首页 > 最新文献

Proceedings of the 13th International Conference on Future Internet Technologies最新文献

英文 中文
Integrating Active Monitoring for Restricted Topology-awareness of SmartX Multi-View Playground Visibility 集成SmartX多视图运动场可视性受限拓扑感知的主动监控
Muhammad Ahmad Rathore, Muhammad Usman, JongWon Kim
OF@TEIN (OpenFlow @ Trans-Eurasian Information Network) Playground has brought the monitoring challenges of SDN-enabled multi-site clouds. In order to address the monitoring challenges, we have been developing a multi-layered visibility solution denoted as SmartX Multi-View Framework (MVF). By integrating active monitoring with SmartX MVF, in this paper, we present restricted topology-awareness of OF@TEIN Playground.
OF@TEIN (OpenFlow @ Trans-Eurasian Information Network) Playground带来了sdn支持的多站点云的监控挑战。为了应对监控方面的挑战,我们一直在开发一种多层可见性解决方案,称为SmartX多视图框架(MVF)。通过将主动监控与SmartX MVF集成,本文提出了OF@TEIN Playground的受限拓扑感知。
{"title":"Integrating Active Monitoring for Restricted Topology-awareness of SmartX Multi-View Playground Visibility","authors":"Muhammad Ahmad Rathore, Muhammad Usman, JongWon Kim","doi":"10.1145/3226052.3226053","DOIUrl":"https://doi.org/10.1145/3226052.3226053","url":null,"abstract":"OF@TEIN (OpenFlow @ Trans-Eurasian Information Network) Playground has brought the monitoring challenges of SDN-enabled multi-site clouds. In order to address the monitoring challenges, we have been developing a multi-layered visibility solution denoted as SmartX Multi-View Framework (MVF). By integrating active monitoring with SmartX MVF, in this paper, we present restricted topology-awareness of OF@TEIN Playground.","PeriodicalId":409980,"journal":{"name":"Proceedings of the 13th International Conference on Future Internet Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131819198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CyTIME CyTIME
Eunsoo Kim, Kuyju Kim, Dongsoon Shin, Beomjin Jin, Hyoungshick Kim
It is becoming increasingly necessary for organizations to build a Cyber Threat Intelligence (CTI) platform to fight against sophisticated attacks. To reduce the risk of cyber attacks, security administrators and/or analysts can use a CTI platform to aggregate relevant threat information about adversaries, targets and vulnerabilities, analyze it and share key observations from the analysis with collaborators. In this paper, we introduce CyTIME (Cyber Threat Intelligence ManagEment framework) which is a framework for managing CTI data. CyTIME can periodically collect CTI data from external CTI data repositories via standard interfaces such as Trusted Automated Exchange of Indicator Information (TAXII). In addition, CyTIME is designed to automatically generate security rules without human intervention to mitigate discovered new cybersecurity threats in real time. To show the feasibility of CyTIME, we performed experiments to measure the time to complete the task of generating the security rule corresponding to a given CTI data. We used 1,000 different CTI files related to network attacks. Our experiment results demonstrate that CyTIME automatically generates security rules and store them into the internal database within 12.941 seconds on average (max = 13.952, standard deviation = 0.580).
{"title":"CyTIME","authors":"Eunsoo Kim, Kuyju Kim, Dongsoon Shin, Beomjin Jin, Hyoungshick Kim","doi":"10.1145/3226052.3226056","DOIUrl":"https://doi.org/10.1145/3226052.3226056","url":null,"abstract":"It is becoming increasingly necessary for organizations to build a Cyber Threat Intelligence (CTI) platform to fight against sophisticated attacks. To reduce the risk of cyber attacks, security administrators and/or analysts can use a CTI platform to aggregate relevant threat information about adversaries, targets and vulnerabilities, analyze it and share key observations from the analysis with collaborators. In this paper, we introduce CyTIME (Cyber Threat Intelligence ManagEment framework) which is a framework for managing CTI data. CyTIME can periodically collect CTI data from external CTI data repositories via standard interfaces such as Trusted Automated Exchange of Indicator Information (TAXII). In addition, CyTIME is designed to automatically generate security rules without human intervention to mitigate discovered new cybersecurity threats in real time. To show the feasibility of CyTIME, we performed experiments to measure the time to complete the task of generating the security rule corresponding to a given CTI data. We used 1,000 different CTI files related to network attacks. Our experiment results demonstrate that CyTIME automatically generates security rules and store them into the internal database within 12.941 seconds on average (max = 13.952, standard deviation = 0.580).","PeriodicalId":409980,"journal":{"name":"Proceedings of the 13th International Conference on Future Internet Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129494027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Application-Aware Virtualization for Edge IoT Clouds 面向边缘物联网云的应用感知虚拟化
Si Young Jang, Yoonhyung Lee, B. Shin, Dongman Lee
We explore issues and challenges for application-aware virtualization in edge Internet-of-Things (IoT) clouds. Since a large number of IoT devices reside in network edges, it is necessary for a current edge computing technology to virtualize them not only as computational resources but also functional resources for achieving the goal of a specific service, which we call application-aware virtualization. This requires translation of abstract application requirements into IoT resource allocation policies using the knowledge of relationships between application layer semantics and underlying device functionalities and status. We implement a prototype for proof-of-concept and show that it is able to dynamically allocate and reallocate IoT resources to applications according to the application's requirements and contexts changes with a reasonably small processing overhead.
我们探讨了边缘物联网(IoT)云中应用感知虚拟化的问题和挑战。由于大量物联网设备驻留在网络边缘,当前的边缘计算技术有必要将它们虚拟化,不仅作为计算资源,而且作为实现特定服务目标的功能资源,我们称之为应用感知虚拟化。这需要使用应用层语义与底层设备功能和状态之间关系的知识,将抽象应用需求转换为物联网资源分配策略。我们实现了一个概念验证的原型,并表明它能够根据应用程序的需求和上下文变化动态地分配和重新分配物联网资源给应用程序,并且处理开销相当小。
{"title":"Towards Application-Aware Virtualization for Edge IoT Clouds","authors":"Si Young Jang, Yoonhyung Lee, B. Shin, Dongman Lee","doi":"10.1145/3226052.3226059","DOIUrl":"https://doi.org/10.1145/3226052.3226059","url":null,"abstract":"We explore issues and challenges for application-aware virtualization in edge Internet-of-Things (IoT) clouds. Since a large number of IoT devices reside in network edges, it is necessary for a current edge computing technology to virtualize them not only as computational resources but also functional resources for achieving the goal of a specific service, which we call application-aware virtualization. This requires translation of abstract application requirements into IoT resource allocation policies using the knowledge of relationships between application layer semantics and underlying device functionalities and status. We implement a prototype for proof-of-concept and show that it is able to dynamically allocate and reallocate IoT resources to applications according to the application's requirements and contexts changes with a reasonably small processing overhead.","PeriodicalId":409980,"journal":{"name":"Proceedings of the 13th International Conference on Future Internet Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Learning based Utility Maximization for Multi-Resource Management: Poster Abstract 基于学习的多资源管理效用最大化:海报摘要
Donghoon Lee, S. Chong
This poster addresses the problem of Network Utility Maximization (NUM) where multiple resources (computing/networking) participate in user services. NUM has usually been solved by Backpressure algorithms which has to build up queue size gradualy. This disadvantage stands out in the situation of multi-resource environment or multi-hop networking. To address the problem, we propose a reinforcement learning based algorithm that utilizes future prediction to overcome the previous limitation of non-learning based algorithms.
这张海报解决了网络效用最大化(NUM)的问题,其中多个资源(计算/网络)参与用户服务。NUM通常通过Backpressure算法求解,该算法必须逐步建立队列大小。这种缺点在多资源环境或多跳组网的情况下尤为突出。为了解决这个问题,我们提出了一种基于强化学习的算法,该算法利用未来预测来克服以前非基于学习的算法的局限性。
{"title":"Learning based Utility Maximization for Multi-Resource Management: Poster Abstract","authors":"Donghoon Lee, S. Chong","doi":"10.1145/3226052.3226060","DOIUrl":"https://doi.org/10.1145/3226052.3226060","url":null,"abstract":"This poster addresses the problem of Network Utility Maximization (NUM) where multiple resources (computing/networking) participate in user services. NUM has usually been solved by Backpressure algorithms which has to build up queue size gradualy. This disadvantage stands out in the situation of multi-resource environment or multi-hop networking. To address the problem, we propose a reinforcement learning based algorithm that utilizes future prediction to overcome the previous limitation of non-learning based algorithms.","PeriodicalId":409980,"journal":{"name":"Proceedings of the 13th International Conference on Future Internet Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Fault-Tolerant LISP Mapping System LISP容错映射系统的设计与实现
Junemuk Choi, Jian Li, J. W. Hong
The network applications become more complex such that they need to integrate big data. An emerging problem in current networks is scalability, such as the size of BGP routing table or the multihoming problem. The Locator/Identifier Separation Protocol (LISP) is a protocol to solve such problems. The main concept underlying LISP is a separation between the identifier and the locator. However, few studies have focussed on fault management in LISP mapping system. In this study, we design a fault management system for LISP mapping system on the Software-Defined Network (SDN) controller and modifying the functionality of the tunnel router. We introduce new control messages and processes to check for the survival of LISP mapping system and create a backup of records among controllers. Furthermore, we design and implement functionalities to exchange controller information among the tunnel routers. We implement a scenario to test our fault management system.
网络应用越来越复杂,需要集成大数据。当前网络中出现的一个新问题是可扩展性问题,例如BGP路由表的大小或多宿主问题。定位符/标识符分离协议(Locator/Identifier Separation Protocol, LISP)就是解决这些问题的协议。LISP的主要概念是标识符和定位符之间的分离。然而,对LISP映射系统的故障管理研究较少。在本研究中,我们设计了一个LISP映射系统在软件定义网络(SDN)控制器上的故障管理系统,并修改隧道路由器的功能。我们引入新的控制消息和进程来检查LISP映射系统的存续性,并在控制器之间创建记录备份。此外,我们设计并实现了在隧道路由器之间交换控制器信息的功能。我们实现一个场景来测试我们的故障管理系统。
{"title":"Design and Implementation of Fault-Tolerant LISP Mapping System","authors":"Junemuk Choi, Jian Li, J. W. Hong","doi":"10.1145/3226052.3226061","DOIUrl":"https://doi.org/10.1145/3226052.3226061","url":null,"abstract":"The network applications become more complex such that they need to integrate big data. An emerging problem in current networks is scalability, such as the size of BGP routing table or the multihoming problem. The Locator/Identifier Separation Protocol (LISP) is a protocol to solve such problems. The main concept underlying LISP is a separation between the identifier and the locator. However, few studies have focussed on fault management in LISP mapping system. In this study, we design a fault management system for LISP mapping system on the Software-Defined Network (SDN) controller and modifying the functionality of the tunnel router. We introduce new control messages and processes to check for the survival of LISP mapping system and create a backup of records among controllers. Furthermore, we design and implement functionalities to exchange controller information among the tunnel routers. We implement a scenario to test our fault management system.","PeriodicalId":409980,"journal":{"name":"Proceedings of the 13th International Conference on Future Internet Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127231410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encrypted Traffic Identification Based on N-gram Entropy and Cumulative Sum Test 基于N-gram熵和累积和检验的加密流量识别
Guang Cheng, Ying Hu
Since existing methods using entropy are less effective in characterizing encrypted traffic, this paper proposes an encrypted traffic identification method based on n-gram entropy and cumulative sum. This method analyzes the entropy characteristics of n-gram entropy for text, picture, compressed file, and encrypted traffic in the network. Furthermore, an analysis of cumulative sum is performed to better distinguish compressed file traffic and encrypted traffic. The experiments show that our propsed method reaches high accuracy for encrypted traffic identification and performs well in distinguishing compressed file traffic and encrypted traffic.
针对现有的基于熵的加密流量特征识别方法效果较差的问题,本文提出了一种基于n-gram熵和累积和的加密流量识别方法。该方法分析了网络中文本、图片、压缩文件和加密流量的n-gram熵的熵特征。此外,还进行了累积和分析,以便更好地区分压缩文件流量和加密流量。实验表明,该方法对加密流量的识别准确率较高,对压缩文件流量和加密流量的区分效果良好。
{"title":"Encrypted Traffic Identification Based on N-gram Entropy and Cumulative Sum Test","authors":"Guang Cheng, Ying Hu","doi":"10.1145/3226052.3226057","DOIUrl":"https://doi.org/10.1145/3226052.3226057","url":null,"abstract":"Since existing methods using entropy are less effective in characterizing encrypted traffic, this paper proposes an encrypted traffic identification method based on n-gram entropy and cumulative sum. This method analyzes the entropy characteristics of n-gram entropy for text, picture, compressed file, and encrypted traffic in the network. Furthermore, an analysis of cumulative sum is performed to better distinguish compressed file traffic and encrypted traffic. The experiments show that our propsed method reaches high accuracy for encrypted traffic identification and performs well in distinguishing compressed file traffic and encrypted traffic.","PeriodicalId":409980,"journal":{"name":"Proceedings of the 13th International Conference on Future Internet Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131224885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Congestion Control Mechanism for Data Center Networks Based on Named Data Networking 基于命名数据网络的数据中心网络拥塞控制机制
Yaqiu Zhou, Yongmao Ren, Xu Zhou, Zhentao Li, Pengfei Fan
Data center networks have become important infrastructures in cloud computing. TCP Incast is a common challenge for data center networks. Although many researchers have tried to address this issue, there is no optimal solution yet. In this paper, different from current effort in IP networks, we try to mitigate the TCP Incast issue by innovatively adopting a new network architecture-Named Data Networking (NDN). Taking advantage of the receiver-driven transfer model and the in-network caching mechanism of NDN, we propose a novel packet request algorithm which can avoid the congestion and we have implemented the algorithm in ndnSIM. Simulation results show that our algorithm can mitigate the TCP Incast issue effectively.
数据中心网络已成为云计算的重要基础设施。TCP即时播报是数据中心网络面临的常见挑战。尽管许多研究人员试图解决这个问题,但目前还没有最佳解决方案。在本文中,与目前在IP网络中所做的努力不同,我们试图通过创新地采用一种新的网络体系结构-命名为数据网络(NDN)来缓解TCP Incast问题。利用NDN的接收端驱动传输模型和网络内缓存机制,提出了一种新的避免拥塞的分组请求算法,并在NDN sim中实现。仿真结果表明,该算法可以有效地缓解TCP Incast问题。
{"title":"A Congestion Control Mechanism for Data Center Networks Based on Named Data Networking","authors":"Yaqiu Zhou, Yongmao Ren, Xu Zhou, Zhentao Li, Pengfei Fan","doi":"10.1145/3226052.3226055","DOIUrl":"https://doi.org/10.1145/3226052.3226055","url":null,"abstract":"Data center networks have become important infrastructures in cloud computing. TCP Incast is a common challenge for data center networks. Although many researchers have tried to address this issue, there is no optimal solution yet. In this paper, different from current effort in IP networks, we try to mitigate the TCP Incast issue by innovatively adopting a new network architecture-Named Data Networking (NDN). Taking advantage of the receiver-driven transfer model and the in-network caching mechanism of NDN, we propose a novel packet request algorithm which can avoid the congestion and we have implemented the algorithm in ndnSIM. Simulation results show that our algorithm can mitigate the TCP Incast issue effectively.","PeriodicalId":409980,"journal":{"name":"Proceedings of the 13th International Conference on Future Internet Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tunneling over IP Based on Match-Action Table in Software Defined Networks 软件定义网络中基于匹配-动作表的IP隧道
Keyao Zhang, J. Bi, Yangyang Wang, Yu Zhou, Zhengzheng Liu
Tunneling over IP has been widely used in the field of network virtualization, overlay network, heterogeneous network, and so on. Nonetheless, there exists maintenance difficulty, management complexity, low efficiency in tunneling. SDN provides open and unified APIs, which greatly enhances the network management efficiency. However, as a significant southbound interface, OpenFlow does not primitively support the establishment of IP tunnels, therefore it still relies on traditional manual configurations. In this paper, we adopt Match-Action Table (MAT) programming model and propose a new IP tunnel mechanism, called MAT tunnel. The MAT tunnel can encapsulate and decapsulate packets directly by installing flow rules instead of manually configuring tunnel ports. We implement the MAT tunnel prototype based on Open vSwitch and Floodlight. We also construct a simulation environment based on a real topology. Comparing traditional tunnels, the MAT tunnel can reduce the average delay while improving the programmability and flexibility. In addition, the tunnel path switching tests suggest the MAT tunnel can significantly decrease the delay jitter and throughput loss.
IP隧道在网络虚拟化、覆盖网络、异构网络等领域得到了广泛的应用。但隧道施工存在维护困难、管理复杂、效率低等问题。SDN提供了开放、统一的api,大大提高了网络管理效率。但是,OpenFlow作为一个重要的南向接口,并没有从根本上支持IP隧道的建立,因此仍然依赖于传统的手工配置。本文采用匹配-动作表(MAT)编程模型,提出了一种新的IP隧道机制,称为MAT隧道。MAT隧道可以直接通过安装流规则对报文进行封装和解封装,而不需要手动配置隧道端口。我们实现了基于Open vSwitch和泛光灯的MAT隧道原型。我们还构建了一个基于真实拓扑结构的仿真环境。与传统隧道相比,MAT隧道在提高可编程性和灵活性的同时降低了平均时延。此外,隧道路径交换测试表明,MAT隧道可以显著降低延迟抖动和吞吐量损失。
{"title":"Tunneling over IP Based on Match-Action Table in Software Defined Networks","authors":"Keyao Zhang, J. Bi, Yangyang Wang, Yu Zhou, Zhengzheng Liu","doi":"10.1145/3226052.3226054","DOIUrl":"https://doi.org/10.1145/3226052.3226054","url":null,"abstract":"Tunneling over IP has been widely used in the field of network virtualization, overlay network, heterogeneous network, and so on. Nonetheless, there exists maintenance difficulty, management complexity, low efficiency in tunneling. SDN provides open and unified APIs, which greatly enhances the network management efficiency. However, as a significant southbound interface, OpenFlow does not primitively support the establishment of IP tunnels, therefore it still relies on traditional manual configurations. In this paper, we adopt Match-Action Table (MAT) programming model and propose a new IP tunnel mechanism, called MAT tunnel. The MAT tunnel can encapsulate and decapsulate packets directly by installing flow rules instead of manually configuring tunnel ports. We implement the MAT tunnel prototype based on Open vSwitch and Floodlight. We also construct a simulation environment based on a real topology. Comparing traditional tunnels, the MAT tunnel can reduce the average delay while improving the programmability and flexibility. In addition, the tunnel path switching tests suggest the MAT tunnel can significantly decrease the delay jitter and throughput loss.","PeriodicalId":409980,"journal":{"name":"Proceedings of the 13th International Conference on Future Internet Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130522900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unknown Flow Detection with Imbalanced Traffic Data: Poster Abstract 基于不平衡流量数据的未知流量检测:海报摘要
Jeongmin Bae, S. Chong
Unknown traffic is a serious problem in network traffic classification for network management and security, since it degrades the performance of a traffic classifier. We propose a machine learning-based classifier that can not only categorize the traffic of known classes but also detect unknown traffic in data imbalanced network environment, where frequency of traffic from one application outweighs that of other application. We improved the previous RTC model by adding data preprocessing module and simulated with synthesized dataset to show the effect of the data imbalance problem on classification accuracy and to validate the performance of our model in data-imbalanced network environment.
未知流量是网络流分类中一个严重的问题,它会降低流分类器的性能,影响网络管理和安全。我们提出了一种基于机器学习的分类器,它不仅可以对已知类的流量进行分类,还可以在数据不平衡的网络环境中检测未知流量,其中一个应用程序的流量频率大于其他应用程序的流量频率。我们通过增加数据预处理模块对之前的RTC模型进行了改进,并用合成的数据集进行了仿真,展示了数据不平衡问题对分类精度的影响,验证了模型在数据不平衡网络环境下的性能。
{"title":"Unknown Flow Detection with Imbalanced Traffic Data: Poster Abstract","authors":"Jeongmin Bae, S. Chong","doi":"10.1145/3226052.3226058","DOIUrl":"https://doi.org/10.1145/3226052.3226058","url":null,"abstract":"Unknown traffic is a serious problem in network traffic classification for network management and security, since it degrades the performance of a traffic classifier. We propose a machine learning-based classifier that can not only categorize the traffic of known classes but also detect unknown traffic in data imbalanced network environment, where frequency of traffic from one application outweighs that of other application. We improved the previous RTC model by adding data preprocessing module and simulated with synthesized dataset to show the effect of the data imbalance problem on classification accuracy and to validate the performance of our model in data-imbalanced network environment.","PeriodicalId":409980,"journal":{"name":"Proceedings of the 13th International Conference on Future Internet Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proceedings of the 13th International Conference on Future Internet Technologies 第十三届未来互联网技术国际会议论文集
D. Kim
The Sixth International Conference on Future Internet Technologies (CFI 2011) continues the tradition of being the forum for early work on Future Internet research. This year we received 42 submissions and accepted 21 (8 Regular and 13 Short) papers out of them. Each paper was extensively reviewed by more than three members of the Technical Program Committee. As the goal of CFI 2011 is to be the nurturing platform for budding research, the Technical Program Committee put much effort to return encouraging reviews and also scout for promising ideas.
第六届未来互联网技术国际会议(CFI 2011)延续了作为未来互联网早期研究工作论坛的传统。今年我们收到了42篇投稿,并从中接受了21篇(8篇普通论文和13篇短文)。每篇论文都经过技术计划委员会三名以上成员的广泛审查。由于CFI 2011的目标是成为萌芽研究的培育平台,技术计划委员会付出了很多努力,以反馈鼓舞人心的评论,并寻找有前途的想法。
{"title":"Proceedings of the 13th International Conference on Future Internet Technologies","authors":"D. Kim","doi":"10.1145/3226052","DOIUrl":"https://doi.org/10.1145/3226052","url":null,"abstract":"The Sixth International Conference on Future Internet Technologies (CFI 2011) continues the tradition of being the forum for early work on Future Internet research. This year we received 42 submissions and accepted 21 (8 Regular and 13 Short) papers out of them. Each paper was extensively reviewed by more than three members of the Technical Program Committee. As the goal of CFI 2011 is to be the nurturing platform for budding research, the Technical Program Committee put much effort to return encouraging reviews and also scout for promising ideas.","PeriodicalId":409980,"journal":{"name":"Proceedings of the 13th International Conference on Future Internet Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2011-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133509336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 13th International Conference on Future Internet Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1