首页 > 最新文献

NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium最新文献

英文 中文
BotTracer: Bot user detection using clustering method in RecDroid 僵尸跟踪器:在RecDroid中使用聚类方法进行僵尸用户检测
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502994
Bahman Rashidi, Carol J. Fung
RecDroid is a smartphone permission management system which provides users with a fine-grained real-time app permission control and a recommendation system regarding whether to grant the permission or not based on expert users' responses in the network. However, in such a system, malware owners may create multiple bot users to misguide the recommendation system by providing untruthful responses on the malicious app. Threshold-based detection method can detect malicious users which are dishonest on many apps, but it cannot detect malicious users that target on some specific apps. In this work, we present a clustering-based method called BotTracer to finding groups of bot users controlled by the same masters, which can be used to detect bot users with high reputation scores. The key part of the proposed method is to map the users into a graph based on their similarity and apply a clustering algorithm to group users together. We evaluate our method using a set of simulated users' profiles, including malicious users and regular ones. Our experimental results demonstrate high accuracy in terms of detecting malicious users. Finally, we discuss several clustering features and their impact on the clustering results.
RecDroid是一款智能手机权限管理系统,为用户提供细粒度的实时应用权限控制,并根据网络中专家用户的反应,提供是否授予权限的推荐系统。然而,在这样的系统中,恶意软件所有者可能会创建多个bot用户,通过在恶意应用上提供不真实的响应来误导推荐系统。基于阈值的检测方法可以检测到在许多应用上不诚实的恶意用户,但无法检测到针对某些特定应用的恶意用户。在这项工作中,我们提出了一种基于聚类的方法,称为BotTracer,用于寻找由同一主控制的bot用户组,该方法可用于检测具有高声誉分数的bot用户。该方法的关键部分是根据用户的相似度将用户映射到一个图中,并应用聚类算法对用户进行分组。我们使用一组模拟用户的配置文件来评估我们的方法,包括恶意用户和普通用户。实验结果表明,该方法在检测恶意用户方面具有较高的准确性。最后,我们讨论了几个聚类特征及其对聚类结果的影响。
{"title":"BotTracer: Bot user detection using clustering method in RecDroid","authors":"Bahman Rashidi, Carol J. Fung","doi":"10.1109/NOMS.2016.7502994","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502994","url":null,"abstract":"RecDroid is a smartphone permission management system which provides users with a fine-grained real-time app permission control and a recommendation system regarding whether to grant the permission or not based on expert users' responses in the network. However, in such a system, malware owners may create multiple bot users to misguide the recommendation system by providing untruthful responses on the malicious app. Threshold-based detection method can detect malicious users which are dishonest on many apps, but it cannot detect malicious users that target on some specific apps. In this work, we present a clustering-based method called BotTracer to finding groups of bot users controlled by the same masters, which can be used to detect bot users with high reputation scores. The key part of the proposed method is to map the users into a graph based on their similarity and apply a clustering algorithm to group users together. We evaluate our method using a set of simulated users' profiles, including malicious users and regular ones. Our experimental results demonstrate high accuracy in terms of detecting malicious users. Finally, we discuss several clustering features and their impact on the clustering results.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126094463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Supporting end-to-end connectivity in federated networks using SDN 支持使用SDN的联邦网络中的端到端连接
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502893
Roberto di Lallo, Gabriele Lospoto, M. Rimondini, G. Battista
Federated networking is a promising approach to resource sharing that supports cost-effective services involving multiple parties. Research in this field largely focused on architectures and cost models, making limited progress on the technological side. On the other hand, the widely adopted Software-Defined Networking (SDN) model found its most successful application in data centers, exhibiting very little penetration in other scenarios. We leverage the unexplored potential of SDN on the edge of a network to introduce an approach that supports end-to-end connectivity among different federated partners. Our approach is based on simple Network Address and Port Translation (NAPT), making it applicable in standard IP networks. It is also very flexible, because it exploits SDN, and scalable, because address translations are performed on Customer Premises Equipment, where SDN is being progressively supported by device vendors. We define various alternative NAPT strategies and evaluate their effectiveness with simulations as well as emulated scenarios.
联邦网络是一种很有前途的资源共享方法,它支持涉及多方的经济有效的服务。该领域的研究主要集中在架构和成本模型上,在技术方面进展有限。另一方面,广泛采用的软件定义网络(SDN)模型在数据中心得到了最成功的应用,而在其他场景中渗透很少。我们利用SDN在网络边缘未开发的潜力,引入一种支持不同联邦合作伙伴之间端到端连接的方法。我们的方法是基于简单的网络地址和端口转换(NAPT),使其适用于标准的IP网络。它也非常灵活,因为它利用了SDN,并且可扩展,因为地址转换是在客户端设备上执行的,其中SDN正逐步得到设备供应商的支持。我们定义了各种备选NAPT策略,并通过模拟和模拟场景评估了它们的有效性。
{"title":"Supporting end-to-end connectivity in federated networks using SDN","authors":"Roberto di Lallo, Gabriele Lospoto, M. Rimondini, G. Battista","doi":"10.1109/NOMS.2016.7502893","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502893","url":null,"abstract":"Federated networking is a promising approach to resource sharing that supports cost-effective services involving multiple parties. Research in this field largely focused on architectures and cost models, making limited progress on the technological side. On the other hand, the widely adopted Software-Defined Networking (SDN) model found its most successful application in data centers, exhibiting very little penetration in other scenarios. We leverage the unexplored potential of SDN on the edge of a network to introduce an approach that supports end-to-end connectivity among different federated partners. Our approach is based on simple Network Address and Port Translation (NAPT), making it applicable in standard IP networks. It is also very flexible, because it exploits SDN, and scalable, because address translations are performed on Customer Premises Equipment, where SDN is being progressively supported by device vendors. We define various alternative NAPT strategies and evaluate their effectiveness with simulations as well as emulated scenarios.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126747188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
nDEWS: A new domains early warning system for TLDs nDEWS:一个新的顶级域名预警系统
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502961
G. Moura, M. Müller, M. Wullink, Cristian Hesselman
We present nDEWS, a Hadoop-based automatic early warning system of malicious domains for domain name registry operators, such as top-level domain (TLD) registries. By monitoring an entire DNS zone, nDEWS is able to single out newly added suspicious domains by analyzing both domain registration and global DNS lookup patterns of a TLD. nDEWS is capable to detect several types of domain abuse, such as malware, phishing, and allegedly fraudulent web shops. To act on this data, we have established a pilot study with two major .nl registrars, and provide them with daily feeds of their respective suspicious domains. Moreover, nDEWS can also be implemented by other TLD operators/registries.
我们提出了nDEWS,一个基于hadoop的恶意域名自动预警系统,用于域名注册管理机构,如顶级域名(TLD)注册管理机构。通过监控整个DNS区域,nDEWS能够通过分析域名注册和TLD的全局DNS查找模式来挑出新添加的可疑域名。nDEWS能够检测几种类型的域名滥用,例如恶意软件、网络钓鱼和涉嫌欺诈的网络商店。为了对这些数据采取行动,我们与两家主要的。nl注册商建立了一项试点研究,并向他们提供各自可疑域名的每日提要。此外,nDEWS也可以由其他顶级域名运营商/注册管理机构实施。
{"title":"nDEWS: A new domains early warning system for TLDs","authors":"G. Moura, M. Müller, M. Wullink, Cristian Hesselman","doi":"10.1109/NOMS.2016.7502961","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502961","url":null,"abstract":"We present nDEWS, a Hadoop-based automatic early warning system of malicious domains for domain name registry operators, such as top-level domain (TLD) registries. By monitoring an entire DNS zone, nDEWS is able to single out newly added suspicious domains by analyzing both domain registration and global DNS lookup patterns of a TLD. nDEWS is capable to detect several types of domain abuse, such as malware, phishing, and allegedly fraudulent web shops. To act on this data, we have established a pilot study with two major .nl registrars, and provide them with daily feeds of their respective suspicious domains. Moreover, nDEWS can also be implemented by other TLD operators/registries.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121502088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Identifying DoS attacks on software defined networks: A relation context approach 识别软件定义网络上的DoS攻击:一种关系上下文方法
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502914
Ahmad AlEroud, I. Alsmadi
The recent emerge of Software Defined Networking (SDN) promotes both supporters and opponents to further explore this network architecture. One of the main attributes that characterize SDN is the significant role of software to manage and control the architecture. There are four major concerns for such software dominant role, security, performance, reliability, and fault tolerance. Among them security is considered a major concern. SDNs security concerns include attacks on the control plane layer such as DoS attacks. This paper presents an inference-relation context based technique for the detection of DoS attacks on SDNs. The proposed technique utilizes contextual similarity with existing attack patterns to identify DoS in an OpenFlow infrastructure. A validation of the proposed technique has been performed using a several benchmark datasets yielding promising results.
最近出现的软件定义网络(SDN)促使支持者和反对者进一步探索这种网络架构。SDN的主要特征之一是软件在管理和控制体系结构方面的重要作用。对于此类软件的主导角色,有四个主要关注点:安全性、性能、可靠性和容错性。其中,安全被认为是一个主要问题。sdn的安全问题包括对控制平面层的攻击,如DoS攻击。本文提出了一种基于推理关系上下文的sdn DoS攻击检测技术。所提出的技术利用与现有攻击模式的上下文相似性来识别OpenFlow基础设施中的DoS。使用几个基准数据集对所提出的技术进行了验证,产生了有希望的结果。
{"title":"Identifying DoS attacks on software defined networks: A relation context approach","authors":"Ahmad AlEroud, I. Alsmadi","doi":"10.1109/NOMS.2016.7502914","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502914","url":null,"abstract":"The recent emerge of Software Defined Networking (SDN) promotes both supporters and opponents to further explore this network architecture. One of the main attributes that characterize SDN is the significant role of software to manage and control the architecture. There are four major concerns for such software dominant role, security, performance, reliability, and fault tolerance. Among them security is considered a major concern. SDNs security concerns include attacks on the control plane layer such as DoS attacks. This paper presents an inference-relation context based technique for the detection of DoS attacks on SDNs. The proposed technique utilizes contextual similarity with existing attack patterns to identify DoS in an OpenFlow infrastructure. A validation of the proposed technique has been performed using a several benchmark datasets yielding promising results.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127639221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Evaluation of terahertz channel in data centers 数据中心中太赫兹信道的评估
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502886
Shahram Mollahasani, E. Onur
Designing data center network topologies with the objective of minimizing cost, increasing bisection bandwidth and decreasing latency is a difficult problem. The solutions in the literature mainly concentrate on wired networks and minimizing wiring costs thereof. Only a few proposals address the benefit of employing wireless communications in data centers due to spectrum and bandwidth limitations of current wireless communication technologies. By using terahertz communication in a data center as a complementary technology, the performance of the data center can be enhanced and substantial savings in cabling costs can be achieved without any throughput concession. Terahertz (THz) band can overcome bandwidth limitations and satisfy a wide range of applications from classical networking to board-to-board communication. In this paper, we evaluate the terahertz channel in data centers by considering atmospheric absorption. Based on the results, we recommend employing 190-310 GHz range with a bandwidth of 120 GHz. Keeping the relative humidity level at 40% will reduce atmospheric absorption while proving a healthy environmental regime for the equipment in a data center.
以最小化成本、增加对分带宽和降低延迟为目标来设计数据中心网络拓扑是一个难题。文献中的解决方案主要集中在有线网络和最小化其布线成本。由于当前无线通信技术的频谱和带宽限制,只有少数建议涉及在数据中心使用无线通信的好处。通过在数据中心中使用太赫兹通信作为一种补充技术,可以增强数据中心的性能,并且可以在不降低吞吐量的情况下大幅节省布线成本。太赫兹(THz)频段可以克服带宽限制,满足从经典网络到板对板通信的广泛应用。在本文中,我们通过考虑大气吸收来评估数据中心的太赫兹信道。根据结果,我们建议使用190-310 GHz范围,带宽为120 GHz。将相对湿度水平保持在40%将减少大气吸收,同时为数据中心的设备提供健康的环境机制。
{"title":"Evaluation of terahertz channel in data centers","authors":"Shahram Mollahasani, E. Onur","doi":"10.1109/NOMS.2016.7502886","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502886","url":null,"abstract":"Designing data center network topologies with the objective of minimizing cost, increasing bisection bandwidth and decreasing latency is a difficult problem. The solutions in the literature mainly concentrate on wired networks and minimizing wiring costs thereof. Only a few proposals address the benefit of employing wireless communications in data centers due to spectrum and bandwidth limitations of current wireless communication technologies. By using terahertz communication in a data center as a complementary technology, the performance of the data center can be enhanced and substantial savings in cabling costs can be achieved without any throughput concession. Terahertz (THz) band can overcome bandwidth limitations and satisfy a wide range of applications from classical networking to board-to-board communication. In this paper, we evaluate the terahertz channel in data centers by considering atmospheric absorption. Based on the results, we recommend employing 190-310 GHz range with a bandwidth of 120 GHz. Keeping the relative humidity level at 40% will reduce atmospheric absorption while proving a healthy environmental regime for the equipment in a data center.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"466 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117008200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Real-world experiences with CQI-based analyses for dense LTE networks 基于cqi的密集LTE网络分析的实际经验
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502930
A. Bosneag, S. Handurukande, James O'Sullivan, Mingxue Wang
Much work has been done in the area of telecommunications transmission parameters and, in particular, Channel Quality Indicators, to analyse the best ways to improve the performance and quality of communications. However, there is a gap in published papers when it comes to real-world experiences with CQI reports and network-side analysis of transmission parameters that can provide information about user equipment and network elements behaviour. In this paper, we present our experiences with a real-world analysis of dense LTE networks, focusing on two main aspects - what information can CQI reports give us about the behaviour of user equipment in the network, and what information do they provide in relation to the individual network elements. We show what insights can be derived from a network wide statistical analysis of CQI reports and how these insights can be further used by operators to understand potential problems in their network.
在电信传输参数,特别是信道质量指标方面已经做了大量工作,以分析改进通信性能和质量的最佳方法。然而,当涉及到CQI报告和网络端传输参数分析的实际经验时,发表的论文存在差距,这些参数可以提供有关用户设备和网络元素行为的信息。在本文中,我们介绍了我们对密集LTE网络的真实世界分析的经验,重点关注两个主要方面- CQI报告可以为我们提供关于网络中用户设备行为的哪些信息,以及它们提供与单个网络元素相关的哪些信息。我们展示了从CQI报告的全网络统计分析中可以获得哪些见解,以及运营商如何进一步使用这些见解来了解其网络中的潜在问题。
{"title":"Real-world experiences with CQI-based analyses for dense LTE networks","authors":"A. Bosneag, S. Handurukande, James O'Sullivan, Mingxue Wang","doi":"10.1109/NOMS.2016.7502930","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502930","url":null,"abstract":"Much work has been done in the area of telecommunications transmission parameters and, in particular, Channel Quality Indicators, to analyse the best ways to improve the performance and quality of communications. However, there is a gap in published papers when it comes to real-world experiences with CQI reports and network-side analysis of transmission parameters that can provide information about user equipment and network elements behaviour. In this paper, we present our experiences with a real-world analysis of dense LTE networks, focusing on two main aspects - what information can CQI reports give us about the behaviour of user equipment in the network, and what information do they provide in relation to the individual network elements. We show what insights can be derived from a network wide statistical analysis of CQI reports and how these insights can be further used by operators to understand potential problems in their network.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132735656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Orchestrating 5G virtual network functions as a modular Programmable Data Plane 编排5G虚拟网络作为模块化可编程数据平面
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7503008
Fabio Pianese, Massimo Gallo, A. Conte, Diego Perino
The upcoming 5G architecture is expected to heavily rely on network functions implemented by software deployed on commodity hardware architectures. Multiple standardization efforts are underway to specify interfaces between virtualized and real infrastructure, and procedures for interoperability among functions. However, the practical feasibility of function implementation in such abstract and disembodied conditions is scarcely covered in the latest literature. In this paper, we argue for a Network Function Virtualization (NFV) framework that provides 5G network functions built around a modular software router model, rather than following the traditional VM-container approaches. We illustrate its advantages in enabling support for efficient processing on heterogeneous hardware and in ensuring consistency of flow/session semantics across distributed 5G data planes. Finally, we report on the state of Programmable Data Plane, our architecture to implement 5G network functions as modular pipelines orchestrated across multiple devices.
预计即将到来的5G架构将严重依赖于部署在商用硬件架构上的软件实现的网络功能。多个标准化工作正在进行中,以指定虚拟和真实基础设施之间的接口,以及功能之间互操作性的过程。然而,在这种抽象和无实体的条件下实现功能的实际可行性在最新的文献中几乎没有涉及。在本文中,我们支持网络功能虚拟化(NFV)框架,该框架提供围绕模块化软件路由器模型构建的5G网络功能,而不是遵循传统的虚拟机容器方法。我们说明了它在支持异构硬件上的高效处理和确保跨分布式5G数据平面的流/会话语义一致性方面的优势。最后,我们报告了可编程数据平面的状态,我们的架构将5G网络功能实现为跨多个设备编排的模块化管道。
{"title":"Orchestrating 5G virtual network functions as a modular Programmable Data Plane","authors":"Fabio Pianese, Massimo Gallo, A. Conte, Diego Perino","doi":"10.1109/NOMS.2016.7503008","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7503008","url":null,"abstract":"The upcoming 5G architecture is expected to heavily rely on network functions implemented by software deployed on commodity hardware architectures. Multiple standardization efforts are underway to specify interfaces between virtualized and real infrastructure, and procedures for interoperability among functions. However, the practical feasibility of function implementation in such abstract and disembodied conditions is scarcely covered in the latest literature. In this paper, we argue for a Network Function Virtualization (NFV) framework that provides 5G network functions built around a modular software router model, rather than following the traditional VM-container approaches. We illustrate its advantages in enabling support for efficient processing on heterogeneous hardware and in ensuring consistency of flow/session semantics across distributed 5G data planes. Finally, we report on the state of Programmable Data Plane, our architecture to implement 5G network functions as modular pipelines orchestrated across multiple devices.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131632635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimistic concurrency control in self-organizing networks using automatic coordination and verification 基于自动协调与验证的自组织网络乐观并发控制
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502867
Janne Ali-Tolppa, T. Tsvetkov
In a mobile Self-Organizing Network (SON), the SON coordinator has been introduced to control the application of Configuration Management (CM) changes, in order to prevent conflicts between independent SON function instances running in parallel. However, there is always a trade-off between stability and efficiency. On one hand we need to avoid conflicts, on the other we want fast, parallelized execution of SON function instances. Additionally, the concept of SON verification has been developed to automatically detect and correct degradations that arise from unexpected side-effects of (parallel) CM changes made by SON functions or human operators. However, as the number of function instances increases in the future networks, the performance of the SON coordinator becomes critical, i.e. excessive serialization is no longer possible. In this paper, we show how both, SON coordination and verification, can work together and how the cooperation enables a more efficient SON without having to compromise on its stability. This can be achieved by extending the SON function execution coordination to SON verification and by dynamically adjusting the coordination policies between more relaxed and more strict concurrency control strategies based on the feedback from the verification.
在移动自组织网络(SON)中,引入了SON协调器来控制配置管理(CM)应用程序的更改,以防止并行运行的独立SON功能实例之间的冲突。然而,稳定性和效率之间总是要权衡的。一方面,我们需要避免冲突,另一方面,我们需要快速、并行地执行SON函数实例。此外,已经开发了SON验证的概念,以自动检测和纠正由SON功能或人工操作员进行的(并行)CM更改的意外副作用引起的降级。然而,随着未来网络中函数实例数量的增加,SON协调器的性能变得至关重要,也就是说,过度序列化不再可能。在本文中,我们展示了SON协调和验证如何协同工作,以及合作如何在不损害其稳定性的情况下实现更高效的SON。这可以通过将SON函数执行协调扩展到SON验证,并根据验证的反馈动态调整更宽松和更严格的并发控制策略之间的协调策略来实现。
{"title":"Optimistic concurrency control in self-organizing networks using automatic coordination and verification","authors":"Janne Ali-Tolppa, T. Tsvetkov","doi":"10.1109/NOMS.2016.7502867","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502867","url":null,"abstract":"In a mobile Self-Organizing Network (SON), the SON coordinator has been introduced to control the application of Configuration Management (CM) changes, in order to prevent conflicts between independent SON function instances running in parallel. However, there is always a trade-off between stability and efficiency. On one hand we need to avoid conflicts, on the other we want fast, parallelized execution of SON function instances. Additionally, the concept of SON verification has been developed to automatically detect and correct degradations that arise from unexpected side-effects of (parallel) CM changes made by SON functions or human operators. However, as the number of function instances increases in the future networks, the performance of the SON coordinator becomes critical, i.e. excessive serialization is no longer possible. In this paper, we show how both, SON coordination and verification, can work together and how the cooperation enables a more efficient SON without having to compromise on its stability. This can be achieved by extending the SON function execution coordination to SON verification and by dynamically adjusting the coordination policies between more relaxed and more strict concurrency control strategies based on the feedback from the verification.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"58 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Private VNFs for collaborative multi-operator service delivery: An architectural case 用于协作多运营商服务交付的私有VNFs:一个架构案例
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502996
G. Biczók, Balázs Sonkoly, Nikolett Bereczky, C. Boyd
Flexible service delivery is a key requirement for 5G network architectures. This includes the support for collaborative service delivery by multiple operators, when an individual operator lacks the geographical footprint or the available network, compute or storage resources to provide the requested service to its customer. Network Function Virtualisation is a key enabler of such service delivery, as network functions (VNFs) can be outsourced to other operators. Owing to the (partial lack of) contractual relationships and co-opetition in the ecosystem, the privacy of user data, operator policy and even VNF code could be compromised. In this paper, we present a case for privacy in a VNF-enabled collaborative service delivery architecture. Specifically, we show the promise of homomorphic encryption (HE) in this context and its performance limitations through a proof of concept implementation of an image transcoder network function. Furthermore, inspired by application-specific encryption techniques, we propose a way forward for private, payload-intensive VNFs.
灵活的服务交付是5G网络架构的关键要求。这包括当单个运营商缺乏地理覆盖或可用网络、计算或存储资源来为客户提供所需服务时,对多个运营商协同服务交付的支持。网络功能虚拟化是这种服务交付的关键推动者,因为网络功能(vnf)可以外包给其他运营商。由于生态系统中(部分缺乏)合同关系和合作竞争,用户数据的隐私、运营商政策甚至VNF代码都可能受到损害。在本文中,我们提出了一个支持vnf的协作服务交付体系结构中的隐私案例。具体来说,我们通过图像转码器网络功能的概念验证实现,展示了同态加密(HE)在这种情况下的前景及其性能限制。此外,受特定于应用程序的加密技术的启发,我们提出了一种用于私有、有效负载密集型VNFs的方法。
{"title":"Private VNFs for collaborative multi-operator service delivery: An architectural case","authors":"G. Biczók, Balázs Sonkoly, Nikolett Bereczky, C. Boyd","doi":"10.1109/NOMS.2016.7502996","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502996","url":null,"abstract":"Flexible service delivery is a key requirement for 5G network architectures. This includes the support for collaborative service delivery by multiple operators, when an individual operator lacks the geographical footprint or the available network, compute or storage resources to provide the requested service to its customer. Network Function Virtualisation is a key enabler of such service delivery, as network functions (VNFs) can be outsourced to other operators. Owing to the (partial lack of) contractual relationships and co-opetition in the ecosystem, the privacy of user data, operator policy and even VNF code could be compromised. In this paper, we present a case for privacy in a VNF-enabled collaborative service delivery architecture. Specifically, we show the promise of homomorphic encryption (HE) in this context and its performance limitations through a proof of concept implementation of an image transcoder network function. Furthermore, inspired by application-specific encryption techniques, we propose a way forward for private, payload-intensive VNFs.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127723621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ITSA: Internet traffic statistics archive 资讯科技管理局:互联网流量统计档案
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502940
M. Hoogesteger, R. Schmidt, A. Pras
Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on highlevel statistics of Internet traffic worldwide. Examples of statistics are shares of traffic per port, protocols and distribution of packets and bytes. Such information can be of great help to those that need to support claims and assumptions on what Internet traffic actually looks like. The reports containing traffic statistics are generated on a weekly basis from NetFlow data, and publicly published on the ITSA website. In this demo we will present the ITSA architecture, how it can be used, and how the available data can help to visualize and understand trends in Internet traffic.
鉴于全面和长期的互联网流量测量很难获得,我们提出并发展了互联网流量统计档案(ITSA)。自2013年以来,ITSA专注于全球互联网流量的高级统计报告。统计数据的示例包括每个端口的流量份额、协议以及数据包和字节的分布。这些信息对那些需要支持关于互联网流量实际情况的主张和假设的人有很大的帮助。这些载有交通统计数据的报告是根据NetFlow数据每周生成的,并在交通运输管理局网站上公开公布。在本演示中,我们将介绍ITSA体系结构,如何使用它,以及可用数据如何帮助可视化和理解Internet流量的趋势。
{"title":"ITSA: Internet traffic statistics archive","authors":"M. Hoogesteger, R. Schmidt, A. Pras","doi":"10.1109/NOMS.2016.7502940","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502940","url":null,"abstract":"Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on highlevel statistics of Internet traffic worldwide. Examples of statistics are shares of traffic per port, protocols and distribution of packets and bytes. Such information can be of great help to those that need to support claims and assumptions on what Internet traffic actually looks like. The reports containing traffic statistics are generated on a weekly basis from NetFlow data, and publicly published on the ITSA website. In this demo we will present the ITSA architecture, how it can be used, and how the available data can help to visualize and understand trends in Internet traffic.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1