NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium最新文献

筛选
英文 中文
A declarative approach for service enablement on hybrid cloud orchestration engines 用于在混合云编排引擎上实现服务的声明性方法
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406175
Neeraj Asthana, Tom Chefalas, A. Karve, A. Segal, Mahika Dubey, Sai Zeng
{"title":"A declarative approach for service enablement on hybrid cloud orchestration engines","authors":"Neeraj Asthana, Tom Chefalas, A. Karve, A. Segal, Mahika Dubey, Sai Zeng","doi":"10.1109/NOMS.2018.8406175","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406175","url":null,"abstract":"The rapidly increasing complexity and scale of hybrid cloud environments requires improved service management capabilities in orchestration and automation. Current methods focus on provisioning infrastructure but lack functionality for consistently enabling and performing operational activities on managed services. We propose a data-driven approach to dynamically generate Orchestration Engine plugins from service descriptor metadata. Our approach extends Orchestration Engines by representing managed services as code within reusable blueprints in order to accelerate service deployments and ease management activities. In our work, we provide a data model and system architecture to allow service providers to easily author and publish resource definitions for a wide range of public and private services. These definitions may be combined into solution blueprints, forming a declarative and reusable representation of a managed workload. After provisioning a workload, administrators can view service instance data and invoke operational activities. For evaluation, we describe the authoring and orchestration of a hybrid cloud workload and discuss the strengths of our solution versus current methods.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75428483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Load-aware potential-based routing for the edge communication of smart grid with content-centric network 基于负载感知电位的内容中心网络智能电网边缘通信路由
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406187
Xiaotong Wang, Lanlan Rui, Hui Guo, Xue-song Qiu
{"title":"Load-aware potential-based routing for the edge communication of smart grid with content-centric network","authors":"Xiaotong Wang, Lanlan Rui, Hui Guo, Xue-song Qiu","doi":"10.1109/NOMS.2018.8406187","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406187","url":null,"abstract":"With the development of Internet of Things, there are more and more devices and applications at the edge of the smart grid. To enhance the quality of service, further processing of the smart grid to achieve load balancing is regarded as a critical step. The most interesting element in smart grid communications is data itself regardless of the data source. The emergency of Content-Centric network (CCN) just meets the demands and addresses the problems. First we model the smart grid with Content-Centric Network, and concentrate on the edge communication. Then we propose a load-aware potential-based routing (LAPBR) algorithm and evaluate its performances. The simulations results demonstrate the stability and robustness of LAPBR.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74522485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANs qos感知自适应A-MPDU聚合调度器,用于在启用聚合的wlan上增强VoIP容量
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406149
Shinnazar Seytnazarov, Young-Tak Kim
{"title":"QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANs","authors":"Shinnazar Seytnazarov, Young-Tak Kim","doi":"10.1109/NOMS.2018.8406149","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406149","url":null,"abstract":"Currently available aggregation-enabled wireless local area network (WLAN) implementations do not apply aggregate MAC protocol data unit (A-MPDU) aggregation to real-time voice over Internet protocol (VoIP) traffic because of its strict end-to-end delay requirements. When the number of VoIP sessions in WLAN increases, both mobile station (MS) and access point (AP) face heavy voice packet losses leading to unacceptable quality of service (QoS). Therefore, VoIP capacity of aggregation-enabled WLANs like IEEE 802.11n and 802.11ac is very limited under currently available implementations. In this paper, we propose a QoS-aware adaptive A-MPDU aggregation scheduler for enhanced VoIP capacity over aggregation-enabled WLANs, which adaptively applies A-MPDU aggregation to voice traffic at both MS and AP nodes, considering dynamic contention in WLAN, delay in backbone network, and end-to-end QoS requirements of real-time voice traffic. Performance evaluations of the proposed scheme showed that it can achieve as much as 5.3 times bigger capacity compared to the existing implementations, while delivering all voice packets to destination with less than 150ms end-to-end delay and less than 50ms average jitter.1","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88815758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Adaptive configuration of lora networks for dense IoT deployments 面向密集物联网部署的lora网络自适应配置
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406255
Mariusz Słabicki, Gopika Premsankar, M. D. Francesco
{"title":"Adaptive configuration of lora networks for dense IoT deployments","authors":"Mariusz Słabicki, Gopika Premsankar, M. D. Francesco","doi":"10.1109/NOMS.2018.8406255","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406255","url":null,"abstract":"Large-scale Internet of Things (IoT) deployments demand long-range wireless communications, especially in urban and metropolitan areas. LoRa is one of the most promising technologies in this context due to its simplicity and flexibility. Indeed, deploying LoRa networks in dense IoT scenarios must achieve two main goals: efficient communications among a large number of devices and resilience against dynamic channel conditions due to demanding environmental settings (e.g., the presence of many buildings). This work investigates adaptive mechanisms to configure the communication parameters of LoRa networks in dense IoT scenarios. To this end, we develop FLoRa, an open-source framework for end-to-end LoRa simulations in OMNeT++. We then implement and evaluate the Adaptive Data Rate (ADR) mechanism built into LoRa to dynamically manage link parameters for scalable and efficient network operations. Extensive simulations show that ADR is effective in increasing the network delivery ratio under stable channel conditions, while keeping the energy consumption low. Our results also show that the performance of ADR is severely affected by a highly-varying wireless channel. We thereby propose an improved version of the original ADR mechanism to cope with variable channel conditions. Our proposed solution significantly increases both the reliability and the energy efficiency of communications over a noisy channel, almost irrespective of the network size. Finally, we show that the delivery ratio of very dense networks can be further improved by using a network-aware approach, wherein the link parameters are configured based on the global knowledge of the network.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91373774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 206
The smallest software defined network testbed in the world: Performance and security 世界上最小的软件定义网络测试平台:性能和安全性
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406116
Song Wang, K. G. Chavez, K. Sithamparanathan, Paul Zanna
{"title":"The smallest software defined network testbed in the world: Performance and security","authors":"Song Wang, K. G. Chavez, K. Sithamparanathan, Paul Zanna","doi":"10.1109/NOMS.2018.8406116","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406116","url":null,"abstract":"Zodiac-FX is the first OpenFlow switch designed to sit on a desk, not in a datacenter. In this demo, we present Zodiac-FX the world's smallest OpenFlow Software Defined Network Switch. Our main objective is to showcase the usage and functionalities of Zodiac-FX in handling OpenFlow protocol. We will also demonstrate SDN sEcure COntrol and Data Plane (SECOD), an SDN secure controller algorithm to detect and defend SDN against DoS attacks. We will demonstrate Zodiac-FX and SECOD value via experiments within real traffic and Denial- of-Service (DoS) attacks allowing the audience to interact with the complete toolkit system.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80758472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detecting malicious authentication events trustfully 信任地检测恶意身份验证事件
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406295
Georgios Kaiafas, Georgios Varisteas, S. Lagraa, R. State, Duy Cu Nguyen, Thorsten Ries, M. Ourdane
{"title":"Detecting malicious authentication events trustfully","authors":"Georgios Kaiafas, Georgios Varisteas, S. Lagraa, R. State, Duy Cu Nguyen, Thorsten Ries, M. Ourdane","doi":"10.1109/NOMS.2018.8406295","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406295","url":null,"abstract":"Anomaly detection on security logs is receiving more and more attention. Authentication events are an important component of security logs, and being able to produce trustful and accurate predictions minimizes the effort of cyber-experts to stop false attacks. Observed events are classified into Normal, for legitimate user behavior, and Malicious, for malevolent actions. These classes are consistently excessively imbalanced which makes the classification problem harder; in the commonly used Los Alamos dataset, the malicious class comprises only 0.00033% of the total. This work proposes a novel method to extract advanced composite features, and a supervised learning technique for classifying authentication logs trustfully; the models are Random Forest, LogitBoost, Logistic Regression, and ultimately Majority Voting which leverages the predictions of the previous models and gives the final prediction for each authentication event. We measure the performance of our experiments by using the False Negative Rate and False Positive Rate. In overall we achieve 0 False Negative Rate (i.e. no attack was missed), and on average a False Positive Rate of 0.0019.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83558289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A blockchain-based PKI management framework 基于区块链的PKI管理框架
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406325
A. Yakubov, Wazen M. Shbair, Anders Wallbom, David Sanda, R. State
{"title":"A blockchain-based PKI management framework","authors":"A. Yakubov, Wazen M. Shbair, Anders Wallbom, David Sanda, R. State","doi":"10.1109/NOMS.2018.8406325","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406325","url":null,"abstract":"Public-Key Infrastructure (PKI) is the cornerstone technology that facilitates secure information exchange over the Internet. However, PKI is exposed to risks due to potential failures of Certificate Authorities (CAs) that may be used to issue unauthorized certificates for end-users. Many recent breaches show that if a CA is compromised, the security of the corresponding end-users will be in risk. As an emerging solution, Blockchain technology potentially resolves the problems of traditional PKI systems - in particular, elimination of single point-of-failure and rapid reaction to CAs shortcomings. Blockchain has the ability to store and manage digital certificates within a public and immutable ledger, resulting in a fully traceable history log. In this paper we designed and developed a blockchain-based PKI management framework for issuing, validating and revoking X.509 certificates. Evaluation and experimental results confirm that the proposed framework provides more reliable and robust PKI systems with modest maintenance costs.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88531473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Multi-operator backup power sharing in wireless base stations 无线基站中多运营商备用电源共享
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406244
Minh N. H. Nguyen, Nguyen H. Tran, M. A. Islam, Chuan Pham, Shaolei Ren, C. Hong
{"title":"Multi-operator backup power sharing in wireless base stations","authors":"Minh N. H. Nguyen, Nguyen H. Tran, M. A. Islam, Chuan Pham, Shaolei Ren, C. Hong","doi":"10.1109/NOMS.2018.8406244","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406244","url":null,"abstract":"Installation of backup power supply plays a vital role in maintaining communication services which can save billions of dollars as well as human lives during natural disasters. Due to the higher capital and operational expense compared to public power, pooling and sharing the backup power supplies can be an economical solution since the backup power capacity can be sized based on the aggregate demand of co-located operators. However, how to pool and share the backup power at multi-operator cellular sites in a fair manner should be considered due to the limited capacity and high user demands. In this paper, we adopt the Nash Bargaining Solution (NBS) of a bargaining problem which can guarantee the fairness of backup power sharing and design a decentralized algorithm approach with lim­ited information exchange among the operators. Our simulation demonstrates that the sharing the backup power reduces the average delay and requires less BS power consumption than the non-sharing approach, especially for high traffic load scenarios. In addition, we also extend the formulation with respect to admission control for very high traffic demand cases.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90775537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Passive os fingerprinting methods in the jungle of wireless networks 被动操作系统指纹识别方法在无线网络丛林
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406262
Martin Laštovička, Tomás Jirsík, Pavel Čeleda, Stanislav Špaček, Daniel Filakovsky
{"title":"Passive os fingerprinting methods in the jungle of wireless networks","authors":"Martin Laštovička, Tomás Jirsík, Pavel Čeleda, Stanislav Špaček, Daniel Filakovsky","doi":"10.1109/NOMS.2018.8406262","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406262","url":null,"abstract":"Operating system fingerprinting methods are well- known in the domain of static networks and managed environments. Yet few studies tackled this challenge in real networks, where users can bring and connect any device. We evaluate the performance of three OS fingerprinting methods on a large dataset collected from university wireless network. Our results show that method based on HTTP User-agents is the most accurate but can identify only low portion of the traffic. TCP/IP parameters method proved to be the opposite with high coverage but low accuracy. We also implemented a new method based on detection of communication to OS-specific domains. Its performance is comparable to the two established ones. Next, we discuss the impacts of traffic encryption and embracing new protocols such as IPv6 or HTTP/2.0 on OS fingerprinting. Our findings suggest that OS identification based on specific domain detection is viable and corresponds to the current directions of network traffic evolution, while methods based on TCP/IP parameters and User-agents will become ineffective in the future.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90463497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Toward real-time network-wide cyber situational awareness 走向实时的全网网络态势感知
NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2018-04-23 DOI: 10.1109/NOMS.2018.8406166
Tomás Jirsík, Pavel Čeleda
{"title":"Toward real-time network-wide cyber situational awareness","authors":"Tomás Jirsík, Pavel Čeleda","doi":"10.1109/NOMS.2018.8406166","DOIUrl":"https://doi.org/10.1109/NOMS.2018.8406166","url":null,"abstract":"In today's complex computer networks, we are constantly facing a risk of data loss, system compromise, or intellectual property theft. The complexity of the networks hinders their effective defense. A Network-wide Cyber Situational Awareness (NwCSA) has been introduced to assist a network security administrator with network security. The concept, how-ever, faces several challenges that hinder an efficient application of the NwCSA in a real-world environment. The challenges include the overload of raw data, low speed of reaction, and a lack of context and unified view on a network. In this paper, we present a novel framework that faces above mentioned challenges. The framework leverages a distributed data stream processing system and methods for real-time big data processing. The framework is evaluated with respect to stated requirements on systems for NwCSA. Moreover, we present a prototype framework implementation and provide lessons learned from its real-world deployment.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76575305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信