2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)最新文献

筛选
英文 中文
A handover statistics based approach for Cell Outage Detection in self-organized Heterogeneous Networks 基于切换统计的自组织异构网络小区停机检测方法
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987346
Zhang Tao, Lei Feng, Peng Yu, Shaoyong Guo, Wenjing Li, Xue-song Qiu
{"title":"A handover statistics based approach for Cell Outage Detection in self-organized Heterogeneous Networks","authors":"Zhang Tao, Lei Feng, Peng Yu, Shaoyong Guo, Wenjing Li, Xue-song Qiu","doi":"10.23919/INM.2017.7987346","DOIUrl":"https://doi.org/10.23919/INM.2017.7987346","url":null,"abstract":"Recently, densified small cell deployment with overlay coverage through Heterogeneous Networks (HetNets) has emerged as a viable solution for 5G mobile networks. Cell Outage Detection (COD) which is the essential functionality in Self-Organizing Network (SON) is designed to autonomously deal with unexpected faults. Typical methods for detecting cell outage are usually based on Manual Drive Tests (MDT). However, it is difficult to detect small cell outage by MDT measurements in HetNets, because the User Equipment (UE) served by these small cells can switch to the macro cell and keep the Reference Signal Received Power (RSRP) and Signal to Interference plus Noise Ratio (SINR) values normal. To resolve this issue, we propose a COD architecture based on the handover statistics. Our model concentrates on cell outage detection in a two-tier heterogeneous network. We process sequential handover statistics spatially and temporally in conjunction with data mining methods. Also, an improved LOF algorithm (M-LOF) is proposed to enhance the detection performance based on handover statistics. To evaluate the system performance, a set of tests has been carried out using some reasonable assumptions and network simulator we designed. The results of simulation show that our system is more effective to detect cell outage in comparison to the architecture using MDT measurements.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126551477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Learning behavioral fingerprints from Netflows using Timed Automata 使用定时自动机从Netflows学习行为指纹
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987293
Gaetano Pellegrino, Qin Lin, Christian A. Hammerschmidt, S. Verwer
{"title":"Learning behavioral fingerprints from Netflows using Timed Automata","authors":"Gaetano Pellegrino, Qin Lin, Christian A. Hammerschmidt, S. Verwer","doi":"10.23919/INM.2017.7987293","DOIUrl":"https://doi.org/10.23919/INM.2017.7987293","url":null,"abstract":"We present a novel way to detect infected hosts and identify malware in networks by analyzing network communication statistics with state-of-the-art automata learning algorithms. The automata encode patterns of short-term interactions in known malicious hosts, and are used to obtain small but effective fingerprints of machine behavior. We showcase the effectiveness of our system, named BASTA1 (Behavioral Analytics System using Timed Automata), on a public dataset containing Netflow traces of real-world botnet malware. Compared to a deep packet inspection of communication content, Netflows are easy and cheap to collect and analyze, and preserve a greater degree of privacy. Even though the high level of abstraction in Netflow data makes it more difficult to utilize it, BASTA shows very impressive results achieving high accuracy in several settings while returning few false positives. It is also capable of detecting infections of previously unseen malware.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Virtualization of radio access network by Virtual Machine and Docker: Practice and performance analysis 利用虚拟机和Docker实现无线接入网的虚拟化:实践与性能分析
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987358
G. Aravinthan, Dalia-Georgiana Herculea, Chung Shue Chen, L. Roullet
{"title":"Virtualization of radio access network by Virtual Machine and Docker: Practice and performance analysis","authors":"G. Aravinthan, Dalia-Georgiana Herculea, Chung Shue Chen, L. Roullet","doi":"10.23919/INM.2017.7987358","DOIUrl":"https://doi.org/10.23919/INM.2017.7987358","url":null,"abstract":"Software defined networking (SDN) and network function virtualization (NFV) are the embraced technologies for the backhauling of future 5G networks. Virtual Machine (VM) and Docker container based deployments have received much attention. This paper presents the virtualization of a prototyped software defined radio access network (RAN) architecture by using VMs and Docker containers. In addition, it provides an analytical model for the generalized software defined RAN architecture with the practice of VM based and Docker container based implementations. Using measurements obtained from the two testbeds and the introduced queuing model, we compare their performances and analyze the two different architectures. Results verify the superiority of the Docker technology. Some observations from the behavior of the testbeds are concluded for a better understanding of the VM and Docker container based technologies for the future development of 5G SDN controller.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121384537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Capacity self-planning in Small Cell multi-tenant 5G Networks 小蜂窝多租户5G网络容量自规划
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987449
P. Muñoz, O. Sallent, J. Pérez-Romero
{"title":"Capacity self-planning in Small Cell multi-tenant 5G Networks","authors":"P. Muñoz, O. Sallent, J. Pérez-Romero","doi":"10.23919/INM.2017.7987449","DOIUrl":"https://doi.org/10.23919/INM.2017.7987449","url":null,"abstract":"Multi-tenancy allows diverse agents sharing the infrastructure in the 5th generation of mobile networks. Such a feature calls for more automated and faster planning procedures in order to adapt the network capacity to the varying traffic demand. To achieve these goals, Small Cells offer network providers more flexible, scalable, and cost-effective solutions compared to macrocell deployments. This paper proposes a novel framework for cell planning in multi-tenant Small Cell networks. In this framework, the tenant's contracted capacity is translated to a set of detailed planning specifications over time and space domains in order to efficiently update the network infrastructure and configuration. Based on this, an algorithm is proposed that considers different actions such as adding/removing channels and adding or relocating small cells. The proposed approach is evaluated considering the deployment of a new tenant, where different sets of planning specifications are tested.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127014843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Demystifying network slicing: From theory to practice 揭秘网络切片:从理论到实践
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987450
Thomas Soenen, Ratul Banerjee, W. Tavernier, D. Colle, M. Pickavet
{"title":"Demystifying network slicing: From theory to practice","authors":"Thomas Soenen, Ratul Banerjee, W. Tavernier, D. Colle, M. Pickavet","doi":"10.23919/INM.2017.7987450","DOIUrl":"https://doi.org/10.23919/INM.2017.7987450","url":null,"abstract":"Network slicing is the emerging paradigm in which operators use their resources to provide multiple logical networks and associated resources, with varying configurations and at the same time. More and more vertical industries need their machines and devices connected in networks with specific requirements. In order to provide networks fitted to these usecases, and not require that they adapt to the one-size-fits-all network as is currently the case with the mobile Internet, the telecom community vowed to include network slicing functionality within its next generation of mobile networking, 5G, as an end-to-end network solution. As the concept is new and still not fully grasped, we develop and refine the concept of a network slice both from a business and a technological point of view. We investigate how network slicing in the context of a vehicular network could be implemented and how it advances the state of the art. This involves a detailed study of the involved technologies across a range of infrastructures and network segments, as well as the resulting gaps in the existing technology landscape. Based on the lessons learned in this concrete usecase, network slicing is considered in a broader 5G landscape. We capture the main challenges and potential directions in order to make network slicing a true enabler of 5G-driven vertical industries.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114472939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Prototyping a high availability PaaS: Performance analysis and lessons learned 高可用性PaaS的原型:性能分析和经验教训
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987367
Marcos Machado, Daniel Rosendo, D. Gomes, A. Moreira, Moises Bezerra, D. Sadok, P. Endo, C. Curescu
{"title":"Prototyping a high availability PaaS: Performance analysis and lessons learned","authors":"Marcos Machado, Daniel Rosendo, D. Gomes, A. Moreira, Moises Bezerra, D. Sadok, P. Endo, C. Curescu","doi":"10.23919/INM.2017.7987367","DOIUrl":"https://doi.org/10.23919/INM.2017.7987367","url":null,"abstract":"With cloud computing consolidation, Platform-as-a-Service (PaaS) has been used as a solution for developing applications with low cost and maximum flexibility. However, an open challenge related to PaaS is the proper handling of multi-tier and stateful applications with support for high availability (HA); and scalability can be considered an essential feature for HA. However, dealing with several instances of the same application that access its state in a common area is not a simple task. This paper presents a novel PaaS framework, named NoPaaS, that supports the deployment of multi-tier and stateful applications assuring their availability according to the Service Availability Forum (SAF) redundancy model. The primary goal of this work is to present NoPaaS framework and prototype, and highlight challenges and open issues when providing multi-tier and stateful applications in high availability clouds.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129991435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention 将机器学习预测分析应用于SQL注入攻击检测和预防
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987433
Solomon Ogbomon Uwagbole, W. Buchanan, Lu Fan
{"title":"Applied Machine Learning predictive analytics to SQL Injection Attack detection and prevention","authors":"Solomon Ogbomon Uwagbole, W. Buchanan, Lu Fan","doi":"10.23919/INM.2017.7987433","DOIUrl":"https://doi.org/10.23919/INM.2017.7987433","url":null,"abstract":"The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smart devices. Structured Query Language (SQL) Injection Attack (SQLIA) remains an intruder's exploit of choice on vulnerable web applications to pilfer confidential data from the database with potentially damaging consequences. The existing solutions of mostly signature approaches were all before the recent challenges of big data mining and at such lacks the functionality and ability to cope with new signatures concealed in web requests. An alternative Machine Learning (ML) predictive analytics provides a functional and scalable mining to big data in detection and prevention of SQLIA. Unfortunately, lack of availability of readymade robust corpus or data set with patterns and historical data items to train a classifier are issues well known in SQLIA research. In this paper, we explore the generation of data set containing extraction from known attack patterns including SQL tokens and symbols present at injection points. Also, as a test case, we build a web application that expects dictionary word list as vector variables to demonstrate massive quantities of learning data. The data set is pre-processed, labelled and feature hashing for supervised learning. The trained classifier to be deployed as a web service that is consumed in a custom dot NET application implementing a web proxy Application Programming Interface (API) to intercept and accurately predict SQLIA in web requests thereby preventing malicious web requests from reaching the protected back-end database. This paper demonstrates a full proof of concept implementation of an ML predictive analytics and deployment of resultant web service that accurately predicts and prevents SQLIA with empirical evaluations presented in Confusion Matrix (CM) and Receiver Operating Curve (ROC).","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
Failover time evaluation between checkpoint services in multi-tier stateful applications 多层有状态应用程序中检查点服务之间的故障转移时间评估
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987361
D. Gomes, G. Gonçalves, Moises Bezerra, D. Sadok, P. Endo, C. Curescu
{"title":"Failover time evaluation between checkpoint services in multi-tier stateful applications","authors":"D. Gomes, G. Gonçalves, Moises Bezerra, D. Sadok, P. Endo, C. Curescu","doi":"10.23919/INM.2017.7987361","DOIUrl":"https://doi.org/10.23919/INM.2017.7987361","url":null,"abstract":"Cloud applications are offered to users with high availability and minimal data loss. Any (hardware or software) failure must be detected and recovered quickly, in order to maintain customer trust and avoid financial losses. When we are dealing with multi-tier and stateful applications, the failure recovery process is a big challenge because the whole state of the failed application must be retrieved and restored in a new instance. This process is named as failover; it can be performed by a checkpoint service at application-level or at system-level. Depending on the location of the checkpoint data storage, it can be classified as non-collocated, collocated warm, or collocated hot. This work presents an evaluation between these two checkpoint services in both virtualized and physical environments, considering a multi-tier and stateful application.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FlowVisor vulnerability analysis FlowVisor漏洞分析
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987387
Ying Qian, Wanqing You, K. Qian
{"title":"FlowVisor vulnerability analysis","authors":"Ying Qian, Wanqing You, K. Qian","doi":"10.23919/INM.2017.7987387","DOIUrl":"https://doi.org/10.23919/INM.2017.7987387","url":null,"abstract":"This paper explored possible vulnerabilities in FlowVisor, SDN virtualized tool, and analyzed the potential isolation issue between multiple virtual slices by FlowVisor. We discovered a security vulnerability of interference between virtual slices in SDN, which leaves holes for potential malicious attacks. We proposed an event handling mechanism to be implemented in FlowVisor to avoid flow space overlapping.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Managing vulnerabilities in a cloud native world with bluefix 使用bluefix管理云原生环境中的漏洞
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987368
Jin Xiao, J. Rofrano
{"title":"Managing vulnerabilities in a cloud native world with bluefix","authors":"Jin Xiao, J. Rofrano","doi":"10.23919/INM.2017.7987368","DOIUrl":"https://doi.org/10.23919/INM.2017.7987368","url":null,"abstract":"Bluefix is a solution we created for managing the vulnerabilities in a cloud native world where clients operate their own DevOp pipelines and design the same management function and assurance of that of traditional managed services. We show that the challenges imposed by container cloud and DevOp culture requires significant departure of service management design. As a case study, we examined how vulnerabilities are managed in the pre-cloud native vs. post-cloud native world, identified control points in both DevOp pipeline as well as cloud service fabric as to enable a scalable and automated vulnerability management solution for IBM container cloud. Our journey and exploration in this area has only just begun, as the lessons learned and many remaining challenges hold much promise and opportunities.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信