{"title":"A controller agent model to counteract DoS attacks in multiple domains","authors":"U. Tupakula, V. Varadharajan","doi":"10.1109/INM.2003.1194168","DOIUrl":"https://doi.org/10.1109/INM.2003.1194168","url":null,"abstract":"In this paper we discuss techniques to prevent distributed denial of service (DDoS) attacks within the ISP domain and extend the scheme to prevent the attack in multiple ISP domains. With a new packet marking technique and agent design, our model is able to identify the approximate source of attack with a single packet and has many features to minimise DDoS attacks.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"29 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132286334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling preOS desktop management","authors":"T. Cruz, P. Simões","doi":"10.1109/INM.2003.1194189","DOIUrl":"https://doi.org/10.1109/INM.2003.1194189","url":null,"abstract":"Desktop management is probably the most resource-consuming task for the typical operations and support team, regardless of being frequently overlooked as not as complex or specialized as core network operations and management. Nowadays this scenario is even worse, since the increasing number and complexity of desktop systems was not matched by satisfactory management solutions - despite the relative success of products such as Intel's Landesk or Microsoft's SMS. In order to address this problem, we are exploring a different approach to desktop management, through the design and implementation of the openDMS management framework. This open source framework differs from available products in several points, such as earlier remote management mechanisms (prior to operating system load), incorporation of existing open standards, a network-centric architecture, operating system neutrality and tighter integration between traditional PC, thin clients and network PC. In this paper we discuss the current status of desktop management solutions and we present an overview of the OpenDMS approach, including its most relevant technical foundations and an application scenario.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114054471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RDF-based knowledge models for network management","authors":"Jun Shen, Yun Yang","doi":"10.1109/INM.2003.1194170","DOIUrl":"https://doi.org/10.1109/INM.2003.1194170","url":null,"abstract":"SMIng (next generation structure of management information), an information model for network management, is a prospective structure of management information. When deploying the multi-agent systems to network management environments, we have established a lightweight self-contained knowledge model based on RDF (resource description framework) and its extensions. We also present an implementation prototype to support agent communication and coordination by RDF-based languages.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114973127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Neisse, L. Granville, D. Ballvé, M. Almeida, L. Tarouco
{"title":"A dynamic SNMP to XML proxy solution","authors":"R. Neisse, L. Granville, D. Ballvé, M. Almeida, L. Tarouco","doi":"10.1109/INM.2003.1194204","DOIUrl":"https://doi.org/10.1109/INM.2003.1194204","url":null,"abstract":"The network management area has some proposals to use XML to encode information models and managed object instances. We present a solution to create SNMP to XML proxies dynamically using a SAX parser and translation facilities from the libsmi tools (see Strauss F., \"libsmi - a library to access SMI MIB information\", http://www.ibr.cs.tu-bs.de/projects/libsmi/). We also present an analysis system that uses the management information provided by the proxies in XML.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antonio E. Martínez, R. Cabello, Francisco J. Gómez-Arribas, Javier Martínez
{"title":"Interact-DDM: a solution for the integration of domestic devices on network management platforms","authors":"Antonio E. Martínez, R. Cabello, Francisco J. Gómez-Arribas, Javier Martínez","doi":"10.1109/INM.2003.1194205","DOIUrl":"https://doi.org/10.1109/INM.2003.1194205","url":null,"abstract":"The paper presents Interact-DDM (interact - domestic device management), a solution that integrates domestic devices with traditional computer networks. The architecture proposal is based on TCP/IP network management standards: SNMP protocol and management information bases (MIB). The centralized management operation has been enhanced with additional capabilities integrated on the agents. The design has been performed permitting a very flexible device definition and dynamic configuration. This is achieved by the meta-definition of devices in the system MIB. A laboratory experiment has been deployed to check and validate the design proposed, where multiple configurations have been tested, and the design modularity has been proved.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122629510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An SNMP agent for stateful intrusion inspection","authors":"L. Gaspary, E. Meneghetti, L. Tarouco","doi":"10.1109/INM.2003.1194156","DOIUrl":"https://doi.org/10.1109/INM.2003.1194156","url":null,"abstract":"Intrusion detection systems (IDS) have been increasingly used in organizations, in addition to other security mechanisms, to detect intrusions to systems and networks. In the recent years several IDS have been released, but (a) the high number of false alarms generated, (b) the lack of a high-level notation for attack signature specification, and (c) the difficulty to integrate IDS with existing network management infrastructure hinder their widespread and efficient use. In this paper we address these problems by presenting an SNMP agent for stateful intrusion inspection. By using a state machine-based language called PTSL (Protocol Trace Specification Language), the network manager can describe attack signatures that should be monitored. The signatures to be used by the agent are configured by the network manager through the IETF Script MIB. Once programmed, the agent starts monitoring the occurrence of the signatures on the network traffic and stores statistics, according to their occurrence, in an extended RMON2 MIB. These statistics may be retrieved from any SNMP-based management application and can be used to accomplish signature-based analysis. The paper also describes two experiments that have been carried out with the agent to assess its performance and to demonstrate its effectiveness in terms of false alarm generation rates.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125247901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing virtual storage systems: an approach using dependency analysis","authors":"Andrzej Kochut, G. Kar","doi":"10.1109/INM.2003.1194213","DOIUrl":"https://doi.org/10.1109/INM.2003.1194213","url":null,"abstract":"We present an approach for managing the performance of virtual storage systems by experimentally identifying the dependencies that exist between various components that comprise the system. Specifically, we show how one may profile dependencies between each logical volume exported by a storage system and components that this volume uses. To do so the technique estimates the arrival rate and size of requests issued to the internal system component as a functions of arrival rate and size of requests issued to the logical volume. The complete dependency profile of the system consists of a set of such functions for READ and WRITE operations separately and for each pair: logical volume - internal system component. The empirical technique of obtaining such profiles for typical existing storage systems is presented. We propose the use of Common Information Model (CIM) as a way to express dependency and performance information in an architecture-independent manner. The dependencies between components are computed as a fraction of bandwidth that is passed on to the sub-components. We discuss how the dependency profile of the system may be used to perform root-cause analysis and early Service Level Agreement violation notification. We also demonstrate the use of the method by applying it to a Linux system using software RAID.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127546090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Azagury, G. Goldszmidt, Yair Koren, Benny Rochwerger, A. Tal
{"title":"Khnum - a scalable rapid application deployment system for dynamic hosting infrastructures","authors":"A. Azagury, G. Goldszmidt, Yair Koren, Benny Rochwerger, A. Tal","doi":"10.1109/INM.2003.1194188","DOIUrl":"https://doi.org/10.1109/INM.2003.1194188","url":null,"abstract":"In a dynamically scalable hosting infrastructure for E-business computing, servers need to be quickly allocated in order to satisfy a sudden demand for increased computing power for a hosted site. Khnum is the applications and data management component of Oceano - a dynamically scalable hosting infrastructure for E-business computing utilities. It is responsible for server reconfiguration and for application deployment. Application deployment involves all services, configuration directives, executables and data of the application. A hosted site may include several applications. Khnum enables Oceano to rapidly deploy multiple applications to tens of servers simultaneously in just a few minutes. It uses AFS as the infrastructure for secure storage, automatically mapping files and directories onto the new servers' local filesystems and multicasting hot AFS cache content to the new servers. To avoid overloading the AFS servers during the deployment process, the hot cache content is multicast to all the new servers, avoiding the boot storming (or \"rushing\") effect. This, in turn, improves the scalability of the deployment process; experimental results attest to Khnum's scalability in simultaneously deploying applications to tens of servers.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"406 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133793728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GMPLS fault management and impact on service resilience differentiation","authors":"M. Brunner, Charlotte Hullo","doi":"10.1109/INM.2003.1194218","DOIUrl":"https://doi.org/10.1109/INM.2003.1194218","url":null,"abstract":"Generalized Multi-Protocol Label Switching (GMPLS) is currently under standardization. It basically reuses the MPLS control plane (IP routing and signaling) for various technologies such as fiber switching, DWDM, SONET, and packet MPLS. Since GMPLS runs in core networks, fault management is of major concern. However, fast fault recovery and backup capacity assignments are very expensive and not all customers need this or are willing to pay for it. Therefore, we propose in this paper to use several protection and bandwidth-sharing schemes on the same network in order to provide differentiated services in the resilience space. This means an operator can offer and provide several customized services. The service management system implementing, the schemes is built on top of a GMPLS network management system developed in our lab.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tariff-based pricing and admission control for DiffServ networks","authors":"Tianshu Li, Y. Iraqi, R. Boutaba","doi":"10.1109/INM.2003.1194161","DOIUrl":"https://doi.org/10.1109/INM.2003.1194161","url":null,"abstract":"In a QoS-enabled network environment, there are two major concerns from both user's and provider's points of views: are there enough resources available for a particular traffic flow and what is the price for this flow? These two questions are exactly what admission control and pricing try to answer. An architecture that integrates pricing and admission control seems very promising. In this paper, we propose a tariff-based pricing architecture that integrates pricing and admission control for the DiffServ networks. We also study some pricing setting strategies for our architecture and evaluate our strategies through simulations.","PeriodicalId":273743,"journal":{"name":"IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116407252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}