2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)最新文献

筛选
英文 中文
Software-defined traffic load balancing for cost-effective data center interconnection service 软件定义流量负载均衡,实现经济高效的数据中心互连服务
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987287
Young-Jin Kim, J. Simsarian, M. Thottan
{"title":"Software-defined traffic load balancing for cost-effective data center interconnection service","authors":"Young-Jin Kim, J. Simsarian, M. Thottan","doi":"10.23919/INM.2017.7987287","DOIUrl":"https://doi.org/10.23919/INM.2017.7987287","url":null,"abstract":"For interconnection between geographically-separated data centers, network carriers typically implement multiple optical paths in a wide-area network. For example, when transmission wavelengths have 100 Gb/s granularity, three 100 Gb/s wavelength paths are provisioned to satisfy a customer demand of 300 Gb/s. Over the multiple provisioned paths, interconnection traffic is typically distributed using per-flow hashing, which results in an uneven distribution of traffic caused by hash collisions. For a relatively-few number of high-bandwidth traffic flows (> 1 Gb/s) between data center locations, per-flow hashing can perform poorly in terms of bandwidth utilization and availability. We propose new software-defined traffic load balancer, SD-TLB, that performs measurement-based flow distribution over multiple optical paths, with an implicit impairment detection method using per-port statistics on available paths and a flow redistributor that is immediately adjusted to the current network state. While our approach does not provide the same level of protection as 1+1 optical protection, it can provide the necessary redundancy for data center inter-connection at a lower cost. We experimentally implement the SD-TLB using ASIC-based switches and open virtual switches interconnected by wavelength-division multiplexed transport network test-bed. The experimental results show that SD-TLB outperforms today's hashing-based alternatives in balancing, throughput, and restoration in the presence of outages and impairments and as a result achieves improved cost-efficiency.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130780847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mining causes of network events in log data with causal inference 利用因果推理挖掘日志数据中网络事件的原因
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987263
Satoru Kobayashi, K. Fukuda, H. Esaki
{"title":"Mining causes of network events in log data with causal inference","authors":"Satoru Kobayashi, K. Fukuda, H. Esaki","doi":"10.23919/INM.2017.7987263","DOIUrl":"https://doi.org/10.23919/INM.2017.7987263","url":null,"abstract":"Network log message (e.g., syslog) is valuable information to detect unexpected or anomalous behavior in a large scale network. However, pinpointing failures and their causes is not an easy problem because of a huge amount of system log data in daily operation. In this study, we propose a method extracting failures and their causes from network syslog data. The main idea of the method relies on causal inference that reconstructs causality of network events from a set of the time series of events. Causal inference allows us to reduce the number of correlated events by chance, thus it outputs more plausible causal events than a traditional cross-correlation based approach. We apply our method to 15 months network syslog data obtained in a nation-wide academic network in Japan. Our method significantly reduces the number of pseudo correlated events compared with the traditional method. Also, through two case studies and comparison with trouble ticket data, we demonstrate the effectiveness of our method for network operation.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130831018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
DroidVisor: An Android secure application recommendation system DroidVisor: Android安全应用推荐系统
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987440
Pulkit Rustgi, Carol J. Fung, Bahman Rashidi, Bridget T. McInnes
{"title":"DroidVisor: An Android secure application recommendation system","authors":"Pulkit Rustgi, Carol J. Fung, Bahman Rashidi, Bridget T. McInnes","doi":"10.23919/INM.2017.7987440","DOIUrl":"https://doi.org/10.23919/INM.2017.7987440","url":null,"abstract":"In current Android systems, the application recommendation function is an important feature that users can use to find a similar application to replace a targeted one. The current recommendation system provided through Google and the Google Play store presumably recommends applications similar to a target application while accounting for the popularity of each application. However, it does not take the security features of each application or users preferences into consideration when doing so. In this paper, we propose DroidVisor, an Android tool that provides users with fine-grained and customizable application recommendations. Compared to the Google store recommendation function, DroidVisor does not only use the similarity to a preselected target application, but also considers other metrics such as popularity, security, and usability. More specifically, DroidVisor provides an interface for users to configure the weight of each metric and a recommendation algorithm that generates a list of recommended applications based on the combined scores. We evaluate our proposed criteria and the quality of recommendation through use case studies. Finally, we present our findings through a discussion of accuracy as well as possible ways to improve our recommendation results.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123152750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
GoLCoNDa: Geo-IP Lookup for campus network NetFlow data GoLCoNDa:校园网NetFlow数据的地理ip查找
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987372
Swatesh Pakhare, D. Medhi
{"title":"GoLCoNDa: Geo-IP Lookup for campus network NetFlow data","authors":"Swatesh Pakhare, D. Medhi","doi":"10.23919/INM.2017.7987372","DOIUrl":"https://doi.org/10.23919/INM.2017.7987372","url":null,"abstract":"It is a challenging task for network administrators to properly monitor and manage an institution's incoming and outgoing network traffic patterns. While NetFlow is useful to gather flow-level data, its feature is limited to traditional flow-level information such as the source IP address, destination IP address, source port number, destination port number, and the protocol type. Thus, if we are to understand geographic dynamics of any flow connected to hosts at an institution from the outside world, it is not currently possible with NetFlow. To address the geo-location information of such flows, we developed the tool, GoLCoNDa, for use by campus network administrators. This tool allows the correlation of IP addresses with the geo-location information to visualize the geo-location of incoming and outgoing flows. Our tool handles millions of records quickly.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131124670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Betas: Deriving quantiles from MOS-QoS relations of IQX models for QoE management beta:从IQX模型的MOS-QoS关系中导出分位数,用于QoE管理
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987430
T. Hossfeld, M. Fiedler, Jorgen Gustafsson
{"title":"Betas: Deriving quantiles from MOS-QoS relations of IQX models for QoE management","authors":"T. Hossfeld, M. Fiedler, Jorgen Gustafsson","doi":"10.23919/INM.2017.7987430","DOIUrl":"https://doi.org/10.23919/INM.2017.7987430","url":null,"abstract":"Most Quality of Experience (QoE) studies report only the mean opinion scores (MOS) and existing models typically map Quality of Service (QoS) parameters to the MOS. However, service providers may be interested in the share of users that are not at all satisfied, and their corresponding QoE levels. From the QoE management point of view, the circumstances leading to the QoE levels perceived by a certain percentage of users, e.g. the 10% most annoyed users, are of utmost importance. Proper metrics are the 10%-quantiles of QoE values. Knowledge of those quantiles helps service providers to estimate the need for countermeasures in order to prevent annoyed users from churning on one hand, and to avoid overprovisioning on the other hand. The contribution of this paper is the derivation of quantiles from existing MOS-QoS relations. This allows to reuse existing subjective MOS results and MOS models without rerunning the experiments. We consider exemplary the IQX model (describing the MOS-QoS relation) for the derivation of the quantile-QoS relation. A practical guideline for the computation of the quantiles is provided.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ADE: An ensemble approach for early Anomaly Detection 早期异常检测的集成方法
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987310
Teodora Sandra Buda, H. Assem, Lei Xu
{"title":"ADE: An ensemble approach for early Anomaly Detection","authors":"Teodora Sandra Buda, H. Assem, Lei Xu","doi":"10.23919/INM.2017.7987310","DOIUrl":"https://doi.org/10.23919/INM.2017.7987310","url":null,"abstract":"Proactive anomaly detection refers to anticipating anomalies or abnormal patterns within a dataset in a timely manner. Discovering anomalies such as failures or degradations before their occurrence can lead to great benefits such as the ability to avoid the anomaly happening by applying some corrective measures in advance (e.g., allocating more resources for a nearly saturated system in a data centre). In this paper we address the proactive anomaly detection problem through machine learning and in particular ensemble learning. We propose an early Anomaly Detection Ensemble approach, ADE, which combines results of state-of-the-art anomaly detection techniques in order to provide more accurate results than each single technique. Moreover, we utilise a a weighted anomaly window as ground truth for training the model, which prioritises early detection in order to discover anomalies in a timely manner. Various strategies are explored for generating ground truth windows. Results show that ADE shows improvements of at least 10% in earliest detection score compared to each individual technique across all datasets considered. The technique proposed detected anomalies in advance up to ∼16h before they actually occurred.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134216404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Sharing data store and backup controllers for resilient control plane in multi-domain SDN 为多域SDN弹性控制平面共享数据存储和备份控制器
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987315
Jiacong Li, Ying Wang, Wenjing Li, Xue-song Qiu
{"title":"Sharing data store and backup controllers for resilient control plane in multi-domain SDN","authors":"Jiacong Li, Ying Wang, Wenjing Li, Xue-song Qiu","doi":"10.23919/INM.2017.7987315","DOIUrl":"https://doi.org/10.23919/INM.2017.7987315","url":null,"abstract":"software-defined networking (SDN) uses a centralized control plane to manage the whole network. If the scale of the network is large, it is necessary to divide it into multiple domains. Since the network scale becomes larger, the probability of failure occurrences is higher. Therefore, it is important to guarantee the control plane resilience in multi-domain SDN. However, the existing approaches cannot store the network state in real time, and do not consider the backup controllers placement problem in multi-domain SDN. In order to ensure the resilience of the control plane in multi-domain SDN, we propose a sharing data store and backup controllers based approach. Sharing data store is used to ensure that each master controller has a view of the whole network and data store can save the network state during the failure time. The sharing backup controllers are used to guarantee the resilience of control plane with minimum cost. Simulations show that our approach can use as less backup controllers as possible to ensure the resilience of control plane.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114372661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
ReViNE: Reallocation of Virtual Network Embedding to eliminate substrate bottlenecks 重新分配虚拟网络嵌入以消除基板瓶颈
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987271
S. R. Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, R. Boutaba, J. Mitra, L. Liu
{"title":"ReViNE: Reallocation of Virtual Network Embedding to eliminate substrate bottlenecks","authors":"S. R. Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, R. Boutaba, J. Mitra, L. Liu","doi":"10.23919/INM.2017.7987271","DOIUrl":"https://doi.org/10.23919/INM.2017.7987271","url":null,"abstract":"Perceived as a key enabling technology for the future Internet, Network Virtualization (NV) allows an Infrastructure Provider (InP) to better utilize their Substrate Network (SN) by provisioning multiple Virtual Networks (VNs) from different Service Providers (SPs). A key challenge in NV is to efficiently map the VN requests from SPs on an SN, known as the Virtual Network Embedding (VNE) problem. VNE algorithms are typically online in nature. A VN embedding can become suboptimal over time due to the arrival and departure of other VNs as well as due to changes in SN such as failures. One way to mitigate the impact of such dynamism is to periodically reallocate resources for the existing VNs. VNE reallocation can increase an InP's revenue by decreasing bandwidth consumption and by increasing the possibility of accepting future VNs. In this paper, we study Reallocation of Virtual Network Embedding (ReViNE) problem to minimize the number of over utilized substrate links and total bandwidth cost on the SN. We propose an Integer Linear Programming formulation for the optimal solution (ReViNE-OPT) and a simulated annealing based heuristic (ReViNE-FAST) to solve larger problem instances. Simulation results show that on average our proposed heuristic performs within ∼19% of the optimal solution. Moreover, ReViNE-FAST generates more than 2.5× better solutions compared to the state-of-the-art simulated annealing based heuristic for VNE reallocation.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132285051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
SVC-based video streaming over highway vehicular networks with base layer guarantee 基于svc的公路车网视频流传输,具有基础层保障
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987456
Ruijian An, Zhi Liu, Yusheng Ji
{"title":"SVC-based video streaming over highway vehicular networks with base layer guarantee","authors":"Ruijian An, Zhi Liu, Yusheng Ji","doi":"10.23919/INM.2017.7987456","DOIUrl":"https://doi.org/10.23919/INM.2017.7987456","url":null,"abstract":"In this paper, we target the resource allocation and layer selection problem for the realtime video streaming over highway scenario, by employing Scalable Video Coding (SVC) for the video contents. Especially, we take the freeze-free playback as one of the constraint as well. Since the formulated resource allocation and SVC layer selection problem is NP-hard, we propose the Resource Allocation and Layer Selection with Base layer guarantee (RALSB) algorithm to solve this problem in two phases: the Base layer Guarantee (BG) phase, and the Resource allocation and SVC layer selection (RS) phase. Simulation results show that the proposed RALSB can prevent/reduce the playback freeze in typical scenarios.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133553145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploring a service-based normal behaviour profiling system for botnet detection 探索基于服务的僵尸网络检测正常行为分析系统
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) Pub Date : 2017-05-01 DOI: 10.23919/INM.2017.7987417
Wei-ke Chen, Xiao Luo, A. N. Zincir-Heywood
{"title":"Exploring a service-based normal behaviour profiling system for botnet detection","authors":"Wei-ke Chen, Xiao Luo, A. N. Zincir-Heywood","doi":"10.23919/INM.2017.7987417","DOIUrl":"https://doi.org/10.23919/INM.2017.7987417","url":null,"abstract":"Effective detection of botnet traffic becomes difficult as the attackers use encrypted payload and dynamically changing port numbers (protocols) to bypass signature based detection and deep packet inspection. In this paper, we build a normal profiling-based botnet detection system using three unsupervised learning algorithms on service-based flow-based data, including self-organizing map, local outlier, and k-NN outlier factors. Evaluations on publicly available botnet data sets show that the proposed system could reach up to 91% detection rate with a false alarm rate of 5%.","PeriodicalId":119633,"journal":{"name":"2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132648023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信