首页 > 最新文献

2021 IEEE 29th International Conference on Network Protocols (ICNP)最新文献

英文 中文
ISP Self-Operated BGP Anomaly Detection Based on Weakly Supervised Learning 基于弱监督学习的ISP自运行BGP异常检测
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651957
Yutao Dong, Qing Li, R. Sinnott, Yong Jiang, Shutao Xia
The Border Gateway Protocol (BGP) is arguably the most important and irreplaceable protocol in the network. However, the lack of routing authentication and validation makes it vulnerable to attacks, including routing leaks, route hijacking, prefix hijacking, etc. Therefore, in this paper we propose a generalized framework for ISP self-operated BGP anomaly detection based on weakly supervised learning. To tackle the problem of insufficient data in BGP anomaly detection, we propose an approach to learn from the other anomaly detection systems through knowledge distillation. To reduce the impact of inaccurate supervision, we design a self-attention-based Long Short-Term Memory (LSTM) model to self-adaptively mine the differences between BGP anomaly categories, including both feature and time dimensions. Finally, we implement a system and demonstrate the performance through a set of comprehensive experiments. Compared with the state-of-the-art schemes, our scheme has better generalization on various anomaly types.
边界网关协议(BGP)可以说是网络中最重要和不可替代的协议。然而,缺乏路由认证和验证使其容易受到攻击,包括路由泄漏、路由劫持、前缀劫持等。因此,本文提出了一种基于弱监督学习的ISP自运行BGP异常检测的广义框架。针对BGP异常检测中数据不足的问题,提出了一种通过知识蒸馏向其他异常检测系统学习的方法。为了减少不准确监督的影响,我们设计了一个基于自注意的长短期记忆(LSTM)模型,自适应挖掘BGP异常类别之间的差异,包括特征和时间维度。最后,我们实现了一个系统,并通过一组综合实验验证了系统的性能。与现有方案相比,该方案对各种异常类型具有更好的泛化能力。
{"title":"ISP Self-Operated BGP Anomaly Detection Based on Weakly Supervised Learning","authors":"Yutao Dong, Qing Li, R. Sinnott, Yong Jiang, Shutao Xia","doi":"10.1109/ICNP52444.2021.9651957","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651957","url":null,"abstract":"The Border Gateway Protocol (BGP) is arguably the most important and irreplaceable protocol in the network. However, the lack of routing authentication and validation makes it vulnerable to attacks, including routing leaks, route hijacking, prefix hijacking, etc. Therefore, in this paper we propose a generalized framework for ISP self-operated BGP anomaly detection based on weakly supervised learning. To tackle the problem of insufficient data in BGP anomaly detection, we propose an approach to learn from the other anomaly detection systems through knowledge distillation. To reduce the impact of inaccurate supervision, we design a self-attention-based Long Short-Term Memory (LSTM) model to self-adaptively mine the differences between BGP anomaly categories, including both feature and time dimensions. Finally, we implement a system and demonstrate the performance through a set of comprehensive experiments. Compared with the state-of-the-art schemes, our scheme has better generalization on various anomaly types.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114916958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Speeding Up TCP with Selective Loss Prevention 基于选择性防丢失的TCP加速算法
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651983
Zhenyu Zhou, Xiaowei Yang
Low latency is an important design goal for reliable data transmission protocols such as TCP and QUIC. However, timeout-based loss recovery can unnecessarily increase end-to-end latency. Previous work in reducing timeout-based loss recovery latency either duplicates every packet to avoid loss or focuses on fine-tuning the timeout timers to shorten the timeout latency without causing spurious packet retransmissions. In this work, we propose a new mechanism called Selective Loss Prevention (SLP) to reduce the loss recovery latency of a reliable transport protocol. Through extensive trace analysis, we find that not all lost packets are equal. The loss of packets with certain flags, such as SYN and PSH, is more likely to cause timeouts than other packets. Based on this observation, we propose to selectively duplicate an "important" packet whose loss is likely to increase a connection's latency. We design an algorithm to determine when to duplicate a lost packet proactively and incorporate it into TCP's congestion control algorithm so that duplicate packets will not congest the network. We incorporate SLP into Linux's kernel and evaluate its performance. Our results show that SLP can reduce timeout-based latency caused by the loss of important packets in a connection, and its overhead is low.
低延迟是TCP和QUIC等可靠数据传输协议的重要设计目标。但是,基于超时的损失恢复可能会不必要地增加端到端延迟。以前在减少基于超时的丢失恢复延迟方面的工作要么复制每个数据包以避免丢失,要么专注于微调超时计时器以缩短超时延迟,而不会导致虚假的数据包重传。在这项工作中,我们提出了一种称为选择性损失预防(SLP)的新机制来减少可靠传输协议的损失恢复延迟。通过广泛的跟踪分析,我们发现并非所有丢失的数据包都是相同的。丢失带有某些标志(如SYN和PSH)的数据包比丢失其他数据包更容易导致超时。基于这一观察,我们建议有选择地复制“重要”数据包,因为它的丢失可能会增加连接的延迟。我们设计了一种算法来确定何时主动复制丢失的数据包,并将其合并到TCP的拥塞控制算法中,以便重复的数据包不会阻塞网络。我们将SLP集成到Linux内核中并评估其性能。我们的结果表明,SLP可以减少由连接中重要数据包丢失引起的基于超时的延迟,并且它的开销很低。
{"title":"Speeding Up TCP with Selective Loss Prevention","authors":"Zhenyu Zhou, Xiaowei Yang","doi":"10.1109/ICNP52444.2021.9651983","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651983","url":null,"abstract":"Low latency is an important design goal for reliable data transmission protocols such as TCP and QUIC. However, timeout-based loss recovery can unnecessarily increase end-to-end latency. Previous work in reducing timeout-based loss recovery latency either duplicates every packet to avoid loss or focuses on fine-tuning the timeout timers to shorten the timeout latency without causing spurious packet retransmissions. In this work, we propose a new mechanism called Selective Loss Prevention (SLP) to reduce the loss recovery latency of a reliable transport protocol. Through extensive trace analysis, we find that not all lost packets are equal. The loss of packets with certain flags, such as SYN and PSH, is more likely to cause timeouts than other packets. Based on this observation, we propose to selectively duplicate an \"important\" packet whose loss is likely to increase a connection's latency. We design an algorithm to determine when to duplicate a lost packet proactively and incorporate it into TCP's congestion control algorithm so that duplicate packets will not congest the network. We incorporate SLP into Linux's kernel and evaluate its performance. Our results show that SLP can reduce timeout-based latency caused by the loss of important packets in a connection, and its overhead is low.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"91 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recycling Wasted Energy for Mobile Charging 回收废能源作流动充电
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651967
Yu Sun, Chi Lin, Haipeng Dai, Pengfei Wang, Jiankang Ren, Lei Wang, Guowei Wu
The rapid popularization of wireless power transfer (WPT) technology promotes the wide adoption of wireless rechargeable sensor networks (WRSNs). Traditional methods only focus on how to optimize network performance, and most of them overlook the energy waste issue induced by WPT. In this paper, we explore the potentials of recycling wasted energy when using WPT by means of freeloading. Specifically, with a slight modification on hardware, we expand the functionality of the mobile chargers (MCs), enabling them to harvest and recycle the WPT-induced wasted energy in the air to serve more sensors, which promotes energy efficiency. We model the problem, termed MEFree, as maximizing network energy efficiency by utilizing a limited number of freeloading MCs and scheduling their freeloading behaviors. Through jointly scheduling freeloading and charging tasks, the proposed scheme is able to solve the problem with a (1 − 1/e)/2 approximation ratio with a slightly relaxed budget. Extensive simulations are conducted and corresponding numerical results show that our proposed scheme significantly improves network energy efficiency by at least 18.8% and outperforms baseline algorithms by 19.1% on average in various aspects. Our test-bed experiments further demonstrate the practicability of our scheme in actual scenes.
无线电力传输(WPT)技术的迅速普及促进了无线可充电传感器网络(WRSNs)的广泛采用。传统的方法只关注如何优化网络性能,而忽略了WPT引起的能源浪费问题。在本文中,我们探讨了利用WPT时,通过免费加载的方式回收浪费能源的潜力。具体而言,通过对硬件的轻微修改,我们扩展了移动充电器(mc)的功能,使它们能够收集和回收空气中wpt引起的浪费能量,为更多的传感器服务,从而提高了能源效率。我们将这个问题(称为MEFree)建模为通过利用有限数量的免费mc并调度其免费行为来最大化网络能源效率。通过对免费和收费任务的联合调度,该方案能够以(1−1/e)/2的近似比解决问题,且预算略宽松。进行了大量的仿真,相应的数值结果表明,我们提出的方案在各方面显著提高了网络能源效率至少18.8%,平均优于基准算法19.1%。实验进一步证明了该方案在实际场景中的实用性。
{"title":"Recycling Wasted Energy for Mobile Charging","authors":"Yu Sun, Chi Lin, Haipeng Dai, Pengfei Wang, Jiankang Ren, Lei Wang, Guowei Wu","doi":"10.1109/ICNP52444.2021.9651967","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651967","url":null,"abstract":"The rapid popularization of wireless power transfer (WPT) technology promotes the wide adoption of wireless rechargeable sensor networks (WRSNs). Traditional methods only focus on how to optimize network performance, and most of them overlook the energy waste issue induced by WPT. In this paper, we explore the potentials of recycling wasted energy when using WPT by means of freeloading. Specifically, with a slight modification on hardware, we expand the functionality of the mobile chargers (MCs), enabling them to harvest and recycle the WPT-induced wasted energy in the air to serve more sensors, which promotes energy efficiency. We model the problem, termed MEFree, as maximizing network energy efficiency by utilizing a limited number of freeloading MCs and scheduling their freeloading behaviors. Through jointly scheduling freeloading and charging tasks, the proposed scheme is able to solve the problem with a (1 − 1/e)/2 approximation ratio with a slightly relaxed budget. Extensive simulations are conducted and corresponding numerical results show that our proposed scheme significantly improves network energy efficiency by at least 18.8% and outperforms baseline algorithms by 19.1% on average in various aspects. Our test-bed experiments further demonstrate the practicability of our scheme in actual scenes.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131966882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Highway On-Ramp Merging for Mixed Traffic: Recent Advances and Future Trends 混合交通的高速公路入口匝道合并:最新进展和未来趋势
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651989
S. A. Fernandez, M. A. M. Marinho, M. Vakilzadeh, A. Vinel
Due to the ability to support a wide range of applications and to involve infrastructure elements, connected and automated vehicles (CAVs) technology has played an important role in the development of cooperative intelligent transport systems. Thus, with the available sensing system, CAVs can perceive the surrounding environment. Indeed, due to the involvement of CAVs, communication of vehicles to other related devices using vehicle-to-everything (V2X) communication plays critical roles. This paper summarizes the research and development trends when proposing driving models, with a particular attention to highway on-ramp merging scenarios. The challenges and future research directions are also presented.
由于能够支持广泛的应用并涉及基础设施要素,连接和自动车辆(cav)技术在协作智能交通系统的发展中发挥了重要作用。因此,利用现有的传感系统,自动驾驶汽车可以感知周围的环境。事实上,由于自动驾驶汽车的参与,使用车联网(V2X)通信的车辆与其他相关设备的通信起着至关重要的作用。本文在提出驾驶模型时总结了研究和发展趋势,并特别关注了高速公路入口匝道合并场景。提出了今后的研究方向和面临的挑战。
{"title":"Highway On-Ramp Merging for Mixed Traffic: Recent Advances and Future Trends","authors":"S. A. Fernandez, M. A. M. Marinho, M. Vakilzadeh, A. Vinel","doi":"10.1109/ICNP52444.2021.9651989","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651989","url":null,"abstract":"Due to the ability to support a wide range of applications and to involve infrastructure elements, connected and automated vehicles (CAVs) technology has played an important role in the development of cooperative intelligent transport systems. Thus, with the available sensing system, CAVs can perceive the surrounding environment. Indeed, due to the involvement of CAVs, communication of vehicles to other related devices using vehicle-to-everything (V2X) communication plays critical roles. This paper summarizes the research and development trends when proposing driving models, with a particular attention to highway on-ramp merging scenarios. The challenges and future research directions are also presented.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114211456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Poster: Private Internet: A Global End-to-End Service Model 海报:私有互联网:全球端到端服务模式
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651920
Souvik Das, K. Saraç
The public Internet is a network of autonomously owned and operated networks. Outdated peering policies and lack of end-to-end performance guarantees are causing its ossification which have led large cloud and content providers to build their own global private backbone infrastructures. As much as these private backbones help eliminate public transit for content hosted across their networks, content hosted elsewhere is still carried over the public Internet. In this poster, we propose a model where these private backbone operators collaborate with the access-networks of content providers and consumers to implement end-to-end network services with better performance characteristics than the public Internet. We call the resulting end-to-end service domain as a "Private Internet".
公共互联网是一个由自主拥有和运营的网络组成的网络。过时的对等策略和缺乏端到端性能保证导致其僵化,这导致大型云和内容提供商建立自己的全球私有骨干基础设施。尽管这些私有主干网帮助消除了在其网络上托管的内容的公共传输,但托管在其他地方的内容仍然通过公共互联网进行传输。在这张海报中,我们提出了一个模型,在这个模型中,这些私有骨干运营商与内容提供商和消费者的接入网络合作,实现具有比公共互联网更好性能特征的端到端网络服务。我们将由此产生的端到端服务域称为“私有Internet”。
{"title":"Poster: Private Internet: A Global End-to-End Service Model","authors":"Souvik Das, K. Saraç","doi":"10.1109/ICNP52444.2021.9651920","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651920","url":null,"abstract":"The public Internet is a network of autonomously owned and operated networks. Outdated peering policies and lack of end-to-end performance guarantees are causing its ossification which have led large cloud and content providers to build their own global private backbone infrastructures. As much as these private backbones help eliminate public transit for content hosted across their networks, content hosted elsewhere is still carried over the public Internet. In this poster, we propose a model where these private backbone operators collaborate with the access-networks of content providers and consumers to implement end-to-end network services with better performance characteristics than the public Internet. We call the resulting end-to-end service domain as a \"Private Internet\".","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116353117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Traffic Engineering with Supervised Learning in Multi-region Networks 多区域网络中具有监督学习的联邦流量工程
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651918
Minghao Ye, Junjie Zhang, Zehua Guo, H. J. Chao
Network operators usually adopt Traffic Engineering (TE) to configure the routing in their networks to achieve good load balancing performance and high resource utilization. While centralized TE can effectively improve network performance with a global view of the network, distributed TE has been considered as an alternative to manage large-scale networks that are usually partitioned into multiple regions. However, it is challenging for distributed TE to reach a global optimal performance since each region can make its local routing decisions only based on partially observed network states. In this paper, we propose a novel distributed TE scheme called FedTe, which leverages supervised learning coupled with a collaborative approach to improve the overall load balancing performance for multi-region networks. FedTe learns from the global optimal routing strategy in a centralized offline manner and predicts the optimal distribution of cross-region traffic among different regions through distributed deployment in real time. The predicted cross-region traffic distribution is integrated with measured local traffic to construct each region’s optimal regional traffic matrix, which is used to perform intra-region TE optimization. FedTe can also handle dynamic traffic variation and link failures with a 2-layer hierarchical graph neural network architecture. To validate the effectiveness of the proposed scheme, we evaluate FedTe with two real-world network topologies and a large-scale synthetic topology. Extensive evaluation results show that FedTe can achieve near-optimal load balancing performance and outperform state-of-the-art distributed TE approaches by up to 28.9% on average.
网络运营商通常采用TE (Traffic Engineering)技术对网络中的路由进行配置,以达到良好的负载均衡性能和较高的资源利用率。虽然集中式TE可以通过网络的全局视图有效地提高网络性能,但分布式TE已被认为是管理通常划分为多个区域的大规模网络的替代方案。然而,由于每个区域只能根据部分观察到的网络状态做出局部路由决策,因此分布式TE要达到全局最优性能是具有挑战性的。在本文中,我们提出了一种新的分布式TE方案,称为FedTe,它利用监督学习和协作方法来提高多区域网络的整体负载平衡性能。FedTe以集中式离线方式学习全局最优路由策略,并通过分布式部署实时预测跨区域流量在不同区域之间的最优分布。将预测的跨区域流量分布与本地实测流量相结合,构建各区域的最优区域流量矩阵,用于区域内TE优化。FedTe还可以处理动态流量变化和链路故障的2层分层图神经网络体系结构。为了验证所提出方案的有效性,我们使用两个真实网络拓扑和一个大规模合成拓扑来评估FedTe。广泛的评估结果表明,FedTe可以实现近乎最佳的负载平衡性能,并且比最先进的分布式TE方法平均高出28.9%。
{"title":"Federated Traffic Engineering with Supervised Learning in Multi-region Networks","authors":"Minghao Ye, Junjie Zhang, Zehua Guo, H. J. Chao","doi":"10.1109/ICNP52444.2021.9651918","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651918","url":null,"abstract":"Network operators usually adopt Traffic Engineering (TE) to configure the routing in their networks to achieve good load balancing performance and high resource utilization. While centralized TE can effectively improve network performance with a global view of the network, distributed TE has been considered as an alternative to manage large-scale networks that are usually partitioned into multiple regions. However, it is challenging for distributed TE to reach a global optimal performance since each region can make its local routing decisions only based on partially observed network states. In this paper, we propose a novel distributed TE scheme called FedTe, which leverages supervised learning coupled with a collaborative approach to improve the overall load balancing performance for multi-region networks. FedTe learns from the global optimal routing strategy in a centralized offline manner and predicts the optimal distribution of cross-region traffic among different regions through distributed deployment in real time. The predicted cross-region traffic distribution is integrated with measured local traffic to construct each region’s optimal regional traffic matrix, which is used to perform intra-region TE optimization. FedTe can also handle dynamic traffic variation and link failures with a 2-layer hierarchical graph neural network architecture. To validate the effectiveness of the proposed scheme, we evaluate FedTe with two real-world network topologies and a large-scale synthetic topology. Extensive evaluation results show that FedTe can achieve near-optimal load balancing performance and outperform state-of-the-art distributed TE approaches by up to 28.9% on average.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116229852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Poster: Enabling Fast Forwarding in Hybrid Software-Defined Networks 海报:在混合软件定义网络中启用快速转发
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651943
Yijun Sun, Zehua Guo, Songshi Dou, Junjie Zhang, Changlin Li, Xiang Ouyang
Emerging Software-Defined Networking (SDN) technique brings new opportunities to improve network performance. Some SDN-enabled programmable switches are deployed in legacy networks, and thus legacy and programmable switches could coexist, generating hybrid SDNs. In this paper, we study the node upgrade for layer-2 hybrid SDN and propose Shortcutter to accelerate the transmission. Preliminary results show that the proposed Shortcutter can reduce the forwarding path’s length 7% on average, compared with baseline solutions.
新兴的软件定义网络(SDN)技术为提高网络性能带来了新的机遇。一些支持sdn的可编程交换机部署在传统网络中,因此传统交换机和可编程交换机可以共存,从而生成混合sdn。本文对二层混合SDN的节点升级进行了研究,并提出了加快传输速度的捷径。初步结果表明,与基线方案相比,所提出的捷径方案平均可使转发路径长度减少7%。
{"title":"Poster: Enabling Fast Forwarding in Hybrid Software-Defined Networks","authors":"Yijun Sun, Zehua Guo, Songshi Dou, Junjie Zhang, Changlin Li, Xiang Ouyang","doi":"10.1109/ICNP52444.2021.9651943","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651943","url":null,"abstract":"Emerging Software-Defined Networking (SDN) technique brings new opportunities to improve network performance. Some SDN-enabled programmable switches are deployed in legacy networks, and thus legacy and programmable switches could coexist, generating hybrid SDNs. In this paper, we study the node upgrade for layer-2 hybrid SDN and propose Shortcutter to accelerate the transmission. Preliminary results show that the proposed Shortcutter can reduce the forwarding path’s length 7% on average, compared with baseline solutions.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: Data Collection for ML Classification of Encrypted Messaging Applications 海报:加密消息应用的ML分类数据收集
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651948
Jason Hussey, Ethan Taylor, Kerri Stone, T. Camp
Network traffic classification is used to identify the nature of traffic on a network. Entities capable of monitoring net-work traffic use classification for all manner of reasons, including identification of mobile applications being used on the network. It is possible that the usage of encrypted messaging applications by users on these networks can be detected, betraying elements of their privacy.In this paper, we describe a system that leverages campus network resources to generate real-world data alongside a more curated dataset captured from Android application traffic. We also explore the ability of machine learning (ML) models to accurately classify traffic from these encrypted messaging applications. Understanding what is revealed from network data is important given that the use of these applications is meant to maximize privacy in the first place.
网络流分类用于识别网络中流量的性质。能够监控网络流量的实体出于各种原因使用分类,包括识别网络上使用的移动应用程序。用户在这些网络上使用的加密消息传递应用程序有可能被检测到,从而泄露了他们的隐私。在本文中,我们描述了一个利用校园网资源生成真实世界数据的系统,以及从Android应用程序流量中捕获的更精心策划的数据集。我们还探索了机器学习(ML)模型准确分类来自这些加密消息传递应用程序的流量的能力。考虑到使用这些应用程序首先是为了最大限度地保护隐私,了解从网络数据中泄露的内容非常重要。
{"title":"Poster: Data Collection for ML Classification of Encrypted Messaging Applications","authors":"Jason Hussey, Ethan Taylor, Kerri Stone, T. Camp","doi":"10.1109/ICNP52444.2021.9651948","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651948","url":null,"abstract":"Network traffic classification is used to identify the nature of traffic on a network. Entities capable of monitoring net-work traffic use classification for all manner of reasons, including identification of mobile applications being used on the network. It is possible that the usage of encrypted messaging applications by users on these networks can be detected, betraying elements of their privacy.In this paper, we describe a system that leverages campus network resources to generate real-world data alongside a more curated dataset captured from Android application traffic. We also explore the ability of machine learning (ML) models to accurately classify traffic from these encrypted messaging applications. Understanding what is revealed from network data is important given that the use of these applications is meant to maximize privacy in the first place.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126406384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISRaft Consensus Algorithm for Autonomous Units 自治单元的ISRaft一致性算法
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651979
Linir Zamir, Aman Shaan, Mehrdad Nojoumian
Consensus protocols are a key feature in decentral-ized systems where multiple unreliable nodes operate, e.g., in Blockchain technologies with many worldwide applications such as supply chain management, cryptocurrencies and information sharing. ISRaft is a consensus protocol built upon Raft, a previously developed protocol that is used for replicated state machines when a group of nodes is required to achieve a consensus related to the state of the machine. This paper therefore proposes an alternative version of the ISRaft consensus protocol to allow communication among nodes in a secured fashion while maintaining the security features of the original ISRaft algorithm even in the presence of adversarial nodes. The proposed model utilizes a trust parameter to enforce cooperation, i.e., a trust value is assigned to each node to prevent malicious activities over time. This is a practical solution for autonomous units with resource-constrained devices where a regular encrypted communication method can negatively affect the system performance.
共识协议是多个不可靠节点运行的去中心化系统的一个关键特征,例如,在区块链技术中,供应链管理、加密货币和信息共享等许多全球应用。ISRaft是建立在Raft基础上的共识协议,Raft是一种以前开发的协议,用于复制状态机,当需要一组节点达成与机器状态相关的共识时。因此,本文提出了ISRaft共识协议的替代版本,允许节点之间以安全的方式进行通信,同时即使在存在对抗节点的情况下也保持原始ISRaft算法的安全特性。该模型利用信任参数来强制合作,即为每个节点分配信任值,以防止恶意活动。对于具有资源受限设备的自治单元,这是一种实用的解决方案,其中常规加密通信方法可能会对系统性能产生负面影响。
{"title":"ISRaft Consensus Algorithm for Autonomous Units","authors":"Linir Zamir, Aman Shaan, Mehrdad Nojoumian","doi":"10.1109/ICNP52444.2021.9651979","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651979","url":null,"abstract":"Consensus protocols are a key feature in decentral-ized systems where multiple unreliable nodes operate, e.g., in Blockchain technologies with many worldwide applications such as supply chain management, cryptocurrencies and information sharing. ISRaft is a consensus protocol built upon Raft, a previously developed protocol that is used for replicated state machines when a group of nodes is required to achieve a consensus related to the state of the machine. This paper therefore proposes an alternative version of the ISRaft consensus protocol to allow communication among nodes in a secured fashion while maintaining the security features of the original ISRaft algorithm even in the presence of adversarial nodes. The proposed model utilizes a trust parameter to enforce cooperation, i.e., a trust value is assigned to each node to prevent malicious activities over time. This is a practical solution for autonomous units with resource-constrained devices where a regular encrypted communication method can negatively affect the system performance.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133589163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
STIP: A new model of trusted network 一种新的可信网络模型
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651913
Sara Bitan, Adi Molkho
We present STIP, a new model for Scalable Trusted IP networks, that are secure and resilient to cyber-attacks without impairing reliability. STIP addresses managed network use-cases including enterprise network authentication and authorization, and ISP use-cases, including trust based routing, and application aware networking. It can provide an enabling infrastructure that improves resilience to the painful BGP hijacking and distributed denial of service attacks.At the data plane, STIP consists of a trusted forwarding engine, that uses authenticated trust extensions to process traffic reliably. At the control and management plane STIP divides the network into trust domains that evaluate trustworthiness of devices in the domain, and distribute it securely using transitive trust. Our vision is Internet-wide STIP deployment . We present a migration process based on trust domains that can be used to gradually upgrade current IP networks to STIP.
我们提出了一种可扩展可信IP网络的新模型STIP,它既安全又能抵御网络攻击,又不损害可靠性。STIP用于管理网络用例,包括企业网络认证和授权,以及ISP用例,包括基于信任的路由和应用感知组网。它可以提供一个支持基础设施,提高对痛苦的BGP劫持和分布式拒绝服务攻击的弹性。在数据平面,STIP由一个可信转发引擎组成,该引擎使用经过认证的信任扩展来可靠地处理流量。在控制和管理平面,STIP将网络划分为信任域,评估域中设备的可信度,并使用可传递信任进行安全分发。我们的愿景是在互联网范围内部署STIP。我们提出了一个基于信任域的迁移过程,可用于逐步将当前IP网络升级到STIP。
{"title":"STIP: A new model of trusted network","authors":"Sara Bitan, Adi Molkho","doi":"10.1109/ICNP52444.2021.9651913","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651913","url":null,"abstract":"We present STIP, a new model for Scalable Trusted IP networks, that are secure and resilient to cyber-attacks without impairing reliability. STIP addresses managed network use-cases including enterprise network authentication and authorization, and ISP use-cases, including trust based routing, and application aware networking. It can provide an enabling infrastructure that improves resilience to the painful BGP hijacking and distributed denial of service attacks.At the data plane, STIP consists of a trusted forwarding engine, that uses authenticated trust extensions to process traffic reliably. At the control and management plane STIP divides the network into trust domains that evaluate trustworthiness of devices in the domain, and distribute it securely using transitive trust. Our vision is Internet-wide STIP deployment . We present a migration process based on trust domains that can be used to gradually upgrade current IP networks to STIP.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129069266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 IEEE 29th International Conference on Network Protocols (ICNP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1