首页 > 最新文献

2020 6th IEEE Conference on Network Softwarization (NetSoft)最新文献

英文 中文
Cloud-Native Threat Detection and Containment for Smart Manufacturing 面向智能制造的云原生威胁检测和遏制
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165321
M. Müller, D. Behnke, Patrick-Benjamin Bök, Stefan Schneider, Manuel Peuster, H. Karl
Softwarization facilitates the introduction of smart manufacturing applications in the industry. Manifold devices such as machine computers, Industrial IoT devices, tablets, smartphones and smart glasses are integrated into factory networks to enable shop floor digitalization and big data analysis. To handle the increasing number of devices and the resulting traffic, a flexible and scalable factory network is necessary which can be realized using softwarization technologies like Network Function Virtualization (NFV). However, the security risks increase with the increasing number of new devices, so that cyber security must also be considered in NFV-based networks. Therefore, extending our previous work, we showcase threat detection using a cloud-native NFV-driven intrusion detection system (IDS) that is integrated in our industrial-specific network services. As a result of the threat detection, the affected network service is put into quarantine via automatic network reconfiguration. We use the 5GTANGO service platform to deploy our developed network services on Kubernetes and to initiate the network reconfiguration. Our focus is on demonstrating the automatic network reconfiguration that is triggered by the IDS.
软件化有助于在行业中引入智能制造应用。机器计算机、工业物联网设备、平板电脑、智能手机和智能眼镜等多种设备被集成到工厂网络中,以实现车间数字化和大数据分析。为了处理越来越多的设备和由此产生的流量,一个灵活的、可扩展的工厂网络是必要的,这可以使用网络功能虚拟化(NFV)等软件技术来实现。但是,随着新设备数量的增加,安全风险也在增加,因此基于nfv的网络也必须考虑网络安全问题。因此,我们扩展了之前的工作,展示了使用云原生nfv驱动的入侵检测系统(IDS)进行威胁检测,该系统集成在我们的工业特定网络服务中。检测到威胁后,通过自动网络重新配置将受影响的网络服务隔离。我们使用5GTANGO服务平台在Kubernetes上部署我们开发的网络服务,并启动网络重构。我们的重点是演示由IDS触发的自动网络重新配置。
{"title":"Cloud-Native Threat Detection and Containment for Smart Manufacturing","authors":"M. Müller, D. Behnke, Patrick-Benjamin Bök, Stefan Schneider, Manuel Peuster, H. Karl","doi":"10.1109/NetSoft48620.2020.9165321","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165321","url":null,"abstract":"Softwarization facilitates the introduction of smart manufacturing applications in the industry. Manifold devices such as machine computers, Industrial IoT devices, tablets, smartphones and smart glasses are integrated into factory networks to enable shop floor digitalization and big data analysis. To handle the increasing number of devices and the resulting traffic, a flexible and scalable factory network is necessary which can be realized using softwarization technologies like Network Function Virtualization (NFV). However, the security risks increase with the increasing number of new devices, so that cyber security must also be considered in NFV-based networks. Therefore, extending our previous work, we showcase threat detection using a cloud-native NFV-driven intrusion detection system (IDS) that is integrated in our industrial-specific network services. As a result of the threat detection, the affected network service is put into quarantine via automatic network reconfiguration. We use the 5GTANGO service platform to deploy our developed network services on Kubernetes and to initiate the network reconfiguration. Our focus is on demonstrating the automatic network reconfiguration that is triggered by the IDS.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134494861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attestation of Trusted and Reliable Service Function Chains in the ETSI-NFV Framework ETSI-NFV框架中可信和可靠服务功能链的认证
Pub Date : 2020-06-01 DOI: 10.1109/netsoft48620.2020.9165316
Antonio Suriano, D. Striccoli, G. Piro, Raffele Bolla, G. Boggia
The new generation of digital services are natively conceived as an ordered set of Virtual Network Functions, deployed across boundaries and organizations. In this context, security threats, variable network conditions, computational and memory capabilities and software vulnerabilities may significantly weaken the whole service chain, thus making very difficult to combat the newest kinds of attacks. It is thus extremely important to conceive a flexible (and standard-compliant) framework able to attest the trustworthiness and the reliability of each single function of a Service Function Chain. At the time of this writing, and to the best of authors knowledge, the scientific literature addressed all of these problems almost separately. To bridge this gap, this paper proposes a novel methodology, properly tailored within the ETSI-NFV framework. From one side, Software-Defined Controllers continuously monitor the properties and the performance indicators taken from networking domains of each single Virtual Network Function available in the architecture. From another side, a high-level orchestrator combines, on demand, the suitable Virtual Network Functions into a Service Function Chain, based on the user requests, targeted security requirements, and measured reliability levels. The paper concludes by further explaining the functionalities of the proposed architecture through a use case.
新一代的数字服务被视为一组有序的虚拟网络功能,可以跨边界和组织部署。在这种情况下,安全威胁、多变的网络条件、计算和存储能力以及软件漏洞可能会大大削弱整个服务链,从而使打击最新类型的攻击变得非常困难。因此,构思一个灵活的(并且符合标准的)框架来证明服务功能链的每个单个功能的可信性和可靠性是极其重要的。在撰写本文的时候,据作者所知,科学文献几乎分别讨论了所有这些问题。为了弥补这一差距,本文提出了一种新颖的方法,在ETSI-NFV框架内适当定制。一方面,软件定义控制器持续监控架构中可用的每个虚拟网络功能的网络域的属性和性能指标。从另一方面来看,高级编排器根据用户请求、目标安全需求和测量的可靠性级别,按需将合适的虚拟网络功能组合到一个服务功能链中。本文最后通过一个用例进一步解释了所建议的体系结构的功能。
{"title":"Attestation of Trusted and Reliable Service Function Chains in the ETSI-NFV Framework","authors":"Antonio Suriano, D. Striccoli, G. Piro, Raffele Bolla, G. Boggia","doi":"10.1109/netsoft48620.2020.9165316","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165316","url":null,"abstract":"The new generation of digital services are natively conceived as an ordered set of Virtual Network Functions, deployed across boundaries and organizations. In this context, security threats, variable network conditions, computational and memory capabilities and software vulnerabilities may significantly weaken the whole service chain, thus making very difficult to combat the newest kinds of attacks. It is thus extremely important to conceive a flexible (and standard-compliant) framework able to attest the trustworthiness and the reliability of each single function of a Service Function Chain. At the time of this writing, and to the best of authors knowledge, the scientific literature addressed all of these problems almost separately. To bridge this gap, this paper proposes a novel methodology, properly tailored within the ETSI-NFV framework. From one side, Software-Defined Controllers continuously monitor the properties and the performance indicators taken from networking domains of each single Virtual Network Function available in the architecture. From another side, a high-level orchestrator combines, on demand, the suitable Virtual Network Functions into a Service Function Chain, based on the user requests, targeted security requirements, and measured reliability levels. The paper concludes by further explaining the functionalities of the proposed architecture through a use case.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134621064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adaptive & Learning-aware Orchestration of Content Delivery Services 内容交付服务的自适应和学习意识编排
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165475
S. V. Rossem, Thomas Soenen, W. Tavernier, D. Colle, M. Pickavet, P. Demeester
Many media services undergo a varying workload, showing periodic usage patterns or unexpected traffic surges. As cloud and NFV services are increasingly softwarized, they enable a fully dynamic deployment and scaling behaviour. At the same time, there is an increasing need for fast and efficient mechanisms to allocate sufficient resources with the same elasticity, only when they are needed. This requires adequate performance models of the involved services, as well as awareness of those models in the involved orchestration machinery. In this paper we present how a scalable content delivery service can be deployed in a resource- and time-efficient manner, using adaptive machine learning models for performance profiling. We include orchestration mechanisms which are able to act upon the profiled knowledge in a dynamic manner. Using an offline profiled performance model of the service, we are able to optimize the online service orchestration, requiring fewer scaling iterations.
许多媒体服务经历不同的工作负载,显示出周期性的使用模式或意外的流量激增。随着云和NFV服务越来越多地被软件化,它们可以实现完全动态的部署和扩展行为。与此同时,越来越需要快速和有效的机制,以便只在需要时才以同样的弹性分配足够的资源。这需要所涉及的服务的充分的性能模型,以及在所涉及的编排机制中对这些模型的认识。在本文中,我们介绍了如何使用自适应机器学习模型进行性能分析,以资源和时间效率的方式部署可扩展的内容交付服务。我们包含了能够以动态方式作用于概要知识的编排机制。使用服务的离线性能模型,我们能够优化在线服务编排,需要更少的伸缩迭代。
{"title":"Adaptive & Learning-aware Orchestration of Content Delivery Services","authors":"S. V. Rossem, Thomas Soenen, W. Tavernier, D. Colle, M. Pickavet, P. Demeester","doi":"10.1109/NetSoft48620.2020.9165475","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165475","url":null,"abstract":"Many media services undergo a varying workload, showing periodic usage patterns or unexpected traffic surges. As cloud and NFV services are increasingly softwarized, they enable a fully dynamic deployment and scaling behaviour. At the same time, there is an increasing need for fast and efficient mechanisms to allocate sufficient resources with the same elasticity, only when they are needed. This requires adequate performance models of the involved services, as well as awareness of those models in the involved orchestration machinery. In this paper we present how a scalable content delivery service can be deployed in a resource- and time-efficient manner, using adaptive machine learning models for performance profiling. We include orchestration mechanisms which are able to act upon the profiled knowledge in a dynamic manner. Using an offline profiled performance model of the service, we are able to optimize the online service orchestration, requiring fewer scaling iterations.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"27 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133488201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Unified In-Network DDoS Detection and Mitigation Strategy 统一网络内DDoS检测与防范策略
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165336
Kurt Friday, Elie F. Kfoury, E. Bou-Harb, J. Crichigno
Distributed Denial of Service (DDoS) attacks have terrorized our networks for decades, and with attacks now reaching 1.7 Tbps, even the slightest latency in detection and subsequent remediation is enough to bring an entire network down. Though strides have been made to address such maliciousness within the context of Software Defined Networking (SDN), they have ultimately proven ineffective. Fortunately, P4 has recently emerged as a platform-agnostic language for programming the data plane and in turn allowing for customized protocols and packet processing. To this end, we propose a first-of-a-kind P4-based detection and mitigation scheme that will not only function as intended regardless of the size of the attack, but will also overcome the vulnerabilities of SDN that have characteristically been exploited by DDoS. Moreover, it successfully defends against the broad spectrum of currently relevant attacks while concurrently emphasizing the Quality of Service (QoS) of legitimate end-users and overall SDN functionality. We demonstrate the effectiveness of the proposed scheme using a software programmable P4-switch, namely, the Behavorial Model version 2 (BMv2), showing its ability to withstand a variety of DDoS attacks in real-time via three use cases that can be generalized to most contemporary attack vectors. Specifically, the results substantiate that the mechanism herein is orders of magnitude faster than traditional polling techniques (e.g., NetFlow or sFlow) while minimizing the impact on benign traffic. We concur that the approach's design particularities facilitate seamless and scalable deployments in high-speed networks requiring line-rate functionality, in addition to being generic enough to be integrated into viable network topologies.
分布式拒绝服务(DDoS)攻击已经威胁了我们的网络几十年,现在攻击达到1.7 Tbps,即使是最轻微的检测延迟和随后的修复也足以使整个网络崩溃。尽管在软件定义网络(SDN)的背景下解决此类恶意行为已经取得了进展,但它们最终被证明是无效的。幸运的是,P4最近已经成为一种平台无关的语言,用于对数据平面进行编程,从而允许自定义协议和数据包处理。为此,我们提出了一种首创的基于p4的检测和缓解方案,无论攻击的规模如何,该方案都将发挥预期的作用,而且还将克服典型的被DDoS利用的SDN漏洞。此外,它成功地防御了当前广泛的相关攻击,同时强调合法最终用户的服务质量(QoS)和整体SDN功能。我们使用软件可编程的p4交换机(即行为模型版本2 (BMv2))证明了所提出方案的有效性,通过三个可以推广到大多数当代攻击向量的用例,展示了其实时抵御各种DDoS攻击的能力。具体来说,结果证实了这里的机制比传统的轮询技术(例如NetFlow或sFlow)快几个数量级,同时最大限度地减少了对良性流量的影响。我们同意,该方法的设计特点有助于在需要线速功能的高速网络中实现无缝和可扩展的部署,此外还具有足够的通用性,可以集成到可行的网络拓扑中。
{"title":"Towards a Unified In-Network DDoS Detection and Mitigation Strategy","authors":"Kurt Friday, Elie F. Kfoury, E. Bou-Harb, J. Crichigno","doi":"10.1109/NetSoft48620.2020.9165336","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165336","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks have terrorized our networks for decades, and with attacks now reaching 1.7 Tbps, even the slightest latency in detection and subsequent remediation is enough to bring an entire network down. Though strides have been made to address such maliciousness within the context of Software Defined Networking (SDN), they have ultimately proven ineffective. Fortunately, P4 has recently emerged as a platform-agnostic language for programming the data plane and in turn allowing for customized protocols and packet processing. To this end, we propose a first-of-a-kind P4-based detection and mitigation scheme that will not only function as intended regardless of the size of the attack, but will also overcome the vulnerabilities of SDN that have characteristically been exploited by DDoS. Moreover, it successfully defends against the broad spectrum of currently relevant attacks while concurrently emphasizing the Quality of Service (QoS) of legitimate end-users and overall SDN functionality. We demonstrate the effectiveness of the proposed scheme using a software programmable P4-switch, namely, the Behavorial Model version 2 (BMv2), showing its ability to withstand a variety of DDoS attacks in real-time via three use cases that can be generalized to most contemporary attack vectors. Specifically, the results substantiate that the mechanism herein is orders of magnitude faster than traditional polling techniques (e.g., NetFlow or sFlow) while minimizing the impact on benign traffic. We concur that the approach's design particularities facilitate seamless and scalable deployments in high-speed networks requiring line-rate functionality, in addition to being generic enough to be integrated into viable network topologies.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Reinforcement Learning for Attack Mitigation in SDN-enabled Networks 在支持sdn的网络中用于缓解攻击的强化学习
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165383
M. Zolotukhin, Sanjay Kumar, T. Hämäläinen
With the recent progress in the development of low-budget sensors and machine-to-machine communication, the Internet-of-Things has attracted considerable attention. Unfortunately, many of today's smart devices are rushed to market with little consideration for basic security and privacy protection making them easy targets for various attacks. Unfortunately, organizations and network providers use mostly manual workflows to address malware-related incidents and therefore they are able to prevent neither attack damage nor potential attacks in the future. Thus, there is a need for a defense system that would not only detect an intrusion on time, but also would make the most optimal real-time crisis-action decision on how the network security policy should be modified in order to mitigate the threat. In this study, we are aiming to reach this goal relying on advanced technologies that have recently emerged in the area of cloud computing and network virtualization. We are proposing an intelligent defense system implemented as a reinforcement machine learning agent that processes current network state and takes a set of necessary actions in form of software-defined networking flows to redirect certain network traffic to virtual appliances. We also implement a proof-of-concept of the system and evaluate a couple of state-of-art reinforcement learning algorithms for mitigating three basic network attacks against a small realistic network environment.
随着近年来低成本传感器和机器对机器通信的发展,物联网引起了人们的广泛关注。不幸的是,今天的许多智能设备匆忙推向市场,几乎没有考虑到基本的安全和隐私保护,这使得它们很容易成为各种攻击的目标。不幸的是,组织和网络提供商大多使用手动工作流来处理与恶意软件相关的事件,因此他们既不能防止攻击损害,也不能防止未来的潜在攻击。因此,需要一种防御系统,它不仅能及时检测入侵,而且还能就如何修改网络安全策略以减轻威胁做出最优的实时危机行动决策。在这项研究中,我们的目标是依靠最近在云计算和网络虚拟化领域出现的先进技术来实现这一目标。我们提出了一种智能防御系统,作为强化机器学习代理实现,它处理当前网络状态,并以软件定义的网络流的形式采取一组必要的行动,将某些网络流量重定向到虚拟设备。我们还实现了系统的概念验证,并评估了几种最先进的强化学习算法,以减轻针对小型现实网络环境的三种基本网络攻击。
{"title":"Reinforcement Learning for Attack Mitigation in SDN-enabled Networks","authors":"M. Zolotukhin, Sanjay Kumar, T. Hämäläinen","doi":"10.1109/NetSoft48620.2020.9165383","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165383","url":null,"abstract":"With the recent progress in the development of low-budget sensors and machine-to-machine communication, the Internet-of-Things has attracted considerable attention. Unfortunately, many of today's smart devices are rushed to market with little consideration for basic security and privacy protection making them easy targets for various attacks. Unfortunately, organizations and network providers use mostly manual workflows to address malware-related incidents and therefore they are able to prevent neither attack damage nor potential attacks in the future. Thus, there is a need for a defense system that would not only detect an intrusion on time, but also would make the most optimal real-time crisis-action decision on how the network security policy should be modified in order to mitigate the threat. In this study, we are aiming to reach this goal relying on advanced technologies that have recently emerged in the area of cloud computing and network virtualization. We are proposing an intelligent defense system implemented as a reinforcement machine learning agent that processes current network state and takes a set of necessary actions in form of software-defined networking flows to redirect certain network traffic to virtual appliances. We also implement a proof-of-concept of the system and evaluate a couple of state-of-art reinforcement learning algorithms for mitigating three basic network attacks against a small realistic network environment.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116109844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Towards Cross-Slice Communication for Enhanced Service Delivery at the Network Edge 面向网络边缘增强业务交付的横片通信
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165442
Ioakeim Fotoglou, George Papathanail, Angelos Pentelas, Panagiotis Papadimitriou, V. Theodorou, Dimitrios Dechouniotis, S. Papavassiliou
The increasing resource demand and diversity of network services is taken under serious consideration by the various stakeholders, driving the architecture design of 5G (and beyond) networks. Network slicing, as a prominent aspect of next-generation network architectures, aims at satisfying the diverse service requirements in terms of throughput, latency, reliability, and/or security. However, the prevailing way of slice provisioning, i.e., in the form of isolated bundles of computing, storage, and network resources, makes cross-slice communication inefficient, especially at the network edge. This inevitably hinders opportunities for Business-to-Business (B2B) synergies at the event of service co-location. In this paper, we study this novel aspect of network slicing, i.e., cross-slice communication (CSC). We particularly promote a form of optimized CSC, at which two co-located slices can establish peering in a secure and controlled manner, by confining peering traffic within the boundaries of the datacenter, while still preserving the important aspect of resource isolation. Such optimized CSC can foster synergies between service providers without additional latency or traffic in the backhaul/transport network. In this context, we investigate various ways to establish optimized CSC at edge computing infrastructures, based on functionalities offered by state-of-the-art management and orchestration (MANO) frameworks, such as OpenSourceMANO.
不断增长的资源需求和网络服务的多样性被各个利益相关者认真考虑,推动了5G(及以后)网络的架构设计。网络切片是下一代网络架构的一个重要方面,它旨在满足吞吐量、延迟、可靠性和/或安全性方面的不同业务需求。然而,切片供应的主流方式,即以孤立的计算、存储和网络资源束的形式,使得跨片通信效率低下,特别是在网络边缘。这不可避免地阻碍了在服务托管时企业对企业(B2B)协同作用的机会。在本文中,我们研究了网络切片的这个新方面,即交叉切片通信(CSC)。我们特别推荐一种优化的CSC形式,其中两个位于同一位置的片可以通过将对等流量限制在数据中心的边界内,同时仍然保留资源隔离的重要方面,以安全和受控的方式建立对等。这种优化的CSC可以促进服务提供商之间的协同作用,而不会在回程/传输网络中增加额外的延迟或流量。在此背景下,我们研究了在边缘计算基础设施中建立优化CSC的各种方法,这些方法基于最先进的管理和编排(MANO)框架(如OpenSourceMANO)提供的功能。
{"title":"Towards Cross-Slice Communication for Enhanced Service Delivery at the Network Edge","authors":"Ioakeim Fotoglou, George Papathanail, Angelos Pentelas, Panagiotis Papadimitriou, V. Theodorou, Dimitrios Dechouniotis, S. Papavassiliou","doi":"10.1109/NetSoft48620.2020.9165442","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165442","url":null,"abstract":"The increasing resource demand and diversity of network services is taken under serious consideration by the various stakeholders, driving the architecture design of 5G (and beyond) networks. Network slicing, as a prominent aspect of next-generation network architectures, aims at satisfying the diverse service requirements in terms of throughput, latency, reliability, and/or security. However, the prevailing way of slice provisioning, i.e., in the form of isolated bundles of computing, storage, and network resources, makes cross-slice communication inefficient, especially at the network edge. This inevitably hinders opportunities for Business-to-Business (B2B) synergies at the event of service co-location. In this paper, we study this novel aspect of network slicing, i.e., cross-slice communication (CSC). We particularly promote a form of optimized CSC, at which two co-located slices can establish peering in a secure and controlled manner, by confining peering traffic within the boundaries of the datacenter, while still preserving the important aspect of resource isolation. Such optimized CSC can foster synergies between service providers without additional latency or traffic in the backhaul/transport network. In this context, we investigate various ways to establish optimized CSC at edge computing infrastructures, based on functionalities offered by state-of-the-art management and orchestration (MANO) frameworks, such as OpenSourceMANO.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":" 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120932091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Performance Modelling Approach for SLA-Aware Resource Recommendation in Cloud Native Network Functions 云原生网络功能中sla感知资源推荐的性能建模方法
Pub Date : 2020-06-01 DOI: 10.1109/netsoft48620.2020.9165482
Michel Gokan Khan, J. Taheri, M. Khoshkholghi, A. Kassler, Carolyn Cartwright, M. Darula, Shuiguang Deng
Network Function Virtualization (NFV) becomes the primary driver for the evolution of 5G networks, and in recent years, Network Function Cloudification (NFC) proved to be an inevitable part of this evolution. Microservice architecture also becomes the de facto choice for designing a modern Cloud Native Network Function (CNF) due to its ability to decouple components of each CNF into multiple independently manageable microservices. Even though taking advantage of microservice architecture in designing CNFs solves specific problems, this additional granularity makes estimating resource requirements for a Production Environment (PE) a complex task and sometimes leads to an over-provisioned PE. Traditionally, performance engineers dimension each CNF within a Service Function Chain (SFC) in a smaller Performance Testing Environment (PTE) through a series of performance benchmarks. Then, considering the Quality of Service (QoS) constraints of a Service Provider (SP) that are guaranteed in the Service Level Agreement (SLA), they estimate the required resources to set up the PE. In this paper, we used a machine learning approach to model the impact of each microservice's resource configuration (i.e., CPU and memory) on the QoS metrics (i.e. serving throughput and latency) of each SFC in a PTE. Then, considering an SP's Service Level Objectives (SLO), we proposed an algorithm to predict each microservice's resource capacities in a PE. We evaluated the accuracy of our prediction on a prototype of a cloud native 5G Home Subscriber Server (HSS). Our model showed 95%-78% accuracy in a PE that has 2–5 times more computing resources than the PTE.
网络功能虚拟化(NFV)成为5G网络演进的主要驱动力,近年来,网络功能云化(NFC)被证明是这一演进的必然组成部分。微服务架构也成为设计现代云原生网络功能(CNF)的事实上的选择,因为它能够将每个CNF的组件解耦成多个独立可管理的微服务。尽管在设计cnf时利用微服务架构可以解决特定问题,但这种额外的粒度使得估计生产环境(PE)的资源需求成为一项复杂的任务,有时还会导致PE供应过剩。传统上,性能工程师在较小的性能测试环境(PTE)中通过一系列性能基准对服务功能链(SFC)中的每个CNF进行维度分析。然后,考虑服务水平协议(SLA)中保证的服务提供者(SP)的服务质量(QoS)约束,他们估计建立PE所需的资源。在本文中,我们使用机器学习方法来建模每个微服务的资源配置(即CPU和内存)对PTE中每个SFC的QoS指标(即服务吞吐量和延迟)的影响,然后,考虑SP的服务水平目标(SLO),我们提出了一种算法来预测PE中每个微服务的资源容量。我们在云原生5G家庭用户服务器(HSS)的原型上评估了我们预测的准确性。我们的模型显示,在计算资源比PTE多2-5倍的PE中,准确率为95%-78%。
{"title":"A Performance Modelling Approach for SLA-Aware Resource Recommendation in Cloud Native Network Functions","authors":"Michel Gokan Khan, J. Taheri, M. Khoshkholghi, A. Kassler, Carolyn Cartwright, M. Darula, Shuiguang Deng","doi":"10.1109/netsoft48620.2020.9165482","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165482","url":null,"abstract":"Network Function Virtualization (NFV) becomes the primary driver for the evolution of 5G networks, and in recent years, Network Function Cloudification (NFC) proved to be an inevitable part of this evolution. Microservice architecture also becomes the de facto choice for designing a modern Cloud Native Network Function (CNF) due to its ability to decouple components of each CNF into multiple independently manageable microservices. Even though taking advantage of microservice architecture in designing CNFs solves specific problems, this additional granularity makes estimating resource requirements for a Production Environment (PE) a complex task and sometimes leads to an over-provisioned PE. Traditionally, performance engineers dimension each CNF within a Service Function Chain (SFC) in a smaller Performance Testing Environment (PTE) through a series of performance benchmarks. Then, considering the Quality of Service (QoS) constraints of a Service Provider (SP) that are guaranteed in the Service Level Agreement (SLA), they estimate the required resources to set up the PE. In this paper, we used a machine learning approach to model the impact of each microservice's resource configuration (i.e., CPU and memory) on the QoS metrics (i.e. serving throughput and latency) of each SFC in a PTE. Then, considering an SP's Service Level Objectives (SLO), we proposed an algorithm to predict each microservice's resource capacities in a PE. We evaluated the accuracy of our prediction on a prototype of a cloud native 5G Home Subscriber Server (HSS). Our model showed 95%-78% accuracy in a PE that has 2–5 times more computing resources than the PTE.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128935273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Pythia: Scheduling of Concurrent Network Packet Processing Applications on Heterogeneous Devices 异构设备上并发网络包处理应用程序的调度
Pub Date : 2020-06-01 DOI: 10.1109/netsoft48620.2020.9165447
Giannis Giakoumakis, Eva Papadogiannaki, G. Vasiliadis, S. Ioannidis
Modern commodity computing systems are composed of a number of heterogeneous processing units, each one with its own unique performance and energy characteristics. However, the majority of current network packet processing frameworks targets only one device (either the CPU or an accelerator), leaving the remaining computational resources underutilized or even idle. In this paper, we propose an adaptive scheduling approach for network packet processing applications that exploits any heterogeneous architecture that can be found in a commodity high-end hardware setup. Our scheduler not only distributes the workloads to the appropriate devices in the system to achieve the desired performance results, but also enables the multiplexing of diverse, concurrently executed network packet processing applications, eliminating the interference effects introduced at run-time. The evaluation results show that our scheduler is able to tackle any interference in the shared hardware resources as well to respond quickly to dynamic fluctuations (e.g., application overloads, traffic bursts, infrastructural changes, etc.) that may occur at real time.
现代商用计算系统由许多异构处理单元组成,每个处理单元都有自己独特的性能和能量特征。然而,当前大多数网络数据包处理框架只针对一个设备(CPU或加速器),使得剩余的计算资源未得到充分利用甚至闲置。在本文中,我们为网络数据包处理应用程序提出了一种自适应调度方法,该方法利用了在商品高端硬件设置中可以找到的任何异构架构。我们的调度器不仅将工作负载分配到系统中的适当设备上,以实现期望的性能结果,而且还支持多种并发执行的网络数据包处理应用程序的多路复用,从而消除了在运行时引入的干扰影响。评估结果表明,我们的调度器能够处理共享硬件资源中的任何干扰,并能够快速响应可能实时发生的动态波动(例如,应用程序过载、流量突发、基础设施更改等)。
{"title":"Pythia: Scheduling of Concurrent Network Packet Processing Applications on Heterogeneous Devices","authors":"Giannis Giakoumakis, Eva Papadogiannaki, G. Vasiliadis, S. Ioannidis","doi":"10.1109/netsoft48620.2020.9165447","DOIUrl":"https://doi.org/10.1109/netsoft48620.2020.9165447","url":null,"abstract":"Modern commodity computing systems are composed of a number of heterogeneous processing units, each one with its own unique performance and energy characteristics. However, the majority of current network packet processing frameworks targets only one device (either the CPU or an accelerator), leaving the remaining computational resources underutilized or even idle. In this paper, we propose an adaptive scheduling approach for network packet processing applications that exploits any heterogeneous architecture that can be found in a commodity high-end hardware setup. Our scheduler not only distributes the workloads to the appropriate devices in the system to achieve the desired performance results, but also enables the multiplexing of diverse, concurrently executed network packet processing applications, eliminating the interference effects introduced at run-time. The evaluation results show that our scheduler is able to tackle any interference in the shared hardware resources as well to respond quickly to dynamic fluctuations (e.g., application overloads, traffic bursts, infrastructural changes, etc.) that may occur at real time.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enabling Autonomous and Connected Vehicles at the 5G Network Edge 在5G网络边缘实现自动驾驶和联网汽车
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165444
Estefanía Coronado, G. Cebrián-Márquez, R. Riggio
Connected and automated vehicles currently rely on on-board resources to implement autonomous functions, leaving the mobile network for non-mission-critical applications. At the same time, the ultra-low latency, the increased bandwidth, and the softwarization and virtualization technologies of 5G systems are opening the door to multiple applications in the context of connected and automated vehicles. The deployment of applications at the edge of the mobile network under the Multi-access Edge Computing (MEC) paradigm becomes an excellent option for meeting the latency requirements imposed by connected mobility. In this context, this demonstration showcases how remote and autonomous driving applications, such as lane tracking and object detection, can be offloaded to a MEC-enabled 5G network without impairing their effectiveness, and the change in the latency perceived by end-users with respect to a cloud deployment.
目前,联网和自动驾驶汽车依赖车载资源来实现自主功能,将移动网络留给非关键任务应用。与此同时,5G系统的超低延迟、增加的带宽以及软件化和虚拟化技术为联网和自动驾驶汽车的多种应用打开了大门。在多接入边缘计算(MEC)范式下,在移动网络边缘部署应用程序成为满足连接移动性所带来的延迟要求的绝佳选择。在这种情况下,本演示展示了如何将远程和自动驾驶应用(如车道跟踪和目标检测)卸载到支持mec的5G网络上,而不会影响其有效性,以及最终用户在云部署方面感知到的延迟变化。
{"title":"Enabling Autonomous and Connected Vehicles at the 5G Network Edge","authors":"Estefanía Coronado, G. Cebrián-Márquez, R. Riggio","doi":"10.1109/NetSoft48620.2020.9165444","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165444","url":null,"abstract":"Connected and automated vehicles currently rely on on-board resources to implement autonomous functions, leaving the mobile network for non-mission-critical applications. At the same time, the ultra-low latency, the increased bandwidth, and the softwarization and virtualization technologies of 5G systems are opening the door to multiple applications in the context of connected and automated vehicles. The deployment of applications at the edge of the mobile network under the Multi-access Edge Computing (MEC) paradigm becomes an excellent option for meeting the latency requirements imposed by connected mobility. In this context, this demonstration showcases how remote and autonomous driving applications, such as lane tracking and object detection, can be offloaded to a MEC-enabled 5G network without impairing their effectiveness, and the change in the latency perceived by end-users with respect to a cloud deployment.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131734838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Machine Learning Approaches to Early Fault Detection and Identification in NFV Architectures NFV架构中早期故障检测与识别的机器学习方法
Pub Date : 2020-06-01 DOI: 10.1109/NetSoft48620.2020.9165361
Arij Elmajed, A. Aghasaryan, É. Fabre
Virtualization technologies become pervasive in networking, as a way to better exploit hardware capabilities and to quickly deploy tailored networking solutions for customers. But these new programmability abilities of networks also come with new management challenges: it is critical to quickly detect performance degradation, before they impact Quality of Service (QoS) or produce outages and alarms, as this takes part in the closed loop that adapts resources to services. This paper addresses the early detection, localization and identification of faults, before alarms are produced. We rely on the abundance of metrics available on virtualized networks, and explore various data preprocessing and classification techniques. As all Machine Learning approaches must be fed with large datasets, we turn to our advantage the softwarization of networks: one can easily deploy in a cloud the very same software that is used in production, and analyze its behaviour under stress, by fault injection.
作为一种更好地利用硬件功能并为客户快速部署定制的网络解决方案的方法,虚拟化技术在网络中变得非常普遍。但是,网络的这些新的可编程能力也带来了新的管理挑战:在性能下降影响服务质量(QoS)或产生中断和警报之前,快速检测性能下降是至关重要的,因为这是使资源适应服务的闭环的一部分。本文讨论了在产生告警之前,对故障的早期检测、定位和识别。我们依赖于虚拟化网络上可用的大量指标,并探索各种数据预处理和分类技术。由于所有机器学习方法都必须使用大型数据集,我们将网络的软件化转化为我们的优势:人们可以轻松地在云中部署生产中使用的相同软件,并通过故障注入分析其在压力下的行为。
{"title":"Machine Learning Approaches to Early Fault Detection and Identification in NFV Architectures","authors":"Arij Elmajed, A. Aghasaryan, É. Fabre","doi":"10.1109/NetSoft48620.2020.9165361","DOIUrl":"https://doi.org/10.1109/NetSoft48620.2020.9165361","url":null,"abstract":"Virtualization technologies become pervasive in networking, as a way to better exploit hardware capabilities and to quickly deploy tailored networking solutions for customers. But these new programmability abilities of networks also come with new management challenges: it is critical to quickly detect performance degradation, before they impact Quality of Service (QoS) or produce outages and alarms, as this takes part in the closed loop that adapts resources to services. This paper addresses the early detection, localization and identification of faults, before alarms are produced. We rely on the abundance of metrics available on virtualized networks, and explore various data preprocessing and classification techniques. As all Machine Learning approaches must be fed with large datasets, we turn to our advantage the softwarization of networks: one can easily deploy in a cloud the very same software that is used in production, and analyze its behaviour under stress, by fault injection.","PeriodicalId":239961,"journal":{"name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133912743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2020 6th IEEE Conference on Network Softwarization (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1