首页 > 最新文献

2019 15th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
On Accounting for Screen Resolution in Adaptive Video Streaming: A QoE-Driven Bandwidth Sharing Framework 自适应视频流中屏幕分辨率的计算:一个qos驱动的带宽共享框架
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012672
Othmane Belmoukadam, Muhammad Jawad Khokhar, C. Barakat
Screen resolution along with network conditions are main objective factors impacting the user experience, in particular for video streaming applications. Terminals on their side feature more and more advanced characteristics resulting in different network requirements for good visual experience [1]. Previous studies tried to link MOS (Mean Opinion Score) to video bit rate for different screen types (e.g., CIF, QCIF, and HD) [2]. We leverage such studies and formulate a QoE-driven resource allocation problem to pinpoint the optimal bandwidth allocation that maximizes the QoE (Quality of Experience) over all users of a provider located behind the same bottleneck link, while accounting for the characteristics of the screens they use for video playout. For our optimization problem, QoE functions are built using curve fitting on data sets capturing the relationship between MOS, screen characteristics, and bandwidth requirements. We propose a simple heuristic based on Lagrangian relaxation and KKT (Karush Kuhn Tucker) conditions for a subset of constraints. Numerical simulations show that the proposed heuristic is able to increase overall QoE up to 20% compared to an allocation with TCP look-alike strategies implementing max-min fairness. Later, we use a MPEG/DASH implementation in the context of ns-3 and show that coupling our approach with a rate adaptation algorithm (e.g., [3]) can help increasing QoE while reducing both resolution switches and number of interruptions.
屏幕分辨率和网络条件是影响用户体验的主要客观因素,特别是对于视频流应用程序。终端侧的特性越来越先进,对良好视觉体验的网络要求也越来越高[1]。先前的研究试图将MOS (Mean Opinion Score)与不同屏幕类型(如CIF、QCIF和HD)的视频比特率联系起来。我们利用这些研究并制定了一个qos驱动的资源分配问题,以确定最佳带宽分配,从而最大化位于同一瓶颈链接后面的提供商的所有用户的QoE(体验质量),同时考虑到他们用于视频播放的屏幕的特征。对于我们的优化问题,QoE函数是通过对捕获MOS、屏幕特性和带宽需求之间关系的数据集进行曲线拟合来构建的。我们提出了一个简单的启发式基于拉格朗日松弛和KKT (Karush Kuhn Tucker)条件的约束子集。数值模拟表明,与实现最大最小公平性的TCP类似策略的分配相比,所提出的启发式方法能够将总体QoE提高20%。随后,我们在ns-3环境中使用了MPEG/DASH实现,并表明将我们的方法与速率自适应算法(例如[3])相结合可以帮助提高QoE,同时减少分辨率切换和中断数量。
{"title":"On Accounting for Screen Resolution in Adaptive Video Streaming: A QoE-Driven Bandwidth Sharing Framework","authors":"Othmane Belmoukadam, Muhammad Jawad Khokhar, C. Barakat","doi":"10.23919/CNSM46954.2019.9012672","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012672","url":null,"abstract":"Screen resolution along with network conditions are main objective factors impacting the user experience, in particular for video streaming applications. Terminals on their side feature more and more advanced characteristics resulting in different network requirements for good visual experience [1]. Previous studies tried to link MOS (Mean Opinion Score) to video bit rate for different screen types (e.g., CIF, QCIF, and HD) [2]. We leverage such studies and formulate a QoE-driven resource allocation problem to pinpoint the optimal bandwidth allocation that maximizes the QoE (Quality of Experience) over all users of a provider located behind the same bottleneck link, while accounting for the characteristics of the screens they use for video playout. For our optimization problem, QoE functions are built using curve fitting on data sets capturing the relationship between MOS, screen characteristics, and bandwidth requirements. We propose a simple heuristic based on Lagrangian relaxation and KKT (Karush Kuhn Tucker) conditions for a subset of constraints. Numerical simulations show that the proposed heuristic is able to increase overall QoE up to 20% compared to an allocation with TCP look-alike strategies implementing max-min fairness. Later, we use a MPEG/DASH implementation in the context of ns-3 and show that coupling our approach with a rate adaptation algorithm (e.g., [3]) can help increasing QoE while reducing both resolution switches and number of interruptions.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129216474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sense-Share: A Framework for Resilient Collaborative Service Performance Monitoring 感知共享:弹性协同服务绩效监控框架
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012683
K. Batbayar, Emmanouil Dimogerontakis, Roc Meseguer, L. Navarro, R. Sadre
Modern large-scale networked services, such as video streaming, are typically deployed at multiple locations in the network to provide redundancy and load balancing. Different techniques are used to provide performance monitoring information so that client nodes can select the best service instance. One of them is collaborative sensing, where clients share measurement results on the observed service performance to build a common ground of knowledge with low overhead. Clients can then use this common ground to select the most suitable service provider. However, collaborative algorithms are susceptible to false measurements sent by malfunctioning or malicious nodes, which decreases the accuracy of the performance sensing process. We propose Sense-Share, a simple light-weight and resilient collaborative sensing framework based on the similarity of the client nodes’ perception of service performance. Our experimental evaluation in different topologies shows that service performance sensing using Sense-Share achieves, on average, 94% similarity to non-collaborative brute force performance sensing, tolerating faulty nodes. Furthermore, our approach effectively distributes the service monitoring requests over the service nodes and exploits direct inter-node communication to share measurements, resulting in reduced monitoring overhead.
现代大规模网络服务(如视频流)通常部署在网络中的多个位置,以提供冗余和负载平衡。使用不同的技术来提供性能监视信息,以便客户机节点可以选择最佳的服务实例。其中之一是协作感知,其中客户共享对观察到的服务性能的测量结果,以低开销构建共同的知识基础。然后,客户可以使用这个共同点来选择最合适的服务提供商。然而,协作算法容易受到故障或恶意节点发送的错误测量的影响,这降低了性能感知过程的准确性。基于客户端节点对服务性能感知的相似性,我们提出了一种简单、轻量级、弹性的协同感知框架Sense-Share。我们在不同拓扑结构中的实验评估表明,在允许故障节点的情况下,使用Sense-Share的服务性能感知与非协作蛮力性能感知的平均相似度为94%。此外,我们的方法有效地在服务节点上分发服务监视请求,并利用节点间的直接通信来共享度量,从而减少了监视开销。
{"title":"Sense-Share: A Framework for Resilient Collaborative Service Performance Monitoring","authors":"K. Batbayar, Emmanouil Dimogerontakis, Roc Meseguer, L. Navarro, R. Sadre","doi":"10.23919/CNSM46954.2019.9012683","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012683","url":null,"abstract":"Modern large-scale networked services, such as video streaming, are typically deployed at multiple locations in the network to provide redundancy and load balancing. Different techniques are used to provide performance monitoring information so that client nodes can select the best service instance. One of them is collaborative sensing, where clients share measurement results on the observed service performance to build a common ground of knowledge with low overhead. Clients can then use this common ground to select the most suitable service provider. However, collaborative algorithms are susceptible to false measurements sent by malfunctioning or malicious nodes, which decreases the accuracy of the performance sensing process. We propose Sense-Share, a simple light-weight and resilient collaborative sensing framework based on the similarity of the client nodes’ perception of service performance. Our experimental evaluation in different topologies shows that service performance sensing using Sense-Share achieves, on average, 94% similarity to non-collaborative brute force performance sensing, tolerating faulty nodes. Furthermore, our approach effectively distributes the service monitoring requests over the service nodes and exploits direct inter-node communication to share measurements, resulting in reduced monitoring overhead.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127679284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low Overhead, Fine-grained End-to-end Monitoring of Wireless Networks using In-band Telemetry 低开销,细粒度端到端监测无线网络使用带内遥测
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012678
J. Haxhibeqiri, I. Moerman, J. Hoebeke
Wireless netWorks are becoming more complex while applications on top are becoming more demanding. To maintain network performance in terms of latency, throughput and reliability, continuous verification of the performance, possibly followed by on-the-fly network (re)configuration is needed. To achieve this, the way wireless network monitoring is being done needs to be reconsidered and should evolve towards more timely, low overhead and fine-grained monitoring. This paper shows hoiv in-band network telemetry (INT) monitoring can achieve these objectives. An INT-enabled node architecture is designed as well as novel INT options. By means of an implementation on WiFi Linux devices, the concept is validated by tracking the behavior of a real network.
无线网络正变得越来越复杂,而应用程序的要求也越来越高。为了在延迟、吞吐量和可靠性方面保持网络性能,需要对性能进行持续验证,并可能随后进行动态网络(重新)配置。为了实现这一目标,需要重新考虑无线网络监控的方式,并应朝着更及时、低开销和细粒度监控的方向发展。本文介绍了带内网络遥测(INT)监测可以实现这些目标。设计了支持INT的节点体系结构以及新颖的INT选项。通过在WiFi Linux设备上的实现,通过跟踪真实网络的行为来验证该概念。
{"title":"Low Overhead, Fine-grained End-to-end Monitoring of Wireless Networks using In-band Telemetry","authors":"J. Haxhibeqiri, I. Moerman, J. Hoebeke","doi":"10.23919/CNSM46954.2019.9012678","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012678","url":null,"abstract":"Wireless netWorks are becoming more complex while applications on top are becoming more demanding. To maintain network performance in terms of latency, throughput and reliability, continuous verification of the performance, possibly followed by on-the-fly network (re)configuration is needed. To achieve this, the way wireless network monitoring is being done needs to be reconsidered and should evolve towards more timely, low overhead and fine-grained monitoring. This paper shows hoiv in-band network telemetry (INT) monitoring can achieve these objectives. An INT-enabled node architecture is designed as well as novel INT options. By means of an implementation on WiFi Linux devices, the concept is validated by tracking the behavior of a real network.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127594936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Scalability evaluation of VPN technologies for secure container networking 安全容器网络中VPN技术的可扩展性评估
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012673
Tom Goethals, D. Kerkhove, B. Volckaert, F. Turck
For years, containers have been a popular choice for lightweight virtualization in the cloud. With the rise of more powerful and flexible edge devices, container deployment strategies have arisen that leverage the computational power of edge devices for optimal workload distribution. This move from a secure data center network to heterogenous public and private networks presents some issues in terms of security and network topology that can be partially solved by using a Virtual Private Network (VPN) to connect edge nodes to the cloud. In this paper, the scalability of VPN software is evaluated to determine if and how it can be used in large-scale clusters containing edge nodes. Benchmarks are performed to determine the maximum number of VPN-connected nodes and the influence of network degradation on VPN performance, primarily using traffic typical for edge devices generating IoT data. Some high level conclusions are drawn from the results, indicating that WireGuard is an excellent choice of VPN software to connect edge nodes in a cluster. Analysis of the results also shows the strengths and weaknesses of other VPN software.
多年来,容器一直是云中的轻量级虚拟化的流行选择。随着更强大、更灵活的边缘设备的兴起,容器部署策略应运而生,这些策略利用边缘设备的计算能力来优化工作负载分配。这种从安全数据中心网络到异构公共和私有网络的转变在安全性和网络拓扑方面提出了一些问题,这些问题可以通过使用虚拟专用网络(VPN)将边缘节点连接到云来部分解决。本文对VPN软件的可扩展性进行了评估,以确定它是否以及如何用于包含边缘节点的大规模集群。执行基准测试以确定VPN连接节点的最大数量以及网络退化对VPN性能的影响,主要使用生成物联网数据的边缘设备的典型流量。从结果中得出一些高层次的结论,表明WireGuard是连接集群边缘节点的VPN软件的最佳选择。分析结果也显示了其他VPN软件的优缺点。
{"title":"Scalability evaluation of VPN technologies for secure container networking","authors":"Tom Goethals, D. Kerkhove, B. Volckaert, F. Turck","doi":"10.23919/CNSM46954.2019.9012673","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012673","url":null,"abstract":"For years, containers have been a popular choice for lightweight virtualization in the cloud. With the rise of more powerful and flexible edge devices, container deployment strategies have arisen that leverage the computational power of edge devices for optimal workload distribution. This move from a secure data center network to heterogenous public and private networks presents some issues in terms of security and network topology that can be partially solved by using a Virtual Private Network (VPN) to connect edge nodes to the cloud. In this paper, the scalability of VPN software is evaluated to determine if and how it can be used in large-scale clusters containing edge nodes. Benchmarks are performed to determine the maximum number of VPN-connected nodes and the influence of network degradation on VPN performance, primarily using traffic typical for edge devices generating IoT data. Some high level conclusions are drawn from the results, indicating that WireGuard is an excellent choice of VPN software to connect edge nodes in a cluster. Analysis of the results also shows the strengths and weaknesses of other VPN software.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"62 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132463498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Hybrid Machine Learning/Policy Approach to Optimise Video Path Selection 优化视频路径选择的混合机器学习/策略方法
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012667
Joseph McNamara, Liam Fallon, Enda Fallon
Services such as interactive video and real time gaming are ubiquitous on modern networks. The approaching realisation of 5G as well as the virtualisation and scalability of network functions made possible by technologies such as NFV and Kubernetes pushes the frontiers of what applications can do and how they can be deployed. However, managing such intangible services is a real challenge for network management systems. Adaptive Policy is an approach that can be applied to govern such services in an intent-based manner.In this work, we are exploring if the manner in which such services are deployed, virtualized, and scaled can be guided using real time context aware decision making. We are investigating how to apply Adaptive Policy to the problem of optimizing interactive video streaming delivery in a virtualized environment. We utilise components of our previously established test bed framework and implement a single layer neural network through Adaptive Policy, in which weights assigned to network metrics are continuously adjusted through supervised test cycles, resulting in weights in proportion to their associated impact on our video stream quality. We present the initial test results from our Perceptron inspired policy-based approach to video quality optimisation through weighted network resource evaluation.
交互式视频和实时游戏等服务在现代网络中无处不在。即将实现的5G以及NFV和Kubernetes等技术使网络功能的虚拟化和可扩展性成为可能,这推动了应用程序可以做什么以及如何部署它们的前沿。然而,管理这些无形的服务对网络管理系统来说是一个真正的挑战。自适应策略是一种可以应用于以基于意图的方式管理此类服务的方法。在这项工作中,我们正在探索是否可以使用实时上下文感知决策来指导这些服务的部署、虚拟化和扩展方式。我们正在研究如何将自适应策略应用于优化虚拟环境中的交互式视频流传输问题。我们利用之前建立的测试平台框架的组件,并通过自适应策略实现单层神经网络,其中分配给网络指标的权重通过监督测试周期不断调整,从而使权重与它们对视频流质量的相关影响成比例。我们通过加权网络资源评估,展示了感知器启发的基于策略的视频质量优化方法的初步测试结果。
{"title":"A Hybrid Machine Learning/Policy Approach to Optimise Video Path Selection","authors":"Joseph McNamara, Liam Fallon, Enda Fallon","doi":"10.23919/CNSM46954.2019.9012667","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012667","url":null,"abstract":"Services such as interactive video and real time gaming are ubiquitous on modern networks. The approaching realisation of 5G as well as the virtualisation and scalability of network functions made possible by technologies such as NFV and Kubernetes pushes the frontiers of what applications can do and how they can be deployed. However, managing such intangible services is a real challenge for network management systems. Adaptive Policy is an approach that can be applied to govern such services in an intent-based manner.In this work, we are exploring if the manner in which such services are deployed, virtualized, and scaled can be guided using real time context aware decision making. We are investigating how to apply Adaptive Policy to the problem of optimizing interactive video streaming delivery in a virtualized environment. We utilise components of our previously established test bed framework and implement a single layer neural network through Adaptive Policy, in which weights assigned to network metrics are continuously adjusted through supervised test cycles, resulting in weights in proportion to their associated impact on our video stream quality. We present the initial test results from our Perceptron inspired policy-based approach to video quality optimisation through weighted network resource evaluation.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3-D Matching-based Resource Allocation for D2D Communications in H-CRAN Network H-CRAN网络中基于三维匹配的D2D通信资源分配
Pub Date : 2019-10-01 DOI: 10.23919/cnsm46954.2019.9012712
Pan Zhao, Xiaoyang Li, Lei Feng, Qinghui Zhang, Weidong Yang, Fei Zheng
To meet the immensely diverse service requirements, heterogeneous cloud radio access network (H-CRAN) architecture and D2D communication is embraced. Consequently, the resource allocation between D2D pairs and current users is a challenge. In this paper, a joint power control and sub-channel allocation scheme is proposed. The original mixed-integer nonlinear programming problem is decomposed into power and sub-channel allocation. Geometric Vertex Search approach and 3-dimensional (3-D) matching method are used to solve them. Finally, numerical results verify the proposed scheme has about 35% and 60% improvement in total throughput comparing with other approaches.
为了满足多样化的业务需求,异构云无线接入网(H-CRAN)架构和D2D通信被采用。因此,D2D对和当前用户之间的资源分配是一个挑战。本文提出了一种联合功率控制和子信道分配方案。将原混合整数非线性规划问题分解为功率分配和子信道分配。采用几何顶点搜索法和三维匹配法进行求解。最后,数值计算结果表明,与其他方法相比,该方案的总吞吐量提高了35%和60%。
{"title":"3-D Matching-based Resource Allocation for D2D Communications in H-CRAN Network","authors":"Pan Zhao, Xiaoyang Li, Lei Feng, Qinghui Zhang, Weidong Yang, Fei Zheng","doi":"10.23919/cnsm46954.2019.9012712","DOIUrl":"https://doi.org/10.23919/cnsm46954.2019.9012712","url":null,"abstract":"To meet the immensely diverse service requirements, heterogeneous cloud radio access network (H-CRAN) architecture and D2D communication is embraced. Consequently, the resource allocation between D2D pairs and current users is a challenge. In this paper, a joint power control and sub-channel allocation scheme is proposed. The original mixed-integer nonlinear programming problem is decomposed into power and sub-channel allocation. Geometric Vertex Search approach and 3-dimensional (3-D) matching method are used to solve them. Finally, numerical results verify the proposed scheme has about 35% and 60% improvement in total throughput comparing with other approaches.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133474824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compromised Tweet Detection Using Siamese Networks and fastText Representations 使用暹罗网络和快速文本表示的受损Tweet检测
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012722
Mihir Joshi, Parmeet Singh, A. N. Zincir-Heywood
The aim of this work is to detect compromised users of tweets based on their writing styles. In this paper, we use Siamese Networks to learn a representation of user tweets that allows us to classify them based on a limited amount of ground truth data. We propose the employment of this classification model to identify compromised user accounts of tweets.
这项工作的目的是根据他们的写作风格来检测受感染的推文用户。在本文中,我们使用Siamese Networks来学习用户推文的表示,使我们能够基于有限数量的真实数据对它们进行分类。我们建议使用这种分类模型来识别推文的受损用户帐户。
{"title":"Compromised Tweet Detection Using Siamese Networks and fastText Representations","authors":"Mihir Joshi, Parmeet Singh, A. N. Zincir-Heywood","doi":"10.23919/CNSM46954.2019.9012722","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012722","url":null,"abstract":"The aim of this work is to detect compromised users of tweets based on their writing styles. In this paper, we use Siamese Networks to learn a representation of user tweets that allows us to classify them based on a limited amount of ground truth data. We propose the employment of this classification model to identify compromised user accounts of tweets.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129358777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Middlebox Architecture for IoT Protection 物联网保护的分布式Middlebox架构
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012738
Lionel Metongnon, R. Sadre, E. C. Ezin
The Internet of Things (IoT) is not one single entity, but a collection of different devices, communication technologies, protocols and services. IoT systems can span a large number of individually managed networks that are interconnected through the Internet and host the different components of an IoT application, such as sensor devices, storage servers and data processing services. Protecting such a complex multiparty system from abuse becomes a very challenging task. New difficulties arise everyday when policies are updated or new collaborations and federations appear between entities. Moreover, hacked IoT devices can also become the source of powerful attacks, as the Mirai malware has demonstrated, and therefore a danger for the other involved parties. In this paper, we propose an approach to improve the management and protection of collaborating IoT systems using distributed intrusion detection and permission-based access control. Our approach is based on interconnected middleboxes that monitor the communication between the various IoT networks and are able to stop incoming as well as outgoing attacks. We evaluate our approach through experiments with different types of attacks.
物联网(IoT)不是一个单一的实体,而是不同设备、通信技术、协议和服务的集合。物联网系统可以跨越大量单独管理的网络,这些网络通过互联网相互连接,并托管物联网应用程序的不同组件,如传感器设备、存储服务器和数据处理服务。保护这样一个复杂的多党制不被滥用是一项非常具有挑战性的任务。当策略更新或实体之间出现新的协作和联合时,每天都会出现新的困难。此外,正如Mirai恶意软件所展示的那样,被黑客入侵的物联网设备也可能成为强大攻击的来源,因此对其他相关方构成危险。在本文中,我们提出了一种使用分布式入侵检测和基于权限的访问控制来改进协作物联网系统的管理和保护的方法。我们的方法是基于相互连接的中间件,监控各种物联网网络之间的通信,并能够阻止传入和传出的攻击。我们通过不同类型的攻击实验来评估我们的方法。
{"title":"Distributed Middlebox Architecture for IoT Protection","authors":"Lionel Metongnon, R. Sadre, E. C. Ezin","doi":"10.23919/CNSM46954.2019.9012738","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012738","url":null,"abstract":"The Internet of Things (IoT) is not one single entity, but a collection of different devices, communication technologies, protocols and services. IoT systems can span a large number of individually managed networks that are interconnected through the Internet and host the different components of an IoT application, such as sensor devices, storage servers and data processing services. Protecting such a complex multiparty system from abuse becomes a very challenging task. New difficulties arise everyday when policies are updated or new collaborations and federations appear between entities. Moreover, hacked IoT devices can also become the source of powerful attacks, as the Mirai malware has demonstrated, and therefore a danger for the other involved parties. In this paper, we propose an approach to improve the management and protection of collaborating IoT systems using distributed intrusion detection and permission-based access control. Our approach is based on interconnected middleboxes that monitor the communication between the various IoT networks and are able to stop incoming as well as outgoing attacks. We evaluate our approach through experiments with different types of attacks.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127205500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Factors Responsible for Diabetes Prevalence in Nigeria using Social Media and Machine Learning 利用社交媒体和机器学习检测尼日利亚糖尿病流行的因素
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012679
O. Oyebode, Rita Orji
Diabetes is a non-communicable disease associated with increased level of glucose due to inadequate supply of insulin (known as Type 1 diabetes) or inability to use insulin efficiently (known as Type 2 diabetes). Though the exact cause of Type 1 diabetes is unknown, the probable causes are genetics and environmental factors (such as exposure to viruses). On the other hand, Type 2 diabetes is largely linked to unhealthy lifestyle choices. In Nigeria, many people are believed to be living with diabetes and the country’s diabetes prevalence rate is one of the highest in Africa. To determine the factors responsible for diabetes prevalence in Nigeria, we analyzed social media contents related to diabetes since billions of people, including diabetic patients and healthcare professionals, use social media platforms to freely share their experiences and discuss many health-related topics. None of the existing research targets the African audience who are also major users of social media platforms; hence our work aims to close this gap by leveraging an African social media platform targeted at Nigerians to gather diabetes-related data, and then applying machine learning technique to detect those factors responsible for diabetes prevalence in Nigeria. Based on our results, we discussed positive behavioural or lifestyle changes that are necessary to prevent and treat diabetes in Nigeria, as well as intervention designs required to bring about those changes. Future work will develop a diabetes intervention application implementing all the design features highlighted in Section V of this paper and making it generally accessible to Nigerians.
糖尿病是一种非传染性疾病,与由于胰岛素供应不足(称为1型糖尿病)或无法有效使用胰岛素(称为2型糖尿病)而导致的葡萄糖水平升高有关。虽然1型糖尿病的确切病因尚不清楚,但可能的原因是遗传和环境因素(如接触病毒)。另一方面,2型糖尿病很大程度上与不健康的生活方式有关。在尼日利亚,许多人被认为患有糖尿病,该国的糖尿病患病率是非洲最高的国家之一。为了确定导致尼日利亚糖尿病流行的因素,我们分析了与糖尿病相关的社交媒体内容,因为包括糖尿病患者和医疗保健专业人员在内的数十亿人使用社交媒体平台自由分享他们的经验并讨论许多与健康相关的话题。现有的研究都没有针对同时也是社交媒体平台主要用户的非洲受众;因此,我们的工作旨在通过利用针对尼日利亚人的非洲社交媒体平台来收集糖尿病相关数据,然后应用机器学习技术来检测导致尼日利亚糖尿病流行的因素,从而缩小这一差距。根据我们的结果,我们讨论了预防和治疗尼日利亚糖尿病所必需的积极的行为或生活方式改变,以及实现这些改变所需的干预设计。未来的工作将开发一个糖尿病干预应用程序,实现本文第五节中强调的所有设计功能,并使其普遍适用于尼日利亚人。
{"title":"Detecting Factors Responsible for Diabetes Prevalence in Nigeria using Social Media and Machine Learning","authors":"O. Oyebode, Rita Orji","doi":"10.23919/CNSM46954.2019.9012679","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012679","url":null,"abstract":"Diabetes is a non-communicable disease associated with increased level of glucose due to inadequate supply of insulin (known as Type 1 diabetes) or inability to use insulin efficiently (known as Type 2 diabetes). Though the exact cause of Type 1 diabetes is unknown, the probable causes are genetics and environmental factors (such as exposure to viruses). On the other hand, Type 2 diabetes is largely linked to unhealthy lifestyle choices. In Nigeria, many people are believed to be living with diabetes and the country’s diabetes prevalence rate is one of the highest in Africa. To determine the factors responsible for diabetes prevalence in Nigeria, we analyzed social media contents related to diabetes since billions of people, including diabetic patients and healthcare professionals, use social media platforms to freely share their experiences and discuss many health-related topics. None of the existing research targets the African audience who are also major users of social media platforms; hence our work aims to close this gap by leveraging an African social media platform targeted at Nigerians to gather diabetes-related data, and then applying machine learning technique to detect those factors responsible for diabetes prevalence in Nigeria. Based on our results, we discussed positive behavioural or lifestyle changes that are necessary to prevent and treat diabetes in Nigeria, as well as intervention designs required to bring about those changes. Future work will develop a diabetes intervention application implementing all the design features highlighted in Section V of this paper and making it generally accessible to Nigerians.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124314622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Deep Learning Models For Aggregated Network Traffic Prediction 用于聚合网络流量预测的深度学习模型
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012669
A. Lazaris, V. Prasanna
The ability to generate network traffic predictions at short time scales is crucial for many network management tasks such as traffic engineering, anomaly detection, and traffic matrix estimation. However, building models that are able to predict the traffic from modern networks at short time scales is not a trivial task due to the diversity of the network traffic sources. In this paper, we present a framework for network-wide link-level traffic prediction using Long Short-Term Memory (LSTM) neural networks. Our proposed framework leverages link statistics that can be easily collected either by the controller of a Software Defined Network (SDN), or by SNMP measurements in a legacy network, in order to predict future link throughputs. We implement several variations of LSTMs and compare their performance with traditional baseline models. Our evaluation study using real network traces from a Tier-1 ISP illustrates that LSTMs can predict link throughputs with very high accuracy outperforming the baselines for various traffic aggregation levels and time scales.
在短时间内生成网络流量预测的能力对于许多网络管理任务(如流量工程、异常检测和流量矩阵估计)至关重要。然而,由于网络流量来源的多样性,构建能够在短时间尺度上预测现代网络流量的模型并不是一项简单的任务。在本文中,我们提出了一个使用长短期记忆(LSTM)神经网络进行全网络链路级流量预测的框架。为了预测未来的链路吞吐量,我们提出的框架利用了可以由软件定义网络(SDN)的控制器或遗留网络中的SNMP测量轻松收集的链路统计信息。我们实现了lstm的几种变体,并将它们的性能与传统基线模型进行了比较。我们使用来自Tier-1 ISP的真实网络轨迹进行的评估研究表明,lstm可以非常准确地预测链路吞吐量,优于各种流量聚合级别和时间尺度的基线。
{"title":"Deep Learning Models For Aggregated Network Traffic Prediction","authors":"A. Lazaris, V. Prasanna","doi":"10.23919/CNSM46954.2019.9012669","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012669","url":null,"abstract":"The ability to generate network traffic predictions at short time scales is crucial for many network management tasks such as traffic engineering, anomaly detection, and traffic matrix estimation. However, building models that are able to predict the traffic from modern networks at short time scales is not a trivial task due to the diversity of the network traffic sources. In this paper, we present a framework for network-wide link-level traffic prediction using Long Short-Term Memory (LSTM) neural networks. Our proposed framework leverages link statistics that can be easily collected either by the controller of a Software Defined Network (SDN), or by SNMP measurements in a legacy network, in order to predict future link throughputs. We implement several variations of LSTMs and compare their performance with traditional baseline models. Our evaluation study using real network traces from a Tier-1 ISP illustrates that LSTMs can predict link throughputs with very high accuracy outperforming the baselines for various traffic aggregation levels and time scales.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123746092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2019 15th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1