{"title":"Crowdsourced QoE evaluation of mobile device usage with consideration on user dependence","authors":"Fumiya Kobayashi, Ginga Kawaguti, Hideki Nojiri, Akira Takahashi","doi":"10.1109/APNOMS.2015.7275348","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275348","url":null,"abstract":"Crowdsourcing is widely used in mobile network quality data collection since it can derive huge amounts of data. Although the results of crowdsourcing measurement strongly depend on the monitor user population, requirements for monitor users in crowdsourcing measurement have not been fully considered. For this study, we analyzed the relationship between user attributes and measured QoE through crowdsourcing measurement. We also discuss the effect of user contexts on QoE, which differs from that of network performance.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122998736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defense technique against spoofing attacks using reliable ARP table in cloud computing environment","authors":"H. S. Kang, J. Son, C. Hong","doi":"10.1109/APNOMS.2015.7275401","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275401","url":null,"abstract":"Recently cloud service has been introduced in order for many enterprises to achieve purposes such as improvement in efficiency, cost reduction and revolution in business process. However spoofing or poison attacks on VM inside the cloud cause the deterioration of cloud system and those attacks can make the huddle for spreading the cloud services. Many researches are now under way to solve such problems but most of these seem to be passive and limited in terms of detecting attacks and applying to large scale of networks. In this paper, we propose a defense technique for loss of VM resources against the network attacks called spoofing of poison on OpenStack environment. In our proposal, we use reliable ARP table which makes our proposal more reliable in cloud computing environment. Finally we conclude this paper showing that the proposed mechanism is an effective way to defend the ARP spoofing attack.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129925955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Router offload strategies with an optical flow switch based on LCoS technologies","authors":"Yuh-Jiuh Cheng, Yhi Shiau, Shu-Ying Cheng","doi":"10.1109/APNOMS.2015.7275359","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275359","url":null,"abstract":"In this paper, we first introduce some current methods used in router offload strategies. Then we propose a new router offload method with an optical flow switch (OFS) based on LCoS (Liquid Crystal on Silicon) technologies. With the significant increase in broadband new services on the Internet, we can use this OFS router offload strategy to separate IP traffic smartly to allow the small packet traffic to be transferred with the existing IP network transmission and the larger packet flows such as photos and video data to be transferred using our proposed OFS method. The proposed 16 × 16 OFS using LCoS technologies without optical buffers can quickly transfer the big data to the output ports. The main purpose of OFS is that it can provide a new solution to solve high speed transmission requirements as an efficient router offload strategy. The router offload strategy with an OFS method can also be used in the all-optical content delivery network which is composed of OFSs for a large amount of photos and video data transmissions in the future.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PID-based adaptive control plane management method for software-defined networks","authors":"Jian Li, Jae-Hyoung Yoo, J. W. Hong","doi":"10.1109/APNOMS.2015.7275443","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275443","url":null,"abstract":"Software-Defined Network (SDN) is an emerging network paradigm which enables flexible network management by separating control plane from data plane. Since SDN adopts a centralized management scheme, with large scale SDN network, it brings intensive overhead to control plane. One way of limiting this overhead is to either distribute the overhead to multiple controllers, or offload the overhead to switches. However, both of the approaches require modification on SDN de-facto standard, therefore, it is not viable for practical use. As an alternative solution, we propose a new control plane management method without changing the underlying SDN protocol. The key idea of the proposed method is to maximize the switch resource utilization by maintaining as much information as possible inside the switches, so that the switches may less frequently query the controller for new information. However, it is non-trivial problem to control the switch resource utilization under the capacity, due to the absence of a detailed correlation model between resource utilization and the affecting parameters. To resolve this issue, our management method adopts a lightweight feedback loop based control scheme - Proportional-Integral-Derivative (PID) to adaptively tune the affecting parameters to minimize the control plane overhead, while avoiding the switch's resource exhaustion. We design and implement the proposed method as an SDN application and evaluate its performance in an emulated network.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116215595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dai Hoang Tran, Chuan Pham, Cuong T. Do, T. Dung, Nguyen H. Tran, E. Huh, C. Hong
{"title":"HiLiCLoud: High performance and lightweight mobile cloud infrastructure for monitor and benchmark services","authors":"Dai Hoang Tran, Chuan Pham, Cuong T. Do, T. Dung, Nguyen H. Tran, E. Huh, C. Hong","doi":"10.1109/APNOMS.2015.7275356","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275356","url":null,"abstract":"In the area of cloud infrastructure environment, the management tool to monitor and control the cloud resources is the important factor that can drive the cost benefit of the cloud vendors. But most these tools are bundled within the high cost commercial platforms and are optimized to run on desktop computers. With the vision that Mobile Cloud Computing will be the future technology paradigm that dominates the IT industry, we want to create a cloud management tool that is open source, fast, lightweight and mobile friendly. We take the initial steps by implementing our framework using several popular technologies such as RESTful, Java Message Service, JSON, and we call it “High performance and Lightweight Mobile Cloud Infrastructure Monitor and Benchmark Service” or HiLiCloud. The initial testings show competitive evaluation results.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131329296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. G. D. Nugraha, M. F. Muthohar, J. Prayuda, Priagung Khusumanegara, Deokjai Choi
{"title":"Time-based DDoS detection and mitigation for SDN controller","authors":"I. G. D. Nugraha, M. F. Muthohar, J. Prayuda, Priagung Khusumanegara, Deokjai Choi","doi":"10.1109/APNOMS.2015.7275389","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275389","url":null,"abstract":"A Software Defined Network (SDN) is a new paradigm in network management that separates control plane and data plane. A control plane has an important role in managing the whole networks. Since SDN introduces control plane as the manager of the network, it also introduces the single point of failure. When SDN controller is unreachable by the network devices, the whole networks will collapse. One of the attack methods that can make SDN controller unreachable is DDoS attack. This paper reports our initial step of our research to develop the method for DDoS attack detection and mitigation for SDN controller. The method considers the time duration of DDoS attack detection and attacks time pattern of DDoS attack to prevent the future attack. In this paper, we present the potential vulnerabilities in SDN controller that can be exploited for DDoS attack and discuss the methods to detect and mitigate DDoS attack.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"67 39","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131638374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A procedure to achieve cost and performance optimization for recovery in cloud computing","authors":"Pham Phuoc Hung, Xuan-Qui Pham, Ga-Won Lee, Bui Tuan-Anh, E. Huh","doi":"10.1109/APNOMS.2015.7275402","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275402","url":null,"abstract":"This research discusses a system architecture that comes up with potentially better resiliency and faster recovery from failures based on the renowned genetic algorithm. Additionally, we aim to achieve a globally optimized performance as well as a service solution that can remain financially and operationally balanced according to customer preferences. The proposed methodology has undergone numerous and severe evaluations to be proclaimed of their effectiveness and efficiency, even when put under tight comparison with other existing work.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. M. Ahsan Kazmi, Nguyen H. Tran, T. Ho, Thant Zin Oo, Tuan LeAnh, S. I. Moon, C. Hong
{"title":"Resource management in dense heterogeneous networks","authors":"S. M. Ahsan Kazmi, Nguyen H. Tran, T. Ho, Thant Zin Oo, Tuan LeAnh, S. I. Moon, C. Hong","doi":"10.1109/APNOMS.2015.7275383","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275383","url":null,"abstract":"The installation of low power small cells under macro cells using the same spectrum is a promising approach to enhance the spectral efficiency and data-rate for the end users. These installations are becoming very dense in order to support the users' requirements (especially 5G networks) which make resource allocation using the same spectrum a very challenging problem. In this study, we address the downlink resource allocation problem for underlay small cell tier. We formulate the optimization problem for resource (channel) allocation in small cells while keeping the total interference to macro tier under an acceptable level. The objective of resource allocation is to maximize the throughput of small cells under the cross tier interference constraint. We employ matching theory to find a stable match for the resource allocation problem. We simulate our proposition to validate the stability of the network and the convergence of the resource allocation algorithm in terms of rate in a dense heterogeneous network. The matching results in an optimal solution which outperforms the existing sub-optimal resource allocation solutions.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121274252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SDN and NFV benchmarking for performance and reliability","authors":"Taekhee Kim, Tae-Ryang Koo, E. Paik","doi":"10.1109/APNOMS.2015.7275403","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275403","url":null,"abstract":"With dynamic networking environment demands from Internet applications and services, network operators are adopting software-based infrastructure and functions. Software-Defined Networking (SDN) and Network Function Virtualization (NFV) promise increased flexibility and agility for their networks. Accordingly, the SDN and NFV performance benchmarking methodologies are under discussion in standardization bodies. SDN and NFV combine. Information Technology (IT) with Communication Technology (CT). As the benchmarking metrics are different between IT and CT, new benchmarking metrics are highly necessary. This paper introduces benchmarking test metrics presented in standardization bodies and proposes SDN and NFV benchmarking metrics for performance and reliability from the perspective of operators. Moreover, benchmarking influence elements are also considered. In conclusion, the paper discusses benchmarking issues to put SDN and NFV into practical uses.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128428113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seongbok Baik, Younggil Lim, Jongwoo Kim, Youngwoo Lee
{"title":"Adaptive flow monitoring in SDN architecture","authors":"Seongbok Baik, Younggil Lim, Jongwoo Kim, Youngwoo Lee","doi":"10.1109/APNOMS.2015.7275368","DOIUrl":"https://doi.org/10.1109/APNOMS.2015.7275368","url":null,"abstract":"The SDN controllers maintain the flow tables to manage all the data flows passing through the SDN switches. In some cases, monitoring activities are required for the specific flows to detect the special events. Current de facto standard of SDN architecture enforces SDN switch to stay awake all the time from the time it receives the event monitoring request from SDN controller to catch the target event on the corresponding flow. This mechanism might disturb the fundamental SDN philosophy, which recommends the SDN switch to focus on the data forwarding, resulting in the degrading the performance of the whole SDN network. In order to tackle this problem in the real world domain, this paper focuses on the flow monitoring procedure described in OpenFlow specification version 1.4[1]. Starting from pointing out the problem of the current procedure in OpenFlow specification 1.4, we propose the detailed brand-new procedure, improved message format, and the system configuration to resolve the corresponding problem. The proposed idea can help the network service provider to build and operate their networks more efficiently and effectively.","PeriodicalId":269263,"journal":{"name":"2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}