{"title":"Task Allocation for Mobile Cloud Computing in Heterogeneous Wireless Networks","authors":"Zongqing Lu, J. Zhao, Yibo Wu, G. Cao","doi":"10.1109/ICCCN.2015.7288473","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288473","url":null,"abstract":"The ubiquity of mobile devices creates a rapidly growing market for mobile applications. Many of these applications involve complex processing tasks that are difficult to run on resource constrained mobile devices. This leads to the emergence of mobile cloud computing, in which cloud-based resources are used to enhance the computing capabilities of mobile devices. In this paper, we consider heterogeneous wireless networks in which multiple resource-rich computing nodes can be used as mobile clouds, and mobile devices can upload computation extensive tasks to these mobile clouds. The goal is to minimize the average task response time through determining whether to upload a task, and to which cloud the task should be uploaded. We formalize this task allocation problem, which is proved to be a NP-hard problem, and propose both offline centralized approach and online distributed approach to address this problem. Simulation results show that our approaches outperform others in terms of task response time in various scenarios.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127191539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OpenFlow Accelerator: A Decomposition-Based Hashing Approach for Flow Processing","authors":"Hai Sun, Yan Sun, Victor C. Valgenti, Min Sik Kim","doi":"10.1109/ICCCN.2015.7288440","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288440","url":null,"abstract":"To support scalable, flexible software-defined networking, OpenFlow is designed to provide granular traffic control across multiple vendor's network devices for efficient flow processing. Decision-tree packet classification algorithms do not scale to the number of flow table fields while decomposition algorithms such as RFC fail to provide necessary incremental update and determinism. Since searching in a single field is well studied, e.g. Longest Prefix Match (LPM) for prefix fields, we propose a decomposition approach which performs individual search on each flow table field, aggregates these results and conducts a query in a single hash table. Our approach scales well to the number of fields and allows incremental update. Meanwhile deterministic query is enabled for high-speed search. As far as we know our proposal is the first efficient decomposition approach to address multidimensional match in an OpenFlow flow table with an arbitrary number of fields as well as any match type. Theoretical analysis and experiments using synthetic classifiers justify the performance improvement.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127192065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Boubrima, Frederic Matigot, Walid Bechkit, H. Rivano, A. Ruas
{"title":"Optimal Deployment of Wireless Sensor Networks for Air Pollution Monitoring","authors":"Ahmed Boubrima, Frederic Matigot, Walid Bechkit, H. Rivano, A. Ruas","doi":"10.1109/ICCCN.2015.7288443","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288443","url":null,"abstract":"Recently, air pollution monitoring emerges as a main service of smart cities because of the increasing industrialization and the massive urbanization. Wireless sensor networks (WSN) are a suitable technology for this purpose thanks to their substantial benefits including low cost and autonomy. Minimizing the deployment cost is one of the major challenges in WSN design, therefore sensors positions have to be carefully determined. In this paper, we propose two integer linear programming formulations based on real pollutants dispersion modeling to deal with the minimum cost WSN deployment for air pollution monitoring. We illustrate the concept by applying our models on real world data, namely the Nottingham City street lights. We compare the two models in terms of execution time and show that the second flow based formulation is much better. We finally conduct extensive simulations to study the impact of some parameters and derive some guidelines for efficient WSN deployment for air pollution monitoring.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126588469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing the Loads of Multi-Player Online Game Servers Using Markov Chains","authors":"A. Saeed, R. Olsen, J. Pedersen","doi":"10.1109/ICCCN.2015.7288445","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288445","url":null,"abstract":"Multiplayer online games are on the rise with millions of registered player and hundreds of thousands concurrent players. Current state of the art servers achieve scalability by splitting the game world into linked mini worlds that can be hosted on separate servers. One of the problems is that, players are flocking to one area, resulting in an overloaded server with decreasing Quality of Service(QoS) for the players. A number of approaches were developed to address these issues, by balancing loads between the over-loaded and under-loaded servers. This paper investigates a new dimension that is created due to the load balancing of servers. Load balancing among servers is sensitive to correct status information. The Markov based load prediction was introduced in this paper to predict load of under-loaded servers, based on arrival (μ) and departure (λ) rates of players. The prediction based algorithm is proposed to minimize the effect of out dated status information. This approach was compared with normal load status information exchange algorithm. The model presented in this paper does not deal directly with optimizing the load balancing of the server but rather tries to present a new insight that need to be considered when developing load balancing algorithm, that is the reliability of the information that is shared. Simulation results show that Markov based prediction of load information performed better from the normal load status information sharing.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124778527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Bocchi, L. Grimaudo, M. Mellia, Elena Baralis, Sabyasachi Saha, S. Miskovic, Gaspar Modelo-Howard, Sung-ju Lee
{"title":"Network Connectivity Graph for Malicious Traffic Dissection","authors":"E. Bocchi, L. Grimaudo, M. Mellia, Elena Baralis, Sabyasachi Saha, S. Miskovic, Gaspar Modelo-Howard, Sung-ju Lee","doi":"10.1109/ICCCN.2015.7288435","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288435","url":null,"abstract":"Malware is a major threat to security and privacy of network users. A huge variety of malware typically spreads over the Internet, evolving every day, and challenging the research community and security practitioners to improve the effectiveness of countermeasures. In this paper, we present a system that automatically extracts patterns of network activity related to a specific malicious event, i.e., a seed. Our system is based on a methodology that correlates network events of hosts normally connected to the Internet over (i) time (i.e., analyzing different samples of traffic from the same host), (ii) space (i.e., correlating patterns across different hosts), and (iii) network layers (e.g., HTTP, DNS, etc.). The result is a Network Connectivity Graph that captures the overall \"network behavior\" of the seed. That is a focused and enriched representation of the malicious pattern infected hosts exhibit, purified from ordinary network activities and background traffic. We applied our approach on a large dataset collected in a real commercial ISP where the aggregated traffic produced by more than 20,000 households has been monitored. A commercial IDS has been used to complement network data with alerts related to malicious activities. We use such alerts to trigger our processing system. Results shows that the richness of the Network Connectivity Graph provides a much more detailed picture of malicious activities, considerably enhancing our understanding.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128628282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nils Richerzhagen, D. Stingl, Björn Richerzhagen, A. Mauthe, R. Steinmetz
{"title":"Adaptive Monitoring for Mobile Networks in Challenging Environments","authors":"Nils Richerzhagen, D. Stingl, Björn Richerzhagen, A. Mauthe, R. Steinmetz","doi":"10.1109/ICCCN.2015.7288371","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288371","url":null,"abstract":"The increasing capabilities of mobile communication devices are changing the way people interconnect today. Similar trends in the communication technology domain are leading to the expectation that data and media are available anytime and everywhere. A result is an increasing load on communication networks. In dynamic mobile networks that particularly rely on wireless communication such data requirements paired with environmental conditions like mobility or node density increase the risk of network failure. Consequently, monitoring is crucial in mobile networks to ensure reliable and efficient operation. Current monitoring mechanisms mostly rely on a static architecture and exhibit problems to handle the changes of mobile networks and environmental conditions over time. In this paper, an adaptive monitoring mechanism is presented to overcome these limitations. The mechanism exploits the connectivity and resource characteristics of mobile communication devices to (i) reconfigure its monitoring topology and (ii) adapt to changes of mobile networks and environmental conditions. Through evaluations we show that our proposed solution reduces the achieved relative monitoring error by a factor of six and represents a robust and reliable monitoring mechanism for these challenging environments.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114885664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A More Scalable Approach to Content Centric Networking","authors":"J. Garcia-Luna-Aceves","doi":"10.1109/ICCCN.2015.7288363","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288363","url":null,"abstract":"On-demand Content Exchange with Adaptive Naming (OCEAN) is introduced as an alternative to content centric networking approaches (NDN and CCN) that require the maintenance of forwarding state of each Interest traversing a router in a Pending Interest Table (PIT). Content routers in OCEAN maintain data answer routing tables (DART) to support the correct forwarding of Interests and responses to such Interests (content or negative acknowledgments) without divulging the identities of consumers who originate Interests. The size of a DART is proportional to the number of routes used by Interests traversing a router, rather than the number of Interests traversing a router. It is shown that undetected Interest loops cannot occur in OCEAN, while the same is not true for CCN and NDN, and that Interests and responses to Interests are forwarded correctly in the absence of failures. OCEAN attains similar latencies than NDN and CCN but incurs orders of magnitude less storage overhead.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128102007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Analysis of Availability in Multi-Tenant SaaS","authors":"Wenbo Su, Qu Liu, Chuang Lin, Xuemin Shen","doi":"10.1109/ICCCN.2015.7288430","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288430","url":null,"abstract":"Software as a Service (SaaS) has become an important application development and service delivery model. Among different architectures, multi-tenant architecture (MTA) not only has advantage on maintenance, but also increases resource utilization by sharing instances. However, sharing instances brings challenges to the security of the service. As one of the three principal properties of the security, availability receives more and more attentions. Recently, there are extensive efforts on technical methods to implement a secure multi-tenant SaaS, but few works on the modeling and analysis of its availability. In this paper, we firstly present the availability issues of the multi-tenant SaaS. Two important mechanisms to implement the MTA SaaS are then introduced: network isolation and database sharing. After that, a stochastic Petri net (SPN) model is developed to analyze the availability. Specific metrics are proposed to measure the availability both from the aspects of the system and the tenant. To extend the SPN model for large scale analysis, we solve the state space explosion problem of SPN model based on the theory of Markov chain aggregation. Finally, numerical results are provided to demonstrate the effectiveness of the SPN model and the analysis is efficient.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Siesta: Software-Defined Energy Efficient Base Station Control for Green Cellular Networks","authors":"Sunae Shin, Baek-Young Choi, Sejun Song","doi":"10.1109/ICCCN.2015.7288466","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288466","url":null,"abstract":"In order to tackle the issues of mounting deployments and large energy consumption of base stations, it is integral to devise schemes to improve energy efficiency in cellular networks. We propose a virtualized network function of cell management on an SDN architecture. We develop a cell management algorithm on the architecture that can effectively control the sleep and awake modes of base stations and perform handover operations in a cellular network. It provides significant benefits over current cellular networks that suffer from inflexible management and complex control. Our extensive trace-driven evaluation results show that the proposed control architecture and the cell management algorithm achieve significant energy savings, and incur less control message exchanges, more cells in a sleep mode for longer durations, and less cell status changes than existing energy saving approaches for cellular networks.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125388075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Maciej Korczyński, Ali Hamieh, J. Huh, Henrik Holm, S. R. Rajagopalan, N. Fefferman
{"title":"DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection","authors":"Maciej Korczyński, Ali Hamieh, J. Huh, Henrik Holm, S. R. Rajagopalan, N. Fefferman","doi":"10.1109/ICCCN.2015.7288396","DOIUrl":"https://doi.org/10.1109/ICCCN.2015.7288396","url":null,"abstract":"In this paper, we describe a fully nonparametric, scalable, distributed detection algorithm for intrusion/anomaly detection in networks. We discuss how this approach addresses a growing trend in distributed attacks while also providing solutions to problems commonly associated with distributed detection systems. We explore the impacts to detection performance from network topology, from the defined range of distributed communication for each node, and from involving only a small percent of total nodes in the network in the distributed detection communication. We evaluate our algorithm using a software-based testing implementation, and demonstrate up to 20% improvement in detection capability over parallel, isolated anomaly detectors for both stealthy port scans and DDoS attacks.","PeriodicalId":117136,"journal":{"name":"2015 24th International Conference on Computer Communication and Networks (ICCCN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116287474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}