首页 > 最新文献

10th International Conference on Network and Service Management (CNSM) and Workshop最新文献

英文 中文
PhishScore: Hacking phishers' minds PhishScore:黑客钓鱼者的思想
Samuel Marchal, J. François, R. State, T. Engel
Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due to the short lifetime of phishing Web sites, making recent approaches relying on real-time or proactive phishing URLs detection techniques more appropriate. In this paper we introduce PhishScore, an automated real-time phishing detection system. We observed that phishing URLs usually have few relationships between the part of the URL that must be registered (upper level domain) and the remaining part of the URL (low level domain, path, query). Hence, we define this concept as intra-URL relatedness and evaluate it using features extracted from words that compose a URL based on query data from Google and Yahoo search engines. These features are then used in machine learning based classification to detect phishing URLs from a real dataset.
尽管预防技术不断发展,但网络钓鱼仍然是一个重要的威胁,因为使用的主要对策仍然是基于响应性URL黑名单。由于网络钓鱼网站的生命周期很短,这种技术效率很低,因此依赖于实时或主动网络钓鱼url检测技术的最新方法更合适。本文介绍了一个自动实时网络钓鱼检测系统PhishScore。我们观察到,网络钓鱼URL通常在必须注册的URL部分(高级域名)和URL的其余部分(低级域名、路径、查询)之间没有多少关系。因此,我们将这个概念定义为URL内相关性,并根据b谷歌和Yahoo搜索引擎的查询数据,使用从组成URL的单词中提取的特征来评估它。然后将这些特征用于基于机器学习的分类中,以从真实数据集中检测网络钓鱼url。
{"title":"PhishScore: Hacking phishers' minds","authors":"Samuel Marchal, J. François, R. State, T. Engel","doi":"10.1109/CNSM.2014.7014140","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014140","url":null,"abstract":"Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due to the short lifetime of phishing Web sites, making recent approaches relying on real-time or proactive phishing URLs detection techniques more appropriate. In this paper we introduce PhishScore, an automated real-time phishing detection system. We observed that phishing URLs usually have few relationships between the part of the URL that must be registered (upper level domain) and the remaining part of the URL (low level domain, path, query). Hence, we define this concept as intra-URL relatedness and evaluate it using features extracted from words that compose a URL based on query data from Google and Yahoo search engines. These features are then used in machine learning based classification to detect phishing URLs from a real dataset.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115239341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
4M-Switch: Multi-mode-multi-model supervisory control framework for performance differentiation in virtual machine environments 4M-Switch:多模式-多模型监控框架,用于虚拟机环境中的性能差异
Tharindu Patikirikorala, A. Colman, Jun Han
When resources are shared in a virtual machine environment, providing different performance levels to different customer applications is a challenging task. In order to sustain stability, the control solution not only has to take into account the time-based dynamics, but also has to adapt to various operating modes. This paper proposes the 4M-Switch supervisory control system design framework, which takes into account the possible operating modes and dimension changes of the VM environment at design time and then adapts the control solution to achieve required management goals when changes occur at runtime. 4M-Switch utilizes a piece-wise linear modeling approach to present the behavior of the system using multiple models and simple switching logic to change the controller parameters to mitigate the effects of nonlinearities. The experiment results conducted under a range of conditions show that 4M-Switch approach effectively adapts the control solution and provides significantly more stable performance differentiation compared to the existing approaches.
当资源在虚拟机环境中共享时,为不同的客户应用程序提供不同的性能级别是一项具有挑战性的任务。为了保持稳定性,控制方案不仅要考虑到基于时间的动力学,而且要适应各种运行模式。本文提出了4M-Switch监控系统设计框架,该框架在设计时考虑到虚拟机环境可能的运行模式和维度变化,在运行时发生变化时对控制方案进行调整,以实现所需的管理目标。4M-Switch利用分段线性建模方法来呈现系统的行为,使用多个模型和简单的切换逻辑来改变控制器参数,以减轻非线性的影响。在一系列条件下进行的实验结果表明,与现有方法相比,4M-Switch方法有效地适应了控制方案,并提供了更稳定的性能差异。
{"title":"4M-Switch: Multi-mode-multi-model supervisory control framework for performance differentiation in virtual machine environments","authors":"Tharindu Patikirikorala, A. Colman, Jun Han","doi":"10.1109/CNSM.2014.7014151","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014151","url":null,"abstract":"When resources are shared in a virtual machine environment, providing different performance levels to different customer applications is a challenging task. In order to sustain stability, the control solution not only has to take into account the time-based dynamics, but also has to adapt to various operating modes. This paper proposes the 4M-Switch supervisory control system design framework, which takes into account the possible operating modes and dimension changes of the VM environment at design time and then adapts the control solution to achieve required management goals when changes occur at runtime. 4M-Switch utilizes a piece-wise linear modeling approach to present the behavior of the system using multiple models and simple switching logic to change the controller parameters to mitigate the effects of nonlinearities. The experiment results conducted under a range of conditions show that 4M-Switch approach effectively adapts the control solution and provides significantly more stable performance differentiation compared to the existing approaches.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131763385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dynamic resource management in SDN-based virtualized networks 基于sdn的虚拟化网络中的动态资源管理
Rashid Mijumbi, J. Serrat, J. Rubio-Loyola, N. Bouten, F. Turck, Steven Latré
Network virtualization allows for an abstraction between user and physical resources by letting a given physical infrastructure to be shared by multiple service providers. However, network virtualization presents some challenges, such as, efficient resource management, fast provisioning and scalability. By separating a network's control logic from the underlying routers and switches, software defined networking (SDN) promises an unprecedented simplification in network programmability, management and innovation by service providers, and hence, its control model presents itself as a candidate solution to the challenges in network virtualization. In this paper, we use the SDN control plane to efficiently manage resources in virtualized networks by dynamically adjusting the virtual network (VN) to substrate network (SN) mappings based on network status. We extend an SDN controller to monitor the resource utilisation of VNs, as well as the average loading of SN links and switches, and use this information to proactively add or remove flow rules from the switches. Simulations show that, compared with three state-of-art approaches, our proposal improves the VN acceptance ratio by about 40% and reduces VN resource costs by over 10%.
网络虚拟化允许多个服务提供者共享给定的物理基础设施,从而实现用户和物理资源之间的抽象。然而,网络虚拟化带来了一些挑战,如高效的资源管理、快速的供应和可伸缩性。通过将网络的控制逻辑与底层路由器和交换机分离,软件定义网络(SDN)承诺在网络可编程性、管理和服务提供商的创新方面实现前所未有的简化,因此,它的控制模型作为应对网络虚拟化挑战的候选解决方案呈现出来。在本文中,我们利用SDN控制平面根据网络状态动态调整虚拟网络(VN)到底层网络(SN)的映射,从而有效地管理虚拟化网络中的资源。我们扩展了SDN控制器来监控vn的资源利用率,以及SN链路和交换机的平均负载,并使用这些信息主动添加或删除交换机上的流规则。仿真结果表明,与三种最先进的方法相比,我们的方法将VN接受率提高了约40%,将VN资源成本降低了10%以上。
{"title":"Dynamic resource management in SDN-based virtualized networks","authors":"Rashid Mijumbi, J. Serrat, J. Rubio-Loyola, N. Bouten, F. Turck, Steven Latré","doi":"10.1109/CNSM.2014.7014204","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014204","url":null,"abstract":"Network virtualization allows for an abstraction between user and physical resources by letting a given physical infrastructure to be shared by multiple service providers. However, network virtualization presents some challenges, such as, efficient resource management, fast provisioning and scalability. By separating a network's control logic from the underlying routers and switches, software defined networking (SDN) promises an unprecedented simplification in network programmability, management and innovation by service providers, and hence, its control model presents itself as a candidate solution to the challenges in network virtualization. In this paper, we use the SDN control plane to efficiently manage resources in virtualized networks by dynamically adjusting the virtual network (VN) to substrate network (SN) mappings based on network status. We extend an SDN controller to monitor the resource utilisation of VNs, as well as the average loading of SN links and switches, and use this information to proactively add or remove flow rules from the switches. Simulations show that, compared with three state-of-art approaches, our proposal improves the VN acceptance ratio by about 40% and reduces VN resource costs by over 10%.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126727622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Scheduled sampling for robust sensing 鲁棒传感的定时采样
Noura Limam, Malek Naouach
We consider the problem of optimizing the sensing strategy of a monitoring system in the presence of faulty sensors. We develop ORSg, an efficient data-driven algorithm for computing sampling strategies that nearly maximize the submodular utility of sensing with only a fraction of active and fault-prone sensors. Our approach combines techniques from information theory, game theory and submodular optimization. We empirically evaluate our algorithm with a real-world sensing scenario.
研究了存在故障传感器的监测系统的传感策略优化问题。我们开发了ORSg,这是一种高效的数据驱动算法,用于计算采样策略,几乎最大化了仅使用一小部分有源和易故障传感器的传感的子模块效用。我们的方法结合了信息论、博弈论和子模块优化技术。我们用现实世界的传感场景对我们的算法进行了经验评估。
{"title":"Scheduled sampling for robust sensing","authors":"Noura Limam, Malek Naouach","doi":"10.1109/CNSM.2014.7014163","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014163","url":null,"abstract":"We consider the problem of optimizing the sensing strategy of a monitoring system in the presence of faulty sensors. We develop ORSg, an efficient data-driven algorithm for computing sampling strategies that nearly maximize the submodular utility of sensing with only a fraction of active and fault-prone sensors. Our approach combines techniques from information theory, game theory and submodular optimization. We empirically evaluate our algorithm with a real-world sensing scenario.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a virtualization-based control language for SDN platforms 面向SDN平台的虚拟化控制语言
M. Aouadj, E. Lavinal, T. Desprats, M. Sibilla
Software defined networking (SDN) approaches rely on control languages to programmatically express the desired network behavior. Several SDN control languages use network virtualization to abstract the complex and dynamic nature of the physical infrastructure. However, almost all these languages use the same network abstraction model, which we believe is not the most appropriate one for expressing flexible and reusable network control policies. This paper presents work in progress towards a new high-level virtualization-based control language for SDN platforms. The main novelty of this language is to integrate a network abstraction model that explicitly identifies two kinds of virtual units: i) Fabrics to abstract packet transport functions and ii) Edges to abstract richer networking functions. We believe that this approach will allow network administrators to easily express modular and reusable network control policies independently of the underlying infrastructure.
软件定义网络(SDN)方法依赖于控制语言以编程方式表达期望的网络行为。一些SDN控制语言使用网络虚拟化来抽象物理基础设施的复杂性和动态性。然而,几乎所有这些语言都使用相同的网络抽象模型,我们认为这不是表达灵活和可重用的网络控制策略的最合适的模型。本文介绍了一种新的基于高级虚拟化的SDN平台控制语言。该语言的主要新颖之处在于集成了一个网络抽象模型,该模型明确地标识了两种虚拟单元:i)抽象数据包传输功能的fabric和ii)抽象更丰富的网络功能的edge。我们相信这种方法将允许网络管理员独立于底层基础设施轻松地表达模块化和可重用的网络控制策略。
{"title":"Towards a virtualization-based control language for SDN platforms","authors":"M. Aouadj, E. Lavinal, T. Desprats, M. Sibilla","doi":"10.1109/CNSM.2014.7014185","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014185","url":null,"abstract":"Software defined networking (SDN) approaches rely on control languages to programmatically express the desired network behavior. Several SDN control languages use network virtualization to abstract the complex and dynamic nature of the physical infrastructure. However, almost all these languages use the same network abstraction model, which we believe is not the most appropriate one for expressing flexible and reusable network control policies. This paper presents work in progress towards a new high-level virtualization-based control language for SDN platforms. The main novelty of this language is to integrate a network abstraction model that explicitly identifies two kinds of virtual units: i) Fabrics to abstract packet transport functions and ii) Edges to abstract richer networking functions. We believe that this approach will allow network administrators to easily express modular and reusable network control policies independently of the underlying infrastructure.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115442424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing application level elasticity and availability 管理应用程序级别的弹性和可用性
M. Toeroe, Neha Pawar, F. Khendek
Elasticity and availability are two features associated with the cloud. Existing solutions focus on providing both at the level of the virtual infrastructure through virtual machines (VMs), their restart, addition, and removal as needed. These assume a specific application design paradigm, which equates the application and its workload to the VM. High-availability applications are typically composed of redundant components that recover from failures through state-full failover orchestrated by a middleware (MW). For such applications handling elasticity purely through addition and removal of VMs is not sufficient, the application level also needs to be considered. This requires solutions that coordinate the availability and elasticity management at the application level. In this paper we propose a solution in the context of the Service Availability Forum (SAF) defined MW. It manages the application level elasticity through the manipulation of the application configuration used by the MW to ensure service availability. This in turn triggers the MW to change the workload distribution in the system.
弹性和可用性是与云相关的两个特性。现有的解决方案侧重于通过虚拟机(vm)在虚拟基础架构级别提供它们,并根据需要重新启动、添加和删除它们。这些假设有一个特定的应用程序设计范例,它将应用程序及其工作负载等同于VM。高可用性应用程序通常由冗余组件组成,这些组件通过中间件(MW)编排的全状态故障转移从故障中恢复。对于这样的应用程序,仅仅通过增加和删除虚拟机来处理弹性是不够的,还需要考虑应用程序级别。这需要在应用程序级别协调可用性和弹性管理的解决方案。在本文中,我们在服务可用性论坛(SAF)定义的MW上下文中提出了一个解决方案。它通过操作MW使用的应用程序配置来管理应用程序级别的弹性,以确保服务的可用性。这进而触发MW更改系统中的工作负载分布。
{"title":"Managing application level elasticity and availability","authors":"M. Toeroe, Neha Pawar, F. Khendek","doi":"10.1109/CNSM.2014.7014191","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014191","url":null,"abstract":"Elasticity and availability are two features associated with the cloud. Existing solutions focus on providing both at the level of the virtual infrastructure through virtual machines (VMs), their restart, addition, and removal as needed. These assume a specific application design paradigm, which equates the application and its workload to the VM. High-availability applications are typically composed of redundant components that recover from failures through state-full failover orchestrated by a middleware (MW). For such applications handling elasticity purely through addition and removal of VMs is not sufficient, the application level also needs to be considered. This requires solutions that coordinate the availability and elasticity management at the application level. In this paper we propose a solution in the context of the Service Availability Forum (SAF) defined MW. It manages the application level elasticity through the manipulation of the application configuration used by the MW to ensure service availability. This in turn triggers the MW to change the workload distribution in the system.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"574 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122932094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
YANG2UML: Bijective transformation and simplification of YANG to UML YANG 2uml: YANG到UML的双射变换和简化
Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, F. Tietze
Specifically designed to exchange configuration information from a management platform to network components, the XML-based NETCONF protocol has become widely used. In combination with NETCONF, YANG is the corresponding protocol that defines the associated data structures, supporting virtually all network configuration protocols. YANG itself is a semantically rich language, which - in order to facilitate familiarization with the relevant subject - is often visualized using UML to involve other experts or developers and to support them by their daily work (writing applications which make use of YANG/NETCONF). To support this process, this paper presents an novel approach to optimize and simplify YANG data models, as current solutions tend to produce very complex UML diagrams. Therefore, we have (i) defined a bidirectional mapping of YANG to UML, (ii) developed a strategy to reduce the numbers of objects, and (iii) created a tool that renders the created UML diagrams, closing the gap between technically improved data models and their human readability.
基于xml的NETCONF协议是专门为管理平台与网络组件交换配置信息而设计的,已经得到了广泛的应用。与NETCONF结合使用,YANG是定义相关数据结构的相应协议,支持几乎所有的网络配置协议。YANG本身是一种语义丰富的语言,为了促进对相关主题的熟悉,通常使用UML将其可视化,以使其他专家或开发人员参与其中,并通过他们的日常工作(编写使用YANG/NETCONF的应用程序)来支持他们。为了支持这个过程,本文提出了一种新的方法来优化和简化YANG数据模型,因为当前的解决方案倾向于生成非常复杂的UML图。因此,我们已经(i)定义了YANG到UML的双向映射,(ii)开发了减少对象数量的策略,以及(iii)创建了呈现创建的UML图的工具,缩小了技术上改进的数据模型与其人类可读性之间的差距。
{"title":"YANG2UML: Bijective transformation and simplification of YANG to UML","authors":"Mario Golling, Robert Koch, Peter Hillmann, Rick Hofstede, F. Tietze","doi":"10.1109/CNSM.2014.7014179","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014179","url":null,"abstract":"Specifically designed to exchange configuration information from a management platform to network components, the XML-based NETCONF protocol has become widely used. In combination with NETCONF, YANG is the corresponding protocol that defines the associated data structures, supporting virtually all network configuration protocols. YANG itself is a semantically rich language, which - in order to facilitate familiarization with the relevant subject - is often visualized using UML to involve other experts or developers and to support them by their daily work (writing applications which make use of YANG/NETCONF). To support this process, this paper presents an novel approach to optimize and simplify YANG data models, as current solutions tend to produce very complex UML diagrams. Therefore, we have (i) defined a bidirectional mapping of YANG to UML, (ii) developed a strategy to reduce the numbers of objects, and (iii) created a tool that renders the created UML diagrams, closing the gap between technically improved data models and their human readability.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129765559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying propagated response delays in performance monitoring of n-tier applications 识别n层应用程序性能监控中的传播响应延迟
Yasuhiko Kanemasa, Atsushi Kubota, Hirokazu Iwakura, J. Higuchi, Y. Nomura, Toshinori Arai, Susumu Nakadate, H. Kanou
One of the significant challenges on performance monitoring of an n-tier system is the “response delay propagation”, in which a response delay in a component server is propagated to other component servers due to the invoking relations among request types in different component servers of the system. It leads the operations manager of the system to misdiagnose the location of source delays and results in wasting time to investigate the root cause. We developed a response delay monitoring system that helps the operations managers distinguish the source delays from many other propagated delays. The system is able to build a model of invoking relations among request types in different component servers and use the model to diagnose the response delay propagation and pin-point the location of source response delays. To obtain such invoking relations among request-types from black-box component servers in an n-tier system, we propose a novel invoking relation estimation method which can achieve high accuracy of true invoking relation among request types by eliminating the negative influence of two spurious correlation factors through partial correlation analysis. We implemented the response delay monitoring system and evaluated the effectiveness of our invoking relation estimation method on a real in-company n-tier system which has thousands of request-types in each tier. The result (over 90% in precision) confirms our estimation method can effectively capture invoking relations in an n-tier system.
n层系统性能监控的一个重大挑战是“响应延迟传播”,其中由于系统不同组件服务器中请求类型之间的调用关系,组件服务器中的响应延迟会传播到其他组件服务器。它导致系统的运营经理误诊源延迟的位置,并导致浪费时间调查根本原因。我们开发了一个响应延迟监控系统,帮助操作管理人员将源延迟与许多其他传播延迟区分开来。该系统能够建立不同组件服务器中请求类型之间的调用关系模型,并利用该模型诊断响应延迟传播,精确定位源响应延迟的位置。为了获得n层系统中黑箱组件服务器中请求类型之间的调用关系,提出了一种新的调用关系估计方法,该方法通过偏相关分析消除两个虚假相关因素的负面影响,实现了对请求类型之间真实调用关系的高精度估计。我们实现了响应延迟监控系统,并在一个真实的公司内部n层系统上评估了我们的调用关系估计方法的有效性,该系统每层有数千个请求类型。结果(精度超过90%)证实了我们的估计方法可以有效地捕获n层系统中的调用关系。
{"title":"Identifying propagated response delays in performance monitoring of n-tier applications","authors":"Yasuhiko Kanemasa, Atsushi Kubota, Hirokazu Iwakura, J. Higuchi, Y. Nomura, Toshinori Arai, Susumu Nakadate, H. Kanou","doi":"10.1109/CNSM.2014.7014150","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014150","url":null,"abstract":"One of the significant challenges on performance monitoring of an n-tier system is the “response delay propagation”, in which a response delay in a component server is propagated to other component servers due to the invoking relations among request types in different component servers of the system. It leads the operations manager of the system to misdiagnose the location of source delays and results in wasting time to investigate the root cause. We developed a response delay monitoring system that helps the operations managers distinguish the source delays from many other propagated delays. The system is able to build a model of invoking relations among request types in different component servers and use the model to diagnose the response delay propagation and pin-point the location of source response delays. To obtain such invoking relations among request-types from black-box component servers in an n-tier system, we propose a novel invoking relation estimation method which can achieve high accuracy of true invoking relation among request types by eliminating the negative influence of two spurious correlation factors through partial correlation analysis. We implemented the response delay monitoring system and evaluated the effectiveness of our invoking relation estimation method on a real in-company n-tier system which has thousands of request-types in each tier. The result (over 90% in precision) confirms our estimation method can effectively capture invoking relations in an n-tier system.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122278723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application-aware latency monitoring for cloud tenants via CloudWatch+ 通过CloudWatch+监视云租户的应用程序感知延迟
Dapeng Liu, Dan Pei, Youjian Zhao
A tenant hosted by a cloud platform typically runs a lot of applications, each of which not only has its own service capacity but also differs in revenue or business importance. Thus we argue that it is crucial for a cloud platform to provide fine-grained and application-aware performance monitoring for each tenant, rather than current monitors that can only handle overall metrics. In this paper, we propose CloudWatch+, a tool that focuses on detecting the latency of web-based applications. A cloud platform equipping with CloudWatch+ can automatically learn and distinguish web-based applications it is hosting, and detect latency anomalies for each application based on its own status. Our evaluation using the real data from a cloud platform with over 200 tenants demonstrates that the detection results of CloudWatch+ are more detailed than those of Amazon CloudWatch, which misses most alarms while some tenants' specific applications experience bad performance. Meanwhile, CloudWatch+ is also realtime and light-weight.
由云平台托管的租户通常运行许多应用程序,每个应用程序不仅有自己的服务能力,而且在收入或业务重要性方面也有所不同。因此,我们认为,对于云平台来说,为每个租户提供细粒度和应用程序感知的性能监视,而不是只能处理总体指标的当前监视器,这是至关重要的。在本文中,我们提出了CloudWatch+,一个专注于检测基于web的应用程序延迟的工具。配备CloudWatch+的云平台可以自动学习和区分其托管的基于web的应用程序,并根据每个应用程序自身的状态检测延迟异常。我们使用超过200个租户的云平台的真实数据进行评估,结果表明CloudWatch+的检测结果比Amazon CloudWatch更详细,Amazon CloudWatch漏过大部分告警,而部分租户的特定应用表现不佳。同时,CloudWatch+也是实时和轻量级的。
{"title":"Application-aware latency monitoring for cloud tenants via CloudWatch+","authors":"Dapeng Liu, Dan Pei, Youjian Zhao","doi":"10.1109/CNSM.2014.7014143","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014143","url":null,"abstract":"A tenant hosted by a cloud platform typically runs a lot of applications, each of which not only has its own service capacity but also differs in revenue or business importance. Thus we argue that it is crucial for a cloud platform to provide fine-grained and application-aware performance monitoring for each tenant, rather than current monitors that can only handle overall metrics. In this paper, we propose CloudWatch+, a tool that focuses on detecting the latency of web-based applications. A cloud platform equipping with CloudWatch+ can automatically learn and distinguish web-based applications it is hosting, and detect latency anomalies for each application based on its own status. Our evaluation using the real data from a cloud platform with over 200 tenants demonstrates that the detection results of CloudWatch+ are more detailed than those of Amazon CloudWatch, which misses most alarms while some tenants' specific applications experience bad performance. Meanwhile, CloudWatch+ is also realtime and light-weight.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133711469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable user data management in multi-tenant cloud environments 多租户云环境中可扩展的用户数据管理
Pieter-Jan Maenhaut, Hendrik Moens, Veerle Ongenae, F. Turck
The rise of cloud computing and its elastic, on-demand resource provisioning introduces the need for a flexible and scalable multi-tenant architecture. In a multi-tenant application every tenant (client) makes use of shared application instances, but each tenant typically has its own user data. The shared application instance behaves like a private instance by guaranteeing both data separation and performance separation for every tenant. As the number of tenants increases, the amount of data grows. A scalable solution for the storage is needed, allowing tenant data to be divided over multiple database instances, but taking into account performance isolation and custom data assurance policies. In this paper we introduce an abstraction layer for achieving high scalability for the storage of tenant data. This layer uses data allocation algorithms to determine an acceptable allocation of tenant data to different databases. We describe a mathematical model for the allocation of tenant data which can be optimized using existing linear programming techniques, and introduce the BDAA-n and FDAA, two algorithms that will find an optimal allocation of data by iterating over the possible permutations. The proposed solutions are evaluated based on their flexibility, complexity and efficiency. The flexibility of the BDAA and FDAA makes them easy to customize and extend to fit most scenarios, but the algorithms will achieve best results for tenants with a limited number of subtenants. Linear programming is an alternative for tenants with a higher number of subtenants, but the customizability of the algorithm for specific use cases is limited due to the need for linear functions.
云计算的兴起及其弹性的、按需的资源供应引入了对灵活的、可扩展的多租户体系结构的需求。在多租户应用程序中,每个租户(客户机)都使用共享的应用程序实例,但每个租户通常都有自己的用户数据。通过保证每个租户的数据分离和性能分离,共享应用程序实例的行为类似于私有实例。随着租户数量的增加,数据量也会随之增加。需要一种可扩展的存储解决方案,允许将租户数据划分到多个数据库实例中,但要考虑性能隔离和自定义数据保证策略。在本文中,我们引入了一个抽象层来实现租户数据存储的高可伸缩性。这一层使用数据分配算法来确定租户数据到不同数据库的可接受分配。我们描述了一个租户数据分配的数学模型,该模型可以使用现有的线性规划技术进行优化,并介绍了BDAA-n和FDAA这两种算法,它们将通过迭代可能的排列来找到数据的最佳分配。根据其灵活性、复杂性和效率对所提出的解决方案进行评估。BDAA和FDAA的灵活性使它们易于定制和扩展以适应大多数场景,但是对于具有有限数量的子租户的租户,算法将获得最佳结果。线性规划是具有较多子租户的租户的替代方案,但是由于需要线性函数,特定用例的算法的可定制性受到限制。
{"title":"Scalable user data management in multi-tenant cloud environments","authors":"Pieter-Jan Maenhaut, Hendrik Moens, Veerle Ongenae, F. Turck","doi":"10.1109/CNSM.2014.7014171","DOIUrl":"https://doi.org/10.1109/CNSM.2014.7014171","url":null,"abstract":"The rise of cloud computing and its elastic, on-demand resource provisioning introduces the need for a flexible and scalable multi-tenant architecture. In a multi-tenant application every tenant (client) makes use of shared application instances, but each tenant typically has its own user data. The shared application instance behaves like a private instance by guaranteeing both data separation and performance separation for every tenant. As the number of tenants increases, the amount of data grows. A scalable solution for the storage is needed, allowing tenant data to be divided over multiple database instances, but taking into account performance isolation and custom data assurance policies. In this paper we introduce an abstraction layer for achieving high scalability for the storage of tenant data. This layer uses data allocation algorithms to determine an acceptable allocation of tenant data to different databases. We describe a mathematical model for the allocation of tenant data which can be optimized using existing linear programming techniques, and introduce the BDAA-n and FDAA, two algorithms that will find an optimal allocation of data by iterating over the possible permutations. The proposed solutions are evaluated based on their flexibility, complexity and efficiency. The flexibility of the BDAA and FDAA makes them easy to customize and extend to fit most scenarios, but the algorithms will achieve best results for tenants with a limited number of subtenants. Linear programming is an alternative for tenants with a higher number of subtenants, but the customizability of the algorithm for specific use cases is limited due to the need for linear functions.","PeriodicalId":268334,"journal":{"name":"10th International Conference on Network and Service Management (CNSM) and Workshop","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124298483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
10th International Conference on Network and Service Management (CNSM) and Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1