2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)最新文献

筛选
英文 中文
Message from the chairs 来自椅子的信息
Hnu Thaper, E. Wheeler, Feng Gu, Susan S. Hamlen
{"title":"Message from the chairs","authors":"Hnu Thaper, E. Wheeler, Feng Gu, Susan S. Hamlen","doi":"10.1109/ICPPW.2005.54","DOIUrl":"https://doi.org/10.1109/ICPPW.2005.54","url":null,"abstract":"We continue to adjust our curriculum to meet the profession’s changing needs. With financial support from PwC, we have added data analytics topics to our systems and fraud courses, and are planning more applications. Consulting projects with local organizations provide experiential learning opportunities. In addition to accounting concepts, our curriculum focuses on developing critical Did you know...?","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130045103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cover page 封面页
Africa Development
{"title":"Cover page","authors":"Africa Development","doi":"10.1093/chromsci/bmv235","DOIUrl":"https://doi.org/10.1093/chromsci/bmv235","url":null,"abstract":"Cover Page","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments 基于信任的多云环境下协同入侵检测博弈理论模型
Adel Abusitta, Martine Bellaïche, M. Dagenais
{"title":"A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments","authors":"Adel Abusitta, Martine Bellaïche, M. Dagenais","doi":"10.1109/ICIN.2018.8401625","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401625","url":null,"abstract":"Cloud systems are becoming more complex and vulnerable to attacks. Cyber attacks are also becoming more sophisticated and harder to detect. Therefore, it is increasingly difficult for a single cloud-based intrusion detection system (IDS) to detect all attacks, because of limited and incomplete knowledge about attacks. The recent researches in cyber-security have shown that a co-operation among IDSs can bring higher detection accuracy in such complex computer systems. Through collaboration, a cloud-based IDS can consult other IDSs about suspicious intrusions and increase the decision accuracy. The problem of existing cooperative IDS approaches is that they overlook having untrusted (malicious or not) IDSs that may negatively effect the decision about suspicious intrusions in the cloud. Moreover, they rely on a centralized architecture in which a central agent regulates the cooperation, which contradicts the distributed nature of the cloud. In this paper, we propose a framework that enables IDSs to distributively form trustworthy IDSs communities. We devise a novel decentralized algorithm, based on coalitional game theory, that allows a set of cloud-based IDSs to cooperatively set up their coalition in such a way to make their individual detection accuracy increase, even in the presence of untrusted IDSs.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121494506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Reducing the latency of OpenFlow rule changes in data centre networks 减少数据中心网络中OpenFlow规则更改的延迟
J. Sherwin, C. Sreenan
{"title":"Reducing the latency of OpenFlow rule changes in data centre networks","authors":"J. Sherwin, C. Sreenan","doi":"10.1109/ICIN.2018.8401629","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401629","url":null,"abstract":"The number and size of data centres being constructed continues to grow, in response to increasing demand for cloud-based services. In a Data Centre Network (DCN), maximizing performance is essential, and network management tools that leverage the advantages of Software-Defined Networking (SDN) are key to achieving that goal. DCN switches are now expected to support the OpenFlow protocol — however, performance issues have been observed with hardware switch OpenFlow implementations in relation to path establishment for new flows, and path modification for existing flows. In particular, concerns have been raised regarding the delays in effecting changes to hardware flow tables. We report on recent research that seeks to address this issue. Specifically, we investigate the approach of temporarily tunnelling packets for new flows while more efficient non-tunnelled paths are being established, and to which the flows are later migrated. Our early results show the potential and limitations of this approach.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards multi-SDN services: Dangers of concurrent resource allocation from multiple providers 迈向多sdn服务:多个提供者并发资源分配的危险
G. Fraysse, I. B. Yahia, Jonathan Lejeune, Pierre Sens, Julien Sopena
{"title":"Towards multi-SDN services: Dangers of concurrent resource allocation from multiple providers","authors":"G. Fraysse, I. B. Yahia, Jonathan Lejeune, Pierre Sens, Julien Sopena","doi":"10.1109/ICIN.2018.8401627","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401627","url":null,"abstract":"One of the Software-Defined Networking (SDN) promises is the programmability of networks through Application Programming Interfaces (APIs). Those APIs allow different users to access the network concurrently. Thus leading to the allocation of dedicated critical resources by a given Service Provider. In this paper we formalize the problem of deadlocks, and present a case where they occur.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126482677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of content poisoning attack detection and reaction in virtualized NDN networks 虚拟化NDN网络中内容投毒攻击检测与反应的实现
H. Mai, M. Aouadj, G. Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli
{"title":"Implementation of content poisoning attack detection and reaction in virtualized NDN networks","authors":"H. Mai, M. Aouadj, G. Doyen, Daishi Kondo, Xavier Marchal, Thibault Cholez, Edgardo Montes de Oca, Wissam Mallouli","doi":"10.1109/ICIN.2018.8401591","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401591","url":null,"abstract":"The orchestration of counter-measures in the context of security incidents remains a challenging task for network operators. The main objective of this demonstration is to present how this orchestration is possible in the context of a virtualized NDN network. Based on an adaptation of the TOSCA topology and orchestration model, it is possible to trigger these counter- measures after the detection of NDN specific attacks. We show how the Montimage Monitoring Tool (MMT) has been adapted to detect typical Content Poisoning Attack (CPA), and how the orchestrator can trigger reactions to mitigate their impact on the network.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127033689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Monitoring 5G radio access networks with cloud-based stream processing platforms 利用基于云的流处理平台监控5G无线接入网络
D. Houatra, Yu-Huei Tseng
{"title":"Monitoring 5G radio access networks with cloud-based stream processing platforms","authors":"D. Houatra, Yu-Huei Tseng","doi":"10.1109/ICIN.2018.8401581","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401581","url":null,"abstract":"Cloud Radio Access Networks (C-RAN) are being adopted for future generations of access networks. 5G RAN services are expected to be built on cloud technologies, in combination with network function virtualization (NFV), leading to the use of virtual computing resources in RAN assets. Beyond standard RAN computing, many devices can benefit from this cloud and virtualization trend. 5G RAN monitoring middleboxes are particularly interesting to be implemented as virtual network functions (VNF) and run with C-RAN resources, in order to satisfy the technical requirements of 5G networks. In addition, there is a new paradigm shift in network monitoring, which leads to the adoption of stream processing. Therefore, we propose to investigate the design of RAN monitoring services as VNFs, provided as cloud services, built with stream processing platforms, to enable 5G network monitoring with fast data analysis. This paper describes a framework for 5G RAN monitoring with streams, and experiments with this framework.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Forecast scheduling and its extensions to account for random events 预测调度及其扩展,以解释随机事件
Hind Zaaraoui, Z. Altman, E. Altman, T. Jiménez
{"title":"Forecast scheduling and its extensions to account for random events","authors":"Hind Zaaraoui, Z. Altman, E. Altman, T. Jiménez","doi":"10.1109/ICIN.2018.8401606","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401606","url":null,"abstract":"Technology evolutions make possible the use of Geo-Localized Measurements (GLM) for performance and quality of service optimization thanks to the Minimization of Drive Testing (MDT) feature. Exploiting GLM in radio resource management is a key challenge in future networks. The Forecast Scheduling (FS) concept that uses GLM in the scheduling process has been recently introduced. It exploits long term time and spatial diversity of vehicular users in order to improve user throughputs and quality of service. In a previous paper we have formulated the FS as a convex optimization problem namely the maximization of an α-fair utility function of the cumulated downlink data rates of the users along their trajectories. This paper proposes an extension for the FS model to take into account different types of random events such as arrival and departure of users and uncertainties in the mobile trajectories. Simulation results illustrate the significant performance gain achieved by the FS algorithms in the presence of random events.a","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic reallocation of SLA parameters in passive optical network based on clustering analysis 基于聚类分析的无源光网络SLA参数动态再分配
Nejm Eddine Frigui, Tayeb Lemlouma, S. Gosselin, Benoit Radier, R. L. Meur, J. Bonnin
{"title":"Dynamic reallocation of SLA parameters in passive optical network based on clustering analysis","authors":"Nejm Eddine Frigui, Tayeb Lemlouma, S. Gosselin, Benoit Radier, R. L. Meur, J. Bonnin","doi":"10.1109/ICIN.2018.8401589","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401589","url":null,"abstract":"The introduction of new services as well as the growth in the number of communication terminals in the last years has led to an exponential growth of data traffic in both fixed and mobile networks. Passive Optical Networks (PONs) offer high bandwidth services to service providers customers. However, due to the dynamicity of users traffic patterns, PONs need to rely on an efficient upstream bandwidth allocation mechanism to define for each customer the amount of data that needs to be transmitted at a specific time. This mechanism is currently limited by the static nature of Service Level Agreement (SLA) parameters which can lead to an unoptimized bandwidth allocation in the network. In this paper, we propose a novel mechanism for optimizing the allocation of upstream Gigabit-capable Passive Optical Networks (GPON) resources based on the dynamic adjustment of some SLA parameters according to customer's estimated traffic patterns. Clustering analysis is used to differentiate customers according to their bandwidth utilization based on real-time and historical data. Three user classes are taken into account: heavy, light and flexible. Our work considers two fundamental clustering algorithms, namely K-means, a very well-known partitioning method and DBSCAN, one of the most common density-based clustering algorithms. An experimental study is conducted to evaluate the two algorithms and select which one can be the most suitable for the differentiation of user classes.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128848636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of CQIC and TCP BBR in mobile network 移动网络中CQIC和TCP BBR的性能评价
Zhenzhe Zhong, I. Hamchaoui, R. Khatoun, A. Serhrouchni
{"title":"Performance evaluation of CQIC and TCP BBR in mobile network","authors":"Zhenzhe Zhong, I. Hamchaoui, R. Khatoun, A. Serhrouchni","doi":"10.1109/ICIN.2018.8401585","DOIUrl":"https://doi.org/10.1109/ICIN.2018.8401585","url":null,"abstract":"Original TCP design is not agile enough to fit the rapidly varying mobile network bandwidth. In this paper, we revisit the Channel Quality Indicator Control (CQIC) congestion control algorithm and adapt its implementation from 3G/QUIC semantic to LTE/TCP with detailed congestion reaction gestures. We then compare its performance with that of the brand new TCP congestion control BBR — yet already widely deployed. We also identify the reason for performance degradation of high data rate downloads in LTE Acknowledged Mode (AM, which is turned on by default). Furthermore, impacts of the commonly encountered DelAck (delayed acknowlegment) feature are analyzed for both congestion control algorithms e.g. BBR and CQIC.","PeriodicalId":103076,"journal":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124470508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信