{"title":"Identifying Relevant Data Center Telemetry Using Change Point Detection","authors":"Daniel S. F. Alves, K. Obraczka, Rick Lindberg","doi":"10.1109/CloudNet51028.2020.9335800","DOIUrl":"https://doi.org/10.1109/CloudNet51028.2020.9335800","url":null,"abstract":"In this paper, we focus on the problem of data center performance monitoring, more specifically, how to manage the large volume of data generated by data center telemetry tools. We propose a framework that uses Change Point Detection (CPD) to identify sources of useful telemetry and based on that information, filters incoming telemetry data in real-time as the data center operates. To evaluate our proposed CPD-based telemetry triage framework, we conducted experiments using a small emulated data center driven by different workloads. We also report results from experiments with telemetry data collected from a privately-owned, commercial, multi-tenant data center. Preliminary experimental results show that our CPD-based tool can filter out significant amounts of irrelevant telemetry while preserving most relevant telemetry sources.","PeriodicalId":156419,"journal":{"name":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115374513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Willy Y. -W. Hsu, Jiun-Cheng Tsai, John Z.-L. Tang, Charles H.-P. Wen
{"title":"Profit-Driven Service-Chain Deployment For EDA Requests On Private Cloud","authors":"Willy Y. -W. Hsu, Jiun-Cheng Tsai, John Z.-L. Tang, Charles H.-P. Wen","doi":"10.1109/CloudNet51028.2020.9335794","DOIUrl":"https://doi.org/10.1109/CloudNet51028.2020.9335794","url":null,"abstract":"Cloud computing is becoming a pervasive technology in many fields. However, the EDA field has not yet developed a working prototype that employs the commercial tools as services and deploys them on the cloud. Therefore, in this paper, we aim at three core problems: request acceptance, service schedule, and resource deployment on private EDA clouds, and give an integrated solution for processing requests. Compared to Conventional Inclusion (C.I.), total profit can increase under a high arrival rate by 29% after applying Progressive Inclusion (P.I.). Meanwhile, the non-preemptive, penalty-considered, Least Slack First Scheduling deals with the order of services to be scheduled. As to resource deployment, parcel-fit (PF) outperforms best-fit (BF) and first-fit (FF) by 5% and 18% on total profits under a high arrival rate. To sum up, the proposed solution provides an effective way to build a private EDA cloud with more profits than the conventional solution.","PeriodicalId":156419,"journal":{"name":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125772573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deep Reinforcement Learning Approach for Anomaly Network Intrusion Detection System","authors":"Ying-Feng Hsu, Morito Matsuoka","doi":"10.1109/CloudNet51028.2020.9335796","DOIUrl":"https://doi.org/10.1109/CloudNet51028.2020.9335796","url":null,"abstract":"Network intrusion detection systems (NIDS) are essential for organizations to ensure the safety and security of their communication and information. In this paper, we propose a deep reinforcement learning-based (DRL) for anomaly network intrusion detection system. Our system has the ability of self-updating to reflect new types of network traffic behavior. This study includes three major contributions. First, to show the overall applicability of our approach, we demonstrate our work through two well-known NIDS benchmark datasets: NSL-KDD and UNSW-NB15 and a real campus network log. Second, to show the feasibility of our approach, we compared our method with three other classic machine learning methods and two related published results. Third, our model is capable of processing a million scale of network traffic on a real-time basis.","PeriodicalId":156419,"journal":{"name":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","volume":"37 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120822841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting Quality of Delivery Metrics for Adaptive Video Codec Sessions","authors":"Obinna Izima, R. Fréin, M. Davis","doi":"10.1109/CloudNet51028.2020.9335813","DOIUrl":"https://doi.org/10.1109/CloudNet51028.2020.9335813","url":null,"abstract":"Predicting video quality will continue to be an active area of research given the dominance of video traffic for years to come. Network service practitioners that are poised to handle the strain on the existing limited bandwidth constraints are better placed to be SLA-compliant. The dynamic and time-varying nature of cloud-hosted services require improved techniques to realize accurate models of the systems. To address this challenge: (1) we propose Codec-aware Network Adaptation Agent (cNAA), an online light-weight data learning engine that achieves accurate and correct predictions of quality of delivery (QoD) metrics, namely jitter for video services. cNAA achieves this prediction accuracy by leveraging the available network information in the face of congestion and adaptive codecs; (2) we highlight the short-comings of some baseline machine learning techniques that fail to capture network dynamics and demonstrate their failure in comparison with cNAA; and finally, (3) we demonstrate the efficacy of cNAA under varying network and codec conditions and provide evidence showing that machine learning approaches that incorporate network dynamics are better placed to realize accurate and correct predictions.","PeriodicalId":156419,"journal":{"name":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127394700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Virtual Network Embedding with Node Ranking and Intelligent Link Mapping","authors":"Khoa T. D. Nguyen, Qiao Lu, Changcheng Huang","doi":"10.1109/CloudNet51028.2020.9335801","DOIUrl":"https://doi.org/10.1109/CloudNet51028.2020.9335801","url":null,"abstract":"Network virtualization (NV) is emerged as a key enabler for the success of the future virtualized networks (e.g. 5G networks and smart Internet of Things (IoT)). Virtual Network Embedding (VNE) that addresses the embedding problems of heterogeneous virtual networks (VNs) onto a physical infrastructure is a main challenge in NV. Network topology attributes and network resource-considered (NTANRC) algorithm is a virtual node mapping mechanism that considers essential network features and global network resources for ranking both substrate and virtual nodes prior to embedding each given virtual network request (VNR). In this paper, we propose NTANRC combined with a distributed parallel Genetic Algorithm (GA) for virtual link mapping, namely NTANRC-GA, to solve online VNE problem. Extensive evaluation results show that our proposed solution not only achieves better performance compared to state-of-the-art VNE algorithms, but also challenges the rapid speed of shortest path (SP) method. NTANRC algorithm and the parallel GA-based algorithm are reverse compliments of each other to achieve an efficient VNE solution.","PeriodicalId":156419,"journal":{"name":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130922962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bi-directional Flow Relocation For Computation Offloading With Multiple Network Functions","authors":"Koji Sugisono, S. Kawano, Akihiro Okada","doi":"10.1109/CloudNet51028.2020.9335798","DOIUrl":"https://doi.org/10.1109/CloudNet51028.2020.9335798","url":null,"abstract":"While relocation of bi-directional service flows in mobile services with computation offloading, round trip delay of in-flight service packets should be kept short to provide swift responses in the services. However, when a service flow passes through multiple network functions (NFs), the in-flight service packets incur additional transmission delay every time they arrive at the NFs moving the state for the flow. The additional delay depends on the timing when each NF transmits its state and the packets' direction. Then optimizing the delay extension of the packets headed for a direction does not contribute to suppressing the round trip time extension in the bi-directional service flow. We propose a scheduling method for moving the flow states that ensures that each in-flight packet waits at most once. The method executes the state migration for each NF sequentially and drains all the delayed packets before starting moving the next flow state. Numerical evaluation results show that our method effectively reduces the waiting times of the in-flight packets.","PeriodicalId":156419,"journal":{"name":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","volume":"13 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114130831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khoa T. D. Nguyen, S. Drew, Changcheng Huang, Jiayu Zhou
{"title":"Collaborative Container-based Parked Vehicle Edge Computing Framework for Online Task Offloading","authors":"Khoa T. D. Nguyen, S. Drew, Changcheng Huang, Jiayu Zhou","doi":"10.1109/CloudNet51028.2020.9335809","DOIUrl":"https://doi.org/10.1109/CloudNet51028.2020.9335809","url":null,"abstract":"As most vehicles spend over 95% of their time in the parking lots, the powerful computing resources of parked vehicles (PVs) are underutilized, that can be considered as available computing nodes to run tasks as well as an extension of the existing infrastructure. In this paper, we propose EdgePV, a collaborative computing paradigm to efficiently improve online heterogeneous task scheduling. To guarantee service reliability, a container orchestration (e.g. Kubernetes) is advocated to be integrated into this proposed architecture due to its notable advanced features such as load-balancing, auto-healing, resource isolation, security, etc,. Kubernetes coordinates PVs to run sufficient numbers of task replicas, providing high service availability against possible failure caused by the mobility of PVs. We investigate how efficient PVs can handle the online computational tasks during peak hours. We also present the dual cost and utility-aware heuristic algorithm, compared with a set of heuristics to solve the problem of task scheduling, that can be devised for replacing the default scheduler in Kubernetes platform. Extensive simulation results show that our proposed design improves the task acceptance ratios and average costs at least 23% and 64%, respectively, at lowest task arrival rate compared to the cooperated cloud-edge architecture. Furthermore, owners of PVs can significantly benefit from incentives received by sharing the idle resources of their PVs.","PeriodicalId":156419,"journal":{"name":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116272135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ibrahim Sorkhoh, Dariush Ebrahimi, S. Sharafeddine, C. Assi
{"title":"Minimizing the Age of Information in Intelligent Transportation Systems","authors":"Ibrahim Sorkhoh, Dariush Ebrahimi, S. Sharafeddine, C. Assi","doi":"10.1109/CloudNet51028.2020.9335793","DOIUrl":"https://doi.org/10.1109/CloudNet51028.2020.9335793","url":null,"abstract":"In many applications offered by intelligent transportation systems (ITS), maintaining the freshness of real-time information is a key requirement for the successful delivery of their services. The age of information (AoI) is a new metric recently proposed to capture the data freshness. This paper considers intelligent vehicles in a Vehicle to Infrastructure (V2I) network where each vehicle has a stream of data sampled by on-board sensors to communicate with a road side unit (RSU). Many vehicles demand access and vehicles stay in range for a short period of time. The objective of the RSU, then, is to schedule transmissions of these vehicles with the objective of maintaining data freshness upon receiving these packets. We first formulate the scheduling problem as a mixed integer linear program (MILP) to minimize the weighted AoI, accounting for the dynamic nature of the environment (vehicles' arrivals and their speeds, channel reliability, etc.). We also propose a scalable greedy algorithm that solves the problem in a polynomial time, and we prove that it obtains the optimal solution. We generate synthetic data using SUMO and evaluate numerically the performance of our algorithms.","PeriodicalId":156419,"journal":{"name":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129736554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifying Cloud Misbehavior","authors":"R. Tandon, J. Mirkovic, Pithayuth Charnsethikul","doi":"10.1109/CloudNet51028.2020.9335812","DOIUrl":"https://doi.org/10.1109/CloudNet51028.2020.9335812","url":null,"abstract":"Clouds have gained popularity over the years as they provide on-demand resources without associated long-term costs. Cloud users often gain superuser access to cloud machines, which is necessary to customize them to user needs. But superuser access to a vast amount of resources, without support or oversight of experienced system administrators, can create fertile ground for accidental or intentional misuse. Attackers can rent cloud machines or hijack them from cloud users, and leverage them to generate unwanted traffic, such as spam and phishing, denial of service, vulnerability scans, drive-by downloads, etc. In this paper, we analyze 13 datasets, containing various types of unwanted traffic, to quantify cloud misbehavior and identify clouds that most often and most aggressively generate unwanted traffic. We find that although clouds own only 5.4% of the routable IPv4 address space (with 94.6% going to non-clouds), they often generate similar amounts of scans as non-clouds, and contribute to 22–96% of entries on blocklists. Among /24 prefixes that send vulnerability scans, a cloud's /24 prefix is 20–100 times more aggressive than a non-cloud's. Among /24 prefixes whose addresses appear on blocklists, a cloud's /24 prefix is almost twice as likely to have its address listed, compared to a non-cloud's /24 prefix. Misbehavior is heavy-tailed among both clouds and non-clouds. There are 25 clouds that contribute 90% of all the cloud scans, and 10 clouds contribute more than 20% of blocklist entries from clouds.","PeriodicalId":156419,"journal":{"name":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128426129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ViperProbe: Rethinking Microservice Observability with eBPF","authors":"Joshua Levin, Theophilus A. Benson","doi":"10.1109/CloudNet51028.2020.9335808","DOIUrl":"https://doi.org/10.1109/CloudNet51028.2020.9335808","url":null,"abstract":"Recent shifts to microservice-based architectures and the supporting servicemesh radically disrupt the landscape of performance-oriented management tasks. While the adoption of frameworks like Istio and Kubernetes ease the management and organization of such systems, they do not themselves provide strong observability. Microservice observability requires diverse, highly specialized, and often adaptive, metrics and algorithms to monitor both the health of individual services and the larger application. However, modern metrics collection frameworks are relatively static and rigid. We introduce ViperProbe, an eBPF-based microservices collection framework that provides (1) dynamic sampling and (2) collection of deep, diverse, and precise system metrics. Viper-Probe builds on the observation that the adoption of a common set of design patterns, e.g., servicemesh, enables offline analysis. By examining the performance profile of these patterns before deploying on production, ViperProbe can effectively reduce the set of collected metrics, thereby improving the efficiency and effectiveness of those metrics. To the best of our knowledge, ViperProbe is the first scalable eBPF-based dynamic and adaptive microservices metrics collection framework. Our results show ViperProbe has limited overhead, while significantly more effective for traditional management tasks, e.g., horizontal autoscaling.","PeriodicalId":156419,"journal":{"name":"2020 IEEE 9th International Conference on Cloud Networking (CloudNet)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125919318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}