首页 > 最新文献

arXiv - CS - Networking and Internet Architecture最新文献

英文 中文
Maximization of Communication Network Throughput using Dynamic Traffic Allocation Scheme 利用动态流量分配方案实现通信网络吞吐量最大化
Pub Date : 2024-09-07 DOI: arxiv-2409.04724
Md. Arquam, Suchi Kumari
Optimizing network throughput in real-world dynamic systems is critical,especially for diverse and delay-sensitive multimedia data types such as VoIPand video streaming. Traditional routing protocols, which rely on staticmetrics and single shortest-path algorithms, were unable in managing thiscomplex information. To address these challenges, we propose a novel approachthat enhances resource utilization while maintaining Quality of Service (QoS).Our dynamic traffic allocation model prioritizes different data types based ontheir delay sensitivity and allocates traffic by considering factors such asbandwidth, latency, and network failures. This approach is shown tosignificantly improve network throughput compared to static load balancing,especially for multimedia applications. Simulation results confirm theeffectiveness of this dynamic method in maximizing network throughput andmaintaining QoS across various data types.
在现实世界的动态系统中,优化网络吞吐量至关重要,尤其是对于网络电话和视频流等多种延迟敏感的多媒体数据类型。传统的路由协议依赖于静态指标和单一的最短路径算法,无法管理这些复杂的信息。为了应对这些挑战,我们提出了一种新方法,在保持服务质量(QoS)的同时提高资源利用率。我们的动态流量分配模型根据不同数据类型的延迟敏感性确定其优先级,并通过考虑带宽、延迟和网络故障等因素来分配流量。与静态负载平衡相比,这种方法能显著提高网络吞吐量,尤其是对于多媒体应用。仿真结果证实了这种动态方法在最大化网络吞吐量和保持各种数据类型的服务质量方面的有效性。
{"title":"Maximization of Communication Network Throughput using Dynamic Traffic Allocation Scheme","authors":"Md. Arquam, Suchi Kumari","doi":"arxiv-2409.04724","DOIUrl":"https://doi.org/arxiv-2409.04724","url":null,"abstract":"Optimizing network throughput in real-world dynamic systems is critical,\u0000especially for diverse and delay-sensitive multimedia data types such as VoIP\u0000and video streaming. Traditional routing protocols, which rely on static\u0000metrics and single shortest-path algorithms, were unable in managing this\u0000complex information. To address these challenges, we propose a novel approach\u0000that enhances resource utilization while maintaining Quality of Service (QoS).\u0000Our dynamic traffic allocation model prioritizes different data types based on\u0000their delay sensitivity and allocates traffic by considering factors such as\u0000bandwidth, latency, and network failures. This approach is shown to\u0000significantly improve network throughput compared to static load balancing,\u0000especially for multimedia applications. Simulation results confirm the\u0000effectiveness of this dynamic method in maximizing network throughput and\u0000maintaining QoS across various data types.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IPN-V: The Interplanetary Network Visualizer IPN-V:星际网络展示台
Pub Date : 2024-09-07 DOI: arxiv-2409.04857
Alice Le Bihan, Juan A. Fraire, Pierre Francois, Felix Flentge
The Interplanetary Network (IPN) emerges as the backbone for communicationbetween various spacecraft and satellites orbiting distant celestial bodies.This paper introduces the Interplanetary Network Visualizer (IPN-V), a softwareplatform that integrates interplanetary communications planning support,education, and outreach. IPN-V bridges the gap between the complexities ofastrodynamics and network engineering by enabling the generation and assessmentof dynamic, realistic network topologies that encapsulate the inherentchallenges of space communication, such as time-evolving latencies andplanetary occlusions. Leveraging the power of Unity 3D and C#, IPN-V provides auser-friendly 3D interface for the interactive visualization of interplanetarynetworks, incorporating contact tracing models to represent line-of-sightcommunication constraints accurately. IPN-V supports importing and exportingcontact plans compatible with established space communication standards,including NASA's ION and HDTN formats. This paper delineates the conception,architecture, and operational framework of IPN-V while evaluating itsperformance metrics.
行星际网络(IPN)是围绕遥远天体运行的各种航天器和卫星之间进行通信的主干网。本文介绍行星际网络展示台(IPN-V),这是一个集行星际通信规划支持、教育和推广于一体的软件平台。IPN-V 在复杂的空间动力学和网络工程之间架起了一座桥梁,它能够生成和评估动态、逼真的网络拓扑结构,这些拓扑结构囊括了空间通信固有的挑战,如时变延迟和行星遮挡。IPN-V 利用 Unity 3D 和 C# 的强大功能,为行星际网络的交互式可视化提供了用户友好的 3D 界面,并结合了接触跟踪模型,以准确地表示视距通信限制。IPN-V 支持导入和导出与既定空间通信标准兼容的接触计划,包括 NASA 的 ION 和 HDTN 格式。本文介绍了 IPN-V 的构思、架构和运行框架,同时对其性能指标进行了评估。
{"title":"IPN-V: The Interplanetary Network Visualizer","authors":"Alice Le Bihan, Juan A. Fraire, Pierre Francois, Felix Flentge","doi":"arxiv-2409.04857","DOIUrl":"https://doi.org/arxiv-2409.04857","url":null,"abstract":"The Interplanetary Network (IPN) emerges as the backbone for communication\u0000between various spacecraft and satellites orbiting distant celestial bodies.\u0000This paper introduces the Interplanetary Network Visualizer (IPN-V), a software\u0000platform that integrates interplanetary communications planning support,\u0000education, and outreach. IPN-V bridges the gap between the complexities of\u0000astrodynamics and network engineering by enabling the generation and assessment\u0000of dynamic, realistic network topologies that encapsulate the inherent\u0000challenges of space communication, such as time-evolving latencies and\u0000planetary occlusions. Leveraging the power of Unity 3D and C#, IPN-V provides a\u0000user-friendly 3D interface for the interactive visualization of interplanetary\u0000networks, incorporating contact tracing models to represent line-of-sight\u0000communication constraints accurately. IPN-V supports importing and exporting\u0000contact plans compatible with established space communication standards,\u0000including NASA's ION and HDTN formats. This paper delineates the conception,\u0000architecture, and operational framework of IPN-V while evaluating its\u0000performance metrics.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Twin Enabled Data-Driven Approach for Traffic Efficiency and Software-Defined Vehicular Network Optimization 交通效率和软件定义车载网络优化的数字孪生数据驱动方法
Pub Date : 2024-09-06 DOI: arxiv-2409.04622
Mohammad Sajid Shahriar, Suresh Subramaniam, Motoharu Matsuura, Hiroshi Hasegawa, Shih-Chun Lin
In the realms of the internet of vehicles (IoV) and intelligenttransportation systems (ITS), software defined vehicular networks (SDVN) andedge computing (EC) have emerged as promising technologies for enhancing roadtraffic efficiency. However, the increasing number of connected autonomousvehicles (CAVs) and EC-based applications presents multi-domain challenges suchas inefficient traffic flow due to poor CAV coordination and flow-tableoverflow in SDVN from increased connectivity and limited ternary contentaddressable memory (TCAM) capacity. To address these, we focus on a data-drivenapproach using virtualization technologies like digital twin (DT) to leveragereal-time data and simulations. We introduce a DT design and propose twodata-driven solutions: a centralized decision support framework to improvetraffic efficiency by reducing waiting times at roundabouts and an approach tominimize flow-table overflow and flow re-installation by optimizing flow-entrylifespan in SDVN. Simulation results show the decision support frameworkreduces average waiting times by 22% compared to human-driven vehicles, evenwith a CAV penetration rate of 40%. Additionally, the proposed optimization offlow-table space usage demonstrates a 50% reduction in flow-table spacerequirements, even with 100% penetration of connected vehicles.
在车联网(IoV)和智能交通系统(ITS)领域,软件定义车载网络(SDVN)和边缘计算(EC)已成为提高道路交通效率的有前途的技术。然而,不断增加的联网自动驾驶汽车(CAV)和基于边缘计算的应用带来了多领域的挑战,例如由于 CAV 协调不力导致的交通流量效率低下,以及 SDVN 中由于连接性增加和三元内容可寻址存储器(TCAM)容量有限导致的流表溢出。为了解决这些问题,我们将重点放在数据驱动的方法上,使用数字孪生(DT)等虚拟化技术来利用实时数据和模拟。我们介绍了一种数字孪生设计,并提出了两种数据驱动型解决方案:一种是通过减少环岛等待时间来提高交通效率的集中式决策支持框架,另一种是通过优化 SDVN 中的流量入口寿命来最大限度地减少流量表溢出和流量重装的方法。仿真结果表明,与人类驾驶的车辆相比,决策支持框架可将平均等待时间缩短 22%,即使 CAV 的渗透率为 40%。此外,即使互联车辆的渗透率达到 100%,所提出的流量表空间使用优化方案也能使流量表空间需求减少 50%。
{"title":"Digital Twin Enabled Data-Driven Approach for Traffic Efficiency and Software-Defined Vehicular Network Optimization","authors":"Mohammad Sajid Shahriar, Suresh Subramaniam, Motoharu Matsuura, Hiroshi Hasegawa, Shih-Chun Lin","doi":"arxiv-2409.04622","DOIUrl":"https://doi.org/arxiv-2409.04622","url":null,"abstract":"In the realms of the internet of vehicles (IoV) and intelligent\u0000transportation systems (ITS), software defined vehicular networks (SDVN) and\u0000edge computing (EC) have emerged as promising technologies for enhancing road\u0000traffic efficiency. However, the increasing number of connected autonomous\u0000vehicles (CAVs) and EC-based applications presents multi-domain challenges such\u0000as inefficient traffic flow due to poor CAV coordination and flow-table\u0000overflow in SDVN from increased connectivity and limited ternary content\u0000addressable memory (TCAM) capacity. To address these, we focus on a data-driven\u0000approach using virtualization technologies like digital twin (DT) to leverage\u0000real-time data and simulations. We introduce a DT design and propose two\u0000data-driven solutions: a centralized decision support framework to improve\u0000traffic efficiency by reducing waiting times at roundabouts and an approach to\u0000minimize flow-table overflow and flow re-installation by optimizing flow-entry\u0000lifespan in SDVN. Simulation results show the decision support framework\u0000reduces average waiting times by 22% compared to human-driven vehicles, even\u0000with a CAV penetration rate of 40%. Additionally, the proposed optimization of\u0000flow-table space usage demonstrates a 50% reduction in flow-table space\u0000requirements, even with 100% penetration of connected vehicles.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimizing Power Consumption under SINR Constraints for Cell-Free Massive MIMO in O-RAN 在 SINR 约束条件下最大限度降低 O-RAN 中无蜂窝大规模多输入多输出的功耗
Pub Date : 2024-09-06 DOI: arxiv-2409.04135
Vaishnavi Kasuluru, Luis Blanco, Miguel Angel Vazquez, Cristian J. Vaca-Rubio, Engin Zeydan
This paper deals with the problem of energy consumption minimization in OpenRAN cell-free (CF) massive Multiple-Input Multiple-Output (mMIMO) systems underminimum per-user signal-to-noise-plus-interference ratio (SINR) constraints.Considering that several access points (APs) are deployed with multipleantennas, and they jointly serve multiple users on the same time-frequencyresources, we design the precoding vectors that minimize the system powerconsumption, while preserving a minimum SINR for each user. We use a simple,yet representative, power consumption model, which consists of a fixed termthat models the power consumption due to activation of the AP and a variableone that depends on the transmitted power. The mentioned problem boils down toa binary-constrained quadratic optimization problem, which is stronglynon-convex. In order to solve this problem, we resort to a novel approach,which is based on the penalized convex-concave procedure. The proposed approachcan be implemented in an O-RAN cell-free mMIMO system as an xApp in thenear-real time RIC (RAN intelligent Controller). Numerical results show thepotential of this approach for dealing with joint precoding optimization and APselection.
考虑到多个接入点(AP)部署了多个天线,并在相同的时频资源上共同为多个用户提供服务,我们设计了最小化系统功耗的预编码向量,同时为每个用户保留了最小 SINR。我们使用了一个简单而又有代表性的功耗模型,它由一个固定项和一个可变项组成,固定项模拟 AP 激活时的功耗,可变项则取决于传输功率。上述问题可归结为二元受限二次优化问题,该问题具有强凸性。为了解决这个问题,我们采用了一种基于受惩罚凸凹过程的新方法。所提出的方法可以作为近实时 RIC(RAN 智能控制器)中的一个 xApp 在 O-RAN 无小区 mMIMO 系统中实现。数值结果表明了这种方法在处理联合预编码优化和接入点选择方面的潜力。
{"title":"Minimizing Power Consumption under SINR Constraints for Cell-Free Massive MIMO in O-RAN","authors":"Vaishnavi Kasuluru, Luis Blanco, Miguel Angel Vazquez, Cristian J. Vaca-Rubio, Engin Zeydan","doi":"arxiv-2409.04135","DOIUrl":"https://doi.org/arxiv-2409.04135","url":null,"abstract":"This paper deals with the problem of energy consumption minimization in Open\u0000RAN cell-free (CF) massive Multiple-Input Multiple-Output (mMIMO) systems under\u0000minimum per-user signal-to-noise-plus-interference ratio (SINR) constraints.\u0000Considering that several access points (APs) are deployed with multiple\u0000antennas, and they jointly serve multiple users on the same time-frequency\u0000resources, we design the precoding vectors that minimize the system power\u0000consumption, while preserving a minimum SINR for each user. We use a simple,\u0000yet representative, power consumption model, which consists of a fixed term\u0000that models the power consumption due to activation of the AP and a variable\u0000one that depends on the transmitted power. The mentioned problem boils down to\u0000a binary-constrained quadratic optimization problem, which is strongly\u0000non-convex. In order to solve this problem, we resort to a novel approach,\u0000which is based on the penalized convex-concave procedure. The proposed approach\u0000can be implemented in an O-RAN cell-free mMIMO system as an xApp in the\u0000near-real time RIC (RAN intelligent Controller). Numerical results show the\u0000potential of this approach for dealing with joint precoding optimization and AP\u0000selection.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VQ-DeepVSC: A Dual-Stage Vector Quantization Framework for Video Semantic Communication VQ-DeepVSC:用于视频语义通信的双级矢量量化框架
Pub Date : 2024-09-05 DOI: arxiv-2409.03393
Yongyi Miao, Zhongdang Li, Yang Wang, Die Hu, Jun Yan, Youfang Wang
In response to the rapid growth of global videomtraffic and the limitationsof traditional wireless transmission systems, we propose a novel dual-stagevector quantization framework, VQ-DeepVSC, tailored to enhance videotransmission over wireless channels. In the first stage, we design the adaptivekeyframe extractor and interpolator, deployed respectively at the transmitterand receiver, which intelligently select key frames to minimize inter-frameredundancy and mitigate the cliff-effect under challenging channel conditions.In the second stage, we propose the semantic vector quantization encoder anddecoder, placed respectively at the transmitter and receiver, which efficientlycompress key frames using advanced indexing and spatial normalization modulesto reduce redundancy. Additionally, we propose adjustable index selection andrecovery modules, enhancing compression efficiency and enabling flexiblecompression ratio adjustment. Compared to the joint source-channel coding(JSCC) framework, the proposed framework exhibits superior compatibility withcurrent digital communication systems. Experimental results demonstrate thatVQ-DeepVSC achieves substantial improvements in both Multi-Scale StructuralSimilarity (MS-SSIM) and Learned Perceptual Image Patch Similarity (LPIPS)metrics than the H.265 standard, particularly under low channel signal-to-noiseratio (SNR) or multi-path channels, highlighting the significantly enhancedtransmission capabilities of our approach.
针对全球视频流量的快速增长和传统无线传输系统的局限性,我们提出了一种新颖的双阶段矢量量化框架 VQ-DeepVSC,专门用于增强无线信道上的视频传输。在第一阶段,我们设计了自适应关键帧提取器和内插器,分别部署在发射器和接收器上,可智能地选择关键帧,以最大限度地减少帧间冗余,并缓解具有挑战性的信道条件下的悬崖效应。在第二阶段,我们提出了语义矢量量化编码器和解码器,分别部署在发射器和接收器上,利用先进的索引和空间归一化模块有效地压缩关键帧,以减少冗余。此外,我们还提出了可调整的索引选择和恢复模块,提高了压缩效率,并实现了灵活的压缩比调整。与联合信源信道编码(JSCC)框架相比,所提出的框架与当前的数字通信系统具有更好的兼容性。实验结果表明,与H.265标准相比,VQ-DeepVSC在多尺度结构相似性(MS-SSIM)和学习感知图像补丁相似性(LPIPS)指标上都取得了大幅改进,尤其是在低信道信噪比(SNR)或多路径信道条件下,这凸显了我们的方法显著增强的传输能力。
{"title":"VQ-DeepVSC: A Dual-Stage Vector Quantization Framework for Video Semantic Communication","authors":"Yongyi Miao, Zhongdang Li, Yang Wang, Die Hu, Jun Yan, Youfang Wang","doi":"arxiv-2409.03393","DOIUrl":"https://doi.org/arxiv-2409.03393","url":null,"abstract":"In response to the rapid growth of global videomtraffic and the limitations\u0000of traditional wireless transmission systems, we propose a novel dual-stage\u0000vector quantization framework, VQ-DeepVSC, tailored to enhance video\u0000transmission over wireless channels. In the first stage, we design the adaptive\u0000keyframe extractor and interpolator, deployed respectively at the transmitter\u0000and receiver, which intelligently select key frames to minimize inter-frame\u0000redundancy and mitigate the cliff-effect under challenging channel conditions.\u0000In the second stage, we propose the semantic vector quantization encoder and\u0000decoder, placed respectively at the transmitter and receiver, which efficiently\u0000compress key frames using advanced indexing and spatial normalization modules\u0000to reduce redundancy. Additionally, we propose adjustable index selection and\u0000recovery modules, enhancing compression efficiency and enabling flexible\u0000compression ratio adjustment. Compared to the joint source-channel coding\u0000(JSCC) framework, the proposed framework exhibits superior compatibility with\u0000current digital communication systems. Experimental results demonstrate that\u0000VQ-DeepVSC achieves substantial improvements in both Multi-Scale Structural\u0000Similarity (MS-SSIM) and Learned Perceptual Image Patch Similarity (LPIPS)\u0000metrics than the H.265 standard, particularly under low channel signal-to-noise\u0000ratio (SNR) or multi-path channels, highlighting the significantly enhanced\u0000transmission capabilities of our approach.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion Detection 迈向自主网络安全:用于自主入侵检测的智能 AutoML 框架
Pub Date : 2024-09-05 DOI: arxiv-2409.03141
Li Yang, Abdallah Shami
The rapid evolution of mobile networks from 5G to 6G has necessitated thedevelopment of autonomous network management systems, such as Zero-TouchNetworks (ZTNs). However, the increased complexity and automation of thesenetworks have also escalated cybersecurity risks. Existing Intrusion DetectionSystems (IDSs) leveraging traditional Machine Learning (ML) techniques haveshown effectiveness in mitigating these risks, but they often require extensivemanual effort and expert knowledge. To address these challenges, this paperproposes an Automated Machine Learning (AutoML)-based autonomous IDS frameworktowards achieving autonomous cybersecurity for next-generation networks. Toachieve autonomous intrusion detection, the proposed AutoML framework automatesall critical procedures of the data analytics pipeline, including datapre-processing, feature engineering, model selection, hyperparameter tuning,and model ensemble. Specifically, it utilizes a Tabular VariationalAuto-Encoder (TVAE) method for automated data balancing, tree-based ML modelsfor automated feature selection and base model learning, Bayesian Optimization(BO) for hyperparameter optimization, and a novel Optimized Confidence-basedStacking Ensemble (OCSE) method for automated model ensemble. The proposedAutoML-based IDS was evaluated on two public benchmark network securitydatasets, CICIDS2017 and 5G-NIDD, and demonstrated improved performancecompared to state-of-the-art cybersecurity methods. This research marks asignificant step towards fully autonomous cybersecurity in next-generationnetworks, potentially revolutionizing network security applications.
随着移动网络从 5G 向 6G 的快速演进,有必要开发自主网络管理系统,如零接触网络(ZTN)。然而,网络复杂性和自动化程度的提高也加剧了网络安全风险。利用传统机器学习(ML)技术的现有入侵检测系统(IDS)在降低这些风险方面显示出了有效性,但它们通常需要大量的人工操作和专家知识。为了应对这些挑战,本文提出了一种基于自动机器学习(AutoML)的自主 IDS 框架,以实现下一代网络的自主网络安全。为了实现自主入侵检测,本文提出的 AutoML 框架将数据分析管道的所有关键程序自动化,包括数据预处理、特征工程、模型选择、超参数调整和模型集合。具体来说,该框架利用表格变异自动编码器(TVAE)方法实现自动数据平衡,利用基于树的 ML 模型实现自动特征选择和基础模型学习,利用贝叶斯优化(BO)方法实现超参数优化,利用新颖的基于置信度的优化堆叠集合(OCSE)方法实现自动模型集合。在两个公共基准网络安全数据集(CICIDS2017 和 5G-NIDD)上对所提出的基于 AutoML 的 IDS 进行了评估,结果表明与最先进的网络安全方法相比,IDS 的性能有所提高。这项研究标志着在下一代网络中实现完全自主的网络安全迈出了重要一步,有可能彻底改变网络安全应用。
{"title":"Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion Detection","authors":"Li Yang, Abdallah Shami","doi":"arxiv-2409.03141","DOIUrl":"https://doi.org/arxiv-2409.03141","url":null,"abstract":"The rapid evolution of mobile networks from 5G to 6G has necessitated the\u0000development of autonomous network management systems, such as Zero-Touch\u0000Networks (ZTNs). However, the increased complexity and automation of these\u0000networks have also escalated cybersecurity risks. Existing Intrusion Detection\u0000Systems (IDSs) leveraging traditional Machine Learning (ML) techniques have\u0000shown effectiveness in mitigating these risks, but they often require extensive\u0000manual effort and expert knowledge. To address these challenges, this paper\u0000proposes an Automated Machine Learning (AutoML)-based autonomous IDS framework\u0000towards achieving autonomous cybersecurity for next-generation networks. To\u0000achieve autonomous intrusion detection, the proposed AutoML framework automates\u0000all critical procedures of the data analytics pipeline, including data\u0000pre-processing, feature engineering, model selection, hyperparameter tuning,\u0000and model ensemble. Specifically, it utilizes a Tabular Variational\u0000Auto-Encoder (TVAE) method for automated data balancing, tree-based ML models\u0000for automated feature selection and base model learning, Bayesian Optimization\u0000(BO) for hyperparameter optimization, and a novel Optimized Confidence-based\u0000Stacking Ensemble (OCSE) method for automated model ensemble. The proposed\u0000AutoML-based IDS was evaluated on two public benchmark network security\u0000datasets, CICIDS2017 and 5G-NIDD, and demonstrated improved performance\u0000compared to state-of-the-art cybersecurity methods. This research marks a\u0000significant step towards fully autonomous cybersecurity in next-generation\u0000networks, potentially revolutionizing network security applications.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weather-Adaptive Multi-Step Forecasting of State of Polarization Changes in Aerial Fibers Using Wavelet Neural Networks 利用小波神经网络对航空光纤极化状态变化进行天气适应性多步骤预测
Pub Date : 2024-09-05 DOI: arxiv-2409.03663
Khouloud Abdelli, Matteo Lonardi, Jurgen Gripp, Samuel Olsson Fabien Boitier, Patricia Layec
We introduce a novel weather-adaptive approach for multi-step forecasting ofmulti-scale SOP changes in aerial fiber links. By harnessing the discretewavelet transform and incorporating weather data, our approach improvesforecasting accuracy by over 65% in RMSE and 63% in MAPE compared to baselines.
我们介绍了一种新颖的天气适应方法,用于对空中光纤链路中的多尺度 SOP 变化进行多步骤预测。通过利用离散小波变换并结合天气数据,与基线相比,我们的方法在 RMSE 和 MAPE 方面分别提高了 65% 和 63% 以上的预测精度。
{"title":"Weather-Adaptive Multi-Step Forecasting of State of Polarization Changes in Aerial Fibers Using Wavelet Neural Networks","authors":"Khouloud Abdelli, Matteo Lonardi, Jurgen Gripp, Samuel Olsson Fabien Boitier, Patricia Layec","doi":"arxiv-2409.03663","DOIUrl":"https://doi.org/arxiv-2409.03663","url":null,"abstract":"We introduce a novel weather-adaptive approach for multi-step forecasting of\u0000multi-scale SOP changes in aerial fiber links. By harnessing the discrete\u0000wavelet transform and incorporating weather data, our approach improves\u0000forecasting accuracy by over 65% in RMSE and 63% in MAPE compared to baselines.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VECA: Reliable and Confidential Resource Clustering for Volunteer Edge-Cloud Computing VECA:面向志愿者边缘云计算的可靠保密资源集群
Pub Date : 2024-09-04 DOI: arxiv-2409.03057
Hemanth Sai Yeddulapalli, Mauro Lemus Alarcon, Upasana Roy, Roshan Lal Neupane, Durbek Gafurov, Motahare Mounesan, Saptarshi Debroy, Prasad Calyam
Volunteer Edge-Cloud (VEC) computing has a significant potential to supportscientific workflows in user communities contributing volunteer edge nodes.However, managing heterogeneous and intermittent resources to supportmachine/deep learning (ML/DL) based workflows poses challenges in resourcegovernance for reliability, and confidentiality for model/data privacyprotection. There is a need for approaches to handle the volatility ofvolunteer edge node availability, and also to scale the confidentialdata-intensive workflow execution across a large number of VEC nodes. In thispaper, we present VECA, a reliable and confidential VEC resource clusteringsolution featuring three-fold methods tailored for executing ML/DL-basedscientific workflows on VEC resources. Firstly, a capacity-based clusteringapproach enhances system reliability and minimizes VEC node search latency.Secondly, a novel two-phase, globally distributed scheduling scheme optimizesjob allocation based on node attributes and using time-series-based RecurrentNeural Networks. Lastly, the integration of confidential computing ensuresprivacy preservation of the scientific workflows, where model and datainformation are not shared with VEC resources providers. We evaluate VECA in aFunction-as-a-Service (FaaS) cloud testbed that features OpenFaaS and MicroK8Sto support two ML/DL-based scientific workflows viz., G2P-Deep (bioinformatics)and PAS-ML (health informatics). Results from tested experiments demonstratethat our proposed VECA approach outperforms state-of-the-art methods;especially VECA exhibits a two-fold reduction in VEC node search latency andover 20% improvement in productivity rates following execution failurescompared to the next best method.
志愿边缘云(VEC)计算在支持用户社区的科学工作流方面具有巨大潜力,这些用户社区贡献了志愿边缘节点。然而,管理异构和间歇性资源以支持基于机器/深度学习(ML/DL)的工作流,在资源治理的可靠性和模型/数据隐私保护的保密性方面提出了挑战。我们需要一种方法来处理志愿边缘节点可用性的不稳定性,并在大量 VEC 节点上扩展机密数据密集型工作流的执行。在本文中,我们介绍了 VECA,一种可靠的保密 VEC 资源集群解决方案,它具有三重方法,专为在 VEC 资源上执行基于 ML/DL 的科学工作流而量身定制。首先,基于容量的集群方法提高了系统可靠性,并最大限度地减少了 VEC 节点搜索延迟。其次,新颖的两阶段全局分布式调度方案根据节点属性并利用基于时间序列的循环神经网络优化了任务分配。最后,保密计算的集成确保了科学工作流的私密性,模型和数据信息不会与 VEC 资源提供商共享。我们在功能即服务(FaaS)云测试平台上对 VECA 进行了评估,该测试平台以 OpenFaaS 和 MicroK8S 为特色,支持两个基于 ML/DL 的科学工作流,即 G2P-Deep(生物信息学)和 PAS-ML(健康信息学)。测试实验的结果表明,我们提出的 VECA 方法优于最先进的方法;特别是与次好的方法相比,VECA 的 VEC 节点搜索延迟减少了两倍,执行失败后的生产率提高了 20% 以上。
{"title":"VECA: Reliable and Confidential Resource Clustering for Volunteer Edge-Cloud Computing","authors":"Hemanth Sai Yeddulapalli, Mauro Lemus Alarcon, Upasana Roy, Roshan Lal Neupane, Durbek Gafurov, Motahare Mounesan, Saptarshi Debroy, Prasad Calyam","doi":"arxiv-2409.03057","DOIUrl":"https://doi.org/arxiv-2409.03057","url":null,"abstract":"Volunteer Edge-Cloud (VEC) computing has a significant potential to support\u0000scientific workflows in user communities contributing volunteer edge nodes.\u0000However, managing heterogeneous and intermittent resources to support\u0000machine/deep learning (ML/DL) based workflows poses challenges in resource\u0000governance for reliability, and confidentiality for model/data privacy\u0000protection. There is a need for approaches to handle the volatility of\u0000volunteer edge node availability, and also to scale the confidential\u0000data-intensive workflow execution across a large number of VEC nodes. In this\u0000paper, we present VECA, a reliable and confidential VEC resource clustering\u0000solution featuring three-fold methods tailored for executing ML/DL-based\u0000scientific workflows on VEC resources. Firstly, a capacity-based clustering\u0000approach enhances system reliability and minimizes VEC node search latency.\u0000Secondly, a novel two-phase, globally distributed scheduling scheme optimizes\u0000job allocation based on node attributes and using time-series-based Recurrent\u0000Neural Networks. Lastly, the integration of confidential computing ensures\u0000privacy preservation of the scientific workflows, where model and data\u0000information are not shared with VEC resources providers. We evaluate VECA in a\u0000Function-as-a-Service (FaaS) cloud testbed that features OpenFaaS and MicroK8S\u0000to support two ML/DL-based scientific workflows viz., G2P-Deep (bioinformatics)\u0000and PAS-ML (health informatics). Results from tested experiments demonstrate\u0000that our proposed VECA approach outperforms state-of-the-art methods;\u0000especially VECA exhibits a two-fold reduction in VEC node search latency and\u0000over 20% improvement in productivity rates following execution failures\u0000compared to the next best method.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing 5G Performance: Reducing Service Time and Research Directions for 6G Standards 增强 5G 性能:缩短服务时间和 6G 标准的研究方向
Pub Date : 2024-09-04 DOI: arxiv-2409.02788
Laura Landon, Vipindev Adat Vasudevan, Jaeweon Kim, Junmo Sung, Jeffery Tony Masters, Muriel Médard
This paper presents several methods for minimizing packet service time innetworks using 5G and beyond. We propose leveraging network coding alongsideHybrid Automatic Repeat reQuest (HARQ) to reduce service time as well asoptimizing Modulation and Coding Scheme (MCS) selection based on the servicetime. Our network coding approach includes a method to increase the number ofpackets in flight, adhering to the current standard of the 16 HARQ processlimit, demonstrating that these strategies can enhance throughput and reducelatency. Experimental results show that network coding reduces service times byup to 7% in low SNR regimes, with greater reduction across all SNR as thenumber of packets in flight increases, suggesting that future 6G standardsshould consider increasing the number of HARQ processes for better performance.
本文介绍了在使用 5G 及更先进技术的网络中尽量缩短数据包服务时间的几种方法。我们建议利用网络编码和混合自动重复请求(HARQ)来缩短服务时间,并根据服务时间优化调制和编码方案(MCS)的选择。我们的网络编码方法包括一种增加飞行中数据包数量的方法,符合现行的 16 HARQ 进程限制标准,证明这些策略可以提高吞吐量并减少延迟。实验结果表明,在低信噪比情况下,网络编码最多可将服务时间缩短 7%,随着飞行中数据包数量的增加,在所有信噪比情况下都会有更大的缩短,这表明未来的 6G 标准应考虑增加 HARQ 进程的数量,以获得更好的性能。
{"title":"Enhancing 5G Performance: Reducing Service Time and Research Directions for 6G Standards","authors":"Laura Landon, Vipindev Adat Vasudevan, Jaeweon Kim, Junmo Sung, Jeffery Tony Masters, Muriel Médard","doi":"arxiv-2409.02788","DOIUrl":"https://doi.org/arxiv-2409.02788","url":null,"abstract":"This paper presents several methods for minimizing packet service time in\u0000networks using 5G and beyond. We propose leveraging network coding alongside\u0000Hybrid Automatic Repeat reQuest (HARQ) to reduce service time as well as\u0000optimizing Modulation and Coding Scheme (MCS) selection based on the service\u0000time. Our network coding approach includes a method to increase the number of\u0000packets in flight, adhering to the current standard of the 16 HARQ process\u0000limit, demonstrating that these strategies can enhance throughput and reduce\u0000latency. Experimental results show that network coding reduces service times by\u0000up to 7% in low SNR regimes, with greater reduction across all SNR as the\u0000number of packets in flight increases, suggesting that future 6G standards\u0000should consider increasing the number of HARQ processes for better performance.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Jäger: Automated Telephone Call Traceback Jäger:自动电话回溯
Pub Date : 2024-09-04 DOI: arxiv-2409.02839
David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro
Unsolicited telephone calls that facilitate fraud or unlawful telemarketingcontinue to overwhelm network users and the regulators who prosecute them. Thefirst step in prosecuting phone abuse is traceback -- identifying the calloriginator. This fundamental investigative task currently requires hours ofmanual effort per call. In this paper, we introduce J"ager, a distributedsecure call traceback system. J"ager can trace a call in a few seconds, evenwith partial deployment, while cryptographically preserving the privacy of callparties, carrier trade secrets like peers and call volume, and limiting thethreat of bulk analysis. We establish definitions and requirements of securetraceback, then develop a suite of protocols that meet these requirements usingwitness encryption, oblivious pseudorandom functions, and group signatures. Weprove these protocols secure in the universal composibility framework. We thendemonstrate that J"ager has low compute and bandwidth costs per call, andthese costs scale linearly with call volume. J"ager provides an efficient,secure, privacy-preserving system to revolutionize telephone abuseinvestigation with minimal costs to operators.
为诈骗或非法电话营销提供便利的未经请求的电话继续让网络用户和对其进行起诉的监管机构不堪重负。起诉滥用电话行为的第一步是追踪--确定电话发起人。这项基本的调查任务目前需要花费数小时的人工来完成。在本文中,我们介绍了分布式安全呼叫回溯系统 J"ager 。J"ager 可以在几秒钟内跟踪一个呼叫,即使是部分部署,同时以加密方式保护呼叫方的隐私、运营商的商业机密(如同行和呼叫量),并限制批量分析的威胁。我们确立了安全回溯的定义和要求,然后开发了一套协议,利用见证加密、遗忘伪随机函数和组签名来满足这些要求。我们证明了这些协议在通用可组合性框架中的安全性。然后,我们证明了 J"ager 每次呼叫的计算和带宽成本很低,而且这些成本随呼叫量的增加而线性增长。J "ager提供了一个高效、安全、保护隐私的系统,以最小的成本彻底改变了运营商对电话滥用的调查。
{"title":"Jäger: Automated Telephone Call Traceback","authors":"David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro","doi":"arxiv-2409.02839","DOIUrl":"https://doi.org/arxiv-2409.02839","url":null,"abstract":"Unsolicited telephone calls that facilitate fraud or unlawful telemarketing\u0000continue to overwhelm network users and the regulators who prosecute them. The\u0000first step in prosecuting phone abuse is traceback -- identifying the call\u0000originator. This fundamental investigative task currently requires hours of\u0000manual effort per call. In this paper, we introduce J\"ager, a distributed\u0000secure call traceback system. J\"ager can trace a call in a few seconds, even\u0000with partial deployment, while cryptographically preserving the privacy of call\u0000parties, carrier trade secrets like peers and call volume, and limiting the\u0000threat of bulk analysis. We establish definitions and requirements of secure\u0000traceback, then develop a suite of protocols that meet these requirements using\u0000witness encryption, oblivious pseudorandom functions, and group signatures. We\u0000prove these protocols secure in the universal composibility framework. We then\u0000demonstrate that J\"ager has low compute and bandwidth costs per call, and\u0000these costs scale linearly with call volume. J\"ager provides an efficient,\u0000secure, privacy-preserving system to revolutionize telephone abuse\u0000investigation with minimal costs to operators.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Networking and Internet Architecture
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1