2022 IEEE 8th International Conference on Network Softwarization (NetSoft)最新文献

筛选
英文 中文
Encrypted Network Traffic Classification in SDN using Self-supervised Learning 基于自监督学习的SDN加密网络流量分类
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844082
Md. Shamim Towhid, Nashid Shahriar
{"title":"Encrypted Network Traffic Classification in SDN using Self-supervised Learning","authors":"Md. Shamim Towhid, Nashid Shahriar","doi":"10.1109/NetSoft54395.2022.9844082","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844082","url":null,"abstract":"Network traffic classification has a huge application in software-defined networking (SDN) where we talk about more control over the network traffic. With the increase of encrypted protocols in the network, the problem of traffic classification has become extremely challenging. Many researchers have proposed different techniques to do traffic classification. This demo paper presents an application of our proposed method for traffic classification in an SDN environment. The proposed method leverages one of the self-supervised learning approaches, an emerging field of deep learning, to classify network traffic. This paper shows that the proposed method can outperform the corresponding supervised approach by $sim 2$% in terms of accuracy using data collected from an SDN testbed. Furthermore, an SDN application is developed to show that the trained model is able to classify real-time traffic.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A model of capabilities of Network Security Functions 网络安全功能的能力模型
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844057
C. Basile, D. Canavese, L. Regano, Ignazio Pedone, A. Lioy
{"title":"A model of capabilities of Network Security Functions","authors":"C. Basile, D. Canavese, L. Regano, Ignazio Pedone, A. Lioy","doi":"10.1109/NetSoft54395.2022.9844057","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844057","url":null,"abstract":"This paper presents a formal model of the features, named security capabilities, offered by the controls used for enforcing security policies in computer networks. It has been designed to support policy refinement and policy translation and address useful, practical tasks in a vendor-independent manner. The model adopts state-of-the-art design patterns and has been designed to be extensible. The model describes the actions that the controls can perform (e.g. deny packets or encrypt flows), the conditions to select on what to apply the actions, how to compose valid configuration rules from them, and how to build configurations from rules. It proved effective to model filtering controls and iptables.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124047529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Intent-based cognitive closed-loop management with built-in conflict handling 内置冲突处理的基于意图的认知闭环管理
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844074
A. C. Baktir, Amadeu do Nascimento Júnior, A. Zahemszky, Ankita Likhyani, D. Temesgene, D. Roeland, Elham Dehghan Biyar, Refik Fatih Ustok, Marin Orlic, Mirko D'Angelo
{"title":"Intent-based cognitive closed-loop management with built-in conflict handling","authors":"A. C. Baktir, Amadeu do Nascimento Júnior, A. Zahemszky, Ankita Likhyani, D. Temesgene, D. Roeland, Elham Dehghan Biyar, Refik Fatih Ustok, Marin Orlic, Mirko D'Angelo","doi":"10.1109/NetSoft54395.2022.9844074","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844074","url":null,"abstract":"The ever-growing complexity in networks and the various future use cases with diverse, and often stringent performance requirements call for a higher level of automation. A tool to achieve this higher level of automation is intent-based management, where the human operator only communicates via high-level intents with the network. Intents are declarative in nature, they specify the desired state but don’t specify how to achieve it. The system will assure that the intents are fulfilled, by monitoring the behavior of the network, and adjusting its configurations if needed. In future networks that will serve multiple tenants and use cases at the same time, many intents will co-exist. As the resources are limited, conflicts may arise between intents. Therefore, a solution is needed for conflict detection and resolution. In this paper, we present a system that is capable of handling multiple intents and detecting and resolving conflicts at run-time. To show the feasibility, we implement our approach in an end-to-end prototype.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analytical Model for the Energy Efficiency in Low Power IoT Deployments 低功耗物联网部署中的能效分析模型
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844101
T. Hossfeld, Simon Raffeck, Frank Loh, Stefan Geissler
{"title":"Analytical Model for the Energy Efficiency in Low Power IoT Deployments","authors":"T. Hossfeld, Simon Raffeck, Frank Loh, Stefan Geissler","doi":"10.1109/NetSoft54395.2022.9844101","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844101","url":null,"abstract":"The recent rise of the Internet of Things (IoT) has given way to numerous challenges and research questions. One of the most critical issues in the area of low powered devices is the question of energy efficiency. Here, technologies like LoRa or Zigbee emerged, promising low power consumption while maintaining adequate performance. However, even when using these tailor made technologies, several configuration aspects need to be taken into account to provide high performance, energy efficient operation. To this end, we propose a generic model to compute the energy efficiency of wireless sensors under the assumption of perfect CSMA/CA channel access. We present numerical results for a typical LoRa device and highlight extensions towards other channel access mechanisms. Finally, we apply Kleinrock’s power metric to obtain ideal system configurations for varying load parameters.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130417579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Fault-tolerant Controller Placement Model based on Load-dependent Sojourn Time in Software-defined Network 软件定义网络中基于负载相关逗留时间的容错控制器布局模型
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844060
Shinji Noda, Takehiro Sato, E. Oki
{"title":"Fault-tolerant Controller Placement Model based on Load-dependent Sojourn Time in Software-defined Network","authors":"Shinji Noda, Takehiro Sato, E. Oki","doi":"10.1109/NetSoft54395.2022.9844060","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844060","url":null,"abstract":"This paper proposes a controller placement model that takes into account the load-dependent sojourn time at each controller while considering controller failures. The sojourn time is expressed by the queuing theory. The sojourn time varies depending on the amount of load arriving at each controller in the proposed model. The proposed model is formulated as a mixed integer second-order cone programming problem. The proposed model is compared with two baseline models presented in the previous research. In the baseline models, the sojourn time does not depend on the amount of load arriving at each controller. Numerical results show that the number of placed controllers becomes smaller in the proposed model than in the baseline models. This indicates that, since the sojourn time in the proposed model varies according to the amount of load at a controller, the effect of the load-dependent sojourn time at a controller tends not to become dominant over that of the propagation delay, which enables a switch to connect to more distant controller than that in the baseline models.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130494106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating Disaggregated Network Services with eBPF: the Kubernetes Network Provider Use Case 使用eBPF创建分解的网络服务:Kubernetes网络提供程序用例
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844062
Federico Parola, Leonardo Di Giovanna, Giuseppe Ognibene, Fulvio Risso
{"title":"Creating Disaggregated Network Services with eBPF: the Kubernetes Network Provider Use Case","authors":"Federico Parola, Leonardo Di Giovanna, Giuseppe Ognibene, Fulvio Risso","doi":"10.1109/NetSoft54395.2022.9844062","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844062","url":null,"abstract":"The eBPF technology enables the creation of custom and highly efficient network services, running in the Linux kernel, tailored to the precise use case under consideration. However, the most prominent examples of such network services in eBPF follow a monolithic approach, in which all required code is created within the same program block. This makes the code hard to maintain, to extend, and difficult to reuse in other use cases. This paper leverages the Polycube framework to demonstrate that a disaggregated approach is feasible also with eBPF, with minimal overhead, introducing a larger degree of code reusability. This paper considers a complex network scenario, such as a complete network provider for Kubernetes, presenting the resulting architecture and a preliminary performance evaluation.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129965798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FlexSFC: Flexible Resource Allocation and VNF Parallelism for Improved SFC Placement FlexSFC:灵活的资源分配和VNF并行性,用于改进SFC布局
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) Pub Date : 2022-06-27 DOI: 10.1109/NetSoft54395.2022.9844084
Sagar Agarwal, Venkatarami Reddy Chintapalli, T. B. Reddy
{"title":"FlexSFC: Flexible Resource Allocation and VNF Parallelism for Improved SFC Placement","authors":"Sagar Agarwal, Venkatarami Reddy Chintapalli, T. B. Reddy","doi":"10.1109/NetSoft54395.2022.9844084","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844084","url":null,"abstract":"To reduce the processing delay from the sequentially running virtual network functions (VNFs) in a service function chain (SFC), network function parallelism (NFP) is introduced that allows VNFs of the SFC to run in parallel. Existing NFP solutions only focused on improving parallelism benefits without paying much attention to resource utilization while deploying VNFs of SFCs. We take advantage of resource-delay dependency to propose a flexible and efficient parallelized SFC placement mechanism called FlexSFC which determines the optimal SFC placement while reducing resource usage and meeting end-to-end delay guarantees of the SFCs deployed. Initial results show that FlexSFC guarantees the end-to-end delay requirement with better resource utilization and SFC acceptance rate than the state-of-the-art approaches.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing 联邦模拟退火技术在协同环境下加速入侵检测
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) Pub Date : 2022-05-23 DOI: 10.48550/arXiv.2205.11519
H. N. C. Neto, Ivana Dusparic, D. M. F. Mattos, N. Fernandes
{"title":"FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing","authors":"H. N. C. Neto, Ivana Dusparic, D. M. F. Mattos, N. Fernandes","doi":"10.48550/arXiv.2205.11519","DOIUrl":"https://doi.org/10.48550/arXiv.2205.11519","url":null,"abstract":"Fast identification of new network attack patterns is crucial for improving network security. Nevertheless, identifying an ongoing attack in a heterogeneous network is a non-trivial task. Federated learning emerges as a solution to collaborative training for an Intrusion Detection System (IDS). The federated learning-based IDS trains a global model using local machine learning models provided by federated participants without sharing local data. However, optimization challenges are intrinsic to federated learning. This paper proposes the Federated Simulated Annealing (FedSA) metaheuristic to select the hyperparameters and a subset of participants for each aggregation round in federated learning. FedSA optimizes hyperparameters linked to the global model convergence. The proposal reduces aggregation rounds and speeds up convergence. Thus, FedSA accelerates learning extraction from local models, requiring fewer IDS updates. The proposal assessment shows that the FedSA global model converges in less than ten communication rounds. The proposal requires up to 50% fewer aggregation rounds to achieve approximately 97% accuracy in attack detection than the conventional aggregation approach.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117128903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mission-Critical Public Safety Networking: An Intent-Driven Service Orchestration Perspective 关键任务公共安全网络:意图驱动的服务编排视角
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) Pub Date : 2022-05-08 DOI: 10.48550/arXiv.2205.03932
K. Mehmood, David Palma, Katina Kralevska
{"title":"Mission-Critical Public Safety Networking: An Intent-Driven Service Orchestration Perspective","authors":"K. Mehmood, David Palma, Katina Kralevska","doi":"10.48550/arXiv.2205.03932","DOIUrl":"https://doi.org/10.48550/arXiv.2205.03932","url":null,"abstract":"Intent-based networking (IBN) provides a promising approach for managing networks and orchestrating services in beyond 5th Generation (B5G) deployments using modern service-based architectures. Public safety (PS) services form the basis of keeping society functional, owing to the responsiveness and avail-ability throughout the network. The provisioning of these services requires efficient and agile network management techniques with low-overhead and embedded intelligence. IBN incorporates the service subscribers in a model-driven approach to provision different user-centric services. However, it requires domain-specific and contextual processing of intents for abstracted management of network functions. This work proposes an intent definition for PS services in B5G networks, as well as a processing and orchestration architecture for a push-to-talk (PTT) use case. The simulation results show that PTT services adhere to the key performance indicators of access time and mouth-to-ear latency bounded by approximately 250 and 150 milliseconds, respectively, with an additional overhead experienced during the intent processing in the range of 20-40 milliseconds. This validates the premise of IBN in providing flexible and scalable management and service orchestration solution for PS next generation networks.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126534698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the energy efficiency of Laser-based Optical Wireless Networks 基于激光的光无线网络的能量效率研究
2022 IEEE 8th International Conference on Network Softwarization (NetSoft) Pub Date : 2022-03-21 DOI: 10.1109/NetSoft54395.2022.9844102
Walter Zibusiso Ncube, A. Qidan, T. El-Gorashi, J. Elmirghani
{"title":"On the energy efficiency of Laser-based Optical Wireless Networks","authors":"Walter Zibusiso Ncube, A. Qidan, T. El-Gorashi, J. Elmirghani","doi":"10.1109/NetSoft54395.2022.9844102","DOIUrl":"https://doi.org/10.1109/NetSoft54395.2022.9844102","url":null,"abstract":"Optical wireless Communication (OWC) is a strong candidate in the next generation (6G) of cellular networks. In this paper, a laser-based optical wireless network is deployed in an indoor environment using Vertical Cavity Surface Emitting Lasers (VCSELS) as transmitters serving multiple users. Specifically, a commercially available low-cost VCSEL operating at S50nm wavelength is used. Considering the confined coverage area of each VCSEL, an array of VCSELs is designed to transmit data to multiple users through narrow beams taking into account eye safety regulations. To manage multi-user interference (MUI), Zero Forcing (ZF) is implemented to maximize the multiplexing gain of the network. The energy efficiency of the network is studied under different laser beam waists to find the effective laser beam size that results in throughput enhancement. The results show that the energy efficiency increases with the laser beam waist. Moreover, using micro lenses placed in front of the VCSELs leads to significant increase in the energy efficiency.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116266705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信