首页 > 最新文献

2009 IFIP/IEEE International Symposium on Integrated Network Management最新文献

英文 中文
Experiences in using MUWS for scalable distributed monitoring 有使用MUWS进行可扩展分布式监控的经验
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188862
Aimilios Chourmouziadis, O. Gonzalez, G. Pavlou
Efficient Web Services (WS) based network monitoring of managed devices is a difficult task due to the relatively big overhead WS impose. In the past we proposed mechanisms to perform distributed monitoring efficiently, minimizing the relevant overhead. Standardization of WS operations is also important in order to achieve interoperability. The WS Resource Framework (WSRF) tries to standardize the messages exchanged with resources representing the state of a device. Adopting WSRF's concepts, the Management Using Web Services (MUWS) standard aims to support device management in an interoperable manner. In this paper we propose methods to use the mechanisms introduced in our previous work combined with MUWS in order to establish the means to retrieve management information efficiently and at the same time achieve interoperability. We also present our experiences in using custom as well as standardized solutions for monitoring devices that range from small to large resource-capable systems. We describe the motivations for this research and present ideas on techniques that need to be adopted for WS based monitoring based on what we have learned in the process.
基于Web服务(WS)的被管理设备的高效网络监控是一项艰巨的任务,因为WS带来了相对较大的开销。在过去,我们提出了有效地执行分布式监视的机制,将相关开销降至最低。为了实现互操作性,WS操作的标准化也很重要。WS资源框架(WSRF)尝试标准化与代表设备状态的资源交换的消息。采用WSRF的概念,使用Web服务的管理(MUWS)标准旨在以可互操作的方式支持设备管理。在本文中,我们提出了将我们之前的工作中介绍的机制与MUWS相结合的方法,以建立有效检索管理信息的方法,同时实现互操作性。我们还介绍了我们在使用自定义和标准化解决方案来监控设备方面的经验,这些设备范围从小型到大型资源能力系统。我们描述了这项研究的动机,并根据我们在该过程中学到的知识,提出了基于WS的监视需要采用的技术的想法。
{"title":"Experiences in using MUWS for scalable distributed monitoring","authors":"Aimilios Chourmouziadis, O. Gonzalez, G. Pavlou","doi":"10.1109/INM.2009.5188862","DOIUrl":"https://doi.org/10.1109/INM.2009.5188862","url":null,"abstract":"Efficient Web Services (WS) based network monitoring of managed devices is a difficult task due to the relatively big overhead WS impose. In the past we proposed mechanisms to perform distributed monitoring efficiently, minimizing the relevant overhead. Standardization of WS operations is also important in order to achieve interoperability. The WS Resource Framework (WSRF) tries to standardize the messages exchanged with resources representing the state of a device. Adopting WSRF's concepts, the Management Using Web Services (MUWS) standard aims to support device management in an interoperable manner. In this paper we propose methods to use the mechanisms introduced in our previous work combined with MUWS in order to establish the means to retrieve management information efficiently and at the same time achieve interoperability. We also present our experiences in using custom as well as standardized solutions for monitoring devices that range from small to large resource-capable systems. We describe the motivations for this research and present ideas on techniques that need to be adopted for WS based monitoring based on what we have learned in the process.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125728538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust and scalable trust management for collaborative intrusion detection 用于协作入侵检测的鲁棒和可扩展的信任管理
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188784
Carol J. Fung, Jie Zhang, I. Aib, R. Boutaba
The accuracy of detecting intrusions within an Intrusion Detection Network (IDN) depends on the efficiency of collaboration between the peer Intrusion Detection Systems (IDSes) as well as the security itself of the IDN against insider threats. In this paper, we study host-based IDNs and introduce a Dirichlet-based model to measure the level of trustworthiness among peer IDSes according to their mutual experience. The model has strong scalability properties and is robust against common insider threats, such as a compromised or malfunctioning peer. We evaluate our system based on a simulated collaborative host-based IDS network. The experimental results demonstrate the improved robustness, efficiency, and scalability of our system in detecting intrusions in comparison with existing models.
入侵检测网络(IDN)中入侵检测的准确性取决于对端入侵检测系统(idse)之间的协作效率,以及IDN本身对内部威胁的安全性。本文研究了基于主机的IDNs,并引入了一个基于dirichlet的模型来衡量对等IDNs之间的相互信任水平。该模型具有强大的可伸缩性属性,并且对常见的内部威胁(例如被破坏或故障的对等端)具有健壮性。我们基于一个模拟的基于主机的IDS网络来评估我们的系统。实验结果表明,与现有模型相比,我们的系统在检测入侵方面具有更好的鲁棒性、效率和可扩展性。
{"title":"Robust and scalable trust management for collaborative intrusion detection","authors":"Carol J. Fung, Jie Zhang, I. Aib, R. Boutaba","doi":"10.1109/INM.2009.5188784","DOIUrl":"https://doi.org/10.1109/INM.2009.5188784","url":null,"abstract":"The accuracy of detecting intrusions within an Intrusion Detection Network (IDN) depends on the efficiency of collaboration between the peer Intrusion Detection Systems (IDSes) as well as the security itself of the IDN against insider threats. In this paper, we study host-based IDNs and introduce a Dirichlet-based model to measure the level of trustworthiness among peer IDSes according to their mutual experience. The model has strong scalability properties and is robust against common insider threats, such as a compromised or malfunctioning peer. We evaluate our system based on a simulated collaborative host-based IDS network. The experimental results demonstrate the improved robustness, efficiency, and scalability of our system in detecting intrusions in comparison with existing models.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125942457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Auto-connectivity and security setup for access network elements 接入网络元素的自动连接和安全设置
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188877
H. Sanneck, L. Schmelz, E. Troch, L. D. Bie
In access networks, the roll-out of new network elements (NE) or changes to the NE HW and SW cause considerable overhead. The total number of NE is significant and is increasing for new radio access technologies like Long Term Evolution (LTE) due to the decreasing cell size. Furthermore for network scenarios like femto access points / home NEs conventional network deployment and management approaches where the network is fully planned and NEs are tightly managed cannot be followed any more. Furthermore the increased security requirements by operators for such network deployments have to be observed. An auto-connectivity scheme which incorporates the NE's security setup is proposed which tries to balance the trade-off between automation (avoiding any manual intervention) and security. This is achieved by shifting manufacturer and operator activities to a preparation (rather than the actual roll-out) phase and eliminating any interaction between them as much as possible. The NE is delivered only with an “off-theshelf” software & configuration installation. Only at the point in time when the NE is placed on site, the NE hardware-to-site mapping happening is executed. Together with mutual authentication between NE and the Operation, Administration and Maintenance (OAM) system it is possible to enable a very flexible and secure roll-out process.
在接入网中,新网元的推出或网元硬件和软件的变更会造成相当大的开销。由于小区尺寸的减小,网元的总数非常可观,而且对于长期演进(LTE)等新的无线接入技术,网元的总数还在增加。此外,对于femto接入点/家庭网元这样的网络场景,完全规划网络、严格管理网元的传统网络部署和管理方式已不再适用。此外,必须注意到运营商对这种网络部署增加的安全要求。提出了一种包含网元安全设置的自动连接方案,该方案试图在自动化(避免任何人工干预)和安全性之间取得平衡。这是通过将制造商和运营商的活动转移到准备阶段(而不是实际的推出),并尽可能消除它们之间的任何交互来实现的。网元发货时只附带“现成”的软件和配置安装。只有在网元放置到局点的时间点,才会执行发生的网元硬件到局点映射。再加上网元与运营、管理和维护(OAM)系统之间的相互认证,可以实现非常灵活和安全的推出过程。
{"title":"Auto-connectivity and security setup for access network elements","authors":"H. Sanneck, L. Schmelz, E. Troch, L. D. Bie","doi":"10.1109/INM.2009.5188877","DOIUrl":"https://doi.org/10.1109/INM.2009.5188877","url":null,"abstract":"In access networks, the roll-out of new network elements (NE) or changes to the NE HW and SW cause considerable overhead. The total number of NE is significant and is increasing for new radio access technologies like Long Term Evolution (LTE) due to the decreasing cell size. Furthermore for network scenarios like femto access points / home NEs conventional network deployment and management approaches where the network is fully planned and NEs are tightly managed cannot be followed any more. Furthermore the increased security requirements by operators for such network deployments have to be observed. An auto-connectivity scheme which incorporates the NE's security setup is proposed which tries to balance the trade-off between automation (avoiding any manual intervention) and security. This is achieved by shifting manufacturer and operator activities to a preparation (rather than the actual roll-out) phase and eliminating any interaction between them as much as possible. The NE is delivered only with an “off-theshelf” software & configuration installation. Only at the point in time when the NE is placed on site, the NE hardware-to-site mapping happening is executed. Together with mutual authentication between NE and the Operation, Administration and Maintenance (OAM) system it is possible to enable a very flexible and secure roll-out process.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Supporting communities in programmable grid networks: gTBN 支持可编程网格网络中的社区:gTBN
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188842
M. Cristea, R. Strijkers, D. Marchal, L. Gommans, C. D. Laat, R. Meijer
This paper presents the generalised Token Based Networking (gTBN) architecture, which enables dynamic binding of communities and their applications to specialised network services. gTBN uses protocol independent tokens to provide decoupling of authorisation from time of usage as well as identification of network traffic. The tokenised traffic allows specialised software components uploaded into network elements to execute services specific to communities. A reference implementation of gTBN over IPv4 is proposed as well as the presentation of our experiments. These experiments include validation tests of our test bed with common grid applications such as GridFTP, OpenMPI, and VLC. In addition, we present a firewalling use case based on gTBN.
本文提出了广义的基于令牌的网络(gTBN)架构,该架构能够将社区及其应用程序动态绑定到专门的网络服务。gTBN使用独立于协议的令牌来提供授权与使用时间的分离以及网络流量的识别。令牌化的流量允许将专门的软件组件上传到网络元素中,以执行特定于社区的服务。提出了基于IPv4的gTBN的参考实现,并介绍了我们的实验。这些实验包括使用GridFTP、OpenMPI和VLC等常见网格应用程序对我们的测试平台进行验证测试。此外,我们还提出了一个基于gTBN的防火墙用例。
{"title":"Supporting communities in programmable grid networks: gTBN","authors":"M. Cristea, R. Strijkers, D. Marchal, L. Gommans, C. D. Laat, R. Meijer","doi":"10.1109/INM.2009.5188842","DOIUrl":"https://doi.org/10.1109/INM.2009.5188842","url":null,"abstract":"This paper presents the generalised Token Based Networking (gTBN) architecture, which enables dynamic binding of communities and their applications to specialised network services. gTBN uses protocol independent tokens to provide decoupling of authorisation from time of usage as well as identification of network traffic. The tokenised traffic allows specialised software components uploaded into network elements to execute services specific to communities. A reference implementation of gTBN over IPv4 is proposed as well as the presentation of our experiments. These experiments include validation tests of our test bed with common grid applications such as GridFTP, OpenMPI, and VLC. In addition, we present a firewalling use case based on gTBN.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Framework to achieve multi-domain service management 框架实现多域服务管理
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188823
A. Bagchi, F. Caruso, A. Mayer, R. Roman, Prabha Kumar, S. Kowtha
An ongoing trend within the telecommunications industry has been toward providing end-to-end (E2E) IP based services. Accordingly, the associated management perspective has shifted from management of services within a single service provider domain towards a multi-domain paradigm supporting an E2E service view in which relationships among service providers, suppliers and customers and the related service level agreements (SLAs) take on major significance. In order to achieve multi-domain management, it is essential that a service management framework be put in place that supports planning, fulfilling, and assuring E2E services, including management of Service Requests, Service Assurance, and SLAs. The collecting and fusing of information from multiple sources, many external to the service provider's domain, to support the required E2E perspective has become an essential process.
电信行业的一个持续趋势是提供端到端(E2E)基于IP的服务。因此,相关的管理观点已经从单一服务提供者领域内的服务管理转向支持端到端服务视图的多领域范式,在这种视图中,服务提供者、供应商和客户之间的关系以及相关的服务水平协议(sla)具有重要意义。为了实现多域管理,必须设置一个服务管理框架,支持规划、实现和确保端到端服务,包括服务请求、服务保证和sla的管理。收集和融合来自多个来源(许多来自服务提供者领域的外部)的信息以支持所需的端到端视图已经成为一个必要的过程。
{"title":"Framework to achieve multi-domain service management","authors":"A. Bagchi, F. Caruso, A. Mayer, R. Roman, Prabha Kumar, S. Kowtha","doi":"10.1109/INM.2009.5188823","DOIUrl":"https://doi.org/10.1109/INM.2009.5188823","url":null,"abstract":"An ongoing trend within the telecommunications industry has been toward providing end-to-end (E2E) IP based services. Accordingly, the associated management perspective has shifted from management of services within a single service provider domain towards a multi-domain paradigm supporting an E2E service view in which relationships among service providers, suppliers and customers and the related service level agreements (SLAs) take on major significance. In order to achieve multi-domain management, it is essential that a service management framework be put in place that supports planning, fulfilling, and assuring E2E services, including management of Service Requests, Service Assurance, and SLAs. The collecting and fusing of information from multiple sources, many external to the service provider's domain, to support the required E2E perspective has become an essential process.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133119119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Collaborative content caching algorithms in mobile ad hoc networks environment 移动自组织网络环境下的协同内容缓存算法
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188829
Y. Abdelmalek, A. A. E. Al, T. Saadawi
In this paper, we address the problem of collaborative video caching in ad hoc mobile networks. We consider network portraying static video server with wired interface to gateway node that is equipped with wireless interfaces, other nodes are requiring access to the video streams that is stored at video server. In order to reduce the average access latency as well as enhance the video accessibility, efficient video caching placement and replacement strategies are crucial at some of the distributed intermediate nodes across the network. Virtual backbone caching nodes will be elected by executing caching placement algorithm after running the routing protocol phase. The simulation results indicate that the proposed collaborative aggregate cache mechanism can significantly improve the video QoS in terms of packet loss and average packet delay.
在本文中,我们解决了自组织移动网络中的协作视频缓存问题。我们考虑将具有有线接口的静态视频服务器描绘为具有无线接口的网关节点,其他节点需要访问存储在视频服务器上的视频流。为了降低平均访问延迟,提高视频可访问性,在网络中的一些分布式中间节点上,高效的视频缓存放置和替换策略至关重要。运行路由协议阶段后,通过执行缓存放置算法来选择虚拟骨干缓存节点。仿真结果表明,所提出的协同聚合缓存机制在丢包率和平均包延迟方面可以显著提高视频QoS。
{"title":"Collaborative content caching algorithms in mobile ad hoc networks environment","authors":"Y. Abdelmalek, A. A. E. Al, T. Saadawi","doi":"10.1109/INM.2009.5188829","DOIUrl":"https://doi.org/10.1109/INM.2009.5188829","url":null,"abstract":"In this paper, we address the problem of collaborative video caching in ad hoc mobile networks. We consider network portraying static video server with wired interface to gateway node that is equipped with wireless interfaces, other nodes are requiring access to the video streams that is stored at video server. In order to reduce the average access latency as well as enhance the video accessibility, efficient video caching placement and replacement strategies are crucial at some of the distributed intermediate nodes across the network. Virtual backbone caching nodes will be elected by executing caching placement algorithm after running the routing protocol phase. The simulation results indicate that the proposed collaborative aggregate cache mechanism can significantly improve the video QoS in terms of packet loss and average packet delay.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125106381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fault detection in IP-based process control networks using data mining 基于ip的过程控制网络故障检测中的数据挖掘
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188812
Byungchul Park, Y. Won, Hwanjo Yu, J. W. Hong, Hong-Sun Noh, Jang Jin Lee
Industrial process control IP networks support communications between process control applications and devices. Communication faults in any stage of these control networks can cause delays or even shutdown of the entire manufacturing process. The current process of detecting and diagnosing communication faults is mostly manual, cumbersome, and inefficient. Detecting early symptoms of potential problems is very important but automated solutions do not yet exist. Our research goal is to automate the process of detecting and diagnosing the communication faults as well as to prevent problems by detecting early symptoms of potential problems. To achieve our goal, we have first investigated real-world fault cases and summarized control network failures. We have also defined network metrics and their alarm conditions to detect early symptoms for communication failures between process control servers and devices. In particular, we leverage data mining techniques to train the system to learn the rules of network faults in control networks and our testing results show that these rules are very effective. In our earlier work, we presented a design of a process control network monitoring and fault diagnosis system. In this paper, we focus on how the fault detection part of this system can be improved using data mining techniques.
工业过程控制IP网络支持过程控制应用程序和设备之间的通信。这些控制网络中任何阶段的通信故障都可能导致整个制造过程的延迟甚至停机。目前的通信故障检测和诊断过程大多是手工的、繁琐的、低效的。检测潜在问题的早期症状非常重要,但目前还不存在自动化解决方案。我们的研究目标是自动化检测和诊断通信故障的过程,并通过检测潜在问题的早期症状来预防问题。为了实现我们的目标,我们首先调查了现实世界的故障案例,并总结了控制网络的故障。我们还定义了网络指标及其警报条件,以检测过程控制服务器和设备之间通信故障的早期症状。特别地,我们利用数据挖掘技术训练系统学习控制网络中的网络故障规则,我们的测试结果表明这些规则是非常有效的。在前期工作中,我们设计了一个过程控制网络监测与故障诊断系统。在本文中,我们重点研究了如何使用数据挖掘技术来改进该系统的故障检测部分。
{"title":"Fault detection in IP-based process control networks using data mining","authors":"Byungchul Park, Y. Won, Hwanjo Yu, J. W. Hong, Hong-Sun Noh, Jang Jin Lee","doi":"10.1109/INM.2009.5188812","DOIUrl":"https://doi.org/10.1109/INM.2009.5188812","url":null,"abstract":"Industrial process control IP networks support communications between process control applications and devices. Communication faults in any stage of these control networks can cause delays or even shutdown of the entire manufacturing process. The current process of detecting and diagnosing communication faults is mostly manual, cumbersome, and inefficient. Detecting early symptoms of potential problems is very important but automated solutions do not yet exist. Our research goal is to automate the process of detecting and diagnosing the communication faults as well as to prevent problems by detecting early symptoms of potential problems. To achieve our goal, we have first investigated real-world fault cases and summarized control network failures. We have also defined network metrics and their alarm conditions to detect early symptoms for communication failures between process control servers and devices. In particular, we leverage data mining techniques to train the system to learn the rules of network faults in control networks and our testing results show that these rules are very effective. In our earlier work, we presented a design of a process control network monitoring and fault diagnosis system. In this paper, we focus on how the fault detection part of this system can be improved using data mining techniques.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134102358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Secure interworking & roaming of WiMAX with 3G and Wi-Fi WiMAX与3G和Wi-Fi的安全互通和漫游
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188800
V. Gondi, N. Agoulmine
The roaming between different WiMAX (Worldwide Interoperability for Microwave Access) networks as well as the interworking between WiMAX and other access technologies will be a key enabler for global WiMAX deployment. To provide secure and seamless roaming capability for mobile users across different access network domains, belonging to the same or different operators, we propose a roaming & interworking solution using intermediary entities, called Roaming Interworking Intermediary (RII). A generic RII-based interworking and roaming architecture between WiMAX, 3GPP (third Generation Partnership Project) and WLAN networks is presented. A test-bed has been setup, using real pre-WiMAX and Wi-Fi equipments and real operational cellular network, to demonstrate and evaluate the proposed solutions. The robustness, feasibility and efficiency of the proposed architecture are proven through different user scenarios.
不同WiMAX(全球微波接入互操作性)网络之间的漫游以及WiMAX与其他接入技术之间的互通将成为推动WiMAX全球部署的关键因素。为了给属于同一或不同运营商的不同接入网络域的移动用户提供安全无缝的漫游能力,我们提出了一种使用中间实体的漫游互联解决方案,称为漫游互联中介(RII)。在WiMAX、3GPP(第三代合作伙伴计划)和WLAN网络之间提出了一种通用的基于rii的互联和漫游架构。搭建了一个测试平台,使用真实的pre-WiMAX和Wi-Fi设备和真实的可操作蜂窝网络来演示和评估所提出的解决方案。通过不同的用户场景验证了该架构的鲁棒性、可行性和高效性。
{"title":"Secure interworking & roaming of WiMAX with 3G and Wi-Fi","authors":"V. Gondi, N. Agoulmine","doi":"10.1109/INM.2009.5188800","DOIUrl":"https://doi.org/10.1109/INM.2009.5188800","url":null,"abstract":"The roaming between different WiMAX (Worldwide Interoperability for Microwave Access) networks as well as the interworking between WiMAX and other access technologies will be a key enabler for global WiMAX deployment. To provide secure and seamless roaming capability for mobile users across different access network domains, belonging to the same or different operators, we propose a roaming & interworking solution using intermediary entities, called Roaming Interworking Intermediary (RII). A generic RII-based interworking and roaming architecture between WiMAX, 3GPP (third Generation Partnership Project) and WLAN networks is presented. A test-bed has been setup, using real pre-WiMAX and Wi-Fi equipments and real operational cellular network, to demonstrate and evaluate the proposed solutions. The robustness, feasibility and efficiency of the proposed architecture are proven through different user scenarios.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134117575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards an optimized model of incident ticket correlation 建立事件票证相关的优化模型
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188863
Patricia Marcu, G. Grabarnik, Laura Z. Luan, D. Rosu, L. Shwartz, Christopher Ward
In recent years, IT Service Management (ITSM) has become one of the most researched areas of IT. Incident and Problem Management are two of the Service Operation processes in the IT Infrastructure Library (ITIL). These two processes aim to recognize, log, isolate and correct errors which occur in the environment and disrupt the delivery of services. Incident Management and Problem Management form the basis of the tooling provided by an Incident Ticket Systems (ITS).
近年来,IT服务管理(ITSM)已成为IT领域研究的热点之一。事件管理和问题管理是IT基础设施库(ITIL)中的两个服务操作流程。这两个过程旨在识别、记录、隔离和纠正环境中发生的错误,并破坏服务的交付。事件管理和问题管理构成了事件票证系统(ITS)提供的工具的基础。
{"title":"Towards an optimized model of incident ticket correlation","authors":"Patricia Marcu, G. Grabarnik, Laura Z. Luan, D. Rosu, L. Shwartz, Christopher Ward","doi":"10.1109/INM.2009.5188863","DOIUrl":"https://doi.org/10.1109/INM.2009.5188863","url":null,"abstract":"In recent years, IT Service Management (ITSM) has become one of the most researched areas of IT. Incident and Problem Management are two of the Service Operation processes in the IT Infrastructure Library (ITIL). These two processes aim to recognize, log, isolate and correct errors which occur in the environment and disrupt the delivery of services. Incident Management and Problem Management form the basis of the tooling provided by an Incident Ticket Systems (ITS).","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134349315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Evaluating WS-security and XACML in web services-based network management 在基于web服务的网络管理中评估WS-security和XACML
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188809
Estêvão M. Z. Rohr, L. Granville, L. Tarouco
The use of Web services in network management has became a reality after recent researches and industry standardization effort. Although performance is a critical issue, as well as security support, no investigation so far has observed how secure Web services communications perform when employed for network management. In this paper we present a first investigation in this subject by evaluating the performance of WS-Security and XACML in a scenario where remote processes information is retrieved. Our evaluation shows that encryption and access control increase the response time more than other aspects like message signature or authentication. We also observe that messages carrying security information are 10 times larger than unsecure messages, which may prevent the retrieval of a large number of information and short periods of time.
在最近的研究和行业标准化工作之后,在网络管理中使用Web服务已经成为现实。尽管性能和安全支持都是一个关键问题,但到目前为止还没有任何调查观察到,当用于网络管理时,Web服务通信的安全性如何。在本文中,我们通过在检索远程进程信息的场景中评估WS-Security和XACML的性能,对这一主题进行了首次调查。我们的评估表明,加密和访问控制比消息签名或身份验证等其他方面增加的响应时间更多。我们还观察到,携带安全信息的消息比不安全消息大10倍,这可能会阻止大量信息和短时间的检索。
{"title":"Evaluating WS-security and XACML in web services-based network management","authors":"Estêvão M. Z. Rohr, L. Granville, L. Tarouco","doi":"10.1109/INM.2009.5188809","DOIUrl":"https://doi.org/10.1109/INM.2009.5188809","url":null,"abstract":"The use of Web services in network management has became a reality after recent researches and industry standardization effort. Although performance is a critical issue, as well as security support, no investigation so far has observed how secure Web services communications perform when employed for network management. In this paper we present a first investigation in this subject by evaluating the performance of WS-Security and XACML in a scenario where remote processes information is retrieved. Our evaluation shows that encryption and access control increase the response time more than other aspects like message signature or authentication. We also observe that messages carrying security information are 10 times larger than unsecure messages, which may prevent the retrieval of a large number of information and short periods of time.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133031043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 IFIP/IEEE International Symposium on Integrated Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1