首页 > 最新文献

Journal of Communications and Networks最新文献

英文 中文
NetLabeller: Architecture with data extraction and labelling framework for beyond 5G networks NetLabeller:超越 5G 网络的数据提取和标签框架架构
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.23919/JCN.2023.000063
Jimena Andrade-Hoz;Jose M. Alcaraz-Calero;Qi Wang
The next generation of network capabilities coupled with artificial intelligence (AI) can provide innovative solutions for network control and self-optimisation. Network control demands a detailed knowledge of the network components to enforce the correct control rules. To this end, an immense number of metrics related to devices, flows, network rules, etc. can be used to describe the state of the network and to gain insights about which rule to enforce depending on the context. However, selection of the most relevant metrics often proves challenging and there is no readily available tool that can facilitate the dataset extraction and labelling for AI model training. This research work therefore first develops an analysis of the most relevant metrics in terms of network control to create a training dataset for future AI development purposes. It then presents a new architecture to allow the extraction of these metrics from a 5G network with a novel dataset visualisation and labelling tool to help perform the exploratory analysis and the labelling process of the resultant dataset. It is expected that the proposed architecture and its associated tools would significantly speed up the training process, which is crucial for the data-driven approach in developing AI-based network control capabilities.
下一代网络功能与人工智能(AI)相结合,可为网络控制和自我优化提供创新解决方案。网络控制需要详细了解网络组件,以执行正确的控制规则。为此,可以使用大量与设备、流量、网络规则等相关的指标来描述网络状态,并根据上下文深入了解应执行的规则。然而,选择最相关的指标往往具有挑战性,而且没有现成的工具可以帮助提取和标记数据集,用于人工智能模型训练。因此,这项研究工作首先对网络控制方面最相关的指标进行了分析,以便为未来的人工智能开发目的创建一个训练数据集。然后,它提出了一种新的架构,允许从 5G 网络中提取这些指标,并提供了一种新颖的数据集可视化和标记工具,以帮助执行探索性分析和结果数据集的标记过程。预计所提出的架构及其相关工具将大大加快训练过程,这对开发基于人工智能的网络控制能力的数据驱动方法至关重要。
{"title":"NetLabeller: Architecture with data extraction and labelling framework for beyond 5G networks","authors":"Jimena Andrade-Hoz;Jose M. Alcaraz-Calero;Qi Wang","doi":"10.23919/JCN.2023.000063","DOIUrl":"https://doi.org/10.23919/JCN.2023.000063","url":null,"abstract":"The next generation of network capabilities coupled with artificial intelligence (AI) can provide innovative solutions for network control and self-optimisation. Network control demands a detailed knowledge of the network components to enforce the correct control rules. To this end, an immense number of metrics related to devices, flows, network rules, etc. can be used to describe the state of the network and to gain insights about which rule to enforce depending on the context. However, selection of the most relevant metrics often proves challenging and there is no readily available tool that can facilitate the dataset extraction and labelling for AI model training. This research work therefore first develops an analysis of the most relevant metrics in terms of network control to create a training dataset for future AI development purposes. It then presents a new architecture to allow the extraction of these metrics from a 5G network with a novel dataset visualisation and labelling tool to help perform the exploratory analysis and the labelling process of the resultant dataset. It is expected that the proposed architecture and its associated tools would significantly speed up the training process, which is crucial for the data-driven approach in developing AI-based network control capabilities.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459140","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A popularity-based caching strategy for improved efficiency in SVRF-based multicast control-planes 基于流行度的缓存策略,提高基于 SVRF 的组播控制平面的效率
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.23919/JCN.2023.000054
Ruisi Wu;Wen-Kang Jia
The packet forwarding engine (PFE), a vital component of high-performance switches and routers, plays a pivotal role in rapidly selecting the appropriate output port for tens of thousands of packets. The performance of the PFE hinges on the efficacy of the group membership algorithm. In this research, we present a hybrid approach called caching scalar-pair and vectors routing and forwarding (CSVRF), which comprises virtual output port bitmap caching (VOPBC) and fractional-N SVRF, designed to address significant multicast forwarding challenges such as scalability. We achieve this through the implementation of content address memory (CAM). Within the CSVRF framework, we introduce an innovative virtual output port bitmap cache table, which encompasses the most frequently occurring combinations of output port bitmaps (OPB). Furthermore, we divide the larger scalar-pair into N subgroups to enhance the reusability of prime resources. We validate our findings using Matlab-based mathematical models and simulations. Our results demonstrate significant decreases in both memory space usage and forwarding latency. Our approach assures minimized memory consumption, faster processing, and robust scalability in high port-density settings.
数据包转发引擎(PFE)是高性能交换机和路由器的重要组成部分,在为数以万计的数据包快速选择合适的输出端口方面发挥着关键作用。PFE 的性能取决于群成员算法的有效性。在这项研究中,我们提出了一种名为 "缓存标量对和矢量路由与转发(CSVRF)"的混合方法,其中包括虚拟输出端口位图缓存(VOPBC)和分数-N SVRF,旨在解决可扩展性等重大组播转发挑战。我们通过实施内容地址存储器(CAM)来实现这一目标。在 CSVRF 框架内,我们引入了创新的虚拟输出端口位图缓存表,其中包含最常出现的输出端口位图 (OPB) 组合。此外,我们还将较大的标量对分为 N 个子组,以提高素数资源的重用性。我们使用基于 Matlab 的数学模型和仿真验证了我们的研究结果。我们的结果表明,内存空间使用量和转发延迟都大幅减少。我们的方法可确保在高端口密度环境中最大限度地减少内存消耗、加快处理速度并实现稳健的可扩展性。
{"title":"A popularity-based caching strategy for improved efficiency in SVRF-based multicast control-planes","authors":"Ruisi Wu;Wen-Kang Jia","doi":"10.23919/JCN.2023.000054","DOIUrl":"https://doi.org/10.23919/JCN.2023.000054","url":null,"abstract":"The packet forwarding engine (PFE), a vital component of high-performance switches and routers, plays a pivotal role in rapidly selecting the appropriate output port for tens of thousands of packets. The performance of the PFE hinges on the efficacy of the group membership algorithm. In this research, we present a hybrid approach called caching scalar-pair and vectors routing and forwarding (CSVRF), which comprises virtual output port bitmap caching (VOPBC) and fractional-N SVRF, designed to address significant multicast forwarding challenges such as scalability. We achieve this through the implementation of content address memory (CAM). Within the CSVRF framework, we introduce an innovative virtual output port bitmap cache table, which encompasses the most frequently occurring combinations of output port bitmaps (OPB). Furthermore, we divide the larger scalar-pair into N subgroups to enhance the reusability of prime resources. We validate our findings using Matlab-based mathematical models and simulations. Our results demonstrate significant decreases in both memory space usage and forwarding latency. Our approach assures minimized memory consumption, faster processing, and robust scalability in high port-density settings.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459134","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information for authors 作者须知
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.23919/JCN.2024.000009
{"title":"Information for authors","authors":"","doi":"10.23919/JCN.2024.000009","DOIUrl":"https://doi.org/10.23919/JCN.2024.000009","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459128","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical analysis of cascaded Nakagami-m fading channels with generalized correlation 具有广义相关性的级联中上消隐信道的统计分析
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.23919/JCN.2024.000001
Ibrahim Ghareeb;Osama Al-Shalali
This paper studies the statistical analysis of cascaded Nakagami-m fading channels that are arbitrarily correlated and not necessarily identically distributed. The probability density function (PDF), cumulative distribution function (CDF), and the nth moment for the product of N correlated Nakagami-m random variables (RVs) are derived and presented in exact form expressions using the Meijer's G function. The cascaded channels are assumed to have flat and slow fading with arbitrarily non-identical fading severity parameters. Using these results, the impact of channel correlation and fading severity parameters are investigated for the cascaded Nakagami-m channels. Furthermore, performance analysis addressed by outage probability (OP), average channel capacity, and average bit error probability (BEP) for coherently detected binary PSK and FSK signals are derived. As a consequence of the versatility of Nakagami-m distribution, the derived expressions can compromise the statistics of other useful multivariate distributions such as One-sided Gaussian distribution with m = 1/2 and Rayleigh distribution with m = 1. To the best of the authors' knowledge, the derived expressions are novel and have not been reported in the literature. To aid and verify the theoretical analysis, numerical results authenticated by Monte Carlo simulation are presented.
本文研究了任意相关且不一定同分布的级联中上-m 渐变信道的统计分析。利用 Meijer's G 函数推导出了 N 个相关 Nakagami-m 随机变量(RV)乘积的概率密度函数(PDF)、累积分布函数(CDF)和第 n 矩,并以精确形式表达出来。级联信道被假定为具有任意非相同衰减严重性参数的平缓衰减。利用这些结果,研究了级联中上-m 信道的信道相关性和衰落严重性参数的影响。此外,还得出了相干检测二进制 PSK 和 FSK 信号的中断概率 (OP)、平均信道容量和平均误码概率 (BEP) 等性能分析。由于中神-m 分布的多功能性,推导出的表达式可以折中其他有用的多元分布的统计量,如 m = 1/2 的单边高斯分布和 m = 1 的瑞利分布。据作者所知,推导出的表达式是新颖的,在文献中从未报道过。为了帮助和验证理论分析,本文介绍了经蒙特卡罗模拟验证的数值结果。
{"title":"Statistical analysis of cascaded Nakagami-m fading channels with generalized correlation","authors":"Ibrahim Ghareeb;Osama Al-Shalali","doi":"10.23919/JCN.2024.000001","DOIUrl":"https://doi.org/10.23919/JCN.2024.000001","url":null,"abstract":"This paper studies the statistical analysis of cascaded Nakagami-m fading channels that are arbitrarily correlated and not necessarily identically distributed. The probability density function (PDF), cumulative distribution function (CDF), and the nth moment for the product of N correlated Nakagami-m random variables (RVs) are derived and presented in exact form expressions using the Meijer's G function. The cascaded channels are assumed to have flat and slow fading with arbitrarily non-identical fading severity parameters. Using these results, the impact of channel correlation and fading severity parameters are investigated for the cascaded Nakagami-m channels. Furthermore, performance analysis addressed by outage probability (OP), average channel capacity, and average bit error probability (BEP) for coherently detected binary PSK and FSK signals are derived. As a consequence of the versatility of Nakagami-m distribution, the derived expressions can compromise the statistics of other useful multivariate distributions such as One-sided Gaussian distribution with m = 1/2 and Rayleigh distribution with m = 1. To the best of the authors' knowledge, the derived expressions are novel and have not been reported in the literature. To aid and verify the theoretical analysis, numerical results authenticated by Monte Carlo simulation are presented.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459136","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing age of information in multiaccess networks with time-varying channels: A fluid limits approach 分析具有时变信道的多接入网络中的信息年龄:流体极限方法
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.23919/JCN.2024.000003
Feng Yuan;Zeyu Hu;Zhiyuan Jiang
In this paper, we adopt the fluid limits approach to analyze the age of information (AoI) in a wireless multi-access network where users share the channel and transmissions are unreliable. We prove the convergence of the AoI occupancy measure to the fluid limit, represented by a partial differential equation (PDE). Furthermore, we demonstrate the global convergence to the equilibrium of the PDE, i.e., the stationary AoI distribution. Within this framework, we first consider the case of i.i.d. channel conditions and generate-at-will statuses for users. We demonstrate that a previously established AoI lower bound in the literature is asymptotically accurate, and a straightforward threshold-based access policy can be asymptotically optimal. Next, we consider the case where the channel states are time-varying, i.e., the Gilbert-Elliott channel model. We assume partial channel state information (CSI) is available due to channel probing singals. Theoretical analysis reveals that only a fraction of CSI is required to approach the optimal performance. Additionally, we numerically evaluate the performance of the proposed policy and the existing Whittle's index policy under time-varying channels. Simulation results demonstrate that the proposed policy outperforms the Whittle's index policy since the latter cannot adapt to time-varying channels.
在本文中,我们采用流体极限方法来分析用户共享信道且传输不可靠的无线多接入网络中的信息年龄(AoI)。我们证明了 AoI 占用度量向流体极限的收敛,流体极限由偏微分方程 (PDE) 表示。此外,我们还证明了向偏微分方程平衡点的全局收敛性,即静态 AoI 分布。在此框架内,我们首先考虑了 i.i.d. 信道条件和用户随意生成状态的情况。我们证明了之前文献中建立的 AoI 下限是渐进准确的,而且基于阈值的直接接入策略也是渐进最优的。接下来,我们考虑信道状态时变的情况,即 Gilbert-Elliott 信道模型。我们假定由于信道探测信号的存在,部分信道状态信息(CSI)是可用的。理论分析表明,只需要部分 CSI 就能达到最佳性能。此外,我们还从数值上评估了提议的策略和现有惠特尔指数策略在时变信道下的性能。仿真结果表明,由于惠特尔指数策略无法适应时变信道,因此建议的策略优于惠特尔指数策略。
{"title":"Analyzing age of information in multiaccess networks with time-varying channels: A fluid limits approach","authors":"Feng Yuan;Zeyu Hu;Zhiyuan Jiang","doi":"10.23919/JCN.2024.000003","DOIUrl":"https://doi.org/10.23919/JCN.2024.000003","url":null,"abstract":"In this paper, we adopt the fluid limits approach to analyze the age of information (AoI) in a wireless multi-access network where users share the channel and transmissions are unreliable. We prove the convergence of the AoI occupancy measure to the fluid limit, represented by a partial differential equation (PDE). Furthermore, we demonstrate the global convergence to the equilibrium of the PDE, i.e., the stationary AoI distribution. Within this framework, we first consider the case of i.i.d. channel conditions and generate-at-will statuses for users. We demonstrate that a previously established AoI lower bound in the literature is asymptotically accurate, and a straightforward threshold-based access policy can be asymptotically optimal. Next, we consider the case where the channel states are time-varying, i.e., the Gilbert-Elliott channel model. We assume partial channel state information (CSI) is available due to channel probing singals. Theoretical analysis reveals that only a fraction of CSI is required to approach the optimal performance. Additionally, we numerically evaluate the performance of the proposed policy and the existing Whittle's index policy under time-varying channels. Simulation results demonstrate that the proposed policy outperforms the Whittle's index policy since the latter cannot adapt to time-varying channels.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic engineering and QoS/QoE supporting techniques for emerging service-oriented software-defined network 新兴的面向服务的软件定义网络的流量工程和 QoS/QoE 支持技术
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.23919/JCN.2023.000065
Mykola Beshley;Natalia Kryvinska;Halyna Beshley;Oleksiy Panchenko;Mykhailo Medvetskyi
The future integration of software-defined network (SDN) with the service-oriented architecture (SOA) paradigm requires new solutions to ensure the quality of service (QoS) according to the users' requirements. The paper presents a user experience-centric approach to traffic engineering and QoS/quality of experience (QoE) support for service-oriented software-defined network (SOSDN) architecture. This approach is to enable end-to-end QoS across the networking and computing domain by monitoring and agreeing on the dynamic state of their functioning. The proposed SOSDN is based on improved traffic engineering techniques, such as adaptive prioritization of services, server selection, and QoS/QoE-based routing. The developed adaptive service prioritization algorithm automatically changes the priority of flows in the network operation mode by the SDN controller for individual users under the concluded service level agreements (SLA) contract. We proposed a mathematical model of correlation of user satisfaction level by QoE score with technical QoS parameters. This model is based on the normalized value of the integral additive QoS criterion. Accordingly, ensuring the ordered user-centric QoS/QoE is carried out by means of proposed multi-criteria adaptive routing of data flows, the metric of which is based on the integral additive QoS criterion. The simulation results showed that, in contrast to known practical solutions, the integrated use of the proposed method of adaptive multi-criteria routing and prioritization of data flows provides a high level of QoE required by users in the SOSDN paradigm.
未来,软件定义网络(SDN)与面向服务架构(SOA)范例的整合需要新的解决方案,以根据用户需求确保服务质量(QoS)。本文提出了一种以用户体验为中心的方法,用于面向服务的软件定义网络(SOSDN)架构的流量工程和 QoS/体验质量(QoE)支持。这种方法旨在通过监控和商定网络和计算领域的动态运行状态,实现整个网络和计算领域的端到端 QoS。拟议的 SOSDN 基于改进的流量工程技术,如自适应服务优先级、服务器选择和基于 QoS/QoE 的路由。所开发的自适应服务优先级算法通过 SDN 控制器自动改变网络运行模式中流量的优先级,以满足已签订服务水平协议(SLA)合同的单个用户的需求。我们提出了 QoE 分数与 QoS 技术参数相关的用户满意度数学模型。该模型基于积分加法 QoS 标准的归一化值。因此,确保有序的以用户为中心的 QoS/QoE 是通过建议的数据流多标准自适应路由来实现的,其度量标准是基于积分加法 QoS 标准。仿真结果表明,与已知的实际解决方案相比,综合使用所提出的数据流多标准自适应路由和优先级排序方法,可在 SOSDN 范例中提供用户所需的高水平 QoE。
{"title":"Traffic engineering and QoS/QoE supporting techniques for emerging service-oriented software-defined network","authors":"Mykola Beshley;Natalia Kryvinska;Halyna Beshley;Oleksiy Panchenko;Mykhailo Medvetskyi","doi":"10.23919/JCN.2023.000065","DOIUrl":"https://doi.org/10.23919/JCN.2023.000065","url":null,"abstract":"The future integration of software-defined network (SDN) with the service-oriented architecture (SOA) paradigm requires new solutions to ensure the quality of service (QoS) according to the users' requirements. The paper presents a user experience-centric approach to traffic engineering and QoS/quality of experience (QoE) support for service-oriented software-defined network (SOSDN) architecture. This approach is to enable end-to-end QoS across the networking and computing domain by monitoring and agreeing on the dynamic state of their functioning. The proposed SOSDN is based on improved traffic engineering techniques, such as adaptive prioritization of services, server selection, and QoS/QoE-based routing. The developed adaptive service prioritization algorithm automatically changes the priority of flows in the network operation mode by the SDN controller for individual users under the concluded service level agreements (SLA) contract. We proposed a mathematical model of correlation of user satisfaction level by QoE score with technical QoS parameters. This model is based on the normalized value of the integral additive QoS criterion. Accordingly, ensuring the ordered user-centric QoS/QoE is carried out by means of proposed multi-criteria adaptive routing of data flows, the metric of which is based on the integral additive QoS criterion. The simulation results showed that, in contrast to known practical solutions, the integrated use of the proposed method of adaptive multi-criteria routing and prioritization of data flows provides a high level of QoE required by users in the SOSDN paradigm.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459131","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification and characterization of encoded traffic in SCADA network using hybrid deep learning scheme 利用混合深度学习方案对 SCADA 网络中的编码流量进行分类和特征描述
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.23919/JCN.2023.000067
Love Allen Chijioke Ahakonye;Gabriel Chukwunonso Amaizu;Cosmas Ifeanyi Nwakanma;Jae Min Lee;Dong-Seong Kim
The domain name system (DNS) has evolved into an essential component of network communications, as well as a critical component of critical industrial systems (CIS) and Supervisory Control and Data Acquisition (SCADA) network connection. DNS over HTTPS (DoH) encapsulating DNS within hypertext transfer protocol secure (HTTPS) does not eliminate network access exploitation. This paper proposes a hybrid deep learning model for the early classification of encoded network traffic into one of the two classes: DoH and NonDoH. They can be malicious, benign, or zero-day attacks. The proposed scheme incorporates the swiftness of the convolutional neural network (CNN) in extracting useful information and the ease of long short-term memory (LSTM) in learning long-term dependencies. The simulation results showed that the proposed approach accurately classifies the encoded network traffic as DoH or NonDoH and characterizes the traffic as benign, zero-day, or malicious. The proposed robust hybrid deep learning model had high accuracy and precision of 99.28%, recall of 99.75%, and AUC of 0.9975 at a minimal training and testing time of 745s and 0.000324 s, respectively. In addition to outperforming other compared contemporary algorithms and existing techniques, the proposed technique significantly detects all attack types. This study also investigated the impact of the SMOTE technique as a tool for data balancing. To further validate the reliability of the proposed scheme, an industrial control system SCADA (ICS-SCADA) dataset, in addition to two (2) other cyber-security datasets (NSL-KDD and CICDS2017), were evaluated. Mathews correlation coefficient (MCC) was employed to validate the model performance, confirming the applicability of the proposed model in a critical industrial system such as SCADA.
域名系统 (DNS) 已发展成为网络通信的重要组成部分,也是关键工业系统 (CIS) 和监控与数据采集 (SCADA) 网络连接的重要组成部分。将 DNS 封装在超文本传输协议安全(HTTPS)中的 DNS over HTTPS(DoH)并不能消除网络访问漏洞。本文提出了一种混合深度学习模型,用于将编码后的网络流量早期分类为 DoH 和 NonDoH 两类之一:DoH和NonDoH。它们可以是恶意攻击、良性攻击或零日攻击。所提出的方案结合了卷积神经网络(CNN)在提取有用信息方面的敏捷性和长短期记忆(LSTM)在学习长期依赖关系方面的易用性。仿真结果表明,所提出的方法能准确地将编码的网络流量分类为 DoH 或 NonDoH,并将流量描述为良性、零时差或恶意。所提出的鲁棒混合深度学习模型的准确率和精确率高达 99.28%,召回率高达 99.75%,AUC 高达 0.9975,最小训练和测试时间分别为 745 秒和 0.000324 秒。除了在性能上优于其他同类算法和现有技术外,所提出的技术还能显著检测出所有攻击类型。本研究还调查了 SMOTE 技术作为数据平衡工具的影响。为进一步验证所提方案的可靠性,除了两(2)个其他网络安全数据集(NSL-KDD 和 CICDS2017)外,还对一个工业控制系统 SCADA(ICS-SCADA)数据集进行了评估。采用马修斯相关系数(MCC)验证了模型的性能,证实了所提模型在 SCADA 等关键工业系统中的适用性。
{"title":"Classification and characterization of encoded traffic in SCADA network using hybrid deep learning scheme","authors":"Love Allen Chijioke Ahakonye;Gabriel Chukwunonso Amaizu;Cosmas Ifeanyi Nwakanma;Jae Min Lee;Dong-Seong Kim","doi":"10.23919/JCN.2023.000067","DOIUrl":"https://doi.org/10.23919/JCN.2023.000067","url":null,"abstract":"The domain name system (DNS) has evolved into an essential component of network communications, as well as a critical component of critical industrial systems (CIS) and Supervisory Control and Data Acquisition (SCADA) network connection. DNS over HTTPS (DoH) encapsulating DNS within hypertext transfer protocol secure (HTTPS) does not eliminate network access exploitation. This paper proposes a hybrid deep learning model for the early classification of encoded network traffic into one of the two classes: DoH and NonDoH. They can be malicious, benign, or zero-day attacks. The proposed scheme incorporates the swiftness of the convolutional neural network (CNN) in extracting useful information and the ease of long short-term memory (LSTM) in learning long-term dependencies. The simulation results showed that the proposed approach accurately classifies the encoded network traffic as DoH or NonDoH and characterizes the traffic as benign, zero-day, or malicious. The proposed robust hybrid deep learning model had high accuracy and precision of 99.28%, recall of 99.75%, and AUC of 0.9975 at a minimal training and testing time of 745s and 0.000324 s, respectively. In addition to outperforming other compared contemporary algorithms and existing techniques, the proposed technique significantly detects all attack types. This study also investigated the impact of the SMOTE technique as a tool for data balancing. To further validate the reliability of the proposed scheme, an industrial control system SCADA (ICS-SCADA) dataset, in addition to two (2) other cyber-security datasets (NSL-KDD and CICDS2017), were evaluated. Mathews correlation coefficient (MCC) was employed to validate the model performance, confirming the applicability of the proposed model in a critical industrial system such as SCADA.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459137","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Copyright transfer form 版权转让表
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.23919/JCN.2024.000010
{"title":"Copyright transfer form","authors":"","doi":"10.23919/JCN.2024.000010","DOIUrl":"https://doi.org/10.23919/JCN.2024.000010","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459130","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient application based many-to-many resource allocation and sharing with power optimization for D2D communication — A clustered approach 基于高效应用的多对多资源分配和共享以及 D2D 通信的功率优化 - 一种聚类方法
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-02-01 DOI: 10.23919/JCN.2023.000062
Raghu Thekke Veedu;Kiran Manjappa
This study aims to give an edge to public safety applications over commercial applications in an underlay cellular-assisted device-to-device (D2D) communication. The proposed framework introduces two frameworks: Cluster-based many-to-many resource allocation and resource sharing framework (CMMRARS) and constant time power control algorithm (CTPCA). The RB assigned to a CUE can share with multiple DUE pairs, and the DUE pairs can also use RB assigned to multiple CUEs under the many-to-many strategy. The CMMRARS framework is responsible for resource allocation and resource sharing and accordingly, it is further divided into three sub-problems. The CTPCA framework is divided into two subproblems and used to find optimal power for cellular users and D2D transmitters to avoid cross-tier and co-tier interference. The K-means clustering algorithm is employed to form application-specific clusters, and it ensures that more cellular users fall into the public safety clusters so that the D2D users will get more resource-sharing options. Cellular users use a weighted bipartite graph to form a priority list of D2D users for resource sharing. The main objective of the proposed work is to enhance the system's sum rate by simultaneously reusing the same resource by multiple D2D pairs and safeguarding the Quality of Services provided to all kinds of network users. A theoretical justification is presented to ensure that the proposed frameworks terminate after a certain number of runs and congregate to a consistent matching. Simulation results show that the proposed method influences the overall system's sum rate and provides a preference for public safety applications over commercial applications.
本研究旨在使公共安全应用在铺层蜂窝辅助设备对设备(D2D)通信中优于商业应用。拟议框架引入了两个框架:基于集群的多对多资源分配和资源共享框架(CMMRARS)和恒定时间功率控制算法(CTPCA)。在多对多策略下,分配给一个 CUE 的 RB 可以与多个 DUE 对共享,而 DUE 对也可以使用分配给多个 CUE 的 RB。CMMRARS 框架负责资源分配和资源共享,因此又分为三个子问题。CTPCA 框架分为两个子问题,用于寻找蜂窝用户和 D2D 发射器的最佳功率,以避免跨层和同层干扰。采用 K-means 聚类算法形成特定应用聚类,确保更多蜂窝用户属于公共安全聚类,以便 D2D 用户获得更多资源共享选择。蜂窝用户使用加权双向图形成 D2D 用户资源共享优先级列表。建议工作的主要目标是通过多个 D2D 对同时重复使用同一资源来提高系统的总和率,并保障向各类网络用户提供的服务质量。本文提出了理论依据,以确保提议的框架在运行一定次数后终止,并聚集到一致的匹配中。仿真结果表明,建议的方法影响了整个系统的总和率,并使公共安全应用优于商业应用。
{"title":"An efficient application based many-to-many resource allocation and sharing with power optimization for D2D communication — A clustered approach","authors":"Raghu Thekke Veedu;Kiran Manjappa","doi":"10.23919/JCN.2023.000062","DOIUrl":"https://doi.org/10.23919/JCN.2023.000062","url":null,"abstract":"This study aims to give an edge to public safety applications over commercial applications in an underlay cellular-assisted device-to-device (D2D) communication. The proposed framework introduces two frameworks: Cluster-based many-to-many resource allocation and resource sharing framework (CMMRARS) and constant time power control algorithm (CTPCA). The RB assigned to a CUE can share with multiple DUE pairs, and the DUE pairs can also use RB assigned to multiple CUEs under the many-to-many strategy. The CMMRARS framework is responsible for resource allocation and resource sharing and accordingly, it is further divided into three sub-problems. The CTPCA framework is divided into two subproblems and used to find optimal power for cellular users and D2D transmitters to avoid cross-tier and co-tier interference. The K-means clustering algorithm is employed to form application-specific clusters, and it ensures that more cellular users fall into the public safety clusters so that the D2D users will get more resource-sharing options. Cellular users use a weighted bipartite graph to form a priority list of D2D users for resource sharing. The main objective of the proposed work is to enhance the system's sum rate by simultaneously reusing the same resource by multiple D2D pairs and safeguarding the Quality of Services provided to all kinds of network users. A theoretical justification is presented to ensure that the proposed frameworks terminate after a certain number of runs and congregate to a consistent matching. Simulation results show that the proposed method influences the overall system's sum rate and provides a preference for public safety applications over commercial applications.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10459141","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IBN@Cloud: An intent-based cloud and overlay network orchestration system IBN@Cloud:基于意图的云和叠加网络协调系统
IF 3.6 3区 计算机科学 Q1 Computer Science Pub Date : 2024-01-29 DOI: 10.23919/JCN.2023.000051
Mir Muhammad Suleman Sarwar;Afaq Muhammad;Wang-Cheol Song
This paper presents an intent-based networking (IBN) system for the orchestration of OpenStack-based clouds and overlay networks between multiple clouds. Clouds need to communicate with other clouds for various reasons such as reducing latency and overcoming single points of failure. An overlay network provides connectivity between multiple Clouds for communication. Moreover, there can be several paths of communication between a source and a destination cloud in the overlay network. A machine learning model can be used to proactively select the best path for efficient network performance. Communication between the source and destination can then be established over the selected path. Communication in such type of a scenario requires complex networking configurations. IBN provides a closed-loop and Intelligent system for cloud to cloud communication. To this end, IBN abstracts complex networking and cloud configurations by receiving an intent from a user, translating the intent, generating complex configurations for the intent, and deploying the configurations, thereby assuring the intent. Therefore, the IBN that is presented here has three major features: (1) It can deploy an OpenStack cloud at a target machine, (2) it can deploy GENEVE tunnels between different clouds that form an overlay network, and (3) it can then leverage the advantages of machine learning to find the best path for communication between any two clouds. As machine learning is an essential component of the intelligent IBN system, two linear and three non-linear models were tested. RNN, LSTM, and GRU models were employed for non-linear modeling. Linear regression and SVR models were employed for linear modeling. Overall all the non-linear models outperformed the linear model with an 81% R2 score, exhibiting similar performance. Linear models also showed similar performance but with lower accuracy. The testbed contains an overlay network of 11 GENEVE tunnels between 7 OpenStack-based clouds deployed in Malaysia, Korea, Pakistan, and Cambodia at TEIN.
本文介绍了一种基于意图的网络(IBN)系统,用于协调基于 OpenStack 的云和多个云之间的覆盖网络。出于减少延迟和克服单点故障等各种原因,云需要与其他云进行通信。覆盖网络为多个云之间的通信提供连接。此外,在叠加网络中,源云和目标云之间可以有多个通信路径。机器学习模型可用于主动选择最佳路径,以提高网络性能。然后就可以通过选定的路径建立源和目的地之间的通信。此类场景中的通信需要复杂的网络配置。IBN 为云到云通信提供了一个闭环智能系统。为此,IBN 通过接收用户的意图、翻译意图、为意图生成复杂的配置并部署配置,从而抽象出复杂的网络和云配置,从而确保意图的实现。因此,本文介绍的 IBN 有三大特点:(1) 它可以在目标机器上部署 OpenStack 云;(2) 它可以在不同云之间部署 GENEVE 隧道,从而形成一个覆盖网络;(3) 然后,它可以利用机器学习的优势,为任意两个云之间的通信找到最佳路径。由于机器学习是智能 IBN 系统的重要组成部分,因此测试了两种线性模型和三种非线性模型。非线性模型采用了 RNN、LSTM 和 GRU 模型。线性建模采用了线性回归和 SVR 模型。总体而言,所有非线性模型都优于线性模型,R2 得分为 81%,表现出相似的性能。线性模型也表现出相似的性能,但准确率较低。测试平台包含一个由 11 个 GENEVE 隧道组成的覆盖网络,这些隧道连接着 TEIN 在马来西亚、韩国、巴基斯坦和柬埔寨部署的 7 个基于 OpenStack 的云。
{"title":"IBN@Cloud: An intent-based cloud and overlay network orchestration system","authors":"Mir Muhammad Suleman Sarwar;Afaq Muhammad;Wang-Cheol Song","doi":"10.23919/JCN.2023.000051","DOIUrl":"https://doi.org/10.23919/JCN.2023.000051","url":null,"abstract":"This paper presents an intent-based networking (IBN) system for the orchestration of OpenStack-based clouds and overlay networks between multiple clouds. Clouds need to communicate with other clouds for various reasons such as reducing latency and overcoming single points of failure. An overlay network provides connectivity between multiple Clouds for communication. Moreover, there can be several paths of communication between a source and a destination cloud in the overlay network. A machine learning model can be used to proactively select the best path for efficient network performance. Communication between the source and destination can then be established over the selected path. Communication in such type of a scenario requires complex networking configurations. IBN provides a closed-loop and Intelligent system for cloud to cloud communication. To this end, IBN abstracts complex networking and cloud configurations by receiving an intent from a user, translating the intent, generating complex configurations for the intent, and deploying the configurations, thereby assuring the intent. Therefore, the IBN that is presented here has three major features: (1) It can deploy an OpenStack cloud at a target machine, (2) it can deploy GENEVE tunnels between different clouds that form an overlay network, and (3) it can then leverage the advantages of machine learning to find the best path for communication between any two clouds. As machine learning is an essential component of the intelligent IBN system, two linear and three non-linear models were tested. RNN, LSTM, and GRU models were employed for non-linear modeling. Linear regression and SVR models were employed for linear modeling. Overall all the non-linear models outperformed the linear model with an 81% R\u0000<sup>2</sup>\u0000 score, exhibiting similar performance. Linear models also showed similar performance but with lower accuracy. The testbed contains an overlay network of 11 GENEVE tunnels between 7 OpenStack-based clouds deployed in Malaysia, Korea, Pakistan, and Cambodia at TEIN.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10416318","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140031617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1