2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)最新文献

筛选
英文 中文
QoS management mechanisms for Enhanced Living Environments in IoT 面向物联网增强生活环境的QoS管理机制
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987454
Yassine Banouar, C. Ouedraogo, C. Chassot, A. Zyane
{"title":"QoS management mechanisms for Enhanced Living Environments in IoT","authors":"Yassine Banouar, C. Ouedraogo, C. Chassot, A. Zyane","doi":"10.23919/INM.2017.7987454","DOIUrl":"https://doi.org/10.23919/INM.2017.7987454","url":null,"abstract":"The Internet of Things (IoT) paradigm is expected to bring ubiquitous intelligence through new applications in order to enhance living and other environments. Several research and standardization studies are now focused on the Middleware level of the underlying communication system. For this level, several challenges need to be considered, among them the Quality of Service (QoS) issue. The Autonomic Computing paradigm is now recognized as a promising approach to help communication and other systems to self-adapt when the context is changing. With the aim to promote the vision of an autonomic Middlewarelevel QoS management for IoT-based systems, this paper proposes a set of QoS-oriented mechanisms that can be dynamically executed at the Middleware level to correct QoS degradation. The benefits of the proposed mechanisms are also illustrated for a concrete case of Enhanced Living Environment.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Knowledge discovery of port scans from darknet 暗网端口扫描的知识发现
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987415
S. Lagraa, J. François
{"title":"Knowledge discovery of port scans from darknet","authors":"S. Lagraa, J. François","doi":"10.23919/INM.2017.7987415","DOIUrl":"https://doi.org/10.23919/INM.2017.7987415","url":null,"abstract":"Port scanning is widely used in Internet prior for attacks in order to identify accessible and potentially vulnerable hosts. In this work, we propose an approach that allows to discover port scanning behavior patterns and group properties of port scans. This approach is based on graph modelling and graph mining. It provides to security analysts relevant information of what services are jointly targeted, and the relationship of the scanned ports. This is helpful to assess the skills and strategy of the attacker. We applied our method to data collected from a large darknet data, i.e. a full /20 network where no machines or services are or have been hosted to study scanning activities.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Cost-benefit analysis game for efficient storage allocation in cloud-centric Internet of Things systems: A game theoretic perspective 以云为中心的物联网系统中高效存储分配的成本效益分析博弈:博弈论视角
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987453
Georgios Skourletopoulos, C. Mavromoustakis, G. Mastorakis, J. Sahalos, J. M. Batalla, C. Dobre
{"title":"Cost-benefit analysis game for efficient storage allocation in cloud-centric Internet of Things systems: A game theoretic perspective","authors":"Georgios Skourletopoulos, C. Mavromoustakis, G. Mastorakis, J. Sahalos, J. M. Batalla, C. Dobre","doi":"10.23919/INM.2017.7987453","DOIUrl":"https://doi.org/10.23919/INM.2017.7987453","url":null,"abstract":"The advances in Internet of Everything (IoE) and the market-oriented cloud computing have provided opportunities to resolve the challenges caused by the Internet of Things (IoT) infrastructure virtualization, capacity planning, data storage or complexity. The volume and types of IoT data motivate the need for a data storage framework towards the integration of both structured and unstructured data. In this paper, we propose a novel game theoretic technique for efficient and dynamic storage allocation in cloud-centric IoT systems. The benefit maximization problem is formulated as a cost-benefit analysis game investigating the storage capacity currently used in the cloud. In view of each player's strategy to lease additional storage capacity, the game property is analyzed and we prove that the game always admits a pure strategy Nash equilibrium. Since the player's decision affects the level of benefit maximization, we elaborate on a cost-optimal storage allocation incentive mechanism, which scales effectively once non-linear or linear demand for storage capacity occurs, towards achieving optimal leasing conditions on cloud storage and computing capacity level. The experimental validation tests prove the effectiveness of the proposed game theoretic approach allocating the requests for more storage capacity in a cost-effective manner, which achieves to maximize the benefits.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116567757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Defending against Probe-Response Attacks 防范探测-响应攻击
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987436
Emmanouil Vasilomanolakis, Noorulla Sharief, M. Mühlhäuser
{"title":"Defending against Probe-Response Attacks","authors":"Emmanouil Vasilomanolakis, Noorulla Sharief, M. Mühlhäuser","doi":"10.23919/INM.2017.7987436","DOIUrl":"https://doi.org/10.23919/INM.2017.7987436","url":null,"abstract":"With the increase in the sophistication of cyberattacks, collaborative defensive approaches such as Collaborative IDSs (CIDSs) have emerged. CIDSs utilize a multitude of heterogeneous monitors to create a holistic picture of the monitored network. Nowadays, a number of research institutes and companies deploy CIDSs that publish their alert data publicly, over the Internet. Such systems are important for researchers and security administrators as they provide a source of real-world alert data for experimentation. However, a class of attacks exist, called Probe-Response Attacks (PRAs), which can significantly reduce the benefits of a CIDS. In particular, such attacks allow an adversary to detect the network location of the monitors of a CIDS. In this paper, we first study the related work and analyze the various mitigation techniques for defending against PRAs. Subsequently, we propose a novel mitigation mechanism that improves the state of the art. Our method, namely the Shuffle-based PRA Mitigation (SPM), is based on the idea of shuffling the watermarks, so-called markers, which the adversary requires to successfully perform a PRA. By doing so the whole process of the attack is disrupted leading to a very small number of identified monitors. Our experimental results suggest that our proposed method significantly reduces the impact of a PRA whilst it does not introduce a trade-off for the usability of the data produced by the CIDS.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130215527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Client-side routing-agnostic gateway selection for heterogeneous Wireless Mesh Networks 异构无线网状网络的客户端路由不可知网关选择
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987301
Emmanouil Dimogerontakis, J. Neto, Roc Meseguer, L. Navarro, L. Veiga
{"title":"Client-side routing-agnostic gateway selection for heterogeneous Wireless Mesh Networks","authors":"Emmanouil Dimogerontakis, J. Neto, Roc Meseguer, L. Navarro, L. Veiga","doi":"10.23919/INM.2017.7987301","DOIUrl":"https://doi.org/10.23919/INM.2017.7987301","url":null,"abstract":"Citizens develop Wireless Mesh Networks (WMN) in many areas as an alternative or their only way for local interconnection and access to the Internet. This access is often achieved through the use of several shared web proxy gateways. These network infrastructures consist of heterogeneous technologies and combine diverse routing protocols. Network-aware state-of-art proxy selection schemes for WMNs do not work in this heterogeneous environment. We developed a client-side gateway selection mechanism that optimizes the client-gateway selection, agnostic to underlying infrastructure and protocols, requiring no modification of proxies nor the underlying network. The choice is sensitive to network congestion and proxy load, without requiring a minimum number of participating nodes. Extended Vivaldi network coordinates are used to estimate client-proxy network performance. The load of each proxy is estimated passively by collecting the Time-to-First-Byte of HTTP requests, and shared across clients. Our proposal was evaluated experimentally with clients and proxies deployed in guifi.net, the largest community wireless network in the world. Our selection mechanism avoids proxies with heavy load and slow internal network paths, with overhead linear to the number of clients and proxies.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131934682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Quality evaluation of 3D video for QoE management in media networks 面向媒体网络QoE管理的三维视频质量评价
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987429
Pedro Miguel Regalo Rocha, P. Assunção, L. Cruz
{"title":"Quality evaluation of 3D video for QoE management in media networks","authors":"Pedro Miguel Regalo Rocha, P. Assunção, L. Cruz","doi":"10.23919/INM.2017.7987429","DOIUrl":"https://doi.org/10.23919/INM.2017.7987429","url":null,"abstract":"The emergence of 3D video technologies and their foreseeable applications in Internet Protocol Television (IPTV) and video delivery systems using encoded 3D video contents over packet networks raises the question of how to manage the Quality of Experience (QoE) across diverse lossy channels. Of particular importance for QoE management is the problem of measuring the impact of data losses in packetized 3D video information and how it affects the quality experienced by end users, when the content is rendered and presented at their premises. Previous work by the authors showed that it is possible to model the perceived quality degradations through the use of artificial neural networks receiving as inputs several parameters describing the packet loss events. The first stage of such model was specifically developed for packetized 3D video in texture-plus-depth format where only the depth information was prone to transmission errors. This article presents an extension of the previous model by including the effect of texture information losses along with other specific aspects associated with the dual nature of this type of data loss. The validity of the model is verified through the use of extensive simulations and comparisons between real and estimated values of a recently proposed 3D video quality measure.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132534874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-series models for cloud workload prediction: A comparison 用于云工作负载预测的时间序列模型:比较
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987292
Abiola Adegboyega
{"title":"Time-series models for cloud workload prediction: A comparison","authors":"Abiola Adegboyega","doi":"10.23919/INM.2017.7987292","DOIUrl":"https://doi.org/10.23919/INM.2017.7987292","url":null,"abstract":"dynamic cloud workloads necessitate forecasting methodologies for accurate resource provisioning affecting both cloud providers and clients. This paper focuses on forecasting in the cloud in order to understand its underlying workload dynamics. It analyzes recent workload traces and discovers characteristics that are not adequately captured by traditional linear & nonlinear models employed for forecasting in the cloud. This paper completes a comprehensive statistical analysis of 8 workloads realized from production cloud environments. Through characterization, time-series elicitation and model fitting, it isolates a limited but important set of statistical distributions that capture cloud traffic dynamics. Furthermore, it adopts a recent econometric modeling technique called the Autoregressive Conditional Score (ACS) model that improves forecasting accuracy over existing methods. To exploit our findings from the workload characterization of the traces, we also extend the ACS model to realize a variant called ACS-l that models errors using the lognormal distribution. Compared with existing models, the ACS-l offers a 10%–25% improvement in forecasting accuracy when right-tailed distributions are observed in workloads. Furthermore, the score-based characteristics observed in time-series and their diversity has inspired a novel classification of cloud workloads into three distinct groups according to the most appropriate model: linear, nonlinear and hybrid models. A methodology that employs statistical measures to guide this selection has also been developed.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"32 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129823620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards a Hybrid Intrusion Detection System for Android-based PPDR terminals 基于android的PPDR终端混合入侵检测系统研究
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987434
P. Borges, B. Sousa, Luis Ferreira, Firooz B. Saghezchi, G. Mantas, J. Ribeiro, Jonathan Rodriguez, Luís Cordeiro, P. Simões
{"title":"Towards a Hybrid Intrusion Detection System for Android-based PPDR terminals","authors":"P. Borges, B. Sousa, Luis Ferreira, Firooz B. Saghezchi, G. Mantas, J. Ribeiro, Jonathan Rodriguez, Luís Cordeiro, P. Simões","doi":"10.23919/INM.2017.7987434","DOIUrl":"https://doi.org/10.23919/INM.2017.7987434","url":null,"abstract":"Mobile devices are used for communication and for tasks that are sensitive and subject to tampering. Indeed, attacks can be performed on the users' devices without user awareness, this represents additional risk in mission critical scenarios, such as Public Protection and Disaster Relief (PPDR). Intrusion Detection Systems are important for scenarios where information leakage is of crucial importance, since they allow to detect possible attacks to information assets (e.g., installation of malware), or can even compromise the security of PPDR personnel. HyIDS is an Hybrid IDS for Android and supporting the stringent security requirements of PPDR, by comprising agents that continuously monitor mobile device and periodically transmit the data to an analysis framework at the Command Control Center (CCC). The data collection retrieves resource usage metrics for each installed application such as CPU, memory usage, and incoming and outgoing network traffic. At the CCC, the HyIDS employs Machine Learning techniques to identify patterns that are consistent with malware signatures based on the data collected from the applications. The HyIDS's evaluation results demonstrate that the proposed solution has low impact on the mobile device in terms of battery consumption and CPU/memory usage.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A graph approach to placement of Service Functions Chains 服务功能链放置的图方法
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987273
Nicolas Tastevin, M. Obadia, M. Bouet
{"title":"A graph approach to placement of Service Functions Chains","authors":"Nicolas Tastevin, M. Obadia, M. Bouet","doi":"10.23919/INM.2017.7987273","DOIUrl":"https://doi.org/10.23919/INM.2017.7987273","url":null,"abstract":"Network Functions Virtualization (NFV) is a new network architecture concept which leverages virtualization technologies to make the management of network functions like firewalls, load balancers, WAN optimizers more flexible and cost effective. In this approach, traditional middlebox appliances are replaced by virtual machines embedding Virtual Network Functions (VNFs). One of the main challenges of NFV orchestration is to appropriately deploy and instantiate sequences of VNFs that form Service Functions Chains (SFC). In this paper, we propose a general cost-driven Integer Linear Programming (ILP) formulation of this problem. We then propose a graph-based heuristic that combines graph centrality and multi-stage graphs. We evaluate our heuristic by comparing to optimal solutions provided by the ILP, showing that it is 1000 times faster and very close in terms of costs (less than 1.15% of difference). Then, we evaluate our heuristic on larger instances and compare it to one of the best suited state of the art approach. The evaluation results show that our heuristic scales well and outperforms the related approach, especially when VNF deployment costs are higher than link bandwidth usage costs.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126891435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A New ICN routing selecting algorithm based on Link Expiration Time of VANET under the highway environment 高速公路环境下基于VANET链路过期时间的ICN路由选择新算法
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-08 DOI: 10.23919/INM.2017.7987349
Hui Guo, Lanlan Rui, Ruichang Shi, Haoqiu Huang, Xue-song Qiu
{"title":"A New ICN routing selecting algorithm based on Link Expiration Time of VANET under the highway environment","authors":"Hui Guo, Lanlan Rui, Ruichang Shi, Haoqiu Huang, Xue-song Qiu","doi":"10.23919/INM.2017.7987349","DOIUrl":"https://doi.org/10.23919/INM.2017.7987349","url":null,"abstract":"Combining VANET with ICN (Information Centric Network), this paper proposes a new FIB (Forwarding Information Base) selecting algorithm-ECRMLET (Efficient Content Routing Model Based on Link Expiration Time). To build stable routings and reduce network traffic, our ECRMLET has the following designs: 1) we modify the structure of PIT (Pending Interest Table) by adding two domains: receive time and tolerance time; 2) we introduce the algorithm of LET (Link Expiration Time) to help with the content routing selection in FIB; 3) ECRMLET also gets the link availability probability to be auxiliary information for our algorithm.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信