首页 > 最新文献

Computer Networks最新文献

英文 中文
Softwarized and containerized microservices-based network management analysis with MSN 利用 MSN 进行基于软化和容器化微服务的网络管理分析
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-26 DOI: 10.1016/j.comnet.2024.110750

Microservice architecture is a service-oriented paradigm that enables the decomposition of cumbersome monolithic-based software systems. Using microservice design principles, it is possible to develop flexible, scalable, reusable, and loosely coupled software that could be containerized and deployed in a distributed edge/cloud environment. The flexible deployment of microservices in an edge environment increases system performance in terms due to dynamic service function placement and chaining possibly resulting in latency reduction, fault tolerance, scalability, efficient resource utilization, cost reduction, and energy consumption reduction. On the other hand, virtualization and containerization of microservices add processing and communication overheads. Therefore, to evaluate end-to-end microservices-based system performance, we need to have an end-to-end mathematical formulation of the overall microservice-based network system. Incorporating the virtualization overhead, here we provide end-to-end mathematical formulation considering system parameters: latency, throughput, computational resource usage, and energy consumption. We then evaluate the formulation in a testbed environment with the Microservice-based SDN (MSN) framework that decomposes the Software-defined Networking (SDN) controller in microservices with Docker Container. The final result validates the presented mathematical modeling of the system’s dynamic behavior which can be used to design a microservice-based system.

微服务架构是一种面向服务的范式,可以分解繁琐的单体软件系统。利用微服务设计原则,可以开发灵活、可扩展、可重用和松耦合的软件,并将其容器化,部署在分布式边缘/云环境中。在边缘环境中灵活部署微服务可提高系统性能,这是因为动态服务功能放置和连锁可能导致延迟减少、容错、可扩展性、资源有效利用、成本降低和能耗减少。另一方面,微服务的虚拟化和容器化会增加处理和通信开销。因此,要评估基于微服务的端到端系统性能,我们需要对整个基于微服务的网络系统进行端到端的数学计算。考虑到虚拟化开销,我们在此提供了端到端数学公式,其中考虑到了系统参数:延迟、吞吐量、计算资源使用量和能耗。然后,我们利用基于微服务的 SDN(MSN)框架在测试平台环境中对该公式进行评估,该框架利用 Docker 容器将软件定义网络(SDN)控制器分解为微服务。最终结果验证了所提出的系统动态行为数学模型,该模型可用于设计基于微服务的系统。
{"title":"Softwarized and containerized microservices-based network management analysis with MSN","authors":"","doi":"10.1016/j.comnet.2024.110750","DOIUrl":"10.1016/j.comnet.2024.110750","url":null,"abstract":"<div><p>Microservice architecture is a service-oriented paradigm that enables the decomposition of cumbersome monolithic-based software systems. Using microservice design principles, it is possible to develop flexible, scalable, reusable, and loosely coupled software that could be containerized and deployed in a distributed edge/cloud environment. The flexible deployment of microservices in an edge environment increases system performance in terms due to dynamic service function placement and chaining possibly resulting in latency reduction, fault tolerance, scalability, efficient resource utilization, cost reduction, and energy consumption reduction. On the other hand, virtualization and containerization of microservices add processing and communication overheads. Therefore, to evaluate end-to-end microservices-based system performance, we need to have an end-to-end mathematical formulation of the overall microservice-based network system. Incorporating the virtualization overhead, here we provide end-to-end mathematical formulation considering system parameters: latency, throughput, computational resource usage, and energy consumption. We then evaluate the formulation in a testbed environment with the Microservice-based SDN (MSN) framework that decomposes the Software-defined Networking (SDN) controller in microservices with Docker Container. The final result validates the presented mathematical modeling of the system’s dynamic behavior which can be used to design a microservice-based system.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005826/pdfft?md5=18b00ba231d0e94b553874f97df78463&pid=1-s2.0-S1389128624005826-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perspectives on IoT-oriented network simulation systems 面向物联网的网络模拟系统展望
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-24 DOI: 10.1016/j.comnet.2024.110749

The Internet of Things (IoT) paradigm is assumed to be a major component in the present and future Internet, with forecasts claiming a humongous number of devices connected in the near future, and applications fields spanning from agriculture, to healthcare. Despite this, the standardization efforts have not yet resulted in widely adopted standards, and the market is fragmented into multiple solutions both at physical and communication protocol levels. Moreover, IoT systems exacerbate the usual test bed limitations, e.g., scalability (very large number of devices), hardware compatibility, space, and price. Due to the above problems, simulation tools become an extremely interesting tool for studying IoT systems both for academia (new algorithms), standardization (new protocols), and industry (what-if analysis). In this paper we will discuss what are the most relevant features and models that a simulation tool like ns-3 should prioritize to enable the above-mentioned needs from academia, standardization, and industry, and if they are achievable in the short, medium, or long term.

物联网(IoT)模式被认为是当前和未来互联网的主要组成部分,据预测,在不久的将来将有大量设备联网,应用领域涵盖农业和医疗保健。尽管如此,标准化工作尚未形成被广泛采用的标准,市场在物理和通信协议层面被分割成多种解决方案。此外,物联网系统还加剧了通常的测试平台限制,例如可扩展性(设备数量非常大)、硬件兼容性、空间和价格。鉴于上述问题,仿真工具成为研究物联网系统的一个极其有趣的工具,无论是对学术界(新算法)、标准化(新协议)还是对工业界(假设分析)都是如此。在本文中,我们将讨论像 ns-3 这样的仿真工具应优先考虑哪些最相关的功能和模型,以满足学术界、标准化和工业界的上述需求,以及这些功能和模型在短期、中期或长期内是否可以实现。
{"title":"Perspectives on IoT-oriented network simulation systems","authors":"","doi":"10.1016/j.comnet.2024.110749","DOIUrl":"10.1016/j.comnet.2024.110749","url":null,"abstract":"<div><p>The Internet of Things (IoT) paradigm is assumed to be a major component in the present and future Internet, with forecasts claiming a humongous number of devices connected in the near future, and applications fields spanning from agriculture, to healthcare. Despite this, the standardization efforts have not yet resulted in widely adopted standards, and the market is fragmented into multiple solutions both at physical and communication protocol levels. Moreover, IoT systems exacerbate the usual test bed limitations, <em>e.g.</em>, scalability (very large number of devices), hardware compatibility, space, and price. Due to the above problems, simulation tools become an extremely interesting tool for studying IoT systems both for academia (new algorithms), standardization (new protocols), and industry (what-if analysis). In this paper we will discuss what are the most relevant features and models that a simulation tool like ns-3 should prioritize to enable the above-mentioned needs from academia, standardization, and industry, and if they are achievable in the short, medium, or long term.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005814/pdfft?md5=08f172b21945b67243a1668fb6c381d8&pid=1-s2.0-S1389128624005814-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142083430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LearningTuple: A packet classification scheme with high classification and high update 学习元组高分类、高更新的数据包分类方案
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-24 DOI: 10.1016/j.comnet.2024.110745

Packet classification is widely used in network infrastructures and is the key technique that supports security and other functions. The real-time nature of network services naturally demands high classification speed, while the emerging SDN makes rule changes more flexible, thus placing higher demands on the performance of rule update in classification schemes. In this paper, Learning Tuple(LT) is proposed to achieve high classification performance for packets while maintaining the high update characteristics of tuple space-based schemes. Specifically, to solve the issue of excessive tuples and rule overlap due to merging tuples, LT iteratively divides the space by using rule overlap and hash collisions as negative feedback and applies a reinforcement learning algorithm, SARSA, at each level to ensure its reasonableness. Efficient space partitioning guides the construction of tuples, and an excellent rule mapping method called PLR is designed, which improves classification performance. Experimental results demonstrate that compared with classic and advanced classification schemes TSS, TupleMerge, MultilayerTuple, PartitionSort, HybridTSS, and TupleTree, LT achieves average classification performance improvements of 9.23x, 1.74x, 1.45x, 2.85x, 1.37x and 1.25x, as well as average update performance improvements of 1.83x, 6.75x, 1.22x, 6.16x, 1.21x, 10.66x, respectively.

数据包分类广泛应用于网络基础设施,是支持安全和其他功能的关键技术。网络服务的实时性自然要求较高的分类速度,而新兴的 SDN 则使规则变更更加灵活,因此对分类方案中规则更新的性能提出了更高的要求。本文提出的学习元组(Learning Tuple,LT)在保持基于元组空间方案的高更新特性的同时,实现了数据包的高分类性能。具体来说,为了解决因合并元组而导致的过多元组和规则重叠问题,LT 通过将规则重叠和哈希碰撞作为负反馈来迭代划分空间,并在每一级应用强化学习算法 SARSA 来确保其合理性。高效的空间划分指导了元组的构建,并设计了一种名为 PLR 的优秀规则映射方法,从而提高了分类性能。实验结果表明,与经典和先进的分类方案 TSS、TupleMerge、MultilayerTuple、PartitionSort、HybridTSS 和 TupleTree 相比,LT 的平均分类性能分别提高了 9.23 倍、1.74 倍、1.45 倍、2.85 倍、1.37 倍和 1.25 倍,平均更新性能分别提高了 1.83 倍、6.75 倍、1.22 倍、6.16 倍、1.21 倍和 10.66 倍。
{"title":"LearningTuple: A packet classification scheme with high classification and high update","authors":"","doi":"10.1016/j.comnet.2024.110745","DOIUrl":"10.1016/j.comnet.2024.110745","url":null,"abstract":"<div><p>Packet classification is widely used in network infrastructures and is the key technique that supports security and other functions. The real-time nature of network services naturally demands high classification speed, while the emerging SDN makes rule changes more flexible, thus placing higher demands on the performance of rule update in classification schemes. In this paper, Learning Tuple(LT) is proposed to achieve high classification performance for packets while maintaining the high update characteristics of tuple space-based schemes. Specifically, to solve the issue of excessive tuples and rule overlap due to merging tuples, LT iteratively divides the space by using rule overlap and hash collisions as negative feedback and applies a reinforcement learning algorithm, SARSA, at each level to ensure its reasonableness. Efficient space partitioning guides the construction of tuples, and an excellent rule mapping method called PLR is designed, which improves classification performance. Experimental results demonstrate that compared with classic and advanced classification schemes TSS, TupleMerge, MultilayerTuple, PartitionSort, HybridTSS, and TupleTree, LT achieves average classification performance improvements of 9.23x, 1.74x, 1.45x, 2.85x, 1.37x and 1.25x, as well as average update performance improvements of 1.83x, 6.75x, 1.22x, 6.16x, 1.21x, 10.66x, respectively.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-view multi-label network traffic classification based on MLP-Mixer neural network 基于 MLP-Mixer 神经网络的多视角多标签网络流量分类
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-24 DOI: 10.1016/j.comnet.2024.110746

Network traffic classification is the basis of many network security applications and has received significant attention in the field of cyberspace security. Existing research on deep traffic analysis typically involves converting traffic data into images to extract spatial traffic features using Convolutional Neural Networks (CNNs). However, this approach ignores the semantic differences and details in the various packet structures. In this paper, we propose an MLP-Mixer based multi-view multi-label neural network for network traffic classification. Compared with the existing CNN-based methods, our method adopts the MLP-Mixer structure, which is more in line with the structure of the packet than the conventional convolution operation. In our method, one packet is divided into the packet header and the packet payload, together with the flow statistics of the packet as input from different views. We utilize a multi-label setting to learn different scenarios simultaneously to improve the classification performance by exploiting the correlations between different scenarios. We conduct experiments on three public datasets, and the experimental results show that our method can achieve superior performance. Code is available at https://github.com/ZxuanDang/MV-ML-traffic-classification.

网络流量分类是许多网络安全应用的基础,在网络空间安全领域备受关注。现有的深度流量分析研究通常是将流量数据转换成图像,利用卷积神经网络(CNN)提取空间流量特征。然而,这种方法忽略了各种数据包结构的语义差异和细节。本文提出了一种基于 MLP-Mixer 的多视角多标签神经网络,用于网络流量分类。与现有的基于 CNN 的方法相比,我们的方法采用了 MLP-Mixer 结构,比传统的卷积运算更符合数据包的结构。在我们的方法中,一个数据包被分为数据包头和数据包有效载荷,同时数据包的流量统计信息作为不同视图的输入。我们利用多标签设置来同时学习不同的场景,通过利用不同场景之间的相关性来提高分类性能。我们在三个公开数据集上进行了实验,实验结果表明,我们的方法可以实现卓越的性能。代码见 https://github.com/ZxuanDang/MV-ML-traffic-classification。
{"title":"Multi-view multi-label network traffic classification based on MLP-Mixer neural network","authors":"","doi":"10.1016/j.comnet.2024.110746","DOIUrl":"10.1016/j.comnet.2024.110746","url":null,"abstract":"<div><p>Network traffic classification is the basis of many network security applications and has received significant attention in the field of cyberspace security. Existing research on deep traffic analysis typically involves converting traffic data into images to extract spatial traffic features using Convolutional Neural Networks (CNNs). However, this approach ignores the semantic differences and details in the various packet structures. In this paper, we propose an MLP-Mixer based multi-view multi-label neural network for network traffic classification. Compared with the existing CNN-based methods, our method adopts the MLP-Mixer structure, which is more in line with the structure of the packet than the conventional convolution operation. In our method, one packet is divided into the packet header and the packet payload, together with the flow statistics of the packet as input from different views. We utilize a multi-label setting to learn different scenarios simultaneously to improve the classification performance by exploiting the correlations between different scenarios. We conduct experiments on three public datasets, and the experimental results show that our method can achieve superior performance. Code is available at <span><span>https://github.com/ZxuanDang/MV-ML-traffic-classification</span><svg><path></path></svg></span>.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142083431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Byzantine-robust Federated Learning via Cosine Similarity Aggregation 通过余弦相似性聚合实现拜占庭式稳健联盟学习
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-23 DOI: 10.1016/j.comnet.2024.110730

Federated Learning (FL) is proposed to train a machine learning model for clients with different training data. During the training of FL, a centralized server is usually employed to aggregate local models from clients iteratively. The aggregation process suffers from Byzantine attacks, where clients’ models could be maliciously modified by attackers to degrade the training performance. Existing defense aggregation solutions use distances or angles between different gradients to identify and eliminate malicious models from clients. However, they do not work well due to the high dimensional property of the machine learning model. Distance-based solutions cannot effectively identify attackers when the gradient direction of the model is maliciously tampered with. Angle-based solutions face the issue of low model accuracy for large models. In this paper, we propose Convolutional Kernel Angle-based Defense Aggregation (CKADA) to improve defense performance under various Byzantine attacks. The key of CKADA is to use the angle between convolutional kernels as the attack detection metric because the obtuse angle indicates the wrong training direction. CKADA calculates the angle between a client’s convolutional kernel gradients and the server’s convolutional kernel gradients as the attacker detection metric and eliminates convolutional kernel gradients of clients that create an obtuse angle to mitigate the impact of attackers on the model. We evaluate the performance of CKADA using AlexNet, ResNet-50, and GoogLeNet under two typical attacks. Simulation results show that CKADA mitigates the impact of Byzantine attacks and outperforms existing angle-based solutions and distance-based solutions by improving inference accuracy up to 67% and 89% respectively.

联邦学习(FL)是为拥有不同训练数据的客户端训练机器学习模型而提出的。在 FL 的训练过程中,通常采用一个集中式服务器来迭代聚合来自客户端的本地模型。聚合过程会受到拜占庭攻击,攻击者可能会恶意修改客户端的模型,从而降低训练性能。现有的防御聚合解决方案使用不同梯度之间的距离或角度来识别和消除客户端的恶意模型。然而,由于机器学习模型的高维特性,这些方案并不能很好地发挥作用。当模型的梯度方向被恶意篡改时,基于距离的解决方案无法有效识别攻击者。基于角度的解决方案面临着大型模型准确率低的问题。本文提出了基于卷积核角度的防御聚合(CKADA),以提高各种拜占庭攻击下的防御性能。CKADA 的关键在于使用卷积核之间的夹角作为攻击检测指标,因为钝角表示训练方向错误。CKADA 计算客户端卷积核梯度与服务器卷积核梯度之间的夹角作为攻击检测指标,并消除产生钝角的客户端卷积核梯度,以减轻攻击者对模型的影响。我们使用 AlexNet、ResNet-50 和 GoogLeNet 评估了 CKADA 在两种典型攻击下的性能。仿真结果表明,CKADA 能够减轻拜占庭攻击的影响,并优于现有的基于角度的解决方案和基于距离的解决方案,推理准确率分别提高了 67% 和 89%。
{"title":"Byzantine-robust Federated Learning via Cosine Similarity Aggregation","authors":"","doi":"10.1016/j.comnet.2024.110730","DOIUrl":"10.1016/j.comnet.2024.110730","url":null,"abstract":"<div><p>Federated Learning (FL) is proposed to train a machine learning model for clients with different training data. During the training of FL, a centralized server is usually employed to aggregate local models from clients iteratively. The aggregation process suffers from Byzantine attacks, where clients’ models could be maliciously modified by attackers to degrade the training performance. Existing defense aggregation solutions use distances or angles between different gradients to identify and eliminate malicious models from clients. However, they do not work well due to the high dimensional property of the machine learning model. Distance-based solutions cannot effectively identify attackers when the gradient direction of the model is maliciously tampered with. Angle-based solutions face the issue of low model accuracy for large models. In this paper, we propose Convolutional Kernel Angle-based Defense Aggregation (CKADA) to improve defense performance under various Byzantine attacks. The key of CKADA is to use the angle between convolutional kernels as the attack detection metric because the obtuse angle indicates the wrong training direction. CKADA calculates the angle between a client’s convolutional kernel gradients and the server’s convolutional kernel gradients as the attacker detection metric and eliminates convolutional kernel gradients of clients that create an obtuse angle to mitigate the impact of attackers on the model. We evaluate the performance of CKADA using AlexNet, ResNet-50, and GoogLeNet under two typical attacks. Simulation results show that CKADA mitigates the impact of Byzantine attacks and outperforms existing angle-based solutions and distance-based solutions by improving inference accuracy up to 67% and 89% respectively.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An intrusion detection method combining variational auto-encoder and generative adversarial networks 结合变异自动编码器和生成式对抗网络的入侵检测方法
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-22 DOI: 10.1016/j.comnet.2024.110724

Deep learning is a crucial research area in network security, particularly when it comes to detecting network attacks. While some deep learning algorithms have shown promising results in distinguishing between normal and abnormal traffic, identifying different types of imbalanced anomalous traffic data is still a challenging task at present. To enhance the detection performance of unbalanced anomalous flows, we propose a new intrusion detection architecture based on a variational auto-encoder (VAE) and generative adversarial networks (GAN) in this research. Firstly, we present the VAE-WGAN model, which combines the advantages of VAE and GAN and enables us to generate data with predefined labels to balance the original training dataset. In the intrusion detection phase, we use a hybrid neural network model based on stacked Long Short-Term Memory (LSTM) and Multi-Scale Convolutional Neural Network (MSCNN). Stacked LSTM and MSCNN networks can extract network characteristics at different depths and scales, and subsequent feature fusion is used to increase network attack detection rates. Finally, the results from the NSL-KDD and AWID datasets indicate that the proposed network intrusion detection model improves the accuracy of network attack detection. The model outperforms other existing intrusion detection approaches in terms of accuracy, precision, recall, and f1-score, obtaining 83.45% accuracy and 83.69% f1-score on the NSL-KDD dataset. Moreover, it attains an accuracy and f1-score exceeding 98.9% on the AWID dataset.

深度学习是网络安全的一个重要研究领域,尤其是在检测网络攻击方面。虽然一些深度学习算法在区分正常流量和异常流量方面取得了可喜的成果,但识别不同类型的不平衡异常流量数据目前仍是一项具有挑战性的任务。为了提高对不平衡异常流量的检测性能,我们在本研究中提出了一种基于变异自动编码器(VAE)和生成式对抗网络(GAN)的新型入侵检测架构。首先,我们提出了 VAE-WGAN 模型,该模型结合了 VAE 和 GAN 的优势,使我们能够生成带有预定义标签的数据,以平衡原始训练数据集。在入侵检测阶段,我们使用了基于堆叠长短期记忆(LSTM)和多尺度卷积神经网络(MSCNN)的混合神经网络模型。堆叠的 LSTM 和 MSCNN 网络可以提取不同深度和尺度的网络特征,随后通过特征融合来提高网络攻击的检测率。最后,NSL-KDD 和 AWID 数据集的结果表明,所提出的网络入侵检测模型提高了网络攻击检测的准确性。该模型在准确率、精确度、召回率和 f1 分数方面都优于其他现有的入侵检测方法,在 NSL-KDD 数据集上获得了 83.45% 的准确率和 83.69% 的 f1 分数。此外,它在 AWID 数据集上的准确率和 f1 分数都超过了 98.9%。
{"title":"An intrusion detection method combining variational auto-encoder and generative adversarial networks","authors":"","doi":"10.1016/j.comnet.2024.110724","DOIUrl":"10.1016/j.comnet.2024.110724","url":null,"abstract":"<div><p>Deep learning is a crucial research area in network security, particularly when it comes to detecting network attacks. While some deep learning algorithms have shown promising results in distinguishing between normal and abnormal traffic, identifying different types of imbalanced anomalous traffic data is still a challenging task at present. To enhance the detection performance of unbalanced anomalous flows, we propose a new intrusion detection architecture based on a variational auto-encoder (VAE) and generative adversarial networks (GAN) in this research. Firstly, we present the VAE-WGAN model, which combines the advantages of VAE and GAN and enables us to generate data with predefined labels to balance the original training dataset. In the intrusion detection phase, we use a hybrid neural network model based on stacked Long Short-Term Memory (LSTM) and Multi-Scale Convolutional Neural Network (MSCNN). Stacked LSTM and MSCNN networks can extract network characteristics at different depths and scales, and subsequent feature fusion is used to increase network attack detection rates. Finally, the results from the NSL-KDD and AWID datasets indicate that the proposed network intrusion detection model improves the accuracy of network attack detection. The model outperforms other existing intrusion detection approaches in terms of accuracy, precision, recall, and f1-score, obtaining 83.45% accuracy and 83.69% f1-score on the NSL-KDD dataset. Moreover, it attains an accuracy and f1-score exceeding 98.9% on the AWID dataset.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142048302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating terrestrial and non-terrestrial networks via IAB technology: System-level design and evaluation 通过 IAB 技术整合地面和非地面网络:系统级设计与评估
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-22 DOI: 10.1016/j.comnet.2024.110726

As the telecommunications industry embarks on the transition to Sixth-Generation (6G) networks, this paper examines the integration of Non-Terrestrial Networks (NTN), and in particular satellite backhauling, in the context of Fifth-Generation (5G) systems. The Integrated Access and Backhaul (IAB) technology, conceived as a wireless terrestrial backhauling system in the Next Generation Radio Access Network (NG-RAN), has been identified as a possible enabler for the integration of satellite nodes. Despite the work already done in this direction, the combination of IAB architectures with satellite nodes operating in both the access and backhaul side requires further evaluations on feasibility and limitations for networks integrating Low Earth Orbit (LEO) and Geostationary Earth Orbit (GEO) satellites. To this end, this work contributes providing insights on background technologies, as well as a detailed analysis of the issues and challenges arising from such integration and a definition of use cases to support narrow-band and broadband services. Furthermore, the design and implementation of a simulation tool is proposed for a performance evaluation in terms of registration time, link capacity, single-hop and end-to-end delay. Results show that the integration turns out to be feasible, even if with strong constraints coming from the satellite system rather than the IAB usage itself. Indeed, the earth-satellite link in LEO systems has a significant impact on the packet delivery time due to the discontinuous coverage. In case of GEO satellite instead, a non-terrestrial backhaul link could limit the performance of the whole system, especially at lower elevation angles.

随着电信行业开始向第六代(6G)网络过渡,本文探讨了在第五代(5G)系统中整合非地面网络(NTN),特别是卫星回程的问题。集成接入和回程(IAB)技术被视为下一代无线接入网(NG-RAN)中的无线地面回程系统,已被确定为卫星节点集成的可能推动因素。尽管已经在这一方向上开展了工作,但要将 IAB 架构与在接入和回程侧运行的卫星节点相结合,还需要进一步评估低地轨道 (LEO) 和地球静止轨道 (GEO) 卫星集成网络的可行性和局限性。为此,这项工作提供了背景技术方面的见解,详细分析了这种集成所带来的问题和挑战,并定义了支持窄带和宽带服务的用例。此外,还提出了设计和实施模拟工具的建议,以便从注册时间、链路容量、单跳和端到端延迟等方面进行性能评估。结果表明,即使受到来自卫星系统而非 IAB 使用本身的强大限制,整合也是可行的。事实上,由于覆盖范围不连续,低地轨道系统中的地球-卫星链路对数据包传输时间有很大影响。而对于地球同步轨道卫星,非地面回程链路可能会限制整个系统的性能,尤其是在较低仰角时。
{"title":"Integrating terrestrial and non-terrestrial networks via IAB technology: System-level design and evaluation","authors":"","doi":"10.1016/j.comnet.2024.110726","DOIUrl":"10.1016/j.comnet.2024.110726","url":null,"abstract":"<div><p>As the telecommunications industry embarks on the transition to Sixth-Generation (6G) networks, this paper examines the integration of Non-Terrestrial Networks (NTN), and in particular satellite backhauling, in the context of Fifth-Generation (5G) systems. The Integrated Access and Backhaul (IAB) technology, conceived as a wireless terrestrial backhauling system in the Next Generation Radio Access Network (NG-RAN), has been identified as a possible enabler for the integration of satellite nodes. Despite the work already done in this direction, the combination of IAB architectures with satellite nodes operating in both the access and backhaul side requires further evaluations on feasibility and limitations for networks integrating Low Earth Orbit (LEO) and Geostationary Earth Orbit (GEO) satellites. To this end, this work contributes providing insights on background technologies, as well as a detailed analysis of the issues and challenges arising from such integration and a definition of use cases to support narrow-band and broadband services. Furthermore, the design and implementation of a simulation tool is proposed for a performance evaluation in terms of registration time, link capacity, single-hop and end-to-end delay. Results show that the integration turns out to be feasible, even if with strong constraints coming from the satellite system rather than the IAB usage itself. Indeed, the earth-satellite link in LEO systems has a significant impact on the packet delivery time due to the discontinuous coverage. In case of GEO satellite instead, a non-terrestrial backhaul link could limit the performance of the whole system, especially at lower elevation angles.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142089027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization for energy efficient full-duplex UAV relaying with multiple user pairs 多用户对高能效全双工无人机中继的联合优化
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-22 DOI: 10.1016/j.comnet.2024.110732

This paper investigates an unmanned aerial vehicle (UAV) assisted amplify-and-forward relaying, where a full-duplex (FD) fixed-wing UAV employs a time-division multiple access scheduling protocol to provide relay services for multiple source–destination user pairs. With the aim of maximizing energy efficiency (EE) of the system, a joint optimization problem is studied so as to jointly fulfill the communication scheduling of multiple user pairs, the transmit power control and the trajectory design of the UAV. Since the optimization variables of the problem are coupled, it is non-convex and hence hard to solve directly. To this end, the initial problem is decomposed into three subproblems corresponding to the optimization of communication scheduling, and transmit power and trajectory of the UAV, respectively. The three subproblems are solved by utilizing the linear programming, the successive convex approximation (SCA), and the Dinkelbach’s algorithm. Then an iterative algorithm based on the block coordinate descent technique is proposed to tackle the joint optimization problem by optimizing the three blocks of variables alternately. Simulation results demonstrate that the proposed algorithm converges efficiently, and the EE of the joint optimization scheme can be significantly improved compared to the benchmark schemes.

本文研究了无人机(UAV)辅助放大-前向中继,其中全双工(FD)固定翼无人机采用时分多址调度协议为多个源-目的用户对提供中继服务。以系统能效(EE)最大化为目标,研究了一个联合优化问题,以共同完成多个用户对的通信调度、发射功率控制和无人机的轨迹设计。由于该问题的优化变量是耦合的,因此是非凸的,很难直接求解。为此,我们将初始问题分解为三个子问题,分别对应无人机的通信调度、发射功率和轨迹优化。利用线性规划、连续凸近似(SCA)和 Dinkelbach 算法解决这三个子问题。然后提出了一种基于块坐标下降技术的迭代算法,通过交替优化三个变量块来解决联合优化问题。仿真结果表明,所提出的算法收敛效率很高,与基准方案相比,联合优化方案的 EE 可以显著提高。
{"title":"Joint optimization for energy efficient full-duplex UAV relaying with multiple user pairs","authors":"","doi":"10.1016/j.comnet.2024.110732","DOIUrl":"10.1016/j.comnet.2024.110732","url":null,"abstract":"<div><p>This paper investigates an unmanned aerial vehicle (UAV) assisted amplify-and-forward relaying, where a full-duplex (FD) fixed-wing UAV employs a time-division multiple access scheduling protocol to provide relay services for multiple source–destination user pairs. With the aim of maximizing energy efficiency (EE) of the system, a joint optimization problem is studied so as to jointly fulfill the communication scheduling of multiple user pairs, the transmit power control and the trajectory design of the UAV. Since the optimization variables of the problem are coupled, it is non-convex and hence hard to solve directly. To this end, the initial problem is decomposed into three subproblems corresponding to the optimization of communication scheduling, and transmit power and trajectory of the UAV, respectively. The three subproblems are solved by utilizing the linear programming, the successive convex approximation (SCA), and the Dinkelbach’s algorithm. Then an iterative algorithm based on the block coordinate descent technique is proposed to tackle the joint optimization problem by optimizing the three blocks of variables alternately. Simulation results demonstrate that the proposed algorithm converges efficiently, and the EE of the joint optimization scheme can be significantly improved compared to the benchmark schemes.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142048304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint resource scheduling and flight path planning of UAV-assisted IoTs in response to emergencies 应对紧急情况时无人机辅助物联网的联合资源调度和飞行路径规划
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-22 DOI: 10.1016/j.comnet.2024.110731

In unmanned aerial vehicles (UAV)-assisted Internet of Things (IoT), emergencies can lead to changes in the status of ground sensor networks. This necessitates UAV-assisted IoT systems to possess the capability to dynamically respond to changes in the status of the ground sensor network. Therefore, this paper proposes a UAV scheduling scheme based on regional coordination (USRC). In this scheme, we divide the ground sensor network into task sub-regions according to the deployment of base stations. Then, we introduce a scheduling relationship pairing algorithm to determine the scheduling relationships between task sub-regions and UAV resources that need to be scheduled for each sub-region. Based on this, a dynamic path planning algorithm is designed to synchronize the planning of cross-region flight paths and intra-region flight paths for UAVs. Experimental results have demonstrated that the proposed scheme can efficiently respond to changes in the status of the ground sensor network by scheduling UAVs from sub-regions with abundant resources to those with scarce resources. Compared to other schemes, our scheme exhibits superior performance in reducing the age of information (AoI) and packet loss rate.

在无人飞行器(UAV)辅助的物联网(IoT)中,紧急情况会导致地面传感器网络的状态发生变化。这就要求无人机辅助物联网系统具备动态响应地面传感器网络状态变化的能力。因此,本文提出了一种基于区域协调的无人机调度方案(USRC)。在该方案中,我们根据基站部署情况将地面传感器网络划分为任务子区域。然后,引入调度关系配对算法,确定任务子区域与每个子区域需要调度的无人机资源之间的调度关系。在此基础上,设计了一种动态路径规划算法,以同步规划无人机的跨区域飞行路径和区域内飞行路径。实验结果表明,所提出的方案能有效地应对地面传感器网络状态的变化,将无人机从资源丰富的子区域调度到资源匮乏的子区域。与其他方案相比,我们的方案在降低信息年龄(AoI)和数据包丢失率方面表现出色。
{"title":"Joint resource scheduling and flight path planning of UAV-assisted IoTs in response to emergencies","authors":"","doi":"10.1016/j.comnet.2024.110731","DOIUrl":"10.1016/j.comnet.2024.110731","url":null,"abstract":"<div><p>In unmanned aerial vehicles (UAV)-assisted Internet of Things (IoT), emergencies can lead to changes in the status of ground sensor networks. This necessitates UAV-assisted IoT systems to possess the capability to dynamically respond to changes in the status of the ground sensor network. Therefore, this paper proposes a UAV scheduling scheme based on regional coordination (USRC). In this scheme, we divide the ground sensor network into task sub-regions according to the deployment of base stations. Then, we introduce a scheduling relationship pairing algorithm to determine the scheduling relationships between task sub-regions and UAV resources that need to be scheduled for each sub-region. Based on this, a dynamic path planning algorithm is designed to synchronize the planning of cross-region flight paths and intra-region flight paths for UAVs. Experimental results have demonstrated that the proposed scheme can efficiently respond to changes in the status of the ground sensor network by scheduling UAVs from sub-regions with abundant resources to those with scarce resources. Compared to other schemes, our scheme exhibits superior performance in reducing the age of information (AoI) and packet loss rate.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy-efficient JT-CoMP enabled framework with adaptive OMA/NOMA in HetNets 在 HetNets 中采用自适应 OMA/NOMA 的高能效 JT-CoMP 启用框架
IF 4.4 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-22 DOI: 10.1016/j.comnet.2024.110733

The increasing demand for higher data rates and improved energy efficiency (EE) in next-generation wireless networks necessitates the optimized selection of multiple-access and coordination techniques. A hybrid joint transmission (JT)-coordinated multi-point (CoMP) enabled orthogonal multiple access (OMA)/non-orthogonal multiple access (NOMA) technique, combining the spectral efficiency (SE) and capacity benefits of CoMP NOMA with the interference mitigation of CoMP OMA, offers a highly adaptable solution for future wireless networks. This paper studies the joint optimization of CoMP/non-CoMP selection, OMA/NOMA selection, power allocation, and user pairing, with the objective of maximizing the EE in the network. A Dynamic CoMP user selection with energy-efficient adaptive multiple access (DCEAMA) algorithm to solve the formulated problem is proposed. Our Monte Carlo simulations show that the DCEAMA surpasses both the pure CoMP OMA and CoMP NOMA schemes in terms of EE, with an average increase of 38% and 26% respectively. We compare our heuristic technique to an exhaustive search strategy to evaluate its efficiency. The findings indicate that our strategy produces comparable EE across various power levels with reduced computational complexity.

下一代无线网络对更高数据速率和更高能效(EE)的需求日益增长,这就要求优化选择多址接入和协调技术。一种支持正交多址接入(OMA)/非正交多址接入(NOMA)的混合联合传输(JT)-协调多点(CoMP)技术,将CoMP NOMA的频谱效率(SE)和容量优势与CoMP OMA的干扰缓解相结合,为未来无线网络提供了一种适应性很强的解决方案。本文研究了 CoMP/非 CoMP 选择、OMA/NOMA 选择、功率分配和用户配对的联合优化,目标是最大化网络中的能效。我们提出了一种动态 CoMP 用户选择与高能效自适应多路访问(DCEAMA)算法来解决所提出的问题。我们的蒙特卡罗模拟显示,DCEAMA 在 EE 方面超过了纯 CoMP OMA 和 CoMP NOMA 方案,平均增幅分别为 38% 和 26%。我们将启发式技术与穷举搜索策略进行了比较,以评估其效率。研究结果表明,我们的策略能在不同功率水平下产生可比的 EE,同时降低了计算复杂度。
{"title":"An energy-efficient JT-CoMP enabled framework with adaptive OMA/NOMA in HetNets","authors":"","doi":"10.1016/j.comnet.2024.110733","DOIUrl":"10.1016/j.comnet.2024.110733","url":null,"abstract":"<div><p>The increasing demand for higher data rates and improved energy efficiency (EE) in next-generation wireless networks necessitates the optimized selection of multiple-access and coordination techniques. A hybrid joint transmission (JT)-coordinated multi-point (CoMP) enabled orthogonal multiple access (OMA)/non-orthogonal multiple access (NOMA) technique, combining the spectral efficiency (SE) and capacity benefits of CoMP NOMA with the interference mitigation of CoMP OMA, offers a highly adaptable solution for future wireless networks. This paper studies the joint optimization of CoMP/non-CoMP selection, OMA/NOMA selection, power allocation, and user pairing, with the objective of maximizing the EE in the network. A Dynamic CoMP user selection with energy-efficient adaptive multiple access (DCEAMA) algorithm to solve the formulated problem is proposed. Our Monte Carlo simulations show that the DCEAMA surpasses both the pure CoMP OMA and CoMP NOMA schemes in terms of EE, with an average increase of 38% and 26% respectively. We compare our heuristic technique to an exhaustive search strategy to evaluate its efficiency. The findings indicate that our strategy produces comparable EE across various power levels with reduced computational complexity.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1389128624005656/pdfft?md5=6d1d85f57926b910ac506241cc62432e&pid=1-s2.0-S1389128624005656-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142095857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1