{"title":"An Efficient Workflow Scheduling Using Genetically Modified Golden Jackal Optimization With Recurrent Autoencoder in Cloud Computing","authors":"Saurav Tripathi, Sarsij Tripathi","doi":"10.1002/nem.2318","DOIUrl":"https://doi.org/10.1002/nem.2318","url":null,"abstract":"<div>\u0000 \u0000 <p>In this paper, a novel workflow scheduling framework is proposed using genetically modified golden jackal optimization (GM-GJO) with recurrent autoencoder. An integrated autoencoder and bidirectional gated recurrent unit (iAE-BiGRU) are used to forecast the number of virtual machines (VMs) needed to manage the system's present workload. The following step involves assigning the tasks of several workflows to cloud VMs through the use of the GM-GJO method for multiworkflow scheduling. GM-GJO provides optimal workflow scheduling by considering minimal maximizing utilization rate, minimizing makespan, and minimizing the number of deadline missed workflows. The proposed approach attempts to allocate the best possible set of resources for the workflows based on objectives such as deadline, cost, and quality of service (QoS). Extensive experiments were conducted with the CloudSIM tool, and the performance is evaluated in terms of scheduling length ratio, cost, QoS, etc. The execution time of 513.45 ms is achieved with a Sipht workflow of 30 tasks. When comparing the suggested strategy to the current methodologies, the suggested approach performs better.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142861696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Junwei Li, Huaquan Su, Li Guo, Wanshuo Wang, Yongjiao Yang, You Wen, Kai Li, Pingyan Mo
{"title":"Security Protection Method for Electronic Archives Based on Homomorphic Aggregation Signature Scheme in Mobile Network","authors":"Junwei Li, Huaquan Su, Li Guo, Wanshuo Wang, Yongjiao Yang, You Wen, Kai Li, Pingyan Mo","doi":"10.1002/nem.2316","DOIUrl":"https://doi.org/10.1002/nem.2316","url":null,"abstract":"<div>\u0000 \u0000 <p>Electronic archives are now widely used in many different industries and serve as the primary method of information management and storage because of the rapid growth of information technology and mobile networks. To enhance the security of electronic archives in mobile networks, the research utilizes the federated learning mechanism to design a federated learning model based on homomorphic aggregation cryptographic signature scheme combined with mobile network management. The use of homomorphic encryption technology in the signing process of electronic archives enables the aggregation of multiple electronic file signatures into a single signature without exposing the data of the electronic archives. This reduces the computational and storage requirements for signature verification. At the same time, a secure aggregation signature scheme is used to ensure the integrity and security of the data in the aggregation process. A novel approach is presented in this study, whereby trusted federated learning models are innovatively combined with homomorphic aggregate signature technology. This integration ensures data integrity through aggregate signature schemes. The results showed that, under mobile network management, the longest encryption time of the trusted federated learning model was 52 ms, and the longest decryption time was 44 ms. The accuracy of the optimized learning model reached 97.49%, and the loss value was significantly reduced to 0.09. To summarize, the electronic archive security protection method based on homomorphic aggregation signature scheme effectively improves the archive data protection efficiency and security.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142861454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lyn Hill, Charalampos Rotsos, Chris Edwards, David Hutchison
{"title":"REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation","authors":"Lyn Hill, Charalampos Rotsos, Chris Edwards, David Hutchison","doi":"10.1002/nem.2317","DOIUrl":"https://doi.org/10.1002/nem.2317","url":null,"abstract":"<p>The increasing demand for low-latency, high-bandwidth connectivity has introduced novel challenges to delivering strong resilience guarantees in production network environments. Closed hardware platforms, known as middleboxes, that lack visibility and support for state retention remain a key challenge for continuous service delivery during network failures. These middleboxes rarely employ recovery mechanisms of their own, inspiring renewed interest in the field of NFV in recent years due to this gap within the industry. The increasing availability of VNF capabilities in modern infrastructures offers an opportunity to exploit the flexibility of software and use hybrid architectures to improve resilience. REMEDIATE is a high-availability service that propagates state between unmodified hardware middleboxes and backup PNF or VNF appliances. The platform utilises targeted packet mirroring to allow network devices to organically construct equivalent state and thus allow an easy transition between hardware and software. To demonstrate its viability, we have evaluated REMEDIATE against a wide range of common hardware middlebox use cases built using multiple open-source packet processing frameworks. Results show upwards of 90% matching state with no observable delay to normal traffic or impact on its functionality.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2317","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142764090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum Allocation in 5G and Beyond Intelligent Ubiquitous Networks","authors":"Banoth Ravi, Utkarsh Verma","doi":"10.1002/nem.2315","DOIUrl":"https://doi.org/10.1002/nem.2315","url":null,"abstract":"<div>\u0000 \u0000 <p>Effective spectrum allocation in 5G and beyond intelligent ubiquitous networks is vital for predicting future frequency band needs and ensuring optimal network performance. As wireless communication evolves from 4G to 5G and beyond, it has brought about remarkable advancements in speed and connectivity. However, with the growing demand for higher data rates and increased network capacity, new challenges in managing and utilizing network frequencies have emerged. Accurately forecasting spectrum requirements is critical to addressing these challenges. This research explores how machine learning (ML) plays a pivotal role in optimizing network performance through intelligent decision-making, predictive analysis, and adaptive management of network resources. By leveraging ML algorithms, networks can autonomously self-optimize in real time, adjusting to changing conditions and improving performance in 5G and beyond. The effectiveness of our approach was demonstrated through an extensive case study, which showed that it not only meets spectrum requirements in various environments but also significantly reduces energy consumption by pinpointing the appropriate spectrum range for each location. These results underscore the approach's potential for enhancing spectrum management in future networks, offering a scalable and efficient solution to the challenges facing 5G and beyond.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142758077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intent-Based Network Configuration Using Large Language Models","authors":"Nguyen Tu, Sukhyun Nam, James Won-Ki Hong","doi":"10.1002/nem.2313","DOIUrl":"https://doi.org/10.1002/nem.2313","url":null,"abstract":"<div>\u0000 \u0000 <p>The increasing scale and complexity of network infrastructure present a huge challenge for network operators and administrators in performing network configuration and management tasks. Intent-based networking has emerged as a solution to simplify the configuration and management of networks. However, one of the most difficult tasks of intent-based networking is correctly translating high-level natural language intents into low-level network configurations. In this paper, we propose a general and effective approach to perform the network intent translation task using large language models with fine-tuning, dynamic in-context learning, and continuous learning. Fine-tuning allows a pretrained large language model to perform better on a specific task. In-context learning enables large language models to learn from the examples provided along with the actual intent. Continuous learning allows the system to improve overtime with new user intents. To demonstrate the feasibility of our approach, we present and evaluate it with two use cases: network formal specification translation and network function virtualization configuration. Our evaluation shows that with the proposed approach, we can achieve high intent translation accuracy as well as fast processing times using small large language models that can run on a single consumer-grade GPU.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SentinelGuard Pro: Deploying Cutting-Edge FusionNet for Unerring Detection and Enforcement of Wrong Parking Incidents","authors":"Vankadhara Rajyalakshmi, Kuruva Lakshmanna","doi":"10.1002/nem.2310","DOIUrl":"https://doi.org/10.1002/nem.2310","url":null,"abstract":"<div>\u0000 \u0000 <p>Wrong parking incidents pose a pervasive challenge in urban environments, disrupting the smooth flow of traffic, compromising safety and contributing to various logistical issues. Unauthorized parking occurs when vehicles are parked in locations not designated for such purposes, leading to a myriad of problems for both authorities and the general public. This research introduces a pioneering approach to confront the persistent challenge of unauthorized parking incidents in urban environments. The study focuses on harnessing the advanced capabilities of the FusionNet model to enhance the accuracy of license plate detection. This paper introduces the YOLO v8 Model, a deep learning architecture designed to enhance urban parking management by accurately detecting vehicles parked in unauthorized slots. The objective is to enhance parking management efficiency by accurately detecting vehicles and their occupancy status in designated parking areas. The methodology begins with data collection and preprocessing of images of parking spaces, followed by the training of YOLO v8 to identify vehicles and parking spaces in real time. Leveraging a diverse dataset encompassing various parking scenarios, including instances of unauthorized parking, the model achieves an accuracy of 98.50% in identifying vehicles outside designated areas. This model segments characters from detected license plates, enabling the accurate extraction of alphanumeric information associated with each vehicle. The integrated system provides timely identification of parking violations and facilitates effective enforcement actions through captured license plate data. Results demonstrate the model's effectiveness in real-world scenarios, showcasing its potential for improving urban safety and efficiency. The implementation of FusionNet in the Python programming language, the proposed solution aims to streamline parking management, improve compliance with parking regulations and enhance overall urban mobility., with robust precision 96.17%, specificity 97.42% and sensitivity 96.19%, surpassing other MobileNet, CNN, ANN, DNN and EfficientNet models.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142724245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huaquan Su, Junwei Li, Li Guo, Wanshuo Wang, Yongjiao Yang, You Wen, Kai Li, Pingyan Mo
{"title":"Massive Data HBase Storage Method for Electronic Archive Management","authors":"Huaquan Su, Junwei Li, Li Guo, Wanshuo Wang, Yongjiao Yang, You Wen, Kai Li, Pingyan Mo","doi":"10.1002/nem.2308","DOIUrl":"https://doi.org/10.1002/nem.2308","url":null,"abstract":"<div>\u0000 \u0000 <p>The acceleration of the digitalization process in enterprise and university education management has generated a massive amount of electronic archive data. In order to improve the intelligence, storage quality, and efficiency of electronic records management and achieve efficient storage and fast retrieval of data storage models, this study proposes a massive data storage model based on HBase and its retrieval optimization scheme design. In addition, HDFS is introduced to construct a two-level storage structure and optimize values to improve the scalability and load balancing of HBase, and the retrieval efficiency of the HBase storage model is improved through SL-TCR and BF filters. The results indicated that HDFS could automatically recover data after node, network partition, and NameNode failures. The write time of HBase was 56 s, which was 132 and 246 s less than Cassandra and CockroachDB. The query latency was reduced by 23% and 32%, and the query time was reduced by 9988.51 ms, demonstrating high reliability and efficiency. The delay of BF-SL-TCL was 1379.28 s after 1000 searches, which was 224.78 and 212.74 s less than SL-TCL and Blockchain Retrieval Acceleration and reduced the delay under high search times. In summary, this storage model has obvious advantages in storing massive amounts of electronic archive data and has high security and retrieval efficiency, which provides important reference for the design of storage models for future electronic archive management. The storage model designed by the research institute has obvious advantages in storing massive electronic archive data, solving the problem of lack of scalability in electronic archive management when facing massive data, and has high security and retrieval efficiency. It has important reference for the design of storage models for future electronic archive management.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142737619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrei C. Azevedo, Eder J. Scheid, Muriel F. Franco, Demétrio F. F. Boeira, Luciano Zembruzki, Lisandro Z. Granville
{"title":"The Role of Network Centralization in Shaping Digital Sovereignty: An Analysis Under the DNS Lens","authors":"Andrei C. Azevedo, Eder J. Scheid, Muriel F. Franco, Demétrio F. F. Boeira, Luciano Zembruzki, Lisandro Z. Granville","doi":"10.1002/nem.2309","DOIUrl":"https://doi.org/10.1002/nem.2309","url":null,"abstract":"<div>\u0000 \u0000 <p>Centralization of Internet-based services in a few key players has been a topic of study in recent years. One of such services, the domain name system (DNS), is one of the pillars of the Internet, which allows users to access websites on the Internet through easy-to-remember domain names rather than complex numeric IP addresses. In this DNS context, the reliance on a small number of large DNS providers can lead to (a) risks of data breaches and disruption of service in the event of failures and (b) concerns about the digital sovereignty of countries regarding DNS hosting. As several essential services are provided through electronic government (E-Gov), it is highly important to be able to measure the digital sovereignty of a nation and the impacts that the lack of such feature can bring to its citizens. This work approaches the issue of DNS concentration on the Internet by presenting a solution to measure DNS hosting centralization and digital sovereignty in different countries, such as Brazil, India, China, Russia, and South Africa. With the data obtained through these measurements, relevant questions are answered, such as which are the top-10 DNS providers, if there is DNS centralization, and how dependent countries are on such providers to manage domains using their country code top-level domains (ccTLD). Future opportunities could investigate the impacts on sovereignty under the lens of other layers of the open systems interconnection (OSI) Network Sovereignty representation model presented in this work.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142724177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight Flow-Based Policy Enforcement for SDN-Based Multi-Domain Communication","authors":"Abdulhakim Sabur","doi":"10.1002/nem.2312","DOIUrl":"https://doi.org/10.1002/nem.2312","url":null,"abstract":"<div>\u0000 \u0000 <p>Although software-defined networking (SDN) is commonly employed for intra-domain communication, inter-domain communication still heavily relies on conventional routing methods, specifically BGP-based routers. The BGP router plays a crucial role in managing control and data planes, but this traditional approach hinders the exploitation of SDN advantages. Previous studies demonstrated the use of BGP for inter-domain and end-to-end communication. This paper advocates for the adoption of a fully SDN-based data plane packet switching strategy through the introduction of LPEES, a lightweight policy framework tailored for SDN-based inter-domain communication. LPEES strategically confines BGP's functionality to the control plane, preserving SDN benefits. Evaluation results confirm the effectiveness of LPEES compared to the BGP routing approach, as measured by throughput and various network quality of service (QoS) metrics. Additionally, LPEES streamlines inter-domain communication by utilizing a trust-based routing policy approach that can establish trust between communicating domains. The presented solution's main advantage is that it loosens the burden on the administrator by requiring less human interference to check the inter-domain communication security and privacy. Our evaluations show LPEES outperform the BGP-based in terms of throughput as LPEES achieves a <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>∼</mo>\u0000 </mrow>\u0000 <annotation>$$ sim $$</annotation>\u0000 </semantics></math>27 Gbps versus <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>∼</mo>\u0000 </mrow>\u0000 <annotation>$$ sim $$</annotation>\u0000 </semantics></math>22 Gbps in the traditional approach. Based on our experiments, LPEES also enhances the communication delay by an average of <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>∼</mo>\u0000 </mrow>\u0000 <annotation>$$ sim $$</annotation>\u0000 </semantics></math>17% compared to the traditional BGP-based approach.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142737594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen
{"title":"Security, Privacy, and Trust Management on Decentralized Systems and Networks","authors":"Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen, Chao Chen","doi":"10.1002/nem.2311","DOIUrl":"https://doi.org/10.1002/nem.2311","url":null,"abstract":"<p>With the rapid growth of size and scale in current organization, decentralize systems are becoming dominant, which is an interconnected information system where no single entity or central server is employed as a sole authority, such as Internet of Things (IoT), smart home system, smart city system, and more. For such systems, sensors are important to gather and process data as the lower level components. However, with the distributed deployment, decentralized systems are facing various security, privacy, and trust issues. For instance, any compromised sensor may leak sensitive data or be used to infect other entities within the system. It is also a long-term challenge to establish trust among different nodes and defeat malicious insiders. Here, there is a requirement to develop suitable management schemes for decentralized systems and networks regarding security, privacy, and trust. This special issue focuses on the identification of security, privacy, and trust issues in decentralized systems and the development of effective solutions in handling security, privacy, and trust issues for decentralized systems, for example, IoT, cyber-physical systems (CPS), smart city, and smart home.</p><p>In the first contribution entitled “A security-enhanced equipment predictive maintenance solution for the ETO manufacturing,” Cao et al. proposed a security-enhanced predictive maintenance scheme specifically designed for ETO-type production equipment. This scheme can use the industrial Internet of Things (IIoT) technology to monitor machines and equipment, constructing prediction models using machine learning methods and reinforcing the security of the prediction system through adoption of a decentralized architecture with blockchain distributed storage. In this experiment, six supervised learning models were compared, and it was found that the model based on the random forest algorithm achieved an outstanding accuracy rate of 98.88%.</p><p>In the second contribution entitled “IGXSS: XSS payload detection model based on inductive GCN,” Wang et al. figured out that XSS is one of the most common web application attacks, in which an attacker can obtain private user information from IoT devices or cloud platforms. To address this issue, the authors proposed an XSS payload detection model based on inductive graph neural networks, shortly IGXSS (XSS payload detection model based on inductive GCN). The method aims to detect XSS payloads under an IoT environment by segmenting the samples as nodes and obtaining the feature matrix of nodes and edges.</p><p>In the third contribution entitled “Privacy-protected object detection through trustworthy image fusion,” Zhang et al. identified that user privacy may be leaked as infrared images may contain sensitive information. The authors then proposed a procedure for enhancing the database privacy, object detection based on multi-band infrared image datasets, and they utilized the transfer learning technique to migrate know","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"34 6","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.2311","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142642020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}