首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
CSNet 2022 special issue—decentralized and data-driven security in networking CSNet 2022 特刊--网络中的去中心化和数据驱动安全
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-01 DOI: 10.1007/s12243-024-01049-x
Diogo Menezes Ferrazani Mattos, Marc-Oliver Pahl, Carol Fung
{"title":"CSNet 2022 special issue—decentralized and data-driven security in networking","authors":"Diogo Menezes Ferrazani Mattos, Marc-Oliver Pahl, Carol Fung","doi":"10.1007/s12243-024-01049-x","DOIUrl":"10.1007/s12243-024-01049-x","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141699289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks 全面评估虚拟化环境中无线电接入网络的软件定义无线电性能
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-26 DOI: 10.1007/s12243-024-01044-2
Govinda M. G. Bezerra, Nicollas R. de Oliveira, Tadeu N. Ferreira, Diogo M. F. Mattos

Fifth-generation (5G) mobile networks offer flexibility to address various emerging use cases. Radio virtualization enhances flexibility by enabling multiple heterogeneous virtual radios to coexist on the same hardware. One method for virtualizing radio devices involves using virtual machines and containers to multiplex software radio implementations over generic multipurpose radio hardware. This paper reviews security issues in this context, evaluates the experimental bounds of communication for software-defined radio (SDR) devices, and assesses virtualization’s impact on radio virtualization’s performance. This study aims to determine the suitability of virtual environments for SDR applications. The results indicate that container-based radio virtualization performance is comparable to SDR applications running on native Linux.

第五代(5G)移动网络可灵活应对各种新兴用例。无线电虚拟化可使多个异构虚拟无线电在同一硬件上共存,从而提高灵活性。无线电设备虚拟化的一种方法是使用虚拟机和容器在通用多用途无线电硬件上复用软件无线电实施。本文回顾了这方面的安全问题,评估了软件定义无线电(SDR)设备的通信实验界限,并评估了虚拟化对无线电虚拟化性能的影响。这项研究旨在确定虚拟环境是否适合 SDR 应用。结果表明,基于容器的无线电虚拟化性能可与在本地 Linux 上运行的 SDR 应用程序相媲美。
{"title":"A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks","authors":"Govinda M. G. Bezerra,&nbsp;Nicollas R. de Oliveira,&nbsp;Tadeu N. Ferreira,&nbsp;Diogo M. F. Mattos","doi":"10.1007/s12243-024-01044-2","DOIUrl":"10.1007/s12243-024-01044-2","url":null,"abstract":"<div><p>Fifth-generation (5G) mobile networks offer flexibility to address various emerging use cases. Radio virtualization enhances flexibility by enabling multiple heterogeneous virtual radios to coexist on the same hardware. One method for virtualizing radio devices involves using virtual machines and containers to multiplex software radio implementations over generic multipurpose radio hardware. This paper reviews security issues in this context, evaluates the experimental bounds of communication for software-defined radio (SDR) devices, and assesses virtualization’s impact on radio virtualization’s performance. This study aims to determine the suitability of virtual environments for SDR applications. The results indicate that container-based radio virtualization performance is comparable to SDR applications running on native Linux.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring the confidence level of BGP-based distributed intrusion detection systems alarms 推断基于 BGP 的分布式入侵检测系统警报的置信度
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-18 DOI: 10.1007/s12243-024-01045-1
Renato S. Silva, Felipe M. F. de Assis, Evandro L. C. Macedo, Luís Felipe M. de Moraes

Border Gateway Protocol (BGP) is increasingly becoming a multipurpose protocol. However, it keeps suffering from security issues such as bogus announcements for malicious goals. Some of these security breaches are especially critical for distributed intrusion detection systems that use BGP as the underlay network for interchanging alarms. In this sense, assessing the confidence level of detection alarms transported via BGP messages is critical to prevent internal attacks. Most of the proposals addressing the confidence level of detection alarms rely on complex and time-consuming mechanisms that can also be a potential target for further attacks. In this paper, we propose an out-of-band system based on machine learning to infer the confidence level of BGP messages, using just the mandatory fields of the header. Tests using two different data sets, (i) from the indirect effects of a widespread worm attack and (ii) using up-to-date data from the IPTraf Project, show promising results, considering well-known performance metrics, such as recall, accuracy, receiver operating characteristics (ROC), and f1-score.

边界网关协议(BGP)正日益成为一种多用途协议。然而,它却一直受到安全问题的困扰,例如为恶意目的而发布的假公告。其中一些安全漏洞对于使用 BGP 作为交换警报的底层网络的分布式入侵检测系统尤为重要。从这个意义上说,评估通过 BGP 消息传输的检测警报的可信度对于防止内部攻击至关重要。大多数解决检测警报可信度问题的建议都依赖于复杂耗时的机制,这也可能成为进一步攻击的潜在目标。在本文中,我们提出了一种基于机器学习的带外系统,仅使用报文头的必填字段就能推断出 BGP 报文的置信度。测试使用了两个不同的数据集:(i) 来自大范围蠕虫攻击的间接影响;(ii) 来自 IPTraf 项目的最新数据,考虑到召回率、准确率、接收器操作特性 (ROC) 和 f1 分数等众所周知的性能指标,测试结果令人欣喜。
{"title":"Inferring the confidence level of BGP-based distributed intrusion detection systems alarms","authors":"Renato S. Silva, Felipe M. F. de Assis, Evandro L. C. Macedo, Luís Felipe M. de Moraes","doi":"10.1007/s12243-024-01045-1","DOIUrl":"https://doi.org/10.1007/s12243-024-01045-1","url":null,"abstract":"<p>Border Gateway Protocol (BGP) is increasingly becoming a multipurpose protocol. However, it keeps suffering from security issues such as bogus announcements for malicious goals. Some of these security breaches are especially critical for distributed intrusion detection systems that use BGP as the underlay network for interchanging alarms. In this sense, assessing the confidence level of detection alarms transported via BGP messages is critical to prevent internal attacks. Most of the proposals addressing the confidence level of detection alarms rely on complex and time-consuming mechanisms that can also be a potential target for further attacks. In this paper, we propose an out-of-band system based on machine learning to infer the confidence level of BGP messages, using just the mandatory fields of the header. Tests using two different data sets, (<i>i</i>) from the indirect effects of a widespread worm attack and (<i>ii</i>) using up-to-date data from the IPTraf Project, show promising results, considering well-known performance metrics, such as recall, accuracy, receiver operating characteristics (ROC), and f1-score.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of phase modulator on the performance of Costas loop 相位调制器对科斯塔斯环路性能的影响
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-17 DOI: 10.1007/s12243-024-01048-y
F. Sinhababu, A. Mukherjee, S. Sarkar, B. Chatterjee, A. Sarkar

 In the present work, a modified Costas loop is presented with the help of mathematical modeling and numerical simulation. The voltage-controlled oscillator output phase along with frequency is controlled using the input control voltage. The modified loop is tested as frequency demodulator circuit where the improvement in sideband attenuation is clearly visible using an additional phase control arrangement. Numerical simulation result leads to a similar conclusion when the ratio of third harmonic to first harmonic and the ratio of first sideband attenuation to carrier are obtained for different proportions of the phase control. Noise bandwidth and lock range of the modified loop are investigated with special emphasis on the dependence of these parameters on the phase modulator gain. Lock range of the loop is evaluated analytically. An excellent demodulation capability of the loop has been reported in the presence of the additional phase control. Analytical results coupled with numerical findings presented are in good agreement.

在本研究中,借助数学建模和数值模拟,介绍了一种改进的科斯塔斯环路。压控振荡器的输出相位和频率由输入控制电压控制。改进后的环路作为频率解调器电路进行了测试,通过额外的相位控制安排,边带衰减效果明显改善。数字模拟结果也得出了类似的结论,即在不同相位控制比例下,三次谐波与一次谐波之比以及一次边带衰减与载波之比均有不同。研究了改进环路的噪声带宽和锁定范围,特别强调了这些参数对相位调制器增益的依赖性。对环路的锁定范围进行了分析评估。据报告,在附加相位控制的情况下,环路具有出色的解调能力。分析结果与提交的数值结果非常吻合。
{"title":"Impact of phase modulator on the performance of Costas loop","authors":"F. Sinhababu, A. Mukherjee, S. Sarkar, B. Chatterjee, A. Sarkar","doi":"10.1007/s12243-024-01048-y","DOIUrl":"https://doi.org/10.1007/s12243-024-01048-y","url":null,"abstract":"<p> In the present work, a modified Costas loop is presented with the help of mathematical modeling and numerical simulation. The voltage-controlled oscillator output phase along with frequency is controlled using the input control voltage. The modified loop is tested as frequency demodulator circuit where the improvement in sideband attenuation is clearly visible using an additional phase control arrangement. Numerical simulation result leads to a similar conclusion when the ratio of third harmonic to first harmonic and the ratio of first sideband attenuation to carrier are obtained for different proportions of the phase control. Noise bandwidth and lock range of the modified loop are investigated with special emphasis on the dependence of these parameters on the phase modulator gain. Lock range of the loop is evaluated analytically. An excellent demodulation capability of the loop has been reported in the presence of the additional phase control. Analytical results coupled with numerical findings presented are in good agreement.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on lexical based malicious domain name detection methods 基于词法的恶意域名检测方法综述
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-13 DOI: 10.1007/s12243-024-01043-3
Cherifa Hamroun, Ahmed Amamou, Kamel Haddadou, Hayat Haroun, Guy Pujolle

Nowadays, domain names are becoming crucial digital assets for any business. However, the media never stopped reporting phishing and identity theft attacks held by third-party entities that rely on domain names to mislead Internet users. Thus, Palo Alto Networks revealed in their studies 20 largely cyber-squatted domain names targeting popular brands. Based on their behavior, domain names appear in public lists that objectively evaluate their reputation. Blacklists contain domain names that have previously committed suspicious acts, whereas whitelists include the most popular and trustworthy domain names. For a long time, this listing technique has been used as a reactive approach to counter domain name-based attacks. However, it suffers from the limitation of responding late to attacks. Nowadays, techniques tend to be much more proactive. They operate before any attack occurs. As part of the CSNET conference, we published a short paper that describes a plethora of domain name attacks and their associated detection techniques using their lexical features (Hamroun et al. 2022). In this paper, we present an extended version of the original one which discusses the previously mentioned points in more detail and adds some elements of understanding when it comes to malicious domain name detection. Hence, we provide a literature review of malicious domain name detection techniques that use only the lexical features of domain names. These features are available, privacy-preserving, and highly improve detection results. The review covers recent works that report relevant performance categorized according to a new taxonomy. Moreover, we introduce a new criterion for comparing all the existing works based on targeted maliciousness type before discussing the limitations and the newly emerging research directions in this field.

如今,域名已成为任何企业的重要数字资产。然而,媒体从未停止报道第三方实体利用域名误导互联网用户的网络钓鱼和身份盗窃攻击。因此,Palo Alto Networks 在其研究中揭示了 20 个主要针对流行品牌的网络抢注域名。根据其行为,域名会出现在客观评价其声誉的公开名单中。黑名单中包含以前有过可疑行为的域名,而白名单则包括最受欢迎和最值得信赖的域名。长期以来,这种列表技术一直被用作应对域名攻击的被动方法。然而,这种方法存在对攻击反应较晚的局限性。现在的技术更倾向于主动出击。它们在任何攻击发生之前就开始运作。作为 CSNET 会议的一部分,我们发表了一篇短文,介绍了大量域名攻击及其使用词汇特征的相关检测技术(Hamroun 等人,2022 年)。在本文中,我们将对原始论文进行扩展,更详细地讨论之前提到的观点,并在恶意域名检测方面增加一些理解元素。因此,我们对仅使用域名词法特征的恶意域名检测技术进行了文献综述。这些特征是可用的,能保护隐私,并能极大地提高检测结果。该综述涵盖了根据新的分类标准报告相关性能的最新作品。此外,在讨论该领域的局限性和新出现的研究方向之前,我们还介绍了一种新的标准,用于比较所有基于目标恶意类型的现有工作。
{"title":"A review on lexical based malicious domain name detection methods","authors":"Cherifa Hamroun,&nbsp;Ahmed Amamou,&nbsp;Kamel Haddadou,&nbsp;Hayat Haroun,&nbsp;Guy Pujolle","doi":"10.1007/s12243-024-01043-3","DOIUrl":"10.1007/s12243-024-01043-3","url":null,"abstract":"<div><p>Nowadays, domain names are becoming crucial digital assets for any business. However, the media never stopped reporting phishing and identity theft attacks held by third-party entities that rely on domain names to mislead Internet users. Thus, Palo Alto Networks revealed in their studies 20 largely cyber-squatted domain names targeting popular brands. Based on their behavior, domain names appear in public lists that objectively evaluate their reputation. Blacklists contain domain names that have previously committed suspicious acts, whereas whitelists include the most popular and trustworthy domain names. For a long time, this listing technique has been used as a reactive approach to counter domain name-based attacks. However, it suffers from the limitation of responding late to attacks. Nowadays, techniques tend to be much more proactive. They operate before any attack occurs. As part of the CSNET conference, we published a short paper that describes a plethora of domain name attacks and their associated detection techniques using their lexical features (Hamroun et al. 2022). In this paper, we present an extended version of the original one which discusses the previously mentioned points in more detail and adds some elements of understanding when it comes to malicious domain name detection. Hence, we provide a literature review of malicious domain name detection techniques that use only the lexical features of domain names. These features are available, privacy-preserving, and highly improve detection results. The review covers recent works that report relevant performance categorized according to a new taxonomy. Moreover, we introduce a new criterion for comparing all the existing works based on targeted maliciousness type before discussing the limitations and the newly emerging research directions in this field.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A distributed platform for intrusion detection system using data stream mining in a big data environment 大数据环境下利用数据流挖掘的入侵检测系统分布式平台
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-08 DOI: 10.1007/s12243-024-01046-0
Fábio César Schuartz, Mauro Fonseca, Anelise Munaretto

With the growth of computer networks worldwide, there has been a greater need to protect local networks from malicious data that travel over the network. The increase in volume, speed, and variety of data requires a more robust, accurate intrusion detection system capable of analyzing a huge amount of data. This work proposes the creation of an intrusion detection system using stream classifiers and three classification layers—with and without a reduction in the number of features of the records and three classifiers in parallel with a voting system. The results obtained by the proposed system are compared against other models proposed in the literature, using two datasets to validate the proposed system. In all cases, gains in accuracy of up to 18.52% and 3.55% were obtained, using the datasets NSL-KDD and CICIDS2017, respectively. Reductions in classification time up to 35.51% and 94.90% were also obtained using the NSL-KDD and CICIDS2017 datasets, respectively.

随着全球计算机网络的发展,人们越来越需要保护本地网络免受通过网络传输的恶意数据的攻击。数据量、数据速度和数据种类的增加,需要一个能够分析海量数据的更强大、更准确的入侵检测系统。本作品建议使用流分类器和三个分类层创建入侵检测系统--在减少和不减少记录特征数量的情况下,三个分类器与投票系统并行。使用两个数据集来验证所提议的系统,并将所提议的系统获得的结果与文献中提议的其他模型进行比较。在所有情况下,使用 NSL-KDD 和 CICIDS2017 数据集,准确率分别提高了 18.52% 和 3.55%。使用 NSL-KDD 和 CICIDS2017 数据集,分类时间也分别缩短了 35.51% 和 94.90%。
{"title":"A distributed platform for intrusion detection system using data stream mining in a big data environment","authors":"Fábio César Schuartz,&nbsp;Mauro Fonseca,&nbsp;Anelise Munaretto","doi":"10.1007/s12243-024-01046-0","DOIUrl":"10.1007/s12243-024-01046-0","url":null,"abstract":"<div><p>With the growth of computer networks worldwide, there has been a greater need to protect local networks from malicious data that travel over the network. The increase in volume, speed, and variety of data requires a more robust, accurate intrusion detection system capable of analyzing a huge amount of data. This work proposes the creation of an intrusion detection system using stream classifiers and three classification layers—with and without a reduction in the number of features of the records and three classifiers in parallel with a voting system. The results obtained by the proposed system are compared against other models proposed in the literature, using two datasets to validate the proposed system. In all cases, gains in accuracy of up to 18.52% and 3.55% were obtained, using the datasets NSL-KDD and CICIDS2017, respectively. Reductions in classification time up to 35.51% and 94.90% were also obtained using the NSL-KDD and CICIDS2017 datasets, respectively.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141553139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable feature selection for adversarially robust cyber-attack detection 为对抗性强的网络攻击检测提供可靠的特征选择
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-06-07 DOI: 10.1007/s12243-024-01047-z
João Vitorino, Miguel Silva, Eva Maia, Isabel Praça

The growing cybersecurity threats make it essential to use high-quality data to train machine learning (ML) models for network traffic analysis, without noisy or missing data. By selecting the most relevant features for cyber-attack detection, it is possible to improve both the robustness and computational efficiency of the models used in a cybersecurity system. This work presents a feature selection and consensus process that combines multiple methods and applies them to several network datasets. Two different feature sets were selected and were used to train multiple ML models with regular and adversarial training. Finally, an adversarial evasion robustness benchmark was performed to analyze the reliability of the different feature sets and their impact on the susceptibility of the models to adversarial examples. By using an improved dataset with more data diversity, selecting the best time-related features and a more specific feature set, and performing adversarial training, the ML models were able to achieve a better adversarially robust generalization. The robustness of the models was significantly improved without their generalization to regular traffic flows being affected, without increases of false alarms, and without requiring too many computational resources, which enables a reliable detection of suspicious activity and perturbed traffic flows in enterprise computer networks.

网络安全威胁与日俱增,因此必须使用高质量数据来训练用于网络流量分析的机器学习(ML)模型,而不能使用嘈杂或缺失的数据。通过选择与网络攻击检测最相关的特征,可以提高网络安全系统所用模型的鲁棒性和计算效率。本作品介绍了一种结合多种方法的特征选择和共识流程,并将其应用于多个网络数据集。我们选择了两种不同的特征集,并将其用于训练常规和对抗性训练的多个 ML 模型。最后,进行了对抗性规避鲁棒性基准测试,以分析不同特征集的可靠性及其对模型易受对抗性示例影响的程度。通过使用具有更多数据多样性的改进数据集、选择最佳时间相关特征和更具体的特征集以及进行对抗训练,ML 模型能够实现更好的对抗鲁棒泛化。这些模型的鲁棒性得到了显著提高,对常规流量的泛化没有受到影响,误报率没有增加,也不需要过多的计算资源,从而能够可靠地检测企业计算机网络中的可疑活动和扰动流量。
{"title":"Reliable feature selection for adversarially robust cyber-attack detection","authors":"João Vitorino, Miguel Silva, Eva Maia, Isabel Praça","doi":"10.1007/s12243-024-01047-z","DOIUrl":"https://doi.org/10.1007/s12243-024-01047-z","url":null,"abstract":"<p>The growing cybersecurity threats make it essential to use high-quality data to train machine learning (ML) models for network traffic analysis, without noisy or missing data. By selecting the most relevant features for cyber-attack detection, it is possible to improve both the robustness and computational efficiency of the models used in a cybersecurity system. This work presents a feature selection and consensus process that combines multiple methods and applies them to several network datasets. Two different feature sets were selected and were used to train multiple ML models with regular and adversarial training. Finally, an adversarial evasion robustness benchmark was performed to analyze the reliability of the different feature sets and their impact on the susceptibility of the models to adversarial examples. By using an improved dataset with more data diversity, selecting the best time-related features and a more specific feature set, and performing adversarial training, the ML models were able to achieve a better adversarially robust generalization. The robustness of the models was significantly improved without their generalization to regular traffic flows being affected, without increases of false alarms, and without requiring too many computational resources, which enables a reliable detection of suspicious activity and perturbed traffic flows in enterprise computer networks.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141553196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dynamic AI-based algorithm selection for Virtual Network Embedding 基于人工智能的虚拟网络嵌入动态算法选择
IF 1.9 4区 计算机科学 Q2 Engineering Pub Date : 2024-06-04 DOI: 10.1007/s12243-024-01040-6
Abdelmounaim Bouroudi, Abdelkader Outtagarts, Yassine Hadjadj-Aoul

With the increasing sophistication and heterogeneity of network infrastructures, the need for Virtual Network Embedding (VNE) is becoming more critical than ever. VNE consists of mapping virtual networks on top of the physical infrastructure to optimize network resource use and improve overall network performance. Considered as one of the most important bricks of network slicing, it has been proven to be an NP-hard problem with no exact solution. Several heuristics and meta-heuristics were proposed to solve it. As heuristics do not provide satisfactory solutions, meta-heuristics allow a good exploration of the solutions’ space, though they require testing several solutions, which is generally unfeasible in a real world environment. Other methods relying on deep reinforcement learning (DRL) and combined with heuristics yield better performance without revealing issues such as sticking at local minima or poor space exploration limits. Nevertheless, these algorithms present varied performances according to the employed approach and the problem to be treated, resulting in robustness problems. To overcome these limits, we propose a robust placement approach based on the Algorithm Selection paradigm. The main idea is to dynamically select the best algorithm from a set of learning strategies regarding reward and sample efficiency at each time step. The proposed strategy acts as a meta-algorithm that brings more robustness to the network since it dynamically selects the best solution for a specific scenario. We propose two selection algorithms. First, we consider an offline selection in which the placement strategies are updated outside the selection period. In the second algorithm, the different agents are updated simultaneously with the selection process, which we call an online selection. Both solutions proved their efficiency and managed to dynamically select the best algorithm regarding acceptance ratio of the deployed services. Besides, the proposed solutions succeed in commuting to the best placement strategy depending on the strategies’ strengths while outperforming all standalone algorithms.

随着网络基础设施的日益复杂和异构化,对虚拟网络嵌入(VNE)的需求比以往任何时候都更加迫切。虚拟网络嵌入包括在物理基础设施上映射虚拟网络,以优化网络资源使用并提高整体网络性能。VNE 被认为是网络切片最重要的部分之一,但已被证明是一个 NP 难问题,没有精确的解决方案。为了解决这个问题,人们提出了一些启发式和元启发式方法。由于启发式方法不能提供令人满意的解决方案,元启发式方法可以很好地探索解决方案的空间,尽管它们需要测试多个解决方案,而这在现实环境中通常是不可行的。其他依靠深度强化学习(DRL)并与启发式相结合的方法性能更好,但不会暴露出问题,如停留在局部最小值或空间探索极限较低。不过,这些算法的性能因所采用的方法和要处理的问题而异,从而导致鲁棒性问题。为了克服这些限制,我们提出了一种基于算法选择范式的稳健放置方法。其主要思想是从一组学习策略中动态地选择最佳算法,即在每个时间步骤中的奖励和采样效率。所提出的策略就像一种元算法,能为网络带来更强的鲁棒性,因为它能为特定场景动态选择最佳解决方案。我们提出了两种选择算法。首先,我们考虑的是离线选择,即在选择期间外更新放置策略。在第二种算法中,不同的代理与选择过程同时更新,我们称之为在线选择。这两种解决方案都证明了它们的效率,并能根据部署服务的接受率动态选择最佳算法。此外,所提出的解决方案还能根据策略的优势,成功换算出最佳部署策略,同时优于所有独立算法。
{"title":"A dynamic AI-based algorithm selection for Virtual Network Embedding","authors":"Abdelmounaim Bouroudi, Abdelkader Outtagarts, Yassine Hadjadj-Aoul","doi":"10.1007/s12243-024-01040-6","DOIUrl":"https://doi.org/10.1007/s12243-024-01040-6","url":null,"abstract":"<p>With the increasing sophistication and heterogeneity of network infrastructures, the need for Virtual Network Embedding (VNE) is becoming more critical than ever. VNE consists of mapping virtual networks on top of the physical infrastructure to optimize network resource use and improve overall network performance. Considered as one of the most important bricks of network slicing, it has been proven to be an NP-hard problem with no exact solution. Several heuristics and meta-heuristics were proposed to solve it. As heuristics do not provide satisfactory solutions, meta-heuristics allow a good exploration of the solutions’ space, though they require testing several solutions, which is generally unfeasible in a real world environment. Other methods relying on deep reinforcement learning (DRL) and combined with heuristics yield better performance without revealing issues such as sticking at local minima or poor space exploration limits. Nevertheless, these algorithms present varied performances according to the employed approach and the problem to be treated, resulting in robustness problems. To overcome these limits, we propose a robust placement approach based on the Algorithm Selection paradigm. The main idea is to dynamically select the best algorithm from a set of learning strategies regarding reward and sample efficiency at each time step. The proposed strategy acts as a meta-algorithm that brings more robustness to the network since it dynamically selects the best solution for a specific scenario. We propose two selection algorithms. First, we consider an offline selection in which the placement strategies are updated outside the selection period. In the second algorithm, the different agents are updated simultaneously with the selection process, which we call an online selection. Both solutions proved their efficiency and managed to dynamically select the best algorithm regarding acceptance ratio of the deployed services. Besides, the proposed solutions succeed in commuting to the best placement strategy depending on the strategies’ strengths while outperforming all standalone algorithms.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141255332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of NLPA and imperfect CSI on ASER performance of QAM schemes for two-way 3P-ANC multiple-relay network NLPA 和不完善 CSI 对双向 3P-ANC 多中继网络 QAM 方案 ASER 性能的影响
IF 1.9 4区 计算机科学 Q2 Engineering Pub Date : 2024-05-29 DOI: 10.1007/s12243-024-01042-4
Nagendra Kumar

In this study, we examine the performance of higher-order quadrature amplitude modulation (QAM) schemes in a two-way multiple-relay network. This network employs three-phase analog network coding and an opportunistic relay selection algorithm while dealing with imperfect channel state information (CSI) and nonlinear power amplifiers (NLPA). Specifically, we derive lower-bound expressions for general-order rectangular QAM, hexagonal QAM, and cross QAM schemes. We assess performance over Nakagami-m fading channels with integer-valued fading parameters that are independently and non-identically distributed. Our analysis focuses on variable-gain amplify-and-forward relaying combined with maximal ratio combining receivers. To calculate closed-form average symbol error rate (ASER) expressions, we utilize a well-established approach based on cumulative distribution functions. We validate the accuracy of our derived expressions by comparing them to results obtained through Monte Carlo simulations. Furthermore, we investigate how fading parameters, the number of relay nodes, imperfect CSI, and NLPA affect the network’s performance.

在本研究中,我们考察了高阶正交幅度调制(QAM)方案在双向多中继网络中的性能。该网络采用三相模拟网络编码和机会性中继选择算法,同时处理不完善的信道状态信息(CSI)和非线性功率放大器(NLPA)。具体来说,我们推导出了一般阶矩形 QAM、六边形 QAM 和交叉 QAM 方案的下限表达式。我们评估了 Nakagami-m 衰减信道的性能,该信道的衰减参数为独立且非同分布的整数值。我们的分析重点是可变增益放大-前向中继与最大比组合接收器的结合。为了计算闭式平均符号错误率 (ASER) 表达式,我们采用了一种基于累积分布函数的成熟方法。我们将推导出的表达式与蒙特卡罗模拟得到的结果进行比较,从而验证了推导出的表达式的准确性。此外,我们还研究了衰减参数、中继节点数量、不完善的 CSI 和 NLPA 对网络性能的影响。
{"title":"Impact of NLPA and imperfect CSI on ASER performance of QAM schemes for two-way 3P-ANC multiple-relay network","authors":"Nagendra Kumar","doi":"10.1007/s12243-024-01042-4","DOIUrl":"https://doi.org/10.1007/s12243-024-01042-4","url":null,"abstract":"<p>In this study, we examine the performance of higher-order quadrature amplitude modulation (QAM) schemes in a two-way multiple-relay network. This network employs three-phase analog network coding and an opportunistic relay selection algorithm while dealing with imperfect channel state information (CSI) and nonlinear power amplifiers (NLPA). Specifically, we derive lower-bound expressions for general-order rectangular QAM, hexagonal QAM, and cross QAM schemes. We assess performance over Nakagami-<i>m</i> fading channels with integer-valued fading parameters that are independently and non-identically distributed. Our analysis focuses on variable-gain amplify-and-forward relaying combined with maximal ratio combining receivers. To calculate closed-form average symbol error rate (ASER) expressions, we utilize a well-established approach based on cumulative distribution functions. We validate the accuracy of our derived expressions by comparing them to results obtained through Monte Carlo simulations. Furthermore, we investigate how fading parameters, the number of relay nodes, imperfect CSI, and NLPA affect the network’s performance.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141169274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models RIOT-ML:用于空中安全更新和 TinyML 模型性能评估的工具包
IF 1.9 4区 计算机科学 Q2 Engineering Pub Date : 2024-05-22 DOI: 10.1007/s12243-024-01041-5
Zhaolan Huang, Koen Zandberg, Kaspar Schleiser, Emmanuel Baccelli
{"title":"RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models","authors":"Zhaolan Huang, Koen Zandberg, Kaspar Schleiser, Emmanuel Baccelli","doi":"10.1007/s12243-024-01041-5","DOIUrl":"https://doi.org/10.1007/s12243-024-01041-5","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141111289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1