IEEE Transactions on Network and Service Management最新文献

筛选
英文 中文
QoE-Oriented Dependent Task Scheduling Under Multi-Dimensional QoS Constraints Over Distributed Networks
IF 4.7 2区 计算机科学
IEEE Transactions on Network and Service Management Pub Date : 2024-11-05 DOI: 10.1109/TNSM.2024.3491432
Xuwei Fan;Zhipeng Cheng;Ning Chen;Lianfen Huang;Xianbin Wang
{"title":"QoE-Oriented Dependent Task Scheduling Under Multi-Dimensional QoS Constraints Over Distributed Networks","authors":"Xuwei Fan;Zhipeng Cheng;Ning Chen;Lianfen Huang;Xianbin Wang","doi":"10.1109/TNSM.2024.3491432","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3491432","url":null,"abstract":"Task scheduling as an effective strategy can improve application performance on computing resource-limited devices over distributed networks. However, existing evaluation mechanisms for application completion fail to depict the complexity of diverse applications and time-varying networks, which involve dependencies among tasks, computing resource requirements, multi-dimensional quality of service (QoS) constraints, and limited contact duration among devices. Furthermore, traditional QoS-oriented task scheduling strategies struggle to meet the performance requirements without considering differences in satisfaction and acceptance of the application, leading to application failures and resource wastage. To tackle these issues, a quality of experience (QoE) cost model is designed to evaluate application completion, depicting the relationship among application satisfaction, communications, and computing resources over the time-varying distributed networks. Specifically, considering the sensitivity and preference of QoS, we model the different dimensional QoS degradation cost functions for dependent tasks, which are then integrated into the QoE cost model. Based on the QoE model, the dependent task scheduling problem is formulated as the minimization of overall QoE cost, aiming to improve the application performance over the time-varying distributed networks, which is proven Np-hard. Moreover, a heuristic Hierarchical Multi-queue Task Scheduling (HMTS) algorithm is proposed to address the QoE-oriented task scheduling problem among multiple dependent tasks, which utilizes hierarchical multiple queues to determine the optimal task execution order and location according to different dimensional QoS priorities. Finally, extensive experiments demonstrate that the proposed algorithm can significantly improve the satisfaction of applications.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"516-531"},"PeriodicalIF":4.7,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Modeling of IoT-Cloud Gateway Under Diverse Traffic Characteristics
IF 4.7 2区 计算机科学
IEEE Transactions on Network and Service Management Pub Date : 2024-11-04 DOI: 10.1109/TNSM.2024.3489598
Shachi Sharma;Prakash Datt Bhatt
{"title":"Performance Modeling of IoT-Cloud Gateway Under Diverse Traffic Characteristics","authors":"Shachi Sharma;Prakash Datt Bhatt","doi":"10.1109/TNSM.2024.3489598","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3489598","url":null,"abstract":"The presence of diverse traffic types is well-established in IoT networks. Various probability distributions have been found to describe packets inter-arrival time contrasting with the familiar exponential distribution in traditional networks. These findings suggest the need to develop appropriate traffic models for performance analysis of IoT network systems. An essential component in IoT network is gateway as it provides connectivity to the core Internet. The IoT gateway also performs functions such as protocol translation and traffic aggregation. Therefore, efficient design of the IoT gateway is necessary for better network management. The paper presents a new analytical model, N-Gamma/M/1, for analyzing the performance of IoT gateway. The equivalence of N-Gamma/M/1 and Gamma/M/1 models is proved mathematically. Additionally, an in-depth performance evaluation of the IoT gateway under various arrival patterns is conducted through simulation. The numerical analysis of the proposed N-Gamma/M/1 model emphasizes the need for more buffers at the gateway when traffic from input devices has varying values of gamma distribution parameters. It is also noted that the IoT gateway experiences a longer mean queue length resulting in higher mean waiting time and packet loss when inter-arrival time distribution of packets follows generalized Pareto, Weibull and lognormal distributions with different parameter values. This makes the task of IoT network management challenging. Adaptive and intelligent resource allocation policies along with dynamic congestion control algorithms may provide a solution to minimize packet loss and ensure quality of service.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"691-701"},"PeriodicalIF":4.7,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FHE-Based Publicly Verifiable Sealed-Bid Auction Protocol Atop Cross-Blockchain
IF 4.7 2区 计算机科学
IEEE Transactions on Network and Service Management Pub Date : 2024-10-30 DOI: 10.1109/TNSM.2024.3488090
Bo Yang;Liquan Chen;Jiaorui Shen;Huaqun Wang;Yang Ma
{"title":"FHE-Based Publicly Verifiable Sealed-Bid Auction Protocol Atop Cross-Blockchain","authors":"Bo Yang;Liquan Chen;Jiaorui Shen;Huaqun Wang;Yang Ma","doi":"10.1109/TNSM.2024.3488090","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3488090","url":null,"abstract":"Online auctions, which are widely used on Internet advertising platforms, reduce the participation costs for buyers and sellers, and promote the flow of tens of billions of dollars in the global economy. However, Internet advertising platforms tend to be monopolistic and adopt a sealed bidding model. Therefore, when price is the sole determinant of the winner, how to publicly verify the correctness of auction results without disclosing bidding information has become a challenge. To address these issues, we propose a fully homomorphic encryption (FHE)-based sealed-bid auction protocol with public verifiability atop cross-blockchain. Through an approximate comparison algorithm, the proof of the winner consists of <inline-formula> <tex-math>${m} ,, -1$ </tex-math></inline-formula> (or 1) homomorphic ciphertexts, significantly reducing communication costs, where m represents the number of bidders. Thus, anyone can check the winner’s proof and complete the public verification of correctness. Moreover, this paper designs a cross-blockchain auction system model, breaking the monopoly of platforms, and proposes a distributed private key sharing method, which realizes the auditing function of the relay chain. Finally, we formalize the security model, and verify the correctness, public verifiability and privacy of our scheme. The off-chain time overhead and on-chain gas consumption demonstrate the strong practicability of our protocol in large-scale auctions.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"832-845"},"PeriodicalIF":4.7,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Control Grid for Optimized Cyber Defense Planning
IF 4.7 2区 计算机科学
IEEE Transactions on Network and Service Management Pub Date : 2024-10-30 DOI: 10.1109/TNSM.2024.3488011
Ashutosh Dutta;Ehab Al-Shaer;Ehsan Aghaei;Qi Duan;Hasan Yasar
{"title":"Security Control Grid for Optimized Cyber Defense Planning","authors":"Ashutosh Dutta;Ehab Al-Shaer;Ehsan Aghaei;Qi Duan;Hasan Yasar","doi":"10.1109/TNSM.2024.3488011","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3488011","url":null,"abstract":"Cybersecurity controls are essential for ensuring information confidentiality, integrity, and availability. However, selecting the most effective controls to maximize return on investment (RoI) in cyber defense is a complex task involving numerous factors such as vulnerabilities, threat prioritization, and budget constraints. This paper introduces an innovative model and optimization techniques to select cybersecurity controls (CSC) for optimal risk mitigation, balancing residual risk, budget, and resiliency requirements. Our approach features the Security Control Grid (SCG) model, which automatically determines the necessary controls based on their security functions (Identify, Protect, Detect, Respond, and Recover), strategic placement within the cyber environment, and effectiveness at different stages of the attack kill chain. We formulate cybersecurity control decision-making as a multidimensional optimization problem, solving it using Satisfiability Modulo Theories (SMT). Additionally, we integrate a domain-specific language model that links CSCs with Common Vulnerabilities and Exposures (CVEs). This approach is implemented in the SCG solver tool, which generates scalable and robust CSC deployment plans that optimize cybersecurity RoI and maintain acceptable residual risk for large-scale enterprises.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"913-929"},"PeriodicalIF":4.7,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MTP-NT: A Mobile Traffic Predictor Enhanced by Neighboring and Transportation Data
IF 4.7 2区 计算机科学
IEEE Transactions on Network and Service Management Pub Date : 2024-10-30 DOI: 10.1109/TNSM.2024.3488568
Patrick Luiz de Araújo;Murillo Guimarães Carneiro;Luis M. Contreras;Rafael Pasquini
{"title":"MTP-NT: A Mobile Traffic Predictor Enhanced by Neighboring and Transportation Data","authors":"Patrick Luiz de Araújo;Murillo Guimarães Carneiro;Luis M. Contreras;Rafael Pasquini","doi":"10.1109/TNSM.2024.3488568","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3488568","url":null,"abstract":"The development of techniques able to forecast the mobile network traffic in a city can feed data driven applications, as Virtual Network Functions (VNF) orchestrators, optimizing the resource allocation and increasing the capacity of mobile networks. Despite the fact that several studies have addressed this problem, many did not consider neither the traffic relationship among city regions nor the information retrieved from public transport stations, which may provide useful information to better anticipate the network traffic. In this paper, we propose a new deep learning based architecture to forecast the network traffic using representation learning and recurrent neural networks. The framework, named Mobile Traffic Predictor Enhanced by Neighboring and Transportation Data (MTP-NT), has two major components: the first one is responsible of learning from the time series of the region to be predicted, with the second one learning from the time series of both neighboring regions and public transportation stations. Several experiments were conducted over a dataset from the city of Milan, as well as comparisons against widely adopted and state-of-the-art techniques. The results shown in this paper demonstrate that the usage of public transport information contributes to improve the forecasts in central areas of the city, as well as in regions with aperiodic demands, such as tourist regions.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"648-659"},"PeriodicalIF":4.7,"publicationDate":"2024-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRobust: A Percolation-Based Robustness Optimization Model for Underwater Acoustic Sensor Networks
IF 4.7 2区 计算机科学
IEEE Transactions on Network and Service Management Pub Date : 2024-10-29 DOI: 10.1109/TNSM.2024.3487956
Zhaowei Zhang;Chunfeng Liu;Wenyu Qu;Zhao Zhao;Weisi Guo
{"title":"PRobust: A Percolation-Based Robustness Optimization Model for Underwater Acoustic Sensor Networks","authors":"Zhaowei Zhang;Chunfeng Liu;Wenyu Qu;Zhao Zhao;Weisi Guo","doi":"10.1109/TNSM.2024.3487956","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3487956","url":null,"abstract":"In Underwater Acoustic Sensor Networks (UASNs), the robustness of network is greatly affected by complex marine environments when implementing multi-hop data transmission. Factors such as the underwater acoustic channel and dynamic topological changes induced by multi-layered oceanic vortices exacerbate this influence. However, there is currently a research gap in the specific area of robustness optimization for UASNs. Existing studies on robustness optimization are unsuitable for UASNs as they neglect the considerations of the marine environment and node characteristics (e.g., residual energy). In this work, we propose PRobust, a percolation-based robustness optimization model for UASNs. PRobust consists of two distinct phases: percolation modeling and bottleneck optimization. In the percolation modeling phase, we incorporate both node and edge features, considering the physical and topological properties, and introduce a novel approach for calculating link quality. In the bottleneck optimization phase, we devise a graph theory-based method to identify bottlenecks, leveraging the flow information recorded by nodes to improve the accuracy of bottleneck discovery. Moreover, we integrated time slots and a current movement model into the proposed model, allowing its applicability to dynamically changing UASNs. Extensive simulation results indicate that, compared to existing methods, PRobust significantly enhances network robustness and performance with the same overhead after bottleneck optimization.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"702-717"},"PeriodicalIF":4.7,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Holistic Service Provisioning in a UAV-UGV Integrated Network for Last-Mile Delivery
IF 4.7 2区 计算机科学
IEEE Transactions on Network and Service Management Pub Date : 2024-10-28 DOI: 10.1109/TNSM.2024.3487357
Jia Xu;Xiao Liu;Jiong Jin;Wuzhen Pan;Xuejun Li;Yun Yang
{"title":"Holistic Service Provisioning in a UAV-UGV Integrated Network for Last-Mile Delivery","authors":"Jia Xu;Xiao Liu;Jiong Jin;Wuzhen Pan;Xuejun Li;Yun Yang","doi":"10.1109/TNSM.2024.3487357","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3487357","url":null,"abstract":"Effective last-mile delivery is pivotal in smart logistics system. While existing delivery network architectures, such as Drone-as-a-Service (DaaS), are capable of enhancing order delivery effectiveness, they often fall short in provisioning diverse delivery services. Furthermore, DaaS-based last-mile delivery systems face challenges from limited payload capacity and range. In this paper, we propose a UAV-UGV integrated network architecture based on Multi-access Edge Computing (MEC), denoted as DaaS+, encompassing the diverse delivery services from both Unmanned Aerial Vehicle (UAV) and Unmanned Ground Vehicle (UGV) for last-mile delivery. To optimize the effectiveness in the delivery process, the intricate overhead and constraints of heterogeneous delivery services are taken into the full consideration. Specifically, we present an energy-aware service model for the UAV-UGV integrated network that considers the deadline constraints of services. Additionally, we address issues of service unavailability during service provisioning. To identify optimal service provisioning plans, we design a novel Energy-Aware Holistic Service Provisioning Mechanism based on Particle Swarm Optimization (ES-PSO), which minimizes delivery energy consumption while adhering to service deadline constraints. Experimental results substantiate the effectiveness of our proposed solution, demonstrating its ability to generate superior service provisioning plans and significantly reduce total delivery energy consumption.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"380-393"},"PeriodicalIF":4.7,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review
IF 4.7 2区 计算机科学
IEEE Transactions on Network and Service Management Pub Date : 2024-10-28 DOI: 10.1109/TNSM.2024.3487265
Muhammad Asghar Khan;Neeraj Kumar;Saeed Hamood Alsamhi;Gordana Barb;Justyna Zywiołek;Insaf Ullah;Fazal Noor;Jawad Ali Shah;Abdullah M. Almuhaideb
{"title":"Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review","authors":"Muhammad Asghar Khan;Neeraj Kumar;Saeed Hamood Alsamhi;Gordana Barb;Justyna Zywiołek;Insaf Ullah;Fazal Noor;Jawad Ali Shah;Abdullah M. Almuhaideb","doi":"10.1109/TNSM.2024.3487265","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3487265","url":null,"abstract":"Unmanned aerial vehicles (UAVs) in beyond 5G (B5G) are crucial for revolutionizing various industries, including surveillance, agriculture, and logistics, by enabling high-speed data transfer, ultra-low latency communication, and ultra-reliable connectivity. However, integrating UAVs into B5G networks poses various security and privacy concerns. These risks encompass the possibility of unauthorized access, breaches of data, and cyber-physical attacks which jeopardize the integrity, confidentiality, and availability of UAV operations. Moreover, UAVs in B5G networks are also at high risk from the application of machine learning (ML)-based attacks by exploiting vulnerabilities in ML models, leading to adversarial manipulation, data poisoning and model evasion techniques, which can compromise the integrity of UAV operations, lead to navigation errors, and expose sensitive data collected by UAVs. Considering the aforementioned security and privacy concerns, this review article presents emerging security and privacy solutions for UAVs in B5G networks. Firstly, We introduce the essential background of integrating UAVs into B5G networks and discuss the advantages and security challenges which the emerging integrated network architecture have. Then, we proceed to analyze and examine the security and privacy landscape by including threats and requirements of UAVs in B5G networks. Based on these threats and requirements, solutions from physical layer security (PLS), blockchain (BC), federated learning (FL) and post-quantum cryptography (PQC) are discussed and explored in details. Moreover, potential future research directions are discussed in details as open research issues.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"892-912"},"PeriodicalIF":4.7,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10737101","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory
IF 4.7 2区 计算机科学
IEEE Transactions on Network and Service Management Pub Date : 2024-10-25 DOI: 10.1109/TNSM.2024.3486379
Shimin Sun;Xiangyun Liu;Meiyu Wang;Ze Wang;Li Han
{"title":"Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory","authors":"Shimin Sun;Xiangyun Liu;Meiyu Wang;Ze Wang;Li Han","doi":"10.1109/TNSM.2024.3486379","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3486379","url":null,"abstract":"In the evolving landscape of Software Defined Internet of Thing (SD-IoT), the proliferation of IoT devices and applications has led to a drastic expansion of network traffic. Because of the overwhelming influx of control messages, the SDN controller may not have sufficient capacity to adequately address them. The main challenge is to properly deploy multiple controllers to enhance resource utilization and boost network performance, taking into account different factors for varying network scenarios. This paper presents a Predictive and Elitism genetic algorithm with Non-cooperative Game (PENG) strategy, tailored to address the control plane load imbalance. PENG incorporates a Gated Recurrent Units (GRU) based traffic prediction model, an improved elitism genetic algorithm, and the non-cooperative game theory to synergistically optimize the load balancing strategy. The study formulates a multi-objective optimization model that takes into account the degree of load balancing, control plane latency, and migration expenses as utility functions. This paper is structured around pivotal modules such as traffic prediction, controller overload identification, switch migration, and controller-switch mapping matrix reconfiguration. Moreover, an improved elitism genetic reallocation algorithm (IEGR) is designed, featuring a novel similarity factor to expedite convergence and improve the accuracy of identifying the optimal solution. Further, the detailed algorithm of PENG is present, outlining proactive and predictive switch migration to preemptively address potential load imbalance. The proposed methodology is simulated and the experimental results demonstrate that the proposal outperforms the comparisons in optimizing the load balancing degree, reducing average latency and migration cost.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"791-806"},"PeriodicalIF":4.7,"publicationDate":"2024-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual Temporal Masked Modeling for KPI Anomaly Detection via Similarity Aggregation
IF 4.7 2区 计算机科学
IEEE Transactions on Network and Service Management Pub Date : 2024-10-24 DOI: 10.1109/TNSM.2024.3486167
Ting Yu;Zijian Gao;Kele Xu;Xu Wang;Peichang Shi;Bo Ding;Dawei Feng
{"title":"Dual Temporal Masked Modeling for KPI Anomaly Detection via Similarity Aggregation","authors":"Ting Yu;Zijian Gao;Kele Xu;Xu Wang;Peichang Shi;Bo Ding;Dawei Feng","doi":"10.1109/TNSM.2024.3486167","DOIUrl":"https://doi.org/10.1109/TNSM.2024.3486167","url":null,"abstract":"With the expanding scale of current industries, monitoring systems centered around Key Performance Indicators (KPIs) play an increasingly crucial role. KPI anomaly detection can monitor the potential risks according to KPI data and has garnered widespread attention due to its rapid responsiveness and adaptability to dynamic changes. Considering the absence of labels and the high cost of manual annotation of KPI data, the self-supervised approaches are proposed. Among them, mask modeling methods draw great attention and can learn the intrinsic distribution of data without relying on prior assumptions. However, conventional mask modeling often overlooks the examination of relationships between unsynchronized variables, treating them with equal importance, and inducing inaccurate detection results. To address this, this paper proposes a Dual Masked modeling Approach combined with Similarity Aggregation, named DMASA. Starting from a self-supervised approach based on mask modeling, DMASA incorporates spectral residual techniques to explore inter-variable dependencies and aggregates information from similar data to eliminate interference from irrelevant variables in anomaly detection. Extensive experiments on eight datasets and state-of-the-art results demonstrate the effectiveness of our approach. Our code is available at <uri>https://github.com/colaudiolab/GT-DMASA</uri>.","PeriodicalId":13423,"journal":{"name":"IEEE Transactions on Network and Service Management","volume":"22 1","pages":"317-330"},"PeriodicalIF":4.7,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信