首页 > 最新文献

NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium最新文献

英文 中文
Apples, oranges and hosting providers: Heterogeneity and security in the hosting market 苹果、橘子和托管提供商:托管市场的异质性和安全性
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502824
Samaneh Tajalizadehkhoob, Maciej Korczyński, Arman Noroozian, C. Gañán, M. V. Eeten
Hosting services are associated with various security threats, yet the market has barely been studied empirically. Most security research has relied on routing data and equates providers with Autonomous Systems, ignoring the complexity and heterogeneity of the market. To overcome these limitations, we combined passive DNS data with WHOIS data to identify providers and some of their properties. We found 45,434 hosting providers, spread around a median address space size of 1,517 IP addresses. There is surprisingly little consolidation in the market, even though its services seem amenable to economies of scale. We applied cluster analysis on several measurable characteristics of providers. This uncovered a diverse set of business profiles and an indication of what fraction of the market fits each profile. The profiles are associated with significant differences in security performance, as measured by the uptime of phishing sites. This suggests the approach provides an effective way for security researchers to take the heterogeneity of the market into account.
托管服务与各种安全威胁相关联,但市场几乎没有经过实证研究。大多数安全研究都依赖于路由数据,并将供应商等同于自治系统,忽视了市场的复杂性和异质性。为了克服这些限制,我们将被动DNS数据与WHOIS数据相结合,以识别提供商及其一些属性。我们发现了45,434个托管提供商,分布在1,517个IP地址的中位数地址空间大小上。令人惊讶的是,市场上几乎没有整合,尽管其服务似乎符合规模经济。我们对供应商的几个可测量特征进行了聚类分析。这揭示了一组不同的业务概况,并指出了适合每种概况的市场份额。这些配置文件与安全性能的显著差异相关,可以通过网络钓鱼站点的正常运行时间来衡量。这表明该方法为安全研究人员考虑市场异质性提供了一种有效的方法。
{"title":"Apples, oranges and hosting providers: Heterogeneity and security in the hosting market","authors":"Samaneh Tajalizadehkhoob, Maciej Korczyński, Arman Noroozian, C. Gañán, M. V. Eeten","doi":"10.1109/NOMS.2016.7502824","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502824","url":null,"abstract":"Hosting services are associated with various security threats, yet the market has barely been studied empirically. Most security research has relied on routing data and equates providers with Autonomous Systems, ignoring the complexity and heterogeneity of the market. To overcome these limitations, we combined passive DNS data with WHOIS data to identify providers and some of their properties. We found 45,434 hosting providers, spread around a median address space size of 1,517 IP addresses. There is surprisingly little consolidation in the market, even though its services seem amenable to economies of scale. We applied cluster analysis on several measurable characteristics of providers. This uncovered a diverse set of business profiles and an indication of what fraction of the market fits each profile. The profiles are associated with significant differences in security performance, as measured by the uptime of phishing sites. This suggests the approach provides an effective way for security researchers to take the heterogeneity of the market into account.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Using Web Services for WebRTC signaling interoperability 使用Web服务实现webbrtc信令互操作性
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502898
Basar Daldal, Ibrahim Bilgin, Dogac Basaran, Selin Metin
WebRTC-based applications are assumed to be based mostly on peer-to-peer communication, where an instance of the application is talking to another instance. However, this is not always the case: a WebRTC-based application communicating with a legacy VoIP device or Media Server like a Video Conference Server is also very common. The ability to make both types of communications (WebRTC to WebRTC and WebRTC to Legacy VoIP) is a differentiating factor for a WebRTC product. This paper makes a proposal on how this could be achieved on the signaling layer by leveraging an industry standard method such as the RESTful Web Services.
基于webrtc的应用程序被认为主要基于点对点通信,其中应用程序的一个实例与另一个实例进行通信。然而,情况并非总是如此:基于webbrtc的应用程序与传统VoIP设备或媒体服务器(如视频会议服务器)通信也很常见。能够进行两种类型的通信(WebRTC到WebRTC和WebRTC到传统VoIP)是WebRTC产品的一个区别因素。本文就如何利用诸如RESTful Web Services之类的行业标准方法在信令层上实现这一点提出了建议。
{"title":"Using Web Services for WebRTC signaling interoperability","authors":"Basar Daldal, Ibrahim Bilgin, Dogac Basaran, Selin Metin","doi":"10.1109/NOMS.2016.7502898","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502898","url":null,"abstract":"WebRTC-based applications are assumed to be based mostly on peer-to-peer communication, where an instance of the application is talking to another instance. However, this is not always the case: a WebRTC-based application communicating with a legacy VoIP device or Media Server like a Video Conference Server is also very common. The ability to make both types of communications (WebRTC to WebRTC and WebRTC to Legacy VoIP) is a differentiating factor for a WebRTC product. This paper makes a proposal on how this could be achieved on the signaling layer by leveraging an industry standard method such as the RESTful Web Services.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116898368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of a dynamic adaptive reservation system in media production networks 媒体制作网络中动态自适应预约系统的设计
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502978
Maryam Barshan, Hendrik Moens, B. Volckaert, F. Turck
Due to the predictable nature of network transfers in media production industry, advance bandwidth reservation results in higher bandwidth utilization and improved network performance. However, in unreliable networks, this may fail. As a first provisional stage, deploying protection mechanisms ensures that the schedule remains valid when the system is in operation. Constant monitoring and modification is also required in order to be capable of dynamically adapting the network to changing conditions. In this paper, we propose an efficient dual approach consisting of two processes. First, a schedule is produced by a resilient advance reservation algorithm. Then, the generated schedule is continually updated over time using a runtime adaptation approach. As this step uses the interconnecting network links' leftover capacity, following this approach leads to increased performance in case of steady network conditions, or neutral performance when transmitting admitted requests in uncertain network conditions.
由于媒体制作行业网络传输的可预见性,提前预留带宽可以提高带宽利用率,改善网络性能。然而,在不可靠的网络中,这可能会失败。作为第一个临时阶段,部署保护机制可以确保计划在系统运行时仍然有效。为了使网络能够动态地适应不断变化的条件,还需要不断地监测和修改。在本文中,我们提出了一种由两个过程组成的有效的双重方法。首先,采用弹性提前预约算法生成调度。然后,使用运行时适应方法随着时间的推移不断更新生成的计划。由于此步骤使用了互连网络链路的剩余容量,因此在网络条件稳定的情况下,采用此方法可以提高性能,而在网络条件不确定的情况下,则可以在传输接收请求时保持中性性能。
{"title":"Design of a dynamic adaptive reservation system in media production networks","authors":"Maryam Barshan, Hendrik Moens, B. Volckaert, F. Turck","doi":"10.1109/NOMS.2016.7502978","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502978","url":null,"abstract":"Due to the predictable nature of network transfers in media production industry, advance bandwidth reservation results in higher bandwidth utilization and improved network performance. However, in unreliable networks, this may fail. As a first provisional stage, deploying protection mechanisms ensures that the schedule remains valid when the system is in operation. Constant monitoring and modification is also required in order to be capable of dynamically adapting the network to changing conditions. In this paper, we propose an efficient dual approach consisting of two processes. First, a schedule is produced by a resilient advance reservation algorithm. Then, the generated schedule is continually updated over time using a runtime adaptation approach. As this step uses the interconnecting network links' leftover capacity, following this approach leads to increased performance in case of steady network conditions, or neutral performance when transmitting admitted requests in uncertain network conditions.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124914300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Configuration of open vSwitch using OF-CONFIG 使用of - config配置打开虚拟交换机
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502920
T. Čejka, Radek Krejcí
Software Defined Networking (SDN) became a popular concept where a flexible network architecture is required. One of the widely used approaches to SDN is based on the OpenFlow (OF) protocol that allows controllers to configure OF capable network switches. The OF protocol is focused on a flow-based control of a switch. Besides OF itself, Open Networking Foundation (ONF) has introduced the OF-CONFIG protocol. In contrast, the aim of OF-CONFIG is the configuration of more durable parameters of the controlled switch. However, Open vSwitch (OVS), as the most popular OF switch implementation, uses its own configuration protocol instead of OF-CONFIG. This paper presents results of our analysis of OF-CONFIG and describes design and development of its missing reference implementation. Furthermore, it extends OVS with the OF-CONFIG support, so it provides an opportunity for OF-CONFIG to be more widely used. Our experiences from the analysis and implementation deliver useful feedback to ONF people for further development of OF-CONFIG.
软件定义网络(SDN)在需要灵活的网络体系结构时成为一个流行的概念。广泛使用的SDN方法之一是基于OpenFlow (of)协议,该协议允许控制器配置具有of功能的网络交换机。OF协议的重点是基于流的交换机控制。除了OF本身,开放网络基金会(ONF)还引入了OF- config协议。相比之下,of配置的目的是配置更持久的被控开关参数。然而,Open vSwitch (OVS)作为最流行的OF交换机实现,使用自己的配置协议而不是OF- config。本文介绍了我们对of - config的分析结果,并描述了其缺失的参考实现的设计和开发。此外,它还通过OF-CONFIG支持扩展了OVS,因此它为OF-CONFIG得到更广泛的应用提供了机会。我们从分析和实现中获得的经验为ONF人员进一步开发of - config提供了有用的反馈。
{"title":"Configuration of open vSwitch using OF-CONFIG","authors":"T. Čejka, Radek Krejcí","doi":"10.1109/NOMS.2016.7502920","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502920","url":null,"abstract":"Software Defined Networking (SDN) became a popular concept where a flexible network architecture is required. One of the widely used approaches to SDN is based on the OpenFlow (OF) protocol that allows controllers to configure OF capable network switches. The OF protocol is focused on a flow-based control of a switch. Besides OF itself, Open Networking Foundation (ONF) has introduced the OF-CONFIG protocol. In contrast, the aim of OF-CONFIG is the configuration of more durable parameters of the controlled switch. However, Open vSwitch (OVS), as the most popular OF switch implementation, uses its own configuration protocol instead of OF-CONFIG. This paper presents results of our analysis of OF-CONFIG and describes design and development of its missing reference implementation. Furthermore, it extends OVS with the OF-CONFIG support, so it provides an opportunity for OF-CONFIG to be more widely used. Our experiences from the analysis and implementation deliver useful feedback to ONF people for further development of OF-CONFIG.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123718009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Adaptive virtual machine allocation algorithms for cloud-hosted elastic media services 云托管弹性媒体服务的自适应虚拟机分配算法
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502859
R. Xavier, Hendrik Moens, B. Volckaert, F. Turck
Cloud computing is growing in adoption for different services previously supported by traditional infrastructure, including dedicated hardware setups. One of these cloud-enabled services is real-time Audio/Video collaboration. Existing cloud-based collaboration systems generally function on a best-effort basis, and offer little to no delivery and quality guarantees. High-quality business-focused solutions are therefore offered using dedicated and often manually configured hardware. In this paper, we present resource provisioning algorithms to provide the mentioned elasticity under strict quality requirements. These algorithms are evaluated, using an extended version of the CloudSim simulator, making use of realistic collaborative meeting patterns prepared to deal with seasonality and usage prediction. Our results show that the algorithms improve costs by up to 98.38% when compared with previously designed more naive approaches and with an effectiveness of 99.9% in meeting A/V collaboration setup deadlines.
云计算越来越多地用于以前由传统基础设施(包括专用硬件设置)支持的不同服务。其中一个支持云的服务是实时音频/视频协作。现有的基于云计算的协作系统通常是在尽力而为的基础上运行的,并且几乎没有提供交付和质量保证。因此,高质量的以业务为中心的解决方案使用专用的、通常是手动配置的硬件来提供。在本文中,我们提出了在严格的质量要求下提供上述弹性的资源分配算法。使用CloudSim模拟器的扩展版本,利用准备处理季节性和使用预测的现实协作会议模式,对这些算法进行评估。我们的结果表明,与之前设计的更朴素的方法相比,该算法将成本提高了98.38%,在满足A/V协作设置截止日期方面的效率为99.9%。
{"title":"Adaptive virtual machine allocation algorithms for cloud-hosted elastic media services","authors":"R. Xavier, Hendrik Moens, B. Volckaert, F. Turck","doi":"10.1109/NOMS.2016.7502859","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502859","url":null,"abstract":"Cloud computing is growing in adoption for different services previously supported by traditional infrastructure, including dedicated hardware setups. One of these cloud-enabled services is real-time Audio/Video collaboration. Existing cloud-based collaboration systems generally function on a best-effort basis, and offer little to no delivery and quality guarantees. High-quality business-focused solutions are therefore offered using dedicated and often manually configured hardware. In this paper, we present resource provisioning algorithms to provide the mentioned elasticity under strict quality requirements. These algorithms are evaluated, using an extended version of the CloudSim simulator, making use of realistic collaborative meeting patterns prepared to deal with seasonality and usage prediction. Our results show that the algorithms improve costs by up to 98.38% when compared with previously designed more naive approaches and with an effectiveness of 99.9% in meeting A/V collaboration setup deadlines.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115089834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Delta-r: A novel and more economic strategy for allocating the roadside infrastructure in vehicular networks with guaranteed levels of performance Delta-r:一种新颖且更经济的策略,用于在保证性能水平的情况下分配车辆网络中的路边基础设施
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502874
J. Sarubbi, C. M. Silva
In this work we propose Delta-r, a new greedy heuristic for solving the allocation of roadside units in order to meet a Δρ2ρ1-Deployment. The Δρ2ρ1-Deployment is a metric for specifying minimal levels of performance from the infrastructure supporting vehicular networks. As far as we are concerned, this is the first QoS-bounded deployment strategy considering both the contact probability, and the contact duration. We compare Delta-r to two baselines: DL allocates the roadside units at the densest locations of the road network, while Delta-g uses the absolute V2I contact time. Differently from Delta-r, our proposal evaluates the deployment performance when using the relative V2I contact time considering vehicles and locations of the road network. Our results demonstrate Delta-r requiring less roadside units to achieve the same performance of the infrastructure supporting the V2I communication.
在这项工作中,我们提出了Delta-r,一种新的贪婪启发式算法,用于解决路边单元的分配,以满足Δρ2ρ1-Deployment。Δρ2ρ1-Deployment是一个指标,用于指定支持车辆网络的基础设施的最低性能水平。就我们而言,这是第一个同时考虑接触概率和接触持续时间的qos有界部署策略。我们将Delta-r与两条基线进行比较:DL在路网最密集的位置分配路边单元,而Delta-g使用绝对V2I接触时间。与Delta-r不同的是,我们的建议在考虑车辆和道路网络位置时使用相对V2I接触时间来评估部署性能。我们的研究结果表明,Delta-r需要更少的路边单元来实现支持V2I通信的基础设施的相同性能。
{"title":"Delta-r: A novel and more economic strategy for allocating the roadside infrastructure in vehicular networks with guaranteed levels of performance","authors":"J. Sarubbi, C. M. Silva","doi":"10.1109/NOMS.2016.7502874","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502874","url":null,"abstract":"In this work we propose Delta-r, a new greedy heuristic for solving the allocation of roadside units in order to meet a Δρ2ρ1-Deployment. The Δρ2ρ1-Deployment is a metric for specifying minimal levels of performance from the infrastructure supporting vehicular networks. As far as we are concerned, this is the first QoS-bounded deployment strategy considering both the contact probability, and the contact duration. We compare Delta-r to two baselines: DL allocates the roadside units at the densest locations of the road network, while Delta-g uses the absolute V2I contact time. Differently from Delta-r, our proposal evaluates the deployment performance when using the relative V2I contact time considering vehicles and locations of the road network. Our results demonstrate Delta-r requiring less roadside units to achieve the same performance of the infrastructure supporting the V2I communication.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"78 48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115569692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Reversing the supermarket: A distributed approach for handling elasticity in the cloud 逆转超市:一种在云中处理弹性的分布式方法
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502800
Amir Nahir, A. Orda, D. Raz
A fundamental capability of cloud computing is elasticity, i.e., the ability to dynamically change the amount of allocated resources. This is typically done by adjusting the number of Virtual Machines (VMs) running a service based on the current demand for that service. For large services, centralized management is impractical and distributed methods are employed. In such settings, no single component has full information on the overall demand and service quality, thus elasticity becomes a real challenge. We address this challenge by proposing a novel elasticity scheme that enables fully distributed management of large cloud services. Our scheme is based on three main components, namely, a task assignment policy, a VM scale-up policy and a VM scale-down policy. The task assignment policy strives to “pack” VMs while maintaining SLA requirements. The VM scale-up policy is based on local activation of new VMs and the VM scale-down policy is based on self-deactivation of VMs that are idle for some duration of time. Through simulations and an implementation we establish that our scheme quickly adapts to changes in job arrival rates and minimizes the number of active VMs so as to reduce the operational costs of the service, while adhering to strict SLA requirements.
云计算的一个基本功能是弹性,即动态更改已分配资源数量的能力。这通常是通过根据当前对服务的需求调整运行服务的虚拟机(vm)的数量来实现的。对于大型业务,集中管理是不现实的,需要采用分布式的方式。在这种情况下,没有任何一个组件拥有关于整体需求和服务质量的完整信息,因此弹性成为一个真正的挑战。我们通过提出一种新颖的弹性方案来解决这一挑战,该方案支持对大型云服务进行完全分布式管理。我们的方案基于三个主要组件,即任务分配策略,虚拟机缩放策略和虚拟机缩放策略。任务分配策略力求在保持SLA需求的同时“打包”虚拟机。虚拟机扩容策略基于本地激活新虚拟机,虚拟机缩减策略基于闲置一段时间的虚拟机自动去激活。通过模拟和实施,我们确定我们的方案能够快速适应作业到达率的变化,并最大限度地减少活动虚拟机的数量,从而降低服务的运营成本,同时遵守严格的SLA要求。
{"title":"Reversing the supermarket: A distributed approach for handling elasticity in the cloud","authors":"Amir Nahir, A. Orda, D. Raz","doi":"10.1109/NOMS.2016.7502800","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502800","url":null,"abstract":"A fundamental capability of cloud computing is elasticity, i.e., the ability to dynamically change the amount of allocated resources. This is typically done by adjusting the number of Virtual Machines (VMs) running a service based on the current demand for that service. For large services, centralized management is impractical and distributed methods are employed. In such settings, no single component has full information on the overall demand and service quality, thus elasticity becomes a real challenge. We address this challenge by proposing a novel elasticity scheme that enables fully distributed management of large cloud services. Our scheme is based on three main components, namely, a task assignment policy, a VM scale-up policy and a VM scale-down policy. The task assignment policy strives to “pack” VMs while maintaining SLA requirements. The VM scale-up policy is based on local activation of new VMs and the VM scale-down policy is based on self-deactivation of VMs that are idle for some duration of time. Through simulations and an implementation we establish that our scheme quickly adapts to changes in job arrival rates and minimizes the number of active VMs so as to reduce the operational costs of the service, while adhering to strict SLA requirements.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122903590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting NFC data exchange against eavesdropping with encryption record type definition 使用加密记录类型定义保护NFC数据交换免受窃听
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502861
S. Hameed, Usman Murad Jamali, Adnan Samad
Near Field Communication (NFC) is inherently vulnerable to eavesdropping and proximity hijacking attacks. NFC standards itself lack built-in security features against eavesdropping for all the modes of communication in NFC-ecosystem. This drives the application developers to implement customize security features on their own. These non-standard solutions in turn result in the system's security against vulnerabilities being subject to the developer's capability of designing a secure solution. Clearly, this model is a limiting factor in the widespread adoption and deployment of NFC applications. In this paper we propose a standard Encryption Record Type Definition (ERTD) to provide confidentiality to NFC Data Exchange format (NDEF). Subsequently, we develop a fully compliant prototype of our ERTD as a lightweight plug and play confidentiality middleware in the existing NFC communication architecture. Finally, we perform an in-depth performance evaluation, of different confidentiality related primitives that focuses on processing latency and data overheads.
近场通信(NFC)本身就容易受到窃听和近距离劫持攻击。对于NFC生态系统中的所有通信模式,NFC标准本身缺乏内置的防止窃听的安全功能。这促使应用程序开发人员自己实现自定义的安全特性。这些非标准的解决方案反过来导致系统对漏洞的安全性受制于开发人员设计安全解决方案的能力。显然,这种模式是限制NFC应用广泛采用和部署的一个因素。在本文中,我们提出了一个标准的加密记录类型定义(ERTD)来为NFC数据交换格式(NDEF)提供保密性。随后,我们开发了一个完全兼容的ERTD原型,作为现有NFC通信体系结构中的轻量级即插即用保密中间件。最后,我们对不同的机密性相关原语进行了深入的性能评估,重点关注处理延迟和数据开销。
{"title":"Protecting NFC data exchange against eavesdropping with encryption record type definition","authors":"S. Hameed, Usman Murad Jamali, Adnan Samad","doi":"10.1109/NOMS.2016.7502861","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502861","url":null,"abstract":"Near Field Communication (NFC) is inherently vulnerable to eavesdropping and proximity hijacking attacks. NFC standards itself lack built-in security features against eavesdropping for all the modes of communication in NFC-ecosystem. This drives the application developers to implement customize security features on their own. These non-standard solutions in turn result in the system's security against vulnerabilities being subject to the developer's capability of designing a secure solution. Clearly, this model is a limiting factor in the widespread adoption and deployment of NFC applications. In this paper we propose a standard Encryption Record Type Definition (ERTD) to provide confidentiality to NFC Data Exchange format (NDEF). Subsequently, we develop a fully compliant prototype of our ERTD as a lightweight plug and play confidentiality middleware in the existing NFC communication architecture. Finally, we perform an in-depth performance evaluation, of different confidentiality related primitives that focuses on processing latency and data overheads.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129568859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Toward a cloud-based security intelligence with big data processing 走向以大数据处理为基础的云安全智能
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502966
Karim Benzidane, Hassan El Alloussi, Othman El Warrak, L. Fetjah, Said Jai-Andaloussi, A. Sekkaki
As the adoption of Cloud Computing is growing exponentially, a huge sheer amount of data is generated therefore needing to be processed in order to control efficiently what is going within the infrastructure, and also to respond effectively and promptly to security threats. Herein, we provide a highly scalable plugin based and comprehensive solution in order to have a real-time monitoring by reducing the impact of an attack or a particular issue in the overall distributed infrastructure. This work covers a bigger scope in infrastructure security by monitoring all devices that generate log files or generate network traffic. By applying different Big Data techniques for data analysis, we can ensure a responsive solution to any problem (security or other) within the infrastructure and acting accordingly.
随着云计算的采用呈指数级增长,因此需要处理大量的数据,以便有效地控制基础设施内的内容,并有效和迅速地响应安全威胁。在这里,我们提供了一个高度可扩展的基于插件的综合解决方案,以便通过减少攻击或整个分布式基础设施中特定问题的影响来进行实时监控。这项工作通过监视生成日志文件或生成网络流量的所有设备,涵盖了基础设施安全的更大范围。通过应用不同的大数据技术进行数据分析,我们可以确保为基础设施中的任何问题(安全或其他)提供响应式解决方案,并采取相应的行动。
{"title":"Toward a cloud-based security intelligence with big data processing","authors":"Karim Benzidane, Hassan El Alloussi, Othman El Warrak, L. Fetjah, Said Jai-Andaloussi, A. Sekkaki","doi":"10.1109/NOMS.2016.7502966","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502966","url":null,"abstract":"As the adoption of Cloud Computing is growing exponentially, a huge sheer amount of data is generated therefore needing to be processed in order to control efficiently what is going within the infrastructure, and also to respond effectively and promptly to security threats. Herein, we provide a highly scalable plugin based and comprehensive solution in order to have a real-time monitoring by reducing the impact of an attack or a particular issue in the overall distributed infrastructure. This work covers a bigger scope in infrastructure security by monitoring all devices that generate log files or generate network traffic. By applying different Big Data techniques for data analysis, we can ensure a responsive solution to any problem (security or other) within the infrastructure and acting accordingly.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Agile service manager for 5G 5G敏捷服务经理
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7503004
Marouen Mechtri, I. B. Yahia, D. Zeghlache
This paper presents an underlying framework to support and accelerate the production of applications and services in the context of programmable networks (SDN and NFV, clouds). The proposed framework addresses moreover the 5G KPI of “reducing the average service creation time from 90 hours to 90 minutes” as declared by 5G-PPP association in the early of 2015 among other KPIs. The proposed framework relies on SDN, NFV and Cloud principles and technologies and proposes extensions towards the end to end abstraction that is required for automation of service production. A Service Manager Architecture fulfilling the agility, acceleration and automation requirements is presented along with its relationships and interfaces with the applications and network levels. An application requiring network services, expressed in a network service descriptor, is used to illustrate the architecture usage and benefits and highlights the remaining future research needs and trails.
本文提出了一个底层框架来支持和加速可编程网络(SDN和NFV、云)环境下的应用程序和服务的生产。此外,该框架还解决了5G- ppp协会在2015年初宣布的“将平均服务创建时间从90小时减少到90分钟”等5G KPI。提出的框架依赖于SDN、NFV和Cloud原则和技术,并提出了对服务生产自动化所需的端到端抽象的扩展。提供了满足敏捷性、加速性和自动化需求的服务管理器体系结构及其与应用程序和网络层的关系和接口。需要网络服务的应用程序,用网络服务描述符表示,用来说明体系结构的使用和好处,并强调剩余的未来研究需求和路径。
{"title":"Agile service manager for 5G","authors":"Marouen Mechtri, I. B. Yahia, D. Zeghlache","doi":"10.1109/NOMS.2016.7503004","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7503004","url":null,"abstract":"This paper presents an underlying framework to support and accelerate the production of applications and services in the context of programmable networks (SDN and NFV, clouds). The proposed framework addresses moreover the 5G KPI of “reducing the average service creation time from 90 hours to 90 minutes” as declared by 5G-PPP association in the early of 2015 among other KPIs. The proposed framework relies on SDN, NFV and Cloud principles and technologies and proposes extensions towards the end to end abstraction that is required for automation of service production. A Service Manager Architecture fulfilling the agility, acceleration and automation requirements is presented along with its relationships and interfaces with the applications and network levels. An application requiring network services, expressed in a network service descriptor, is used to illustrate the architecture usage and benefits and highlights the remaining future research needs and trails.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1