IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.最新文献

筛选
英文 中文
A case study of three open source security management tools 三个开源安全管理工具的案例研究
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. Pub Date : 2003-03-24 DOI: 10.1109/INM.2003.1194165
H. G. Kayacik, A. N. Zincir-Heywood
{"title":"A case study of three open source security management tools","authors":"H. G. Kayacik, A. N. Zincir-Heywood","doi":"10.1109/INM.2003.1194165","DOIUrl":"https://doi.org/10.1109/INM.2003.1194165","url":null,"abstract":"Three open source security management tools - Snort, Pakemon, and Argus $are benchmarked against the DARPA 1999 Intrusion Detection Evaluation Data Set. Performance is characterized using multiple performance metrics. Snort is found to have the best performance in terms of detection rate, however it creates more false positives than desired. The results show that different tools perform well under different attack categories; hence they can be run at the same time to increase the detection rate of attack instances.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123103482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Bands: an inter-domain Internet security policy management system for IPSec/VPN 频带:针对IPSec/VPN的跨域互联网安全策略管理系统
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. Pub Date : 2003-03-24 DOI: 10.1109/INM.2003.1194183
Yanyan Yang, Z. Fu, S. F. Wu
{"title":"Bands: an inter-domain Internet security policy management system for IPSec/VPN","authors":"Yanyan Yang, Z. Fu, S. F. Wu","doi":"10.1109/INM.2003.1194183","DOIUrl":"https://doi.org/10.1109/INM.2003.1194183","url":null,"abstract":"IPSec/VPN is widely deployed for users to remotely access their corporate data. IPSec policies must be correctly set up for VPN to provide anticipated protection. Manual policy setup is unscalable, inefficient and error-prone. Automated policy generation to comply with and enforce high-level security policies is desired but difficult, especially in an inter-domain environment when a VPN traverses multiple domains. This paper presents a distributed framework and protocol, BANDS, for inter-domain policy negotiation and generation. The BANDS architecture consists of two phases: AS (autonomous system) route path discovery and an inter-domain collaborative protocol for policy negotiation among the autonomous systems discovered in the first phase. Each AS conceptually has one security requirement server responsible for the task of inter-domain policy negotiation. Following this two-step process in BANDS, a set of distributed security policies (for the implementation of policy enforcement) is automatically negotiated/generated based on decentralized and predefined security requirements.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A management-aware software development process using design patterns 使用设计模式的具有管理意识的软件开发过程
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. Pub Date : 2003-03-24 DOI: 10.1109/INM.2003.1194212
O. Mehl, M. Becker, A. Köppel, P. Paul, Daniel Zimmermann, S. Abeck
{"title":"A management-aware software development process using design patterns","authors":"O. Mehl, M. Becker, A. Köppel, P. Paul, Daniel Zimmermann, S. Abeck","doi":"10.1109/INM.2003.1194212","DOIUrl":"https://doi.org/10.1109/INM.2003.1194212","url":null,"abstract":"The provision of quality-assured IT services through a service provider requires that all IT components involved in these services can be managed in an efficient and effective way. The necessary management infrastructure must be adapted to these IT components and must be standard-based to allow its integration into an overall management environment. The broad spectrum of applications differing in functionality and architecture together with the need for a deep correlation of the management infrastructure with the internal structure and processes of an application make it difficult to use pre-defined application management solutions off-the-shelf. The development process described in this paper addresses the problem by integrating the development of the management infrastructure into the software development process. The integration assures that the management infrastructure is adapted to the application to be managed. The infrastructure, including the management model as its core component, is based on the Common Information Model (CIM) standard. To support the development of the management model, a management design pattern catalog is introduced, that provides CIM-based patterns for the definition of standardized management models. The use of this catalog is demonstrated by an extension to the management model for the distributed Enterprise Resource Planning System R/3 of SAP AG.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125104948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Weaver: realizing a scalable management paradigm on commodity routers Weaver:在商用路由器上实现可伸缩的管理范例
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. Pub Date : 2003-03-24 DOI: 10.1109/INM.2003.1194195
K. Lim, R. Stadler
{"title":"Weaver: realizing a scalable management paradigm on commodity routers","authors":"K. Lim, R. Stadler","doi":"10.1109/INM.2003.1194195","DOIUrl":"https://doi.org/10.1109/INM.2003.1194195","url":null,"abstract":"While there is agreement on the drawbacks of centralized management, many approaches that address those do not scale well to large networks. We believe that effective management of future large-scale networks requires decentralized but coordinated control. In our previous work, we introduced the paradigm of pattern-based management, an approach that formalizes the use of graph traversal algorithms for controlling and coordinating lightweight agents that perform computations and data aggregation inside the network. We have shown analytically and through simulations that such a management system potentially scales to tens of millions of nodes, without significant performance problems regarding execution time and traffic overhead. We report on a first implementation designed to realize the paradigm. Our system, Weaver, consists of active nodes constructed from small, low-cost Linux computers that are deployed onto a network of commodity routers. Management programs are written in C++ and can be validated and tested for performance on a simulator before being deployed. From the design of Weaver, we derive a simple performance model that allows us to predict the performance of a management operation running on a Weaver system for a large-scale network and thus show that our system is likely to meet the scaling potential of the paradigm.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129922458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An architecture for provisioning IP services in an operations support system 在操作支持系统中提供IP服务的体系结构
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. Pub Date : 2003-03-24 DOI: 10.1109/INM.2003.1194198
A. John, B. Sugla, Hari Krishnan, E. Park, A. Raghu, R. Sequiera, A. Wanchoo
{"title":"An architecture for provisioning IP services in an operations support system","authors":"A. John, B. Sugla, Hari Krishnan, E. Park, A. Raghu, R. Sequiera, A. Wanchoo","doi":"10.1109/INM.2003.1194198","DOIUrl":"https://doi.org/10.1109/INM.2003.1194198","url":null,"abstract":"The paper discusses an architecture for a provisioning system that meets the challenges currently facing service providers in a service and subscriber-based OSS (operations support system) environment. The architecture makes a clear separation between a provisioning core, which is a general framework for provisioning services, and service definitions that model the provisioning view of a service. The architecture is distributed, scalable and extensible and is especially suited for scenarios where a large number of services is expected to be offered, deployed, and managed. The service definitions can be used by the other OSS components to correlate information to provide complete device-to-service-to-subscriber diagnostics for faults, performance degradations, and accounting. It is argued that this approach leads to natural, efficient and effective management solutions.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116300750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Monitoring distributed systems: a publish/subscribe methodology and architecture 监视分布式系统:发布/订阅方法和体系结构
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. Pub Date : 2003-03-24 DOI: 10.1109/INM.2003.1194162
K. Witting, J. Challenger, Brian O'Connell
{"title":"Monitoring distributed systems: a publish/subscribe methodology and architecture","authors":"K. Witting, J. Challenger, Brian O'Connell","doi":"10.1109/INM.2003.1194162","DOIUrl":"https://doi.org/10.1109/INM.2003.1194162","url":null,"abstract":"To support complex, rapidly changing, high-volume Web sites many components contribute to keeping the content current. Monitoring the workflow through all these components is a challenging task. This paper describes a system in which monitoring objects created by the various heterogeneous, distributed components are distributed to any application choosing to present monitoring information.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127911736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Peer-to-peer overlay network management through AGILE 通过AGILE进行点对点覆盖网络管理
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. Pub Date : 2003-03-24 DOI: 10.1109/INM.2003.1194190
J. Mischke, B. Stiller
{"title":"Peer-to-peer overlay network management through AGILE","authors":"J. Mischke, B. Stiller","doi":"10.1109/INM.2003.1194190","DOIUrl":"https://doi.org/10.1109/INM.2003.1194190","url":null,"abstract":"Currently, state of the art peer-to-peer (P2P) lookup mechanisms actively create and manage a peer application layer overlay network to achieve scalability and efficiency. The proposed mechanism AGILE (Adaptive Group-of-Interest-based Lookup Engine) extends this management approach, adapting the overlay network such as to bring requesting peers and desired lookup items close together, reducing the number of hops and, thus, latency as well as bandwidth requirements for a lookup. At the same time, AGILE introduces mechanisms to build a fair system.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127571892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Policy provisioning performance evaluation using COPS-PR in a policy based network 在基于策略的网络中使用COPS-PR进行策略供应性能评估
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. Pub Date : 2003-03-24 DOI: 10.1109/INM.2003.1194181
A. Corrente, M. Bernardi, R. Rinaldi
{"title":"Policy provisioning performance evaluation using COPS-PR in a policy based network","authors":"A. Corrente, M. Bernardi, R. Rinaldi","doi":"10.1109/INM.2003.1194181","DOIUrl":"https://doi.org/10.1109/INM.2003.1194181","url":null,"abstract":"This paper presents a study carried out to evaluate policy provisioning performance, by the COPS-PR protocol, in a policy based environment. First of all the prototypes developed are presented. These simulate the component behavior of the two lower layers of a policy based management system. Then the various measurements, done on the prototypes, are shown. All measures are carried out for several scenarios, described through the use of appropriate configuration policies, in an increasing complexity order. It is demonstrated that the architecture of COPS-PR is scalable, though the PDP can become a bottleneck.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133242969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using neural networks to identify control and management plane poison messages 利用神经网络识别控制和管理平面的有毒信息
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. Pub Date : 2003-03-24 DOI: 10.1109/INM.2003.1194215
Xiaojiang Du, M. Shayman, R. Skoog
{"title":"Using neural networks to identify control and management plane poison messages","authors":"Xiaojiang Du, M. Shayman, R. Skoog","doi":"10.1109/INM.2003.1194215","DOIUrl":"https://doi.org/10.1109/INM.2003.1194215","url":null,"abstract":"Poison message failure propagation is a mechanism that has been responsible for large scale failures in both telecommunications and IP networks: some or all of the network elements have a software or protocol 'bug' that is activated on receipt of a certain network control/management message (the poison message). This activated 'bug' will cause the node to fail with some probability. If the network control or management is such that this message is persistently passed among the network nodes, and if the node failure probability is sufficiently high, large-scale instability can result. Identifying the responsible message type can permit filters to be configured to block poison message propagation, thereby preventing instability. Since message types have distinctive modes of propagation, the node failure pattern can provide valuable information to help identify the culprit message type. Through extensive simulations, we show that artificial neural networks are effective in isolating the responsible message type.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123454424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using the Access Grid as a testbed for network management research 以接入网格为实验平台进行网络管理研究
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. Pub Date : 2003-03-24 DOI: 10.1109/INM.2003.1194176
C. Hood, S. Devarapalli, N. Gadhia, S. Hegde, V. Mallikarjuna, S. Shankar, Srikanth B. Yoginath
{"title":"Using the Access Grid as a testbed for network management research","authors":"C. Hood, S. Devarapalli, N. Gadhia, S. Hegde, V. Mallikarjuna, S. Shankar, Srikanth B. Yoginath","doi":"10.1109/INM.2003.1194176","DOIUrl":"https://doi.org/10.1109/INM.2003.1194176","url":null,"abstract":"There are many open issues in the field of network management. System data and/or operational experience can provide insight into these issues. Researchers often do not have access to such data or practical experience. To overcome this, we propose using the Access Grid as a testbed for network management research. The Access Grid is a multimedia collaboration environment that utilizes many different network technologies. We are using the Access Grid to collect data, gain operational experience and evaluate new management techniques.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131531639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信