首页 > 最新文献

2022 IEEE 47th Conference on Local Computer Networks (LCN)最新文献

英文 中文
Robust Deep Reinforcement Learning Algorithm for VNF-FG Embedding VNF-FG嵌入的鲁棒深度强化学习算法
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843650
Abdelmounaim Bouroudi, A. Outtagarts, Y. H. Aoul
Network slicing, also known as the virtual network embedding (VNE) problem, is an NP-hard optimization problem. Compared to traditional approaches, the methods relying on deep reinforcement learning yield better performance without exhibiting issues such as stacking at local minima and/or solutions’ space exploration limits. These algorithms present, however, different performances according to the employed approach, and the problem to be treated, resulting in robustness problems. To overcome these limits, we propose the adoption of the best algorithm, from a selection of learning strategies, in terms of reward and sample efficiency at each time step. The proposed strategy acts as a meta-algorithm that brings more robustness to the network by dynamically selecting the best solution for a specific scenario. Our solution proved its efficiency and managed to dynamically select the best algorithm in terms of the best acceptance ratio of the deployed services and outperform all the standalone algorithms.
网络切片,也称为虚拟网络嵌入(VNE)问题,是一个NP-hard优化问题。与传统方法相比,依赖于深度强化学习的方法产生了更好的性能,而不会出现局部最小值叠加和/或解决方案的空间探索限制等问题。然而,这些算法根据所采用的方法和要处理的问题表现出不同的性能,从而导致鲁棒性问题。为了克服这些限制,我们建议采用最佳算法,从学习策略的选择,在每个时间步的奖励和样本效率方面。该策略作为一种元算法,通过动态选择特定场景的最佳解决方案,为网络带来更强的鲁棒性。我们的解决方案证明了它的有效性,并且能够根据部署服务的最佳接受率动态选择最佳算法,并且优于所有独立算法。
{"title":"Robust Deep Reinforcement Learning Algorithm for VNF-FG Embedding","authors":"Abdelmounaim Bouroudi, A. Outtagarts, Y. H. Aoul","doi":"10.1109/LCN53696.2022.9843650","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843650","url":null,"abstract":"Network slicing, also known as the virtual network embedding (VNE) problem, is an NP-hard optimization problem. Compared to traditional approaches, the methods relying on deep reinforcement learning yield better performance without exhibiting issues such as stacking at local minima and/or solutions’ space exploration limits. These algorithms present, however, different performances according to the employed approach, and the problem to be treated, resulting in robustness problems. To overcome these limits, we propose the adoption of the best algorithm, from a selection of learning strategies, in terms of reward and sample efficiency at each time step. The proposed strategy acts as a meta-algorithm that brings more robustness to the network by dynamically selecting the best solution for a specific scenario. Our solution proved its efficiency and managed to dynamically select the best algorithm in terms of the best acceptance ratio of the deployed services and outperform all the standalone algorithms.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134069258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VeNiCE: Enabling Automatic VNF Management based on Smart Contract Events 威尼斯:启用基于智能合约事件的VNF自动管理
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843597
E. Scheid, M. Franco, Fabian Küffer, Niels Kübler, Pascal Kiechl, B. Stiller
Network Functions Virtualization (NFV) has been a key part of evolving communication systems in the last few years. However, the life-cycle management of Virtual Network Functions (VNF) is still a not trivial task. Blockchains (BC), due to their decentralization and immutability characteristics, together with the automation provided by Smart Contracts (SC), can be employed to enable such automated and trustworthy VNF management.Thus, this paper proposes VeNiCE to automate the deployment and life-cycle management of VNFs using events emitted on SCs. VeNiCE provides automation and auditability by relying on a BC to provide a decentralized approach for VNF management, which performs management actions, such as VNF deployment and deletion, and based on events and communicates with an SC to provide immutable logging of the VNF life-cycle. VeNiCE provides (i) a frontend for user interaction, (ii) a backend implementing the communication with the NFV framework, and (iii) an SC that emits events, stores VNF allocations, and authenticates users. A prototype of VeNiCE was developed and deployed in the Ethereum BC using OpenStack Tacker as an NFV platform. Experiments were conducted in a real-world deployment of such a prototype to analyze the economic costs of using SCs and the time required to process requests by each component of VeNiCE and the BC. Those results obtained show VeNiCE’s feasibility, highlight its benefits achieved with the automation and provide insights on reducing costs by exploring additional BC platforms and different deployment types, which introduce centralization and management concerns.
在过去几年中,网络功能虚拟化(NFV)已经成为不断发展的通信系统的关键部分。然而,虚拟网络功能(VNF)的生命周期管理仍然是一项不容忽视的任务。区块链(BC)由于其去中心化和不变性的特点,加上智能合约(SC)提供的自动化,可以用来实现这种自动化和可信的VNF管理。因此,本文建议使用在sc上发出的事件来自动化VNFs的部署和生命周期管理。威尼斯通过依赖BC为VNF管理提供一种分散的方法来提供自动化和可审计性,它执行管理操作,例如VNF的部署和删除,并基于事件和与SC通信来提供VNF生命周期的不可变日志记录。威尼斯提供(i)用户交互的前端,(ii)实现与NFV框架通信的后端,以及(iii)发出事件、存储VNF分配和认证用户的SC。威尼斯的原型是使用OpenStack Tacker作为NFV平台在以太坊BC中开发和部署的。在这样一个原型的实际部署中进行了实验,以分析使用sc的经济成本以及处理威尼斯和BC的每个组件的请求所需的时间。这些结果显示了威尼斯的可行性,突出了自动化带来的好处,并通过探索额外的BC平台和不同的部署类型(引入集中化和管理问题)提供了降低成本的见解。
{"title":"VeNiCE: Enabling Automatic VNF Management based on Smart Contract Events","authors":"E. Scheid, M. Franco, Fabian Küffer, Niels Kübler, Pascal Kiechl, B. Stiller","doi":"10.1109/LCN53696.2022.9843597","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843597","url":null,"abstract":"Network Functions Virtualization (NFV) has been a key part of evolving communication systems in the last few years. However, the life-cycle management of Virtual Network Functions (VNF) is still a not trivial task. Blockchains (BC), due to their decentralization and immutability characteristics, together with the automation provided by Smart Contracts (SC), can be employed to enable such automated and trustworthy VNF management.Thus, this paper proposes VeNiCE to automate the deployment and life-cycle management of VNFs using events emitted on SCs. VeNiCE provides automation and auditability by relying on a BC to provide a decentralized approach for VNF management, which performs management actions, such as VNF deployment and deletion, and based on events and communicates with an SC to provide immutable logging of the VNF life-cycle. VeNiCE provides (i) a frontend for user interaction, (ii) a backend implementing the communication with the NFV framework, and (iii) an SC that emits events, stores VNF allocations, and authenticates users. A prototype of VeNiCE was developed and deployed in the Ethereum BC using OpenStack Tacker as an NFV platform. Experiments were conducted in a real-world deployment of such a prototype to analyze the economic costs of using SCs and the time required to process requests by each component of VeNiCE and the BC. Those results obtained show VeNiCE’s feasibility, highlight its benefits achieved with the automation and provide insights on reducing costs by exploring additional BC platforms and different deployment types, which introduce centralization and management concerns.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"135 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning 基于自监督学习的少样本开集流量分类
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843450
Ji Li, Chunxiang Gu, Luan Luan, Fushan Wei, Wenfen Liu
Encrypted traffic classification is a key technology for network monitoring and management, and its recent research results are mostly based on deep learning. Due to the difficulty in obtaining sufficient labeled data, few-shot traffic classification has received considerable attention. However, most of the existing results have two defects. First, they are mostly based on the assumption of a labeled base dataset for pre-training. Second, they neglect the problem of unknown traffic discovery under open-set conditions. In this paper, aiming at the problem of few-shot open-set encrypted traffic classification, a corresponding framework FSOSTC is constructed under the condition of unsupervised pre-training. Two data augmentation methods for packet feature map are proposed to assist the pre-training through self-supervised learning, which is combined with parameter fine-tuning, unknown discovery and class extension strategies. Experiments on public datasets verify the effectiveness of FSOSTC. For the few-shot open-set malicious traffic classification task, the CSA reaches 95.41% and the AUROC reaches 0.8664.
加密流分类是网络监控和管理的关键技术,近年来的研究成果多基于深度学习。由于难以获得足够的标记数据,小样本流量分类受到了广泛的关注。然而,现有的研究结果大多存在两个缺陷。首先,它们大多基于对标记基础数据集的假设进行预训练。其次,忽略了开放条件下的未知流量发现问题。本文针对少镜头开集加密流量分类问题,在无监督预训练条件下构造了相应的框架FSOSTC。结合参数微调、未知发现和类扩展策略,提出了两种包特征映射的数据增强方法,通过自监督学习辅助预训练。在公共数据集上的实验验证了FSOSTC的有效性。对于少射次开集恶意流分类任务,CSA达到95.41%,AUROC达到0.8664。
{"title":"Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning","authors":"Ji Li, Chunxiang Gu, Luan Luan, Fushan Wei, Wenfen Liu","doi":"10.1109/LCN53696.2022.9843450","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843450","url":null,"abstract":"Encrypted traffic classification is a key technology for network monitoring and management, and its recent research results are mostly based on deep learning. Due to the difficulty in obtaining sufficient labeled data, few-shot traffic classification has received considerable attention. However, most of the existing results have two defects. First, they are mostly based on the assumption of a labeled base dataset for pre-training. Second, they neglect the problem of unknown traffic discovery under open-set conditions. In this paper, aiming at the problem of few-shot open-set encrypted traffic classification, a corresponding framework FSOSTC is constructed under the condition of unsupervised pre-training. Two data augmentation methods for packet feature map are proposed to assist the pre-training through self-supervised learning, which is combined with parameter fine-tuning, unknown discovery and class extension strategies. Experiments on public datasets verify the effectiveness of FSOSTC. For the few-shot open-set malicious traffic classification task, the CSA reaches 95.41% and the AUROC reaches 0.8664.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deficit Round-Robin: Network Calculus based Worst-Case Traversal Time Analysis Revisited 赤字轮循:基于网络演算的最坏情况遍历时间分析
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843526
Aakash Soni, Jean-Luc Scharbarg
Deficit Round-Robin (DRR) is a promising service discipline for real-time Ethernet without a global synchronisation. Two improved Network Calculus approaches have been proposed to provide the required bounds on end-to-end delays. The first one is fast but can be optimistic for cornet cases. The second one is safe but highly time consuming. In this paper, we remove the potential optimism of the first approach while keeping its low complexity.
赤字轮询(DRR)是一种很有前途的无全局同步的实时以太网服务规程。提出了两种改进的网络演算方法来提供端到端延迟所需的边界。第一种方法比较快,但对短号的情况可能比较乐观。第二种方法是安全的,但非常耗时。在本文中,我们消除了第一种方法的潜在乐观性,同时保持了其低复杂度。
{"title":"Deficit Round-Robin: Network Calculus based Worst-Case Traversal Time Analysis Revisited","authors":"Aakash Soni, Jean-Luc Scharbarg","doi":"10.1109/LCN53696.2022.9843526","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843526","url":null,"abstract":"Deficit Round-Robin (DRR) is a promising service discipline for real-time Ethernet without a global synchronisation. Two improved Network Calculus approaches have been proposed to provide the required bounds on end-to-end delays. The first one is fast but can be optimistic for cornet cases. The second one is safe but highly time consuming. In this paper, we remove the potential optimism of the first approach while keeping its low complexity.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124922687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Packet Classification with Field Missing 基于字段缺失的鲁棒分组分类
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843560
Jiayao Wang, Ziling Wei, Baosheng Wang, Bao-kang Zhao, Jincheng Zhong
Packet classification shows a key role in kinds of network functions, such as access control, routing, and quality of service (QoS). With the rapid growth of the network size, users have to ignore some fields in packet classification due to resource constraints. In addition, some fields may not always be available in some networks. However, traditional packet classification algorithms can hardly handle packet classification if some fields are missing. In this paper, we propose a novel model to build a robust classifier. In the classifier, we utilize the advantage of Recursive Flow Classification (RFC) in handling fields concurrently. Then, we design a new workflow to deal with field missing based on flows. In addition, two complementary bitmap models are designed to accelerate matching packets to flows, and a buffer mechanism is introduced to further improve the classification accuracy. Our experiments show that the proposed classifier can classify packets with an accuracy of 94%-99.5% when the field missing probability is lower than 0.3.
报文分类在访问控制、路由和服务质量(QoS)等网络功能中发挥着关键作用。随着网络规模的快速增长,由于资源的限制,用户不得不忽略包分类中的一些字段。此外,在某些网络中,有些字段可能并不总是可用的。然而,传统的包分类算法在缺少某些字段的情况下很难进行包分类。在本文中,我们提出了一个新的模型来建立一个鲁棒分类器。在分类器中,我们利用递归流分类(RFC)在并发处理字段方面的优势。然后,我们设计了一个新的基于流程的字段缺失处理流程。此外,设计了两个互补的位图模型来加速数据包与流的匹配,并引入了缓冲机制来进一步提高分类精度。实验表明,当字段缺失概率小于0.3时,本文提出的分类器对数据包的分类准确率为94%-99.5%。
{"title":"Robust Packet Classification with Field Missing","authors":"Jiayao Wang, Ziling Wei, Baosheng Wang, Bao-kang Zhao, Jincheng Zhong","doi":"10.1109/LCN53696.2022.9843560","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843560","url":null,"abstract":"Packet classification shows a key role in kinds of network functions, such as access control, routing, and quality of service (QoS). With the rapid growth of the network size, users have to ignore some fields in packet classification due to resource constraints. In addition, some fields may not always be available in some networks. However, traditional packet classification algorithms can hardly handle packet classification if some fields are missing. In this paper, we propose a novel model to build a robust classifier. In the classifier, we utilize the advantage of Recursive Flow Classification (RFC) in handling fields concurrently. Then, we design a new workflow to deal with field missing based on flows. In addition, two complementary bitmap models are designed to accelerate matching packets to flows, and a buffer mechanism is introduced to further improve the classification accuracy. Our experiments show that the proposed classifier can classify packets with an accuracy of 94%-99.5% when the field missing probability is lower than 0.3.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125096138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Safe, Fast, and Cycle-Free Multi-Path Routing Using Vouchers 使用凭证的安全、快速和无周期的多路径路由
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843624
J. Garcia-Luna-Aceves
A new approach to loop-free shortest-path routing is introduced that uses distance vouchers that attest to the acyclic nature of paths. Routers search and find new shortest paths to destinations without ever creating routing loops by trusting updates originated by routers that vouch being closer to destinations. The new approach is shown to converge faster than prior loop-free shortest-path routing methods.
提出了一种无环路最短路径路由的新方法,该方法使用距离凭证来证明路径的无环路特性。路由器通过信任由保证离目的地更近的路由器发起的更新,搜索并找到到达目的地的新的最短路径,而不会产生路由循环。结果表明,该方法比现有的无环最短路径路由方法收敛速度快。
{"title":"Safe, Fast, and Cycle-Free Multi-Path Routing Using Vouchers","authors":"J. Garcia-Luna-Aceves","doi":"10.1109/LCN53696.2022.9843624","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843624","url":null,"abstract":"A new approach to loop-free shortest-path routing is introduced that uses distance vouchers that attest to the acyclic nature of paths. Routers search and find new shortest paths to destinations without ever creating routing loops by trusting updates originated by routers that vouch being closer to destinations. The new approach is shown to converge faster than prior loop-free shortest-path routing methods.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121158528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Auto-Tune: Efficient Autonomous Routing for Payment Channel Networks 自动调谐:支付通道网络的有效自主路由
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843633
Hsiang-Jen Hong, Sang-Yoon Chang, Xiaobo Zhou
Payment Channel Network (PCN) is a scaling solution for Cryptocurrency networks. We advance the practicality of the PCN multi-path routing by better modeling the system to incorporate the cost of routing fee and the privacy requirement of the channel balance. We design our Auto-Tune algorithm to optimize the routing concerning both the success rate and the routing fee and utilizing the limited channel capacity information (due to the privacy of the PCN user, the channel balance information is withheld). The simulation result shows Auto-Tune outperforms the current PCN implementation based on single-path routing in the success rate. We compare Auto-Tune against the state-of-the-art Flash algorithm, utilizing the channel-balance information, violating the PCN user privacy, and diverging from current implementation practices. Auto-Tune achieves the routing fee close to the optimal fee obtained by Flash, and its success rate is also close to the success rate achieved by Flash.
PCN (Payment Channel Network)是加密货币网络的扩展解决方案。通过对PCN多径路由系统进行更好的建模,将路由费用成本和信道平衡的隐私要求结合起来,提高了PCN多径路由的实用性。我们设计了Auto-Tune算法来优化路由,同时考虑成功率和路由费用,并利用有限的信道容量信息(由于PCN用户的隐私,信道余额信息被保留)。仿真结果表明,Auto-Tune在成功率上优于当前基于单路径路由的PCN实现。我们将Auto-Tune与最先进的Flash算法进行比较,利用通道平衡信息,侵犯PCN用户隐私,并且偏离当前的实现实践。Auto-Tune实现的路由费用接近Flash获得的最优费用,其成功率也接近Flash获得的成功率。
{"title":"Auto-Tune: Efficient Autonomous Routing for Payment Channel Networks","authors":"Hsiang-Jen Hong, Sang-Yoon Chang, Xiaobo Zhou","doi":"10.1109/LCN53696.2022.9843633","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843633","url":null,"abstract":"Payment Channel Network (PCN) is a scaling solution for Cryptocurrency networks. We advance the practicality of the PCN multi-path routing by better modeling the system to incorporate the cost of routing fee and the privacy requirement of the channel balance. We design our Auto-Tune algorithm to optimize the routing concerning both the success rate and the routing fee and utilizing the limited channel capacity information (due to the privacy of the PCN user, the channel balance information is withheld). The simulation result shows Auto-Tune outperforms the current PCN implementation based on single-path routing in the success rate. We compare Auto-Tune against the state-of-the-art Flash algorithm, utilizing the channel-balance information, violating the PCN user privacy, and diverging from current implementation practices. Auto-Tune achieves the routing fee close to the optimal fee obtained by Flash, and its success rate is also close to the success rate achieved by Flash.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"461 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Low-Latency Fog-based Framework to secure IoT Applications using Collaborative Federated Learning 使用协作联邦学习的低延迟基于雾的框架来保护物联网应用程序
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843315
Zakaria Abou El Houda, L. Khoukhi, B. Brik
Attacks against the IoT network are increasing rapidly, leading to an exponential growth in the number of unsecured IoT devices. Existing security mechanisms are facing several issues due to the lack of real-time decisions, high energy consumption, and high time delays. In this context, we propose a novel Low-Latency Fog-based Framework, called FogFed, to secure IoT applications using Fog computing and Federated Learning (FL). The fog brings security mechanisms near IoT devices reducing delays in communication, while FL enables a privacy-aware collaborative learning between IoT while preserving their privacy. FogFed combines two levels of detection, Fog-based IoT attack detection using a binary FL classifier and cloud-based IoT attack detection using a Multiclass FL classifier. The in-depth experiments results with well-known IoT attack/malware using, the UNSW-NB15 datastet, show the significant accuracy (99%) and detection rate (99%), which outperforms centralized ML/DL models, while significantly reducing delays and preserving the privacy.
针对物联网网络的攻击正在迅速增加,导致不安全的物联网设备数量呈指数级增长。由于缺乏实时决策、高能耗和高时间延迟,现有的安全机制面临着几个问题。在这种情况下,我们提出了一种新的低延迟基于雾的框架,称为FogFed,以使用雾计算和联邦学习(FL)来保护物联网应用程序。雾带来了物联网设备附近的安全机制,减少了通信延迟,而FL实现了物联网之间的隐私感知协作学习,同时保护了他们的隐私。FogFed结合了两个级别的检测,基于雾的物联网攻击检测使用二进制FL分类器和基于云的物联网攻击检测使用Multiclass FL分类器。利用著名的物联网攻击/恶意软件UNSW-NB15数据集进行的深入实验结果表明,该方法具有显著的准确率(99%)和检测率(99%),优于集中式ML/DL模型,同时显著减少了延迟并保护了隐私。
{"title":"A Low-Latency Fog-based Framework to secure IoT Applications using Collaborative Federated Learning","authors":"Zakaria Abou El Houda, L. Khoukhi, B. Brik","doi":"10.1109/LCN53696.2022.9843315","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843315","url":null,"abstract":"Attacks against the IoT network are increasing rapidly, leading to an exponential growth in the number of unsecured IoT devices. Existing security mechanisms are facing several issues due to the lack of real-time decisions, high energy consumption, and high time delays. In this context, we propose a novel Low-Latency Fog-based Framework, called FogFed, to secure IoT applications using Fog computing and Federated Learning (FL). The fog brings security mechanisms near IoT devices reducing delays in communication, while FL enables a privacy-aware collaborative learning between IoT while preserving their privacy. FogFed combines two levels of detection, Fog-based IoT attack detection using a binary FL classifier and cloud-based IoT attack detection using a Multiclass FL classifier. The in-depth experiments results with well-known IoT attack/malware using, the UNSW-NB15 datastet, show the significant accuracy (99%) and detection rate (99%), which outperforms centralized ML/DL models, while significantly reducing delays and preserving the privacy.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"50 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130986609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Inline Traffic Analysis Attacks on DNS over HTTPS 内联流量分析基于HTTPS协议的DNS攻击
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843593
T. Dahanayaka, Zhiyi Wang, Guillaume Jourjon, Suranga Seneviratne
Even though end-to-end encryption was introduced to Domain Name System (DNS) communications to ensure user privacy and there is an increase in adoption of DNS over HTTPS (DoH), prior research has demonstrated that encrypted DNS traffic is vulnerable to traffic analysis attacks. However, these attacks were demonstrated under strong assumptions such as handling only closed-set classification or doing only post-event analysis. In this work we demonstrate traffic analysis attacks on DoH without such strong assumptions. We first show the feasibility of website fingerprinting over DoH traffic and present an inline traffic analysis attack that achieve over 90% accuracy using DoH traces of length as short as ten packets. Next, we propose a novel open-set classification method and achieve over 75% accuracy on both closed-set and open-set samples for the open-set scenario. Finally, we demonstrate that the same attack can be performed without any knowledge on the start of the activity.
尽管端到端加密被引入到域名系统(DNS)通信中以确保用户隐私,并且通过HTTPS (DoH)采用DNS的情况有所增加,但先前的研究表明,加密的DNS流量很容易受到流量分析攻击。然而,这些攻击是在强假设下进行的,例如只处理闭集分类或只进行事后分析。在这项工作中,我们演示了在没有这种强假设的情况下对DoH的流量分析攻击。我们首先展示了在DoH流量上进行网站指纹识别的可行性,并提出了一种内联流量分析攻击,该攻击使用长度短至10个数据包的DoH跟踪实现了90%以上的准确率。接下来,我们提出了一种新的开集分类方法,在开集场景下,对闭集和开集样本的分类准确率都超过75%。最后,我们演示了可以在不知道活动开始的情况下执行相同的攻击。
{"title":"Inline Traffic Analysis Attacks on DNS over HTTPS","authors":"T. Dahanayaka, Zhiyi Wang, Guillaume Jourjon, Suranga Seneviratne","doi":"10.1109/LCN53696.2022.9843593","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843593","url":null,"abstract":"Even though end-to-end encryption was introduced to Domain Name System (DNS) communications to ensure user privacy and there is an increase in adoption of DNS over HTTPS (DoH), prior research has demonstrated that encrypted DNS traffic is vulnerable to traffic analysis attacks. However, these attacks were demonstrated under strong assumptions such as handling only closed-set classification or doing only post-event analysis. In this work we demonstrate traffic analysis attacks on DoH without such strong assumptions. We first show the feasibility of website fingerprinting over DoH traffic and present an inline traffic analysis attack that achieve over 90% accuracy using DoH traces of length as short as ten packets. Next, we propose a novel open-set classification method and achieve over 75% accuracy on both closed-set and open-set samples for the open-set scenario. Finally, we demonstrate that the same attack can be performed without any knowledge on the start of the activity.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123377732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic 好莱坞:在网络流量的移动图像中检测体积攻击
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843465
Samuel Kopmann, Hauke Heseding, M. Zitterbart
Fast detection of Distributed Denial of Service attacks is key for establishing appropriate countermeasures in order to protect potential targets. HollywooDDoS applies well-known techniques from movie classification to the challenge of DDoS detection. The proposed approach utilizes a traffic aggregation scheme representing traffic volumes between IP subnets as two-dimensional images, while preserving detection relevant traffic characteristics. These images serve as input for a convolutional neural network, learning IP address space distributions of both background and attack traffic intensities. It is shown that a real-world DDoS attack can be precisely detected on the time scale of milliseconds. We evaluate classification of images without temporal information about attack traffic development to outline the impact of image resolution and aggregation time frames. We then show that attack detection further improves by 17% when utilizing a consecutive series of images capturing traffic dynamics.
快速检测分布式拒绝服务攻击是建立适当对策以保护潜在目标的关键。HollywooDDoS应用著名的技术从电影分类到DDoS检测的挑战。该方法利用流量聚合方案将IP子网之间的流量表示为二维图像,同时保留检测相关的流量特征。这些图像作为卷积神经网络的输入,学习背景和攻击流量强度的IP地址空间分布。研究表明,可以在毫秒级的时间尺度上精确检测到真实世界的DDoS攻击。我们评估了没有关于攻击流量发展的时间信息的图像分类,以概述图像分辨率和聚合时间框架的影响。然后,我们表明,当利用连续的一系列图像捕获流量动态时,攻击检测进一步提高了17%。
{"title":"HollywooDDoS: Detecting Volumetric Attacks in Moving Images of Network Traffic","authors":"Samuel Kopmann, Hauke Heseding, M. Zitterbart","doi":"10.1109/LCN53696.2022.9843465","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843465","url":null,"abstract":"Fast detection of Distributed Denial of Service attacks is key for establishing appropriate countermeasures in order to protect potential targets. HollywooDDoS applies well-known techniques from movie classification to the challenge of DDoS detection. The proposed approach utilizes a traffic aggregation scheme representing traffic volumes between IP subnets as two-dimensional images, while preserving detection relevant traffic characteristics. These images serve as input for a convolutional neural network, learning IP address space distributions of both background and attack traffic intensities. It is shown that a real-world DDoS attack can be precisely detected on the time scale of milliseconds. We evaluate classification of images without temporal information about attack traffic development to outline the impact of image resolution and aggregation time frames. We then show that attack detection further improves by 17% when utilizing a consecutive series of images capturing traffic dynamics.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"31 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE 47th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1