首页 > 最新文献

Proceedings of the 4th International Conference on Future Networks and Distributed Systems最新文献

英文 中文
Improve the Firewall Accuracy By using Dynamic Ontology 利用动态本体提高防火墙的准确性
Qossay Ismail, Osama Saleh, Mohammed Hashayka, Ahmed Awad, Amjad Hawash, O. Othman
Data is considered an important asset for organizations, companies, and even people. Crucial decisions depend mainly on data. Exchanging data is essential in order to negotiate ideas, thoughts, and decisions. Networks are the communication channels of data exchange although data is exposed to different attacks, threats, and loss. Because of this, data security has become a key concern for different parties through their daily data manipulation. There are different ways to ensure data security. Paying attention to network threats, data encryption, and using strong passwords are all examples. However, a firewall represents the first defense line against malicious traffic throughout the network. Firewalls have a set of rules to be applied in the time of data exchange between inside and outside of data networks. Some of the firewalls apply such rules in a sequential manner, which degrades the performance of the firewall. In this work, we are utilizing a dynamic ontology of different firewall rules managed by SPARQL queries, so that the rules are applied faster, and thus, increasing the firewall performance. Experimental results show that our proposed methodology totally eliminates the anomalies in the firewall rules as a result of conducting longest matching with proper rules from the dynamically constructed ontology.
数据被认为是组织、公司甚至个人的重要资产。关键的决定主要取决于数据。交换数据对于协商观点、想法和决策至关重要。网络是数据交换的通信通道,尽管数据暴露于不同的攻击、威胁和丢失。正因为如此,数据安全已成为各方通过日常数据操作的关键问题。有不同的方法来确保数据安全。注意网络威胁、数据加密、使用强密码等都是很好的例子。然而,防火墙代表了抵御整个网络中恶意流量的第一道防线。防火墙有一套规则,在数据网络内部和外部进行数据交换时应用。有些防火墙以顺序的方式应用这些规则,这会降低防火墙的性能。在这项工作中,我们利用由SPARQL查询管理的不同防火墙规则的动态本体,以便更快地应用规则,从而提高防火墙性能。实验结果表明,该方法通过与动态构建的本体中合适的规则进行最长匹配,完全消除了防火墙规则中的异常现象。
{"title":"Improve the Firewall Accuracy By using Dynamic Ontology","authors":"Qossay Ismail, Osama Saleh, Mohammed Hashayka, Ahmed Awad, Amjad Hawash, O. Othman","doi":"10.1145/3440749.3442607","DOIUrl":"https://doi.org/10.1145/3440749.3442607","url":null,"abstract":"Data is considered an important asset for organizations, companies, and even people. Crucial decisions depend mainly on data. Exchanging data is essential in order to negotiate ideas, thoughts, and decisions. Networks are the communication channels of data exchange although data is exposed to different attacks, threats, and loss. Because of this, data security has become a key concern for different parties through their daily data manipulation. There are different ways to ensure data security. Paying attention to network threats, data encryption, and using strong passwords are all examples. However, a firewall represents the first defense line against malicious traffic throughout the network. Firewalls have a set of rules to be applied in the time of data exchange between inside and outside of data networks. Some of the firewalls apply such rules in a sequential manner, which degrades the performance of the firewall. In this work, we are utilizing a dynamic ontology of different firewall rules managed by SPARQL queries, so that the rules are applied faster, and thus, increasing the firewall performance. Experimental results show that our proposed methodology totally eliminates the anomalies in the firewall rules as a result of conducting longest matching with proper rules from the dynamically constructed ontology.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using mathematical forecasting methods to estimate the load on the computing power of the IoT network 采用数学预测方法对物联网网络的计算能力负荷进行估计
A. Krasov, I. Pestov, A. Gelfand, A. Kazantsev, Anna Polyanicheva
The size of the network, the number of nodes and connected devices are exponentially increasing due to the development of the Internet of Things (IoT). It becomes difficult to administer the monitoring of heterogeneous networks. It is necessary to use predictive models (Model Predictive Control) to deploy decision support systems related to the IoT network security. The article examines three popular mathematical forecasting methods, evaluates their accuracy and their using possibility in predictive models to solve the problem of assessing the load on the computing power of IoT devices, including servers and services.
由于物联网(IoT)的发展,网络的规模、节点和连接设备的数量呈指数级增长。管理异构网络的监控变得很困难。利用预测模型(Model predictive Control)部署与物联网网络安全相关的决策支持系统是必要的。本文考察了三种流行的数学预测方法,评估了它们的准确性和在预测模型中使用的可能性,以解决评估物联网设备(包括服务器和服务)计算能力负载的问题。
{"title":"Using mathematical forecasting methods to estimate the load on the computing power of the IoT network","authors":"A. Krasov, I. Pestov, A. Gelfand, A. Kazantsev, Anna Polyanicheva","doi":"10.1145/3440749.3442605","DOIUrl":"https://doi.org/10.1145/3440749.3442605","url":null,"abstract":"The size of the network, the number of nodes and connected devices are exponentially increasing due to the development of the Internet of Things (IoT). It becomes difficult to administer the monitoring of heterogeneous networks. It is necessary to use predictive models (Model Predictive Control) to deploy decision support systems related to the IoT network security. The article examines three popular mathematical forecasting methods, evaluates their accuracy and their using possibility in predictive models to solve the problem of assessing the load on the computing power of IoT devices, including servers and services.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time DDoS flood Attack Monitoring and Detection (RT-AMD) Model for Cloud Computing 云计算实时DDoS flood攻击监控与检测(RT-AMD)模型
Alaa Alsaeedi, O. Bamasag, A. Munshi
In recent years, the advent of cloud computing has transformed the field of computing and information technology. It enabled customers to rent virtual instances and take advantage of various services on-demand with the lowest costs. Despite the advantages offered by cloud computing, it faces several threats; an example is DDoS attack which is considered one of the most serious ones. This paper proposes a real-time monitoring and detection of DDoS attacks on the cloud using machine learning approach. Naïve Bayes, K-Nearest Neighbor, and Random Forest machine learning classifiers have been selected to build predictive models. This model will be evaluated on the cloud for its accuracy and efficiency.
近年来,云计算的出现改变了计算和信息技术领域。它使客户能够以最低的成本租用虚拟实例并按需利用各种服务。尽管云计算提供了诸多优势,但它也面临着一些威胁;一个例子是DDoS攻击,它被认为是最严重的攻击之一。本文提出了一种利用机器学习方法对云上的DDoS攻击进行实时监控和检测的方法。Naïve选择贝叶斯、k近邻和随机森林机器学习分类器来构建预测模型。该模型将在云中评估其准确性和效率。
{"title":"Real-Time DDoS flood Attack Monitoring and Detection (RT-AMD) Model for Cloud Computing","authors":"Alaa Alsaeedi, O. Bamasag, A. Munshi","doi":"10.1145/3440749.3442606","DOIUrl":"https://doi.org/10.1145/3440749.3442606","url":null,"abstract":"In recent years, the advent of cloud computing has transformed the field of computing and information technology. It enabled customers to rent virtual instances and take advantage of various services on-demand with the lowest costs. Despite the advantages offered by cloud computing, it faces several threats; an example is DDoS attack which is considered one of the most serious ones. This paper proposes a real-time monitoring and detection of DDoS attacks on the cloud using machine learning approach. Naïve Bayes, K-Nearest Neighbor, and Random Forest machine learning classifiers have been selected to build predictive models. This model will be evaluated on the cloud for its accuracy and efficiency.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121744331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On The Radon–Nikodym Machine Learning Parallelization Radon-Nikodym机器学习并行化研究
A. Bobyl, Vadim V. Davydov, V. Malyshkin
A novel Radon–Nikodym approach to machine learning (ML) is developed, implemented numerically, tested on various datasets, and it’s parallelization is discussed. It consists in building a “wavefunction” ψ(x), a linear function on input attributes x then constructing a classificator of the form ⟨ψ2f⟩/⟨ψ2⟩. The solution is obtained from a generalized eigenproblem |f|ψ[i]⟩ = λ[i]|ψ[i]⟩ with left– and right– hand side matrices calculated from the input dataset. A solution to classification problem (predict f on an unseen x) is found without using a norm testing how predicted f differs from the one observed. Possible outcomes and their probabilities are obtained separately using the Lebesgue quadrature technique, this makes the method robust to input data with outliers, spikes, etc. A remarkable feature is the knowledge of the invariant group (what input attributes transforms do not change the solution). Radon–Nikodym approach is typically slower than the other methods used, this is the cost of being a “norm–free”. A parallel implementation is expected to improve this deficiency.
提出了一种新的Radon-Nikodym机器学习方法,并在不同的数据集上进行了数值实现和测试,讨论了该方法的并行化问题。它包括建立一个“波函数”ψ(x),一个输入属性x上的线性函数,然后构造一个形式为⟨ψ2f⟩/⟨ψ2⟩的分类器。解是由一个广义的特征问题|f|ψ[i]⟩= λ[i]|ψ[i]⟩得到的,它具有从输入数据集计算的左边和右边矩阵。在不使用范数测试预测f与观察到的f的差异的情况下,找到了分类问题(在未知x上预测f)的解决方案。使用勒贝格正交技术分别获得可能的结果及其概率,这使得该方法对具有异常值,峰值等的输入数据具有鲁棒性。一个显著的特性是不变量组的知识(输入属性的转换不会改变解决方案)。Radon-Nikodym方法通常比其他使用的方法慢,这是“无规范”的代价。并行实现有望改善这一缺陷。
{"title":"On The Radon–Nikodym Machine Learning Parallelization","authors":"A. Bobyl, Vadim V. Davydov, V. Malyshkin","doi":"10.1145/3440749.3442604","DOIUrl":"https://doi.org/10.1145/3440749.3442604","url":null,"abstract":"A novel Radon–Nikodym approach to machine learning (ML) is developed, implemented numerically, tested on various datasets, and it’s parallelization is discussed. It consists in building a “wavefunction” ψ(x), a linear function on input attributes x then constructing a classificator of the form ⟨ψ2f⟩/⟨ψ2⟩. The solution is obtained from a generalized eigenproblem |f|ψ[i]⟩ = λ[i]|ψ[i]⟩ with left– and right– hand side matrices calculated from the input dataset. A solution to classification problem (predict f on an unseen x) is found without using a norm testing how predicted f differs from the one observed. Possible outcomes and their probabilities are obtained separately using the Lebesgue quadrature technique, this makes the method robust to input data with outliers, spikes, etc. A remarkable feature is the knowledge of the invariant group (what input attributes transforms do not change the solution). Radon–Nikodym approach is typically slower than the other methods used, this is the cost of being a “norm–free”. A parallel implementation is expected to improve this deficiency.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132868082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge Computing Resource Allocation Orchestration System for Autonomous Vehicles 自动驾驶汽车边缘计算资源分配编排系统
A. Khakimov, Aleksandr Loborchuk, Ibodulaev Ibodullokhodzha, Dmitry Poluektov, I. Elgendy, A. Muthanna
Edge computing is the key to building 5G Networks and Future 2030 Networks. Edge computing extends the cloud computing paradigm by placing resources close to the network edges to cope with the upcoming growth of connected devices. Future applications: health monitoring and predictive services within the framework of the Smart City, Internet of things (IoT), vehicular ad hoc network, autonomous vehicles present a new set of strict requirements, such as low latency. In this paper, we develop a set of methods for managing and orchestrating new intelligent services in a new network and computing infrastructure. In addition, we consider a new prototype using an orchestration system for managing the autonomous vehicles’ resources in comparison with the existing approaches to the design of high-load networks. This orchestration platform is based on independent Docker containers that running the orchestration system. The main goal of our proposed system is to build an efficient network architecture with a minimum delay to process the information based on neural networks. Finally, simulation results proved that the proposed system can significantly not only reduce the overall network load but also increase the quality of the transmitted stream across the network in comparison with traditional network architectures.
边缘计算是构建5G网络和未来2030网络的关键。边缘计算扩展了云计算范例,将资源放置在靠近网络边缘的地方,以应对即将到来的连接设备的增长。未来应用:智能城市框架内的健康监测和预测服务、物联网(IoT)、车辆自组织网络、自动驾驶汽车提出了一系列新的严格要求,如低延迟。在本文中,我们开发了一套在新的网络和计算基础设施中管理和编排新的智能服务的方法。此外,与现有的高负载网络设计方法相比,我们考虑了一个使用编排系统来管理自动驾驶汽车资源的新原型。这个业务流程平台基于运行业务流程系统的独立Docker容器。我们提出的系统的主要目标是建立一个有效的网络架构,以最小的延迟来处理基于神经网络的信息。最后,仿真结果表明,与传统网络结构相比,该系统不仅可以显著降低网络总体负载,还可以提高网络传输流的质量。
{"title":"Edge Computing Resource Allocation Orchestration System for Autonomous Vehicles","authors":"A. Khakimov, Aleksandr Loborchuk, Ibodulaev Ibodullokhodzha, Dmitry Poluektov, I. Elgendy, A. Muthanna","doi":"10.1145/3440749.3442594","DOIUrl":"https://doi.org/10.1145/3440749.3442594","url":null,"abstract":"Edge computing is the key to building 5G Networks and Future 2030 Networks. Edge computing extends the cloud computing paradigm by placing resources close to the network edges to cope with the upcoming growth of connected devices. Future applications: health monitoring and predictive services within the framework of the Smart City, Internet of things (IoT), vehicular ad hoc network, autonomous vehicles present a new set of strict requirements, such as low latency. In this paper, we develop a set of methods for managing and orchestrating new intelligent services in a new network and computing infrastructure. In addition, we consider a new prototype using an orchestration system for managing the autonomous vehicles’ resources in comparison with the existing approaches to the design of high-load networks. This orchestration platform is based on independent Docker containers that running the orchestration system. The main goal of our proposed system is to build an efficient network architecture with a minimum delay to process the information based on neural networks. Finally, simulation results proved that the proposed system can significantly not only reduce the overall network load but also increase the quality of the transmitted stream across the network in comparison with traditional network architectures.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of multifunctional system for controlling user access to the Internet 控制用户访问Internet的多功能系统的开发
Arseniy D. Prosvirin, Vadim V. Davydov, A. Moroz
Today nearly everyone needs strong and reliable access to the Internet. Usually, such access is provided by Internet-providers. They lay lines of communication and hire specialists. This costs money so customers should pay for the access. Accordingly, the provider wants to distinguish between clients who paid for access and those who do not. That is why providers require methods to control access with usage of authentication. Sometimes, one provider gets hardware of another provider under own control. However, there are a lot of different authentication protocols developed. The target of that work is to connect such authentication methods on hardware with providers services, such as user access control panel (billing). The result of the work is development of running software which can control users’ authentication depending on rules applied in billing panel.
今天,几乎每个人都需要强大而可靠的互联网接入。通常,这种访问是由互联网提供商提供的。他们铺设沟通渠道,聘请专家。这是要花钱的,所以用户应该为访问付费。因此,提供商希望区分为访问付费的客户和不付费的客户。这就是为什么提供者需要使用身份验证来控制访问的方法。有时,一个提供商将另一个提供商的硬件置于自己的控制之下。然而,已经开发了许多不同的身份验证协议。这项工作的目标是将硬件上的这种身份验证方法与提供商服务(如用户访问控制面板(计费))连接起来。工作的结果是开发了运行软件,该软件可以根据计费面板中应用的规则控制用户的身份验证。
{"title":"Development of multifunctional system for controlling user access to the Internet","authors":"Arseniy D. Prosvirin, Vadim V. Davydov, A. Moroz","doi":"10.1145/3440749.3442618","DOIUrl":"https://doi.org/10.1145/3440749.3442618","url":null,"abstract":"Today nearly everyone needs strong and reliable access to the Internet. Usually, such access is provided by Internet-providers. They lay lines of communication and hire specialists. This costs money so customers should pay for the access. Accordingly, the provider wants to distinguish between clients who paid for access and those who do not. That is why providers require methods to control access with usage of authentication. Sometimes, one provider gets hardware of another provider under own control. However, there are a lot of different authentication protocols developed. The target of that work is to connect such authentication methods on hardware with providers services, such as user access control panel (billing). The result of the work is development of running software which can control users’ authentication depending on rules applied in billing panel.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"553 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generation and Search for the Shortest Path in Two-dimensional Labyrinths as A Model for Optimizing Routing Processes in the Packet Switching Network 二维迷宫中最短路径的生成与搜索——分组交换网络中路由过程优化模型
A. Dagaev, Y. Borodyansky, A. Pomogalova
The algorithms for generating and finding the shortest path in two-dimensional labyrinths and their characteristics are considered. The aim of the study is to determine the dependence of the working time of the shortest path search algorithms on the characteristics of mazes. This may allow these algorithms to be used to optimise routing processes in packet switching networks. All of the characteristics of the algorithms under consideration are described in detail. These search algorithms also allow for paralleling, so they can be used when creating games or any special applications. Such generation algorithms have been selected, the resulting mazes of which have different characteristics, thus making it possible to determine the required dependence. The peculiarity of applying the result of this research is that the fastest search algorithm can be selected for the generation algorithm or for specific characteristics of an already generated maze. The search algorithms can be improved to find paths in mazes in N-dimensional spaces. This search extension possibility can be widely used not only for working with mazes, but also with any other structure of a given coordinate system.
研究了二维迷宫中最短路径的生成和查找算法及其特点。研究的目的是确定最短路径搜索算法的工作时间对迷宫特征的依赖关系。这可能允许这些算法被用来优化分组交换网络中的路由过程。详细描述了所考虑的算法的所有特征。这些搜索算法也允许并行,所以它们可以在创建游戏或任何特殊应用程序时使用。选择了这样的生成算法,生成的迷宫具有不同的特征,从而可以确定所需的依赖关系。应用本研究结果的特点是,对于生成算法或已经生成的迷宫的特定特征,可以选择最快的搜索算法。改进了搜索算法,可以在n维空间的迷宫中找到路径。这种搜索扩展的可能性不仅可以广泛应用于迷宫,还可以应用于给定坐标系的任何其他结构。
{"title":"Generation and Search for the Shortest Path in Two-dimensional Labyrinths as A Model for Optimizing Routing Processes in the Packet Switching Network","authors":"A. Dagaev, Y. Borodyansky, A. Pomogalova","doi":"10.1145/3440749.3442636","DOIUrl":"https://doi.org/10.1145/3440749.3442636","url":null,"abstract":"The algorithms for generating and finding the shortest path in two-dimensional labyrinths and their characteristics are considered. The aim of the study is to determine the dependence of the working time of the shortest path search algorithms on the characteristics of mazes. This may allow these algorithms to be used to optimise routing processes in packet switching networks. All of the characteristics of the algorithms under consideration are described in detail. These search algorithms also allow for paralleling, so they can be used when creating games or any special applications. Such generation algorithms have been selected, the resulting mazes of which have different characteristics, thus making it possible to determine the required dependence. The peculiarity of applying the result of this research is that the fastest search algorithm can be selected for the generation algorithm or for specific characteristics of an already generated maze. The search algorithms can be improved to find paths in mazes in N-dimensional spaces. This search extension possibility can be widely used not only for working with mazes, but also with any other structure of a given coordinate system.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124333087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FlexNGIA - Towards the Cloudification of the Internet FlexNGIA -迈向互联网的云化
M. Zhani
Virtual reality and teleportation, to telepresence, augmented reality, and remotely‑controlled robotics are future applications that are bound to achieve unprecedented development for society, economics and culture and to revolutionize the way we live, learn, work and play. Unfortunately, today’s Internet is simply not able to provide the stringent performance requirements needed by such applications to run smoothly and to offer a perfect quality of experience. This is due to several fundamental limitations in the design of the current network architecture and communication protocols. As a result, it is now the time to put into question the tenets of today’s Internet and think novel architecture and protocols that take into account recent technological advances in cloud computing, virtualization and network softwarization to design the future Tactile Internet. In this talk, we start by analyzing the characteristics and requirements of future networking applications and highlight the limitations of the today’s Internet architecture and protocols. We then provide an overview of FlexNGIA, a Flexible Next-Generation Internet Architecture that leverages cloud computing infrastructures, services and technologies as the keystone of the future Internet providing high performance and fully flexibility for future Internet applications and services. We also discuss through some use-cases how FlexNGIA could ensure the performance guarantees required by some of the future network applications.
虚拟现实和瞬间移动、远程呈现、增强现实和远程控制机器人是未来的应用,它们必将为社会、经济和文化带来前所未有的发展,并彻底改变我们的生活、学习、工作和娱乐方式。不幸的是,今天的互联网根本无法提供此类应用程序所需的严格性能要求,以使其顺利运行并提供完美的体验质量。这是由于当前网络体系结构和通信协议设计中的几个基本限制。因此,现在是时候对当今互联网的原则提出质疑,并考虑到云计算、虚拟化和网络软件化方面的最新技术进步,思考新的架构和协议,以设计未来的触觉互联网。在这次演讲中,我们首先分析了未来网络应用的特点和需求,并强调了当今互联网架构和协议的局限性。FlexNGIA是一种灵活的下一代互联网架构,它利用云计算基础设施、服务和技术作为未来互联网的基石,为未来的互联网应用和服务提供高性能和充分的灵活性。我们还通过一些用例讨论了FlexNGIA如何确保某些未来网络应用程序所需的性能保证。
{"title":"FlexNGIA - Towards the Cloudification of the Internet","authors":"M. Zhani","doi":"10.1145/3440749.3442649","DOIUrl":"https://doi.org/10.1145/3440749.3442649","url":null,"abstract":"Virtual reality and teleportation, to telepresence, augmented reality, and remotely‑controlled robotics are future applications that are bound to achieve unprecedented development for society, economics and culture and to revolutionize the way we live, learn, work and play. Unfortunately, today’s Internet is simply not able to provide the stringent performance requirements needed by such applications to run smoothly and to offer a perfect quality of experience. This is due to several fundamental limitations in the design of the current network architecture and communication protocols. As a result, it is now the time to put into question the tenets of today’s Internet and think novel architecture and protocols that take into account recent technological advances in cloud computing, virtualization and network softwarization to design the future Tactile Internet. In this talk, we start by analyzing the characteristics and requirements of future networking applications and highlight the limitations of the today’s Internet architecture and protocols. We then provide an overview of FlexNGIA, a Flexible Next-Generation Internet Architecture that leverages cloud computing infrastructures, services and technologies as the keystone of the future Internet providing high performance and fully flexibility for future Internet applications and services. We also discuss through some use-cases how FlexNGIA could ensure the performance guarantees required by some of the future network applications.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical modelling of the operation of a multistage flood control system using parallel computations 用并行计算建立多级防洪系统运行的数学模型
N. Podgornov, R. Davydov, D. Zotov, V. Antonov, V. Maslikov, E. Maslikova
Due to the increase in the number of floods, the urgent task is to reduce the risk of flooding the important areas. The existing hydraulic structures for flood accumulation may no longer be enough; therefore, it is necessary to place new objects in the river basin. The paper proposes an improved previous mathematical model for the analysis and selection of the location and basic parameters of self-regulating hydroelectric systems in a river basin using computer modelling with the possibility of parallel computations. It is possible to quickly evaluate the results of adding new structures and their contribution to reducing the risk of floods.
由于洪水数量的增加,当务之急是降低重要地区的洪水风险。现有的蓄洪水工设施可能不再足够;因此,有必要在流域内放置新的物体。本文提出了一种改进的数学模型,利用计算机模拟分析和选择流域自调节水力发电系统的位置和基本参数,并提供了并行计算的可能性。有可能快速评估增加新结构的结果及其对减少洪水风险的贡献。
{"title":"Mathematical modelling of the operation of a multistage flood control system using parallel computations","authors":"N. Podgornov, R. Davydov, D. Zotov, V. Antonov, V. Maslikov, E. Maslikova","doi":"10.1145/3440749.3442616","DOIUrl":"https://doi.org/10.1145/3440749.3442616","url":null,"abstract":"Due to the increase in the number of floods, the urgent task is to reduce the risk of flooding the important areas. The existing hydraulic structures for flood accumulation may no longer be enough; therefore, it is necessary to place new objects in the river basin. The paper proposes an improved previous mathematical model for the analysis and selection of the location and basic parameters of self-regulating hydroelectric systems in a river basin using computer modelling with the possibility of parallel computations. It is possible to quickly evaluate the results of adding new structures and their contribution to reducing the risk of floods.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123529596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain, Internet of Things and Digital Twins in Trustless Security of Critical National Infrastructure 区块链、物联网和数字孪生在关键国家基础设施无信任安全中的应用
Mohammad Hammoudeh
The advent of communication technologies and smart storage gave rise to the concept of smart cities. One of the key enabling technologies of smart living is the Internet of Things (IoT). In recent years, IoT has developed into many areas of application including critical national infrastructure (CNI) such as transport, hospitals and power distribution grid. The proliferation in IoT applications raised many serious security and privacy concerns to citizens, businesses and governments. CNI systems depend heavily on IoT devices and Cyber Physical Systems (CPS) to perform autonomous actions or inform human decision makers through the exchange and processing of data. Recently, blockchain has been advocated as a solution for secure data storage and sharing. Blockchain cryptographically offers a secure platform for maintaining a decentralised, ”append-only”, publicly verifiable and immutable data structure, which is timestamped and sequentially ordered by its reference to previous block hashes. The immutability and security of blockchain can improve the CNI protection. Two specific smart CNI enabling technologies that would highly benefit from blockchain are IoT and CPS. Digital twins are virtual replica of the network and logic layer of physical system. A digital twin provides a platform to solve major IoT related CNI cybersecurity challenges in tomorrow’s secure infrastructure, energy distribution, smart cities, smart manufacturing (Industrial IoT and Industry4.0) and autonomous transit systems. This key note discussion outlines how to implement blockchain as a fundamental theory for trustless security for connected CNI. It will investigate technologies which can be utilised to achieve a trustless matrix such as blockchain and peer-distributed security systems, for instance onion-routing, with the wider aim of defining trustless security further. The research also considers the feasibility of trustless IoT security systems and their application in CNI. It investigate the present state-of-the-art in cybersecurity as it relates to trustless security technologies and blockchain and what is the present state of the art of cybersecurity in IoT-enabled CNI systems.
通信技术和智能存储的出现催生了智慧城市的概念。智能生活的关键使能技术之一是物联网(IoT)。近年来,物联网已发展到包括交通、医院、配电网等关键国家基础设施在内的许多应用领域。物联网应用的激增给公民、企业和政府带来了许多严重的安全和隐私问题。CNI系统严重依赖物联网设备和网络物理系统(CPS)来执行自主行动或通过数据交换和处理通知人类决策者。最近,区块链作为安全数据存储和共享的解决方案被提倡。区块链加密提供了一个安全的平台,用于维护一个分散的、“只追加”的、可公开验证的、不可变的数据结构,该数据结构具有时间戳,并根据其对前一个块哈希的引用顺序排序。区块链的不变性和安全性可以提高对CNI的保护。将从区块链中受益的两种特定智能CNI支持技术是物联网和CPS。数字孪生是物理系统的网络层和逻辑层的虚拟复制品。数字孪生体提供了一个平台,可以解决未来安全基础设施、能源分配、智慧城市、智能制造(工业物联网和工业4.0)和自主交通系统中与物联网相关的主要CNI网络安全挑战。这个重点讨论概述了如何实现区块链作为连接CNI的无信任安全的基本理论。它将研究可用于实现无信任矩阵(如区块链)和对等分布式安全系统(例如洋葱路由)的技术,以进一步定义无信任安全的更广泛目标。研究还考虑了无信任物联网安全系统的可行性及其在CNI中的应用。它调查了网络安全领域目前的最新技术,因为它涉及到无信任的安全技术和区块链,以及支持物联网的CNI系统中网络安全的现状。
{"title":"Blockchain, Internet of Things and Digital Twins in Trustless Security of Critical National Infrastructure","authors":"Mohammad Hammoudeh","doi":"10.1145/3440749.3442650","DOIUrl":"https://doi.org/10.1145/3440749.3442650","url":null,"abstract":"The advent of communication technologies and smart storage gave rise to the concept of smart cities. One of the key enabling technologies of smart living is the Internet of Things (IoT). In recent years, IoT has developed into many areas of application including critical national infrastructure (CNI) such as transport, hospitals and power distribution grid. The proliferation in IoT applications raised many serious security and privacy concerns to citizens, businesses and governments. CNI systems depend heavily on IoT devices and Cyber Physical Systems (CPS) to perform autonomous actions or inform human decision makers through the exchange and processing of data. Recently, blockchain has been advocated as a solution for secure data storage and sharing. Blockchain cryptographically offers a secure platform for maintaining a decentralised, ”append-only”, publicly verifiable and immutable data structure, which is timestamped and sequentially ordered by its reference to previous block hashes. The immutability and security of blockchain can improve the CNI protection. Two specific smart CNI enabling technologies that would highly benefit from blockchain are IoT and CPS. Digital twins are virtual replica of the network and logic layer of physical system. A digital twin provides a platform to solve major IoT related CNI cybersecurity challenges in tomorrow’s secure infrastructure, energy distribution, smart cities, smart manufacturing (Industrial IoT and Industry4.0) and autonomous transit systems. This key note discussion outlines how to implement blockchain as a fundamental theory for trustless security for connected CNI. It will investigate technologies which can be utilised to achieve a trustless matrix such as blockchain and peer-distributed security systems, for instance onion-routing, with the wider aim of defining trustless security further. The research also considers the feasibility of trustless IoT security systems and their application in CNI. It investigate the present state-of-the-art in cybersecurity as it relates to trustless security technologies and blockchain and what is the present state of the art of cybersecurity in IoT-enabled CNI systems.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117030068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 4th International Conference on Future Networks and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1