首页 > 最新文献

2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)最新文献

英文 中文
The Impact of Software-based Virtual Network in the Public Cloud 基于软件的虚拟网络在公共云中的影响
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8460102
Chunghan Lee, Katsuhito Asano, T. Ishihara
Today's cloud network consists of sophisticated virtual networks, and a virtual switch is a key element of these networks. Although there is tremendous interest in measuring cloud network performance, little is known about the impact of software-based virtual network on latency. In this paper, we conduct the impact of virtual network on latency in the public cloud based on OpenStack. We measured the throughput of VMs and simultaneously captured their packets on hosts. We analyzed the traces by using well-known metrics, such as throughput and RTT, and investigated the abrupt fluctuation of latency called as ‘the burstiness of latency’. We quantitatively clarify the impact of software-based virtual network on latency. In our public cloud, the latency is approximately 35.2% of RTT and 10% of burstiness mainly contributes to the increased RTT. The total latency was increased by the receiving side regardless of data and ACK paths. Our analysis results, discussions, and implications can not only help cloud researchers and developers design the next generation of software-based virtual network but can also help cloud operators improve the performance of virtual network.
今天的云网络由复杂的虚拟网络组成,虚拟交换机是这些网络的关键元素。尽管人们对测量云网络性能非常感兴趣,但人们对基于软件的虚拟网络对延迟的影响知之甚少。本文基于OpenStack对公共云中虚拟网络对时延的影响进行了研究。我们测量了虚拟机的吞吐量,同时在主机上捕获了它们的数据包。我们通过使用众所周知的指标(如吞吐量和RTT)分析了这些痕迹,并研究了延迟的突然波动,称为“延迟的突发”。我们定量地阐明了基于软件的虚拟网络对延迟的影响。在我们的公共云中,延迟约占RTT的35.2%,而10%的突发事件主要导致RTT的增加。无论数据和ACK路径如何,接收端的总延迟都会增加。我们的分析结果、讨论和启示不仅可以帮助云研究人员和开发人员设计下一代基于软件的虚拟网络,还可以帮助云运营商提高虚拟网络的性能。
{"title":"The Impact of Software-based Virtual Network in the Public Cloud","authors":"Chunghan Lee, Katsuhito Asano, T. Ishihara","doi":"10.1109/NETSOFT.2018.8460102","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460102","url":null,"abstract":"Today's cloud network consists of sophisticated virtual networks, and a virtual switch is a key element of these networks. Although there is tremendous interest in measuring cloud network performance, little is known about the impact of software-based virtual network on latency. In this paper, we conduct the impact of virtual network on latency in the public cloud based on OpenStack. We measured the throughput of VMs and simultaneously captured their packets on hosts. We analyzed the traces by using well-known metrics, such as throughput and RTT, and investigated the abrupt fluctuation of latency called as ‘the burstiness of latency’. We quantitatively clarify the impact of software-based virtual network on latency. In our public cloud, the latency is approximately 35.2% of RTT and 10% of burstiness mainly contributes to the increased RTT. The total latency was increased by the receiving side regardless of data and ACK paths. Our analysis results, discussions, and implications can not only help cloud researchers and developers design the next generation of software-based virtual network but can also help cloud operators improve the performance of virtual network.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123892510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
5G Edge Resource Federation: Dynamic and Cross-domain Network Slice Deployment 5G边缘资源联合:动态跨域网络切片部署
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8460118
Amina Boubendir, F. Guillemin, C. Toquin, Marie-Line Alberi-Morel, Frédéric Faucheux, S. Kerboeuf, J. Lafragette, Barbara Orlandi
By stating that edge resource federation is crucial in future 5G ecosystems, we demonstrate an architecture, where a network operator can achieve the federation of access and edge resources owned by private third-party actors through B2B relationships. Through a Proof-of-Concept, we illustrate on-demand creation and deployment of network slices dynamically over multiple domains for live content services in a Stadium.
通过说明边缘资源联合在未来5G生态系统中至关重要,我们展示了一种架构,在这种架构中,网络运营商可以通过B2B关系实现私有第三方参与者拥有的访问和边缘资源的联合。通过概念验证,我们演示了在体育场中的实时内容服务的多个域中动态地按需创建和部署网络切片。
{"title":"5G Edge Resource Federation: Dynamic and Cross-domain Network Slice Deployment","authors":"Amina Boubendir, F. Guillemin, C. Toquin, Marie-Line Alberi-Morel, Frédéric Faucheux, S. Kerboeuf, J. Lafragette, Barbara Orlandi","doi":"10.1109/NETSOFT.2018.8460118","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460118","url":null,"abstract":"By stating that edge resource federation is crucial in future 5G ecosystems, we demonstrate an architecture, where a network operator can achieve the federation of access and edge resources owned by private third-party actors through B2B relationships. Through a Proof-of-Concept, we illustrate on-demand creation and deployment of network slices dynamically over multiple domains for live content services in a Stadium.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127767474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software module-based 10G Optical Line Terminal for enhancing flexibility of access networks 基于软件模块的10G光线路终端,增强接入网的灵活性
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8459913
K. Nishimoto, Y. Koyasako, Takashi Yamada, J. Kani, A. Otaka
For enhancing flexibility in optical access network services, virtualization and softwarization of optical access network equipment in a Central Office have become a hot topic in this couple of years. We try to implement the software module-based Optical Line Terminal (OLT) for further flexibility in updating its functions. However, performance degradation compared to a conventional hardware OLT, is a technical obstacle for softwarization and modularization. This article reports the influence of softwarization and modularization, and the improvement by our proposed methods, based on prototype evaluation.
为了提高光接入网业务的灵活性,光接入网设备的虚拟化和软件化已成为近年来的研究热点。我们尝试实现基于软件模块的光线路终端(OLT),以进一步灵活地更新其功能。然而,与传统硬件OLT相比,性能下降是软件化和模块化的技术障碍。本文报告了基于原型评估的软件化和模块化的影响,以及我们提出的改进方法。
{"title":"Software module-based 10G Optical Line Terminal for enhancing flexibility of access networks","authors":"K. Nishimoto, Y. Koyasako, Takashi Yamada, J. Kani, A. Otaka","doi":"10.1109/NETSOFT.2018.8459913","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459913","url":null,"abstract":"For enhancing flexibility in optical access network services, virtualization and softwarization of optical access network equipment in a Central Office have become a hot topic in this couple of years. We try to implement the software module-based Optical Line Terminal (OLT) for further flexibility in updating its functions. However, performance degradation compared to a conventional hardware OLT, is a technical obstacle for softwarization and modularization. This article reports the influence of softwarization and modularization, and the improvement by our proposed methods, based on prototype evaluation.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117007365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Tactile Internet for the flight control of UAV flocks 基于触觉网络的无人机群飞控制
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8458493
Fabio D'Urso, Christian Grasso, C. Santoro, Federico Fausto Santoro, G. Schembra
This paper presents a software architecture, based on the Tactile Internet 5G network slice, to control a flock of UAVs performing a monitoring mission. In contrast to classical approaches for UAV flock control, which employ ad-hoc software running directly on board of of UAVs, we propose a solution in which flock and mission control tasks run at the edge of a 5G network; the architecture takes advantage of the Tactile Internet to implement a ultra-low latency communication link needed to send driving commands to UAVs. As a result, the deployment of computations in the edge provides many advantages, in terms of scalability and fault-tolerance, and avoids processing latencies, due to communication links, that represent an important drawback in traditional solutions.
本文提出了一种基于触觉互联网5G网络切片的软件架构,用于控制一群执行监视任务的无人机。与传统的无人机群控方法(使用直接在无人机上运行的ad-hoc软件)不同,我们提出了一种解决方案,其中群控任务和任务控制任务在5G网络的边缘运行;该架构利用触觉互联网实现向无人机发送驾驶命令所需的超低延迟通信链路。因此,就可伸缩性和容错性而言,在边缘部署计算提供了许多优势,并避免了由于通信链路导致的处理延迟,这是传统解决方案中的一个重要缺点。
{"title":"The Tactile Internet for the flight control of UAV flocks","authors":"Fabio D'Urso, Christian Grasso, C. Santoro, Federico Fausto Santoro, G. Schembra","doi":"10.1109/NETSOFT.2018.8458493","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8458493","url":null,"abstract":"This paper presents a software architecture, based on the Tactile Internet 5G network slice, to control a flock of UAVs performing a monitoring mission. In contrast to classical approaches for UAV flock control, which employ ad-hoc software running directly on board of of UAVs, we propose a solution in which flock and mission control tasks run at the edge of a 5G network; the architecture takes advantage of the Tactile Internet to implement a ultra-low latency communication link needed to send driving commands to UAVs. As a result, the deployment of computations in the edge provides many advantages, in terms of scalability and fault-tolerance, and avoids processing latencies, due to communication links, that represent an important drawback in traditional solutions.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117344933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Evolving SDN for Low-Power IoT Networks 面向低功耗物联网的SDN演进
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8460125
Michael Baddeley, R. Nejabati, G. Oikonomou, M. Sooriyabandara, D. Simeonidou
Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform. Low-power wireless Internet of Things (IoT) networks, where multi-tenant and multi-application architectures require scalable and configurable solutions, are ideally placed to capitalize on this research. However, implementing a centralized SDN architecture within the constraints of a low-power wireless network faces considerable challenges. Not only is controller traffic subject to jitter due to unreliable links and network contention, but the overhead generated by SDN can severely affect the performance of other traffic. This paper addresses the challenge of bringing high-overhead SDN architecture to IEEE 802.15.4 networks. We explore how the traditional view of SDN needs to evolve in order to overcome the constraints of low-power wireless networks, and discuss protocol and architectural optimizations necessary to reduce SDN control overhead - the main barrier to successful implementation. Additionally, we argue that interoperability with the existing protocol stack is necessary to provide a platform for controller discovery, and coexistence with legacy networks. We consequently introduce $mu text{SDN}$, a lightweight SDN framework for Contiki OS with both IPv6 and underlying routing protocol interoperability, as well as optimizing a number of elements within the SDN architecture to reduce control overhead to practical levels. We evaluate $mu text{SDN}$ in terms of latency, energy, and packet delivery. Through this evaluation we show how the cost of SDN control overhead (both bootstrapping and management) can be reduced to a point where comparable performance and scalability is achieved against an IEEE 802.15.4-2012 RPL-based network. Additionally, we demonstrate $mu text{SDN}$ through simulation: providing a use-case where the SDN configurability can be used to provide Quality of Service (QoS) for critical network flows experiencing interference, and we achieve considerable reductions in delay and jitter in comparison to a scenario without SDN.
软件定义网络(SDN)提供了一种灵活且可扩展的体系结构,它将决策从单个设备中抽象出来,并提供了一个可编程的网络平台。低功耗无线物联网(IoT)网络,其中多租户和多应用架构需要可扩展和可配置的解决方案,是利用这项研究的理想场所。然而,在低功耗无线网络的约束下实现集中式SDN架构面临着相当大的挑战。控制器流量不仅会因为链路不可靠和网络争用而产生抖动,而且SDN产生的开销也会严重影响其他流量的性能。本文解决了将高开销SDN架构引入IEEE 802.15.4网络的挑战。我们探讨了SDN的传统观点需要如何发展,以克服低功耗无线网络的限制,并讨论了减少SDN控制开销(成功实现的主要障碍)所需的协议和架构优化。此外,我们认为与现有协议栈的互操作性对于提供控制器发现平台以及与遗留网络的共存是必要的。因此,我们引入了$mu text{SDN}$,这是一个用于Contiki OS的轻量级SDN框架,具有IPv6和底层路由协议互操作性,并优化了SDN架构中的许多元素,以将控制开销降低到实际水平。我们根据延迟、能量和数据包传输来评估$mu text{SDN}$。通过此评估,我们展示了如何将SDN控制开销(引导和管理)的成本降低到与基于IEEE 802.15.4-2012 rpl的网络实现相当性能和可扩展性的程度。此外,我们通过模拟演示了$mu text{SDN}$:提供了一个用例,其中SDN可配置性可用于为遇到干扰的关键网络流提供服务质量(QoS),与没有SDN的场景相比,我们实现了延迟和抖动的显著减少。
{"title":"Evolving SDN for Low-Power IoT Networks","authors":"Michael Baddeley, R. Nejabati, G. Oikonomou, M. Sooriyabandara, D. Simeonidou","doi":"10.1109/NETSOFT.2018.8460125","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460125","url":null,"abstract":"Software Defined Networking (SDN) offers a flexible and scalable architecture that abstracts decision making away from individual devices and provides a programmable network platform. Low-power wireless Internet of Things (IoT) networks, where multi-tenant and multi-application architectures require scalable and configurable solutions, are ideally placed to capitalize on this research. However, implementing a centralized SDN architecture within the constraints of a low-power wireless network faces considerable challenges. Not only is controller traffic subject to jitter due to unreliable links and network contention, but the overhead generated by SDN can severely affect the performance of other traffic. This paper addresses the challenge of bringing high-overhead SDN architecture to IEEE 802.15.4 networks. We explore how the traditional view of SDN needs to evolve in order to overcome the constraints of low-power wireless networks, and discuss protocol and architectural optimizations necessary to reduce SDN control overhead - the main barrier to successful implementation. Additionally, we argue that interoperability with the existing protocol stack is necessary to provide a platform for controller discovery, and coexistence with legacy networks. We consequently introduce $mu text{SDN}$, a lightweight SDN framework for Contiki OS with both IPv6 and underlying routing protocol interoperability, as well as optimizing a number of elements within the SDN architecture to reduce control overhead to practical levels. We evaluate $mu text{SDN}$ in terms of latency, energy, and packet delivery. Through this evaluation we show how the cost of SDN control overhead (both bootstrapping and management) can be reduced to a point where comparable performance and scalability is achieved against an IEEE 802.15.4-2012 RPL-based network. Additionally, we demonstrate $mu text{SDN}$ through simulation: providing a use-case where the SDN configurability can be used to provide Quality of Service (QoS) for critical network flows experiencing interference, and we achieve considerable reductions in delay and jitter in comparison to a scenario without SDN.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114411846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Hierarchical Two Dimensional Queuing: A Scalable Approach for Traffic Shaping using Software Defined Networking 分层二维排队:一种使用软件定义网络进行流量整形的可扩展方法
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8460072
Sumitro Bhaumik, Sandip Chakraborty
Maintaining quality of service (QoS) at network cores is particularly challenging because of the dynamic service requirements from long (elephant) and short (mice) flows. Traditional integrated and differentiated services have high overhead in this scenario because they work on packet level classification rather than on flow level classification, and also it is difficult to estimate the QoS requirements a priori. In this paper, we explore a software controlled architecture to implement a hierarchical control and management framework for QoS provisioning at network cores. We show that both the service differentiation and fairness are required to maintain QoS in such scenario. Accordingly in this paper, we propose an optimization followed by a two dimensional queue management policy, called Hierarchical Two Dimension Queuing (H2DQ), over a software controlled differentiated service architecture to ensure both the service requirements and fairness for the elephant as well as mice flows. We have implemented H2DQ over a testbed using virtualized architecture, and show that H2DQ can significantly improve the performance in terms of QoS and fairness performance, while having less control overhead.
由于来自长(象)流和短(老鼠)流的动态服务需求,维护网络核心的服务质量(QoS)尤其具有挑战性。传统的集成和差异化业务在这种情况下的开销很大,因为它们工作在包级分类而不是流级分类,而且很难先验地估计QoS需求。在本文中,我们探索了一种软件控制架构,以实现在网络核心提供QoS的分层控制和管理框架。我们表明,在这种情况下,服务的差异性和公平性都是维持QoS的必要条件。因此,在本文中,我们提出了一种二维队列管理策略的优化,称为分层二维队列(H2DQ),该策略基于软件控制的差异化服务架构,以确保大象和老鼠流的服务需求和公平性。我们已经在一个使用虚拟化架构的测试平台上实现了H2DQ,并表明H2DQ可以在QoS和公平性性能方面显着提高性能,同时具有更少的控制开销。
{"title":"Hierarchical Two Dimensional Queuing: A Scalable Approach for Traffic Shaping using Software Defined Networking","authors":"Sumitro Bhaumik, Sandip Chakraborty","doi":"10.1109/NETSOFT.2018.8460072","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460072","url":null,"abstract":"Maintaining quality of service (QoS) at network cores is particularly challenging because of the dynamic service requirements from long (elephant) and short (mice) flows. Traditional integrated and differentiated services have high overhead in this scenario because they work on packet level classification rather than on flow level classification, and also it is difficult to estimate the QoS requirements a priori. In this paper, we explore a software controlled architecture to implement a hierarchical control and management framework for QoS provisioning at network cores. We show that both the service differentiation and fairness are required to maintain QoS in such scenario. Accordingly in this paper, we propose an optimization followed by a two dimensional queue management policy, called Hierarchical Two Dimension Queuing (H2DQ), over a software controlled differentiated service architecture to ensure both the service requirements and fairness for the elephant as well as mice flows. We have implemented H2DQ over a testbed using virtualized architecture, and show that H2DQ can significantly improve the performance in terms of QoS and fairness performance, while having less control overhead.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115207778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Utilizing attack enumerations to study SDN/NFV vulnerabilities 利用攻击枚举研究SDN/NFV漏洞
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8459961
Quang-Vinh Dang, J. François
Several cybersecurity attack enumerations area available today. These enumerations present lists of known attack patterns (CAPEC), security weaknesses (CWE) or cybersecurity vulnerabilities (CVE). These enumerations are being developed separately and manually. In this paper, we present the efforts in determining the relations between enumerations automatically. We rely on text-based, graph-based and recommendation-based approaches. Then we present of using the prediction in recommending related attacks to SDN/NFV security issues. Experimental results showed that we can actually infer real relations. Furthermore, the results gave some insights into how the enumerations are created and linked, and some suggestions to improve the process in the future.
目前有几种网络安全攻击枚举。这些列举提供了已知攻击模式(CAPEC)、安全弱点(CWE)或网络安全漏洞(CVE)的列表。这些列举是单独手工编制的。在本文中,我们介绍了在自动确定枚举之间关系方面所做的努力。我们依赖于基于文本、基于图形和基于推荐的方法。然后,我们提出了使用预测来推荐相关攻击的SDN/NFV安全问题。实验结果表明,我们实际上可以推断出真实的关系。此外,结果提供了关于如何创建和链接枚举的一些见解,以及将来改进该过程的一些建议。
{"title":"Utilizing attack enumerations to study SDN/NFV vulnerabilities","authors":"Quang-Vinh Dang, J. François","doi":"10.1109/NETSOFT.2018.8459961","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459961","url":null,"abstract":"Several cybersecurity attack enumerations area available today. These enumerations present lists of known attack patterns (CAPEC), security weaknesses (CWE) or cybersecurity vulnerabilities (CVE). These enumerations are being developed separately and manually. In this paper, we present the efforts in determining the relations between enumerations automatically. We rely on text-based, graph-based and recommendation-based approaches. Then we present of using the prediction in recommending related attacks to SDN/NFV security issues. Experimental results showed that we can actually infer real relations. Furthermore, the results gave some insights into how the enumerations are created and linked, and some suggestions to improve the process in the future.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125418739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SDN-based Attack Detection in Wireless Local Area Networks 基于sdn的无线局域网攻击检测
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8460121
Radoslaw Cwalinski, H. König
In this paper we propose an novel approach to secure enterprise Wireless Local Area Networks (WLANs) by leveraging the Software-defined Networking (SDN) paradigm to detect and mitigate attack attempts in WLANs. We extend our SDN platform from [1] to implement a client localization mechanism that exploits information from the physical and MAC layers offered by current wireless chipsets to localize transmitting clients. Based on location information, we create a “virtual perimeter” to prevent WLAN access for clients from outside of the defined area. We further introduce a single-channel WLAN model as a possible solution optimization. Our evaluation shows that the proposed solution succeeds in identifying WLAN Denial-of-Service attacks, such as IEEE 802.11 deauthentication.
在本文中,我们提出了一种新的方法来保护企业无线局域网(wlan),利用软件定义网络(SDN)范式来检测和减轻wlan中的攻击企图。我们将我们的SDN平台从[1]扩展到实现客户端本地化机制,该机制利用当前无线芯片组提供的物理层和MAC层信息来本地化传输客户端。基于位置信息,我们创建了一个“虚拟边界”,以防止客户端从定义区域之外访问WLAN。我们进一步介绍了单通道WLAN模型作为一种可能的解决方案优化。我们的评估表明,所提出的解决方案成功地识别了WLAN拒绝服务攻击,例如IEEE 802.11去认证。
{"title":"SDN-based Attack Detection in Wireless Local Area Networks","authors":"Radoslaw Cwalinski, H. König","doi":"10.1109/NETSOFT.2018.8460121","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8460121","url":null,"abstract":"In this paper we propose an novel approach to secure enterprise Wireless Local Area Networks (WLANs) by leveraging the Software-defined Networking (SDN) paradigm to detect and mitigate attack attempts in WLANs. We extend our SDN platform from [1] to implement a client localization mechanism that exploits information from the physical and MAC layers offered by current wireless chipsets to localize transmitting clients. Based on location information, we create a “virtual perimeter” to prevent WLAN access for clients from outside of the defined area. We further introduce a single-channel WLAN model as a possible solution optimization. Our evaluation shows that the proposed solution succeeds in identifying WLAN Denial-of-Service attacks, such as IEEE 802.11 deauthentication.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Slicing and Allocation of Transformable Resources for the Deployment of Multiple Virtualized Infrastructure Managers (VIMs) 面向多个虚拟化基础设施管理器部署的可转换资源的切片和分配
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8459990
L. A. Freitas, Vinícius G. Braga, S. Correa, L. Mamatas, Christian Esteve Rothenberg, S. Clayman, K. Cardoso
In the context of 5G networks, the concept of network slicing allows network providers to flexibly share infrastructures with mobile service providers and verticals. While this concept has been widely investigated considering mostly the network issues, in this work we focus on a slice as a service model that takes into account the data center (DC) perspective. In particular, we propose an architecture where DC slices are created over transformable (compute and storage) resources, which can be virtualized or de-virtualized on-demand. Then, on top of each slice, an on-demand VIM is instantiated to control the allocated resources. As a realization of this architecture, we introduce the DC Slice Controller, a system able to deploy and delivery full operational VIMs based on generic templates. We evaluate the effectiveness of the proposed system deploying three VIMs (VLSP, Kubernetes, and OpenStack) over commodity hardware. Experimental results show that the DC Slice Controller can timely provide a slice even when dealing with sophisticated VIMs such as OpenStack. As an example, we were able to delivery a fully functional OpenStack in four nodes in less than 10 minutes.
在5G网络背景下,网络切片的概念允许网络提供商灵活地与移动服务提供商和垂直行业共享基础设施。虽然这个概念已经被广泛研究,主要考虑到网络问题,但在本文中,我们将重点放在考虑数据中心(DC)视角的切片作为服务模型上。特别是,我们提出了一种架构,其中在可转换(计算和存储)资源上创建DC片,这些资源可以按需虚拟化或去虚拟化。然后,在每个片之上实例化一个按需VIM来控制分配的资源。作为该架构的实现,我们介绍了DC切片控制器,这是一个能够基于通用模板部署和交付完整操作VIMs的系统。我们评估了在商用硬件上部署三个虚拟机(VLSP, Kubernetes和OpenStack)的系统的有效性。实验结果表明,即使在OpenStack等复杂的虚拟化环境中,DC切片控制器也能及时提供切片。例如,我们能够在不到10分钟的时间内在四个节点上交付一个功能齐全的OpenStack。
{"title":"Slicing and Allocation of Transformable Resources for the Deployment of Multiple Virtualized Infrastructure Managers (VIMs)","authors":"L. A. Freitas, Vinícius G. Braga, S. Correa, L. Mamatas, Christian Esteve Rothenberg, S. Clayman, K. Cardoso","doi":"10.1109/NETSOFT.2018.8459990","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459990","url":null,"abstract":"In the context of 5G networks, the concept of network slicing allows network providers to flexibly share infrastructures with mobile service providers and verticals. While this concept has been widely investigated considering mostly the network issues, in this work we focus on a slice as a service model that takes into account the data center (DC) perspective. In particular, we propose an architecture where DC slices are created over transformable (compute and storage) resources, which can be virtualized or de-virtualized on-demand. Then, on top of each slice, an on-demand VIM is instantiated to control the allocated resources. As a realization of this architecture, we introduce the DC Slice Controller, a system able to deploy and delivery full operational VIMs based on generic templates. We evaluate the effectiveness of the proposed system deploying three VIMs (VLSP, Kubernetes, and OpenStack) over commodity hardware. Experimental results show that the DC Slice Controller can timely provide a slice even when dealing with sophisticated VIMs such as OpenStack. As an example, we were able to delivery a fully functional OpenStack in four nodes in less than 10 minutes.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125960326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Considerations for a Successful Network Service Chain Deployment 成功部署网络服务链的注意事项
Pub Date : 2018-06-01 DOI: 10.1109/NETSOFT.2018.8459934
Aris Leivadeas, M. Falkner, I. Lambadaris, G. Kesidis, Chung-Horng Lung, M. Ibnkahla
Network Functions Virtualization (NFV) along with the Service Chaining paradigm have changed the way that network services are deployed in the underlying network infrastructure. The decoupling of network functions from dedicated middleboxes into software entities has led the Service Providers to offer highly specialized services tailored to the needs of the end users. However, in order to achieve the high performance that the expensive hardware appliances can guarantee, an efficient virtualized network functions (VNF) deployment should be performed. This paper proposes a novel VNF placement approach with the goal to minimize the deployment cost and maximize the achieved throughput. Results reveal the need of considering the throughput degradation when consolidating multiple VNFs on the same server in order to increase the overall performance.
网络功能虚拟化(NFV)和服务链范式改变了网络服务在底层网络基础设施中的部署方式。将网络功能从专用的中间件解耦到软件实体,使得服务提供商能够根据最终用户的需求提供高度专业化的服务。然而,为了实现昂贵的硬件设备所能保证的高性能,需要执行高效的虚拟化网络功能(VNF)部署。本文提出了一种新的VNF布局方法,其目标是最小化部署成本和最大化实现吞吐量。结果表明,为了提高整体性能,在同一台服务器上合并多个VNFs时需要考虑吞吐量下降。
{"title":"Considerations for a Successful Network Service Chain Deployment","authors":"Aris Leivadeas, M. Falkner, I. Lambadaris, G. Kesidis, Chung-Horng Lung, M. Ibnkahla","doi":"10.1109/NETSOFT.2018.8459934","DOIUrl":"https://doi.org/10.1109/NETSOFT.2018.8459934","url":null,"abstract":"Network Functions Virtualization (NFV) along with the Service Chaining paradigm have changed the way that network services are deployed in the underlying network infrastructure. The decoupling of network functions from dedicated middleboxes into software entities has led the Service Providers to offer highly specialized services tailored to the needs of the end users. However, in order to achieve the high performance that the expensive hardware appliances can guarantee, an efficient virtualized network functions (VNF) deployment should be performed. This paper proposes a novel VNF placement approach with the goal to minimize the deployment cost and maximize the achieved throughput. Results reveal the need of considering the throughput degradation when consolidating multiple VNFs on the same server in order to increase the overall performance.","PeriodicalId":333377,"journal":{"name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1