首页 > 最新文献

2022 IEEE 47th Conference on Local Computer Networks (LCN)最新文献

英文 中文
VeNiCE: Enabling Automatic VNF Management based on Smart Contract Events 威尼斯:启用基于智能合约事件的VNF自动管理
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843597
E. Scheid, M. Franco, Fabian Küffer, Niels Kübler, Pascal Kiechl, B. Stiller
Network Functions Virtualization (NFV) has been a key part of evolving communication systems in the last few years. However, the life-cycle management of Virtual Network Functions (VNF) is still a not trivial task. Blockchains (BC), due to their decentralization and immutability characteristics, together with the automation provided by Smart Contracts (SC), can be employed to enable such automated and trustworthy VNF management.Thus, this paper proposes VeNiCE to automate the deployment and life-cycle management of VNFs using events emitted on SCs. VeNiCE provides automation and auditability by relying on a BC to provide a decentralized approach for VNF management, which performs management actions, such as VNF deployment and deletion, and based on events and communicates with an SC to provide immutable logging of the VNF life-cycle. VeNiCE provides (i) a frontend for user interaction, (ii) a backend implementing the communication with the NFV framework, and (iii) an SC that emits events, stores VNF allocations, and authenticates users. A prototype of VeNiCE was developed and deployed in the Ethereum BC using OpenStack Tacker as an NFV platform. Experiments were conducted in a real-world deployment of such a prototype to analyze the economic costs of using SCs and the time required to process requests by each component of VeNiCE and the BC. Those results obtained show VeNiCE’s feasibility, highlight its benefits achieved with the automation and provide insights on reducing costs by exploring additional BC platforms and different deployment types, which introduce centralization and management concerns.
在过去几年中,网络功能虚拟化(NFV)已经成为不断发展的通信系统的关键部分。然而,虚拟网络功能(VNF)的生命周期管理仍然是一项不容忽视的任务。区块链(BC)由于其去中心化和不变性的特点,加上智能合约(SC)提供的自动化,可以用来实现这种自动化和可信的VNF管理。因此,本文建议使用在sc上发出的事件来自动化VNFs的部署和生命周期管理。威尼斯通过依赖BC为VNF管理提供一种分散的方法来提供自动化和可审计性,它执行管理操作,例如VNF的部署和删除,并基于事件和与SC通信来提供VNF生命周期的不可变日志记录。威尼斯提供(i)用户交互的前端,(ii)实现与NFV框架通信的后端,以及(iii)发出事件、存储VNF分配和认证用户的SC。威尼斯的原型是使用OpenStack Tacker作为NFV平台在以太坊BC中开发和部署的。在这样一个原型的实际部署中进行了实验,以分析使用sc的经济成本以及处理威尼斯和BC的每个组件的请求所需的时间。这些结果显示了威尼斯的可行性,突出了自动化带来的好处,并通过探索额外的BC平台和不同的部署类型(引入集中化和管理问题)提供了降低成本的见解。
{"title":"VeNiCE: Enabling Automatic VNF Management based on Smart Contract Events","authors":"E. Scheid, M. Franco, Fabian Küffer, Niels Kübler, Pascal Kiechl, B. Stiller","doi":"10.1109/LCN53696.2022.9843597","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843597","url":null,"abstract":"Network Functions Virtualization (NFV) has been a key part of evolving communication systems in the last few years. However, the life-cycle management of Virtual Network Functions (VNF) is still a not trivial task. Blockchains (BC), due to their decentralization and immutability characteristics, together with the automation provided by Smart Contracts (SC), can be employed to enable such automated and trustworthy VNF management.Thus, this paper proposes VeNiCE to automate the deployment and life-cycle management of VNFs using events emitted on SCs. VeNiCE provides automation and auditability by relying on a BC to provide a decentralized approach for VNF management, which performs management actions, such as VNF deployment and deletion, and based on events and communicates with an SC to provide immutable logging of the VNF life-cycle. VeNiCE provides (i) a frontend for user interaction, (ii) a backend implementing the communication with the NFV framework, and (iii) an SC that emits events, stores VNF allocations, and authenticates users. A prototype of VeNiCE was developed and deployed in the Ethereum BC using OpenStack Tacker as an NFV platform. Experiments were conducted in a real-world deployment of such a prototype to analyze the economic costs of using SCs and the time required to process requests by each component of VeNiCE and the BC. Those results obtained show VeNiCE’s feasibility, highlight its benefits achieved with the automation and provide insights on reducing costs by exploring additional BC platforms and different deployment types, which introduce centralization and management concerns.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"135 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Global Service Time in SDN Through the Use of the Active Traffic First Approach: A Heuristic Solution 通过使用主动流量优先方法提高SDN的全局服务时间:一种启发式解决方案
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843558
Manuel Jiménez-Lázaro, J. Berrocal, J. Galán-Jiménez
A TCAM (Ternary Content-Addressable Memory) is a type of memory used in the flow tables of Software Defined Networking (SDN) nodes. Although these memories are very fast, their size is limited. This has an impact on the number of rules that can be installed, and an inefficient rule management can lead to a degradation of the network quality of service. In this work, an heuristic algorithm named Active Traffic First (ATF) is proposed to efficiently manage the content of the flow tables of the SDN nodes in order to maximize the Global Service Time (GST) of the active flows in the network. The idea behind ATF is adopted by deleting flows that are not being used in case a new flow aims to be served and there is no space available. Experimental results show that ATF outperforms other state-of-the-art solutions by improving GST and reducing re-installations.
TCAM(三元内容可寻址内存)是软件定义网络(SDN)节点流表中使用的一种内存。虽然这些存储器非常快,但它们的大小是有限的。这对可以安装的规则数量有影响,并且规则管理效率低下会导致网络服务质量的降低。本文提出一种主动流量优先(Active Traffic First, ATF)的启发式算法,对SDN节点流表内容进行有效管理,使网络中主动流的全局服务时间(Global Service Time, GST)最大化。ATF背后的思想是通过删除未被使用的流来实现的,以防新流的目标是服务,并且没有可用的空间。实验结果表明,通过提高GST和减少重新安装,ATF优于其他最先进的解决方案。
{"title":"Improving the Global Service Time in SDN Through the Use of the Active Traffic First Approach: A Heuristic Solution","authors":"Manuel Jiménez-Lázaro, J. Berrocal, J. Galán-Jiménez","doi":"10.1109/LCN53696.2022.9843558","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843558","url":null,"abstract":"A TCAM (Ternary Content-Addressable Memory) is a type of memory used in the flow tables of Software Defined Networking (SDN) nodes. Although these memories are very fast, their size is limited. This has an impact on the number of rules that can be installed, and an inefficient rule management can lead to a degradation of the network quality of service. In this work, an heuristic algorithm named Active Traffic First (ATF) is proposed to efficiently manage the content of the flow tables of the SDN nodes in order to maximize the Global Service Time (GST) of the active flows in the network. The idea behind ATF is adopted by deleting flows that are not being used in case a new flow aims to be served and there is no space available. Experimental results show that ATF outperforms other state-of-the-art solutions by improving GST and reducing re-installations.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132333492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning 基于自监督学习的少样本开集流量分类
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843450
Ji Li, Chunxiang Gu, Luan Luan, Fushan Wei, Wenfen Liu
Encrypted traffic classification is a key technology for network monitoring and management, and its recent research results are mostly based on deep learning. Due to the difficulty in obtaining sufficient labeled data, few-shot traffic classification has received considerable attention. However, most of the existing results have two defects. First, they are mostly based on the assumption of a labeled base dataset for pre-training. Second, they neglect the problem of unknown traffic discovery under open-set conditions. In this paper, aiming at the problem of few-shot open-set encrypted traffic classification, a corresponding framework FSOSTC is constructed under the condition of unsupervised pre-training. Two data augmentation methods for packet feature map are proposed to assist the pre-training through self-supervised learning, which is combined with parameter fine-tuning, unknown discovery and class extension strategies. Experiments on public datasets verify the effectiveness of FSOSTC. For the few-shot open-set malicious traffic classification task, the CSA reaches 95.41% and the AUROC reaches 0.8664.
加密流分类是网络监控和管理的关键技术,近年来的研究成果多基于深度学习。由于难以获得足够的标记数据,小样本流量分类受到了广泛的关注。然而,现有的研究结果大多存在两个缺陷。首先,它们大多基于对标记基础数据集的假设进行预训练。其次,忽略了开放条件下的未知流量发现问题。本文针对少镜头开集加密流量分类问题,在无监督预训练条件下构造了相应的框架FSOSTC。结合参数微调、未知发现和类扩展策略,提出了两种包特征映射的数据增强方法,通过自监督学习辅助预训练。在公共数据集上的实验验证了FSOSTC的有效性。对于少射次开集恶意流分类任务,CSA达到95.41%,AUROC达到0.8664。
{"title":"Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning","authors":"Ji Li, Chunxiang Gu, Luan Luan, Fushan Wei, Wenfen Liu","doi":"10.1109/LCN53696.2022.9843450","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843450","url":null,"abstract":"Encrypted traffic classification is a key technology for network monitoring and management, and its recent research results are mostly based on deep learning. Due to the difficulty in obtaining sufficient labeled data, few-shot traffic classification has received considerable attention. However, most of the existing results have two defects. First, they are mostly based on the assumption of a labeled base dataset for pre-training. Second, they neglect the problem of unknown traffic discovery under open-set conditions. In this paper, aiming at the problem of few-shot open-set encrypted traffic classification, a corresponding framework FSOSTC is constructed under the condition of unsupervised pre-training. Two data augmentation methods for packet feature map are proposed to assist the pre-training through self-supervised learning, which is combined with parameter fine-tuning, unknown discovery and class extension strategies. Experiments on public datasets verify the effectiveness of FSOSTC. For the few-shot open-set malicious traffic classification task, the CSA reaches 95.41% and the AUROC reaches 0.8664.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Inline Traffic Analysis Attacks on DNS over HTTPS 内联流量分析基于HTTPS协议的DNS攻击
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843593
T. Dahanayaka, Zhiyi Wang, Guillaume Jourjon, Suranga Seneviratne
Even though end-to-end encryption was introduced to Domain Name System (DNS) communications to ensure user privacy and there is an increase in adoption of DNS over HTTPS (DoH), prior research has demonstrated that encrypted DNS traffic is vulnerable to traffic analysis attacks. However, these attacks were demonstrated under strong assumptions such as handling only closed-set classification or doing only post-event analysis. In this work we demonstrate traffic analysis attacks on DoH without such strong assumptions. We first show the feasibility of website fingerprinting over DoH traffic and present an inline traffic analysis attack that achieve over 90% accuracy using DoH traces of length as short as ten packets. Next, we propose a novel open-set classification method and achieve over 75% accuracy on both closed-set and open-set samples for the open-set scenario. Finally, we demonstrate that the same attack can be performed without any knowledge on the start of the activity.
尽管端到端加密被引入到域名系统(DNS)通信中以确保用户隐私,并且通过HTTPS (DoH)采用DNS的情况有所增加,但先前的研究表明,加密的DNS流量很容易受到流量分析攻击。然而,这些攻击是在强假设下进行的,例如只处理闭集分类或只进行事后分析。在这项工作中,我们演示了在没有这种强假设的情况下对DoH的流量分析攻击。我们首先展示了在DoH流量上进行网站指纹识别的可行性,并提出了一种内联流量分析攻击,该攻击使用长度短至10个数据包的DoH跟踪实现了90%以上的准确率。接下来,我们提出了一种新的开集分类方法,在开集场景下,对闭集和开集样本的分类准确率都超过75%。最后,我们演示了可以在不知道活动开始的情况下执行相同的攻击。
{"title":"Inline Traffic Analysis Attacks on DNS over HTTPS","authors":"T. Dahanayaka, Zhiyi Wang, Guillaume Jourjon, Suranga Seneviratne","doi":"10.1109/LCN53696.2022.9843593","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843593","url":null,"abstract":"Even though end-to-end encryption was introduced to Domain Name System (DNS) communications to ensure user privacy and there is an increase in adoption of DNS over HTTPS (DoH), prior research has demonstrated that encrypted DNS traffic is vulnerable to traffic analysis attacks. However, these attacks were demonstrated under strong assumptions such as handling only closed-set classification or doing only post-event analysis. In this work we demonstrate traffic analysis attacks on DoH without such strong assumptions. We first show the feasibility of website fingerprinting over DoH traffic and present an inline traffic analysis attack that achieve over 90% accuracy using DoH traces of length as short as ten packets. Next, we propose a novel open-set classification method and achieve over 75% accuracy on both closed-set and open-set samples for the open-set scenario. Finally, we demonstrate that the same attack can be performed without any knowledge on the start of the activity.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Mobile Computation Offloading over a Finite-State Markovian Channel using Spectral State Aggregation 基于频谱状态聚合的有限状态马尔可夫信道的高效移动计算卸载
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843606
P. Teymoori, A. Boukerche, Feng Liang
This paper considers the problem of mobile computation offloading under stochastic wireless channels while task completion times are subject to deadline constraints. Our objective is to conserve energy for the mobile device by making an optimal decision to execute the task either locally or remotely. In the case of computation offloading, we dynamically vary the data transmission rate, in response to channel conditions. The wireless transmission channel is modelled using a Finite-State Markov Chain (FSMC). We formulate the problem of computation offloading as a constrained optimization problem, and develop an online algorithm to derive the optimal offloading policy. Moreover, to reduce the complexity, we estimate a suboptimal solution of the proposed online algorithm by reducing the size of the FSMC with the help of Markovian aggregation. The numerical results indicate that by applying Markovian aggregation, the running time of the algorithm can be significantly reduced without suffering unreasonable performance degradation.
研究了随机无线信道下,任务完成时间受期限约束的移动计算卸载问题。我们的目标是通过做出本地或远程执行任务的最佳决策来为移动设备节省能量。在计算卸载的情况下,我们动态地改变数据传输速率,以响应信道条件。采用有限状态马尔可夫链(FSMC)对无线传输信道进行建模。我们将计算卸载问题表述为一个约束优化问题,并开发了一种在线算法来推导最优卸载策略。此外,为了降低复杂度,我们利用马尔可夫聚合方法减少FSMC的大小,估计出该在线算法的次优解。数值结果表明,采用马尔可夫聚合可以显著缩短算法的运行时间,而不会造成不合理的性能下降。
{"title":"Efficient Mobile Computation Offloading over a Finite-State Markovian Channel using Spectral State Aggregation","authors":"P. Teymoori, A. Boukerche, Feng Liang","doi":"10.1109/LCN53696.2022.9843606","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843606","url":null,"abstract":"This paper considers the problem of mobile computation offloading under stochastic wireless channels while task completion times are subject to deadline constraints. Our objective is to conserve energy for the mobile device by making an optimal decision to execute the task either locally or remotely. In the case of computation offloading, we dynamically vary the data transmission rate, in response to channel conditions. The wireless transmission channel is modelled using a Finite-State Markov Chain (FSMC). We formulate the problem of computation offloading as a constrained optimization problem, and develop an online algorithm to derive the optimal offloading policy. Moreover, to reduce the complexity, we estimate a suboptimal solution of the proposed online algorithm by reducing the size of the FSMC with the help of Markovian aggregation. The numerical results indicate that by applying Markovian aggregation, the running time of the algorithm can be significantly reduced without suffering unreasonable performance degradation.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129042287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic 好莱坞:在网络流量的移动图像中检测体积攻击
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843465
Samuel Kopmann, Hauke Heseding, M. Zitterbart
Fast detection of Distributed Denial of Service attacks is key for establishing appropriate countermeasures in order to protect potential targets. HollywooDDoS applies well-known techniques from movie classification to the challenge of DDoS detection. The proposed approach utilizes a traffic aggregation scheme representing traffic volumes between IP subnets as two-dimensional images, while preserving detection relevant traffic characteristics. These images serve as input for a convolutional neural network, learning IP address space distributions of both background and attack traffic intensities. It is shown that a real-world DDoS attack can be precisely detected on the time scale of milliseconds. We evaluate classification of images without temporal information about attack traffic development to outline the impact of image resolution and aggregation time frames. We then show that attack detection further improves by 17% when utilizing a consecutive series of images capturing traffic dynamics.
快速检测分布式拒绝服务攻击是建立适当对策以保护潜在目标的关键。HollywooDDoS应用著名的技术从电影分类到DDoS检测的挑战。该方法利用流量聚合方案将IP子网之间的流量表示为二维图像,同时保留检测相关的流量特征。这些图像作为卷积神经网络的输入,学习背景和攻击流量强度的IP地址空间分布。研究表明,可以在毫秒级的时间尺度上精确检测到真实世界的DDoS攻击。我们评估了没有关于攻击流量发展的时间信息的图像分类,以概述图像分辨率和聚合时间框架的影响。然后,我们表明,当利用连续的一系列图像捕获流量动态时,攻击检测进一步提高了17%。
{"title":"HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic","authors":"Samuel Kopmann, Hauke Heseding, M. Zitterbart","doi":"10.1109/LCN53696.2022.9843465","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843465","url":null,"abstract":"Fast detection of Distributed Denial of Service attacks is key for establishing appropriate countermeasures in order to protect potential targets. HollywooDDoS applies well-known techniques from movie classification to the challenge of DDoS detection. The proposed approach utilizes a traffic aggregation scheme representing traffic volumes between IP subnets as two-dimensional images, while preserving detection relevant traffic characteristics. These images serve as input for a convolutional neural network, learning IP address space distributions of both background and attack traffic intensities. It is shown that a real-world DDoS attack can be precisely detected on the time scale of milliseconds. We evaluate classification of images without temporal information about attack traffic development to outline the impact of image resolution and aggregation time frames. We then show that attack detection further improves by 17% when utilizing a consecutive series of images capturing traffic dynamics.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"31 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safe, Fast, and Cycle-Free Multi-Path Routing Using Vouchers 使用凭证的安全、快速和无周期的多路径路由
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843624
J. Garcia-Luna-Aceves
A new approach to loop-free shortest-path routing is introduced that uses distance vouchers that attest to the acyclic nature of paths. Routers search and find new shortest paths to destinations without ever creating routing loops by trusting updates originated by routers that vouch being closer to destinations. The new approach is shown to converge faster than prior loop-free shortest-path routing methods.
提出了一种无环路最短路径路由的新方法,该方法使用距离凭证来证明路径的无环路特性。路由器通过信任由保证离目的地更近的路由器发起的更新,搜索并找到到达目的地的新的最短路径,而不会产生路由循环。结果表明,该方法比现有的无环最短路径路由方法收敛速度快。
{"title":"Safe, Fast, and Cycle-Free Multi-Path Routing Using Vouchers","authors":"J. Garcia-Luna-Aceves","doi":"10.1109/LCN53696.2022.9843624","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843624","url":null,"abstract":"A new approach to loop-free shortest-path routing is introduced that uses distance vouchers that attest to the acyclic nature of paths. Routers search and find new shortest paths to destinations without ever creating routing loops by trusting updates originated by routers that vouch being closer to destinations. The new approach is shown to converge faster than prior loop-free shortest-path routing methods.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121158528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Ad Substitution in Hybrid Broadband Broadcast Environments 混合宽带广播环境中的动态广告替代
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843406
R. Seeliger, Louay Bassbouss
Technology environments are fragmented, hybrid and broadcast merge along online and digital paths, orchestration and distribution of individual content streams are evolving rapidly; DAI, SSAI, CSAI, DAS, targeted advertising and addressable TV are terms with different techniques but at the same time often used for similar use cases. There are standards such as HbbTV and MPEG-DASH available, but they meet these requirements only partially and require enhancements before they can be adopted by the industry. While HbbTV 2.0.3 is the latest version of the specification, it still has limitations in providing a seamless and personalized ad experience across broadcast and broadband. This demo showcases a real world, deployed and almost product ready implementation of Dynamic Ad Substitution for HbbTV Versions 1.5 and 2.0.X showcasing the feasibility for individual content replacements via broadband in broadcast environments.
技术环境是碎片化的,混合的,并沿着在线和数字路径广播合并,单个内容流的编排和分发正在迅速发展;DAI, SSAI, CSAI, DAS,目标广告和可寻址电视是不同技术的术语,但同时经常用于类似的用例。目前已有HbbTV和MPEG-DASH等标准,但它们只能部分满足这些要求,而且在被行业采用之前还需要改进。虽然HbbTV 2.0.3是该规范的最新版本,但它在提供跨广播和宽带的无缝和个性化广告体验方面仍然存在局限性。这个演示展示了HbbTV 1.5和2.0版本的动态广告替代的真实世界,部署和几乎产品就绪的实现。X展示了在广播环境中通过宽带进行个人内容替换的可行性。
{"title":"Dynamic Ad Substitution in Hybrid Broadband Broadcast Environments","authors":"R. Seeliger, Louay Bassbouss","doi":"10.1109/LCN53696.2022.9843406","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843406","url":null,"abstract":"Technology environments are fragmented, hybrid and broadcast merge along online and digital paths, orchestration and distribution of individual content streams are evolving rapidly; DAI, SSAI, CSAI, DAS, targeted advertising and addressable TV are terms with different techniques but at the same time often used for similar use cases. There are standards such as HbbTV and MPEG-DASH available, but they meet these requirements only partially and require enhancements before they can be adopted by the industry. While HbbTV 2.0.3 is the latest version of the specification, it still has limitations in providing a seamless and personalized ad experience across broadcast and broadband. This demo showcases a real world, deployed and almost product ready implementation of Dynamic Ad Substitution for HbbTV Versions 1.5 and 2.0.X showcasing the feasibility for individual content replacements via broadband in broadcast environments.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Auto-Tune: Efficient Autonomous Routing for Payment Channel Networks 自动调谐:支付通道网络的有效自主路由
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843633
Hsiang-Jen Hong, Sang-Yoon Chang, Xiaobo Zhou
Payment Channel Network (PCN) is a scaling solution for Cryptocurrency networks. We advance the practicality of the PCN multi-path routing by better modeling the system to incorporate the cost of routing fee and the privacy requirement of the channel balance. We design our Auto-Tune algorithm to optimize the routing concerning both the success rate and the routing fee and utilizing the limited channel capacity information (due to the privacy of the PCN user, the channel balance information is withheld). The simulation result shows Auto-Tune outperforms the current PCN implementation based on single-path routing in the success rate. We compare Auto-Tune against the state-of-the-art Flash algorithm, utilizing the channel-balance information, violating the PCN user privacy, and diverging from current implementation practices. Auto-Tune achieves the routing fee close to the optimal fee obtained by Flash, and its success rate is also close to the success rate achieved by Flash.
PCN (Payment Channel Network)是加密货币网络的扩展解决方案。通过对PCN多径路由系统进行更好的建模,将路由费用成本和信道平衡的隐私要求结合起来,提高了PCN多径路由的实用性。我们设计了Auto-Tune算法来优化路由,同时考虑成功率和路由费用,并利用有限的信道容量信息(由于PCN用户的隐私,信道余额信息被保留)。仿真结果表明,Auto-Tune在成功率上优于当前基于单路径路由的PCN实现。我们将Auto-Tune与最先进的Flash算法进行比较,利用通道平衡信息,侵犯PCN用户隐私,并且偏离当前的实现实践。Auto-Tune实现的路由费用接近Flash获得的最优费用,其成功率也接近Flash获得的成功率。
{"title":"Auto-Tune: Efficient Autonomous Routing for Payment Channel Networks","authors":"Hsiang-Jen Hong, Sang-Yoon Chang, Xiaobo Zhou","doi":"10.1109/LCN53696.2022.9843633","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843633","url":null,"abstract":"Payment Channel Network (PCN) is a scaling solution for Cryptocurrency networks. We advance the practicality of the PCN multi-path routing by better modeling the system to incorporate the cost of routing fee and the privacy requirement of the channel balance. We design our Auto-Tune algorithm to optimize the routing concerning both the success rate and the routing fee and utilizing the limited channel capacity information (due to the privacy of the PCN user, the channel balance information is withheld). The simulation result shows Auto-Tune outperforms the current PCN implementation based on single-path routing in the success rate. We compare Auto-Tune against the state-of-the-art Flash algorithm, utilizing the channel-balance information, violating the PCN user privacy, and diverging from current implementation practices. Auto-Tune achieves the routing fee close to the optimal fee obtained by Flash, and its success rate is also close to the success rate achieved by Flash.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Low-Latency Fog-based Framework to secure IoT Applications using Collaborative Federated Learning 使用协作联邦学习的低延迟基于雾的框架来保护物联网应用程序
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843315
Zakaria Abou El Houda, L. Khoukhi, B. Brik
Attacks against the IoT network are increasing rapidly, leading to an exponential growth in the number of unsecured IoT devices. Existing security mechanisms are facing several issues due to the lack of real-time decisions, high energy consumption, and high time delays. In this context, we propose a novel Low-Latency Fog-based Framework, called FogFed, to secure IoT applications using Fog computing and Federated Learning (FL). The fog brings security mechanisms near IoT devices reducing delays in communication, while FL enables a privacy-aware collaborative learning between IoT while preserving their privacy. FogFed combines two levels of detection, Fog-based IoT attack detection using a binary FL classifier and cloud-based IoT attack detection using a Multiclass FL classifier. The in-depth experiments results with well-known IoT attack/malware using, the UNSW-NB15 datastet, show the significant accuracy (99%) and detection rate (99%), which outperforms centralized ML/DL models, while significantly reducing delays and preserving the privacy.
针对物联网网络的攻击正在迅速增加,导致不安全的物联网设备数量呈指数级增长。由于缺乏实时决策、高能耗和高时间延迟,现有的安全机制面临着几个问题。在这种情况下,我们提出了一种新的低延迟基于雾的框架,称为FogFed,以使用雾计算和联邦学习(FL)来保护物联网应用程序。雾带来了物联网设备附近的安全机制,减少了通信延迟,而FL实现了物联网之间的隐私感知协作学习,同时保护了他们的隐私。FogFed结合了两个级别的检测,基于雾的物联网攻击检测使用二进制FL分类器和基于云的物联网攻击检测使用Multiclass FL分类器。利用著名的物联网攻击/恶意软件UNSW-NB15数据集进行的深入实验结果表明,该方法具有显著的准确率(99%)和检测率(99%),优于集中式ML/DL模型,同时显著减少了延迟并保护了隐私。
{"title":"A Low-Latency Fog-based Framework to secure IoT Applications using Collaborative Federated Learning","authors":"Zakaria Abou El Houda, L. Khoukhi, B. Brik","doi":"10.1109/LCN53696.2022.9843315","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843315","url":null,"abstract":"Attacks against the IoT network are increasing rapidly, leading to an exponential growth in the number of unsecured IoT devices. Existing security mechanisms are facing several issues due to the lack of real-time decisions, high energy consumption, and high time delays. In this context, we propose a novel Low-Latency Fog-based Framework, called FogFed, to secure IoT applications using Fog computing and Federated Learning (FL). The fog brings security mechanisms near IoT devices reducing delays in communication, while FL enables a privacy-aware collaborative learning between IoT while preserving their privacy. FogFed combines two levels of detection, Fog-based IoT attack detection using a binary FL classifier and cloud-based IoT attack detection using a Multiclass FL classifier. The in-depth experiments results with well-known IoT attack/malware using, the UNSW-NB15 datastet, show the significant accuracy (99%) and detection rate (99%), which outperforms centralized ML/DL models, while significantly reducing delays and preserving the privacy.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"50 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2022 IEEE 47th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1