首页 > 最新文献

12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops最新文献

英文 中文
Leveraging social network for predicting demand and estimating available resources for communication network management 利用社会网络来预测需求和估计通信网络管理的可用资源
A. Vashist, S. Mau, A. Poylisher, R. Chadha, Abhrajit Ghosh
Computer networks exist to provide a communication medium for social networks, and information from social networks can help in estimating their communication needs. Despite this, current network management ignores the information from social networks. On the other hand, due to their limited and fluctuating bandwidth, mobile ad hoc networks are inherently resource-constrained. As traffic load increases, we need to decide when and how to throttle the traffic to maximize user satisfaction while keeping the network operational. The state-of-the-art for making these decisions is based on network measurements and so employs a reactive approach to deteriorating network state by reducing the amount of traffic admitted into the network. However, a better approach is to avoid congestion before it occurs, by (a) monitoring the network for early onset signals of congestive phase transition, and (b) predicting future network traffic using user and application information from the overlaying social network. We use machine learning methods to predict the amount of traffic load that can be admitted without transitioning the network to a congestive phase and to predict the source and destination of near future traffic load. These two predictions when fed into an admission control component ensure better management of constrained network resources while maximizing the quality of user experience.
计算机网络的存在为社会网络提供了一种交流媒介,来自社会网络的信息可以帮助估计他们的交流需求。尽管如此,目前的网络管理忽视了来自社交网络的信息。另一方面,由于其有限和波动的带宽,移动自组织网络具有固有的资源约束。随着流量负载的增加,我们需要决定何时以及如何限制流量,以最大限度地提高用户满意度,同时保持网络运行。做出这些决策的最先进技术是基于网络测量,因此通过减少允许进入网络的流量来采用反应性方法来恶化网络状态。然而,更好的方法是在拥塞发生之前避免拥塞,通过(a)监测网络的早期充血性相变信号,以及(b)使用来自覆盖的社交网络的用户和应用程序信息预测未来的网络流量。我们使用机器学习方法来预测在不将网络过渡到充血性阶段的情况下可以接受的流量负载数量,并预测近期流量负载的来源和目的地。当将这两个预测输入到允许控制组件中时,可以确保更好地管理受限的网络资源,同时最大限度地提高用户体验的质量。
{"title":"Leveraging social network for predicting demand and estimating available resources for communication network management","authors":"A. Vashist, S. Mau, A. Poylisher, R. Chadha, Abhrajit Ghosh","doi":"10.1109/INM.2011.5990558","DOIUrl":"https://doi.org/10.1109/INM.2011.5990558","url":null,"abstract":"Computer networks exist to provide a communication medium for social networks, and information from social networks can help in estimating their communication needs. Despite this, current network management ignores the information from social networks. On the other hand, due to their limited and fluctuating bandwidth, mobile ad hoc networks are inherently resource-constrained. As traffic load increases, we need to decide when and how to throttle the traffic to maximize user satisfaction while keeping the network operational. The state-of-the-art for making these decisions is based on network measurements and so employs a reactive approach to deteriorating network state by reducing the amount of traffic admitted into the network. However, a better approach is to avoid congestion before it occurs, by (a) monitoring the network for early onset signals of congestive phase transition, and (b) predicting future network traffic using user and application information from the overlaying social network. We use machine learning methods to predict the amount of traffic load that can be admitted without transitioning the network to a congestive phase and to predict the source and destination of near future traffic load. These two predictions when fed into an admission control component ensure better management of constrained network resources while maximizing the quality of user experience.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
LTE relay node self-configuration LTE中继节点自配置
Péter Szilágyi, H. Sanneck
Relays are mobile network base stations, which connect to the network via an in-band wireless backhaul link instead of using a dedicated wired or microwave backhaul link as regular base stations do. Connecting through a wireless backhaul raises difficulties when it comes to accessing the operator's Operation, Administration and Maintenance (OAM) System, since prior to the appearance of relay nodes, wireless access was reserved solely for user equipments and not used by network elements at all. However, after deploying a relay node, establishing an initial OAM access is essential in any kind of configuration, particularly when considering an automated configuration process known as self-configuration in principle. Self-configuration is gaining more importance for regular base stations as well as relays as automation of OAM processes is seen as a major contributor to reduce complexity and cost in network operation. In this paper, we introduce a conceptual separation of the initial configuration phase and the operational phase and present a detailed concept for automatic connectivity establishment to the OAM system. The transition from configuration to operational phase is also covered. The results have been verified by an event-driven packet based simulator and the proposed method has been accepted by the 3rd Generation Partnership Project (3GPP) as the baseline solution for configuring relays in the next generation radio access technology, Long Term Evolution (LTE).
中继是移动网络基站,它通过带内无线回传链路连接到网络,而不是像普通基站那样使用专用有线或微波回传链路。当涉及到访问运营商的操作、管理和维护(OAM)系统时,通过无线回程连接会带来困难,因为在中继节点出现之前,无线访问仅为用户设备保留,而根本不被网络元素使用。但是,在部署中继节点之后,在任何类型的配置中都必须建立初始OAM访问,特别是在考虑原则上称为自配置的自动化配置过程时。自配置对于常规基站和中继越来越重要,因为OAM过程的自动化被视为降低网络运行复杂性和成本的主要因素。在本文中,我们引入了初始配置阶段和操作阶段的概念分离,并提出了OAM系统自动连接建立的详细概念。还涵盖了从配置到操作阶段的转换。该方法已被第三代合作伙伴计划(3GPP)接受,作为下一代无线接入技术长期演进(LTE)中中继配置的基准解决方案。
{"title":"LTE relay node self-configuration","authors":"Péter Szilágyi, H. Sanneck","doi":"10.1109/INM.2011.5990493","DOIUrl":"https://doi.org/10.1109/INM.2011.5990493","url":null,"abstract":"Relays are mobile network base stations, which connect to the network via an in-band wireless backhaul link instead of using a dedicated wired or microwave backhaul link as regular base stations do. Connecting through a wireless backhaul raises difficulties when it comes to accessing the operator's Operation, Administration and Maintenance (OAM) System, since prior to the appearance of relay nodes, wireless access was reserved solely for user equipments and not used by network elements at all. However, after deploying a relay node, establishing an initial OAM access is essential in any kind of configuration, particularly when considering an automated configuration process known as self-configuration in principle. Self-configuration is gaining more importance for regular base stations as well as relays as automation of OAM processes is seen as a major contributor to reduce complexity and cost in network operation. In this paper, we introduce a conceptual separation of the initial configuration phase and the operational phase and present a detailed concept for automatic connectivity establishment to the OAM system. The transition from configuration to operational phase is also covered. The results have been verified by an event-driven packet based simulator and the proposed method has been accepted by the 3rd Generation Partnership Project (3GPP) as the baseline solution for configuring relays in the next generation radio access technology, Long Term Evolution (LTE).","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An open architecture for distributed IP traffic analysis (DITA) 分布式IP流量分析(DITA)的开放体系结构
C. Morariu, B. Stiller
This thesis investigated how performance of today's IP traffic metering and analysis applications can be improved by moving from a centralized, high-performance infrastructure, which executes these tasks, to distributed mechanisms, which combine available resources of multiple devices. The results achieved show that distributed IP traffic metering and analysis leverages bottleneck problems. The distributed IP traffic approach DITA does not solve all problems of handling such large amounts of data in very short time by itself, but proposes an orthogonal approach to existing solutions. DITA revelas that combining distributed IP traffic metering and analysis reaches better and higher performance sampling and aggregation mechanisms, which do provide a very flexible and the open solution to analyzing IP traffic in future high-speed networks. This has been achieved by the facts that all mechanisms designed for DITA — and their prototypical implementations — are based on standard protocols and open-source technologies. DITA determines the first approach to distributed IP traffic metering and analysis known today, which (a) addresses the different bottlenecks of traffic analysis in a generic way, and (b) is self-organizing, offering a scalable solution to regular traffic increases.
本文研究了如何通过从执行这些任务的集中式高性能基础设施转移到结合多个设备可用资源的分布式机制来改善当今IP流量计量和分析应用程序的性能。结果表明,分布式IP流量计量和分析利用了瓶颈问题。分布式IP流量方法DITA本身并不能解决在很短的时间内处理如此大量数据的所有问题,但它提出了一种与现有解决方案正交的方法。DITA表明,将分布式IP流量计量和分析相结合,可以实现更好、更高性能的采样和聚合机制,为未来高速网络中的IP流量分析提供了一种非常灵活和开放的解决方案。这是因为所有为DITA设计的机制——以及它们的原型实现——都基于标准协议和开源技术。DITA确定了目前已知的分布式IP流量计量和分析的第一种方法,它(a)以通用的方式解决流量分析的不同瓶颈,(b)是自组织的,为常规流量增长提供可扩展的解决方案。
{"title":"An open architecture for distributed IP traffic analysis (DITA)","authors":"C. Morariu, B. Stiller","doi":"10.1109/INM.2011.5990528","DOIUrl":"https://doi.org/10.1109/INM.2011.5990528","url":null,"abstract":"This thesis investigated how performance of today's IP traffic metering and analysis applications can be improved by moving from a centralized, high-performance infrastructure, which executes these tasks, to distributed mechanisms, which combine available resources of multiple devices. The results achieved show that distributed IP traffic metering and analysis leverages bottleneck problems. The distributed IP traffic approach DITA does not solve all problems of handling such large amounts of data in very short time by itself, but proposes an orthogonal approach to existing solutions. DITA revelas that combining distributed IP traffic metering and analysis reaches better and higher performance sampling and aggregation mechanisms, which do provide a very flexible and the open solution to analyzing IP traffic in future high-speed networks. This has been achieved by the facts that all mechanisms designed for DITA — and their prototypical implementations — are based on standard protocols and open-source technologies. DITA determines the first approach to distributed IP traffic metering and analysis known today, which (a) addresses the different bottlenecks of traffic analysis in a generic way, and (b) is self-organizing, offering a scalable solution to regular traffic increases.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134382572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A maturity model for tool landscapes of IT service providers IT服务提供商工具景观的成熟度模型
Christian Richter, T. Schaaf
In the last years, several approaches and models for IT service management (ITSM) have emerged from research under the business-driven IT management (BDIM) paradigm as well as from industry initiatives. Effective and comprehensive tool support for ITSM is still one of the big remaining challenges. Nowadays, many IT service providers face the problem, that they are using dozens to hundreds of different tools to manage their infrastructure and services. Although such management tools are intended to increase the efficiency of ITSM processes, very complex and heterogeneous tool environments may have an inverse impact. This paper presents an approach to addresses this problem area. It aims at providing guidance in assessing and improving existing tool landscapes based on a global maturity model and specific capability models to be applied to the different topic areas in ITSM.
在过去的几年中,在业务驱动的IT管理(BDIM)范式下的研究以及行业计划中出现了一些IT服务管理(ITSM)的方法和模型。为ITSM提供有效和全面的工具支持仍然是一个巨大的挑战。如今,许多IT服务提供商都面临着这样的问题:他们正在使用数十到数百种不同的工具来管理他们的基础设施和服务。尽管这样的管理工具旨在提高ITSM过程的效率,但是非常复杂和异构的工具环境可能会产生相反的影响。本文提出了一种解决这一问题的方法。它的目的是在评估和改进现有工具景观方面提供指导,这些工具景观基于一个全球成熟度模型和特定的能力模型,这些模型将应用于ITSM的不同主题领域。
{"title":"A maturity model for tool landscapes of IT service providers","authors":"Christian Richter, T. Schaaf","doi":"10.1109/INM.2011.5990503","DOIUrl":"https://doi.org/10.1109/INM.2011.5990503","url":null,"abstract":"In the last years, several approaches and models for IT service management (ITSM) have emerged from research under the business-driven IT management (BDIM) paradigm as well as from industry initiatives. Effective and comprehensive tool support for ITSM is still one of the big remaining challenges. Nowadays, many IT service providers face the problem, that they are using dozens to hundreds of different tools to manage their infrastructure and services. Although such management tools are intended to increase the efficiency of ITSM processes, very complex and heterogeneous tool environments may have an inverse impact. This paper presents an approach to addresses this problem area. It aims at providing guidance in assessing and improving existing tool landscapes based on a global maturity model and specific capability models to be applied to the different topic areas in ITSM.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A component-based orchestration management framework for multidomain SOA 用于多域SOA的基于组件的编排管理框架
F. Baude, V. L. Contes
Business Process Outsourcing is nowadays common in companies. In particular, the distribution of such business processes encompasses the inclusion of external service providers in the overall process as well as the usage of external infrastructures like clouds. Both of these approaches lead to decentralization and outsourcing of a part of the global workflow, resulting in a complexified management of the global orchestration. As a matter of fact, the overall management data are decentralized among different domains and must, most of the time, be gathered manually. This paper presents a framework that eases multi-domain orchestration management. Our approach extracts, gathers and digests data from the decentralized processes in order to provide an unified and global view of a distributed orchestration.
如今,业务流程外包在公司中很常见。特别是,此类业务流程的分布包括在整个流程中包含外部服务提供者以及使用外部基础设施(如云)。这两种方法都会导致部分全局工作流的去中心化和外包,从而导致对全局编排的复杂管理。事实上,整体管理数据分散在不同的域中,并且大多数时候必须手动收集。本文提出了一个简化多域业务流程管理的框架。我们的方法是从分散的流程中提取、收集和摘要数据,以提供分布式编排的统一全局视图。
{"title":"A component-based orchestration management framework for multidomain SOA","authors":"F. Baude, V. L. Contes","doi":"10.1109/INM.2011.5990576","DOIUrl":"https://doi.org/10.1109/INM.2011.5990576","url":null,"abstract":"Business Process Outsourcing is nowadays common in companies. In particular, the distribution of such business processes encompasses the inclusion of external service providers in the overall process as well as the usage of external infrastructures like clouds. Both of these approaches lead to decentralization and outsourcing of a part of the global workflow, resulting in a complexified management of the global orchestration. As a matter of fact, the overall management data are decentralized among different domains and must, most of the time, be gathered manually. This paper presents a framework that eases multi-domain orchestration management. Our approach extracts, gathers and digests data from the decentralized processes in order to provide an unified and global view of a distributed orchestration.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"8 Suppl 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124353321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive post-failure load balancing in fast reroute enabled IP networks 支持快速路由的IP网络中的自适应故障后负载均衡
Ning Wang, Abubaker Fagear, G. Pavlou
Fast reroute (FRR) techniques have been designed and standardised in recent years for supporting sub-50-millisecond failure recovery in operational ISP networks. On the other hand, if the provisioning of FRR protection paths does not take into account traffic engineering (TE) requirements, customer traffic may still get disrupted due to post-failure traffic congestion. Such a situation could be more severe in operational networks with highly dynamic traffic patterns. In this paper we propose a distributed technique that enables adaptive control of FRR protection paths against dynamic traffic conditions, resulting in self-optimisation in addition to the self-healing capability. Our approach is based on the Loop-free Alternates (LFA) mechanism that allows non-deterministic provisioning of protection paths. The idea is for repairing routers to periodically re-compute LFA alternative next-hops using a lightweight algorithm for achieving and maintaining optimised post-failure traffic distribution in dynamic network environments. Our experiments based on a real operational network topology and traffic traces across 24 hours have shown that such an approach is able to significantly enhance relevant network performance compared to both TE-agnostic and static TE-aware FRR solutions.
近年来,快速路由(FRR)技术被设计和标准化,以支持运行中的ISP网络中低于50毫秒的故障恢复。另一方面,如果在提供FRR保护路径时没有考虑到TE (traffic engineering)的需求,仍然可能会因为故障后的流量拥塞而导致客户流量中断。在具有高度动态流量模式的运营网络中,这种情况可能更为严重。在本文中,我们提出了一种分布式技术,该技术能够自适应控制FRR保护路径,以适应动态交通条件,从而实现自优化和自修复能力。我们的方法基于无环路替代(LFA)机制,该机制允许提供不确定的保护路径。这个想法是为了修复路由器,使用轻量级算法定期重新计算LFA备选下一跳,以在动态网络环境中实现和保持优化的故障后流量分配。我们基于真实操作网络拓扑和24小时流量跟踪的实验表明,与te不可知和静态te感知FRR解决方案相比,这种方法能够显著提高相关网络性能。
{"title":"Adaptive post-failure load balancing in fast reroute enabled IP networks","authors":"Ning Wang, Abubaker Fagear, G. Pavlou","doi":"10.1109/INM.2011.5990548","DOIUrl":"https://doi.org/10.1109/INM.2011.5990548","url":null,"abstract":"Fast reroute (FRR) techniques have been designed and standardised in recent years for supporting sub-50-millisecond failure recovery in operational ISP networks. On the other hand, if the provisioning of FRR protection paths does not take into account traffic engineering (TE) requirements, customer traffic may still get disrupted due to post-failure traffic congestion. Such a situation could be more severe in operational networks with highly dynamic traffic patterns. In this paper we propose a distributed technique that enables adaptive control of FRR protection paths against dynamic traffic conditions, resulting in self-optimisation in addition to the self-healing capability. Our approach is based on the Loop-free Alternates (LFA) mechanism that allows non-deterministic provisioning of protection paths. The idea is for repairing routers to periodically re-compute LFA alternative next-hops using a lightweight algorithm for achieving and maintaining optimised post-failure traffic distribution in dynamic network environments. Our experiments based on a real operational network topology and traffic traces across 24 hours have shown that such an approach is able to significantly enhance relevant network performance compared to both TE-agnostic and static TE-aware FRR solutions.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114772138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A solution for identifying the root cause of problems in IT change management 用于识别IT变更管理中问题根源的解决方案
R. Santos, Juliano Araujo Wickboldt, R. C. Lunardi, B. Dalmazo, L. Granville, L. Gaspary, C. Bartolini, M. Hickey
The reuse of knowledge acquired by operators to diagnose failures in Information Technology (IT) infrastructures has potential to decrease the recurrence of failures and, consequently, reduce possible losses and maintenance costs. Nevertheless, existing solutions to support failure diagnosis lack of flexibility to adapt to a constantly changing IT environment. As a result, diagnostic is performed in an ad hoc and static fashion, which hampers the reuse of knowledge to solve similar failures affecting different elements of an IT infrastructure. To bridge this gap, in this paper we propose an extension of Common Information Model (CIM), supported by a conceptual solution for the identification of the root causes of problems, adaptable to changes in the target infrastructure and applicable to similar failures. Experiments carried out considering typical failures during the deployment of IT changes provide evidence about the efficacy of the proposed solution1.
运营商对信息技术(IT)基础设施故障诊断所获得的知识进行再利用,有可能减少故障的再次发生,从而减少可能的损失和维护成本。然而,支持故障诊断的现有解决方案缺乏适应不断变化的IT环境的灵活性。因此,诊断是以临时和静态的方式执行的,这妨碍了知识的重用,从而无法解决影响IT基础设施不同元素的类似故障。为了弥合这一差距,在本文中,我们提出了公共信息模型(CIM)的扩展,由一个概念解决方案支持,用于识别问题的根本原因,适应目标基础设施的变化,并适用于类似的故障。考虑到部署IT变更期间的典型故障而进行的实验为所建议的解决方案的有效性提供了证据。
{"title":"A solution for identifying the root cause of problems in IT change management","authors":"R. Santos, Juliano Araujo Wickboldt, R. C. Lunardi, B. Dalmazo, L. Granville, L. Gaspary, C. Bartolini, M. Hickey","doi":"10.1109/INM.2011.5990563","DOIUrl":"https://doi.org/10.1109/INM.2011.5990563","url":null,"abstract":"The reuse of knowledge acquired by operators to diagnose failures in Information Technology (IT) infrastructures has potential to decrease the recurrence of failures and, consequently, reduce possible losses and maintenance costs. Nevertheless, existing solutions to support failure diagnosis lack of flexibility to adapt to a constantly changing IT environment. As a result, diagnostic is performed in an ad hoc and static fashion, which hampers the reuse of knowledge to solve similar failures affecting different elements of an IT infrastructure. To bridge this gap, in this paper we propose an extension of Common Information Model (CIM), supported by a conceptual solution for the identification of the root causes of problems, adaptable to changes in the target infrastructure and applicable to similar failures. Experiments carried out considering typical failures during the deployment of IT changes provide evidence about the efficacy of the proposed solution1.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116913814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SLA-driven applicability analysis for patch management 补丁管理的sla驱动的适用性分析
Bo Yang, Sai Zeng, Naga Ayachitula, Rajeev Puri
To strengthen patch management, organizations are required not only to focus on sole patch management on single server, machine or application servers, but also to consider other IT system management processes as well because patch management relies on them to be efficient. Processes such as inventory, system configurations, risk management, change management, system audit, and business cost on policy and SLA should be evaluated and enhanced together with patch management; appropriate applicability assessment of patch should be built in and coordinated with all these processes to make patch management a safe, reliable and efficient process to carry out its high profile tasks. This paper presents a patch management framework based on SLA-driven patch applicability analysis. It provides automatic patch applicability analysis and risk assessment for supporting business-impact analysis and logical control during patch process. Experimental results collected from the simulation on realistic business services case study show that SLA-driven patch applicability analysis based patch management outperforms traditional patch management.
为了加强补丁管理,组织不仅需要专注于单个服务器、机器或应用服务器上的单一补丁管理,还需要考虑其他IT系统管理流程,因为补丁管理依赖于它们才能有效。诸如库存、系统配置、风险管理、变更管理、系统审计以及策略和SLA的业务成本等流程应与补丁管理一起进行评估和增强;应在所有这些过程中建立适当的补丁适用性评估并与之协调,使补丁管理成为一个安全、可靠和有效的过程,以执行其高调的任务。提出了一种基于sla驱动的补丁适用性分析的补丁管理框架。提供自动补丁适用性分析和风险评估,支持补丁过程中的业务影响分析和逻辑控制。基于实际业务服务案例的仿真实验结果表明,基于sla驱动的补丁适用性分析的补丁管理优于传统的补丁管理。
{"title":"SLA-driven applicability analysis for patch management","authors":"Bo Yang, Sai Zeng, Naga Ayachitula, Rajeev Puri","doi":"10.1109/INM.2011.5990544","DOIUrl":"https://doi.org/10.1109/INM.2011.5990544","url":null,"abstract":"To strengthen patch management, organizations are required not only to focus on sole patch management on single server, machine or application servers, but also to consider other IT system management processes as well because patch management relies on them to be efficient. Processes such as inventory, system configurations, risk management, change management, system audit, and business cost on policy and SLA should be evaluated and enhanced together with patch management; appropriate applicability assessment of patch should be built in and coordinated with all these processes to make patch management a safe, reliable and efficient process to carry out its high profile tasks. This paper presents a patch management framework based on SLA-driven patch applicability analysis. It provides automatic patch applicability analysis and risk assessment for supporting business-impact analysis and logical control during patch process. Experimental results collected from the simulation on realistic business services case study show that SLA-driven patch applicability analysis based patch management outperforms traditional patch management.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A declarative approach for global network security configuration verification and evaluation 用于全局网络安全配置验证和评估的声明性方法
M. Rahman, E. Al-Shaer
With the increasing number of security devices and rules in the network, the complexity of detecting and tracing network security configuration errors become a very challenging task. This in turn increases the potential of security breaches due to rule conflicts, requirement violations or lack of security hardening. Most of the existing tools are either limited in scope as they do not offer a global analysis of different network devices or hard to comprehensively use because these tools are not declarative. Declarative logic programming can readily express network configurations and security requirements for verification analysis. In this paper, we use Prolog to model the entire network security configurations including topology, routing, firewall and IPSec. This is implemented in a tool called ConfigAnalyzer, which was also evaluated with large network and policy sizes. The tool allows for verifying reachability and security properties in flexible and expressive manner. It also allows for evaluating security configurations in terms of accessibilities credentials and rules.
随着网络中安全设备和安全规则的不断增加,检测和跟踪网络安全配置错误的复杂性成为一项非常具有挑战性的任务。这反过来又增加了由于规则冲突、需求违反或缺乏安全强化而导致的安全破坏的可能性。大多数现有的工具要么范围有限,因为它们不提供不同网络设备的全局分析,要么难以全面使用,因为这些工具不是声明性的。声明性逻辑编程可以很容易地表达验证分析的网络配置和安全需求。在本文中,我们使用Prolog对整个网络的安全配置进行建模,包括拓扑、路由、防火墙和IPSec。这是在一个名为ConfigAnalyzer的工具中实现的,该工具也在大型网络和策略大小下进行了评估。该工具允许以灵活和富有表现力的方式验证可达性和安全属性。它还允许根据可访问性、凭据和规则评估安全配置。
{"title":"A declarative approach for global network security configuration verification and evaluation","authors":"M. Rahman, E. Al-Shaer","doi":"10.1109/INM.2011.5990556","DOIUrl":"https://doi.org/10.1109/INM.2011.5990556","url":null,"abstract":"With the increasing number of security devices and rules in the network, the complexity of detecting and tracing network security configuration errors become a very challenging task. This in turn increases the potential of security breaches due to rule conflicts, requirement violations or lack of security hardening. Most of the existing tools are either limited in scope as they do not offer a global analysis of different network devices or hard to comprehensively use because these tools are not declarative. Declarative logic programming can readily express network configurations and security requirements for verification analysis. In this paper, we use Prolog to model the entire network security configurations including topology, routing, firewall and IPSec. This is implemented in a tool called ConfigAnalyzer, which was also evaluated with large network and policy sizes. The tool allows for verifying reachability and security properties in flexible and expressive manner. It also allows for evaluating security configurations in terms of accessibilities credentials and rules.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124000258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A data confidentiality architecture for developing management mashups 用于开发管理mashup的数据机密性体系结构
C. R. P. D. Santos, R. S. Bezerra, L. Granville, L. Bertholdo, Winnie Cheng, Nikos Anerousis
Mashups are powerful applications created from accessing and composing multiple and distributed information sources. Their ease-of-use and modularity allow users at any skill level to construct, share and integrate their own applications. However, data security concerns remain a hindering factor in its widespread adoption, in particular, for network management. In this paper, we propose a novel development methodology and system architecture called Maestro that allows developers to express their data privacy concerns and enforce policies during mashup executions. We evaluated Maestro by building two mashup applications for managing live networks and by running performance tests that show that our runtime has negligible overhead.
mashup是通过访问和组合多个分布式信息源创建的功能强大的应用程序。它们的易用性和模块化允许任何技能水平的用户构建、共享和集成他们自己的应用程序。然而,数据安全问题仍然是其广泛采用的一个阻碍因素,特别是在网络管理方面。在本文中,我们提出了一种新的开发方法和系统架构,称为Maestro,它允许开发人员表达他们的数据隐私问题,并在mashup执行期间执行策略。我们通过构建两个用于管理实时网络的mashup应用程序和运行性能测试来评估Maestro,这些测试表明运行时的开销可以忽略不计。
{"title":"A data confidentiality architecture for developing management mashups","authors":"C. R. P. D. Santos, R. S. Bezerra, L. Granville, L. Bertholdo, Winnie Cheng, Nikos Anerousis","doi":"10.1109/INM.2011.5990673","DOIUrl":"https://doi.org/10.1109/INM.2011.5990673","url":null,"abstract":"Mashups are powerful applications created from accessing and composing multiple and distributed information sources. Their ease-of-use and modularity allow users at any skill level to construct, share and integrate their own applications. However, data security concerns remain a hindering factor in its widespread adoption, in particular, for network management. In this paper, we propose a novel development methodology and system architecture called Maestro that allows developers to express their data privacy concerns and enforce policies during mashup executions. We evaluated Maestro by building two mashup applications for managing live networks and by running performance tests that show that our runtime has negligible overhead.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125867450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1