首页 > 最新文献

2020 6th IEEE Conference on Network Softwarization (NetSoft)最新文献

英文 中文
Cloud-native SDN Controller Based on Micro-Services for Transport Networks 基于微服务的传输网络云原生SDN控制器
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165377
C. Manso, R. Vilalta, R. Casellas, R. Martínez, R. Muñoz
Current SDN controllers are monolithic applications that are run on dedicated servers and require specific protocols for synchronization among them. These SDN controllers do not provide the required flexibility to scale-out in case of a cloud-scale number of connectivity service requests. In this demonstration, We present the control of transport networks based on ONF Transport API using a cloud-native SDN controller based on micro-services. This demo provides insights on novel software implementations of transport network control technologies, such as container-based control architectures and standard interfaces. The proposed SDN controller components synchronize among them using gRPC protocol and a defined protocol buffer.
当前的SDN控制器是在专用服务器上运行的单片应用程序,需要特定的协议来实现它们之间的同步。在连接服务请求达到云规模的情况下,这些SDN控制器不提供向外扩展所需的灵活性。在这个演示中,我们展示了基于ONF传输API的传输网络控制,使用基于微服务的云原生SDN控制器。该演示提供了对传输网络控制技术的新软件实现的见解,例如基于容器的控制体系结构和标准接口。所提出的SDN控制器组件之间使用gRPC协议和定义的协议缓冲区进行同步。
{"title":"Cloud-native SDN Controller Based on Micro-Services for Transport Networks","authors":"C. Manso, R. Vilalta, R. Casellas, R. Martínez, R. Muñoz","doi":"10.1109/NetSoft48620.2020.9165377","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165377","url":null,"abstract":"Current SDN controllers are monolithic applications that are run on dedicated servers and require specific protocols for synchronization among them. These SDN controllers do not provide the required flexibility to scale-out in case of a cloud-scale number of connectivity service requests. In this demonstration, We present the control of transport networks based on ONF Transport API using a cloud-native SDN controller based on micro-services. This demo provides insights on novel software implementations of transport network control technologies, such as container-based control architectures and standard interfaces. The proposed SDN controller components synchronize among them using gRPC protocol and a defined protocol buffer.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114213529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location-based Data Model for Optimized Network Slice Placement 基于位置的优化网络片放置数据模型
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165427
José Jurandir Alves Esteves, Amina Boubendir, F. Guillemin, Pierre Sens
Network Slicing has its roots in Network Function Virtualization (NFV) allowing high flexibility in the delivery of end-to-end network services. To achieve Network Slicing promises on efficiency, Network Slice Providers have to ensure optimized resource utilization and to guarantee Quality of Service when managing the life-cycle of a Network Slice. We focus in this paper on Network Slice Placement, intimately related to the VNF Placement and Chaining problem. In contrary to most studies related to VNF placement, we deal with the most complete and complex Network Slice topologies and we pay special attention to the geographic location of Network Slice Users. We propose a data model adapted to Integer Linear Programming. Extensive numerical experiments assess the relevance of taking into account the user location constraints.
网络切片源于网络功能虚拟化(NFV),它允许端到端网络服务的高灵活性交付。为了实现网络切片对效率的承诺,网络切片提供商在管理网络切片的生命周期时必须确保优化的资源利用和保证服务质量。本文的重点是网络片的放置,这与VNF的放置和链接问题密切相关。与大多数与VNF放置相关的研究相反,我们处理最完整和最复杂的网络切片拓扑,并特别关注网络切片用户的地理位置。提出了一种适用于整数线性规划的数据模型。大量的数值实验评估了考虑用户位置约束的相关性。
{"title":"Location-based Data Model for Optimized Network Slice Placement","authors":"José Jurandir Alves Esteves, Amina Boubendir, F. Guillemin, Pierre Sens","doi":"10.1109/NetSoft48620.2020.9165427","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165427","url":null,"abstract":"Network Slicing has its roots in Network Function Virtualization (NFV) allowing high flexibility in the delivery of end-to-end network services. To achieve Network Slicing promises on efficiency, Network Slice Providers have to ensure optimized resource utilization and to guarantee Quality of Service when managing the life-cycle of a Network Slice. We focus in this paper on Network Slice Placement, intimately related to the VNF Placement and Chaining problem. In contrary to most studies related to VNF placement, we deal with the most complete and complex Network Slice topologies and we pay special attention to the geographic location of Network Slice Users. We propose a data model adapted to Integer Linear Programming. Extensive numerical experiments assess the relevance of taking into account the user location constraints.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"237 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123271713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Regressor Relearning Architecture Adapting to Traffic Trend Changes in NFV Platforms 适应NFV平台流量趋势变化的回归再学习架构
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165449
Takahiro Hirayama, M. Jibiki, Ved P. Kafle
Network function virtualization (NFV) enables network operators to flexibly provide diverse virtualized functions for services such as Internet of things (IoT) and mobile applications. NFV platforms are required to offer stable and guaranteed quality-of-service (QoS)even during dynamically changing resource demands and traffic volumes. To meet the QoS requirements against time-varying network environments, infrastructure providers must dynamically adjust the amount of computational resources, such as CPU, assigned to virtual network functions (VNFs). To provide agile resource control and adaptiveness, predicting the virtual server load via machine learning technologies is an effective approach for proactive control. In this paper, we propose a traffic prediction framework based on ensemble learning, comprising weak regressors trained by ML models, such as recurrent neural networks (RNNs), random forest, and elastic net. It was observed that the prediction error tends to worsen with time because the gap of trends between the past and future traffics becomes wider. Therefore, to reduce the prediction errors, we propose an adjustment mechanism for regressors based on forgetting and dynamic ensemble. The evaluation result with real traffic data verified that the resource adjustment scheme based on the proposed traffic prediction framework keeps the frequency of over and under provisioning low, which is lesser by 45% in comparison to RNNs and autoregressive moving average (ARMA).
网络功能虚拟化(Network function virtualization, NFV)使网络运营商能够灵活地为物联网、移动应用等业务提供多种虚拟化功能。NFV平台需要在资源需求和流量动态变化的情况下提供稳定且有保障的QoS (quality- service,服务质量)。为了满足时变网络环境下的QoS需求,基础设施提供商必须动态调整分配给虚拟网络功能(VNFs)的计算资源(如CPU)的数量。为了提供灵活的资源控制和适应性,通过机器学习技术预测虚拟服务器负载是一种有效的主动控制方法。在本文中,我们提出了一个基于集成学习的流量预测框架,该框架包括由ML模型训练的弱回归量,如循环神经网络(rnn)、随机森林和弹性网络。据观察,随着时间的推移,由于过去和未来交通量之间的趋势差距越来越大,预测误差也越来越大。因此,为了减小预测误差,我们提出了一种基于遗忘和动态集合的回归量调整机制。实际交通数据的评价结果验证了基于所提出的交通预测框架的资源调整方案保持了较低的供应过剩和供应不足的频率,与rnn和自回归移动平均(ARMA)相比减少了45%。
{"title":"Regressor Relearning Architecture Adapting to Traffic Trend Changes in NFV Platforms","authors":"Takahiro Hirayama, M. Jibiki, Ved P. Kafle","doi":"10.1109/NetSoft48620.2020.9165449","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165449","url":null,"abstract":"Network function virtualization (NFV) enables network operators to flexibly provide diverse virtualized functions for services such as Internet of things (IoT) and mobile applications. NFV platforms are required to offer stable and guaranteed quality-of-service (QoS)even during dynamically changing resource demands and traffic volumes. To meet the QoS requirements against time-varying network environments, infrastructure providers must dynamically adjust the amount of computational resources, such as CPU, assigned to virtual network functions (VNFs). To provide agile resource control and adaptiveness, predicting the virtual server load via machine learning technologies is an effective approach for proactive control. In this paper, we propose a traffic prediction framework based on ensemble learning, comprising weak regressors trained by ML models, such as recurrent neural networks (RNNs), random forest, and elastic net. It was observed that the prediction error tends to worsen with time because the gap of trends between the past and future traffics becomes wider. Therefore, to reduce the prediction errors, we propose an adjustment mechanism for regressors based on forgetting and dynamic ensemble. The evaluation result with real traffic data verified that the resource adjustment scheme based on the proposed traffic prediction framework keeps the frequency of over and under provisioning low, which is lesser by 45% in comparison to RNNs and autoregressive moving average (ARMA).","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116679540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Copyright 版权
Pub Date : 2020-06-01 DOI: 10.1109/netsoft48620.2020.9165413
{"title":"Copyright","authors":"","doi":"10.1109/netsoft48620.2020.9165413","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165413","url":null,"abstract":"","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115739303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G-TRANSFORMER meets Network Service Federation: design, implementation and evaluation 5G-TRANSFORMER满足网络服务联盟:设计、实施和评估
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165473
J. Baranda, J. Mangues‐Bafalluy, R. Martínez, L. Vettori, Kiril Antevski, C. Bernardos, Xi Li
5G networks require flexibility, automation and programmability to satisfy the requirements of verticals industries. 5G-TRANSFORMER project proposes an SDN/NFV based network platform to enable this vision. Among its features, this platform allows the end-to-end deployment of parts of a network service (NS) in multiple administrative domains, which is known as network service federation (NSF). This feature increases network flexibility, opening the door to new business models. This paper complements our previous work by providing a detailed description of the 5G-TRANSFORMER NSF workflow, its interface and a profiling of the operations involved in the deployment of an NS between multiple administrative domains in a real experimental setup. Experimental results reveal i) that a federated NS can be deployed in the order of few minutes (less than 5 minutes), in line with the 5G target of reducing service setup to minutes, and ii) the impact of the NSF procedure in the deployment time is reduced when compared with the deployment of the same NS in a single administrative domain.
5G网络需要灵活性、自动化和可编程性,以满足垂直行业的需求。5G-TRANSFORMER项目提出了一个基于SDN/NFV的网络平台来实现这一愿景。在其功能中,该平台允许在多个管理域中对网络服务(NS)的部分进行端到端部署,这被称为网络服务联合(NSF)。这一特性增加了网络的灵活性,为新的商业模式打开了大门。本文通过提供5G-TRANSFORMER NSF工作流程的详细描述,其接口以及在真实实验设置中多个管理域之间部署NS所涉及的操作分析,补充了我们之前的工作。实验结果表明:1)联邦网络可以在几分钟(不到5分钟)的时间内部署,符合5G将服务设置减少到几分钟的目标;2)与在单个管理域中部署相同的网络相比,减少了NSF过程对部署时间的影响。
{"title":"5G-TRANSFORMER meets Network Service Federation: design, implementation and evaluation","authors":"J. Baranda, J. Mangues‐Bafalluy, R. Martínez, L. Vettori, Kiril Antevski, C. Bernardos, Xi Li","doi":"10.1109/NetSoft48620.2020.9165473","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165473","url":null,"abstract":"5G networks require flexibility, automation and programmability to satisfy the requirements of verticals industries. 5G-TRANSFORMER project proposes an SDN/NFV based network platform to enable this vision. Among its features, this platform allows the end-to-end deployment of parts of a network service (NS) in multiple administrative domains, which is known as network service federation (NSF). This feature increases network flexibility, opening the door to new business models. This paper complements our previous work by providing a detailed description of the 5G-TRANSFORMER NSF workflow, its interface and a profiling of the operations involved in the deployment of an NS between multiple administrative domains in a real experimental setup. Experimental results reveal i) that a federated NS can be deployed in the order of few minutes (less than 5 minutes), in line with the 5G target of reducing service setup to minutes, and ii) the impact of the NSF procedure in the deployment time is reduced when compared with the deployment of the same NS in a single administrative domain.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116529653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On Optimizing Resource Utilization in AVC-based Real-time Video Streaming 基于avc的实时视频流资源利用优化研究
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165450
A. Erfanian, F. Tashtarian, Reza Farahani, C. Timmerer, H. Hellwagner
Real-time video streaming traffic and related applications have witnessed significant growth in recent years. However, this has been accompanied by some challenging issues, predominantly resource utilization. IP multicasting, as a solution to this problem, suffers from many problems. Using scalable video coding could not gain wide adoption in the industry, due to reduced compression efficiency and extra computational complexity. The emerging software-defined networking (SDN) and network function virtualization (NFV) paradigms enable researchers to cope with IP multicasting issues in novel ways. In this paper, by leveraging the SDN and NFV concepts, we introduce a cost-aware approach to provide advanced video coding (AVC) -based real-time video streaming services in the network. In this study, we use two types of virtualized network functions (VNFs): virtual reverse proxy (VRP) and virtual transcoder (VTF) functions. At the edge of the network, VRPs are responsible for collecting clients' requests and sending them to an SDN controller. Then, executing a mixed-integer linear program (MILP) determines an optimal multicast tree from an appropriate set of video source servers to the optimal group of transcoders. The desired video is sent over the multicast tree. The VTFs transcode the received video segments and stream to the requesting VRPs over unicast paths. To mitigate the time complexity of the proposed MILP model, we propose a heuristic algorithm that determines a near-optimal solution in a reasonable amount of time. Using the MiniNet emulator, we evaluate the proposed approach and show it achieves better performance in terms of cost and resource utilization in comparison with traditional multicast and unicast approaches.
近年来,实时视频流流量和相关应用出现了显著增长。然而,这也伴随着一些具有挑战性的问题,主要是资源利用问题。IP组播作为解决这一问题的一种方法,存在许多问题。由于压缩效率降低和额外的计算复杂性,使用可扩展的视频编码不能在行业中得到广泛采用。新兴的软件定义网络(SDN)和网络功能虚拟化(NFV)范式使研究人员能够以新颖的方式处理IP多播问题。在本文中,通过利用SDN和NFV概念,我们引入了一种具有成本意识的方法,在网络中提供基于高级视频编码(AVC)的实时视频流服务。在本研究中,我们使用两种类型的虚拟网络功能(vnf):虚拟反向代理(VRP)和虚拟转码器(VTF)功能。在网络边缘,vrp负责收集客户端的请求并将其发送到SDN控制器。然后,执行混合整数线性规划(MILP),确定从一组合适的视频源服务器到最优的转码器组的最优组播树。所需的视频通过组播树发送。vtf对接收到的视频片段进行转码,并通过单播路径流到请求vrp。为了减轻所提出的MILP模型的时间复杂性,我们提出了一种启发式算法,该算法可以在合理的时间内确定接近最优的解决方案。利用MiniNet仿真器对该方法进行了评估,结果表明,与传统的组播和单播方法相比,该方法在成本和资源利用率方面取得了更好的性能。
{"title":"On Optimizing Resource Utilization in AVC-based Real-time Video Streaming","authors":"A. Erfanian, F. Tashtarian, Reza Farahani, C. Timmerer, H. Hellwagner","doi":"10.1109/NetSoft48620.2020.9165450","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165450","url":null,"abstract":"Real-time video streaming traffic and related applications have witnessed significant growth in recent years. However, this has been accompanied by some challenging issues, predominantly resource utilization. IP multicasting, as a solution to this problem, suffers from many problems. Using scalable video coding could not gain wide adoption in the industry, due to reduced compression efficiency and extra computational complexity. The emerging software-defined networking (SDN) and network function virtualization (NFV) paradigms enable researchers to cope with IP multicasting issues in novel ways. In this paper, by leveraging the SDN and NFV concepts, we introduce a cost-aware approach to provide advanced video coding (AVC) -based real-time video streaming services in the network. In this study, we use two types of virtualized network functions (VNFs): virtual reverse proxy (VRP) and virtual transcoder (VTF) functions. At the edge of the network, VRPs are responsible for collecting clients' requests and sending them to an SDN controller. Then, executing a mixed-integer linear program (MILP) determines an optimal multicast tree from an appropriate set of video source servers to the optimal group of transcoders. The desired video is sent over the multicast tree. The VTFs transcode the received video segments and stream to the requesting VRPs over unicast paths. To mitigate the time complexity of the proposed MILP model, we propose a heuristic algorithm that determines a near-optimal solution in a reasonable amount of time. Using the MiniNet emulator, we evaluate the proposed approach and show it achieves better performance in terms of cost and resource utilization in comparison with traditional multicast and unicast approaches.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116612692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Detection of Insider Threats using Artificial Intelligence and Visualisation 使用人工智能和可视化检测内部威胁
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165337
Vasileios Koutsouvelis, S. Shiaeles, B. Ghita, G. Bendiab
Insider threats are one of the most damaging risk factors for the IT systems and infrastructure of a company or an organization; identification of insider threats has prompted the interest of the world academic research community, with several solutions having been proposed to alleviate their potential impact. For the implementation of the experimental stage described in this study, the Convolutional Neural Network (from now on CNN) algorithm was used and implemented via the Google Tensorflow program, which was trained to identify potential threats from images produced by the available dataset. From the examination of the images that were produced and with the help of Machine Learning, the question whether the activity of each user is classified as “malicious” or not for the Information System was answered.
内部威胁是对公司或组织的IT系统和基础设施最具破坏性的风险因素之一;内部威胁的识别引起了世界学术研究界的兴趣,并提出了几种解决方案来减轻其潜在影响。为了实现本研究中描述的实验阶段,使用了卷积神经网络(从现在起CNN)算法,并通过谷歌Tensorflow程序实现,该程序经过训练,可以从可用数据集产生的图像中识别潜在威胁。通过对生成的图像进行检查,并在机器学习的帮助下,回答了每个用户的活动是否被归类为“恶意”的问题。
{"title":"Detection of Insider Threats using Artificial Intelligence and Visualisation","authors":"Vasileios Koutsouvelis, S. Shiaeles, B. Ghita, G. Bendiab","doi":"10.1109/NetSoft48620.2020.9165337","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165337","url":null,"abstract":"Insider threats are one of the most damaging risk factors for the IT systems and infrastructure of a company or an organization; identification of insider threats has prompted the interest of the world academic research community, with several solutions having been proposed to alleviate their potential impact. For the implementation of the experimental stage described in this study, the Convolutional Neural Network (from now on CNN) algorithm was used and implemented via the Google Tensorflow program, which was trained to identify potential threats from images produced by the available dataset. From the examination of the images that were produced and with the help of Machine Learning, the question whether the activity of each user is classified as “malicious” or not for the Information System was answered.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
5GOS: Demonstrating multi-domain orchestration of end-to-end virtual RAN services 5GOS:演示端到端虚拟RAN服务的多域编排
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165314
D. Camps-Mur, Ferran Cañellas, A. Machwe, Jorge Paracuellos, Konstantinos Choumas, D. Giatsios, T. Korakis, Hadi Razzaghi Kouchaksaraei
Despite recent progress in orchestration of Virtual Network Functions (VNFs) and in multi-technology SDN connectivity, the automated provisioning of end-to-end network services composed of virtual functions deployed across distributed compute locations remains an open challenge. This problem is especially relevant to support the deployment of future 5G networks, comprising virtual access and core network functions connected through a potentially multi-domain transport network. In this paper we present and demonstrate the 5GOS, a lightweight end-to-end orchestration framework that enables the automated provisioning of virtual radio access network services. Using an experimental multi-domain testbed we demonstrate that the 5GOS can provision multi-domain virtual Wi-Fi and LTE services in less than three minutes.
尽管最近在虚拟网络功能(VNFs)的编排和多技术SDN连接方面取得了进展,但由部署在分布式计算位置的虚拟功能组成的端到端网络服务的自动供应仍然是一个开放的挑战。这个问题对于支持未来5G网络的部署尤其重要,5G网络包括虚拟接入和通过潜在的多域传输网络连接的核心网络功能。在本文中,我们介绍并演示了5GOS,这是一个轻量级的端到端编排框架,可以自动提供虚拟无线接入网络服务。通过实验多域测试平台,我们证明了5GOS可以在不到三分钟的时间内提供多域虚拟Wi-Fi和LTE服务。
{"title":"5GOS: Demonstrating multi-domain orchestration of end-to-end virtual RAN services","authors":"D. Camps-Mur, Ferran Cañellas, A. Machwe, Jorge Paracuellos, Konstantinos Choumas, D. Giatsios, T. Korakis, Hadi Razzaghi Kouchaksaraei","doi":"10.1109/NetSoft48620.2020.9165314","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165314","url":null,"abstract":"Despite recent progress in orchestration of Virtual Network Functions (VNFs) and in multi-technology SDN connectivity, the automated provisioning of end-to-end network services composed of virtual functions deployed across distributed compute locations remains an open challenge. This problem is especially relevant to support the deployment of future 5G networks, comprising virtual access and core network functions connected through a potentially multi-domain transport network. In this paper we present and demonstrate the 5GOS, a lightweight end-to-end orchestration framework that enables the automated provisioning of virtual radio access network services. Using an experimental multi-domain testbed we demonstrate that the 5GOS can provision multi-domain virtual Wi-Fi and LTE services in less than three minutes.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114830400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology 基于区块链技术的SDN网络协同网络攻击防御
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165396
Mehrdad Hajizadeh, Nima Afraz, M. Ruffini, T. Bauschert
The legacy security defense mechanisms cannot resist where emerging sophisticated threats such as zero-day and malware campaigns have profoundly changed the dimensions of cyber-attacks. Recent studies indicate that cyber threat intelligence plays a crucial role in implementing proactive defense operations. It provides a knowledge-sharing platform that not only increases security awareness and readiness but also enables the collaborative defense to diminish the effectiveness of potential attacks. In this paper, we propose a secure distributed model to facilitate cyber threat intelligence sharing among diverse participants. The proposed model uses blockchain technology to assure tamper-proof record-keeping and smart contracts to guarantee immutable logic. We use an open-source permissioned blockchain platform, Hyperledger Fabric, to implement the blockchain application. We also utilize the flexibility and management capabilities of Software-Defined Networking to be integrated with the proposed sharing platform to enhance defense perspectives against threats in the system. In the end, collaborative DDoS attack mitigation is taken as a case study to demonstrate our approach.
传统的安全防御机制无法抵御新出现的复杂威胁,如零日攻击和恶意软件活动已经深刻地改变了网络攻击的维度。最近的研究表明,网络威胁情报在实施主动防御行动中发挥着至关重要的作用。它提供了一个知识共享平台,不仅提高了安全意识和准备程度,而且使协同防御能够降低潜在攻击的有效性。在本文中,我们提出了一个安全的分布式模型,以促进不同参与者之间的网络威胁情报共享。提出的模型使用区块链技术来确保防篡改的记录保存和智能合约来保证不可变的逻辑。我们使用开源许可的区块链平台Hyperledger Fabric来实现区块链应用程序。我们还利用软件定义网络的灵活性和管理能力与提议的共享平台集成,以增强对系统威胁的防御视角。最后,以协作式DDoS攻击缓解作为案例研究来演示我们的方法。
{"title":"Collaborative Cyber Attack Defense in SDN Networks using Blockchain Technology","authors":"Mehrdad Hajizadeh, Nima Afraz, M. Ruffini, T. Bauschert","doi":"10.1109/NetSoft48620.2020.9165396","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165396","url":null,"abstract":"The legacy security defense mechanisms cannot resist where emerging sophisticated threats such as zero-day and malware campaigns have profoundly changed the dimensions of cyber-attacks. Recent studies indicate that cyber threat intelligence plays a crucial role in implementing proactive defense operations. It provides a knowledge-sharing platform that not only increases security awareness and readiness but also enables the collaborative defense to diminish the effectiveness of potential attacks. In this paper, we propose a secure distributed model to facilitate cyber threat intelligence sharing among diverse participants. The proposed model uses blockchain technology to assure tamper-proof record-keeping and smart contracts to guarantee immutable logic. We use an open-source permissioned blockchain platform, Hyperledger Fabric, to implement the blockchain application. We also utilize the flexibility and management capabilities of Software-Defined Networking to be integrated with the proposed sharing platform to enhance defense perspectives against threats in the system. In the end, collaborative DDoS attack mitigation is taken as a case study to demonstrate our approach.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128625342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Impact of Slice Granularity in Centralization Benefit of 5G Radio Access Network 切片粒度对5G无线接入网集中化效益的影响
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165366
Nabhasmita Sen, Antony A Franklin
5G Mobile network will reap the benefits from key technologies like Software Defined Networking and Network Function Virtualization. Cloud Radio Access Network architecture (Cloud RAN) is proven to be a promising architecture, but fully centralized Cloud RAN imposes a great bandwidth requirement in the fronthaul link. Different functional split options for 5G RAN have been proposed which lead to a trade-off between centralization and bandwidth requirement. Functional split at different granularity such as per cell, per logical network (slice), per user, or per bearer, have been an area of interest. To explore the effect of slice granularity in adaptive splits for slices, we formulate slice centric functional split in 5G RAN as an ILP to maximize centralization of baseband processing. By varying the slice granularity from macro slicing to micro slicing, we observe how slice centric split can impact centralization benefit of the network. We show that with increasing slice granularity slice centric split can render more centralization benefit in some scenarios but a trade off exists between centralization benefit and migration cost in the network which should be carefully considered in real deployment scenario.
5G移动网络将从软件定义网络和网络功能虚拟化等关键技术中获益。云无线接入网体系结构(Cloud RAN)被证明是一种很有前途的体系结构,但完全集中式的云无线接入网对前传链路的带宽要求很高。已经提出了5G RAN的不同功能拆分选项,导致在集中化和带宽需求之间进行权衡。以不同粒度(如每个单元、每个逻辑网络(片)、每个用户或每个承载者)进行功能拆分一直是一个令人感兴趣的领域。为了探索切片粒度对切片自适应分裂的影响,我们在5G RAN中制定了以切片为中心的功能分裂作为ILP,以最大限度地集中基带处理。通过改变从宏切片到微切片的切片粒度,我们观察了以切片为中心的分割如何影响网络的集中化效益。我们表明,随着切片粒度的增加,以切片为中心的分割在某些情况下可以提供更多的集中化好处,但在网络中的集中化好处和迁移成本之间存在权衡,这在实际部署场景中应该仔细考虑。
{"title":"Impact of Slice Granularity in Centralization Benefit of 5G Radio Access Network","authors":"Nabhasmita Sen, Antony A Franklin","doi":"10.1109/NetSoft48620.2020.9165366","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165366","url":null,"abstract":"5G Mobile network will reap the benefits from key technologies like Software Defined Networking and Network Function Virtualization. Cloud Radio Access Network architecture (Cloud RAN) is proven to be a promising architecture, but fully centralized Cloud RAN imposes a great bandwidth requirement in the fronthaul link. Different functional split options for 5G RAN have been proposed which lead to a trade-off between centralization and bandwidth requirement. Functional split at different granularity such as per cell, per logical network (slice), per user, or per bearer, have been an area of interest. To explore the effect of slice granularity in adaptive splits for slices, we formulate slice centric functional split in 5G RAN as an ILP to maximize centralization of baseband processing. By varying the slice granularity from macro slicing to micro slicing, we observe how slice centric split can impact centralization benefit of the network. We show that with increasing slice granularity slice centric split can render more centralization benefit in some scenarios but a trade off exists between centralization benefit and migration cost in the network which should be carefully considered in real deployment scenario.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"5 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131746489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 6th IEEE Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1