Yassine Banouar, C. Ouedraogo, C. Chassot, A. Zyane
{"title":"QoS management mechanisms for Enhanced Living Environments in IoT","authors":"Yassine Banouar, C. Ouedraogo, C. Chassot, A. Zyane","doi":"10.23919/INM.2017.7987454","DOIUrl":"https://doi.org/10.23919/INM.2017.7987454","url":null,"abstract":"The Internet of Things (IoT) paradigm is expected to bring ubiquitous intelligence through new applications in order to enhance living and other environments. Several research and standardization studies are now focused on the Middleware level of the underlying communication system. For this level, several challenges need to be considered, among them the Quality of Service (QoS) issue. The Autonomic Computing paradigm is now recognized as a promising approach to help communication and other systems to self-adapt when the context is changing. With the aim to promote the vision of an autonomic Middlewarelevel QoS management for IoT-based systems, this paper proposes a set of QoS-oriented mechanisms that can be dynamically executed at the Middleware level to correct QoS degradation. The benefits of the proposed mechanisms are also illustrated for a concrete case of Enhanced Living Environment.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge discovery of port scans from darknet","authors":"S. Lagraa, J. François","doi":"10.23919/INM.2017.7987415","DOIUrl":"https://doi.org/10.23919/INM.2017.7987415","url":null,"abstract":"Port scanning is widely used in Internet prior for attacks in order to identify accessible and potentially vulnerable hosts. In this work, we propose an approach that allows to discover port scanning behavior patterns and group properties of port scans. This approach is based on graph modelling and graph mining. It provides to security analysts relevant information of what services are jointly targeted, and the relationship of the scanned ports. This is helpful to assess the skills and strategy of the attacker. We applied our method to data collected from a large darknet data, i.e. a full /20 network where no machines or services are or have been hosted to study scanning activities.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Georgios Skourletopoulos, C. Mavromoustakis, G. Mastorakis, J. Sahalos, J. M. Batalla, C. Dobre
{"title":"Cost-benefit analysis game for efficient storage allocation in cloud-centric Internet of Things systems: A game theoretic perspective","authors":"Georgios Skourletopoulos, C. Mavromoustakis, G. Mastorakis, J. Sahalos, J. M. Batalla, C. Dobre","doi":"10.23919/INM.2017.7987453","DOIUrl":"https://doi.org/10.23919/INM.2017.7987453","url":null,"abstract":"The advances in Internet of Everything (IoE) and the market-oriented cloud computing have provided opportunities to resolve the challenges caused by the Internet of Things (IoT) infrastructure virtualization, capacity planning, data storage or complexity. The volume and types of IoT data motivate the need for a data storage framework towards the integration of both structured and unstructured data. In this paper, we propose a novel game theoretic technique for efficient and dynamic storage allocation in cloud-centric IoT systems. The benefit maximization problem is formulated as a cost-benefit analysis game investigating the storage capacity currently used in the cloud. In view of each player's strategy to lease additional storage capacity, the game property is analyzed and we prove that the game always admits a pure strategy Nash equilibrium. Since the player's decision affects the level of benefit maximization, we elaborate on a cost-optimal storage allocation incentive mechanism, which scales effectively once non-linear or linear demand for storage capacity occurs, towards achieving optimal leasing conditions on cloud storage and computing capacity level. The experimental validation tests prove the effectiveness of the proposed game theoretic approach allocating the requests for more storage capacity in a cost-effective manner, which achieves to maximize the benefits.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116567757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emmanouil Vasilomanolakis, Noorulla Sharief, M. Mühlhäuser
{"title":"Defending against Probe-Response Attacks","authors":"Emmanouil Vasilomanolakis, Noorulla Sharief, M. Mühlhäuser","doi":"10.23919/INM.2017.7987436","DOIUrl":"https://doi.org/10.23919/INM.2017.7987436","url":null,"abstract":"With the increase in the sophistication of cyberattacks, collaborative defensive approaches such as Collaborative IDSs (CIDSs) have emerged. CIDSs utilize a multitude of heterogeneous monitors to create a holistic picture of the monitored network. Nowadays, a number of research institutes and companies deploy CIDSs that publish their alert data publicly, over the Internet. Such systems are important for researchers and security administrators as they provide a source of real-world alert data for experimentation. However, a class of attacks exist, called Probe-Response Attacks (PRAs), which can significantly reduce the benefits of a CIDS. In particular, such attacks allow an adversary to detect the network location of the monitors of a CIDS. In this paper, we first study the related work and analyze the various mitigation techniques for defending against PRAs. Subsequently, we propose a novel mitigation mechanism that improves the state of the art. Our method, namely the Shuffle-based PRA Mitigation (SPM), is based on the idea of shuffling the watermarks, so-called markers, which the adversary requires to successfully perform a PRA. By doing so the whole process of the attack is disrupted leading to a very small number of identified monitors. Our experimental results suggest that our proposed method significantly reduces the impact of a PRA whilst it does not introduce a trade-off for the usability of the data produced by the CIDS.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130215527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emmanouil Dimogerontakis, J. Neto, Roc Meseguer, L. Navarro, L. Veiga
{"title":"Client-side routing-agnostic gateway selection for heterogeneous Wireless Mesh Networks","authors":"Emmanouil Dimogerontakis, J. Neto, Roc Meseguer, L. Navarro, L. Veiga","doi":"10.23919/INM.2017.7987301","DOIUrl":"https://doi.org/10.23919/INM.2017.7987301","url":null,"abstract":"Citizens develop Wireless Mesh Networks (WMN) in many areas as an alternative or their only way for local interconnection and access to the Internet. This access is often achieved through the use of several shared web proxy gateways. These network infrastructures consist of heterogeneous technologies and combine diverse routing protocols. Network-aware state-of-art proxy selection schemes for WMNs do not work in this heterogeneous environment. We developed a client-side gateway selection mechanism that optimizes the client-gateway selection, agnostic to underlying infrastructure and protocols, requiring no modification of proxies nor the underlying network. The choice is sensitive to network congestion and proxy load, without requiring a minimum number of participating nodes. Extended Vivaldi network coordinates are used to estimate client-proxy network performance. The load of each proxy is estimated passively by collecting the Time-to-First-Byte of HTTP requests, and shared across clients. Our proposal was evaluated experimentally with clients and proxies deployed in guifi.net, the largest community wireless network in the world. Our selection mechanism avoids proxies with heavy load and slow internal network paths, with overhead linear to the number of clients and proxies.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131934682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality evaluation of 3D video for QoE management in media networks","authors":"Pedro Miguel Regalo Rocha, P. Assunção, L. Cruz","doi":"10.23919/INM.2017.7987429","DOIUrl":"https://doi.org/10.23919/INM.2017.7987429","url":null,"abstract":"The emergence of 3D video technologies and their foreseeable applications in Internet Protocol Television (IPTV) and video delivery systems using encoded 3D video contents over packet networks raises the question of how to manage the Quality of Experience (QoE) across diverse lossy channels. Of particular importance for QoE management is the problem of measuring the impact of data losses in packetized 3D video information and how it affects the quality experienced by end users, when the content is rendered and presented at their premises. Previous work by the authors showed that it is possible to model the perceived quality degradations through the use of artificial neural networks receiving as inputs several parameters describing the packet loss events. The first stage of such model was specifically developed for packetized 3D video in texture-plus-depth format where only the depth information was prone to transmission errors. This article presents an extension of the previous model by including the effect of texture information losses along with other specific aspects associated with the dual nature of this type of data loss. The validity of the model is verified through the use of extensive simulations and comparisons between real and estimated values of a recently proposed 3D video quality measure.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132534874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-series models for cloud workload prediction: A comparison","authors":"Abiola Adegboyega","doi":"10.23919/INM.2017.7987292","DOIUrl":"https://doi.org/10.23919/INM.2017.7987292","url":null,"abstract":"dynamic cloud workloads necessitate forecasting methodologies for accurate resource provisioning affecting both cloud providers and clients. This paper focuses on forecasting in the cloud in order to understand its underlying workload dynamics. It analyzes recent workload traces and discovers characteristics that are not adequately captured by traditional linear & nonlinear models employed for forecasting in the cloud. This paper completes a comprehensive statistical analysis of 8 workloads realized from production cloud environments. Through characterization, time-series elicitation and model fitting, it isolates a limited but important set of statistical distributions that capture cloud traffic dynamics. Furthermore, it adopts a recent econometric modeling technique called the Autoregressive Conditional Score (ACS) model that improves forecasting accuracy over existing methods. To exploit our findings from the workload characterization of the traces, we also extend the ACS model to realize a variant called ACS-l that models errors using the lognormal distribution. Compared with existing models, the ACS-l offers a 10%–25% improvement in forecasting accuracy when right-tailed distributions are observed in workloads. Furthermore, the score-based characteristics observed in time-series and their diversity has inspired a novel classification of cloud workloads into three distinct groups according to the most appropriate model: linear, nonlinear and hybrid models. A methodology that employs statistical measures to guide this selection has also been developed.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"32 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129823620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Borges, B. Sousa, Luis Ferreira, Firooz B. Saghezchi, G. Mantas, J. Ribeiro, Jonathan Rodriguez, Luís Cordeiro, P. Simões
{"title":"Towards a Hybrid Intrusion Detection System for Android-based PPDR terminals","authors":"P. Borges, B. Sousa, Luis Ferreira, Firooz B. Saghezchi, G. Mantas, J. Ribeiro, Jonathan Rodriguez, Luís Cordeiro, P. Simões","doi":"10.23919/INM.2017.7987434","DOIUrl":"https://doi.org/10.23919/INM.2017.7987434","url":null,"abstract":"Mobile devices are used for communication and for tasks that are sensitive and subject to tampering. Indeed, attacks can be performed on the users' devices without user awareness, this represents additional risk in mission critical scenarios, such as Public Protection and Disaster Relief (PPDR). Intrusion Detection Systems are important for scenarios where information leakage is of crucial importance, since they allow to detect possible attacks to information assets (e.g., installation of malware), or can even compromise the security of PPDR personnel. HyIDS is an Hybrid IDS for Android and supporting the stringent security requirements of PPDR, by comprising agents that continuously monitor mobile device and periodically transmit the data to an analysis framework at the Command Control Center (CCC). The data collection retrieves resource usage metrics for each installed application such as CPU, memory usage, and incoming and outgoing network traffic. At the CCC, the HyIDS employs Machine Learning techniques to identify patterns that are consistent with malware signatures based on the data collected from the applications. The HyIDS's evaluation results demonstrate that the proposed solution has low impact on the mobile device in terms of battery consumption and CPU/memory usage.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132485899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A graph approach to placement of Service Functions Chains","authors":"Nicolas Tastevin, M. Obadia, M. Bouet","doi":"10.23919/INM.2017.7987273","DOIUrl":"https://doi.org/10.23919/INM.2017.7987273","url":null,"abstract":"Network Functions Virtualization (NFV) is a new network architecture concept which leverages virtualization technologies to make the management of network functions like firewalls, load balancers, WAN optimizers more flexible and cost effective. In this approach, traditional middlebox appliances are replaced by virtual machines embedding Virtual Network Functions (VNFs). One of the main challenges of NFV orchestration is to appropriately deploy and instantiate sequences of VNFs that form Service Functions Chains (SFC). In this paper, we propose a general cost-driven Integer Linear Programming (ILP) formulation of this problem. We then propose a graph-based heuristic that combines graph centrality and multi-stage graphs. We evaluate our heuristic by comparing to optimal solutions provided by the ILP, showing that it is 1000 times faster and very close in terms of costs (less than 1.15% of difference). Then, we evaluate our heuristic on larger instances and compare it to one of the best suited state of the art approach. The evaluation results show that our heuristic scales well and outperforms the related approach, especially when VNF deployment costs are higher than link bandwidth usage costs.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126891435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New ICN routing selecting algorithm based on Link Expiration Time of VANET under the highway environment","authors":"Hui Guo, Lanlan Rui, Ruichang Shi, Haoqiu Huang, Xue-song Qiu","doi":"10.23919/INM.2017.7987349","DOIUrl":"https://doi.org/10.23919/INM.2017.7987349","url":null,"abstract":"Combining VANET with ICN (Information Centric Network), this paper proposes a new FIB (Forwarding Information Base) selecting algorithm-ECRMLET (Efficient Content Routing Model Based on Link Expiration Time). To build stable routings and reduce network traffic, our ECRMLET has the following designs: 1) we modify the structure of PIT (Pending Interest Table) by adding two domains: receive time and tolerance time; 2) we introduce the algorithm of LET (Link Expiration Time) to help with the content routing selection in FIB; 3) ECRMLET also gets the link availability probability to be auxiliary information for our algorithm.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}