首页 > 最新文献

2019 15th International Conference on Network and Service Management (CNSM)最新文献

英文 中文
Orchestrating End-to-end Slices in 5G Networks 在5G网络中编排端到端切片
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012732
D. Harutyunyan, Riccardo Fedrizzi, Nashid Shahriar, R. Boutaba, R. Riggio
5G networks are characterized by massive device connectivity, supporting a wide range of novel applications with their diverse Quality of Service (QoS) requirements. This poses a challenge since 5G as one-fits-all technology has to simultaneously address all these requirements. Network slicing has been proposed to cope with this challenge, calling for efficient slicing and slice placement strategies in order to ensure that the slice requirements (e.g., latency, data rate) are met, while the network resources are utilized in the most optimal manner. In this paper, we compare different end-to-end (E2E) slice placement strategies by formulating and solving a Mixed Integer Linear Programming (MILP) slice placement problem and study their trade-offs. E2E slice requests are modelled as Service Functions Chains (SFC), in which each core network and radio access network component is represented as a Virtual Network Function (VNF). Based on the analysis of the results, we then propose a slice placement heuristic algorithm whose objective is to minimize the number of VNF migrations in the network and their impact onto the slices while, at the same time, optimizing the network utilization and making sure that the QoS requirements of the considered slice requests are satisfied. The results of the simulations demonstrate the efficiency of the proposed algorithm.
5G网络的特点是大规模设备连接,支持各种具有不同服务质量(QoS)要求的新型应用。这带来了挑战,因为5G作为一种通用技术必须同时满足所有这些要求。为了应对这一挑战,人们提出了网络切片,要求采用有效的切片和切片放置策略,以确保满足切片要求(例如,延迟、数据速率),同时以最优的方式利用网络资源。在本文中,我们通过制定和解决混合整数线性规划(MILP)的片放置问题,比较了不同的端到端(E2E)片放置策略,并研究了它们的权衡。端到端切片请求建模为业务功能链(SFC),其中每个核心网和无线接入网组件都表示为虚拟网络功能(VNF)。在分析结果的基础上,我们提出了一种切片放置启发式算法,其目标是最大限度地减少网络中VNF迁移的数量及其对切片的影响,同时优化网络利用率并确保所考虑的切片请求的QoS要求得到满足。仿真结果证明了该算法的有效性。
{"title":"Orchestrating End-to-end Slices in 5G Networks","authors":"D. Harutyunyan, Riccardo Fedrizzi, Nashid Shahriar, R. Boutaba, R. Riggio","doi":"10.23919/CNSM46954.2019.9012732","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012732","url":null,"abstract":"5G networks are characterized by massive device connectivity, supporting a wide range of novel applications with their diverse Quality of Service (QoS) requirements. This poses a challenge since 5G as one-fits-all technology has to simultaneously address all these requirements. Network slicing has been proposed to cope with this challenge, calling for efficient slicing and slice placement strategies in order to ensure that the slice requirements (e.g., latency, data rate) are met, while the network resources are utilized in the most optimal manner. In this paper, we compare different end-to-end (E2E) slice placement strategies by formulating and solving a Mixed Integer Linear Programming (MILP) slice placement problem and study their trade-offs. E2E slice requests are modelled as Service Functions Chains (SFC), in which each core network and radio access network component is represented as a Virtual Network Function (VNF). Based on the analysis of the results, we then propose a slice placement heuristic algorithm whose objective is to minimize the number of VNF migrations in the network and their impact onto the slices while, at the same time, optimizing the network utilization and making sure that the QoS requirements of the considered slice requests are satisfied. The results of the simulations demonstrate the efficiency of the proposed algorithm.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124489424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
CNSM 2019 TOC
Pub Date : 2019-10-01 DOI: 10.23919/cnsm46954.2019.9012690
{"title":"CNSM 2019 TOC","authors":"","doi":"10.23919/cnsm46954.2019.9012690","DOIUrl":"https://doi.org/10.23919/cnsm46954.2019.9012690","url":null,"abstract":"","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131809434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomic Closed Control Loops for Management, an idea whose time has come? 管理的自主封闭控制回路,一个时代已经到来的想法?
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012687
Liam Fallon, J. Keeney, R. Verma
Taking an autonomic approach to management and using closed control loops has been the subject of much research in the Network management community since the early 2000s. It is fair to say that Network Management system developers and users have not adopted Autonomic Management approaches very widely. Most network management systems continue to use an ITU TMN inspired layered approach to management.In recent years, a trend towards implementing autonomic management and closed control loops on management systems built using a TMN architecture has emerged in practice. This trend is requirement driven; an autonomic approach is taken when there is no other option for implementing a feature. It is clear to see a closed control loop approach being taken to implement C-SON (Centralized Self Organizing Networks) features in 4G network management systems in the early 2010s. Autonomic approaches are even more apparent in systems such as ONAP that implement SDN and NFV orchestration. However, the implementation of closed control loops is often pragmatic and rigid, focused on the feature being delivered. Providing systemized support for control loops is in its infancy and has much to learn from the extensive autonomic management literatureThis paper surveys the current state of autonomic management in practice and outlines some research challenges that must be addressed to allow it to be systematically supported in current management systems, with a particular focus on ONAP.
自21世纪初以来,采用自主方法进行管理和使用封闭控制回路一直是网络管理社区大量研究的主题。公平地说,网络管理系统的开发人员和用户并没有非常广泛地采用自治管理方法。大多数网络管理系统继续使用受ITU TMN启发的分层方法进行管理。近年来,在实践中出现了在使用TMN架构构建的管理系统上实现自主管理和封闭控制回路的趋势。这种趋势是需求驱动的;当没有其他实现功能的选择时,采用自主方法。很明显,在2010年代早期的4G网络管理系统中,采用了一种闭环控制方法来实现C-SON(集中式自组织网络)功能。自主方法在ONAP等实现SDN和NFV编排的系统中更为明显。然而,封闭控制循环的实现通常是实用的和严格的,专注于所交付的特性。为控制回路提供系统化支持尚处于起步阶段,需要从广泛的自主管理文献中学习很多东西。本文调查了自主管理在实践中的现状,概述了必须解决的一些研究挑战,以便在当前的管理系统中对其进行系统支持,特别关注ONAP。
{"title":"Autonomic Closed Control Loops for Management, an idea whose time has come?","authors":"Liam Fallon, J. Keeney, R. Verma","doi":"10.23919/CNSM46954.2019.9012687","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012687","url":null,"abstract":"Taking an autonomic approach to management and using closed control loops has been the subject of much research in the Network management community since the early 2000s. It is fair to say that Network Management system developers and users have not adopted Autonomic Management approaches very widely. Most network management systems continue to use an ITU TMN inspired layered approach to management.In recent years, a trend towards implementing autonomic management and closed control loops on management systems built using a TMN architecture has emerged in practice. This trend is requirement driven; an autonomic approach is taken when there is no other option for implementing a feature. It is clear to see a closed control loop approach being taken to implement C-SON (Centralized Self Organizing Networks) features in 4G network management systems in the early 2010s. Autonomic approaches are even more apparent in systems such as ONAP that implement SDN and NFV orchestration. However, the implementation of closed control loops is often pragmatic and rigid, focused on the feature being delivered. Providing systemized support for control loops is in its infancy and has much to learn from the extensive autonomic management literatureThis paper surveys the current state of autonomic management in practice and outlines some research challenges that must be addressed to allow it to be systematically supported in current management systems, with a particular focus on ONAP.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"1520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131747064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quick Execution Time Predictions for Spark Applications Spark应用程序的快速执行时间预测
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012752
Sarah Shah, Yasaman Amannejad, Diwakar Krishnamurthy, Mea Wang
The Apache Spark cluster computing platform is being increasingly used to develop big data analytics applications. There are many scenarios that require quick estimates of the execution time of any given Spark application. For example, users and operators of a Spark cluster often require quick insights on how the execution time of an application is likely to be impacted by the resources allocated to the application, e.g., the number of Spark executor cores assigned, and the size of the data to be processed. Job schedulers can benefit from fast estimates at runtime that would allow them to quickly conFigure a Spark application for a desired execution time using the least amount of resources. While others have developed models to predict the execution time of Spark applications, such models typically require extensive prior executions of applications under various resource allocation settings and data sizes. Consequently, these techniques are not suited for situations where quick predictions are required and very little cluster resources are available for the experimentation needed to build a model. This paper proposes an alternative approach called PERIDOT that addresses this limitation. The approach involves executing a given application under a fixed resource allocation setting with two different-sized, small subsets of its input data. It analyzes logs from these two executions to estimate the dependencies between internal stages in the application. Information on these dependencies combined with knowledge of Spark’s data partitioning mechanisms is used to derive an analytic model that can predict execution times for other resource allocation settings and input data sizes. We show that deriving a model using just these two reference executions allows PERIDOT to accurately predict the performance of a variety of Spark applications spanning text analytics, linear algebra, machine learning and Spark SQL. In contrast, we show that a state-of-the-art machine learning based execution time prediction algorithm performs poorly when presented with such limited training data.
Apache Spark集群计算平台越来越多地用于开发大数据分析应用程序。有许多场景需要快速估计任何给定Spark应用程序的执行时间。例如,Spark集群的用户和操作人员通常需要快速了解应用程序的执行时间可能如何受到分配给应用程序的资源的影响,例如,分配的Spark执行器内核的数量,以及要处理的数据的大小。作业调度器可以从运行时的快速估计中获益,这将允许它们使用最少的资源快速配置Spark应用程序以获得所需的执行时间。虽然其他人已经开发了模型来预测Spark应用程序的执行时间,但这些模型通常需要在各种资源分配设置和数据大小下大量预先执行应用程序。因此,这些技术不适合需要快速预测的情况,并且用于构建模型所需的实验的集群资源非常少。本文提出了一种称为PERIDOT的替代方法来解决这一限制。该方法涉及在固定的资源分配设置下执行给定的应用程序,并使用其输入数据的两个不同大小的小子集。它分析这两次执行的日志,以估计应用程序内部阶段之间的依赖关系。这些依赖关系的信息结合Spark数据分区机制的知识,可以用来导出一个分析模型,该模型可以预测其他资源分配设置和输入数据大小的执行时间。我们表明,仅使用这两个参考执行来推导模型,PERIDOT就可以准确地预测各种Spark应用程序的性能,包括文本分析、线性代数、机器学习和Spark SQL。相比之下,我们表明,最先进的基于机器学习的执行时间预测算法在提供如此有限的训练数据时表现不佳。
{"title":"Quick Execution Time Predictions for Spark Applications","authors":"Sarah Shah, Yasaman Amannejad, Diwakar Krishnamurthy, Mea Wang","doi":"10.23919/CNSM46954.2019.9012752","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012752","url":null,"abstract":"The Apache Spark cluster computing platform is being increasingly used to develop big data analytics applications. There are many scenarios that require quick estimates of the execution time of any given Spark application. For example, users and operators of a Spark cluster often require quick insights on how the execution time of an application is likely to be impacted by the resources allocated to the application, e.g., the number of Spark executor cores assigned, and the size of the data to be processed. Job schedulers can benefit from fast estimates at runtime that would allow them to quickly conFigure a Spark application for a desired execution time using the least amount of resources. While others have developed models to predict the execution time of Spark applications, such models typically require extensive prior executions of applications under various resource allocation settings and data sizes. Consequently, these techniques are not suited for situations where quick predictions are required and very little cluster resources are available for the experimentation needed to build a model. This paper proposes an alternative approach called PERIDOT that addresses this limitation. The approach involves executing a given application under a fixed resource allocation setting with two different-sized, small subsets of its input data. It analyzes logs from these two executions to estimate the dependencies between internal stages in the application. Information on these dependencies combined with knowledge of Spark’s data partitioning mechanisms is used to derive an analytic model that can predict execution times for other resource allocation settings and input data sizes. We show that deriving a model using just these two reference executions allows PERIDOT to accurately predict the performance of a variety of Spark applications spanning text analytics, linear algebra, machine learning and Spark SQL. In contrast, we show that a state-of-the-art machine learning based execution time prediction algorithm performs poorly when presented with such limited training data.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132661022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Adaptive Quorum-inspired SLA-Aware Consistency for Distributed SDN Controllers 分布式SDN控制器自适应群体启发的sla感知一致性
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012692
Fetia Bannour, Sami Souihi, A. Mellouk
This paper addresses the knowledge dissemination problem in distributed SDN control by proposing an adaptive and continuous consistency model for the distributed SDN controllers in large-scale deployments. We put forward a scalable and intelligent replication strategy following Quorum-replicated consistency: It uses the read and write Quorum parameters as adjustable control knobs for a fine-grained consistency level tuning. The main purpose is to find, at runtime, appropriate partial Quorum configurations that achieve, under changing network and workload conditions, balanced trade-offs between the application’s continuous performance and consistency requirements. Our approach was implemented for a CDN-like application that we designed on top of the ONOS controllers. When compared to ONOS’s static consistency model, our model proved efficient in minimizing the application’s inter-controller overhead while satisfying the SLA-style application requirements.
本文提出了一种大规模部署的分布式SDN控制器自适应连续一致性模型,解决了分布式SDN控制中的知识传播问题。我们提出了一种遵循Quorum复制一致性的可扩展智能复制策略:它使用读写Quorum参数作为可调控制旋钮,用于细粒度一致性级别调优。其主要目的是在运行时找到适当的部分Quorum配置,这些配置可以在不断变化的网络和工作负载条件下,在应用程序的连续性能和一致性需求之间实现平衡。我们的方法是在ONOS控制器之上设计的一个类似cdn的应用程序中实现的。与ONOS的静态一致性模型相比,我们的模型在满足sla风格的应用程序需求的同时,有效地减少了应用程序的控制器间开销。
{"title":"Adaptive Quorum-inspired SLA-Aware Consistency for Distributed SDN Controllers","authors":"Fetia Bannour, Sami Souihi, A. Mellouk","doi":"10.23919/CNSM46954.2019.9012692","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012692","url":null,"abstract":"This paper addresses the knowledge dissemination problem in distributed SDN control by proposing an adaptive and continuous consistency model for the distributed SDN controllers in large-scale deployments. We put forward a scalable and intelligent replication strategy following Quorum-replicated consistency: It uses the read and write Quorum parameters as adjustable control knobs for a fine-grained consistency level tuning. The main purpose is to find, at runtime, appropriate partial Quorum configurations that achieve, under changing network and workload conditions, balanced trade-offs between the application’s continuous performance and consistency requirements. Our approach was implemented for a CDN-like application that we designed on top of the ONOS controllers. When compared to ONOS’s static consistency model, our model proved efficient in minimizing the application’s inter-controller overhead while satisfying the SLA-style application requirements.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128006040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lumped Markovian Estimation for Wi-Fi Channel Utilization Prediction Wi-Fi信道利用率预测的集总马尔可夫估计
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012721
Sepehr Kazemian, I. Nikolaidis
We present a model to predict the short-term utilization of an IEEE 802.11 channel. We approximate the time-varying utilization process via a Markovian state transition model and subsequently create a lumped representation of the transition matrix. Each lumped state can then be treated as a class. The lumped matrix provides a simpler to understand description of the channel utilization behavior and naturally includes the persistence in one lumped state which resembles the characteristic behavior of naive predictors (where predicted state equals the current state). We demonstrate that treating the lumped states as classes allows good prediction models to be built using Logistic Regression and Neural Network models. Our results are based on IEEE 802.11 wireless utilization data collected as reported in the channel utilization (CU) field of the QBSS Load Element in Beacon frames. The presented approach can be implemented as an edge computing task, whereby edge nodes calculate the lumped states and train models, informing nearby client devices of the model parameters, allowing them to produce predictions on their own.
我们提出了一个模型来预测IEEE 802.11信道的短期利用率。我们通过马尔可夫状态转移模型近似时变利用过程,随后创建转移矩阵的集总表示。然后可以将每个集中状态视为一个类。集总矩阵提供了一种更容易理解的通道利用行为描述,并且自然地包含了一个集总状态的持久性,它类似于朴素预测器的特征行为(其中预测状态等于当前状态)。我们证明,将集中状态作为类处理可以使用逻辑回归和神经网络模型建立良好的预测模型。我们的结果是基于在信标帧中QBSS负载元素的信道利用率(CU)字段中收集的IEEE 802.11无线利用率数据。所提出的方法可以作为边缘计算任务来实现,其中边缘节点计算集总状态并训练模型,将模型参数通知附近的客户端设备,允许它们自己产生预测。
{"title":"Lumped Markovian Estimation for Wi-Fi Channel Utilization Prediction","authors":"Sepehr Kazemian, I. Nikolaidis","doi":"10.23919/CNSM46954.2019.9012721","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012721","url":null,"abstract":"We present a model to predict the short-term utilization of an IEEE 802.11 channel. We approximate the time-varying utilization process via a Markovian state transition model and subsequently create a lumped representation of the transition matrix. Each lumped state can then be treated as a class. The lumped matrix provides a simpler to understand description of the channel utilization behavior and naturally includes the persistence in one lumped state which resembles the characteristic behavior of naive predictors (where predicted state equals the current state). We demonstrate that treating the lumped states as classes allows good prediction models to be built using Logistic Regression and Neural Network models. Our results are based on IEEE 802.11 wireless utilization data collected as reported in the channel utilization (CU) field of the QBSS Load Element in Beacon frames. The presented approach can be implemented as an edge computing task, whereby edge nodes calculate the lumped states and train models, informing nearby client devices of the model parameters, allowing them to produce predictions on their own.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115278624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Ethereum’s Blockchain Anonymity Using Smart Contract Code Attribution 使用智能合约代码归属探索以太坊区块链匿名性
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012681
Shlomi Linoy, Natalia Stakhanova, A. Matyukhina
Blockchain users are identified by addresses (public keys), which cannot be easily linked back to them without out-of-network information. This provides pseudo-anonymity, which is amplified when the user generates a new address for each transaction. Since all transaction history is visible to all users in public blockchains, finding affiliation between related addresses can hurt pseudo-anonymity. Such affiliation information can be used to discriminate against addresses that were found to be related to a specific group, or can even lead to the de-anonymization of all addresses in the associated group, if out-of-network information is available on a few addresses in that group. In this work we propose to leverage a stylometry approach on Ethereum’s deployed smart contracts’ bytecode and high level source code, which is publicly available by third party platforms. We explore the extent to which a deployed smart contract’s source code can contribute to the affiliation of addresses. To address this, we prepare a dataset of real-world Ethereum smart contracts data, which we make publicly available; design and implement feature selection, extraction techniques, data refinement heuristics, and examine their effect on attribution accuracy. We further use these techniques to test the classification of real-world scammers data.
区块链用户由地址(公钥)标识,如果没有网外信息,就不能很容易地链接到用户。这提供了伪匿名性,当用户为每笔交易生成一个新地址时,伪匿名性会被放大。由于所有交易历史对公共区块链中的所有用户都是可见的,因此查找相关地址之间的关联可能会损害伪匿名性。这种隶属关系信息可以用来区分与特定组相关的地址,或者甚至可以导致关联组中所有地址的去匿名化,如果该组中有几个地址的网络外信息可用。在这项工作中,我们建议在以太坊部署的智能合约的字节码和高级源代码上利用一种风格方法,这些代码可以通过第三方平台公开获得。我们将探讨部署的智能合约的源代码在多大程度上有助于地址的关联。为了解决这个问题,我们准备了一个真实世界的以太坊智能合约数据集,我们将其公开提供;设计和实现特征选择、提取技术、数据优化启发式,并检查它们对归因准确性的影响。我们进一步使用这些技术来测试真实世界骗子数据的分类。
{"title":"Exploring Ethereum’s Blockchain Anonymity Using Smart Contract Code Attribution","authors":"Shlomi Linoy, Natalia Stakhanova, A. Matyukhina","doi":"10.23919/CNSM46954.2019.9012681","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012681","url":null,"abstract":"Blockchain users are identified by addresses (public keys), which cannot be easily linked back to them without out-of-network information. This provides pseudo-anonymity, which is amplified when the user generates a new address for each transaction. Since all transaction history is visible to all users in public blockchains, finding affiliation between related addresses can hurt pseudo-anonymity. Such affiliation information can be used to discriminate against addresses that were found to be related to a specific group, or can even lead to the de-anonymization of all addresses in the associated group, if out-of-network information is available on a few addresses in that group. In this work we propose to leverage a stylometry approach on Ethereum’s deployed smart contracts’ bytecode and high level source code, which is publicly available by third party platforms. We explore the extent to which a deployed smart contract’s source code can contribute to the affiliation of addresses. To address this, we prepare a dataset of real-world Ethereum smart contracts data, which we make publicly available; design and implement feature selection, extraction techniques, data refinement heuristics, and examine their effect on attribution accuracy. We further use these techniques to test the classification of real-world scammers data.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116702764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Scalable Color-Based Caching Scheme in Telco-CDNs 电信cdn中可扩展的基于颜色的缓存方案
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012726
Anh-Tu Ngoc Tran, Thanh-Dang Diep, Takuma Nakajima, Masato Yoshimi, N. Thoai
Internet traffic is growing quickly, and it is majorly contributed by the proliferation of video services. Content Delivery Networks (CDNs) reduce the video traffic by storing replicas of videos in their cache servers. Nonetheless, the cache servers are usually located outside Internet Service Providers (ISPs). This implies that CDNs cannot reduce the video traffic inside ISP networks. To mitigate this issue, many ISPs build their own CDNs called Telco-CDNs. Genetic Algorithm-based caching is deemed the best approach in terms of traffic reduction. However, it is not practical since its computation time to generate content allocations is extremely long even when using a cluster. A color-based approach was devised to help overcome the drawback at the expense of its increase in traffic. Nevertheless, in case the number of content categories or requests proliferates quickly, the approach also has the same limitation like the Genetic Algorithm-based caching. To resolve the limitation, we propose two novel techniques to hamper the increase in the computation time. One is able to cope with the situation when the number of content categories increases while the other can deal with the circumstance when the number of requests rises. The empirical results show that the computation time is reduced 5x for the former and 7x for the latter at the expense of 1% and 12% increase in traffic for a problem of 5,000 contents, respectively.
互联网流量正在迅速增长,这主要是由于视频服务的激增。内容分发网络(cdn)通过在缓存服务器中存储视频副本来减少视频流量。尽管如此,缓存服务器通常位于互联网服务提供商(isp)之外。这意味着cdn不能减少ISP网络内的视频流量。为了缓解这个问题,许多isp建立了自己的cdn,称为telco - cdn。基于遗传算法的缓存被认为是减少流量的最佳方法。然而,这是不实际的,因为即使在使用集群时,生成内容分配的计算时间也非常长。设计了一种基于颜色的方法来帮助克服以增加流量为代价的缺点。然而,在内容类别或请求数量迅速增加的情况下,该方法也有与基于遗传算法的缓存相同的限制。为了解决这一限制,我们提出了两种新的技术来阻止计算时间的增加。一个能够应对内容类别增加的情况,另一个能够应对请求数量增加的情况。实证结果表明,对于5000个内容的问题,前者的计算时间减少了5倍,后者的计算时间减少了7倍,而代价是流量分别增加了1%和12%。
{"title":"A Scalable Color-Based Caching Scheme in Telco-CDNs","authors":"Anh-Tu Ngoc Tran, Thanh-Dang Diep, Takuma Nakajima, Masato Yoshimi, N. Thoai","doi":"10.23919/CNSM46954.2019.9012726","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012726","url":null,"abstract":"Internet traffic is growing quickly, and it is majorly contributed by the proliferation of video services. Content Delivery Networks (CDNs) reduce the video traffic by storing replicas of videos in their cache servers. Nonetheless, the cache servers are usually located outside Internet Service Providers (ISPs). This implies that CDNs cannot reduce the video traffic inside ISP networks. To mitigate this issue, many ISPs build their own CDNs called Telco-CDNs. Genetic Algorithm-based caching is deemed the best approach in terms of traffic reduction. However, it is not practical since its computation time to generate content allocations is extremely long even when using a cluster. A color-based approach was devised to help overcome the drawback at the expense of its increase in traffic. Nevertheless, in case the number of content categories or requests proliferates quickly, the approach also has the same limitation like the Genetic Algorithm-based caching. To resolve the limitation, we propose two novel techniques to hamper the increase in the computation time. One is able to cope with the situation when the number of content categories increases while the other can deal with the circumstance when the number of requests rises. The empirical results show that the computation time is reduced 5x for the former and 7x for the latter at the expense of 1% and 12% increase in traffic for a problem of 5,000 contents, respectively.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116715401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Host in Danger? Detecting Network Intrusions from Authentication Logs 宿主有危险?通过认证日志检测网络入侵
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012700
Haibo Bian, Tim Bai, M. A. Salahuddin, Noura Limam, Abbas Abou Daya, R. Boutaba
Recently, network infiltrations due to advanced persistent threats (APTs) have grown significantly, resulting in considerable losses to businesses and organizations. APTs are stealthy attacks with the primary objective of gaining unauthorized access to network assets. They often remain dormant for an extended period of time, which makes their detection challenging. In this paper, we leverage machine learning (ML) to detect hosts in a network that are targeted by an APT attack. We evaluate a number of ML classifiers to detect susceptible hosts in the Los Alamos National Lab dataset. We explore (i) graph-based features extracted from multiple data sources i.e., network flows and host authentication logs, (ii) feature engineering to reduce dimensionality, and (iii) balancing the training dataset using numerous over- and under-sampling techniques. Finally, we compare our model to the state-of-the-art approaches that leverage the same dataset, and show that our model outperforms them with respect to prediction performance and overhead.
近年来,高级持续性威胁(advanced persistent threat, apt)导致的网络渗透现象显著增加,给企业和组织造成了相当大的损失。apt是一种隐秘的攻击,其主要目标是获得对网络资产的未经授权的访问。它们通常会在很长一段时间内保持休眠状态,这使得检测它们变得很困难。在本文中,我们利用机器学习(ML)来检测网络中受到APT攻击的主机。我们评估了许多机器学习分类器,以检测洛斯阿拉莫斯国家实验室数据集中的易感主机。我们探索(i)从多个数据源(即网络流和主机认证日志)中提取的基于图的特征,(ii)特征工程来降低维数,以及(iii)使用大量过采样和欠采样技术来平衡训练数据集。最后,我们将我们的模型与利用相同数据集的最先进的方法进行比较,并表明我们的模型在预测性能和开销方面优于它们。
{"title":"Host in Danger? Detecting Network Intrusions from Authentication Logs","authors":"Haibo Bian, Tim Bai, M. A. Salahuddin, Noura Limam, Abbas Abou Daya, R. Boutaba","doi":"10.23919/CNSM46954.2019.9012700","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012700","url":null,"abstract":"Recently, network infiltrations due to advanced persistent threats (APTs) have grown significantly, resulting in considerable losses to businesses and organizations. APTs are stealthy attacks with the primary objective of gaining unauthorized access to network assets. They often remain dormant for an extended period of time, which makes their detection challenging. In this paper, we leverage machine learning (ML) to detect hosts in a network that are targeted by an APT attack. We evaluate a number of ML classifiers to detect susceptible hosts in the Los Alamos National Lab dataset. We explore (i) graph-based features extracted from multiple data sources i.e., network flows and host authentication logs, (ii) feature engineering to reduce dimensionality, and (iii) balancing the training dataset using numerous over- and under-sampling techniques. Finally, we compare our model to the state-of-the-art approaches that leverage the same dataset, and show that our model outperforms them with respect to prediction performance and overhead.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128373776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Scout: A Framework for Querying Networks Scout:查询网络的框架
Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012704
Andrew Curtis-Black, A. Willig, M. Galster
There are two kinds of network data: Network telemetry (e.g. packet counters) and business data (e.g. user roles). Existing approaches to querying network data keep these separate, increasing the number and complexity of queries users must write to answer questions about networks. We present Scout, a framework for creating tools which combine these two types of data. It is comprised of: An information model which can represent both network telemetry and business-domain data in use-case-specific schemas; a nascent query language for this information model; and an algorithm for executing queries on schemas. A preliminary evaluation showed that a Scout-based tool can answer questions pertaining to both network telemetry and business data, and reduces the knowledge and number of queries needed to answer realistic questions about networks.
有两种类型的网络数据:网络遥测(例如数据包计数器)和业务数据(例如用户角色)。现有的查询网络数据的方法将它们分开,增加了用户为回答有关网络的问题而必须编写的查询的数量和复杂性。我们介绍Scout,这是一个用于创建结合这两种数据类型的工具的框架。它由以下几个部分组成:一个信息模型,它可以用特定于用例的模式表示网络遥测和业务领域数据;该信息模型的新生查询语言;以及在模式上执行查询的算法。初步评估表明,基于scout的工具可以回答与网络遥测和业务数据有关的问题,并减少回答有关网络的实际问题所需的知识和查询数量。
{"title":"Scout: A Framework for Querying Networks","authors":"Andrew Curtis-Black, A. Willig, M. Galster","doi":"10.23919/CNSM46954.2019.9012704","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012704","url":null,"abstract":"There are two kinds of network data: Network telemetry (e.g. packet counters) and business data (e.g. user roles). Existing approaches to querying network data keep these separate, increasing the number and complexity of queries users must write to answer questions about networks. We present Scout, a framework for creating tools which combine these two types of data. It is comprised of: An information model which can represent both network telemetry and business-domain data in use-case-specific schemas; a nascent query language for this information model; and an algorithm for executing queries on schemas. A preliminary evaluation showed that a Scout-based tool can answer questions pertaining to both network telemetry and business data, and reduces the knowledge and number of queries needed to answer realistic questions about networks.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 15th International Conference on Network and Service Management (CNSM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1