首页 > 最新文献

2009 IFIP/IEEE International Symposium on Integrated Network Management最新文献

英文 中文
Introducing process-oriented IT service management at an academic computing center: An interim report 在学术计算中心引入面向流程的IT服务管理:中期报告
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188878
M. Brenner, H.-G. Hegering, Helmut Reiser, Christian Richter, T. Schaaf
The Leibniz Supercomputing Centre (Leibniz-Rechenzentrum, LRZ) is a service provider for a variety of academic institutions, mainly in the Munich (Germany) area. The services provided range from network services, server hosting, application services to specialized supercomputing services. Even in academia, computing services become ever more business critical : IT services for university spin-offs, virtual labs provided to other universities as an application service, and an increasing number of industry cooperation projects require highly available and reliable services. As scope, volume, complexity and required quality of services increase, financial and personal resources to provide these do not (at least not on the same scale). The only way to meet this challenge is to improve operational effectiveness and efficiency.
莱布尼茨超级计算中心(Leibniz- rechenzentrum, LRZ)是一个为各种学术机构提供服务的机构,主要位于慕尼黑(德国)地区。提供的服务范围从网络服务、服务器托管、应用程序服务到专门的超级计算服务。即使在学术界,计算服务也变得越来越具有业务关键性:大学衍生产品的IT服务、作为应用程序服务提供给其他大学的虚拟实验室,以及越来越多的行业合作项目都需要高可用性和可靠的服务。随着服务的范围、数量、复杂性和所需质量的增加,提供这些服务的财政和个人资源却没有增加(至少没有达到相同的规模)。应对这一挑战的唯一办法是提高业务效力和效率。
{"title":"Introducing process-oriented IT service management at an academic computing center: An interim report","authors":"M. Brenner, H.-G. Hegering, Helmut Reiser, Christian Richter, T. Schaaf","doi":"10.1109/INM.2009.5188878","DOIUrl":"https://doi.org/10.1109/INM.2009.5188878","url":null,"abstract":"The Leibniz Supercomputing Centre (Leibniz-Rechenzentrum, LRZ) is a service provider for a variety of academic institutions, mainly in the Munich (Germany) area. The services provided range from network services, server hosting, application services to specialized supercomputing services. Even in academia, computing services become ever more business critical : IT services for university spin-offs, virtual labs provided to other universities as an application service, and an increasing number of industry cooperation projects require highly available and reliable services. As scope, volume, complexity and required quality of services increase, financial and personal resources to provide these do not (at least not on the same scale). The only way to meet this challenge is to improve operational effectiveness and efficiency.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An evaluation of network management protocols 网络管理协议的评估
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188859
Pedro Gonçalves, J. Oliveira, R. Aguiar
During the last decade several network management solutions have been proposed or extended to cope with the growing complexity of networks, systems and services. Architectures, protocols, and information models have been proposed as a way to better respond to the new and different demands of global networks. However this offer also leads to a growing complexity of management solutions and to an increase in systems' requirements. The current management landscape is populated with a multiplicity of protocols, initially developed as an answer to different requirements. This paper presents a comparative study of currently common management protocols in All-IP networks: SNMP, COPS, Diameter, CIM/XML over HTTP and CIM/XML over SOAP. This assessment was focused on wireless aspect issues, and as such includes measures of bandwidth, packets, round-trip delays, and agents' requirements. We also analyzed the advantages of compression in these protocols.
在过去十年中,已经提出或扩展了几种网络管理解决方案,以应对日益复杂的网络、系统和服务。架构、协议和信息模型已经被提出作为更好地响应全球网络新的和不同需求的一种方式。然而,这也导致了管理解决方案的复杂性和系统需求的增加。当前的管理领域充斥着各种各样的协议,这些协议最初是为了满足不同的需求而开发的。本文对目前全ip网络中常用的管理协议:SNMP、COPS、Diameter、基于HTTP的CIM/XML和基于SOAP的CIM/XML进行了比较研究。该评估侧重于无线方面的问题,因此包括带宽、数据包、往返延迟和代理需求的度量。我们还分析了这些协议中压缩的优点。
{"title":"An evaluation of network management protocols","authors":"Pedro Gonçalves, J. Oliveira, R. Aguiar","doi":"10.1109/INM.2009.5188859","DOIUrl":"https://doi.org/10.1109/INM.2009.5188859","url":null,"abstract":"During the last decade several network management solutions have been proposed or extended to cope with the growing complexity of networks, systems and services. Architectures, protocols, and information models have been proposed as a way to better respond to the new and different demands of global networks. However this offer also leads to a growing complexity of management solutions and to an increase in systems' requirements. The current management landscape is populated with a multiplicity of protocols, initially developed as an answer to different requirements. This paper presents a comparative study of currently common management protocols in All-IP networks: SNMP, COPS, Diameter, CIM/XML over HTTP and CIM/XML over SOAP. This assessment was focused on wireless aspect issues, and as such includes measures of bandwidth, packets, round-trip delays, and agents' requirements. We also analyzed the advantages of compression in these protocols.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Building end-to-end management analytics for enterprise data centers 为企业数据中心构建端到端管理分析
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188875
Hai Huang, Yaoping Ruan, A. Shaikh, R. Routray, C. Tan, Sandeep Gopisetty
The complexity of modern data centers has evolved significantly in recent years. One typically is comprised of a large number and types of middleware and applications that are hosted in a heterogeneous pool of both physical and virtual servers, connected by a complex web of virtual and physical networks. Therefore, to manage everything in a data center, system administrators usually need a plethora of management tools since one tool often manages only one type of devices. The boundaries between the different management tools can limit productivity of system administrators on their daily tasks as each tool only offers a partial view of the entire managed environment. As a result, advanced analytics such as impact analysis and problem determination are generally not achievable using the traditional management tools as they require a holistic view of the entire data center. In this paper, we describe an integrated management system for applications, servers, network and storage devices called DataGraph. Our system integrates data across heterogeneous point products and agents for management and monitoring to enable the above mentioned management analytics capabilities. A common data model is introduced to federate data collected by the different tools in multiple database repositories so no modifications are needed to existing management tools. A common integrated web user interface is implemented to facilitate management tasks that would otherwise require invoking multiple tools. We deployed this tool in a lab environment and demonstrated these analytics capabilities through several case studies.
近年来,现代数据中心的复杂性发生了显著的变化。一个典型的由大量不同类型的中间件和应用程序组成,这些中间件和应用程序托管在物理和虚拟服务器的异构池中,由虚拟和物理网络的复杂网络连接。因此,为了管理数据中心中的一切,系统管理员通常需要大量的管理工具,因为一个工具通常只管理一种类型的设备。不同管理工具之间的界限可能会限制系统管理员处理日常任务的效率,因为每个工具只提供整个被管理环境的部分视图。因此,使用传统的管理工具通常无法实现影响分析和问题确定等高级分析,因为它们需要整个数据中心的整体视图。在本文中,我们描述了一个名为DataGraph的应用程序、服务器、网络和存储设备的集成管理系统。我们的系统集成了跨异构点产品和代理的数据,用于管理和监控,以实现上述管理分析功能。引入一个公共数据模型来联合多个数据库存储库中不同工具收集的数据,因此不需要对现有的管理工具进行修改。实现了一个通用的集成web用户界面,以方便管理任务,否则将需要调用多个工具。我们在实验室环境中部署了这个工具,并通过几个案例研究演示了这些分析功能。
{"title":"Building end-to-end management analytics for enterprise data centers","authors":"Hai Huang, Yaoping Ruan, A. Shaikh, R. Routray, C. Tan, Sandeep Gopisetty","doi":"10.1109/INM.2009.5188875","DOIUrl":"https://doi.org/10.1109/INM.2009.5188875","url":null,"abstract":"The complexity of modern data centers has evolved significantly in recent years. One typically is comprised of a large number and types of middleware and applications that are hosted in a heterogeneous pool of both physical and virtual servers, connected by a complex web of virtual and physical networks. Therefore, to manage everything in a data center, system administrators usually need a plethora of management tools since one tool often manages only one type of devices. The boundaries between the different management tools can limit productivity of system administrators on their daily tasks as each tool only offers a partial view of the entire managed environment. As a result, advanced analytics such as impact analysis and problem determination are generally not achievable using the traditional management tools as they require a holistic view of the entire data center. In this paper, we describe an integrated management system for applications, servers, network and storage devices called DataGraph. Our system integrates data across heterogeneous point products and agents for management and monitoring to enable the above mentioned management analytics capabilities. A common data model is introduced to federate data collected by the different tools in multiple database repositories so no modifications are needed to existing management tools. A common integrated web user interface is implemented to facilitate management tasks that would otherwise require invoking multiple tools. We deployed this tool in a lab environment and demonstrated these analytics capabilities through several case studies.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129883620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing end-to-end network reachability 分析端到端网络可达性
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188865
Sruthi Bandhakavi, S. Bhatt, Cat Okita, P. Rao
Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the configurations of multiple, separately administered, components. As configurations evolve, a small change in one configuration file can have widespread impact on the end-to-end accesses. Short of exhaustive testing, which is impractical, there are no good solutions to analyze end-to-end flows from network configurations. This paper presents a general technique to analyze all the end-to-end accesses from the configuration files of network routers, switches and firewalls. We efficiently analyze certain state-dependent filter rules. Our goal is to help network security engineers and operators quickly determine configuration errors that may cause unexpected behavior such as unwanted accesses or unreachable services. Our technique can be also be used as part of the change management process, to help prevent network misconfiguration.
网络安全管理员并不总是能够准确地分辨出在他们的网络中哪些端到端访问是允许的,哪些是不允许的。问题在于,每次访问都是由多个单独管理的组件的配置决定的。随着配置的发展,一个配置文件中的一个小变化可能会对端到端访问产生广泛的影响。如果没有详尽的测试(这是不切实际的),就没有好的解决方案来分析来自网络配置的端到端流。本文提出了一种从网络路由器、交换机和防火墙的配置文件中分析所有端到端访问的通用技术。我们有效地分析了一些状态相关的过滤规则。我们的目标是帮助网络安全工程师和运营商快速确定可能导致意外行为的配置错误,例如不必要的访问或无法访问的服务。我们的技术也可以作为变更管理过程的一部分来使用,以帮助防止网络错误配置。
{"title":"Analyzing end-to-end network reachability","authors":"Sruthi Bandhakavi, S. Bhatt, Cat Okita, P. Rao","doi":"10.1109/INM.2009.5188865","DOIUrl":"https://doi.org/10.1109/INM.2009.5188865","url":null,"abstract":"Network security administrators cannot always accurately tell which end-to-end accesses are permitted within their network, and which ones are not. The problem is that every access is determined by the configurations of multiple, separately administered, components. As configurations evolve, a small change in one configuration file can have widespread impact on the end-to-end accesses. Short of exhaustive testing, which is impractical, there are no good solutions to analyze end-to-end flows from network configurations. This paper presents a general technique to analyze all the end-to-end accesses from the configuration files of network routers, switches and firewalls. We efficiently analyze certain state-dependent filter rules. Our goal is to help network security engineers and operators quickly determine configuration errors that may cause unexpected behavior such as unwanted accesses or unreachable services. Our technique can be also be used as part of the change management process, to help prevent network misconfiguration.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"14 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128868074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Embedded system management using WBEM 基于WBEM的嵌入式系统管理
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188840
M. Hutter, Alexander Szekely, J. Wolkerstorfer
Web-based management solutions have become an increasingly important and promising approach especially for small and embedded environments. This article presents the design and implementation of an embedded system that leverages the Web-based Enterprise Management (WBEM) solution. WBEM has been designed to manage large heterogeneous environments but has not yet been deployed on small and embedded devices. First, we evaluate existing WBEM implementations due to its resource requirements. Second, we describe the design of an embedded network device that has been realized on a system-on-chip prototyping platform. A small-footprint WBEM server has been integrated that requires less than 900 kB of non-volatile memory. We provide performance measurements of our solution and compare the results with other Web-based management approaches. They show that WBEM is suitable to run on such resource-constraint devices and to be applicable in practice.
基于web的管理解决方案已经成为越来越重要和有前途的方法,特别是对于小型和嵌入式环境。本文介绍了利用基于web的企业管理(WBEM)解决方案的嵌入式系统的设计和实现。WBEM设计用于管理大型异构环境,但尚未部署在小型和嵌入式设备上。首先,我们根据资源需求评估现有的WBEM实现。其次,我们描述了一个嵌入式网络设备的设计,并在片上系统原型平台上实现。集成了一个占用空间小的WBEM服务器,它只需要不到900 kB的非易失性内存。我们提供解决方案的性能度量,并将结果与其他基于web的管理方法进行比较。结果表明,该方法适合在此类资源受限设备上运行,具有实际应用价值。
{"title":"Embedded system management using WBEM","authors":"M. Hutter, Alexander Szekely, J. Wolkerstorfer","doi":"10.1109/INM.2009.5188840","DOIUrl":"https://doi.org/10.1109/INM.2009.5188840","url":null,"abstract":"Web-based management solutions have become an increasingly important and promising approach especially for small and embedded environments. This article presents the design and implementation of an embedded system that leverages the Web-based Enterprise Management (WBEM) solution. WBEM has been designed to manage large heterogeneous environments but has not yet been deployed on small and embedded devices. First, we evaluate existing WBEM implementations due to its resource requirements. Second, we describe the design of an embedded network device that has been realized on a system-on-chip prototyping platform. A small-footprint WBEM server has been integrated that requires less than 900 kB of non-volatile memory. We provide performance measurements of our solution and compare the results with other Web-based management approaches. They show that WBEM is suitable to run on such resource-constraint devices and to be applicable in practice.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130708960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Designing stand-by gateway for managing a waste of networked home-device power 设计备用网关以管理网络家庭设备电源的浪费
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188797
Jungmee Yun, Jin-Wook Chung, Sanghak Lee
The Internet protocols were designed when there were relatively few devices connected to the Internet and these devices were in use most of the time. Studies show many of these computers especially in home have their power management features disabled in order to maintain their network presence and network connections. Past research proposes to use a low power proxy to “stand in” for a computer, allowing it to go to sleep and thus save power while still maintaining its network presence. This paper describes an experimental stand-by gateway that can be used to develop the requirements for such a proxy. With the stand-by gateway, we propose to develop a language to be used by applications to provide the necessary code to the proxy to maintain network connections and presence for a sleeping computer. And we investigate the possibility of putting various components on home gateway to sleep during periods of low traffic activity. Out results show that sleeping is indeed feasible in the home network
互联网协议是在连接到互联网的设备相对较少,并且这些设备大部分时间都在使用时设计的。研究表明,许多这样的电脑,尤其是家里的电脑,为了保持网络存在和网络连接,都关闭了电源管理功能。过去的研究建议使用低功耗代理来“代替”计算机,允许它进入睡眠状态,从而在保持网络存在的同时节省电力。本文描述了一个实验性的备用网关,可以用来开发这样一个代理的需求。对于备用网关,我们建议开发一种语言,供应用程序使用,为代理提供必要的代码,以维护网络连接和休眠计算机的存在。我们还研究了在低流量活动期间将家庭网关上的各种组件置于睡眠状态的可能性。我们的结果表明,在家庭网络中睡觉确实是可行的
{"title":"Designing stand-by gateway for managing a waste of networked home-device power","authors":"Jungmee Yun, Jin-Wook Chung, Sanghak Lee","doi":"10.1109/INM.2009.5188797","DOIUrl":"https://doi.org/10.1109/INM.2009.5188797","url":null,"abstract":"The Internet protocols were designed when there were relatively few devices connected to the Internet and these devices were in use most of the time. Studies show many of these computers especially in home have their power management features disabled in order to maintain their network presence and network connections. Past research proposes to use a low power proxy to “stand in” for a computer, allowing it to go to sleep and thus save power while still maintaining its network presence. This paper describes an experimental stand-by gateway that can be used to develop the requirements for such a proxy. With the stand-by gateway, we propose to develop a language to be used by applications to provide the necessary code to the proxy to maintain network connections and presence for a sleeping computer. And we investigate the possibility of putting various components on home gateway to sleep during periods of low traffic activity. Out results show that sleeping is indeed feasible in the home network","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131145278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Architectural principles and elements of in-network management 网内管理的体系结构原则和要素
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188858
D. Dudkowski, M. Brunner, G. Nunzi, C. Mingardi, C. Foley, M. P. D. Leon, C. Meirosu, S. Engberg
Recent endeavors in addressing the challenges of the current and future Internet pursue a clean slate design methodology. Simultaneously, it is argued that the Internet is unlikely to be changed in one fell swoop and that its next generation requires an evolutionary design approach. Recognizing both positions, we claim that cleanness and evolution are not mutually exclusive, but rather complementary and indispensable properties for sustainable management in the future Internet. In this paper we propose the in-network management (INM) paradigm, which adopts a clean slate design approach to the management of future communication networks that is brought about by evolutionary design principles. The proposed paradigm builds on embedded management capabilities to address the intrinsic nature, and hence, close relationship between the network and its management. At the same time, INM assists in the gradual adoption of embedded self-managing processes to progressively achieve adequate and practical degrees of INM. We demonstrate how INM can be exploited in current and future network management by its application to P2P networks.
在解决当前和未来互联网的挑战方面,最近的努力追求一种全新的设计方法。同时,有人认为互联网不太可能一下子改变,它的下一代需要一种进化的设计方法。认识到这两种立场,我们认为清洁和进化不是相互排斥的,而是互补的,是未来互联网可持续管理不可或缺的属性。在本文中,我们提出了网内管理(INM)范式,它采用一种全新的设计方法来管理由进化设计原则带来的未来通信网络。所提出的范例建立在嵌入式管理能力的基础上,以解决网络及其管理之间的内在本质和密切关系。同时,内部管理协助逐步采用嵌入式自我管理过程,以逐步达到充分和实用的内部管理程度。我们通过将INM应用于P2P网络来演示如何在当前和未来的网络管理中加以利用。
{"title":"Architectural principles and elements of in-network management","authors":"D. Dudkowski, M. Brunner, G. Nunzi, C. Mingardi, C. Foley, M. P. D. Leon, C. Meirosu, S. Engberg","doi":"10.1109/INM.2009.5188858","DOIUrl":"https://doi.org/10.1109/INM.2009.5188858","url":null,"abstract":"Recent endeavors in addressing the challenges of the current and future Internet pursue a clean slate design methodology. Simultaneously, it is argued that the Internet is unlikely to be changed in one fell swoop and that its next generation requires an evolutionary design approach. Recognizing both positions, we claim that cleanness and evolution are not mutually exclusive, but rather complementary and indispensable properties for sustainable management in the future Internet. In this paper we propose the in-network management (INM) paradigm, which adopts a clean slate design approach to the management of future communication networks that is brought about by evolutionary design principles. The proposed paradigm builds on embedded management capabilities to address the intrinsic nature, and hence, close relationship between the network and its management. At the same time, INM assists in the gradual adoption of embedded self-managing processes to progressively achieve adequate and practical degrees of INM. We demonstrate how INM can be exploited in current and future network management by its application to P2P networks.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130276328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Monitoring and counter-profiling for Voice over IP networks and services IP语音网络和服务的监控和反分析
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188819
Rémi Badonnel, O. Festor, Khaled Hamlaoui
Voice over IP (VoIP) has become a major paradigm for providing lower operational costs and higher flexibility in networks and services. VoIP infrastructures are however facing multiple security issues. In particular, monitoring methods and techniques can be applied to VoIP traffic in order to profile and track network users. We present in this paper a counter-measure strategy for preventing VoIP profiling. We propose two functional architectures with different noise generation functions in order to dynamically generate fake VoIP messages and deteriorate the profiling performances. We quantify the benefits and limits of our approach through an implementation prototype and the analysis of experimental results obtained in the case scenario of profiling methods based on principal component analysis (PCA).
IP语音(VoIP)已经成为在网络和服务中提供更低运营成本和更高灵活性的主要范例。然而,VoIP基础设施面临着多种安全问题。特别是,监控方法和技术可以应用于VoIP流量,以便分析和跟踪网络用户。本文提出了一种防止VoIP剖析的对策策略。为了动态生成虚假VoIP消息,降低分析性能,我们提出了两种具有不同噪声产生功能的功能架构。通过实现原型和基于主成分分析(PCA)的分析方法的案例场景中获得的实验结果分析,我们量化了我们方法的优点和局限性。
{"title":"Monitoring and counter-profiling for Voice over IP networks and services","authors":"Rémi Badonnel, O. Festor, Khaled Hamlaoui","doi":"10.1109/INM.2009.5188819","DOIUrl":"https://doi.org/10.1109/INM.2009.5188819","url":null,"abstract":"Voice over IP (VoIP) has become a major paradigm for providing lower operational costs and higher flexibility in networks and services. VoIP infrastructures are however facing multiple security issues. In particular, monitoring methods and techniques can be applied to VoIP traffic in order to profile and track network users. We present in this paper a counter-measure strategy for preventing VoIP profiling. We propose two functional architectures with different noise generation functions in order to dynamically generate fake VoIP messages and deteriorate the profiling performances. We quantify the benefits and limits of our approach through an implementation prototype and the analysis of experimental results obtained in the case scenario of profiling methods based on principal component analysis (PCA).","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128856044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the feasibility of static analysis for BGP convergence 静态分析BGP收敛的可行性
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188857
L. Cittadini, M. Rimondini, Matteo Corea, G. Battista
Internet Service Providers can enforce a fine grained control of Interdomain Routing by cleverly configuring the Border Gateway Protocol. However, the price to pay for the flexibility of BGP is the lack of convergence guarantees. Network protocol design literature introduced several sufficient conditions that routing policies should satisfy to guarantee convergence. However, to our knowledge, none of these conditions has yet been exploited to automatically check BGP policies for convergence.
互联网服务提供商可以通过巧妙地配置边界网关协议来实施对域间路由的细粒度控制。然而,BGP灵活性的代价是缺乏收敛性保证。网络协议设计文献介绍了路由策略为保证收敛性必须满足的几个充分条件。然而,据我们所知,这些条件还没有被用来自动检查BGP策略是否收敛。
{"title":"On the feasibility of static analysis for BGP convergence","authors":"L. Cittadini, M. Rimondini, Matteo Corea, G. Battista","doi":"10.1109/INM.2009.5188857","DOIUrl":"https://doi.org/10.1109/INM.2009.5188857","url":null,"abstract":"Internet Service Providers can enforce a fine grained control of Interdomain Routing by cleverly configuring the Border Gateway Protocol. However, the price to pay for the flexibility of BGP is the lack of convergence guarantees. Network protocol design literature introduced several sufficient conditions that routing policies should satisfy to guarantee convergence. However, to our knowledge, none of these conditions has yet been exploited to automatically check BGP policies for convergence.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
How much management is management enough? Providing monitoring processes with online adaptation and learning capability 多少程度的管理才是足够的管理?为监控过程提供在线适应和学习能力
Pub Date : 2009-06-01 DOI: 10.1109/INM.2009.5188826
Josiane Ortolan Coelho, L. Gaspary, L. Tarouco
Recent investigations of management traffic patterns in production networks suggest that just a small and static set of management data tends to be used, the flow of management data is relatively constant, and the operations in use for manager-agent communication are reduced to a few, sometimes obsolete set. This is an indication of lack of progress of monitoring processes, taking into account their strategic role and potential, for example, to anticipate and prevent faults, performance bottlenecks, and security problems. One of the main reasons for such limitation relies on the fact that operators, who still are a fundamental element of the monitoring control loop, can no longer handle the rapidly increasing size and heterogeneity of both hardware and software components that comprise modern networked computing systems. This form of human-in-the-loop management certainly hampers timely adaptation of monitoring processes. To tackle this issue, this paper presents a model, inspired by the reinforcement learning theory, for adaptive network, service and application monitoring. The model is instantiated through a prototypical implementation of an autonomic element, which, based on historical and even unexpected values retrieved for management objects, dynamically widens or restricts the set of management objects to be monitored.
最近对生产网络中管理流量模式的调查表明,往往只使用一小组静态的管理数据,管理数据的流量相对恒定,用于管理-代理通信的操作减少到少数,有时是过时的一组。这表明缺乏监控流程的进展,考虑到流程的战略角色和潜力,例如,预测和防止故障、性能瓶颈和安全问题。造成这种限制的一个主要原因是,操作员仍然是监测控制回路的基本要素,他们无法再处理构成现代网络计算系统的硬件和软件组件快速增长的规模和异构性。这种形式的人在循环管理肯定会妨碍及时调整监控过程。为了解决这一问题,本文提出了一个受强化学习理论启发的自适应网络、服务和应用监控模型。模型通过自治元素的原型实现实例化,自治元素基于为管理对象检索的历史甚至意外值,动态地扩大或限制要监视的管理对象集。
{"title":"How much management is management enough? Providing monitoring processes with online adaptation and learning capability","authors":"Josiane Ortolan Coelho, L. Gaspary, L. Tarouco","doi":"10.1109/INM.2009.5188826","DOIUrl":"https://doi.org/10.1109/INM.2009.5188826","url":null,"abstract":"Recent investigations of management traffic patterns in production networks suggest that just a small and static set of management data tends to be used, the flow of management data is relatively constant, and the operations in use for manager-agent communication are reduced to a few, sometimes obsolete set. This is an indication of lack of progress of monitoring processes, taking into account their strategic role and potential, for example, to anticipate and prevent faults, performance bottlenecks, and security problems. One of the main reasons for such limitation relies on the fact that operators, who still are a fundamental element of the monitoring control loop, can no longer handle the rapidly increasing size and heterogeneity of both hardware and software components that comprise modern networked computing systems. This form of human-in-the-loop management certainly hampers timely adaptation of monitoring processes. To tackle this issue, this paper presents a model, inspired by the reinforcement learning theory, for adaptive network, service and application monitoring. The model is instantiated through a prototypical implementation of an autonomic element, which, based on historical and even unexpected values retrieved for management objects, dynamically widens or restricts the set of management objects to be monitored.","PeriodicalId":332206,"journal":{"name":"2009 IFIP/IEEE International Symposium on Integrated Network Management","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2009 IFIP/IEEE International Symposium on Integrated Network Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1