Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188838
Miao Jiang, M. A. Munawar, Thomas Reidemeister, Paul A. S. Ward
Modern software systems expose management metrics to help track their health. Recently, it was demonstrated that correlations among these metrics allow faults to be detected and their causes localized. In particular, linear regression models have been used to capture metric correlations. We show that for many pairs of correlated metrics in software systems, such as those based on Java Enterprise Edition (JavaEE), the variance of the predicted variable is not constant. This behaviour violates the assumptions of linear regression, and we show that these models may produce inaccurate results. In this paper, leveraging insight from the system behaviour, we employ an efficient variant of linear regression to capture the non-constant variance. We show that this variant captures metric correlations, while taking the changing residual variance into consideration. We explore potential causes underlying this behaviour, and we construct and validate our models using a realistic multi-tier enterprise application. Using a set of 50 fault-injection experiments, we show that we can detect all faults without any false alarm.
{"title":"Heteroscedastic models to track relationships between management metrics","authors":"Miao Jiang, M. A. Munawar, Thomas Reidemeister, Paul A. S. Ward","doi":"10.1109/INM.2009.5188838","DOIUrl":"https://doi.org/10.1109/INM.2009.5188838","url":null,"abstract":"Modern software systems expose management metrics to help track their health. Recently, it was demonstrated that correlations among these metrics allow faults to be detected and their causes localized. In particular, linear regression models have been used to capture metric correlations. We show that for many pairs of correlated metrics in software systems, such as those based on Java Enterprise Edition (JavaEE), the variance of the predicted variable is not constant. This behaviour violates the assumptions of linear regression, and we show that these models may produce inaccurate results. In this paper, leveraging insight from the system behaviour, we employ an efficient variant of linear regression to capture the non-constant variance. We show that this variant captures metric correlations, while taking the changing residual variance into consideration. We explore potential causes underlying this behaviour, and we construct and validate our models using a realistic multi-tier enterprise application. Using a set of 50 fault-injection experiments, we show that we can detect all faults without any false alarm.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188804
Lu Cheng, Xue-song Qiu, Luoming Meng, Yan Qiao, Zhiqing Li
The modern society has come to rely heavily on IT services. To improve the quality of IT services it is important to quickly and accurately detect and diagnose their faults which are usually detected as disruption of a set of dependent logical services affected by the failed IT resources. The task, depending on observed symptoms and knowledge about IT services, is always disturbed by noises and dynamic changing in the managed environments. We present a tool for analysis of IT services faults which, given a set of failed end-to-end services, discovers the underlying resources of faulty state. We demonstrate empirically that it applies in noisy and dynamic changing environments with bounded errors and high efficiency. We compare our algorithm with two prior approaches, Shrink and Maxcoverage, in two well-known types of network topologies. Experimental results show that our algorithm improves the overall performance.
{"title":"Probabilistic fault diagnosis for IT services in noisy and dynamic environments","authors":"Lu Cheng, Xue-song Qiu, Luoming Meng, Yan Qiao, Zhiqing Li","doi":"10.1109/INM.2009.5188804","DOIUrl":"https://doi.org/10.1109/INM.2009.5188804","url":null,"abstract":"The modern society has come to rely heavily on IT services. To improve the quality of IT services it is important to quickly and accurately detect and diagnose their faults which are usually detected as disruption of a set of dependent logical services affected by the failed IT resources. The task, depending on observed symptoms and knowledge about IT services, is always disturbed by noises and dynamic changing in the managed environments. We present a tool for analysis of IT services faults which, given a set of failed end-to-end services, discovers the underlying resources of faulty state. We demonstrate empirically that it applies in noisy and dynamic changing environments with bounded errors and high efficiency. We compare our algorithm with two prior approaches, Shrink and Maxcoverage, in two well-known types of network topologies. Experimental results show that our algorithm improves the overall performance.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188811
Bin Zhang, E. Al-Shaer
Constructing optimal event correlation architecture is crucial to large-scale event services. It plays an instrumental role in detecting composite events requested by different subscribers in scalable and timely manner. However, events generated from different sources might have different time and priority requirements. In addition, the network links and correlation servers might have different bandwidth and processing constraints respectively. In this work, we address the problem of optimizing distributed event correlation to maximize the correlation profit (benefit minus shipping and processing cost) of detecting composite events, while at the same time satisfying the network bandwidth, node capacity, and correlation tasks time constrains. We show that this problem is NP-hard and provide a heuristic approximation algorithm. We evaluate our heuristic approach with different network sizes, topologies under different event delivery and detection requirements. Our simulation study shows that the results obtained by our heuristic are close to the upper bound.
{"title":"Optimizing correlation structure of event services considering time and capacity constraints","authors":"Bin Zhang, E. Al-Shaer","doi":"10.1109/INM.2009.5188811","DOIUrl":"https://doi.org/10.1109/INM.2009.5188811","url":null,"abstract":"Constructing optimal event correlation architecture is crucial to large-scale event services. It plays an instrumental role in detecting composite events requested by different subscribers in scalable and timely manner. However, events generated from different sources might have different time and priority requirements. In addition, the network links and correlation servers might have different bandwidth and processing constraints respectively. In this work, we address the problem of optimizing distributed event correlation to maximize the correlation profit (benefit minus shipping and processing cost) of detecting composite events, while at the same time satisfying the network bandwidth, node capacity, and correlation tasks time constrains. We show that this problem is NP-hard and provide a heuristic approximation algorithm. We evaluate our heuristic approach with different network sizes, topologies under different event delivery and detection requirements. Our simulation study shows that the results obtained by our heuristic are close to the upper bound.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126172202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188847
Juliano Araujo Wickboldt, Guilherme Sperb Machado, Weverton Cordeiro, R. C. Lunardi, A. O. D. Santos, F. Andreis, C. Both, L. Granville, L. Gaspary, C. Bartolini, David Trastour
The growing necessity of organizations in using technologies to support to their operations implies that managing IT resources became a mission-critical issue for the health of the primary companies' businesses. Thus, in order to minimize problems in the IT infrastructure, possibly affecting the daily business operations, risks intrinsic to the change process have to be analyzed and assessed. Risk Management is a widely discussed subject in several areas, although for IT Change Management it is quite a new discipline. The Information Technology Infrastructure Library (ITIL) introduces a set of best practices to conduct the management of IT infrastructures. According to ITIL, risks should be investigated, measured, and mitigated before any change is approved. Even with these guidelines, there is no default automatic method for risk assessment in IT Change Management. In this paper we introduce a risk analysis method based on the execution history of past changes. In addition, we propose a failure representation model to capture the feedback of the execution of changes over IT infrastructures.
{"title":"A solution to support risk analysis on IT Change Management","authors":"Juliano Araujo Wickboldt, Guilherme Sperb Machado, Weverton Cordeiro, R. C. Lunardi, A. O. D. Santos, F. Andreis, C. Both, L. Granville, L. Gaspary, C. Bartolini, David Trastour","doi":"10.1109/INM.2009.5188847","DOIUrl":"https://doi.org/10.1109/INM.2009.5188847","url":null,"abstract":"The growing necessity of organizations in using technologies to support to their operations implies that managing IT resources became a mission-critical issue for the health of the primary companies' businesses. Thus, in order to minimize problems in the IT infrastructure, possibly affecting the daily business operations, risks intrinsic to the change process have to be analyzed and assessed. Risk Management is a widely discussed subject in several areas, although for IT Change Management it is quite a new discipline. The Information Technology Infrastructure Library (ITIL) introduces a set of best practices to conduct the management of IT infrastructures. According to ITIL, risks should be investigated, measured, and mitigated before any change is approved. Even with these guidelines, there is no default automatic method for risk assessment in IT Change Management. In this paper we introduce a risk analysis method based on the execution history of past changes. In addition, we propose a failure representation model to capture the feedback of the execution of changes over IT infrastructures.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188794
Ricardo M. Silva, J. Silva, Milan Simek, F. Boavida
Wireless Sensor Networks are low cost networks constituted by modest devices with limited resources, whose main function is monitoring. Based on the low price of these devices, it will be cheap to deploy a large amount of nodes to monitor a large area. However, to provide an efficient ad hoc network using these limited devices, new and optimized algorithms should be proposed. Most of the current work about WSNs are based on simulation studies and do not take in consideration engineering processes. This paper presents a Multi-Sink Node alternative to multi-hop solutions. The proposed solution also provides a new system for the discovery of devices and services over IPv6, allowing nodes to be automatically incorporated in the nearest WSN. This paper also presents a paradigm to efficiently provide mobility, granting a fast handover of nodes between different WSNs, without loosing the connection.
{"title":"A new approach for multi-sink environments in WSNs","authors":"Ricardo M. Silva, J. Silva, Milan Simek, F. Boavida","doi":"10.1109/INM.2009.5188794","DOIUrl":"https://doi.org/10.1109/INM.2009.5188794","url":null,"abstract":"Wireless Sensor Networks are low cost networks constituted by modest devices with limited resources, whose main function is monitoring. Based on the low price of these devices, it will be cheap to deploy a large amount of nodes to monitor a large area. However, to provide an efficient ad hoc network using these limited devices, new and optimized algorithms should be proposed. Most of the current work about WSNs are based on simulation studies and do not take in consideration engineering processes. This paper presents a Multi-Sink Node alternative to multi-hop solutions. The proposed solution also provides a new system for the discovery of devices and services over IPv6, allowing nodes to be automatically incorporated in the nearest WSN. This paper also presents a paradigm to efficiently provide mobility, granting a fast handover of nodes between different WSNs, without loosing the connection.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188791
Yuan Chen, Subu Iyer, D. Milojicic, Akhil Sahai
In order to manage a service to meet the agreed upon SLA, it is important to design a service of the required capacity and to monitor the service thereafter for violations at runtime. This objective can be achieved by translating SLOs specified in the SLA into lower-level policies that can then be used for design and enforcement purposes. Such design and operational policies are often constraints on thresholds of lower level metrics. In this paper, we propose a systematic and practical approach that combines fine-grained performance modeling with regression analysis to translate service level objectives into design and operational policies for multi-tier applications. We demonstrate that our approach can handle both request-based and session-based workloads and deal with workload changes in terms of both request volume and transaction mix. We validate our approach using both the RUBiS e-commerce benchmark and a trace-driven simulation of a business-critical enterprise application. These results show the effectiveness of our approach.
{"title":"A systematic and practical approach to generating policies from service level objectives","authors":"Yuan Chen, Subu Iyer, D. Milojicic, Akhil Sahai","doi":"10.1109/INM.2009.5188791","DOIUrl":"https://doi.org/10.1109/INM.2009.5188791","url":null,"abstract":"In order to manage a service to meet the agreed upon SLA, it is important to design a service of the required capacity and to monitor the service thereafter for violations at runtime. This objective can be achieved by translating SLOs specified in the SLA into lower-level policies that can then be used for design and enforcement purposes. Such design and operational policies are often constraints on thresholds of lower level metrics. In this paper, we propose a systematic and practical approach that combines fine-grained performance modeling with regression analysis to translate service level objectives into design and operational policies for multi-tier applications. We demonstrate that our approach can handle both request-based and session-based workloads and deal with workload changes in terms of both request volume and transaction mix. We validate our approach using both the RUBiS e-commerce benchmark and a trace-driven simulation of a business-critical enterprise application. These results show the effectiveness of our approach.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188833
Mosharaf Chowdhury, Fida-E. Zaheer, R. Boutaba
In recent years, network virtualization has been propounded as an open and flexible future internetworking paradigm that allows multiple virtual networks (VNs) to co-exist on a shared physical substrate. Each VN in a network virtualization environment (NVE) is free to implement its own naming, addressing, routing, and transport mechanisms. While such flexibility allows fast and easy deployment of diversified applications and services, ensuring end-to-end communication and universal connectivity poses a daunting challenge. This paper advocates that effective and efficient management of heterogeneous identifier spaces is the key to solving the problem of end-to-end connectivity in an NVE. We propose iMark, an identity management framework based on a global identity space, which enables end hosts to communicate with each other within and outside of their own networks through a set of controllers, adapters, and well-placed mappings without sacrificing the autonomy of the concerned VNs. We describe the procedures that manipulate these mappings between different identifier spaces and provide performance evaluation of the proposed framework.
{"title":"iMark: An identity management framework for network virtualization environment","authors":"Mosharaf Chowdhury, Fida-E. Zaheer, R. Boutaba","doi":"10.1109/INM.2009.5188833","DOIUrl":"https://doi.org/10.1109/INM.2009.5188833","url":null,"abstract":"In recent years, network virtualization has been propounded as an open and flexible future internetworking paradigm that allows multiple virtual networks (VNs) to co-exist on a shared physical substrate. Each VN in a network virtualization environment (NVE) is free to implement its own naming, addressing, routing, and transport mechanisms. While such flexibility allows fast and easy deployment of diversified applications and services, ensuring end-to-end communication and universal connectivity poses a daunting challenge. This paper advocates that effective and efficient management of heterogeneous identifier spaces is the key to solving the problem of end-to-end connectivity in an NVE. We propose iMark, an identity management framework based on a global identity space, which enables end hosts to communicate with each other within and outside of their own networks through a set of controllers, adapters, and well-placed mappings without sacrificing the autonomy of the concerned VNs. We describe the procedures that manipulate these mappings between different identifier spaces and provide performance evaluation of the proposed framework.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121263968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188821
V. Gondi, N. Agoulmine
The main aim of the paper is to define a security and mobility architecture for users to roam along isolated wireless networks. Due to the mobility of the users as well as the networks some of the key issues like security and mobility management are not addressed properly due to non availability of infrastructure to handle authentications, mobility management in the access networks. To provide services in a isolated areas, and to cover large areas the ideal solution is provided by the cellular networks, but the bandwidth, cost of communication and the availability for different services are limited by the cellular networks. For this purpose we propose to integrate WIMAX (IEEE 802.16) based networks working in a mesh configuration with WLAN (IEEE 802.11) as a solution to provide different services. By this method a centralized system is proposed to process authentication and mobility management in the network for the users as well as access networks. In the proposed architecture, a master node acts as a gateway for mesh and slave nodes. The gateway has an AAA server which acts as an authentication and accounting server for the mesh nodes. WLAN are interconnected to mesh nodes and slave nodes and the users use WLAN as an access network. The user authenticates to the network using EAP or a onetime password method to access the services in the network. We also proposed mobility management in the architecture where users roams along different access networks in an efficient manner. We evaluated the architecture using a testbed, we calculated the time of authentications and re-authentications during roaming, delay at the user level while networks are in mobile mode.
{"title":"Security and mobility architecture for isolated wireless networks using WIMAX as an infrastructure","authors":"V. Gondi, N. Agoulmine","doi":"10.1109/INM.2009.5188821","DOIUrl":"https://doi.org/10.1109/INM.2009.5188821","url":null,"abstract":"The main aim of the paper is to define a security and mobility architecture for users to roam along isolated wireless networks. Due to the mobility of the users as well as the networks some of the key issues like security and mobility management are not addressed properly due to non availability of infrastructure to handle authentications, mobility management in the access networks. To provide services in a isolated areas, and to cover large areas the ideal solution is provided by the cellular networks, but the bandwidth, cost of communication and the availability for different services are limited by the cellular networks. For this purpose we propose to integrate WIMAX (IEEE 802.16) based networks working in a mesh configuration with WLAN (IEEE 802.11) as a solution to provide different services. By this method a centralized system is proposed to process authentication and mobility management in the network for the users as well as access networks. In the proposed architecture, a master node acts as a gateway for mesh and slave nodes. The gateway has an AAA server which acts as an authentication and accounting server for the mesh nodes. WLAN are interconnected to mesh nodes and slave nodes and the users use WLAN as an access network. The user authenticates to the network using EAP or a onetime password method to access the services in the network. We also proposed mobility management in the architecture where users roams along different access networks in an efficient manner. We evaluated the architecture using a testbed, we calculated the time of authentications and re-authentications during roaming, delay at the user level while networks are in mobile mode.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188795
M. Brenner, T. Schaaf, Alexander Scherer
As IT service providers are adopting more comprehensive approaches towards IT Service Management (ITSM), they increasingly need to rely on ITSM software solutions in their day-to-day operations. However, when wishing to integrate ITSM software from one vendor with that of another, the lack of underlying standards becomes woefully apparent. Without any standardized information model for ITSM processes, efficient and integrated ITSM will remain a vision.
{"title":"Towards an information model for ITIL and ISO/IEC 20000 processes","authors":"M. Brenner, T. Schaaf, Alexander Scherer","doi":"10.1109/INM.2009.5188795","DOIUrl":"https://doi.org/10.1109/INM.2009.5188795","url":null,"abstract":"As IT service providers are adopting more comprehensive approaches towards IT Service Management (ITSM), they increasingly need to rely on ITSM software solutions in their day-to-day operations. However, when wishing to integrate ITSM software from one vendor with that of another, the lack of underlying standards becomes woefully apparent. Without any standardized information model for ITSM processes, efficient and integrated ITSM will remain a vision.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127213452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-06-01DOI: 10.1109/INM.2009.5188816
O. Gonzalez, A. Hadjiantonis, G. Pavlou, M. Howarth
Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, since their overall performance depends on the cooperative packet forwarding behavior of each individual node. In this paper we present a role-based approach that uses a distributed management overlay and gathers information about the packet forwarding activities of each node in the network. Using policies to control an adaptive algorithmic method that monitors the individual behavior of each node, we show that it is possible to detect, accuse and punish misbehaving nodes with a high degree of confidence. Our evaluation results demonstrate that after the successful detection of misbehaving nodes, their punishment through network isolation can significantly improve network performance in terms of packet delivery and throughput.
{"title":"Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies","authors":"O. Gonzalez, A. Hadjiantonis, G. Pavlou, M. Howarth","doi":"10.1109/INM.2009.5188816","DOIUrl":"https://doi.org/10.1109/INM.2009.5188816","url":null,"abstract":"Wireless ad hoc networks provide the communications platform for new technologies and applications, such as vehicular ad hoc networks or wireless mesh networks. However, their multihop wireless nature makes them inherently unreliable and vulnerable, since their overall performance depends on the cooperative packet forwarding behavior of each individual node. In this paper we present a role-based approach that uses a distributed management overlay and gathers information about the packet forwarding activities of each node in the network. Using policies to control an adaptive algorithmic method that monitors the individual behavior of each node, we show that it is possible to detect, accuse and punish misbehaving nodes with a high degree of confidence. Our evaluation results demonstrate that after the successful detection of misbehaving nodes, their punishment through network isolation can significantly improve network performance in terms of packet delivery and throughput.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126175474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}