{"title":"Message from the chairs","authors":"Hnu Thaper, E. Wheeler, Feng Gu, Susan S. Hamlen","doi":"10.1109/ICPPW.2005.54","DOIUrl":"https://doi.org/10.1109/ICPPW.2005.54","url":null,"abstract":"We continue to adjust our curriculum to meet the profession’s changing needs. With financial support from PwC, we have added data analytics topics to our systems and fraud courses, and are planning more applications. Consulting projects with local organizations provide experiential learning opportunities. In addition to accounting concepts, our curriculum focuses on developing critical Did you know...?","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130045103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cover page","authors":"Africa Development","doi":"10.1093/chromsci/bmv235","DOIUrl":"https://doi.org/10.1093/chromsci/bmv235","url":null,"abstract":"Cover Page","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments","authors":"Adel Abusitta, Martine Bellaïche, M. Dagenais","doi":"10.1109/ICIN.2018.8401625","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401625","url":null,"abstract":"Cloud systems are becoming more complex and vulnerable to attacks. Cyber attacks are also becoming more sophisticated and harder to detect. Therefore, it is increasingly difficult for a single cloud-based intrusion detection system (IDS) to detect all attacks, because of limited and incomplete knowledge about attacks. The recent researches in cyber-security have shown that a co-operation among IDSs can bring higher detection accuracy in such complex computer systems. Through collaboration, a cloud-based IDS can consult other IDSs about suspicious intrusions and increase the decision accuracy. The problem of existing cooperative IDS approaches is that they overlook having untrusted (malicious or not) IDSs that may negatively effect the decision about suspicious intrusions in the cloud. Moreover, they rely on a centralized architecture in which a central agent regulates the cooperation, which contradicts the distributed nature of the cloud. In this paper, we propose a framework that enables IDSs to distributively form trustworthy IDSs communities. We devise a novel decentralized algorithm, based on coalitional game theory, that allows a set of cloud-based IDSs to cooperatively set up their coalition in such a way to make their individual detection accuracy increase, even in the presence of untrusted IDSs.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121494506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing the latency of OpenFlow rule changes in data centre networks","authors":"J. Sherwin, C. Sreenan","doi":"10.1109/ICIN.2018.8401629","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401629","url":null,"abstract":"The number and size of data centres being constructed continues to grow, in response to increasing demand for cloud-based services. In a Data Centre Network (DCN), maximizing performance is essential, and network management tools that leverage the advantages of Software-Defined Networking (SDN) are key to achieving that goal. DCN switches are now expected to support the OpenFlow protocol — however, performance issues have been observed with hardware switch OpenFlow implementations in relation to path establishment for new flows, and path modification for existing flows. In particular, concerns have been raised regarding the delays in effecting changes to hardware flow tables. We report on recent research that seeks to address this issue. Specifically, we investigate the approach of temporarily tunnelling packets for new flows while more efficient non-tunnelled paths are being established, and to which the flows are later migrated. Our early results show the potential and limitations of this approach.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Fraysse, I. B. Yahia, Jonathan Lejeune, Pierre Sens, Julien Sopena
{"title":"Towards multi-SDN services: Dangers of concurrent resource allocation from multiple providers","authors":"G. Fraysse, I. B. Yahia, Jonathan Lejeune, Pierre Sens, Julien Sopena","doi":"10.1109/ICIN.2018.8401627","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401627","url":null,"abstract":"One of the Software-Defined Networking (SDN) promises is the programmability of networks through Application Programming Interfaces (APIs). Those APIs allow different users to access the network concurrently. Thus leading to the allocation of dedicated critical resources by a given Service Provider. In this paper we formalize the problem of deadlocks, and present a case where they occur.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Mai, M. Aouadj, G. Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli
{"title":"Implementation of content poisoning attack detection and reaction in virtualized NDN networks","authors":"H. Mai, M. Aouadj, G. Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli","doi":"10.1109/ICIN.2018.8401591","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401591","url":null,"abstract":"The orchestration of counter-measures in the context of security incidents remains a challenging task for network operators. The main objective of this demonstration is to present how this orchestration is possible in the context of a virtualized NDN network. Based on an adaptation of the TOSCA topology and orchestration model, it is possible to trigger these counter- measures after the detection of NDN specific attacks. We show how the Montimage Monitoring Tool (MMT) has been adapted to detect typical Content Poisoning Attack (CPA), and how the orchestrator can trigger reactions to mitigate their impact on the network.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127033689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring 5G radio access networks with cloud-based stream processing platforms","authors":"D. Houatra, Yu-Huei Tseng","doi":"10.1109/ICIN.2018.8401581","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401581","url":null,"abstract":"Cloud Radio Access Networks (C-RAN) are being adopted for future generations of access networks. 5G RAN services are expected to be built on cloud technologies, in combination with network function virtualization (NFV), leading to the use of virtual computing resources in RAN assets. Beyond standard RAN computing, many devices can benefit from this cloud and virtualization trend. 5G RAN monitoring middleboxes are particularly interesting to be implemented as virtual network functions (VNF) and run with C-RAN resources, in order to satisfy the technical requirements of 5G networks. In addition, there is a new paradigm shift in network monitoring, which leads to the adoption of stream processing. Therefore, we propose to investigate the design of RAN monitoring services as VNFs, provided as cloud services, built with stream processing platforms, to enable 5G network monitoring with fast data analysis. This paper describes a framework for 5G RAN monitoring with streams, and experiments with this framework.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forecast scheduling and its extensions to account for random events","authors":"Hind Zaaraoui, Z. Altman, E. Altman, T. Jiménez","doi":"10.1109/ICIN.2018.8401606","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401606","url":null,"abstract":"Technology evolutions make possible the use of Geo-Localized Measurements (GLM) for performance and quality of service optimization thanks to the Minimization of Drive Testing (MDT) feature. Exploiting GLM in radio resource management is a key challenge in future networks. The Forecast Scheduling (FS) concept that uses GLM in the scheduling process has been recently introduced. It exploits long term time and spatial diversity of vehicular users in order to improve user throughputs and quality of service. In a previous paper we have formulated the FS as a convex optimization problem namely the maximization of an α-fair utility function of the cumulated downlink data rates of the users along their trajectories. This paper proposes an extension for the FS model to take into account different types of random events such as arrival and departure of users and uncertainties in the mobile trajectories. Simulation results illustrate the significant performance gain achieved by the FS algorithms in the presence of random events.a","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nejm Eddine Frigui, Tayeb Lemlouma, S. Gosselin, Benoit Radier, R. L. Meur, J. Bonnin
{"title":"Dynamic reallocation of SLA parameters in passive optical network based on clustering analysis","authors":"Nejm Eddine Frigui, Tayeb Lemlouma, S. Gosselin, Benoit Radier, R. L. Meur, J. Bonnin","doi":"10.1109/ICIN.2018.8401589","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401589","url":null,"abstract":"The introduction of new services as well as the growth in the number of communication terminals in the last years has led to an exponential growth of data traffic in both fixed and mobile networks. Passive Optical Networks (PONs) offer high bandwidth services to service providers customers. However, due to the dynamicity of users traffic patterns, PONs need to rely on an efficient upstream bandwidth allocation mechanism to define for each customer the amount of data that needs to be transmitted at a specific time. This mechanism is currently limited by the static nature of Service Level Agreement (SLA) parameters which can lead to an unoptimized bandwidth allocation in the network. In this paper, we propose a novel mechanism for optimizing the allocation of upstream Gigabit-capable Passive Optical Networks (GPON) resources based on the dynamic adjustment of some SLA parameters according to customer's estimated traffic patterns. Clustering analysis is used to differentiate customers according to their bandwidth utilization based on real-time and historical data. Three user classes are taken into account: heavy, light and flexible. Our work considers two fundamental clustering algorithms, namely K-means, a very well-known partitioning method and DBSCAN, one of the most common density-based clustering algorithms. An experimental study is conducted to evaluate the two algorithms and select which one can be the most suitable for the differentiation of user classes.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128848636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhenzhe Zhong, I. Hamchaoui, R. Khatoun, A. Serhrouchni
{"title":"Performance evaluation of CQIC and TCP BBR in mobile network","authors":"Zhenzhe Zhong, I. Hamchaoui, R. Khatoun, A. Serhrouchni","doi":"10.1109/ICIN.2018.8401585","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401585","url":null,"abstract":"Original TCP design is not agile enough to fit the rapidly varying mobile network bandwidth. In this paper, we revisit the Channel Quality Indicator Control (CQIC) congestion control algorithm and adapt its implementation from 3G/QUIC semantic to LTE/TCP with detailed congestion reaction gestures. We then compare its performance with that of the brand new TCP congestion control BBR — yet already widely deployed. We also identify the reason for performance degradation of high data rate downloads in LTE Acknowledged Mode (AM, which is turned on by default). Furthermore, impacts of the commonly encountered DelAck (delayed acknowlegment) feature are analyzed for both congestion control algorithms e.g. BBR and CQIC.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124470508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}