{"title":"FIXIDS: A high-speed signature-based flow intrusion detection system","authors":"Felix Erlacher, F. Dressler","doi":"10.1109/NOMS.2018.8406247","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406247","url":null,"abstract":"Signature-based Network Intrusion Detection Systems (NIDS) are the state-of-the-art when it comes to precise attack detection and intrusion prevention. However, they experience critical performance problems in modern high-speed networks. At the same time, flow-based network monitoring has been investigated for high data rates. In the last years, such flow-monitoring went beyond collecting statistical information about network connections and more recent techniques are able to include selected samples of the payload of these flows. Most recently, we extended this concept to HTTP flows. We now go one step further and combine IPFIX-based flow monitoring with NIDS. We developed IPFIX-based Signature-based Intrusion Detection System (FIXIDS), a system that exploits the recently introduced HTTP related flow Information Elements (IEs) to do signature-based flow intrusion detection in high-speed networks on commodity hardware. FIXIDS makes use of HTTP intrusion signatures from the widely used Snort NIDS and applies them to incoming IPFIX Flows. In the experimental evaluation, we are able to show a performance gain of a factor of three compared to Snort while maintaining the same detection ratio.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"259 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77115788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the configuration of radio resource management in a sliced RAN","authors":"J. Pérez-Romero, O. Sallent, R. Ferrús, R. Agustí","doi":"10.1109/NOMS.2018.8406280","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406280","url":null,"abstract":"Network slicing is a fundamental feature of 5G systems that facilitates the provision of particular system behaviours adapted to specific service/application domains on top of a common network infrastructure. A network slice is in general composed by a core network slice and a Radio Access Network (RAN) slice. The realization of RAN slices is particularly challenging because it requires configuring and operating traffic differentiation and protection mechanisms to simultaneously deliver multiple and diverse RAN behaviors over a given pool of radio resources. In this context, this paper proposes to characterize the behavior of a RAN slice through the specification of a set of control parameters that are used to dictate the operation of the packet scheduling function at Layer 2 and the radio admission control function at Layer 3. An evaluation of the suitability of these parameters for achieving efficient radio resource sharing and isolation between RAN slices is presented when configuring a network for supporting a slice with multiple enhanced Mobile BroadBand services and another slice for providing Mission Critical services. The analysis reveals the different impact of the Layer 3 and Layer 2 parameters for isolating services of different slices depending on whether they require guaranteed or non-guaranteed bit rates.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"19 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73224295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS","authors":"Amir Teshome, Louis Rilling, C. Morin","doi":"10.1109/NOMS.2018.8406157","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406157","url":null,"abstract":"In an IaaS cloud the physical infrastructure is controlled by service providers, including its security monitoring aspect. Clients hosting their information system are incited to trust the provider's claim (e.g. infrastructure availability) thanks to the assurance given by Service Level Agreements (SLAs). We aim at extending SLAs to include security monitoring terms. In this paper we describe the challenges to reach this goal, we propose a three-step incremental strategy and we apply the first step of this strategy on the case of network IDS (NIDS) monitoring probes. In this case study we select a relevant metric to describe the performance of an NIDS, that is the metric can figure in an SLA and can be measured to verify that the SLA is respected. In particular we propose an in situ verification method of such a metric on a production NIDS and evaluate experimentally and analytically the proposed method.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"78 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82071905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanfu Jiang, Shaoyong Guo, Siya Xu, Xue-song Qiu, Luoming Meng
{"title":"Resource discovery and share mechanism in disconnected ubiquitous stub network","authors":"Yanfu Jiang, Shaoyong Guo, Siya Xu, Xue-song Qiu, Luoming Meng","doi":"10.1109/NOMS.2018.8406177","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406177","url":null,"abstract":"In ubiquitous stub network, it is a critical challenge to realize resource discovery and share under disconnected network topology. In this paper, a cluster-based resource discovery mechanism is proposed with resource registration, distribution and routing model. Firstly, we use resource directory index nodes to assist in resource management. Secondly, we use inter-cluster mobile terminals to support resource routing. In addition, we take the nodes contact probability into account and establish the minimum expectation delay routing standard to opportunistically route between terminals. At last, the simulation result shows this mechanism is better applied to support disconnected ubiquitous resource discovery.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"17 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90365163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeroen van der Hooft, C. D. Boom, Stefano Petrangeli, T. Wauters, F. Turck
{"title":"An HTTP/2 push-based framework for low-latency adaptive streaming through user profiling","authors":"Jeroen van der Hooft, C. D. Boom, Stefano Petrangeli, T. Wauters, F. Turck","doi":"10.1109/NOMS.2018.8406215","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406215","url":null,"abstract":"Web portals, such as the one hosted by news providers, have recently started to provide significant amounts of multimedia content. To deliver this content over the best-effort Internet, HTTP Adaptive Streaming (HAS) is generally used, allowing smoother playback and a better Quality of Experience (QoE). To stimulate user engagement with the provided content, reducing the video's startup time has become more and more important: while the current median video load time is in the order of seconds, research has shown that user waiting times must remain below two seconds to achieve an acceptable QoE. In this work, we present a framework for low-latency delivery of news-related video content, integrating four optimizations either at server-side, client-side, or at the application layer. Most importantly, we propose to identify relevant content through user profiling, using proactive delivery and client-side caching to reduce the video startup time. By means of a large data set from a Belgian news provider, we show that the proposed framework can reduce the startup time from 4.6 s to 1.5 s (-74.6%) in a 3G scenario, at the cost of limited network overhead and additional complexity at server- and client-side.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"115 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90526848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nida Khan, Abdelkader Lahmadi, J. François, R. State
{"title":"Towards a management plane for smart contracts: Ethereum case study","authors":"Nida Khan, Abdelkader Lahmadi, J. François, R. State","doi":"10.1109/NOMS.2018.8406326","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406326","url":null,"abstract":"Blockchain is an emerging foundational technology with the potential to create a novel economic and social system. The complexity of the technology poses many challenges and foremost amongst these are monitoring and management of blockchain-based decentralized applications. In this paper, we design, implement and evaluate a novel system to enable management operations in smart contracts. A key aspect of our system is that it facilitates the integration of these operations through dedicated 'managing' smart contracts to provide data filtering as per the role of the smart contract-based application user. We evaluate the overhead costs of such data filtering operations after post-deployment analyses of five categories of smart contracts on the Ethereum public testnet, Rinkeby. We also build a monitoring tool to display public blockchain data using a dashboard coupled with a notification mechanism of any changes in private data to the administrator of the monitored decentralized application.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"33 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91539962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Taming policy complexity: Model to execution","authors":"S. Meer, J. Keeney, Liam Fallon","doi":"10.1109/NOMS.2018.8406172","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406172","url":null,"abstract":"Since the 1970's it has been acknowledged that a complex system can be broken into (a) its invariant functional parts (mechanism), and (b) the externalized choices for how the system should behave (policy). Policy-based management's main objective is to separate and externalize the decisions required by a system from the mechanisms provided by the system, and provide a way to define and evaluate these decisions. A few decades later, we have today a plethora of different policy models and even more policy languages - plus tooling - offering policy-based solutions for virtually any use case and scenario. However, policy-based management as a standalone domain has never been evaluated in terms of which parts are variant / invariant, i.e. which parts of policy-based management can be domain-, model-, language-, usecase-independent. In this paper, we introduce and define a formal universal policy model that does exactly that. The result is a model that can be used to design, implement, and deploy immutable policy infrastructure (engine and executor) being able to execute (virtually) any policy model.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"72 2 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90955218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint multicast routing and OFDM resource allocation in LTE-D2D 5G cellular network","authors":"Safwan Alwan, Ilhem Fajjari, N. Aitsaadi","doi":"10.1109/NOMS.2018.8406238","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406238","url":null,"abstract":"An offloading scheme based on LTE-D2D is proposed in this paper to route the intracellular multicast traffic via a network of D2D-enabled User Equipments (UEs). The latter are ready to cooperate under the control of the eNodeB to carry and deliver the traffic. In doing so, the UEs reuse uplink resources granted by the eNodeB and thus, increasing the overall spectral efficiency while reducing the traffic load on the eNodeB. In this paper, we address the joint multicast routing and OFDM resource allocation problem in the D2D network to accomplish the offloading task. To do so, first we formulate the problem as an Integer Linear Programming (ILP) model which takes into account factors that limit spectrum reuse in addition to other LTE-D2D limitations: half-duplex operation and contiguity in resource block allocations. Then, we propose a novel scheme named Joint Multicast Routing and Wireless allocation in D2D communications (JRW-D2D-MC). The devised scheme consists of two-stage algorithm which, first, performs a pre-admittance filtering of flows that can be routed considering the current state of the network. Then, it makes use of the branch-and-cut method to solve the reduced ILP model. To evaluate effectiveness of our proposal, we implement the LTE-D2D standard in a network simulator NS-3. The results are very good in terms of flow-acceptance rate and latency.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"117 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85397981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marc-Oliver Pahl, François-Xavier Aubet, Stefan Liebald
{"title":"Graph-based IoT microservice security","authors":"Marc-Oliver Pahl, François-Xavier Aubet, Stefan Liebald","doi":"10.1109/NOMS.2018.8406118","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406118","url":null,"abstract":"The Internet of Things (IoT) can be considered as Service Oriented Architecture (SOA) of Microservices ($$S). The μSs inherently process data that affects the privacy, safety, and security of its users. IoT service security is a key challenge. Most state of the art providing IoT system security is policy based. We showcase a graph-based access control that runs as module on IoT nodes, or in the network. Our solution intercepts and firewalls inter-service communication. It automatically creates a model of legitimate communication relationships. The model is interactively updated via a simple-to-understand interface. Our solution adds inevitable IoT security to existing IoT systems.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"10 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82143593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Kaup, Stefan Hacker, Eike Mentzendorff, Christian Meurisch, D. Hausheer
{"title":"Energy models for NFV and service provisioning on fog nodes","authors":"F. Kaup, Stefan Hacker, Eike Mentzendorff, Christian Meurisch, D. Hausheer","doi":"10.1109/NOMS.2018.8406158","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406158","url":null,"abstract":"The demand for high-bandwidth, low-latency services is rapidly increasing. Content Distribution Networks (CDNs) have addressed this by providing content from within or close to the Internet Service Provider (ISP). Still, the most common bottleneck for high service quality is the 'last mile' between ISP and end user. Serving content from small caches on end-user devices promises to increase service quality of the respective content. Similarly, fog computing promises to provide low-latency services from arbitrary nodes within the network. Both require additional functionality provided by network functions virtualization (NFV), redirecting traffic to the appropriate destinations. Still, the cost and performance of possible solutions are not well analyzed. Hence, this paper analyzes the forwarding and computing performance of a number of single-board computers (SBCs) from which models for the performance and energy cost of different loads are derived. Furthermore, the development of energy efficiency gains over the last years is analyzed, confirming Koomey's law also for SBCs, leading to an increase of computational efficiency by a factor of 5.5 to 7.5 over the course of four years, which relates to a doubling time of 1.62 years.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"11 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83820819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}