,争取安全是一个重要目标。如果攻击者成功扰乱了网络同步,则会导致一连串的故障。不幸的是,无论是前两个IEEE PTP标准,还是流行的linuxptp实现,都没有提供或实现足够的安全选项。本工作的重点是基于最新的PTP标准IEEE 1588-2019实现PTP的安全扩展,以最大限度地减少攻击的威胁及其可能的影响。详细分析了PTP的同步性和安全性。在此基础上,我们设计并实现了仅使用软件的工具来量化PTP性能,使用商业现成的硬件和开源解决方案,在4到9跳的线性拓扑上。这些测量比较了端到端(E2E)和点对点(P2P)延迟计算模式以及透明时钟(TC)在部分网络中的使用情况。端到端和P2P都表现出明显的时钟同步退化,每跳误差为118.6 ~ 571 ns。TCs性能更好,在4到9跳上的标准偏差在90到140 ns之间。我们评估了对应于不同PTP配置文件的不同logSyncInterval值,并且没有观察到扩展对时钟行为造成的重大影响。系统测量精度在±40ns以内。我们对新实现的linuxptp安全扩展的评估表明,安全扩展对时钟同步没有显著影响,我们的方法是PTP的一个可行的补充。此外,我们的贡献可以帮助网络管理者系统地评估他们的PTP同步性。
{"title":"PTP Security Measures and their Impact on Synchronization Accuracy","authors":"F. Rezabek, Max Helm, Tizian Leonhardt, G. Carle","doi":"10.23919/CNSM55787.2022.9964658","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964658","url":null,"abstract":"The Precision Time Protocol (PTP) synchronizes clocks in a network with high precision. The protocol finds use in many areas, such as smart manufacturing, intra-vehicular networks, and critical infrastructure. It becomes clear that striving for security is an important goal. If an attacker succeeds in disturbing the network synchronization, the impact can result in a cascading set of failures. Unfortunately, neither the previous two IEEE standards for PTP, nor the popular implementation linuxptp, feature or implement sufficient security options.This work focuses on implementing the security extensions for PTP based on the latest PTP standard IEEE 1588-2019 to minimize the threat of attacks and their possible impact. We provide a detailed analysis on PTP synchronicity and security. Based on that, we design and implement software-only tooling to quantify the PTP performance using commercial off-the-shelf hardware and open-source solutions on a linear topology with four to nine hops.The measurements compare the End-to-End (E2E) and Peer-to-Peer (P2P) delay calculation modes and the usage of Transparent Clocks (TC) in parts of the network. Both E2E and P2P show visible degradation of clock synchronization with each hop and standard deviations of 118.6 to 571 ns. The TCs perform better, demonstrating a standard deviation between 90 to 140 ns on four to nine hops. We evaluate different logSyncInterval values corresponding to different PTP profiles and do not observe a major impact on the clock behavior caused by the extensions. The measurement precision of the system is within ±40 ns.Our evaluation of the newly implemented security extensions to linuxptp shows that the security extensions do not have a significant impact on the clock synchronization and our approach is a feasible addition to PTP. Besides, our contributions can aid network managers in assessing their PTP synchronicity systematically.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124607016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
eBPF Programming Made Easy with eCLAT eBPF编程使eCLAT变得容易
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964569
A. Mayer, L. Bracciale, Paolo Lungaroni, P. Loreti, S. Salsano, Giuseppe Bianchi
With the rise of the Network Softwarization era, eBPF has become a hot technology for efficient packet processing on commodity hardware. However the development of custom eBPF solutions is a challenging process that requires highly qualified human resources. In this paper we propose the eCLAT framework with the goal to lower the learning curve of engineers by re-using eBPF code in a programmable way. eCLAT offers a high level programming abstraction to eBPF based network programmability, allowing a developer to create custom application logic in eBPF with no need of understanding the complex details of regular eBPF programming. To support such modularity at the eBPF level, we created an eBPF library that implements a virtual machine, called HIKe VM. The HIKe VM library extends the conventional eBPF programs so that they can be integrated in eCLAT. The eCLAT/HIKe solution does not require any kernel modification.
随着网络软件时代的兴起,eBPF已成为在商用硬件上进行高效数据包处理的热门技术。然而,定制eBPF解决方案的开发是一个具有挑战性的过程,需要高素质的人力资源。在本文中,我们提出了eCLAT框架,目标是通过以可编程的方式重用eBPF代码来降低工程师的学习曲线。eCLAT为基于eBPF的网络可编程性提供了一个高层次的编程抽象,允许开发人员在eBPF中创建自定义应用程序逻辑,而无需了解常规eBPF编程的复杂细节。为了在eBPF级别支持这种模块化,我们创建了一个eBPF库,它实现了一个名为HIKe VM的虚拟机。HIKe VM库扩展了传统的eBPF程序,以便它们可以集成到eCLAT中。eCLAT/HIKe解决方案不需要任何内核修改。
{"title":"eBPF Programming Made Easy with eCLAT","authors":"A. Mayer, L. Bracciale, Paolo Lungaroni, P. Loreti, S. Salsano, Giuseppe Bianchi","doi":"10.23919/CNSM55787.2022.9964569","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964569","url":null,"abstract":"With the rise of the Network Softwarization era, eBPF has become a hot technology for efficient packet processing on commodity hardware. However the development of custom eBPF solutions is a challenging process that requires highly qualified human resources. In this paper we propose the eCLAT framework with the goal to lower the learning curve of engineers by re-using eBPF code in a programmable way. eCLAT offers a high level programming abstraction to eBPF based network programmability, allowing a developer to create custom application logic in eBPF with no need of understanding the complex details of regular eBPF programming. To support such modularity at the eBPF level, we created an eBPF library that implements a virtual machine, called HIKe VM. The HIKe VM library extends the conventional eBPF programs so that they can be integrated in eCLAT. The eCLAT/HIKe solution does not require any kernel modification.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123145435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Private Cellular Network Deployment: Comparison of OpenAirInterface with Magma Core 专用蜂窝网络部署:OpenAirInterface与Magma Core的比较
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964713
Nischal Aryal, Fariba Ghaffari, Saeid Rezaei, E. Bertin, N. Crespi
We present the deployment procedure of a private 4G-LTE network with standard User Equipment in two different scenarios using OpenAirInterface and Magma core networks. Our lessons learned from deploying the segregated end-to-end cellular network testbed, comparison of connection performance in two scenarios, challenges of connecting smartphones to the network, and comparison among the possible use-cases with each scenario are the highlighted subjects provided in this paper.
本文介绍了使用OpenAirInterface和Magma核心网在两种不同场景下使用标准用户设备的专用4G-LTE网络的部署过程。我们从部署隔离的端到端蜂窝网络测试平台中获得的经验教训、两种场景下连接性能的比较、将智能手机连接到网络的挑战以及每种场景下可能的用例之间的比较是本文提供的重点主题。
{"title":"Private Cellular Network Deployment: Comparison of OpenAirInterface with Magma Core","authors":"Nischal Aryal, Fariba Ghaffari, Saeid Rezaei, E. Bertin, N. Crespi","doi":"10.23919/CNSM55787.2022.9964713","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964713","url":null,"abstract":"We present the deployment procedure of a private 4G-LTE network with standard User Equipment in two different scenarios using OpenAirInterface and Magma core networks. Our lessons learned from deploying the segregated end-to-end cellular network testbed, comparison of connection performance in two scenarios, challenges of connecting smartphones to the network, and comparison among the possible use-cases with each scenario are the highlighted subjects provided in this paper.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126624412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network traffic classification based on periodic behavior detection 基于周期行为检测的网络流分类
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964556
Josef Koumar, T. Čejka
Even though encryption hides the content of communication from network monitoring and security systems, this paper shows a feasible way to retrieve useful information about the observed traffic. The paper deals with detection of periodic behavioral patterns of the communication that can be detected using time series created from network traffic by autocorrelation function and Lomb-Scargle periodogram. The revealed characteristics of the periodic behavior can be further exploited to recognize particular applications. We have experimented with the created dataset of 61 classes, and trained a machine learning classifier based on XGBoost that performed the best in our experiments, reaching 90% F1-score.
尽管加密对网络监控和安全系统隐藏了通信内容,但本文提出了一种可行的方法来检索所观察流量的有用信息。本文研究了利用自相关函数和Lomb-Scargle周期图从网络流量中生成的时间序列来检测通信周期行为模式的方法。可以进一步利用所揭示的周期性行为的特征来识别特定的应用。我们对创建的61个类的数据集进行了实验,并训练了一个基于XGBoost的机器学习分类器,该分类器在我们的实验中表现最好,达到了90%的f1分数。
{"title":"Network traffic classification based on periodic behavior detection","authors":"Josef Koumar, T. Čejka","doi":"10.23919/CNSM55787.2022.9964556","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964556","url":null,"abstract":"Even though encryption hides the content of communication from network monitoring and security systems, this paper shows a feasible way to retrieve useful information about the observed traffic. The paper deals with detection of periodic behavioral patterns of the communication that can be detected using time series created from network traffic by autocorrelation function and Lomb-Scargle periodogram. The revealed characteristics of the periodic behavior can be further exploited to recognize particular applications. We have experimented with the created dataset of 61 classes, and trained a machine learning classifier based on XGBoost that performed the best in our experiments, reaching 90% F1-score.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ReLI: Real-Time Lightweight Byzantine Consensus in Low-Power IoT-Systems ReLI:低功耗物联网系统中的实时轻量级拜占庭共识
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965123
H. Goyal, Manish Kausik H, S. Saha
IoT/WSN assisted smart-systems are making our living easier and more comfortable in various aspects. However, there is always a chance of malfunctioning in such massive decentralized systems in crucial moments because of one or more components of the system getting compromised. For instance, monitoring systems installed to watch the status of a bridge may unknowingly suppress the recent deterioration in the status because of some compromised sensing devices. Byzantine fault tolerance support is highly essential in combating the presence of such smart devices with malicious intentions. However, existing solutions for consensus or data aggregation in IoT/WSN systems either assume non-Byzantine node failures or use only simulation/theoretical models to address the existence of Byzantine nodes. Theoretically, a decentralized system can effectively tolerate Byzantine characteristics of up to a certain fraction of the nodes. However, to achieve even that, the nodes need to interact extensively and share data with each other which makes it challenging for such solutions to get practically realized and produce outcomes in real-time, especially in resource-constrained IoT systems. In this work, we adopt Synchronous-Transmission based mechanisms and propose a framework ReLI to efficiently achieve Byzantine consensus in low-power IoT systems. We show that ReLI can operate up to 80% faster and consume up to 78% lesser radio-on time compared to the traditional implementation of the strategy in a publicly available IoT/WSN testbed containing 45 nodes.
物联网/无线传感器网络辅助的智能系统在各个方面使我们的生活更轻松、更舒适。然而,在如此大规模的分散系统中,由于系统的一个或多个组件受到损害,总是有可能在关键时刻发生故障。例如,安装用于监视桥梁状态的监控系统可能会不知不觉地抑制由于某些传感设备受损而导致的最近状态恶化。拜占庭式容错支持在打击此类带有恶意意图的智能设备方面非常重要。然而,物联网/WSN系统中现有的共识或数据聚合解决方案要么假设非拜占庭节点故障,要么仅使用模拟/理论模型来解决拜占庭节点的存在。从理论上讲,去中心化系统可以有效地容忍一定比例节点的拜占庭特征。然而,为了实现这一点,节点需要广泛交互并相互共享数据,这使得这些解决方案难以实际实现并实时产生结果,特别是在资源受限的物联网系统中。在这项工作中,我们采用基于同步传输的机制,并提出了一个框架ReLI,以有效地在低功耗物联网系统中实现拜占庭共识。我们表明,在包含45个节点的公开可用IoT/WSN测试平台中,与传统的策略实施相比,ReLI的运行速度提高了80%,消耗的无线电启动时间减少了78%。
{"title":"ReLI: Real-Time Lightweight Byzantine Consensus in Low-Power IoT-Systems","authors":"H. Goyal, Manish Kausik H, S. Saha","doi":"10.23919/CNSM55787.2022.9965123","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965123","url":null,"abstract":"IoT/WSN assisted smart-systems are making our living easier and more comfortable in various aspects. However, there is always a chance of malfunctioning in such massive decentralized systems in crucial moments because of one or more components of the system getting compromised. For instance, monitoring systems installed to watch the status of a bridge may unknowingly suppress the recent deterioration in the status because of some compromised sensing devices. Byzantine fault tolerance support is highly essential in combating the presence of such smart devices with malicious intentions. However, existing solutions for consensus or data aggregation in IoT/WSN systems either assume non-Byzantine node failures or use only simulation/theoretical models to address the existence of Byzantine nodes. Theoretically, a decentralized system can effectively tolerate Byzantine characteristics of up to a certain fraction of the nodes. However, to achieve even that, the nodes need to interact extensively and share data with each other which makes it challenging for such solutions to get practically realized and produce outcomes in real-time, especially in resource-constrained IoT systems. In this work, we adopt Synchronous-Transmission based mechanisms and propose a framework ReLI to efficiently achieve Byzantine consensus in low-power IoT systems. We show that ReLI can operate up to 80% faster and consume up to 78% lesser radio-on time compared to the traditional implementation of the strategy in a publicly available IoT/WSN testbed containing 45 nodes.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124690924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Realistic Open-Data-based Cost Model for Wireless Backhaul Networks in Rural Areas 基于开放数据的农村无线回程网络成本模型
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964562
Gabriele Gemmi, Llorenç Cerdà-Alabern, L. Maccari
Broadband Internet provision is an increasing demand in many rural areas and wireless internet service providers have emerged as an opportunity to fill this need. However, this type of operator typically consists of a small business with little resources, and difficulty to plan and assess a reliable and economically sustainable infrastructure. In this paper, we try to bring some aid to this challenging problem by describing a reliable mesh-based backhaul design, together with a detailed CapEx/OpEx economic assessment. We apply our model using real data from ten Italian rural municipalities. Our numerical results show that having clusters of 200 subscribers, a reliable backhaul could be deployed with a monthly subscription and price per Mb/s extremely competitive compared to existing market offers.
宽带互联网在许多农村地区的需求日益增长,无线互联网服务提供商的出现为满足这一需求提供了机会。然而,这种类型的运营商通常由小型企业组成,资源很少,难以规划和评估可靠且经济可持续的基础设施。在本文中,我们试图通过描述一个可靠的基于网格的回程设计,以及详细的CapEx/OpEx经济评估,为这个具有挑战性的问题提供一些帮助。我们使用来自意大利10个农村城市的真实数据来应用我们的模型。我们的数值结果表明,拥有200个用户的集群,可以部署可靠的回程,每月订阅,每Mb/s的价格与现有市场报价相比极具竞争力。
{"title":"A Realistic Open-Data-based Cost Model for Wireless Backhaul Networks in Rural Areas","authors":"Gabriele Gemmi, Llorenç Cerdà-Alabern, L. Maccari","doi":"10.23919/CNSM55787.2022.9964562","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964562","url":null,"abstract":"Broadband Internet provision is an increasing demand in many rural areas and wireless internet service providers have emerged as an opportunity to fill this need. However, this type of operator typically consists of a small business with little resources, and difficulty to plan and assess a reliable and economically sustainable infrastructure. In this paper, we try to bring some aid to this challenging problem by describing a reliable mesh-based backhaul design, together with a detailed CapEx/OpEx economic assessment. We apply our model using real data from ten Italian rural municipalities. Our numerical results show that having clusters of 200 subscribers, a reliable backhaul could be deployed with a monthly subscription and price per Mb/s extremely competitive compared to existing market offers.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133142768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intent-Driven Path State Monitoring to Enable Centralized State-Aware Flow Steering 意图驱动的路径状态监控,以实现集中的状态感知流转向
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965141
Christoph Hardegen
Running state monitoring for network switches and links enables the derivation of a path-based data view. Thereby, various monitoring intents like utilization and latency awareness can be targeted during data collection. Whereas each of these objectives relies on a particular set of state metrics, different monitoring methods may be run to gather the data basis serving as decision input for subsequent analysis purposes. In addition, path conditions have an impact on the state observed for individual packet streams being forwarded along a specific path. While path level state data is of relevance, e.g., to evaluate past load ratios in order to run state-aware and efficient path determination, flow level state helps to monitor flow experience conditions like achieved throughput or perceived latency, e.g., to track the compliance with flow-based requirements. This paper presents a modular architecture for path state monitoring that considers port counter query, network probing and in-band network telemetry as methods for demand-driven data collection and focuses on utilization and latency awareness as monitoring intents. State data is collected by a centralized controller in collaboration with distributed modules deployed in a switch’s data plane to run data tracking, wherefore programmable switches are used as operational basis to ensure a flexible monitoring protocol. Evaluations show that continuously collected data snapshots allow to track accurate path state trends that – w.r.t. path state-aware traffic steering – can be leveraged to improve flow-based load distribution across available path capacities and to resolve inefficiencies like imbalanced path load or congestion.
对网络交换机和链路的运行状态监视使派生基于路径的数据视图成为可能。因此,可以在数据收集期间针对各种监视意图,如利用率和延迟感知。虽然这些目标中的每一个都依赖于一组特定的状态度量,但是可以运行不同的监视方法来收集作为后续分析目的的决策输入的数据基础。此外,路径条件对沿着特定路径转发的单个数据包流的观察状态有影响。虽然路径级状态数据是相关的,例如,为了评估过去的负载比率,以便运行状态感知和有效的路径确定,流级状态有助于监控流体验条件,如实现吞吐量或感知延迟,例如,跟踪对基于流的需求的遵从性。本文提出了一种用于路径状态监控的模块化架构,该架构将端口计数器查询、网络探测和带内网络遥测作为需求驱动数据收集的方法,并将利用率和延迟感知作为监控意图。状态数据由集中控制器采集,分布式模块部署在交换机的数据平面进行数据跟踪,采用可编程交换机作为运行基础,保证监控协议的灵活性。评估表明,连续收集的数据快照允许跟踪准确的路径状态趋势,可以利用路径状态感知流量转向来改善基于流的负载分布,并解决诸如路径负载不平衡或拥堵等低效率问题。
{"title":"Intent-Driven Path State Monitoring to Enable Centralized State-Aware Flow Steering","authors":"Christoph Hardegen","doi":"10.23919/CNSM55787.2022.9965141","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965141","url":null,"abstract":"Running state monitoring for network switches and links enables the derivation of a path-based data view. Thereby, various monitoring intents like utilization and latency awareness can be targeted during data collection. Whereas each of these objectives relies on a particular set of state metrics, different monitoring methods may be run to gather the data basis serving as decision input for subsequent analysis purposes. In addition, path conditions have an impact on the state observed for individual packet streams being forwarded along a specific path. While path level state data is of relevance, e.g., to evaluate past load ratios in order to run state-aware and efficient path determination, flow level state helps to monitor flow experience conditions like achieved throughput or perceived latency, e.g., to track the compliance with flow-based requirements. This paper presents a modular architecture for path state monitoring that considers port counter query, network probing and in-band network telemetry as methods for demand-driven data collection and focuses on utilization and latency awareness as monitoring intents. State data is collected by a centralized controller in collaboration with distributed modules deployed in a switch’s data plane to run data tracking, wherefore programmable switches are used as operational basis to ensure a flexible monitoring protocol. Evaluations show that continuously collected data snapshots allow to track accurate path state trends that – w.r.t. path state-aware traffic steering – can be leveraged to improve flow-based load distribution across available path capacities and to resolve inefficiencies like imbalanced path load or congestion.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123675864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning 仪式:一个量化监督机器学习可信度的平台
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9965139
Alberto Huertas Celdrán, Jan Bauer, Melike Demirci, Joel Leupp, M. Franco, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, G. Pérez, B. Stiller
This demo presents RITUAL, a platform composed of a novel algorithm and a Web application quantifying the trustworthiness level of supervised Machine and Deep Learning (ML/DL) models according to their fairness, explainability, robustness, and accountability. The algorithm is deployed on a Web application to allow users to quantify and compare the trustworthiness of their ML/DL models. Finally, a scenario with ML/DL models classifying network cyberattacks demonstrates the platform applicability.
这个演示展示了RITUAL,一个由新算法和Web应用程序组成的平台,根据其公平性、可解释性、鲁棒性和可问责性来量化监督机器和深度学习(ML/DL)模型的可信度水平。该算法部署在Web应用程序上,允许用户量化和比较其ML/DL模型的可信度。最后,使用ML/DL模型对网络攻击进行分类的场景验证了该平台的适用性。
{"title":"RITUAL: a Platform Quantifying the Trustworthiness of Supervised Machine Learning","authors":"Alberto Huertas Celdrán, Jan Bauer, Melike Demirci, Joel Leupp, M. Franco, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, G. Pérez, B. Stiller","doi":"10.23919/CNSM55787.2022.9965139","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9965139","url":null,"abstract":"This demo presents RITUAL, a platform composed of a novel algorithm and a Web application quantifying the trustworthiness level of supervised Machine and Deep Learning (ML/DL) models according to their fairness, explainability, robustness, and accountability. The algorithm is deployed on a Web application to allow users to quantify and compare the trustworthiness of their ML/DL models. Finally, a scenario with ML/DL models classifying network cyberattacks demonstrates the platform applicability.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"17 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decentralized Intent-driven Coordination of Multi-Domain IP-Optical Networks 多域ip光网络的分散意图驱动协调
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964606
Filippos Christou
Intent-based networking is increasingly used to improve network control and management. Network operators have already begun to adopt this paradigm, which leads to a simplified and automatized network operation. The operators can interact with their intent-driven networks through the Northbound Interface (NBI). Given a standardized NBI, the same approach can scale to coordinate intent provisioning across multi-domain networks in a decentralized fashion. This can outdate traditional decentralized protocols and open new opportunities for flexible and scalable communication mechanisms. This paper proposes a minimal and general high-level architecture, relying on a standard IBN (Intent-Based Networking) architecture, for multi-domain intent deployment in IP-optical networks. Our architecture is consistent between diverse network operators that use the same NBI, respects confidential information, promotes accountability, and can scale for various network services. To achieve this, we introduce a hierarchical system-generated intent schema with automatic intent delegation between the different domains.
基于意图的组网越来越多地用于改善网络控制和管理。网络运营商已经开始采用这种模式,从而实现网络运营的简化和自动化。运营商可以通过北向接口(NBI)与他们的意图驱动网络进行交互。给定标准化的NBI,相同的方法可以扩展到以分散的方式跨多域网络协调意图供应。这可能会使传统的去中心化协议过时,并为灵活和可扩展的通信机制提供新的机会。本文提出了一种基于标准IBN(基于意图的网络)架构的最小化通用高层架构,用于ip光网络中的多域意图部署。我们的架构在使用相同NBI的不同网络运营商之间是一致的,尊重机密信息,促进问责制,并且可以扩展到各种网络服务。为了实现这一点,我们引入了一个分层系统生成的意图模式,在不同的域之间自动进行意图委托。
{"title":"Decentralized Intent-driven Coordination of Multi-Domain IP-Optical Networks","authors":"Filippos Christou","doi":"10.23919/CNSM55787.2022.9964606","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964606","url":null,"abstract":"Intent-based networking is increasingly used to improve network control and management. Network operators have already begun to adopt this paradigm, which leads to a simplified and automatized network operation. The operators can interact with their intent-driven networks through the Northbound Interface (NBI). Given a standardized NBI, the same approach can scale to coordinate intent provisioning across multi-domain networks in a decentralized fashion. This can outdate traditional decentralized protocols and open new opportunities for flexible and scalable communication mechanisms. This paper proposes a minimal and general high-level architecture, relying on a standard IBN (Intent-Based Networking) architecture, for multi-domain intent deployment in IP-optical networks. Our architecture is consistent between diverse network operators that use the same NBI, respects confidential information, promotes accountability, and can scale for various network services. To achieve this, we introduce a hierarchical system-generated intent schema with automatic intent delegation between the different domains.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129296215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Zero-touch security automation mechanisms for edge NFV: the π-Edge approach 边缘NFV的零接触安全自动化机制:π-Edge方法
Pub Date : 2022-10-31 DOI: 10.23919/CNSM55787.2022.9964999
Alexandros Valantasis, Nikos Psaromanolakis, V. Theodorou
The shift towards distributed computing architectures that push data storage and processing to the edge of the network, is resulting into a convergence of cloud-computing services and next generation mobile network technologies. In order to uniformly manage resources and services in the formed cloud/core to edge/devices continuum and to handle the diversity of multi-party underlying infrastructure technologies in a latency-aware, reliable and trustworthy fashion, management automation has become more crucial than ever. In this work, we present the security analytics mechanisms of the π-Edge platform–our edge management platform that embodies zero-touch automation features for interoperability, Quality of Service (QoS) assurance, resilience and trust. To this end, we introduce a declarative NFV MANO Information Model (IM) and methods for automatically enhancing Network Slices at the edge, with security services that i) continuously monitor user-plane traffic on the links between Virtual Network Functions (VNFs), ii) detect possible network vulnerabilities or malicious behaviour and iii) apply relevant actions to effectively observe and mitigate identified threats. The implementation of such mechanisms is evaluated through experimentation on a use case of DDoS attacking scenarios, showcasing the usability and the benefits of our proposed solution.
向分布式计算架构的转变,将数据存储和处理推向网络边缘,导致云计算服务和下一代移动网络技术的融合。为了在形成的云/核心到边缘/设备连续体中统一管理资源和服务,并以延迟感知、可靠和值得信赖的方式处理多方底层基础设施技术的多样性,管理自动化变得比以往任何时候都更加重要。在这项工作中,我们提出了π-Edge平台的安全分析机制,π-Edge平台是我们的边缘管理平台,它体现了互操作性、服务质量(QoS)保证、弹性和信任的零接触自动化特性。为此,我们引入了声明式NFV MANO信息模型(IM)和自动增强边缘网络切片的方法,其安全服务包括i)持续监控虚拟网络功能(VNFs)之间链接上的用户平面流量,ii)检测可能的网络漏洞或恶意行为,以及iii)应用相关行动来有效观察和减轻已识别的威胁。通过对DDoS攻击场景用例的实验来评估这些机制的实现,展示了我们提出的解决方案的可用性和优点。
{"title":"Zero-touch security automation mechanisms for edge NFV: the π-Edge approach","authors":"Alexandros Valantasis, Nikos Psaromanolakis, V. Theodorou","doi":"10.23919/CNSM55787.2022.9964999","DOIUrl":"https://doi.org/10.23919/CNSM55787.2022.9964999","url":null,"abstract":"The shift towards distributed computing architectures that push data storage and processing to the edge of the network, is resulting into a convergence of cloud-computing services and next generation mobile network technologies. In order to uniformly manage resources and services in the formed cloud/core to edge/devices continuum and to handle the diversity of multi-party underlying infrastructure technologies in a latency-aware, reliable and trustworthy fashion, management automation has become more crucial than ever. In this work, we present the security analytics mechanisms of the π-Edge platform–our edge management platform that embodies zero-touch automation features for interoperability, Quality of Service (QoS) assurance, resilience and trust. To this end, we introduce a declarative NFV MANO Information Model (IM) and methods for automatically enhancing Network Slices at the edge, with security services that i) continuously monitor user-plane traffic on the links between Virtual Network Functions (VNFs), ii) detect possible network vulnerabilities or malicious behaviour and iii) apply relevant actions to effectively observe and mitigate identified threats. The implementation of such mechanisms is evaluated through experimentation on a use case of DDoS attacking scenarios, showcasing the usability and the benefits of our proposed solution.","PeriodicalId":232521,"journal":{"name":"2022 18th International Conference on Network and Service Management (CNSM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116449374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 18th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1