首页 > 最新文献

2022 IEEE Symposium on Computers and Communications (ISCC)最新文献

英文 中文
Rule Placement and Switch Migration-based Scheme for Controller Load Balancing in SDN SDN中基于规则放置和交换机迁移的控制器负载均衡方案
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912885
Gengbiao Yue, Yumei Wang, Yu Liu
In software-defined networks, due to the limited flow table capacity, unreasonable rule placement will cause the flow table overflow problem. These flows without flow rules installed need to be processed by controller, which increases and even unbalances controller load. Based on the average packet end-to-end delay, we propose a rule placement and switch migration-based scheme for controller load balancing. In the routing and rule placement phase, the Cost-Aware Routing (CAR) algorithm takes into account the flow table occupancy while utilizing the installed rules to alleviate flow table overflow and preliminarily balance the controller load. In the switch migration phase, the Benefit-Cost Switch Migration (BCSM) algorithm obtains the migration option with the maximum total benefit. Numerical results show that the CAR algorithm reduces and balances controller load to achieve lower delay than Random and FlowStat. And the BCSM algorithm balances the controller load and reduces packet delay than SMCS and ESMLB.
在软件定义网络中,由于流表容量有限,规则放置不合理会导致流表溢出问题。这些没有安装流规则的流需要由控制器处理,这增加了控制器的负载,甚至使控制器负载不平衡。基于平均数据包端到端延迟,我们提出了一种基于规则放置和交换机迁移的控制器负载均衡方案。在路由和规则放置阶段,成本感知路由(Cost-Aware routing, CAR)算法在考虑流表占用的同时,利用已安装的规则缓解流表溢出,初步平衡控制器负载。在交换机迁移阶段,BCSM (benefit - cost switch migration)算法获得总效益最大的迁移选项。数值结果表明,CAR算法减少和平衡了控制器负载,实现了比Random和FlowStat更低的时延。与SMCS和ESMLB算法相比,BCSM算法实现了控制器负载均衡,降低了数据包延迟。
{"title":"Rule Placement and Switch Migration-based Scheme for Controller Load Balancing in SDN","authors":"Gengbiao Yue, Yumei Wang, Yu Liu","doi":"10.1109/ISCC55528.2022.9912885","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912885","url":null,"abstract":"In software-defined networks, due to the limited flow table capacity, unreasonable rule placement will cause the flow table overflow problem. These flows without flow rules installed need to be processed by controller, which increases and even unbalances controller load. Based on the average packet end-to-end delay, we propose a rule placement and switch migration-based scheme for controller load balancing. In the routing and rule placement phase, the Cost-Aware Routing (CAR) algorithm takes into account the flow table occupancy while utilizing the installed rules to alleviate flow table overflow and preliminarily balance the controller load. In the switch migration phase, the Benefit-Cost Switch Migration (BCSM) algorithm obtains the migration option with the maximum total benefit. Numerical results show that the CAR algorithm reduces and balances controller load to achieve lower delay than Random and FlowStat. And the BCSM algorithm balances the controller load and reduces packet delay than SMCS and ESMLB.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117335610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A NLP-based Approach to Improve Speech Recognition Services for People with Speech Disorders 基于nlp的语言障碍患者语音识别服务改进方法
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912940
A. Celesti, M. Fazio, Lorenzo Carnevale, M. Villari
Current speech recognition services are not suitable for people with speech disorders, which present difficulties in coordinating muscles and articulating words and sentences. In this case, a speaker-dependent approach is strongly required in order to address the specific vocal disarticulation. Several Deep learning approaches have been proposed in the literature to address this problem. However, they require many voice samples of people to properly work, and this is not practical. In this paper, we present an innovative Automatic Speech Recognition (ASR) system which is able to correct failures of deep learning based solution adopting Natural Language Processing (NLP) techniques. The proposed solution can perform both single word and whole sentence corrections by analyzing the speech context. We evaluated the solution in a home automation case study and proved the good accuracy of our model.
目前的语音识别服务并不适合有语言障碍的人,他们在协调肌肉和清晰表达单词和句子方面存在困难。在这种情况下,一个说话人依赖的方法是强烈需要的,以解决具体的发音脱节。文献中提出了几种深度学习方法来解决这个问题。然而,它们需要大量的人的声音样本才能正常工作,这是不实际的。在本文中,我们提出了一种创新的自动语音识别(ASR)系统,该系统能够采用自然语言处理(NLP)技术来纠正基于深度学习的解决方案的失败。该解决方案可以通过分析语音上下文进行单字和整句的纠错。我们在一个家庭自动化案例研究中评估了该解决方案,并证明了我们的模型具有良好的准确性。
{"title":"A NLP-based Approach to Improve Speech Recognition Services for People with Speech Disorders","authors":"A. Celesti, M. Fazio, Lorenzo Carnevale, M. Villari","doi":"10.1109/ISCC55528.2022.9912940","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912940","url":null,"abstract":"Current speech recognition services are not suitable for people with speech disorders, which present difficulties in coordinating muscles and articulating words and sentences. In this case, a speaker-dependent approach is strongly required in order to address the specific vocal disarticulation. Several Deep learning approaches have been proposed in the literature to address this problem. However, they require many voice samples of people to properly work, and this is not practical. In this paper, we present an innovative Automatic Speech Recognition (ASR) system which is able to correct failures of deep learning based solution adopting Natural Language Processing (NLP) techniques. The proposed solution can perform both single word and whole sentence corrections by analyzing the speech context. We evaluated the solution in a home automation case study and proved the good accuracy of our model.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123114246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Volume Prediction with Automated Signal Performance Measures (ATSPM) Data 使用自动信号性能测量(ATSPM)数据预测交通量
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912469
Leah Kazenmayer, Gabriela Ford, Jiechao Zhang, Rezaur Rahman, Furkan Cimen, D. Turgut, Samiul Hasan
Predicting short-term traffic volume is essential to improve transportation systems management and operations (TSM0) and the overall efficiency of traffic networks. The real-time data, collected from Internet of Things (loT) devices, can be used to predict traffic volume. More specifically, the Automated Traffic Signal Performance Measures (ATSPM) data contain high-fidelity traffic data at multiple intersections and can reveal the spatio-temporal patterns of traffic volume for each signal. In this study, we have developed a machine learning-based approach using the data collected from ATSPM sensors of a corridor in Orlando, FL to predict future hourly traffic. The hourly predictions are calculated based on the previous six hours volume seen at the selected intersections. Additional factors that play an important role in traffic fluctuations include peak hours, day of the week, holidays, among others. Multiple machine learning models are applied to the dataset to determine the model with the best performance. Random Forest, XGBoost, and LSTM models show the best performance in predicting hourly traffic volumes.
预测短期交通量对于改善交通系统管理和运营(TSM0)以及交通网络的整体效率至关重要。从物联网(loT)设备收集的实时数据可用于预测交通量。更具体地说,自动交通信号性能测量(ATSPM)数据包含多个十字路口的高保真交通数据,可以揭示每个信号的交通量的时空模式。在这项研究中,我们开发了一种基于机器学习的方法,使用从佛罗里达州奥兰多一条走廊的ATSPM传感器收集的数据来预测未来每小时的交通流量。每小时的预测是根据在选定的十字路口看到的前六小时的量计算出来的。在交通波动中起重要作用的其他因素包括高峰时间、一周中的哪一天、假日等。将多个机器学习模型应用于数据集,以确定性能最佳的模型。随机森林、XGBoost和LSTM模型在预测每小时流量方面表现最佳。
{"title":"Traffic Volume Prediction with Automated Signal Performance Measures (ATSPM) Data","authors":"Leah Kazenmayer, Gabriela Ford, Jiechao Zhang, Rezaur Rahman, Furkan Cimen, D. Turgut, Samiul Hasan","doi":"10.1109/ISCC55528.2022.9912469","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912469","url":null,"abstract":"Predicting short-term traffic volume is essential to improve transportation systems management and operations (TSM0) and the overall efficiency of traffic networks. The real-time data, collected from Internet of Things (loT) devices, can be used to predict traffic volume. More specifically, the Automated Traffic Signal Performance Measures (ATSPM) data contain high-fidelity traffic data at multiple intersections and can reveal the spatio-temporal patterns of traffic volume for each signal. In this study, we have developed a machine learning-based approach using the data collected from ATSPM sensors of a corridor in Orlando, FL to predict future hourly traffic. The hourly predictions are calculated based on the previous six hours volume seen at the selected intersections. Additional factors that play an important role in traffic fluctuations include peak hours, day of the week, holidays, among others. Multiple machine learning models are applied to the dataset to determine the model with the best performance. Random Forest, XGBoost, and LSTM models show the best performance in predicting hourly traffic volumes.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123234542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure, Mass Web of Things Actuation Using Smart Contracts-Based Digital Twins 使用基于智能合约的数字孪生实现安全、大规模的物联网
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912991
Iakovos Pittaras, N. Fotiou, Christos Karapapas, V. Siris, George C. Polyzos
The proliferation of Internet of Things (IoT) devices and applications that need to cooperate unattended highlights the need for seamless interoperability and intrinsic security. We argue that Distributed Ledger Technologies (DLTs), due to their decentralized nature, transparent operations, immutability, and availability, can enhance the security, reliability, and interoperability of such IoT systems. In this paper, we advance the integration of W3C's Web of Things (WoT) standards with DLTs and smart contracts, introducing smart contracts as “Digital Twins” of (physical) devices, or whole Cyber-Physical subsystems. Namely, we introduce a DLT-based architecture for controlling devices across federated IoT systems, securely, reliably, and with full auditability. The proposed architecture provides mass actuation and service composition with notable security properties, such as full auditability, transparency, and high availability. Specifically, a single request, with multiple action parameters and conditions, can trigger the reliable and secure actuation of a large number of possibly physically dispersed actuators.
需要无人值守的物联网(IoT)设备和应用程序的激增凸显了对无缝互操作性和内在安全性的需求。我们认为,分布式账本技术(dlt)由于其分散的性质、透明的操作、不变性和可用性,可以增强此类物联网系统的安全性、可靠性和互操作性。在本文中,我们推进了W3C的物联网(WoT)标准与dlt和智能合约的集成,将智能合约引入(物理)设备或整个网络物理子系统的“数字双胞胎”。也就是说,我们引入了一种基于dlt的架构,用于跨联合物联网系统控制设备,安全、可靠,并具有完全的可审计性。所建议的体系结构提供大量驱动和服务组合,并具有显著的安全属性,例如完全可审计性、透明性和高可用性。具体而言,具有多个动作参数和条件的单个请求可以触发大量可能物理分散的致动器的可靠和安全的致动。
{"title":"Secure, Mass Web of Things Actuation Using Smart Contracts-Based Digital Twins","authors":"Iakovos Pittaras, N. Fotiou, Christos Karapapas, V. Siris, George C. Polyzos","doi":"10.1109/ISCC55528.2022.9912991","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912991","url":null,"abstract":"The proliferation of Internet of Things (IoT) devices and applications that need to cooperate unattended highlights the need for seamless interoperability and intrinsic security. We argue that Distributed Ledger Technologies (DLTs), due to their decentralized nature, transparent operations, immutability, and availability, can enhance the security, reliability, and interoperability of such IoT systems. In this paper, we advance the integration of W3C's Web of Things (WoT) standards with DLTs and smart contracts, introducing smart contracts as “Digital Twins” of (physical) devices, or whole Cyber-Physical subsystems. Namely, we introduce a DLT-based architecture for controlling devices across federated IoT systems, securely, reliably, and with full auditability. The proposed architecture provides mass actuation and service composition with notable security properties, such as full auditability, transparency, and high availability. Specifically, a single request, with multiple action parameters and conditions, can trigger the reliable and secure actuation of a large number of possibly physically dispersed actuators.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115309370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards the Realization of Converged Cloud, Edge and Networking Infrastructures in Smart MegaCities 迈向超大智慧城市云、边、网融合基础设施的实现
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912959
P. Kokkinos
The emergence of Internet of Things (IoT) and the anticipated 5G/6G applications lead to several challenges regarding the rapid and the efficient processing of massive amounts of data, which are generated, transferred and processed within a city boundaries. Towards this end, the convergence of computing, storage and networking infrastructures operating in a megacity environment is pivotal. In this work, we present several related research innovations regarding the service of user and application demands, the orchestration of cloud and edge resources and the realization of edge infrastructures.
物联网(IoT)的出现和预期的5G/6G应用带来了一些挑战,涉及快速有效地处理在城市边界内生成、传输和处理的大量数据。为此,在超大城市环境中运行的计算、存储和网络基础设施的融合是至关重要的。在这项工作中,我们在用户和应用需求的服务,云和边缘资源的编排以及边缘基础设施的实现方面提出了一些相关的研究创新。
{"title":"Towards the Realization of Converged Cloud, Edge and Networking Infrastructures in Smart MegaCities","authors":"P. Kokkinos","doi":"10.1109/ISCC55528.2022.9912959","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912959","url":null,"abstract":"The emergence of Internet of Things (IoT) and the anticipated 5G/6G applications lead to several challenges regarding the rapid and the efficient processing of massive amounts of data, which are generated, transferred and processed within a city boundaries. Towards this end, the convergence of computing, storage and networking infrastructures operating in a megacity environment is pivotal. In this work, we present several related research innovations regarding the service of user and application demands, the orchestration of cloud and edge resources and the realization of edge infrastructures.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123259494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Reinforcement Learning Based Adaptive 360-degree Video Streaming with Field of View Joint Prediction 基于深度强化学习的自适应360度视频流视场联合预测
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9913007
Yuanhong Zhang, Zhiwen Wang, Junquan Liu, Haipeng Du, Qinghua Zheng, Weizhan Zhang
With the development of 360-degree video and HTTP adaptive streaming (HAS), tile-based adaptive 360-degree video streaming has become a promising paradigm for reducing the bandwidth consumption of delivering the panoramic video content. However, there are two main challenges for the adaptive 360-degree video streaming, accurate long-term prediction of the future field of view (Fo V) and optimal adaptive bitrate (ABR) transmission strategy. In this paper, we propose an attention-based multi-user Fo V joint prediction approach to improve the accuracy, establishing a probability model of watching video tiles for users and applying Long Short-Term Memory (LSTM) network and DBSCAN clustering method. Furthermore, we present an adaptive 360-degree video streaming approach based on deep reinforcement learning (DRL), using A3C algorithm to optimize the QoE. The real-world trace-driven experiments demonstrate that our approach achieves about 8 % gains on user Fo V prediction precision and an increase at least 20 % on user QoE compared with the benchmarks.
随着360度视频和HTTP自适应流媒体技术的发展,基于tile的自适应360度视频流已经成为降低全景视频内容传输带宽消耗的一种很有前途的模式。然而,自适应360度视频流存在两个主要挑战:对未来视场的准确长期预测(Fo V)和最佳自适应比特率(ABR)传输策略。为了提高准确率,本文提出了一种基于注意力的多用户Fo V联合预测方法,建立了用户观看视频片段的概率模型,并应用长短期记忆(LSTM)网络和DBSCAN聚类方法。此外,我们提出了一种基于深度强化学习(DRL)的自适应360度视频流方法,使用A3C算法优化QoE。真实世界的跟踪驱动实验表明,与基准测试相比,我们的方法在用户Fo V预测精度上提高了约8%,在用户QoE上提高了至少20%。
{"title":"Deep Reinforcement Learning Based Adaptive 360-degree Video Streaming with Field of View Joint Prediction","authors":"Yuanhong Zhang, Zhiwen Wang, Junquan Liu, Haipeng Du, Qinghua Zheng, Weizhan Zhang","doi":"10.1109/ISCC55528.2022.9913007","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9913007","url":null,"abstract":"With the development of 360-degree video and HTTP adaptive streaming (HAS), tile-based adaptive 360-degree video streaming has become a promising paradigm for reducing the bandwidth consumption of delivering the panoramic video content. However, there are two main challenges for the adaptive 360-degree video streaming, accurate long-term prediction of the future field of view (Fo V) and optimal adaptive bitrate (ABR) transmission strategy. In this paper, we propose an attention-based multi-user Fo V joint prediction approach to improve the accuracy, establishing a probability model of watching video tiles for users and applying Long Short-Term Memory (LSTM) network and DBSCAN clustering method. Furthermore, we present an adaptive 360-degree video streaming approach based on deep reinforcement learning (DRL), using A3C algorithm to optimize the QoE. The real-world trace-driven experiments demonstrate that our approach achieves about 8 % gains on user Fo V prediction precision and an increase at least 20 % on user QoE compared with the benchmarks.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124671229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Task Offloading and VM Placement for Edge Computing with Time-Sequential IIoT Applications 基于时序IIoT应用的边缘计算联合任务卸载和虚拟机放置
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912930
Mingzhu Qiang, Changyan Yi, Juan Li, Kun Zhu, Jun Cai
In this paper, a multi-layer edge computing frame-work for the virtual machine (VM) placement and computation offloading in industrial Internet of Things (IIoT) is proposed. Unlike most existing works, we focus on addressing the temporal dependency among tasks in an IIoT task flow, and consider that there is a stringent requirement on its completion time (including the transmission time, computation time and waiting time). For striking a balance between the system completion time and the energy consumption while satisfying the storage capacity of edge servers (ESs), completion deadline of time-sequential task flows, and placement requirements of VMs, we design a many-to-one matching game (MGVDA) to jointly determine the optimal VM placement and task offloading decisions. Finally, we prove that the resulted matching game solution is effective and stable. Simulation results examine the efficiency of the proposed MGVDA and show its superiority over the counterparts.
针对工业物联网(IIoT)中虚拟机(VM)的放置和计算卸载问题,提出了一种多层边缘计算框架。与大多数现有工作不同,我们重点解决了IIoT任务流中任务之间的时间依赖性,并认为其完成时间(包括传输时间、计算时间和等待时间)有严格的要求。为了平衡系统完成时间和能耗,同时满足边缘服务器的存储容量、时间顺序任务流的完成期限和虚拟机的放置要求,我们设计了一个多对一的匹配博弈(MGVDA),共同确定最优的虚拟机放置和任务卸载决策。最后,我们证明了所得到的匹配博弈解是有效且稳定的。仿真结果验证了所提出的MGVDA算法的有效性,并显示了其相对于同类算法的优越性。
{"title":"Joint Task Offloading and VM Placement for Edge Computing with Time-Sequential IIoT Applications","authors":"Mingzhu Qiang, Changyan Yi, Juan Li, Kun Zhu, Jun Cai","doi":"10.1109/ISCC55528.2022.9912930","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912930","url":null,"abstract":"In this paper, a multi-layer edge computing frame-work for the virtual machine (VM) placement and computation offloading in industrial Internet of Things (IIoT) is proposed. Unlike most existing works, we focus on addressing the temporal dependency among tasks in an IIoT task flow, and consider that there is a stringent requirement on its completion time (including the transmission time, computation time and waiting time). For striking a balance between the system completion time and the energy consumption while satisfying the storage capacity of edge servers (ESs), completion deadline of time-sequential task flows, and placement requirements of VMs, we design a many-to-one matching game (MGVDA) to jointly determine the optimal VM placement and task offloading decisions. Finally, we prove that the resulted matching game solution is effective and stable. Simulation results examine the efficiency of the proposed MGVDA and show its superiority over the counterparts.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122750142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Avoiding Notorious Content Sources: A Content-Poisoning Attack Mitigation Approach 避免臭名昭著的内容来源:一种内容中毒攻击缓解方法
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912936
Ioanna Angeliki Kapetanidou, Stavros Malagaris, V. Tsaoussidis
Named Data Networking (NDN) has emerged as a promising Future Internet architecture. NDN provisions security by design and guarantees that data packets are immutable and authentic. Nevertheless, its inherent in-network caching feature has opened the door to new types of security attacks. One such critical security issue in NDN is content poisoning attacks. In content poisoning, the attacker aims at injecting poisonous (i.e., fake or invalid) content in the network caches. In this paper, we propose a reputation-based content poisoning mitigation model, which assists both the access and the core network nodes in identifying the sources from which poisonous content is originated, and subsequently, limiting the Interest flow towards those notorious sources as well as in avoiding caching poisonous content.
命名数据网络(NDN)作为一种很有前途的未来互联网架构已经出现。NDN通过设计提供安全性,并保证数据包的不可篡改性和真实性。然而,其固有的网络内缓存特性为新型安全攻击打开了大门。NDN中一个关键的安全问题是内容中毒攻击。内容中毒是指攻击者在网络缓存中注入有毒(即虚假或无效)的内容。在本文中,我们提出了一个基于声誉的内容中毒缓解模型,该模型有助于访问和核心网络节点识别有毒内容的来源,并随后限制对这些臭名昭着的来源的兴趣流以及避免缓存有毒内容。
{"title":"Avoiding Notorious Content Sources: A Content-Poisoning Attack Mitigation Approach","authors":"Ioanna Angeliki Kapetanidou, Stavros Malagaris, V. Tsaoussidis","doi":"10.1109/ISCC55528.2022.9912936","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912936","url":null,"abstract":"Named Data Networking (NDN) has emerged as a promising Future Internet architecture. NDN provisions security by design and guarantees that data packets are immutable and authentic. Nevertheless, its inherent in-network caching feature has opened the door to new types of security attacks. One such critical security issue in NDN is content poisoning attacks. In content poisoning, the attacker aims at injecting poisonous (i.e., fake or invalid) content in the network caches. In this paper, we propose a reputation-based content poisoning mitigation model, which assists both the access and the core network nodes in identifying the sources from which poisonous content is originated, and subsequently, limiting the Interest flow towards those notorious sources as well as in avoiding caching poisonous content.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116234767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital Twin Networks: Learning Dynamic Network Behaviors from Network Flows 数字孪生网络:从网络流中学习动态网络行为
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912864
Guozhi Lin, Jingguo Ge, Yulei Wu, Hui Li, Liangxiong Li
The Digital Twin Network (DTN) is a key enabling technology for efficient and intelligent network management in modern communication networks. Learning dynamic net-work behaviors at the flow granularity is a core element for realizing DTN with accurate network modelling. However, it is challenging due to the complexity of network architectures and the proliferation of emerging network applications. In this paper, we devise a Packet-Action Sequence Model to represent all possible packets behaviors in a unified way. Besides, we propose a novel and effective algorithm to assess whether the behavior pattern is time dependent or independent by using the temporal characteristics of packets in a network flow, so as to learn the key factors of packets that contribute to network behaviors. Based on two typical scenarios, i.e., packet caching and routing, the experimental results verify that the proposed algorithm can identify network behavior patterns and learn key factors affecting the behaviors with over 99 % accuracy.
数字孪生网络(DTN)是现代通信网络中实现高效、智能网络管理的关键使能技术。在流粒度上学习动态网络行为是实现DTN准确网络建模的核心要素。然而,由于网络体系结构的复杂性和新兴网络应用的激增,这是一个挑战。在本文中,我们设计了一个包动作序列模型,以统一的方式表示所有可能的数据包行为。此外,我们提出了一种新颖有效的算法,利用网络流中数据包的时间特征来评估行为模式是时间依赖还是独立的,从而了解数据包中影响网络行为的关键因素。基于分组缓存和路由两种典型场景,实验结果验证了该算法能够识别网络行为模式,并以99%以上的准确率学习影响行为的关键因素。
{"title":"Digital Twin Networks: Learning Dynamic Network Behaviors from Network Flows","authors":"Guozhi Lin, Jingguo Ge, Yulei Wu, Hui Li, Liangxiong Li","doi":"10.1109/ISCC55528.2022.9912864","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912864","url":null,"abstract":"The Digital Twin Network (DTN) is a key enabling technology for efficient and intelligent network management in modern communication networks. Learning dynamic net-work behaviors at the flow granularity is a core element for realizing DTN with accurate network modelling. However, it is challenging due to the complexity of network architectures and the proliferation of emerging network applications. In this paper, we devise a Packet-Action Sequence Model to represent all possible packets behaviors in a unified way. Besides, we propose a novel and effective algorithm to assess whether the behavior pattern is time dependent or independent by using the temporal characteristics of packets in a network flow, so as to learn the key factors of packets that contribute to network behaviors. Based on two typical scenarios, i.e., packet caching and routing, the experimental results verify that the proposed algorithm can identify network behavior patterns and learn key factors affecting the behaviors with over 99 % accuracy.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TKDA: An Improved Method for K-degree Anonymity in Social Graphs TKDA:一种改进的社交图k度匿名方法
Pub Date : 2022-06-30 DOI: 10.1109/ISCC55528.2022.9912964
Nan Xiang, Xuebin Ma
Data anonymization is one of the most important directions in privacy-preserving. However, research shows that simple anonymization of data does not protect privacy. To solve this problem, we present a novel and effective algorithm named tree-based K-degree anonymity (TKDA). We devise a new anonymity sequence generation method to reduce the information loss for social graphs. Then, the dynamic anonymization process is implemented by a depth-first search (DFS) traversal algorithm. Finally, the graph modification algorithm based on the anonymous sequence can keep the original graph structure stable. Average Path Length (APL), Average Clustering Coefficient (ACC), and Transitivity (T) are employed to evaluate the method. Experimental results on several datasets show that TKDA is closer to the values of the original graphs on the correlated three experimental metrics, which indicates that TKDA portrays the real data in more detail and improves the utility of the released data.
数据匿名化是隐私保护的重要方向之一。然而,研究表明,简单的数据匿名化并不能保护隐私。为了解决这个问题,我们提出了一种新颖有效的算法——基于树的k度匿名(TKDA)。为了减少社交图的信息丢失,我们设计了一种新的匿名序列生成方法。然后,通过深度优先搜索(DFS)遍历算法实现动态匿名化过程。最后,基于匿名序列的图修改算法可以保持原有图结构的稳定性。采用平均路径长度(APL)、平均聚类系数(ACC)和传递性(T)对该方法进行评价。在多个数据集上的实验结果表明,TKDA在相关的三个实验指标上更接近原始图的值,这表明TKDA更详细地描绘了真实数据,提高了发布数据的实用性。
{"title":"TKDA: An Improved Method for K-degree Anonymity in Social Graphs","authors":"Nan Xiang, Xuebin Ma","doi":"10.1109/ISCC55528.2022.9912964","DOIUrl":"https://doi.org/10.1109/ISCC55528.2022.9912964","url":null,"abstract":"Data anonymization is one of the most important directions in privacy-preserving. However, research shows that simple anonymization of data does not protect privacy. To solve this problem, we present a novel and effective algorithm named tree-based K-degree anonymity (TKDA). We devise a new anonymity sequence generation method to reduce the information loss for social graphs. Then, the dynamic anonymization process is implemented by a depth-first search (DFS) traversal algorithm. Finally, the graph modification algorithm based on the anonymous sequence can keep the original graph structure stable. Average Path Length (APL), Average Clustering Coefficient (ACC), and Transitivity (T) are employed to evaluate the method. Experimental results on several datasets show that TKDA is closer to the values of the original graphs on the correlated three experimental metrics, which indicates that TKDA portrays the real data in more detail and improves the utility of the released data.","PeriodicalId":309606,"journal":{"name":"2022 IEEE Symposium on Computers and Communications (ISCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128399767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE Symposium on Computers and Communications (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1