首页 > 最新文献

NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium最新文献

英文 中文
Coordinated scheduling via frequency and power allocation optimization in LTE cellular networks LTE蜂窝网络中基于频率和功率分配优化的协调调度
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502795
Nessrine Trabelsi, Chung Shue Chen, L. Roullet, E. Altman, R. E. Azouzi
Due to Orthogonal Frequency Division Multiple Access (OFDMA) mechanism adopted in LTE cellular networks, intra-cell interference is nearly absent. Yet, as these networks are designed for a frequency reuse factor of 1 to maximize the utilization of the licensed bandwidth, inter-cell interference coordination remains an important challenge. In both homogeneous and heterogeneous cellular networks, there is a need for scheduling coordination techniques to efficiently distribute the resources and mitigate inter-cell interference. In this paper, we propose a dynamic solution of inter-cell interference coordination performing an optimization of frequency sub-band reuse and transmission power in order to maximize the overall network utility. The proposed framework, based on game theory, permits to dynamically define frequency and transmission power patterns for each cell in the coordinated cluster. Simulation results show significant benefits in average throughput and also cell edge user throughput of 40% and 55% gains when performing the frequency sub-band muting and power control. Furthermore, we also obtain a meaningful improvement in energy efficiency.
由于LTE蜂窝网络采用正交频分多址(OFDMA)机制,因此几乎不存在蜂窝内干扰。然而,由于这些网络的频率复用系数为1,以最大限度地利用许可带宽,因此小区间干扰协调仍然是一个重要的挑战。在同构和异构蜂窝网络中,都需要调度协调技术来有效地分配资源和减轻蜂窝间的干扰。本文提出一种小区间干扰协调的动态解决方案,通过优化频率子带复用和传输功率,使网络整体效用最大化。该框架基于博弈论,允许动态定义协调集群中每个小区的频率和发射功率模式。仿真结果表明,当执行频率子带静音和功率控制时,平均吞吐量和小区边缘用户吞吐量分别提高40%和55%。此外,我们还获得了能源效率的显著提高。
{"title":"Coordinated scheduling via frequency and power allocation optimization in LTE cellular networks","authors":"Nessrine Trabelsi, Chung Shue Chen, L. Roullet, E. Altman, R. E. Azouzi","doi":"10.1109/NOMS.2016.7502795","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502795","url":null,"abstract":"Due to Orthogonal Frequency Division Multiple Access (OFDMA) mechanism adopted in LTE cellular networks, intra-cell interference is nearly absent. Yet, as these networks are designed for a frequency reuse factor of 1 to maximize the utilization of the licensed bandwidth, inter-cell interference coordination remains an important challenge. In both homogeneous and heterogeneous cellular networks, there is a need for scheduling coordination techniques to efficiently distribute the resources and mitigate inter-cell interference. In this paper, we propose a dynamic solution of inter-cell interference coordination performing an optimization of frequency sub-band reuse and transmission power in order to maximize the overall network utility. The proposed framework, based on game theory, permits to dynamically define frequency and transmission power patterns for each cell in the coordinated cluster. Simulation results show significant benefits in average throughput and also cell edge user throughput of 40% and 55% gains when performing the frequency sub-band muting and power control. Furthermore, we also obtain a meaningful improvement in energy efficiency.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125607498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Supporting end-to-end connectivity in federated networks using SDN 支持使用SDN的联邦网络中的端到端连接
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502893
Roberto di Lallo, Gabriele Lospoto, M. Rimondini, G. Battista
Federated networking is a promising approach to resource sharing that supports cost-effective services involving multiple parties. Research in this field largely focused on architectures and cost models, making limited progress on the technological side. On the other hand, the widely adopted Software-Defined Networking (SDN) model found its most successful application in data centers, exhibiting very little penetration in other scenarios. We leverage the unexplored potential of SDN on the edge of a network to introduce an approach that supports end-to-end connectivity among different federated partners. Our approach is based on simple Network Address and Port Translation (NAPT), making it applicable in standard IP networks. It is also very flexible, because it exploits SDN, and scalable, because address translations are performed on Customer Premises Equipment, where SDN is being progressively supported by device vendors. We define various alternative NAPT strategies and evaluate their effectiveness with simulations as well as emulated scenarios.
联邦网络是一种很有前途的资源共享方法,它支持涉及多方的经济有效的服务。该领域的研究主要集中在架构和成本模型上,在技术方面进展有限。另一方面,广泛采用的软件定义网络(SDN)模型在数据中心得到了最成功的应用,而在其他场景中渗透很少。我们利用SDN在网络边缘未开发的潜力,引入一种支持不同联邦合作伙伴之间端到端连接的方法。我们的方法是基于简单的网络地址和端口转换(NAPT),使其适用于标准的IP网络。它也非常灵活,因为它利用了SDN,并且可扩展,因为地址转换是在客户端设备上执行的,其中SDN正逐步得到设备供应商的支持。我们定义了各种备选NAPT策略,并通过模拟和模拟场景评估了它们的有效性。
{"title":"Supporting end-to-end connectivity in federated networks using SDN","authors":"Roberto di Lallo, Gabriele Lospoto, M. Rimondini, G. Battista","doi":"10.1109/NOMS.2016.7502893","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502893","url":null,"abstract":"Federated networking is a promising approach to resource sharing that supports cost-effective services involving multiple parties. Research in this field largely focused on architectures and cost models, making limited progress on the technological side. On the other hand, the widely adopted Software-Defined Networking (SDN) model found its most successful application in data centers, exhibiting very little penetration in other scenarios. We leverage the unexplored potential of SDN on the edge of a network to introduce an approach that supports end-to-end connectivity among different federated partners. Our approach is based on simple Network Address and Port Translation (NAPT), making it applicable in standard IP networks. It is also very flexible, because it exploits SDN, and scalable, because address translations are performed on Customer Premises Equipment, where SDN is being progressively supported by device vendors. We define various alternative NAPT strategies and evaluate their effectiveness with simulations as well as emulated scenarios.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126747188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Maximizing lifetime of multiple data aggregation trees in wireless sensor networks 无线传感器网络中多数据聚合树的生存期最大化
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502865
H. Matsuura
Sensor data aggregation trees in a wireless sensor network (WSN) are used to gather data from an area that the WSN covers. In this paper, a hierarchical sensor network routing is proposed in which a base station (BS) cooperates with its underlying multiple cluster heads (CHs) to determine the best routes in each tree-cluster. A routing metric proposed in this paper represents the rate of energy increase on a tree when a new sensor is connected to the tree, and the BS can always select the smallest metric route among all the trees; thus, the architecture can reduce the energy consumption of the trees and extend their lifetime significantly. In addition, the proposed routing sets a backup route for each primary route on a tree by choosing the second smallest metric route after the primary route. Therefore, the lifetime of aggregation trees even after some percentage of sensors die is longer compared with other routings.
在无线传感器网络(WSN)中,传感器数据聚合树用于从该无线传感器网络覆盖的区域收集数据。本文提出了一种分层传感器网络路由方法,其中基站(BS)与其底层的多个簇头(CHs)合作确定每个树簇中的最佳路由。本文提出的路由度量表示当一个新的传感器连接到树上时,树上的能量增加速率,并且BS总是在所有树中选择最小的度量路由;因此,该建筑可以减少树木的能源消耗,并显着延长其寿命。此外,该路由通过选择度量值仅次于主路由的第二小路由,为树上的每条主路由设置一条备份路由。因此,即使在一定比例的传感器死亡后,聚合树的生命周期也比其他路由长。
{"title":"Maximizing lifetime of multiple data aggregation trees in wireless sensor networks","authors":"H. Matsuura","doi":"10.1109/NOMS.2016.7502865","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502865","url":null,"abstract":"Sensor data aggregation trees in a wireless sensor network (WSN) are used to gather data from an area that the WSN covers. In this paper, a hierarchical sensor network routing is proposed in which a base station (BS) cooperates with its underlying multiple cluster heads (CHs) to determine the best routes in each tree-cluster. A routing metric proposed in this paper represents the rate of energy increase on a tree when a new sensor is connected to the tree, and the BS can always select the smallest metric route among all the trees; thus, the architecture can reduce the energy consumption of the trees and extend their lifetime significantly. In addition, the proposed routing sets a backup route for each primary route on a tree by choosing the second smallest metric route after the primary route. Therefore, the lifetime of aggregation trees even after some percentage of sensors die is longer compared with other routings.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126316510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Identifying DoS attacks on software defined networks: A relation context approach 识别软件定义网络上的DoS攻击:一种关系上下文方法
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502914
Ahmad AlEroud, I. Alsmadi
The recent emerge of Software Defined Networking (SDN) promotes both supporters and opponents to further explore this network architecture. One of the main attributes that characterize SDN is the significant role of software to manage and control the architecture. There are four major concerns for such software dominant role, security, performance, reliability, and fault tolerance. Among them security is considered a major concern. SDNs security concerns include attacks on the control plane layer such as DoS attacks. This paper presents an inference-relation context based technique for the detection of DoS attacks on SDNs. The proposed technique utilizes contextual similarity with existing attack patterns to identify DoS in an OpenFlow infrastructure. A validation of the proposed technique has been performed using a several benchmark datasets yielding promising results.
最近出现的软件定义网络(SDN)促使支持者和反对者进一步探索这种网络架构。SDN的主要特征之一是软件在管理和控制体系结构方面的重要作用。对于此类软件的主导角色,有四个主要关注点:安全性、性能、可靠性和容错性。其中,安全被认为是一个主要问题。sdn的安全问题包括对控制平面层的攻击,如DoS攻击。本文提出了一种基于推理关系上下文的sdn DoS攻击检测技术。所提出的技术利用与现有攻击模式的上下文相似性来识别OpenFlow基础设施中的DoS。使用几个基准数据集对所提出的技术进行了验证,产生了有希望的结果。
{"title":"Identifying DoS attacks on software defined networks: A relation context approach","authors":"Ahmad AlEroud, I. Alsmadi","doi":"10.1109/NOMS.2016.7502914","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502914","url":null,"abstract":"The recent emerge of Software Defined Networking (SDN) promotes both supporters and opponents to further explore this network architecture. One of the main attributes that characterize SDN is the significant role of software to manage and control the architecture. There are four major concerns for such software dominant role, security, performance, reliability, and fault tolerance. Among them security is considered a major concern. SDNs security concerns include attacks on the control plane layer such as DoS attacks. This paper presents an inference-relation context based technique for the detection of DoS attacks on SDNs. The proposed technique utilizes contextual similarity with existing attack patterns to identify DoS in an OpenFlow infrastructure. A validation of the proposed technique has been performed using a several benchmark datasets yielding promising results.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127639221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Resource allocation in optical beam-steered indoor networks 光束控制室内网络中的资源分配
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502839
M. T. Vega, J. Famaey, A. Koonen, A. Liotta
Optical Wireless (OW) technologies deploying narrow multiwavelength light beams offer a promising alternative to traditional wireless indoor communications as they provide higher bandwidths and overcome the radio spectrum congestion typical of the 2.4 and 5GHz frequency bands. However, unlocking their full potential requires exploring novel control and management techniques. Specifically, there is a need for efficient and intelligent resource management and localization techniques that allot wavelengths and capacity to devices. In this paper we present a resource allocation model for one such indoor optical wireless approach, a Beam-steered Reconfigurable Optical-Wireless System for Energy-efficient communication (BROWSE). BROWSE aims to supply each user within a room with its own downstream infrared light beam with at least 10Gbps throughput, while providing a 60GHz radio channel upstream. Using Integer Linear Programming (ILP) techniques, we have designed and implemented a resource allocation model for the BROWSE OW downstream connection. The designed model optimises the trade-off between energy-consumption and throughput, while providing TDM capabilities to effectively serve densely deployed devices with a limited number of simultaneous available wavelengths. Through several test-scenarios we have assessed the model's performance, as well as its applicability to future ultra-high bandwidth video streaming applications.
部署窄多波长光束的光学无线技术(OW)提供了传统无线室内通信的一个很有前途的替代方案,因为它们提供更高的带宽,并克服了2.4和5GHz频段典型的无线电频谱拥塞。然而,释放它们的全部潜力需要探索新的控制和管理技术。具体来说,需要高效和智能的资源管理和定位技术,为设备分配波长和容量。在本文中,我们提出了一种这样的室内光无线方法的资源分配模型,一种用于节能通信的波束导向可重构光无线系统(BROWSE)。BROWSE旨在为房间内的每个用户提供自己的下游红外光束,其吞吐量至少为10Gbps,同时提供一个60GHz的上行无线电信道。利用整数线性规划(ILP)技术,我们设计并实现了一个BROWSE OW下游连接的资源分配模型。设计的模型优化了能耗和吞吐量之间的权衡,同时提供时分复用功能,有效地为具有有限数量的同时可用波长的密集部署设备提供服务。通过几个测试场景,我们评估了该模型的性能,以及它对未来超高带宽视频流应用的适用性。
{"title":"Resource allocation in optical beam-steered indoor networks","authors":"M. T. Vega, J. Famaey, A. Koonen, A. Liotta","doi":"10.1109/NOMS.2016.7502839","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502839","url":null,"abstract":"Optical Wireless (OW) technologies deploying narrow multiwavelength light beams offer a promising alternative to traditional wireless indoor communications as they provide higher bandwidths and overcome the radio spectrum congestion typical of the 2.4 and 5GHz frequency bands. However, unlocking their full potential requires exploring novel control and management techniques. Specifically, there is a need for efficient and intelligent resource management and localization techniques that allot wavelengths and capacity to devices. In this paper we present a resource allocation model for one such indoor optical wireless approach, a Beam-steered Reconfigurable Optical-Wireless System for Energy-efficient communication (BROWSE). BROWSE aims to supply each user within a room with its own downstream infrared light beam with at least 10Gbps throughput, while providing a 60GHz radio channel upstream. Using Integer Linear Programming (ILP) techniques, we have designed and implemented a resource allocation model for the BROWSE OW downstream connection. The designed model optimises the trade-off between energy-consumption and throughput, while providing TDM capabilities to effectively serve densely deployed devices with a limited number of simultaneous available wavelengths. Through several test-scenarios we have assessed the model's performance, as well as its applicability to future ultra-high bandwidth video streaming applications.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"32 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114002811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enabling QoS in peer to peer live streaming through dynamic bandwidth or playback rate control 通过动态带宽或播放速率控制实现对等直播的QoS功能
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502875
Maria Efthymiopoulou, N. Efthymiopoulos, Athanasios Christakidis
Live video streaming over internet is becoming popular more and more. Current commercial live video streaming systems are based either on a typical client-server (cloud) or on a peer-to-peer (P2P) architecture. The former is preferred for stability and QoS, provided that the system is not stretched beyond the server's bandwidth capacity, while the latter is scalable with small bandwidth and management cost. In this paper, we stabilize live streaming with a cloud assisted P2P live streaming system without sacrificing scalability. In order to achieve this we develop: i) a scalable gossip protocol with low bandwidth overhead for the cloud that monitors dynamically the total available bandwidth resources of the participating peers, ii) a control strategy that dynamically allocates from the cloud the exact amount of required bandwidth in order to guarantee the complete and on time stream distribution, iii) an alternative control strategy that dynamically adapts the playback rate to the available bandwidth resources. All these are achieved by modeling analytically through difference equations the dynamic relationship between the total bandwidth surplus (idle peers' bandwidth) and the playback rate. Finally, we evaluate our proposed architecture in a packet level simulator of a complete P2P live streaming system that designed in OPNET Modeler. Our evaluation testifies the uninterrupted and complete stream delivery even in adverse bandwidth changes.
网络视频直播越来越受欢迎。当前的商业直播视频流系统要么基于典型的客户机-服务器(云),要么基于点对点(P2P)架构。在保证系统不超出服务器的带宽容量的前提下,前者在稳定性和QoS方面优先考虑;后者具有可扩展性,带宽小,管理成本低。在本文中,我们在不牺牲可扩展性的情况下,使用云辅助P2P直播系统来稳定直播。为了实现这一目标,我们开发了:i)一个具有低带宽开销的可扩展八卦协议,用于动态监控参与节点的总可用带宽资源,ii)一种控制策略,可以从云中动态分配所需带宽的确切数量,以保证完整和准时的流分发,iii)一种替代控制策略,可以动态调整播放速率以适应可用带宽资源。所有这些都是通过差分方程对总带宽剩余(空闲对等体带宽)与重放率之间的动态关系进行解析建模实现的。最后,我们在OPNET Modeler设计的完整P2P直播系统的数据包级模拟器中评估了我们提出的架构。我们的评估证明了即使在不利的带宽变化下也可以不间断和完整地传输流。
{"title":"Enabling QoS in peer to peer live streaming through dynamic bandwidth or playback rate control","authors":"Maria Efthymiopoulou, N. Efthymiopoulos, Athanasios Christakidis","doi":"10.1109/NOMS.2016.7502875","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502875","url":null,"abstract":"Live video streaming over internet is becoming popular more and more. Current commercial live video streaming systems are based either on a typical client-server (cloud) or on a peer-to-peer (P2P) architecture. The former is preferred for stability and QoS, provided that the system is not stretched beyond the server's bandwidth capacity, while the latter is scalable with small bandwidth and management cost. In this paper, we stabilize live streaming with a cloud assisted P2P live streaming system without sacrificing scalability. In order to achieve this we develop: i) a scalable gossip protocol with low bandwidth overhead for the cloud that monitors dynamically the total available bandwidth resources of the participating peers, ii) a control strategy that dynamically allocates from the cloud the exact amount of required bandwidth in order to guarantee the complete and on time stream distribution, iii) an alternative control strategy that dynamically adapts the playback rate to the available bandwidth resources. All these are achieved by modeling analytically through difference equations the dynamic relationship between the total bandwidth surplus (idle peers' bandwidth) and the playback rate. Finally, we evaluate our proposed architecture in a packet level simulator of a complete P2P live streaming system that designed in OPNET Modeler. Our evaluation testifies the uninterrupted and complete stream delivery even in adverse bandwidth changes.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114571969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
nDEWS: A new domains early warning system for TLDs nDEWS:一个新的顶级域名预警系统
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502961
G. Moura, M. Müller, M. Wullink, Cristian Hesselman
We present nDEWS, a Hadoop-based automatic early warning system of malicious domains for domain name registry operators, such as top-level domain (TLD) registries. By monitoring an entire DNS zone, nDEWS is able to single out newly added suspicious domains by analyzing both domain registration and global DNS lookup patterns of a TLD. nDEWS is capable to detect several types of domain abuse, such as malware, phishing, and allegedly fraudulent web shops. To act on this data, we have established a pilot study with two major .nl registrars, and provide them with daily feeds of their respective suspicious domains. Moreover, nDEWS can also be implemented by other TLD operators/registries.
我们提出了nDEWS,一个基于hadoop的恶意域名自动预警系统,用于域名注册管理机构,如顶级域名(TLD)注册管理机构。通过监控整个DNS区域,nDEWS能够通过分析域名注册和TLD的全局DNS查找模式来挑出新添加的可疑域名。nDEWS能够检测几种类型的域名滥用,例如恶意软件、网络钓鱼和涉嫌欺诈的网络商店。为了对这些数据采取行动,我们与两家主要的。nl注册商建立了一项试点研究,并向他们提供各自可疑域名的每日提要。此外,nDEWS也可以由其他顶级域名运营商/注册管理机构实施。
{"title":"nDEWS: A new domains early warning system for TLDs","authors":"G. Moura, M. Müller, M. Wullink, Cristian Hesselman","doi":"10.1109/NOMS.2016.7502961","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502961","url":null,"abstract":"We present nDEWS, a Hadoop-based automatic early warning system of malicious domains for domain name registry operators, such as top-level domain (TLD) registries. By monitoring an entire DNS zone, nDEWS is able to single out newly added suspicious domains by analyzing both domain registration and global DNS lookup patterns of a TLD. nDEWS is capable to detect several types of domain abuse, such as malware, phishing, and allegedly fraudulent web shops. To act on this data, we have established a pilot study with two major .nl registrars, and provide them with daily feeds of their respective suspicious domains. Moreover, nDEWS can also be implemented by other TLD operators/registries.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121502088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
BotTracer: Bot user detection using clustering method in RecDroid 僵尸跟踪器:在RecDroid中使用聚类方法进行僵尸用户检测
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502994
Bahman Rashidi, Carol J. Fung
RecDroid is a smartphone permission management system which provides users with a fine-grained real-time app permission control and a recommendation system regarding whether to grant the permission or not based on expert users' responses in the network. However, in such a system, malware owners may create multiple bot users to misguide the recommendation system by providing untruthful responses on the malicious app. Threshold-based detection method can detect malicious users which are dishonest on many apps, but it cannot detect malicious users that target on some specific apps. In this work, we present a clustering-based method called BotTracer to finding groups of bot users controlled by the same masters, which can be used to detect bot users with high reputation scores. The key part of the proposed method is to map the users into a graph based on their similarity and apply a clustering algorithm to group users together. We evaluate our method using a set of simulated users' profiles, including malicious users and regular ones. Our experimental results demonstrate high accuracy in terms of detecting malicious users. Finally, we discuss several clustering features and their impact on the clustering results.
RecDroid是一款智能手机权限管理系统,为用户提供细粒度的实时应用权限控制,并根据网络中专家用户的反应,提供是否授予权限的推荐系统。然而,在这样的系统中,恶意软件所有者可能会创建多个bot用户,通过在恶意应用上提供不真实的响应来误导推荐系统。基于阈值的检测方法可以检测到在许多应用上不诚实的恶意用户,但无法检测到针对某些特定应用的恶意用户。在这项工作中,我们提出了一种基于聚类的方法,称为BotTracer,用于寻找由同一主控制的bot用户组,该方法可用于检测具有高声誉分数的bot用户。该方法的关键部分是根据用户的相似度将用户映射到一个图中,并应用聚类算法对用户进行分组。我们使用一组模拟用户的配置文件来评估我们的方法,包括恶意用户和普通用户。实验结果表明,该方法在检测恶意用户方面具有较高的准确性。最后,我们讨论了几个聚类特征及其对聚类结果的影响。
{"title":"BotTracer: Bot user detection using clustering method in RecDroid","authors":"Bahman Rashidi, Carol J. Fung","doi":"10.1109/NOMS.2016.7502994","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502994","url":null,"abstract":"RecDroid is a smartphone permission management system which provides users with a fine-grained real-time app permission control and a recommendation system regarding whether to grant the permission or not based on expert users' responses in the network. However, in such a system, malware owners may create multiple bot users to misguide the recommendation system by providing untruthful responses on the malicious app. Threshold-based detection method can detect malicious users which are dishonest on many apps, but it cannot detect malicious users that target on some specific apps. In this work, we present a clustering-based method called BotTracer to finding groups of bot users controlled by the same masters, which can be used to detect bot users with high reputation scores. The key part of the proposed method is to map the users into a graph based on their similarity and apply a clustering algorithm to group users together. We evaluate our method using a set of simulated users' profiles, including malicious users and regular ones. Our experimental results demonstrate high accuracy in terms of detecting malicious users. Finally, we discuss several clustering features and their impact on the clustering results.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126094463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Private VNFs for collaborative multi-operator service delivery: An architectural case 用于协作多运营商服务交付的私有VNFs:一个架构案例
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502996
G. Biczók, Balázs Sonkoly, Nikolett Bereczky, C. Boyd
Flexible service delivery is a key requirement for 5G network architectures. This includes the support for collaborative service delivery by multiple operators, when an individual operator lacks the geographical footprint or the available network, compute or storage resources to provide the requested service to its customer. Network Function Virtualisation is a key enabler of such service delivery, as network functions (VNFs) can be outsourced to other operators. Owing to the (partial lack of) contractual relationships and co-opetition in the ecosystem, the privacy of user data, operator policy and even VNF code could be compromised. In this paper, we present a case for privacy in a VNF-enabled collaborative service delivery architecture. Specifically, we show the promise of homomorphic encryption (HE) in this context and its performance limitations through a proof of concept implementation of an image transcoder network function. Furthermore, inspired by application-specific encryption techniques, we propose a way forward for private, payload-intensive VNFs.
灵活的服务交付是5G网络架构的关键要求。这包括当单个运营商缺乏地理覆盖或可用网络、计算或存储资源来为客户提供所需服务时,对多个运营商协同服务交付的支持。网络功能虚拟化是这种服务交付的关键推动者,因为网络功能(vnf)可以外包给其他运营商。由于生态系统中(部分缺乏)合同关系和合作竞争,用户数据的隐私、运营商政策甚至VNF代码都可能受到损害。在本文中,我们提出了一个支持vnf的协作服务交付体系结构中的隐私案例。具体来说,我们通过图像转码器网络功能的概念验证实现,展示了同态加密(HE)在这种情况下的前景及其性能限制。此外,受特定于应用程序的加密技术的启发,我们提出了一种用于私有、有效负载密集型VNFs的方法。
{"title":"Private VNFs for collaborative multi-operator service delivery: An architectural case","authors":"G. Biczók, Balázs Sonkoly, Nikolett Bereczky, C. Boyd","doi":"10.1109/NOMS.2016.7502996","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502996","url":null,"abstract":"Flexible service delivery is a key requirement for 5G network architectures. This includes the support for collaborative service delivery by multiple operators, when an individual operator lacks the geographical footprint or the available network, compute or storage resources to provide the requested service to its customer. Network Function Virtualisation is a key enabler of such service delivery, as network functions (VNFs) can be outsourced to other operators. Owing to the (partial lack of) contractual relationships and co-opetition in the ecosystem, the privacy of user data, operator policy and even VNF code could be compromised. In this paper, we present a case for privacy in a VNF-enabled collaborative service delivery architecture. Specifically, we show the promise of homomorphic encryption (HE) in this context and its performance limitations through a proof of concept implementation of an image transcoder network function. Furthermore, inspired by application-specific encryption techniques, we propose a way forward for private, payload-intensive VNFs.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127723621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
ITSA: Internet traffic statistics archive 资讯科技管理局:互联网流量统计档案
Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502940
M. Hoogesteger, R. Schmidt, A. Pras
Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on highlevel statistics of Internet traffic worldwide. Examples of statistics are shares of traffic per port, protocols and distribution of packets and bytes. Such information can be of great help to those that need to support claims and assumptions on what Internet traffic actually looks like. The reports containing traffic statistics are generated on a weekly basis from NetFlow data, and publicly published on the ITSA website. In this demo we will present the ITSA architecture, how it can be used, and how the available data can help to visualize and understand trends in Internet traffic.
鉴于全面和长期的互联网流量测量很难获得,我们提出并发展了互联网流量统计档案(ITSA)。自2013年以来,ITSA专注于全球互联网流量的高级统计报告。统计数据的示例包括每个端口的流量份额、协议以及数据包和字节的分布。这些信息对那些需要支持关于互联网流量实际情况的主张和假设的人有很大的帮助。这些载有交通统计数据的报告是根据NetFlow数据每周生成的,并在交通运输管理局网站上公开公布。在本演示中,我们将介绍ITSA体系结构,如何使用它,以及可用数据如何帮助可视化和理解Internet流量的趋势。
{"title":"ITSA: Internet traffic statistics archive","authors":"M. Hoogesteger, R. Schmidt, A. Pras","doi":"10.1109/NOMS.2016.7502940","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502940","url":null,"abstract":"Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on highlevel statistics of Internet traffic worldwide. Examples of statistics are shares of traffic per port, protocols and distribution of packets and bytes. Such information can be of great help to those that need to support claims and assumptions on what Internet traffic actually looks like. The reports containing traffic statistics are generated on a weekly basis from NetFlow data, and publicly published on the ITSA website. In this demo we will present the ITSA architecture, how it can be used, and how the available data can help to visualize and understand trends in Internet traffic.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127877810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1