首页 > 最新文献

12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops最新文献

英文 中文
A hierarchical model to evaluate quality of experience of online services hosted by cloud computing 基于云计算的在线服务体验质量评价的层次模型
Haiyang Qian, D. Medhi, Kishor S. Trivedi
As online service providers utilize cloud computing to host their services, they are challenged by evaluating the quality of experience and designing redirection strategies in this complicated environment. We propose a hierarchical modeling approach that can easily combine all components of this environment. Identifying interactions among the components is the key to construct such models. In this particular environment, we first construct four sub-models: an outbound bandwidth model, a cloud computing availability model, a latency model and a cloud computing response time model. Then we use a redirection strategy graph to glue them together. We also introduce an all-in-one barometer to ease the evaluation. The numeric results show that our model serves as a very useful analytical tool for online service providers to evaluate cloud computing providers and design redirection strategies.
随着在线服务提供商利用云计算来托管他们的服务,他们面临着在这种复杂环境中评估体验质量和设计重定向策略的挑战。我们提出了一种分层建模方法,可以轻松地组合该环境的所有组件。确定组件之间的交互是构建此类模型的关键。在这个特定的环境中,我们首先构建了四个子模型:出站带宽模型、云计算可用性模型、延迟模型和云计算响应时间模型。然后我们使用重定向策略图将它们粘合在一起。我们还引入了一个一体化的晴雨表,以简化评估。数值结果表明,该模型为在线服务提供商评估云计算提供商和设计重定向策略提供了一个非常有用的分析工具。
{"title":"A hierarchical model to evaluate quality of experience of online services hosted by cloud computing","authors":"Haiyang Qian, D. Medhi, Kishor S. Trivedi","doi":"10.1109/INM.2011.5990680","DOIUrl":"https://doi.org/10.1109/INM.2011.5990680","url":null,"abstract":"As online service providers utilize cloud computing to host their services, they are challenged by evaluating the quality of experience and designing redirection strategies in this complicated environment. We propose a hierarchical modeling approach that can easily combine all components of this environment. Identifying interactions among the components is the key to construct such models. In this particular environment, we first construct four sub-models: an outbound bandwidth model, a cloud computing availability model, a latency model and a cloud computing response time model. Then we use a redirection strategy graph to glue them together. We also introduce an all-in-one barometer to ease the evaluation. The numeric results show that our model serves as a very useful analytical tool for online service providers to evaluate cloud computing providers and design redirection strategies.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126127474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
User behavior anticipation in P2P live video streaming systems through a Bayesian network 基于贝叶斯网络的P2P直播视频流系统用户行为预测
I. Ullah, G. Doyen, Grégory Bonnet, D. Gaïti
In recent years, Peer-to-Peer (P2P) architectures have emerged as a scalable, low cost and easily deployable solution for live video streaming applications. In these systems, the load of video transmission is distributed over end-hosts by enabling them to relay the content to each other. Since end-hosts are controlled by users, their behavior directly impact the performance of the system. To understand it, massive measurement campaigns covering large-scale systems and long time periods have been performed. In this paper, we gathered and synthesized results obtained through these measurements and propose a Bayesian network that captures and integrates all of them into a synthetic model. We apply this model to the anticipation of peer departures which is an important challenge toward the performance improvement of these systems and especially churn resilience. The validation of our proposal is performed through intensive simulations that consider a streaming system composed of thousand users over two hundred days. We especially study two deployment scenarios: a system-scale one and a local one. We also compare our proposal with two standard estimators and we show under which conditions an estimator outperforms the others.
近年来,点对点(P2P)架构作为一种可扩展、低成本和易于部署的实时视频流应用解决方案而出现。在这些系统中,通过使终端主机能够相互中继内容,视频传输的负载被分配到终端主机上。由于终端主机是由用户控制的,它们的行为直接影响系统的性能。为了理解它,已经执行了覆盖大规模系统和长时间周期的大规模测量活动。在本文中,我们收集并综合了通过这些测量获得的结果,并提出了一个贝叶斯网络,将所有这些结果捕获并集成到一个综合模型中。我们将此模型应用于同行离职的预期,这是对这些系统性能改进的重要挑战,特别是流失弹性。我们的建议是通过密集的模拟来验证的,该模拟考虑了一个由1000个用户组成的流媒体系统,超过200天。我们特别研究了两种部署场景:系统级部署场景和本地部署场景。我们还将我们的建议与两个标准估计器进行比较,并显示在哪些条件下一个估计器优于其他估计器。
{"title":"User behavior anticipation in P2P live video streaming systems through a Bayesian network","authors":"I. Ullah, G. Doyen, Grégory Bonnet, D. Gaïti","doi":"10.1109/INM.2011.5990709","DOIUrl":"https://doi.org/10.1109/INM.2011.5990709","url":null,"abstract":"In recent years, Peer-to-Peer (P2P) architectures have emerged as a scalable, low cost and easily deployable solution for live video streaming applications. In these systems, the load of video transmission is distributed over end-hosts by enabling them to relay the content to each other. Since end-hosts are controlled by users, their behavior directly impact the performance of the system. To understand it, massive measurement campaigns covering large-scale systems and long time periods have been performed. In this paper, we gathered and synthesized results obtained through these measurements and propose a Bayesian network that captures and integrates all of them into a synthetic model. We apply this model to the anticipation of peer departures which is an important challenge toward the performance improvement of these systems and especially churn resilience. The validation of our proposal is performed through intensive simulations that consider a streaming system composed of thousand users over two hundred days. We especially study two deployment scenarios: a system-scale one and a local one. We also compare our proposal with two standard estimators and we show under which conditions an estimator outperforms the others.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127510422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A middleware-based approach to supporting trust-based service selection 支持基于信任的服务选择的基于中间件的方法
C. Yew, H. Lutfiyya
Trust plays an important role in decision making especially in cases of uncertainty and incomplete information. There are many challenges to trust calculation. In this paper, we identify the challenges and offer a middleware solution. Our solution consists of a SCOUT middleware and a SCOUT client (Trust Calculator) that can be used by an application to facilitate trust calculation. As validation, a scenario is implemented. The scenario consists of service selection based on trust calculated by our proposed solution.
信任在决策中起着重要的作用,特别是在信息不确定和不完整的情况下。信任计算存在许多挑战。在本文中,我们确定了挑战并提供了一个中间件解决方案。我们的解决方案由SCOUT中间件和SCOUT客户端(信任计算器)组成,应用程序可以使用它们来促进信任计算。作为验证,实现了一个场景。该场景由基于我们提出的解决方案计算的信任的服务选择组成。
{"title":"A middleware-based approach to supporting trust-based service selection","authors":"C. Yew, H. Lutfiyya","doi":"10.1109/INM.2011.5990540","DOIUrl":"https://doi.org/10.1109/INM.2011.5990540","url":null,"abstract":"Trust plays an important role in decision making especially in cases of uncertainty and incomplete information. There are many challenges to trust calculation. In this paper, we identify the challenges and offer a middleware solution. Our solution consists of a SCOUT middleware and a SCOUT client (Trust Calculator) that can be used by an application to facilitate trust calculation. As validation, a scenario is implemented. The scenario consists of service selection based on trust calculated by our proposed solution.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127121931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Heterogeous resource description and management in generic resource federation frameworks 通用资源联合框架中的异构资源描述和管理
S. Wahle, T. Magedanz, S. Fox, Eamonn Power
Resource federation is a concept for sharing information and communication technology (ICT) resources beyond administrative domains. The aim is to implement some common service drawing upon the resources committed by participating organizations. This concept is currently applied in a number of projects to provide large scale experimental facilities serving Future Internet research and development. In this paper we show how federated distributed resources can be described in terms of a common information model to support distributed resource management and Future Internet experimentation.
资源联合是一个概念,用于在管理域之外共享信息和通信技术(ICT)资源。其目的是利用各参加组织承诺的资源实施某种共同服务。这一概念目前应用于多个项目,为未来互联网的研究和发展提供大规模的实验设施。在本文中,我们展示了如何根据公共信息模型来描述联邦分布式资源,以支持分布式资源管理和未来互联网实验。
{"title":"Heterogeous resource description and management in generic resource federation frameworks","authors":"S. Wahle, T. Magedanz, S. Fox, Eamonn Power","doi":"10.1109/INM.2011.5990582","DOIUrl":"https://doi.org/10.1109/INM.2011.5990582","url":null,"abstract":"Resource federation is a concept for sharing information and communication technology (ICT) resources beyond administrative domains. The aim is to implement some common service drawing upon the resources committed by participating organizations. This concept is currently applied in a number of projects to provide large scale experimental facilities serving Future Internet research and development. In this paper we show how federated distributed resources can be described in terms of a common information model to support distributed resource management and Future Internet experimentation.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132328762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SLA-aware placement of multi-virtual machine elastic services in compute clouds 支持sla的多虚拟机弹性服务在计算云中的部署
David Breitgand, Amir Epstein
Elastic services comprise multiple virtualized resources that can be added and deleted on demand to match variability in the workload. A Service owner profiles the service to determine its most appropriate sizing under different workload conditions. This variable sizing is formalized through a service level agreement (SLA) between the service owner and the cloud provider. The Cloud provider obtains maximum benefit when it succeeds to fully allocate the resource set demanded by the elastic service subject to its SLA. Failure to do so may result in SLA breach and financial losses to the provider. We define a novel combinatorial optimization problem called elastic services placement problem (ESPP) to maximize the provider's benefit from SLA compliant placement. We observe that ESPP extends the generalized assignment problem (GAP), which is a well studied combinatorial optimization problem. However, ESPP turns out to be considerably harder to solve as it does not admit a constant factor approximation. We show that using a simple transformation, ESPP can be presented as a multi-unit combinatorial auction. We further present a column generation method to obtain near optimal solutions for ESPP for large data centers where exact solutions cannot be obtained in a reasonable amount of time using a direct integer programming formulation. We demonstrate the feasibility of our approach through an extensive simulation study. Our results show that we are capable of consistently obtaining good solutions in a time efficient manner. Moreover, if one is willing to trade precision to gain in computation time, our method allows to explicitly manage this tradeoff.
弹性服务包含多个虚拟化资源,可以根据需要添加和删除,以匹配工作负载的可变性。服务所有者对服务进行概要分析,以确定在不同工作负载条件下最合适的规模。这种可变规模是通过服务所有者和云提供商之间的服务级别协议(SLA)形式化的。当云提供商根据其SLA成功地完全分配弹性服务所需的资源集时,它将获得最大的收益。如果不这样做,可能会导致违反SLA并给提供商造成经济损失。我们定义了一种新的组合优化问题,称为弹性服务放置问题(ESPP),以最大限度地提高提供商从SLA兼容放置中获得的利益。我们发现ESPP扩展了广义分配问题(GAP),这是一个研究得很好的组合优化问题。然而,由于不承认常数因子近似,ESPP结果是相当难解的。通过一个简单的变换,我们证明了ESPP可以被表示为一个多单元组合拍卖。我们进一步提出了一种列生成方法,以获得大型数据中心的ESPP的近最优解,其中使用直接整数规划公式无法在合理的时间内获得精确解。我们通过广泛的模拟研究证明了我们的方法的可行性。我们的结果表明,我们能够在一个时间有效的方式持续获得良好的解决方案。此外,如果愿意以精度换取计算时间,我们的方法允许显式地管理这种权衡。
{"title":"SLA-aware placement of multi-virtual machine elastic services in compute clouds","authors":"David Breitgand, Amir Epstein","doi":"10.1109/INM.2011.5990687","DOIUrl":"https://doi.org/10.1109/INM.2011.5990687","url":null,"abstract":"Elastic services comprise multiple virtualized resources that can be added and deleted on demand to match variability in the workload. A Service owner profiles the service to determine its most appropriate sizing under different workload conditions. This variable sizing is formalized through a service level agreement (SLA) between the service owner and the cloud provider. The Cloud provider obtains maximum benefit when it succeeds to fully allocate the resource set demanded by the elastic service subject to its SLA. Failure to do so may result in SLA breach and financial losses to the provider. We define a novel combinatorial optimization problem called elastic services placement problem (ESPP) to maximize the provider's benefit from SLA compliant placement. We observe that ESPP extends the generalized assignment problem (GAP), which is a well studied combinatorial optimization problem. However, ESPP turns out to be considerably harder to solve as it does not admit a constant factor approximation. We show that using a simple transformation, ESPP can be presented as a multi-unit combinatorial auction. We further present a column generation method to obtain near optimal solutions for ESPP for large data centers where exact solutions cannot be obtained in a reasonable amount of time using a direct integer programming formulation. We demonstrate the feasibility of our approach through an extensive simulation study. Our results show that we are capable of consistently obtaining good solutions in a time efficient manner. Moreover, if one is willing to trade precision to gain in computation time, our method allows to explicitly manage this tradeoff.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128768989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 85
Initial thoughts on business-driven IT management challenges in Cloud computing providers 关于云计算提供商中业务驱动的IT管理挑战的初步想法
J. O. Fitó, Jordi Guitart
Nowadays Cloud computing is recognized as the most emerging computing paradigm. Because of its promising benefits, every day more and more enterprises are relying on Cloud systems. Furthermore, new Cloud business models are appearing, most of them within the SaaS marketplace, which fully depend on PaaS and IaaS providers. In any case, the expectation from businesses that IT (Cloud) services and infrastructures should bring them closer to the achievement of their Business-Level Objectives (BLOs) is spreading. Due to this fact, the presence in Cloud providers of a self-management of Cloud services and infrastructures driven by business-level aspects is mandatory. In this direction, the Business-Driven IT Management (BDIM) discipline has been evolving as the most promising way in the sense of aligning IT (low-level) management decisions with business-level objectives coming from providers themselves, as well as from their users. In this paper, we expose several BDIM challenges on the Cloud computing paradigm. Consequently, we outline key issues for the inclusion of BDIM-related features into the core operation of Cloud providers.
如今,云计算被认为是最新兴的计算范式。由于其巨大的优势,越来越多的企业依赖于云系统。此外,新的云业务模式正在出现,其中大多数在SaaS市场中,完全依赖于PaaS和IaaS提供商。无论如何,企业对IT(云)服务和基础设施应该使他们更接近于实现其业务级目标的期望正在蔓延。由于这一事实,云提供商必须提供由业务级方面驱动的云服务和基础设施的自我管理。在这个方向上,业务驱动的IT管理(BDIM)规程在将IT(低级)管理决策与来自提供商本身及其用户的业务级目标保持一致的意义上已经发展成为最有前途的方法。在本文中,我们揭示了BDIM对云计算范式的几个挑战。因此,我们概述了在云提供商的核心操作中包含bdim相关功能的关键问题。
{"title":"Initial thoughts on business-driven IT management challenges in Cloud computing providers","authors":"J. O. Fitó, Jordi Guitart","doi":"10.1109/INM.2011.5990507","DOIUrl":"https://doi.org/10.1109/INM.2011.5990507","url":null,"abstract":"Nowadays Cloud computing is recognized as the most emerging computing paradigm. Because of its promising benefits, every day more and more enterprises are relying on Cloud systems. Furthermore, new Cloud business models are appearing, most of them within the SaaS marketplace, which fully depend on PaaS and IaaS providers. In any case, the expectation from businesses that IT (Cloud) services and infrastructures should bring them closer to the achievement of their Business-Level Objectives (BLOs) is spreading. Due to this fact, the presence in Cloud providers of a self-management of Cloud services and infrastructures driven by business-level aspects is mandatory. In this direction, the Business-Driven IT Management (BDIM) discipline has been evolving as the most promising way in the sense of aligning IT (low-level) management decisions with business-level objectives coming from providers themselves, as well as from their users. In this paper, we expose several BDIM challenges on the Cloud computing paradigm. Consequently, we outline key issues for the inclusion of BDIM-related features into the core operation of Cloud providers.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Leveraging IT project lifecycle data to predict support costs 利用IT项目生命周期数据来预测支持成本
B. Dalmazo, Weverton Cordeiro, A. L. R. D. Sousa, Juliano Araujo Wickboldt, R. C. Lunardi, R. Santos, L. Gaspary, L. Granville, C. Bartolini, M. Hickey
There is an intuitive notion that the costs associated with project support actions, currently deemed too high and increasing, are directly related to the effort spent during their development and test phases. Despite the importance of systematically characterizing and understanding this relationship, little has been done in this realm mainly due to the lack of proper tooling for both sharing information between IT project phases and learning from past experiences. To tackle this issue, in this paper we propose a solution that, leveraging existing IT project lifecycle data, is able to predict support costs. The solution has been evaluated through a case study based on the ISBSG dataset, producing correct estimates for more than 80% of the assessed scenarios1.
有一种直观的概念,即与项目支持行动相关的成本,目前被认为过高且在增加,与开发和测试阶段所花费的努力直接相关。尽管系统地描述和理解这种关系很重要,但由于缺乏适当的工具来在IT项目阶段之间共享信息和从过去的经验中学习,因此在这个领域做得很少。为了解决这个问题,在本文中,我们提出了一个解决方案,利用现有的IT项目生命周期数据,能够预测支持成本。通过基于ISBSG数据集的案例研究对该解决方案进行了评估,对超过80%的评估场景产生了正确的估计1。
{"title":"Leveraging IT project lifecycle data to predict support costs","authors":"B. Dalmazo, Weverton Cordeiro, A. L. R. D. Sousa, Juliano Araujo Wickboldt, R. C. Lunardi, R. Santos, L. Gaspary, L. Granville, C. Bartolini, M. Hickey","doi":"10.1109/INM.2011.5990698","DOIUrl":"https://doi.org/10.1109/INM.2011.5990698","url":null,"abstract":"There is an intuitive notion that the costs associated with project support actions, currently deemed too high and increasing, are directly related to the effort spent during their development and test phases. Despite the importance of systematically characterizing and understanding this relationship, little has been done in this realm mainly due to the lack of proper tooling for both sharing information between IT project phases and learning from past experiences. To tackle this issue, in this paper we propose a solution that, leveraging existing IT project lifecycle data, is able to predict support costs. The solution has been evaluated through a case study based on the ISBSG dataset, producing correct estimates for more than 80% of the assessed scenarios1.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123792513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Practical IPv6 monitoring-challenges and techniques 实用的IPv6监控-挑战和技术
M. Grégr, P. Matoušek, M. Svéda, Tomas Podermanski
Network monitoring is an essential task of network management. Information obtained by monitoring devices gives a real picture of the network in production including transmitted data volumes, top hosts, a list of frequently used applications etc. Deep analysis of data collected by monitoring can reveal network attacks or detect misuse of network services. In addition, Data Retention Act requires each ISP to track user's activities. Protocol IPv6 puts new challenges for network administrators in the context of user identification. Unlike IPv4, an IPv6 address no longer uniquely identifies a user or PC. IPv6 address can be randomly generated and keeps changing in time. PCs with IPv6 stack can also communicate via predefined tunnels over IPv4 infrastructure. That tunneled traffic mostly bypasses network security implemented via firewalls. In this paper, we identify major monitoring and security issues of IPv6 connectivity and propose a solution based on SNMP and Netflow data that helps to uniquely identify users. The solution requires an extended set of monitoring data to be collected from network devices. We present a new data structure based on extended Netflow records. Feasibility of the approach is demonstrated on the Brno University of Technology (BUT) campus network.
网络监控是网络管理的一项重要任务。监控设备获得的信息提供了生产网络的真实情况,包括传输的数据量、顶级主机、常用应用程序列表等。对监控收集的数据进行深入分析可以揭示网络攻击或检测网络服务的滥用。此外,数据保留法案要求每个ISP跟踪用户的活动。IPv6协议给网络管理员在用户识别方面提出了新的挑战。与IPv4不同,IPv6地址不再是用户或PC的唯一标识。IPv6地址可以随机生成,并随时间不断变化。具有IPv6堆栈的pc也可以通过IPv4基础设施上的预定义隧道进行通信。这种隧道传输大多绕过了通过防火墙实现的网络安全。在本文中,我们确定了IPv6连接的主要监控和安全问题,并提出了一个基于SNMP和Netflow数据的解决方案,有助于唯一识别用户。该解决方案需要从网络设备收集一组扩展的监控数据。我们提出了一种新的基于扩展Netflow记录的数据结构。在布尔诺理工大学(BUT)校园网上验证了该方法的可行性。
{"title":"Practical IPv6 monitoring-challenges and techniques","authors":"M. Grégr, P. Matoušek, M. Svéda, Tomas Podermanski","doi":"10.1109/INM.2011.5990647","DOIUrl":"https://doi.org/10.1109/INM.2011.5990647","url":null,"abstract":"Network monitoring is an essential task of network management. Information obtained by monitoring devices gives a real picture of the network in production including transmitted data volumes, top hosts, a list of frequently used applications etc. Deep analysis of data collected by monitoring can reveal network attacks or detect misuse of network services. In addition, Data Retention Act requires each ISP to track user's activities. Protocol IPv6 puts new challenges for network administrators in the context of user identification. Unlike IPv4, an IPv6 address no longer uniquely identifies a user or PC. IPv6 address can be randomly generated and keeps changing in time. PCs with IPv6 stack can also communicate via predefined tunnels over IPv4 infrastructure. That tunneled traffic mostly bypasses network security implemented via firewalls. In this paper, we identify major monitoring and security issues of IPv6 connectivity and propose a solution based on SNMP and Netflow data that helps to uniquely identify users. The solution requires an extended set of monitoring data to be collected from network devices. We present a new data structure based on extended Netflow records. Feasibility of the approach is demonstrated on the Brno University of Technology (BUT) campus network.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122655798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
VoIP quality monitoring in LTE femtocells LTE飞蜂窝网络电话质量监控
C. Olariu, Mícheál Ó Foghlú, Philip Perry, L. Murphy
The increasing number of users demanding voice and data communication through cellular networks has driven the need for higher network throughput rates and lower latency. LTE femtocells address this pressing problem by offloading cellular service providers networks and increase both coverage and capacity for their users. Assuming a wired DSL backhaul for these femtocells, this paper shows simulations exploring a case where the DSLAM represents the main bottleneck when the cellular network operator and the DSL provider do not collaborate. This paper introduces the concept of Intermediary Mean Opinion Score which may be employed at femtocell gateways to isolate network problems and feed into customer experience management. We also propose and investigate a technique of mapping the human audio recency into the MOS calculation. Results are presented to illustrate the information that can be extracted from a lightweight monitor in the network.
越来越多的用户要求通过蜂窝网络进行语音和数据通信,这推动了对更高网络吞吐率和更低延迟的需求。LTE飞蜂窝通过卸载蜂窝服务提供商的网络并增加其用户的覆盖范围和容量来解决这一紧迫问题。假设这些飞基站采用有线DSL回程,本文展示了一种模拟,在这种情况下,当蜂窝网络运营商和DSL提供商不合作时,DSLAM代表主要瓶颈。本文介绍了中间平均意见评分的概念,该概念可用于移动蜂窝网关,以隔离网络问题并提供给客户体验管理。我们还提出并研究了一种将人类音频近因映射到MOS计算中的技术。给出的结果说明了可以从网络中的轻量级监视器提取的信息。
{"title":"VoIP quality monitoring in LTE femtocells","authors":"C. Olariu, Mícheál Ó Foghlú, Philip Perry, L. Murphy","doi":"10.1109/INM.2011.5990552","DOIUrl":"https://doi.org/10.1109/INM.2011.5990552","url":null,"abstract":"The increasing number of users demanding voice and data communication through cellular networks has driven the need for higher network throughput rates and lower latency. LTE femtocells address this pressing problem by offloading cellular service providers networks and increase both coverage and capacity for their users. Assuming a wired DSL backhaul for these femtocells, this paper shows simulations exploring a case where the DSLAM represents the main bottleneck when the cellular network operator and the DSL provider do not collaborate. This paper introduces the concept of Intermediary Mean Opinion Score which may be employed at femtocell gateways to isolate network problems and feed into customer experience management. We also propose and investigate a technique of mapping the human audio recency into the MOS calculation. Results are presented to illustrate the information that can be extracted from a lightweight monitor in the network.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115158788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes BALG:使用多级加密shell代码绕过应用层网关
S. Roschke, Feng Cheng, C. Meinel
Modern attacks are using sophisticated and innovative techniques. The utilization of cryptography, self-modified code, and integrated attack frameworks provide more possibilities to circumvent most existing perimeter security approaches, such as firewalls and IDS. Even Application Layer Gateways (ALG) which enforce the most restrictive network access can be exploited by using advanced attack techniques. In this paper, we propose a new attack for circumventing ALGs. By using polymorphic and encrypted shellcode, multiple shellcode stages, protocol compliant and encrypted shell tunneling, and reverse channel discovery techniques, we are able to effectively bypass ALGs. The proposed attack consists of four phases with certain requirements and results. We implemented the initial shellcode as well as the different stages and conducted the practical attack using an existing ALG. The possibility to prevent this attack with existing approaches is discussed and further research in the area of perimeter security and log management is motivated.
现代攻击正在使用复杂和创新的技术。密码学、自我修改代码和集成攻击框架的使用为绕过大多数现有的外围安全方法(如防火墙和IDS)提供了更多的可能性。即使是应用程序层网关(ALG),它执行最严格的网络访问也可以通过使用高级攻击技术来利用。在本文中,我们提出了一种新的绕过alg的攻击方法。通过使用多态和加密的shellcode,多个shellcode阶段,协议兼容和加密的shell隧道,以及反向通道发现技术,我们能够有效地绕过alg。建议的攻击由四个阶段组成,具有一定的需求和结果。我们实现了初始的shellcode以及不同的阶段,并使用现有的ALG进行了实际的攻击。讨论了利用现有方法防止这种攻击的可能性,并推动了外围安全和日志管理领域的进一步研究。
{"title":"BALG: Bypassing Application Layer Gateways using multi-staged encrypted shellcodes","authors":"S. Roschke, Feng Cheng, C. Meinel","doi":"10.1109/INM.2011.5990539","DOIUrl":"https://doi.org/10.1109/INM.2011.5990539","url":null,"abstract":"Modern attacks are using sophisticated and innovative techniques. The utilization of cryptography, self-modified code, and integrated attack frameworks provide more possibilities to circumvent most existing perimeter security approaches, such as firewalls and IDS. Even Application Layer Gateways (ALG) which enforce the most restrictive network access can be exploited by using advanced attack techniques. In this paper, we propose a new attack for circumventing ALGs. By using polymorphic and encrypted shellcode, multiple shellcode stages, protocol compliant and encrypted shell tunneling, and reverse channel discovery techniques, we are able to effectively bypass ALGs. The proposed attack consists of four phases with certain requirements and results. We implemented the initial shellcode as well as the different stages and conducted the practical attack using an existing ALG. The possibility to prevent this attack with existing approaches is discussed and further research in the area of perimeter security and log management is motivated.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134223091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1