首页 > 最新文献

International Conference of Future Internet最新文献

英文 中文
A Framework for the Analysis of BGP Data over Long Timescales 一种长时间尺度BGP数据分析框架
Pub Date : 2016-06-15 DOI: 10.1145/2935663.2935680
Geng Zhang, Dahua Zhang, Lei Lu, Min Zhu
BGP data are very important for understanding the dynamics of the inter domain routing. With the development of Internet, the routing data that BGP routers deals with are increasing dramatically. Nowadays, the most important factor to restrict the research process for general scientific researchers is how to deal with the large volume metadata of TB sizes. Not to mention that metadata sizes can be times larger after decompression. In this paper, we address this problem by presenting a framework, which can deal with large volume of data and extract potential information. What's more, it as well reveals some characteristics of the inter domain routing over long timescale.
BGP数据对于理解域间路由的动态非常重要。随着Internet的发展,BGP路由器处理的路由数据急剧增加。当前,制约普通科研人员科研进程的最重要因素是如何处理TB量级的海量元数据。更不用说解压缩后的元数据大小可能会大几倍。在本文中,我们通过提出一个框架来解决这个问题,该框架可以处理大量数据并提取潜在信息。此外,还揭示了跨域路由在长时间尺度上的一些特点。
{"title":"A Framework for the Analysis of BGP Data over Long Timescales","authors":"Geng Zhang, Dahua Zhang, Lei Lu, Min Zhu","doi":"10.1145/2935663.2935680","DOIUrl":"https://doi.org/10.1145/2935663.2935680","url":null,"abstract":"BGP data are very important for understanding the dynamics of the inter domain routing. With the development of Internet, the routing data that BGP routers deals with are increasing dramatically. Nowadays, the most important factor to restrict the research process for general scientific researchers is how to deal with the large volume metadata of TB sizes. Not to mention that metadata sizes can be times larger after decompression. In this paper, we address this problem by presenting a framework, which can deal with large volume of data and extract potential information. What's more, it as well reveals some characteristics of the inter domain routing over long timescale.","PeriodicalId":409750,"journal":{"name":"International Conference of Future Internet","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125240524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coins in cloud drives can use OAuth for micropayments and resource metering alike 云驱动器中的硬币可以使用OAuth进行小额支付和资源计量
Pub Date : 2014-06-18 DOI: 10.1145/2619287.2619304
M. Zhanikeev
Resource metering in distributed environments is notoriously difficult. In clouds, the metering technology has to be distributed by design. This paper shows that the technology used for (financial) micropayments fulfills several objectives of the new metering process once the concept of money is replaced with the concept of a resource. Like in micropayments, resource metering in clouds is often a 3-party relationship like that among cloud provider, service provider and customer. The technology proposed in this paper can be viewed both as a better alternative to traditional micropayments as well as a new way to meter resource usage in clouds.
分布式环境中的资源计量非常困难。在云计算中,计量技术必须按照设计进行分布。本文表明,一旦金钱的概念被资源的概念所取代,用于(金融)小额支付的技术实现了新计量过程的几个目标。与小额支付一样,云中的资源计量通常是云提供商、服务提供商和客户之间的三方关系。本文中提出的技术既可以被视为传统小额支付的更好替代方案,也可以被视为云计算中衡量资源使用情况的新方法。
{"title":"Coins in cloud drives can use OAuth for micropayments and resource metering alike","authors":"M. Zhanikeev","doi":"10.1145/2619287.2619304","DOIUrl":"https://doi.org/10.1145/2619287.2619304","url":null,"abstract":"Resource metering in distributed environments is notoriously difficult. In clouds, the metering technology has to be distributed by design. This paper shows that the technology used for (financial) micropayments fulfills several objectives of the new metering process once the concept of money is replaced with the concept of a resource. Like in micropayments, resource metering in clouds is often a 3-party relationship like that among cloud provider, service provider and customer. The technology proposed in this paper can be viewed both as a better alternative to traditional micropayments as well as a new way to meter resource usage in clouds.","PeriodicalId":409750,"journal":{"name":"International Conference of Future Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130643978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
User-defined actions for SDN 自定义的SDN动作
Pub Date : 2014-06-18 DOI: 10.1145/2619287.2619292
H. Farhadi, P. Du, A. Nakao
In Software-Defined Networking (SDN), the control plane can program the data plane via SDN open APIs such as OpenFlow. An OpenFlow-like data plane applies rules to every packet. However, it only supports a few actions that are all predefined and hardcoded to a piece of hardware in SDN switch. We argue that we should extend the programmability and flexibility of SDN to the data plane to allow network owners to add their custom network functions while keeping the programability of existing SDN. Since current OpenFlow actions are not sufficient and flexible, we posit we need user-defined actions deployed within the switch box rather than an external equipment (e.g., Fire-wall). Finally, we study the feasibility of two sample user-defined actions (i.e., Portscan detector and Botminer detector) using two different underlying mechanisms: OpenFlow and our previous work, TagFlow. Our evaluations show that user-defined actions are capable of handling traffic at line speed. Moreover, we also indicate that TagFlow user-defined actions are 33% faster than OpenFlow. We concluded that extending SDN features to include user-defined actions is lightweight and feasible.
在SDN (Software-Defined Networking)中,控制平面可以通过OpenFlow等SDN开放api对数据平面进行编程。类似openflow的数据平面对每个数据包应用规则。然而,它只支持一些预定义的操作,这些操作都是硬编码到SDN交换机中的一块硬件上的。我们认为我们应该将SDN的可编程性和灵活性扩展到数据平面,以允许网络所有者在保持现有SDN的可编程性的同时添加他们自定义的网络功能。由于目前的OpenFlow动作不够充分和灵活,我们假设我们需要在开关箱中部署用户定义的动作,而不是外部设备(例如防火墙)。最后,我们研究了使用两种不同的底层机制(OpenFlow和我们之前的工作,TagFlow)的两个示例用户定义动作(即Portscan检测器和Botminer检测器)的可行性。我们的评估表明,用户定义的操作能够以线路速度处理流量。此外,我们还指出TagFlow用户定义的动作比OpenFlow快33%。我们的结论是,扩展SDN功能以包含用户定义的操作是轻量级且可行的。
{"title":"User-defined actions for SDN","authors":"H. Farhadi, P. Du, A. Nakao","doi":"10.1145/2619287.2619292","DOIUrl":"https://doi.org/10.1145/2619287.2619292","url":null,"abstract":"In Software-Defined Networking (SDN), the control plane can program the data plane via SDN open APIs such as OpenFlow. An OpenFlow-like data plane applies <match, action> rules to every packet. However, it only supports a few actions that are all predefined and hardcoded to a piece of hardware in SDN switch. We argue that we should extend the programmability and flexibility of SDN to the data plane to allow network owners to add their custom network functions while keeping the programability of existing SDN. Since current OpenFlow actions are not sufficient and flexible, we posit we need user-defined actions deployed within the switch box rather than an external equipment (e.g., Fire-wall). Finally, we study the feasibility of two sample user-defined actions (i.e., Portscan detector and Botminer detector) using two different underlying mechanisms: OpenFlow and our previous work, TagFlow. Our evaluations show that user-defined actions are capable of handling traffic at line speed. Moreover, we also indicate that TagFlow user-defined actions are 33% faster than OpenFlow. We concluded that extending SDN features to include user-defined actions is lightweight and feasible.","PeriodicalId":409750,"journal":{"name":"International Conference of Future Internet","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128053933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Radio resource efficient cellular broadcast networks 无线资源高效蜂窝广播网络
Pub Date : 2014-06-18 DOI: 10.1145/2619287.2619310
Jihong Park, S. Yu, Seong-Lyun Kim
Rapid and relentless video traffic growth has brought about network congestion. To alleviate the problem, this paper considers a video content broadcast cellular network via the same frequency channels, enabling to save radio resource compared to the conventional unicast networks. We investigates its efficient resource usage for different user demand by means of stochastic geometric analysis. Consequently, we analytically verify increasing popularity of broadcast contents makes radio resource usage more efficient while decreasing the amount of waste radio resources.
快速而无情的视频流量增长带来了网络拥塞。为了解决这一问题,本文提出了一种基于同频信道的视频内容广播蜂窝网络,与传统的单播网络相比,可以节省无线资源。采用随机几何分析的方法研究了不同用户需求下的有效资源利用情况。因此,我们分析验证了广播内容的日益普及使无线电资源的使用更有效,同时减少了浪费无线电资源的数量。
{"title":"Radio resource efficient cellular broadcast networks","authors":"Jihong Park, S. Yu, Seong-Lyun Kim","doi":"10.1145/2619287.2619310","DOIUrl":"https://doi.org/10.1145/2619287.2619310","url":null,"abstract":"Rapid and relentless video traffic growth has brought about network congestion. To alleviate the problem, this paper considers a video content broadcast cellular network via the same frequency channels, enabling to save radio resource compared to the conventional unicast networks. We investigates its efficient resource usage for different user demand by means of stochastic geometric analysis. Consequently, we analytically verify increasing popularity of broadcast contents makes radio resource usage more efficient while decreasing the amount of waste radio resources.","PeriodicalId":409750,"journal":{"name":"International Conference of Future Internet","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133905738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Future internet issues from the perspective of a generic network model 从通用网络模型的角度探讨未来互联网问题
Pub Date : 2014-06-18 DOI: 10.1145/2619287.2619302
Heeyoung Jung
This paper analyzes Future Internet issues from the perspective of a generic network model. The generic network model is developed by identifying the essential objects and bindings for data communication. Based on this model, this paper identifies the problems of the current Internet and develops some requirements for Future Internet architecture design. Also this paper shows how the generic model can be used to address recent network issues.
本文从通用网络模型的角度分析了未来互联网的问题。通过识别用于数据通信的基本对象和绑定,开发了通用网络模型。在此基础上,本文明确了当前Internet存在的问题,提出了对未来Internet架构设计的一些要求。此外,本文还展示了如何使用通用模型来解决最近的网络问题。
{"title":"Future internet issues from the perspective of a generic network model","authors":"Heeyoung Jung","doi":"10.1145/2619287.2619302","DOIUrl":"https://doi.org/10.1145/2619287.2619302","url":null,"abstract":"This paper analyzes Future Internet issues from the perspective of a generic network model. The generic network model is developed by identifying the essential objects and bindings for data communication. Based on this model, this paper identifies the problems of the current Internet and develops some requirements for Future Internet architecture design. Also this paper shows how the generic model can be used to address recent network issues.","PeriodicalId":409750,"journal":{"name":"International Conference of Future Internet","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133104898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content-hierarchical intra-domain cooperative caching for information-centric networks 面向信息中心网络的内容分层域内协同缓存
Pub Date : 2014-06-18 DOI: 10.1145/2619287.2619289
Jia Ji, Mingwei Xu, Yuan Yang
Information-centric networking (ICN) is a clean-slate network architecture to achieve efficient content transmissions. In-network caching is an important issue in ICN, since the routers have a limited caching capacity. Several approaches have been proposed to reduce the cache redundancy, and increase the cache hit ratio and the user delay. Most approaches design algorithms for single routers, and there are still redundant caches in an AS. In this paper, we propose the content-hierarchical Intra-Domain Cooperative Caching (IDCC) scheme to solve the problem, based on the observation that the time of access contents within the local AS is much shorter than that of access contents outside. We use probabilistic caching based on inlet traffic speed, and avoid unnecessary replicas by intra-domain cooperation based on content advertisements. We use hierarchical caching based on content popularity to improve the performance. Our scheme is different from other intra-domain cooperation schemes which remove redundant replicas after contents have been cached. We evaluate our scheme with simulations. The results show that IDCC can improve the hit ratio by 1.7 times and 1.1 times compared to two common existing schemes, respectively.
信息中心网络(ICN)是一种全新的网络体系结构,可实现高效的内容传输。网络内缓存是ICN中的一个重要问题,因为路由器的缓存容量有限。为了减少缓存冗余,提高缓存命中率和用户延迟,提出了几种方法。大多数方法为单个路由器设计算法,并且在自治系统中仍然存在冗余缓存。本文基于对本地自治系统内访问内容的时间比访问外部内容的时间短的观察,提出了内容分层域内协同缓存(IDCC)方案来解决这一问题。我们使用基于入口流量速度的概率缓存,并通过基于内容广告的域内合作来避免不必要的副本。我们使用基于内容流行度的分层缓存来提高性能。我们的方案不同于其他域内协作方案,即在内容缓存后删除冗余副本。我们用模拟来评估我们的方案。结果表明,与现有的两种常用方案相比,IDCC方案的命中率分别提高了1.7倍和1.1倍。
{"title":"Content-hierarchical intra-domain cooperative caching for information-centric networks","authors":"Jia Ji, Mingwei Xu, Yuan Yang","doi":"10.1145/2619287.2619289","DOIUrl":"https://doi.org/10.1145/2619287.2619289","url":null,"abstract":"Information-centric networking (ICN) is a clean-slate network architecture to achieve efficient content transmissions. In-network caching is an important issue in ICN, since the routers have a limited caching capacity. Several approaches have been proposed to reduce the cache redundancy, and increase the cache hit ratio and the user delay. Most approaches design algorithms for single routers, and there are still redundant caches in an AS. In this paper, we propose the content-hierarchical Intra-Domain Cooperative Caching (IDCC) scheme to solve the problem, based on the observation that the time of access contents within the local AS is much shorter than that of access contents outside. We use probabilistic caching based on inlet traffic speed, and avoid unnecessary replicas by intra-domain cooperation based on content advertisements. We use hierarchical caching based on content popularity to improve the performance. Our scheme is different from other intra-domain cooperation schemes which remove redundant replicas after contents have been cached. We evaluate our scheme with simulations. The results show that IDCC can improve the hit ratio by 1.7 times and 1.1 times compared to two common existing schemes, respectively.","PeriodicalId":409750,"journal":{"name":"International Conference of Future Internet","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121047712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
In-network cache simulations based on a YouTube traffic analysis at the edge network 基于边缘网络YouTube流量分析的网络内缓存模拟
Pub Date : 2014-06-18 DOI: 10.1145/2619287.2619295
Shogo Ando, A. Nakao
Recently, with the advent of YouTube and similar video streaming websites, online video playback has gained popularity. Further, video traffic, represents the largest portion of Internet traffic. However, online video traffic contains redundant traffic due to identical video accesses. Network virtualization has been studied and developed, which makes it possible to deploy different protocols and new functionalities over the same physical network. in-network processing, the execution of calculation processes on routers, is one of the new features enabled by network virtualization. Further, since YouTube is the largest video publishing service in the world, we analyze YouTube video playbacks at the edge network and investigate redundant traffic and its locality. Based on these recent developments and technology, we propose to reduce redundant video traffic using in-network caching by positing video caches on routers. This cache could be moved to other routers according to users' access. In this paper, we analyze redundant YouTube video accesses and perform in-network cache simulations. According to these simulations, in-network caching can be optimized to reduce not only incoming traffic to the edge network by 42.2%, but also download traffic inside the network by up to 18.9%, with the only cost being an increase of 6.6% additional upload traffic inside the network. The result also demonstrates the presence of the locality of video accesses at the edge network.
最近,随着YouTube和类似视频流媒体网站的出现,在线视频播放越来越受欢迎。此外,视频流量占互联网流量的最大部分。但是,由于视频访问相同,在线视频流量中存在冗余流量。网络虚拟化已经被研究和开发,这使得在相同的物理网络上部署不同的协议和新功能成为可能。网络内处理,即在路由器上执行计算过程,是网络虚拟化带来的新特性之一。此外,由于YouTube是世界上最大的视频发布服务,我们在边缘网络上分析YouTube视频回放,并调查冗余流量及其位置。基于这些最新的发展和技术,我们建议通过在路由器上设置视频缓存来减少网络内缓存的冗余视频流量。这个缓存可以根据用户的访问被移动到其他路由器。在本文中,我们分析了冗余的YouTube视频访问,并进行了网络内缓存模拟。根据这些模拟,优化网络内缓存不仅可以将边缘网络的传入流量减少42.2%,还可以将网络内的下载流量减少高达18.9%,唯一的成本是网络内的上传流量增加6.6%。结果还证明了在边缘网络中视频访问的局部性。
{"title":"In-network cache simulations based on a YouTube traffic analysis at the edge network","authors":"Shogo Ando, A. Nakao","doi":"10.1145/2619287.2619295","DOIUrl":"https://doi.org/10.1145/2619287.2619295","url":null,"abstract":"Recently, with the advent of YouTube and similar video streaming websites, online video playback has gained popularity. Further, video traffic, represents the largest portion of Internet traffic. However, online video traffic contains redundant traffic due to identical video accesses. Network virtualization has been studied and developed, which makes it possible to deploy different protocols and new functionalities over the same physical network. in-network processing, the execution of calculation processes on routers, is one of the new features enabled by network virtualization. Further, since YouTube is the largest video publishing service in the world, we analyze YouTube video playbacks at the edge network and investigate redundant traffic and its locality. Based on these recent developments and technology, we propose to reduce redundant video traffic using in-network caching by positing video caches on routers. This cache could be moved to other routers according to users' access. In this paper, we analyze redundant YouTube video accesses and perform in-network cache simulations. According to these simulations, in-network caching can be optimized to reduce not only incoming traffic to the edge network by 42.2%, but also download traffic inside the network by up to 18.9%, with the only cost being an increase of 6.6% additional upload traffic inside the network. The result also demonstrates the presence of the locality of video accesses at the edge network.","PeriodicalId":409750,"journal":{"name":"International Conference of Future Internet","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131017163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Oblivious DDoS mitigation with locator/ID separation protocol 使用定位器/ID分离协议的遗忘DDoS缓解
Pub Date : 2014-06-18 DOI: 10.1145/2619287.2619291
Kazuya Okada, H. Hazeyama, Y. Kadobayashi
The need to keep an attacker oblivious of an attack mitigation effort is a very important component of a defense against denial of services (DoS) and distributed denial of services (DDoS) attacks because it helps to dissuade attackers from changing their attack patterns. Conceptually, DDoS mitigation can be achieved by two components. The first is a decoy server that provides a service function or receives attack traffic as a substitute for a legitimate server. The second is a decoy network that restricts attack traffic to the peripheries of a network, or which reroutes attack traffic to decoy servers. In this paper, we propose the use of a two-stage map table extension Locator/ID Separation Protocol (LISP) to realize a decoy network. We also describe and demonstrate how LISP can be used to implement an oblivious DDoS mitigation mechanism by adding a simple extension on the LISP MapServer. Together with decoy servers, this method can terminate DDoS traffic on the ingress end of an LISP-enabled network. We verified the effectiveness of our proposed mechanism through simulated DDoS attacks on a simple network topology. Our evaluation results indicate that the mechanism could be activated within a few seconds, and that the attack traffic can be terminated without incurring overhead on the MapServer.
在防御拒绝服务(DoS)和分布式拒绝服务(DDoS)攻击时,需要让攻击者不知道攻击缓解工作,这是一个非常重要的组成部分,因为它有助于阻止攻击者改变其攻击模式。从概念上讲,DDoS缓解可以通过两个组件实现。第一种是作为合法服务器的替代品提供服务功能或接收攻击流量的诱饵服务器。第二种是诱饵网络,它限制攻击流量到网络的外围,或者将攻击流量重新路由到诱饵服务器。在本文中,我们提出使用一个两阶段的地图表扩展定位/ID分离协议(LISP)来实现一个诱饵网络。我们还描述并演示了如何通过在LISP MapServer上添加一个简单的扩展来使用LISP来实现遗忘DDoS缓解机制。与诱饵服务器一起,这种方法可以在启用lisp的网络的入口端终止DDoS流量。我们通过在一个简单的网络拓扑上模拟DDoS攻击来验证我们提出的机制的有效性。我们的评估结果表明,该机制可以在几秒钟内激活,并且可以在不引起MapServer开销的情况下终止攻击流量。
{"title":"Oblivious DDoS mitigation with locator/ID separation protocol","authors":"Kazuya Okada, H. Hazeyama, Y. Kadobayashi","doi":"10.1145/2619287.2619291","DOIUrl":"https://doi.org/10.1145/2619287.2619291","url":null,"abstract":"The need to keep an attacker oblivious of an attack mitigation effort is a very important component of a defense against denial of services (DoS) and distributed denial of services (DDoS) attacks because it helps to dissuade attackers from changing their attack patterns. Conceptually, DDoS mitigation can be achieved by two components. The first is a decoy server that provides a service function or receives attack traffic as a substitute for a legitimate server. The second is a decoy network that restricts attack traffic to the peripheries of a network, or which reroutes attack traffic to decoy servers. In this paper, we propose the use of a two-stage map table extension Locator/ID Separation Protocol (LISP) to realize a decoy network. We also describe and demonstrate how LISP can be used to implement an oblivious DDoS mitigation mechanism by adding a simple extension on the LISP MapServer. Together with decoy servers, this method can terminate DDoS traffic on the ingress end of an LISP-enabled network. We verified the effectiveness of our proposed mechanism through simulated DDoS attacks on a simple network topology. Our evaluation results indicate that the mechanism could be activated within a few seconds, and that the attack traffic can be terminated without incurring overhead on the MapServer.","PeriodicalId":409750,"journal":{"name":"International Conference of Future Internet","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116485390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cross-layer network parameterization for application-aware networking in wireless ad-hoc networks 无线自组织网络中应用感知网络的跨层网络参数化
Pub Date : 2014-06-18 DOI: 10.1145/2619287.2619309
B. Shin, Jalil Abdullayev, Dongman Lee
Cross-layer networking is a promising approach which provides an optimal routing solution for achieving the goal of a target application. However, existing cross-layer networking approaches mostly support only a specific application type and do not fully satisfy other application types because each application has distinguished network requirements. In this paper, we propose a paradigm that several network parameters in routing and MAC layers dynamically adapt to various applications by understanding their requirements. To achieve the paradigm, we propose a joint routing and MAC parameterization scheme which adapts to application requirements and changing network conditions.
跨层网络是一种很有前途的方法,它为实现目标应用程序的目标提供了最佳路由解决方案。但是,现有的跨层网络方法大多只支持特定的应用程序类型,而不能完全满足其他应用程序类型,因为每个应用程序都有不同的网络需求。在本文中,我们提出了一个范例,在路由和MAC层的几个网络参数动态适应不同的应用程序,通过了解他们的需求。为了实现这一范式,我们提出了一种联合路由和MAC参数化方案,以适应应用需求和不断变化的网络条件。
{"title":"Cross-layer network parameterization for application-aware networking in wireless ad-hoc networks","authors":"B. Shin, Jalil Abdullayev, Dongman Lee","doi":"10.1145/2619287.2619309","DOIUrl":"https://doi.org/10.1145/2619287.2619309","url":null,"abstract":"Cross-layer networking is a promising approach which provides an optimal routing solution for achieving the goal of a target application. However, existing cross-layer networking approaches mostly support only a specific application type and do not fully satisfy other application types because each application has distinguished network requirements. In this paper, we propose a paradigm that several network parameters in routing and MAC layers dynamically adapt to various applications by understanding their requirements. To achieve the paradigm, we propose a joint routing and MAC parameterization scheme which adapts to application requirements and changing network conditions.","PeriodicalId":409750,"journal":{"name":"International Conference of Future Internet","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133753375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an NLP-based log template generation algorithm for system log analysis 基于nlp的系统日志模板生成算法研究
Pub Date : 2014-06-18 DOI: 10.1145/2619287.2619290
Satoru Kobayashi, K. Fukuda, H. Esaki
System log from network equipment is one of the most important information for network management. Sophisticated log message mining could help in investigating a huge number of log messages for trouble shooting, especially in recent complicated network structure (e.g., virtualized networks). However, generating log templates (i.e., meta format) from real log messages (instances) is still difficult problem in terms of accuracy. In this paper we propose a Natural Language Processing (NLP) approach to generate log templates from log messages produced by network equipment in order to overcome this problem. The key idea of the work is to leverage the use of Conditional Random Fields (CRF), a well-studied supervised natural language processing technique. As preliminarily evaluation, with one month network equipment logs in a Japanese academic network, we show that our CRF based algorithm improves the accuracy of generated log templates in reasonable processing time, compared with a traditional method.
网络设备的系统日志是网络管理的重要信息之一。复杂的日志消息挖掘可以帮助调查大量的日志消息以排除故障,特别是在最近复杂的网络结构中(例如,虚拟网络)。然而,从真实的日志消息(实例)生成日志模板(即元格式)在准确性方面仍然是一个难题。为了克服这个问题,我们提出了一种自然语言处理(NLP)方法来从网络设备产生的日志消息中生成日志模板。这项工作的关键思想是利用条件随机场(CRF)的使用,这是一种得到充分研究的有监督的自然语言处理技术。通过对日本某学术网络一个月的网络设备日志进行初步评估,结果表明,与传统方法相比,基于CRF的算法在合理的处理时间内提高了生成日志模板的准确性。
{"title":"Towards an NLP-based log template generation algorithm for system log analysis","authors":"Satoru Kobayashi, K. Fukuda, H. Esaki","doi":"10.1145/2619287.2619290","DOIUrl":"https://doi.org/10.1145/2619287.2619290","url":null,"abstract":"System log from network equipment is one of the most important information for network management. Sophisticated log message mining could help in investigating a huge number of log messages for trouble shooting, especially in recent complicated network structure (e.g., virtualized networks). However, generating log templates (i.e., meta format) from real log messages (instances) is still difficult problem in terms of accuracy. In this paper we propose a Natural Language Processing (NLP) approach to generate log templates from log messages produced by network equipment in order to overcome this problem. The key idea of the work is to leverage the use of Conditional Random Fields (CRF), a well-studied supervised natural language processing technique. As preliminarily evaluation, with one month network equipment logs in a Japanese academic network, we show that our CRF based algorithm improves the accuracy of generated log templates in reasonable processing time, compared with a traditional method.","PeriodicalId":409750,"journal":{"name":"International Conference of Future Internet","volume":"475 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125918403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
International Conference of Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1