NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium最新文献

筛选
英文 中文
FIXIDS: A high-speed signature-based flow intrusion detection system FIXIDS:基于高速签名的流入侵检测系统
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406247
Felix Erlacher, F. Dressler
{"title":"FIXIDS: A high-speed signature-based flow intrusion detection system","authors":"Felix Erlacher, F. Dressler","doi":"10.1109/NOMS.2018.8406247","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406247","url":null,"abstract":"Signature-based Network Intrusion Detection Systems (NIDS) are the state-of-the-art when it comes to precise attack detection and intrusion prevention. However, they experience critical performance problems in modern high-speed networks. At the same time, flow-based network monitoring has been investigated for high data rates. In the last years, such flow-monitoring went beyond collecting statistical information about network connections and more recent techniques are able to include selected samples of the payload of these flows. Most recently, we extended this concept to HTTP flows. We now go one step further and combine IPFIX-based flow monitoring with NIDS. We developed IPFIX-based Signature-based Intrusion Detection System (FIXIDS), a system that exploits the recently introduced HTTP related flow Information Elements (IEs) to do signature-based flow intrusion detection in high-speed networks on commodity hardware. FIXIDS makes use of HTTP intrusion signatures from the widely used Snort NIDS and applies them to incoming IPFIX Flows. In the experimental evaluation, we are able to show a performance gain of a factor of three compared to Snort while maintaining the same detection ratio.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"259 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77115788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
On the configuration of radio resource management in a sliced RAN 切片RAN中无线资源管理的配置
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406280
J. Pérez-Romero, O. Sallent, R. Ferrús, R. Agustí
{"title":"On the configuration of radio resource management in a sliced RAN","authors":"J. Pérez-Romero, O. Sallent, R. Ferrús, R. Agustí","doi":"10.1109/NOMS.2018.8406280","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406280","url":null,"abstract":"Network slicing is a fundamental feature of 5G systems that facilitates the provision of particular system behaviours adapted to specific service/application domains on top of a common network infrastructure. A network slice is in general composed by a core network slice and a Radio Access Network (RAN) slice. The realization of RAN slices is particularly challenging because it requires configuring and operating traffic differentiation and protection mechanisms to simultaneously deliver multiple and diverse RAN behaviors over a given pool of radio resources. In this context, this paper proposes to characterize the behavior of a RAN slice through the specification of a set of control parameters that are used to dictate the operation of the packet scheduling function at Layer 2 and the radio admission control function at Layer 3. An evaluation of the suitability of these parameters for achieving efficient radio resource sharing and isolation between RAN slices is presented when configuring a network for supporting a slice with multiple enhanced Mobile BroadBand services and another slice for providing Mission Critical services. The analysis reveals the different impact of the Layer 3 and Layer 2 parameters for isolating services of different slices depending on whether they require guaranteed or non-guaranteed bit rates.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"19 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73224295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS IaaS云中的安全监控sla验证:以网络IDS为例
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406157
Amir Teshome, Louis Rilling, C. Morin
{"title":"Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS","authors":"Amir Teshome, Louis Rilling, C. Morin","doi":"10.1109/NOMS.2018.8406157","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406157","url":null,"abstract":"In an IaaS cloud the physical infrastructure is controlled by service providers, including its security monitoring aspect. Clients hosting their information system are incited to trust the provider's claim (e.g. infrastructure availability) thanks to the assurance given by Service Level Agreements (SLAs). We aim at extending SLAs to include security monitoring terms. In this paper we describe the challenges to reach this goal, we propose a three-step incremental strategy and we apply the first step of this strategy on the case of network IDS (NIDS) monitoring probes. In this case study we select a relevant metric to describe the performance of an NIDS, that is the metric can figure in an SLA and can be measured to verify that the SLA is respected. In particular we propose an in situ verification method of such a metric on a production NIDS and evaluate experimentally and analytically the proposed method.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"78 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82071905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Resource discovery and share mechanism in disconnected ubiquitous stub network 非连通泛在存根网络中的资源发现与共享机制
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406177
Yanfu Jiang, Shaoyong Guo, Siya Xu, Xue-song Qiu, Luoming Meng
{"title":"Resource discovery and share mechanism in disconnected ubiquitous stub network","authors":"Yanfu Jiang, Shaoyong Guo, Siya Xu, Xue-song Qiu, Luoming Meng","doi":"10.1109/NOMS.2018.8406177","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406177","url":null,"abstract":"In ubiquitous stub network, it is a critical challenge to realize resource discovery and share under disconnected network topology. In this paper, a cluster-based resource discovery mechanism is proposed with resource registration, distribution and routing model. Firstly, we use resource directory index nodes to assist in resource management. Secondly, we use inter-cluster mobile terminals to support resource routing. In addition, we take the nodes contact probability into account and establish the minimum expectation delay routing standard to opportunistically route between terminals. At last, the simulation result shows this mechanism is better applied to support disconnected ubiquitous resource discovery.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"17 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90365163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An HTTP/2 push-based framework for low-latency adaptive streaming through user profiling 一个基于HTTP/2推送的框架,通过用户分析实现低延迟自适应流
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406215
Jeroen van der Hooft, C. D. Boom, Stefano Petrangeli, T. Wauters, F. Turck
{"title":"An HTTP/2 push-based framework for low-latency adaptive streaming through user profiling","authors":"Jeroen van der Hooft, C. D. Boom, Stefano Petrangeli, T. Wauters, F. Turck","doi":"10.1109/NOMS.2018.8406215","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406215","url":null,"abstract":"Web portals, such as the one hosted by news providers, have recently started to provide significant amounts of multimedia content. To deliver this content over the best-effort Internet, HTTP Adaptive Streaming (HAS) is generally used, allowing smoother playback and a better Quality of Experience (QoE). To stimulate user engagement with the provided content, reducing the video's startup time has become more and more important: while the current median video load time is in the order of seconds, research has shown that user waiting times must remain below two seconds to achieve an acceptable QoE. In this work, we present a framework for low-latency delivery of news-related video content, integrating four optimizations either at server-side, client-side, or at the application layer. Most importantly, we propose to identify relevant content through user profiling, using proactive delivery and client-side caching to reduce the video startup time. By means of a large data set from a Belgian news provider, we show that the proposed framework can reduce the startup time from 4.6 s to 1.5 s (-74.6%) in a 3G scenario, at the cost of limited network overhead and additional complexity at server- and client-side.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"115 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90526848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards a management plane for smart contracts: Ethereum case study 迈向智能合约的管理平面:以太坊案例研究
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406326
Nida Khan, Abdelkader Lahmadi, J. François, R. State
{"title":"Towards a management plane for smart contracts: Ethereum case study","authors":"Nida Khan, Abdelkader Lahmadi, J. François, R. State","doi":"10.1109/NOMS.2018.8406326","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406326","url":null,"abstract":"Blockchain is an emerging foundational technology with the potential to create a novel economic and social system. The complexity of the technology poses many challenges and foremost amongst these are monitoring and management of blockchain-based decentralized applications. In this paper, we design, implement and evaluate a novel system to enable management operations in smart contracts. A key aspect of our system is that it facilitates the integration of these operations through dedicated 'managing' smart contracts to provide data filtering as per the role of the smart contract-based application user. We evaluate the overhead costs of such data filtering operations after post-deployment analyses of five categories of smart contracts on the Ethereum public testnet, Rinkeby. We also build a monitoring tool to display public blockchain data using a dashboard coupled with a notification mechanism of any changes in private data to the administrator of the monitored decentralized application.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"33 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91539962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Taming policy complexity: Model to execution 控制策略复杂性:从模型到执行
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406172
S. Meer, J. Keeney, Liam Fallon
{"title":"Taming policy complexity: Model to execution","authors":"S. Meer, J. Keeney, Liam Fallon","doi":"10.1109/NOMS.2018.8406172","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406172","url":null,"abstract":"Since the 1970's it has been acknowledged that a complex system can be broken into (a) its invariant functional parts (mechanism), and (b) the externalized choices for how the system should behave (policy). Policy-based management's main objective is to separate and externalize the decisions required by a system from the mechanisms provided by the system, and provide a way to define and evaluate these decisions. A few decades later, we have today a plethora of different policy models and even more policy languages - plus tooling - offering policy-based solutions for virtually any use case and scenario. However, policy-based management as a standalone domain has never been evaluated in terms of which parts are variant / invariant, i.e. which parts of policy-based management can be domain-, model-, language-, usecase-independent. In this paper, we introduce and define a formal universal policy model that does exactly that. The result is a model that can be used to design, implement, and deploy immutable policy infrastructure (engine and executor) being able to execute (virtually) any policy model.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"72 2 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90955218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Joint multicast routing and OFDM resource allocation in LTE-D2D 5G cellular network LTE-D2D 5G蜂窝网络中联合组播路由与OFDM资源分配
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406238
Safwan Alwan, Ilhem Fajjari, N. Aitsaadi
{"title":"Joint multicast routing and OFDM resource allocation in LTE-D2D 5G cellular network","authors":"Safwan Alwan, Ilhem Fajjari, N. Aitsaadi","doi":"10.1109/NOMS.2018.8406238","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406238","url":null,"abstract":"An offloading scheme based on LTE-D2D is pro­posed in this paper to route the intracellular multicast traffic via a network of D2D-enabled User Equipments (UEs). The latter are ready to cooperate under the control of the eNodeB to carry and deliver the traffic. In doing so, the UEs reuse uplink resources granted by the eNodeB and thus, increasing the overall spectral efficiency while reducing the traffic load on the eNodeB. In this paper, we address the joint multicast routing and OFDM resource allocation problem in the D2D network to accomplish the offloading task. To do so, first we formulate the problem as an Integer Linear Programming (ILP) model which takes into account factors that limit spectrum reuse in addition to other LTE-D2D limitations: half-duplex operation and contiguity in resource block allocations. Then, we propose a novel scheme named Joint Multicast Routing and Wireless allocation in D2D communications (JRW-D2D-MC). The devised scheme consists of two-stage algorithm which, first, performs a pre-admittance filtering of flows that can be routed considering the current state of the network. Then, it makes use of the branch-and-cut method to solve the reduced ILP model. To evaluate effectiveness of our proposal, we implement the LTE-D2D standard in a network simulator NS-3. The results are very good in terms of flow-acceptance rate and latency.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"117 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85397981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Graph-based IoT microservice security 基于图的物联网微服务安全
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406118
Marc-Oliver Pahl, François-Xavier Aubet, Stefan Liebald
{"title":"Graph-based IoT microservice security","authors":"Marc-Oliver Pahl, François-Xavier Aubet, Stefan Liebald","doi":"10.1109/NOMS.2018.8406118","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406118","url":null,"abstract":"The Internet of Things (IoT) can be considered as Service Oriented Architecture (SOA) of Microservices ($$S). The μSs inherently process data that affects the privacy, safety, and security of its users. IoT service security is a key challenge. Most state of the art providing IoT system security is policy based. We showcase a graph-based access control that runs as module on IoT nodes, or in the network. Our solution intercepts and firewalls inter-service communication. It automatically creates a model of legitimate communication relationships. The model is interactively updated via a simple-to-understand interface. Our solution adds inevitable IoT security to existing IoT systems.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"10 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82143593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Energy models for NFV and service provisioning on fog nodes 雾节点上NFV和业务发放的能量模型
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406158
F. Kaup, Stefan Hacker, Eike Mentzendorff, Christian Meurisch, D. Hausheer
{"title":"Energy models for NFV and service provisioning on fog nodes","authors":"F. Kaup, Stefan Hacker, Eike Mentzendorff, Christian Meurisch, D. Hausheer","doi":"10.1109/NOMS.2018.8406158","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406158","url":null,"abstract":"The demand for high-bandwidth, low-latency services is rapidly increasing. Content Distribution Networks (CDNs) have addressed this by providing content from within or close to the Internet Service Provider (ISP). Still, the most common bottleneck for high service quality is the 'last mile' between ISP and end user. Serving content from small caches on end-user devices promises to increase service quality of the respective content. Similarly, fog computing promises to provide low-latency services from arbitrary nodes within the network. Both require additional functionality provided by network functions virtualization (NFV), redirecting traffic to the appropriate destinations. Still, the cost and performance of possible solutions are not well analyzed. Hence, this paper analyzes the forwarding and computing performance of a number of single-board computers (SBCs) from which models for the performance and energy cost of different loads are derived. Furthermore, the development of energy efficiency gains over the last years is analyzed, confirming Koomey's law also for SBCs, leading to an increase of computational efficiency by a factor of 5.5 to 7.5 over the course of four years, which relates to a doubling time of 1.62 years.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"11 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83820819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信