首页 > 最新文献

2021 IEEE 29th International Conference on Network Protocols (ICNP)最新文献

英文 中文
Poster: Reverse-Path Congestion Notification: Accelerating the Congestion Control Feedback Loop 海报:反向路径拥塞通知:加速拥塞控制反馈循环
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651961
Ralf Kundel, Nehal Baganal Krishna, Christoph Gärtner, Tobias Meuser, Amr Rizk
Congestion control mechanisms in computer networks rely mainly on a feedback loop having a reaction time equal to the flow RTT. Reducing this feedback time helps the sender to react faster to changing network conditions such as congestion. In this work, we propose reverse-path congestion notification on top of programmable networking switches. Our approach can significantly lower the reaction time, such that the congestion control implementation can adapt much faster to changing network conditions. The proposed approach aims to work with current TCP implementations with no required changes to the communication endpoints. Last, we show how the presented approach could be realized by utilizing off-the-shelf programmable switches.
计算机网络中的拥塞控制机制主要依赖于一个反应时间等于流RTT的反馈回路。减少这种反馈时间有助于发送方更快地响应不断变化的网络条件,如拥塞。在这项工作中,我们提出了在可编程网络交换机上的反向路径拥塞通知。我们的方法可以显著降低反应时间,这样拥塞控制实现可以更快地适应不断变化的网络条件。提出的方法旨在与当前的TCP实现一起工作,而不需要对通信端点进行更改。最后,我们展示了如何利用现成的可编程开关来实现所提出的方法。
{"title":"Poster: Reverse-Path Congestion Notification: Accelerating the Congestion Control Feedback Loop","authors":"Ralf Kundel, Nehal Baganal Krishna, Christoph Gärtner, Tobias Meuser, Amr Rizk","doi":"10.1109/ICNP52444.2021.9651961","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651961","url":null,"abstract":"Congestion control mechanisms in computer networks rely mainly on a feedback loop having a reaction time equal to the flow RTT. Reducing this feedback time helps the sender to react faster to changing network conditions such as congestion. In this work, we propose reverse-path congestion notification on top of programmable networking switches. Our approach can significantly lower the reaction time, such that the congestion control implementation can adapt much faster to changing network conditions. The proposed approach aims to work with current TCP implementations with no required changes to the communication endpoints. Last, we show how the presented approach could be realized by utilizing off-the-shelf programmable switches.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Poster: Connected Vehicles using Short-range (Wi-Fi & IEEE 802.11p) and Long-range Cellular Networks (LTE & 5G) 海报:使用短距离(Wi-Fi和IEEE 802.11p)和远程蜂窝网络(LTE和5G)的联网汽车
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651959
Muhammad Naeem Tahir, M. Katz, Zunera Javed
In recent years, the vehicular ad hoc networking (VANET) concept has supported the development of emerging safety related applications for vehicles based on cooperative awareness between vehicles. This cooperative awareness can be achieved by exploiting wireless sensors and technologies to transmit periodic messages to neighboring vehicles. These messages normally contain information regarding vehicles, such as position, speed, distance between vehicles, etc. For the transfer of safety messages, Wi-Fi and the suit of IEEE 802.11p/WAVE protocols were commonly used initially but now cellular-based LTE and 5G are the emerging technologies for VANETs. In this paper, a comparison is performed considering the European ITS-G5 standard, Wi-Fi, LTE and 5G by exchanging safety messages in VANETs. We have exchanged real-time road weather and traffic observation data to evaluate the performance of the aforementioned wireless technologies in terms of successful message delivery probability. Our results reveal that due to weak communication links and the lack of line of sight (LOS) communication for Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) scenarios, Wi-Fi and 802.11p are outperformed by LTE and 5G networks.
近年来,车辆自组织网络(VANET)概念支持了基于车辆间协作感知的新兴车辆安全相关应用的发展。这种协同感知可以通过利用无线传感器和技术向相邻车辆发送周期性信息来实现。这些信息通常包含有关车辆的信息,如位置、速度、车辆之间的距离等。对于安全信息的传输,最初通常使用Wi-Fi和IEEE 802.11p/WAVE协议,但现在基于蜂窝的LTE和5G是vanet的新兴技术。本文通过在VANETs中交换安全信息,对欧洲ITS-G5标准、Wi-Fi、LTE和5G进行了比较。我们交换了实时道路天气和交通观测数据,以评估上述无线技术在成功传递信息概率方面的表现。我们的研究结果显示,由于通信链路薄弱和缺乏车辆对基础设施(V2I)和车辆对车辆(V2V)场景的视线(LOS)通信,Wi-Fi和802.11p的性能优于LTE和5G网络。
{"title":"Poster: Connected Vehicles using Short-range (Wi-Fi & IEEE 802.11p) and Long-range Cellular Networks (LTE & 5G)","authors":"Muhammad Naeem Tahir, M. Katz, Zunera Javed","doi":"10.1109/ICNP52444.2021.9651959","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651959","url":null,"abstract":"In recent years, the vehicular ad hoc networking (VANET) concept has supported the development of emerging safety related applications for vehicles based on cooperative awareness between vehicles. This cooperative awareness can be achieved by exploiting wireless sensors and technologies to transmit periodic messages to neighboring vehicles. These messages normally contain information regarding vehicles, such as position, speed, distance between vehicles, etc. For the transfer of safety messages, Wi-Fi and the suit of IEEE 802.11p/WAVE protocols were commonly used initially but now cellular-based LTE and 5G are the emerging technologies for VANETs. In this paper, a comparison is performed considering the European ITS-G5 standard, Wi-Fi, LTE and 5G by exchanging safety messages in VANETs. We have exchanged real-time road weather and traffic observation data to evaluate the performance of the aforementioned wireless technologies in terms of successful message delivery probability. Our results reveal that due to weak communication links and the lack of line of sight (LOS) communication for Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) scenarios, Wi-Fi and 802.11p are outperformed by LTE and 5G networks.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121064034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Network Attacks using Federated Learning for IoT Devices 使用物联网设备的联邦学习检测网络攻击
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651915
Osama Shahid, Viraaji Mothukuri, Seyedamin Pouriyeh, R. Parizi, H. Shahriar
Billions of IoT devices are connected to networks all around us, enabling cyber-physical systems. These devices can carry and generate user-sensitive data, examples of such devices are smartwatches, medical equipment, and smart home gadgets. Individual IoT devices have some form of intrusion detection system integrated, but once they are all connected, a network threat to one device could mean a threat to many. IoT devices must have a robust intrusion detection system that would keep devices secure over a network. To aid with this, we provide a machine learning solution that adheres to Global Data Protection Regulation by keeping the user data secure locally on the IoT device itself. We propose a Federated Learning (FL) approach that capitalizes on a decentralized and collaborative way of training machine learning models. In this study, we practice federated learning technique to train and create a robust intrusion detection model for the security of IoT devices. We evaluate our proposed approach using three different use-cases to show the security enhancements that improve using the FL technique, resulting in a more reliable performance in this domain.
数十亿物联网设备连接到我们周围的网络,使网络物理系统成为可能。这些设备可以携带和生成用户敏感数据,例如智能手表、医疗设备和智能家居设备。单个物联网设备集成了某种形式的入侵检测系统,但一旦它们全部连接起来,对一个设备的网络威胁可能意味着对许多设备的威胁。物联网设备必须具有强大的入侵检测系统,以确保设备在网络上的安全。为了帮助解决这一问题,我们提供了一种机器学习解决方案,该解决方案通过在物联网设备本身上保持本地用户数据的安全来遵守全球数据保护条例。我们提出了一种联邦学习(FL)方法,该方法利用分散和协作的方式来训练机器学习模型。在这项研究中,我们实践联邦学习技术来训练和创建一个健壮的入侵检测模型,用于物联网设备的安全。我们使用三个不同的用例来评估我们提出的方法,以展示使用FL技术改进的安全性增强,从而在该领域获得更可靠的性能。
{"title":"Detecting Network Attacks using Federated Learning for IoT Devices","authors":"Osama Shahid, Viraaji Mothukuri, Seyedamin Pouriyeh, R. Parizi, H. Shahriar","doi":"10.1109/ICNP52444.2021.9651915","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651915","url":null,"abstract":"Billions of IoT devices are connected to networks all around us, enabling cyber-physical systems. These devices can carry and generate user-sensitive data, examples of such devices are smartwatches, medical equipment, and smart home gadgets. Individual IoT devices have some form of intrusion detection system integrated, but once they are all connected, a network threat to one device could mean a threat to many. IoT devices must have a robust intrusion detection system that would keep devices secure over a network. To aid with this, we provide a machine learning solution that adheres to Global Data Protection Regulation by keeping the user data secure locally on the IoT device itself. We propose a Federated Learning (FL) approach that capitalizes on a decentralized and collaborative way of training machine learning models. In this study, we practice federated learning technique to train and create a robust intrusion detection model for the security of IoT devices. We evaluate our proposed approach using three different use-cases to show the security enhancements that improve using the FL technique, resulting in a more reliable performance in this domain.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122179563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
pMACH: Power and Migration Aware Container scHeduling pMACH:电源和迁移感知容器调度
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651911
Sourav Panda, K. Ramakrishnan, L. Bhuyan
Data center workload fluctuations need periodic, but careful scheduling to minimize power consumption while meeting the task completion time requirements. Existing data center scheduling systems tightly pack containers to save power. However, with the growth of multi-tiered applications, there is a significant need to account for the affinity between application components, to minimize communication overheads and latency. Centralized container scheduling systems using graph partitioning algorithms cause a significant number of task migrations, with associated downtime.We design pMACH, a novel distributed container scheduling scheme for optimizing both power and task completion time in data centers. It minimizes task migrations and packs frequently communicating containers together without overloading servers. pMACH operates at peak energy efficiency, thus reducing energy consumption while also providing greater headroom for unpredictable workload spikes. We also propose in-network monitoring using smartNICs (sNIC) to measure the communications and then perform scheduling in a hierarchical, parallelized framework to achieve high performance and scalability. pMACH is based on incremental partitioning and it leverages the previous scheduling decision to significantly reduce the number of containers moved between servers, avoiding application downtime.Both testbed measurements and large-scale trace-driven simulations show that pMACH saves at least 13.44% more power compared to previous scheduling systems. It speeds task completion, reducing the 95th percentile by a factor of 1.76-2.11 compared to existing container scheduling schemes. Compared to other static graph-based approaches, our incremental partitioning technique reduces migrations per epoch by 82%.
数据中心工作负载的波动需要周期性地、谨慎地进行调度,以便在满足任务完成时间要求的同时,最大限度地减少功耗。现有的数据中心调度系统紧密打包容器以节省电力。然而,随着多层应用程序的增长,非常需要考虑应用程序组件之间的关联,以最小化通信开销和延迟。使用图分区算法的集中式容器调度系统会导致大量的任务迁移,并伴有相关的停机时间。我们设计了一种新的分布式容器调度方案pMACH,用于优化数据中心的功耗和任务完成时间。它最大限度地减少了任务迁移,并将频繁通信的容器打包在一起,而不会使服务器过载。pMACH以最高的能源效率运行,从而降低了能源消耗,同时还为不可预测的工作负载峰值提供了更大的空间。我们还建议使用智能网卡(sNIC)进行网络监控,以测量通信,然后在分层并行框架中执行调度,以实现高性能和可扩展性。pMACH基于增量分区,它利用以前的调度决策来显著减少在服务器之间移动的容器数量,从而避免应用程序停机。试验台测量和大规模跟踪驱动仿真都表明,与以前的调度系统相比,pMACH至少节省13.44%的功率。它加快了任务的完成,与现有的集装箱调度方案相比,将第95个百分位数减少了1.76-2.11。与其他基于静态图的方法相比,我们的增量分区技术将每个epoch的迁移减少了82%。
{"title":"pMACH: Power and Migration Aware Container scHeduling","authors":"Sourav Panda, K. Ramakrishnan, L. Bhuyan","doi":"10.1109/ICNP52444.2021.9651911","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651911","url":null,"abstract":"Data center workload fluctuations need periodic, but careful scheduling to minimize power consumption while meeting the task completion time requirements. Existing data center scheduling systems tightly pack containers to save power. However, with the growth of multi-tiered applications, there is a significant need to account for the affinity between application components, to minimize communication overheads and latency. Centralized container scheduling systems using graph partitioning algorithms cause a significant number of task migrations, with associated downtime.We design pMACH, a novel distributed container scheduling scheme for optimizing both power and task completion time in data centers. It minimizes task migrations and packs frequently communicating containers together without overloading servers. pMACH operates at peak energy efficiency, thus reducing energy consumption while also providing greater headroom for unpredictable workload spikes. We also propose in-network monitoring using smartNICs (sNIC) to measure the communications and then perform scheduling in a hierarchical, parallelized framework to achieve high performance and scalability. pMACH is based on incremental partitioning and it leverages the previous scheduling decision to significantly reduce the number of containers moved between servers, avoiding application downtime.Both testbed measurements and large-scale trace-driven simulations show that pMACH saves at least 13.44% more power compared to previous scheduling systems. It speeds task completion, reducing the 95th percentile by a factor of 1.76-2.11 compared to existing container scheduling schemes. Compared to other static graph-based approaches, our incremental partitioning technique reduces migrations per epoch by 82%.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
[Copyright notice] (版权)
Pub Date : 2021-11-01 DOI: 10.1109/icnp52444.2021.9651947
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icnp52444.2021.9651947","DOIUrl":"https://doi.org/10.1109/icnp52444.2021.9651947","url":null,"abstract":"","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124358063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learned FIB: Fast IP Forwarding without Longest Prefix Matching Learned FIB:不进行最长前缀匹配的快速IP转发
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651956
Shunsuke Higuchi, Y. Koizumi, Junji Takemasa, A. Tagami, T. Hasegawa
This paper proposes an IP forwarding information base (FIB) encoding leveraging an emerging data structure called a learned index , which uses machine learning to associate key-position pairs in a key-value store. A learned index for FIB lookups is expected to yield a more compact representation and faster lookups compared to existing FIBs based on tries or hash tables, at the cost of efficient FIB updates, which is difficult to support with a learned index. We optimize our implementation for lookup speed, exploiting that for efficient FIB lookups it is enough to approximate the key-position pairs with a piece-wise linear function, instead of having to learn the key-position pairs. The experiments using real BGP routing information snapshots suggest that the size of the proposed FIB is compact and lookup speed is sufficiently fast regardless of the length of matched prefixes.
本文提出了一种IP转发信息库(FIB)编码,利用一种新兴的数据结构称为学习索引,它使用机器学习来关联键值存储中的键位置对。与基于尝试或哈希表的现有FIB相比,用于FIB查找的学习索引预计会产生更紧凑的表示和更快的查找,但代价是FIB更新效率低,而学习索引很难支持这一点。我们优化了查找速度的实现,利用有效的FIB查找,用分段线性函数近似键位置对就足够了,而不必学习键位置对。使用真实BGP路由信息快照的实验表明,无论匹配前缀的长度如何,所提出的FIB都具有紧凑的大小和足够快的查找速度。
{"title":"Learned FIB: Fast IP Forwarding without Longest Prefix Matching","authors":"Shunsuke Higuchi, Y. Koizumi, Junji Takemasa, A. Tagami, T. Hasegawa","doi":"10.1109/ICNP52444.2021.9651956","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651956","url":null,"abstract":"This paper proposes an IP forwarding information base (FIB) encoding leveraging an emerging data structure called a learned index , which uses machine learning to associate key-position pairs in a key-value store. A learned index for FIB lookups is expected to yield a more compact representation and faster lookups compared to existing FIBs based on tries or hash tables, at the cost of efficient FIB updates, which is difficult to support with a learned index. We optimize our implementation for lookup speed, exploiting that for efficient FIB lookups it is enough to approximate the key-position pairs with a piece-wise linear function, instead of having to learn the key-position pairs. The experiments using real BGP routing information snapshots suggest that the size of the proposed FIB is compact and lookup speed is sufficiently fast regardless of the length of matched prefixes.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing Block Propagation Delay in Blockchain Networks via Guarantee Verification 通过保证验证减少区块链网络中的块传播延迟
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651926
Jiali Chen, Yang Qin
With the development of blockchain technology, people always expect that blockchain can be applied to other fields. However, the low Transaction Processing Speed (TPS) and broadcast delay of blockchain still restrict the application of blockchain. To solve these problems, we propose a new scheme named GVScheme to improve the scalability of blockchain network. GVScheme introduces the role of guarantor based on trust value mechanism. The guarantor node will guarantee the block spread in the network. When the node receives the guarantee block from the guarantor node, the order of verification block and propagation block will be determined according to the trust value of the guarantor. By reducing the block verification time, the block propagation delay in the network will also be reduced. It is worth mentioning that our scheme keeps the minimum modification to the blockchain, and may even be directly applied to the blockchain network. Simulation results show that GVScheme can effectively reduce block propagation delay and the fork rate in blockchain network. When the block size and the number of nodes increase, GVScheme also shows great performance. Thus, under the same fork rate, the blockchain using GVScheme can allow less mining interval and larger block size limit.
随着区块链技术的发展,人们一直期待区块链可以应用到其他领域。然而,区块链的低交易处理速度(Transaction Processing Speed, TPS)和广播延迟仍然制约着区块链的应用。为了解决这些问题,我们提出了一种名为GVScheme的新方案来提高区块链网络的可扩展性。GVScheme引入了基于信任价值机制的担保人角色。担保节点将保证区块在网络中的传播。当节点收到担保人节点的担保块时,根据担保人的信任值确定验证块和传播块的顺序。通过减少区块验证时间,区块在网络中的传播延迟也会减少。值得一提的是,我们的方案对区块链进行了最小的修改,甚至可以直接应用到区块链网络中。仿真结果表明,GVScheme可以有效地降低区块链网络中的块传播延迟和分叉率。当块大小和节点数量增加时,GVScheme也表现出良好的性能。因此,在相同分叉率下,使用GVScheme的区块链可以允许更短的挖掘间隔和更大的块大小限制。
{"title":"Reducing Block Propagation Delay in Blockchain Networks via Guarantee Verification","authors":"Jiali Chen, Yang Qin","doi":"10.1109/ICNP52444.2021.9651926","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651926","url":null,"abstract":"With the development of blockchain technology, people always expect that blockchain can be applied to other fields. However, the low Transaction Processing Speed (TPS) and broadcast delay of blockchain still restrict the application of blockchain. To solve these problems, we propose a new scheme named GVScheme to improve the scalability of blockchain network. GVScheme introduces the role of guarantor based on trust value mechanism. The guarantor node will guarantee the block spread in the network. When the node receives the guarantee block from the guarantor node, the order of verification block and propagation block will be determined according to the trust value of the guarantor. By reducing the block verification time, the block propagation delay in the network will also be reduced. It is worth mentioning that our scheme keeps the minimum modification to the blockchain, and may even be directly applied to the blockchain network. Simulation results show that GVScheme can effectively reduce block propagation delay and the fork rate in blockchain network. When the block size and the number of nodes increase, GVScheme also shows great performance. Thus, under the same fork rate, the blockchain using GVScheme can allow less mining interval and larger block size limit.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130324555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Fast-adaptive Edge Resource Allocation Strategy for Dynamic Vehicular Networks 动态车辆网络的快速自适应边缘资源分配策略
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651981
Ying He, Yuhang Wang, Qiuzhen Lin, Jianqiang Li, V. Leung
With the rapid development of vehicular networks, there is an increasing demand for extensive networking, computing and caching resources. In fact, vehicular networks are nonstationary, and how to allocate multiple resources effectively and efficiently for dynamic vehicular networks is extremely important, however, really challenging. In this paper, we propose a general framework that can enable fast-adaptive edge resource allocation for dynamic vehicular environment. Specifically, we model the dynamics of the vehicular environment as a series of related Markov Decision Processes (MDPs). We combine hierarchical reinforcement learning with meta learning, which makes our proposed framework available to quickly adapt to a new environment by only fine-tuning the top-level master network, and meanwhile the low-level sub-networks can make the right resource allocation policy. The extensive simulation results show the effectiveness of our proposed framework, which can quickly adapt to different scenarios. This is consistent with the real-world situations and can significantly improve the performance of resource allocation in dynamic vehicular networks.
随着车载网络的快速发展,对广泛的联网、计算和缓存资源的需求越来越大。实际上,车辆网络是非平稳的,如何在动态车辆网络中有效地分配多种资源是非常重要的,但也是非常具有挑战性的。在本文中,我们提出了一个通用框架,可以实现快速自适应边缘资源分配的动态车辆环境。具体来说,我们将车辆环境的动力学建模为一系列相关的马尔可夫决策过程(mdp)。我们将分层强化学习与元学习相结合,使得我们提出的框架可以通过对顶层主网络进行微调来快速适应新的环境,同时底层子网络可以制定正确的资源分配策略。大量的仿真结果表明,该框架能够快速适应不同的场景。这与实际情况一致,可以显著提高动态车辆网络的资源分配性能。
{"title":"A Fast-adaptive Edge Resource Allocation Strategy for Dynamic Vehicular Networks","authors":"Ying He, Yuhang Wang, Qiuzhen Lin, Jianqiang Li, V. Leung","doi":"10.1109/ICNP52444.2021.9651981","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651981","url":null,"abstract":"With the rapid development of vehicular networks, there is an increasing demand for extensive networking, computing and caching resources. In fact, vehicular networks are nonstationary, and how to allocate multiple resources effectively and efficiently for dynamic vehicular networks is extremely important, however, really challenging. In this paper, we propose a general framework that can enable fast-adaptive edge resource allocation for dynamic vehicular environment. Specifically, we model the dynamics of the vehicular environment as a series of related Markov Decision Processes (MDPs). We combine hierarchical reinforcement learning with meta learning, which makes our proposed framework available to quickly adapt to a new environment by only fine-tuning the top-level master network, and meanwhile the low-level sub-networks can make the right resource allocation policy. The extensive simulation results show the effectiveness of our proposed framework, which can quickly adapt to different scenarios. This is consistent with the real-world situations and can significantly improve the performance of resource allocation in dynamic vehicular networks.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131129445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generative Ensemble Learning for Mitigating Adversarial Malware Detection in IoT 物联网中对抗恶意软件检测的生成集成学习
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651917
Usman Ahmed, Chun-Wei Lin, Gautam Srivastava
This paper proposes a framework that can be employed to mitigate adversarial evasion attacks on Android malware classifiers. It extracts multiple discriminating feature subsets from a single Android app such that each subset has the potential to classify a huge dataset of malicious and benign Android apps independently. Moreover, it incorporates an ensemble of ML classifiers where each classifier is trained on different features subset. Finally, the ensemble model formulates a collaborative classification decision that is resilient against adversarial evasion attacks. Results showed that the designed model achieves good performance compared to the existing models.
本文提出了一个框架,可以用来减轻对Android恶意软件分类器的对抗性规避攻击。它从单个Android应用程序中提取多个区分特征子集,这样每个子集都有可能独立地对恶意和良性Android应用程序的庞大数据集进行分类。此外,它结合了一个ML分类器的集合,其中每个分类器在不同的特征子集上进行训练。最后,集成模型制定了一个协作分类决策,该决策对对抗性规避攻击具有弹性。结果表明,与现有模型相比,所设计的模型具有较好的性能。
{"title":"Generative Ensemble Learning for Mitigating Adversarial Malware Detection in IoT","authors":"Usman Ahmed, Chun-Wei Lin, Gautam Srivastava","doi":"10.1109/ICNP52444.2021.9651917","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651917","url":null,"abstract":"This paper proposes a framework that can be employed to mitigate adversarial evasion attacks on Android malware classifiers. It extracts multiple discriminating feature subsets from a single Android app such that each subset has the potential to classify a huge dataset of malicious and benign Android apps independently. Moreover, it incorporates an ensemble of ML classifiers where each classifier is trained on different features subset. Finally, the ensemble model formulates a collaborative classification decision that is resilient against adversarial evasion attacks. Results showed that the designed model achieves good performance compared to the existing models.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132079056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Long-distance Deterministic Transmission among TSN Networks: Converging CQF and DIP TSN网络间的远距离确定性传输:CQF和DIP的融合
Pub Date : 2021-11-01 DOI: 10.1109/ICNP52444.2021.9651955
Wei-Peng Tan, Binwei Wu
With the development of 5G, innovative applications requiring bounded transmission delays and zero packet loss emerge, e.g., AR, industrial automation, and smart grid. In this circumstance, time-sensitive networking (TSN) is proposed, which addresses the deterministic transmission in the local area networks. Nevertheless, TSN is essentially a Layer 2 technique, which cannot provide deterministic transmission on a large geographic area. To solve this problem, this paper proposes a hierarchical network for the end-to-end deterministic transmission. In the proposed network, we leverage CQF (i.e., one of the most efficient TSN mechanisms) in the access networks which aggregates the traffic from end-devices. Meanwhile, in the core network, we exploit the DIP (i.e., a well-known deterministic networking mechanism for backbone networks) for long-distance deterministic transmission. We design the cycle alignment mechanism to enable seamless and deterministic transmission among hierarchical networks. A joint schedule is also formulated, which introduces the traffic shaping at the network edge to maximize the network throughput. Experimental simulations show that the proposed network can achieve end-to-end deterministic transmission, even in the highly-load scenarios.
随着5G的发展,需要有限传输延迟和零丢包的创新应用出现,如增强现实、工业自动化、智能电网等。在这种情况下,提出了时间敏感网络(TSN),以解决局域网中的确定性传输问题。然而,TSN本质上是一种第二层技术,无法在大的地理区域内提供确定性传输。为了解决这一问题,本文提出了一种端到端确定性传输的分层网络。在提议的网络中,我们在接入网络中利用CQF(即最有效的TSN机制之一)来聚合来自终端设备的流量。同时,在核心网中,我们利用DIP(即骨干网中众所周知的确定性组网机制)实现远距离确定性传输。我们设计了循环对齐机制,以实现分层网络之间的无缝和确定性传输。并制定了联合调度,在网络边缘引入流量整形,使网络吞吐量最大化。实验仿真表明,即使在高负载情况下,该网络也能实现端到端确定性传输。
{"title":"Long-distance Deterministic Transmission among TSN Networks: Converging CQF and DIP","authors":"Wei-Peng Tan, Binwei Wu","doi":"10.1109/ICNP52444.2021.9651955","DOIUrl":"https://doi.org/10.1109/ICNP52444.2021.9651955","url":null,"abstract":"With the development of 5G, innovative applications requiring bounded transmission delays and zero packet loss emerge, e.g., AR, industrial automation, and smart grid. In this circumstance, time-sensitive networking (TSN) is proposed, which addresses the deterministic transmission in the local area networks. Nevertheless, TSN is essentially a Layer 2 technique, which cannot provide deterministic transmission on a large geographic area. To solve this problem, this paper proposes a hierarchical network for the end-to-end deterministic transmission. In the proposed network, we leverage CQF (i.e., one of the most efficient TSN mechanisms) in the access networks which aggregates the traffic from end-devices. Meanwhile, in the core network, we exploit the DIP (i.e., a well-known deterministic networking mechanism for backbone networks) for long-distance deterministic transmission. We design the cycle alignment mechanism to enable seamless and deterministic transmission among hierarchical networks. A joint schedule is also formulated, which introduces the traffic shaping at the network edge to maximize the network throughput. Experimental simulations show that the proposed network can achieve end-to-end deterministic transmission, even in the highly-load scenarios.","PeriodicalId":343813,"journal":{"name":"2021 IEEE 29th International Conference on Network Protocols (ICNP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132867879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2021 IEEE 29th International Conference on Network Protocols (ICNP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1