2019 15th International Conference on Network and Service Management (CNSM)最新文献

筛选
英文 中文
Look Ahead Distributed Planning For Application Management In Cloud 展望云应用管理的分布式规划
2019 15th International Conference on Network and Service Management (CNSM) Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012693
F. Zaker, Marin Litoiu, Mark Shtern
{"title":"Look Ahead Distributed Planning For Application Management In Cloud","authors":"F. Zaker, Marin Litoiu, Mark Shtern","doi":"10.23919/CNSM46954.2019.9012693","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012693","url":null,"abstract":"In this paper, we propose and implement a distributed autonomic manager to maintain service level agreements (SLA) for each application’ scenario. The proposed autonomic manager seeks to support SLAs by configuring bandwidth ratios for each application scenario using overlay network before provisioning more computing resources. The most important aspect of the proposed autonomic manager is scalability which allows us to deal with geographically distributed cloud-based applications and large volume of computation. This can be useful in look ahead optimization and when using complex models, such as machine learning. Through experiments on Amazon AWS cloud, we demonstrate the elasticity of the autonomic manager.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124290101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Can you hear me now? A call detail record based end-to-end diagnostics system for mobile networks 你现在能听到我说话吗?基于通话细节记录的移动网络端到端诊断系统
2019 15th International Conference on Network and Service Management (CNSM) Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012749
Anssi Tauriainen
{"title":"Can you hear me now? A call detail record based end-to-end diagnostics system for mobile networks","authors":"Anssi Tauriainen","doi":"10.23919/CNSM46954.2019.9012749","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012749","url":null,"abstract":"Automation of mobile network fault diagnostics and troubleshooting is critical for successful transformation to new network technologies such as 5G and core Network Function Virtualization (NFV). This paper presents a decision tree-based call detail record (CDR) labeling process, which is used to construct an automated end-to-end diagnostics system for mobile network faults. The presented diagnostics system will enable the utilization of automated troubleshooting systems, and the execution of automated corrective actions in third party systems such as Self-Organizing Network (SON) and NFV domain orchestrator.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Causal analysis of network logs with layered protocols and topology knowledge 利用分层协议和拓扑知识对网络日志进行原因分析
2019 15th International Conference on Network and Service Management (CNSM) Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012718
Satoru Kobayashi, Kazuki Otomo, K. Fukuda
{"title":"Causal analysis of network logs with layered protocols and topology knowledge","authors":"Satoru Kobayashi, Kazuki Otomo, K. Fukuda","doi":"10.23919/CNSM46954.2019.9012718","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012718","url":null,"abstract":"To detect root causes of failures in large-scale networks, we need to extract contextual information from operational data automatically. Correlation-based methods are widely used for this purpose, but they have a problem of spurious correlation, which buries truly important information. In this work, we propose a method for extracting contextual information in network logs by combining a graph-based causal inference algorithm and a pruning method based on domain knowledge (i.e., network protocols and topologies). Applying the proposed method to a set of log data collected from a nation-wide R & E network, we demonstrate that the pruning method reduced processing time by 74% compared with a single-handed causal analysis method, and it detected more useful information for troubleshooting compared with an existing area-based method.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130459077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Dynamic architecture based on network virtualization and distributed orchestration for management of autonomic network 基于网络虚拟化和分布式编排的自治网络管理动态体系结构
2019 15th International Conference on Network and Service Management (CNSM) Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012731
Guy Saadon, Yoram Haddad, N. Simoni
{"title":"Dynamic architecture based on network virtualization and distributed orchestration for management of autonomic network","authors":"Guy Saadon, Yoram Haddad, N. Simoni","doi":"10.23919/CNSM46954.2019.9012731","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012731","url":null,"abstract":"In network management architectures of 5G and IoT networks, standardization groups often consider the network resource virtualization layer between the physical network and the SDN controller, as a means to allow deployment and placement of network services with their virtual network functions. However, the following question arises: is this layer enough to react to real-time changes originating from customers or the network without interrupting the service? We consider that a dynamic architecture should allow different and evolving assemblies to be provisioned during a session, in order to meet modification requests without requiring total redesign of the network service. Therefore, in this study, we propose an enhanced architecture. This novel architecture adds a network virtualization layer above the SDN controller with its associated orchestrator. Then, efficiently distributing orchestration among the different layers ensures network autonomy. In this context, we show how real-time service modifications and network failures are handled without losing the existing services and how network management gains additional dynamicity and flexibility.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133430984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MENTOR: The Design and Evaluation of a Protection Services Recommender System 一个保护服务推荐系统的设计和评估
2019 15th International Conference on Network and Service Management (CNSM) Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012686
M. Franco, B. Rodrigues, B. Stiller
{"title":"MENTOR: The Design and Evaluation of a Protection Services Recommender System","authors":"M. Franco, B. Rodrigues, B. Stiller","doi":"10.23919/CNSM46954.2019.9012686","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012686","url":null,"abstract":"Cyberattacks are the cause of several damages on governments and companies in the last years. Such damage includes not only leaks of sensitive information, but also economic loss due to downtime of services. The security market size worth billions of dollars, which represents investments to acquire protection services and training response teams to operate such services, determines a considerable part of the investment in technologies around the world. Although a vast number of protection services are available, it is neither trivial for network operators nor end-users to choose one of them in order to prevent or mitigate an imminent attack. As the next-generation cybersecurity solutions are on the horizon, systems that simplify their adoption are still required in support of security management tasks. Thus, this paper introduces MENTOR, a support tool for cyber-security, focusing on the recommendation of protection services. MENTOR is able to (${a}$) to deal with different demands from the user and (${b}$) to recommend the adequate protection service in order to provide a proper level of cybersecurity in different scenarios. Four similarity measurements are implemented in order to prove the feasibility of the MENTOR’${s}$ engine. An evaluation determines the performance and accuracy of each measurement used during the recommendation process.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Flow-based Throughput Prediction using Deep Learning and Real-World Network Traffic 使用深度学习和真实网络流量的基于流量的吞吐量预测
2019 15th International Conference on Network and Service Management (CNSM) Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012716
Christoph Hardegen, Benedikt Pfülb, Sebastian Rieger, A. Gepperth, Sven Reissmann
{"title":"Flow-based Throughput Prediction using Deep Learning and Real-World Network Traffic","authors":"Christoph Hardegen, Benedikt Pfülb, Sebastian Rieger, A. Gepperth, Sven Reissmann","doi":"10.23919/CNSM46954.2019.9012716","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012716","url":null,"abstract":"We present a processing pipeline for flow-based throughput classification based on a machine learning component using deep neural networks (DNNs) that is trained to predict the likely bit rate of a real-world network traffic flow ahead of time. The DNN is trained and evaluated on a flow data stream as well as on a reference dataset collected from a university data center. Predicted bit rates are quantized into three classes instead of the common binary classification into “mice” and “elephant” flows. An in-depth description of the data acquisition process, including preprocessing steps and anonymization used to protect sensitive information, is given. We employ t-SNE (a state-of-the-art data visualization algorithm) to visualize network traffic data, thus enabling us to analyze and understand the characteristics of network traffic data and relations between communication flows at a glance. Additionally, an architecture for flow-based routing utilizing the developed pipeline is proposed as a possible use-case.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114199278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Learning From Evolving Network Data for Dependable Botnet Detection 从不断发展的网络数据中学习可靠的僵尸网络检测
2019 15th International Conference on Network and Service Management (CNSM) Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012710
Duc C. Le, A. N. Zincir-Heywood
{"title":"Learning From Evolving Network Data for Dependable Botnet Detection","authors":"Duc C. Le, A. N. Zincir-Heywood","doi":"10.23919/CNSM46954.2019.9012710","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012710","url":null,"abstract":"This work presents an emerging problem in real-world applications of machine learning (ML) in cybersecurity, particularly in botnet detection, where the dynamics and the evolution in the deployment environments may render the ML solutions inadequate. We propose an approach to tackle this challenge using Genetic Programming (GP) - an evolutionary computation based approach. Preliminary results show that GP is able to evolve pre-trained classifiers to work under evolved (expanded) feature space conditions. This indicates the potential use of such an approach for botnet detection under non-stationary environments, where much less data and training time are required to obtain a reliable classifier as new network conditions arise.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114216772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CNSM 2019 Cover Page CNSM 2019封面
2019 15th International Conference on Network and Service Management (CNSM) Pub Date : 2019-10-01 DOI: 10.23919/cnsm46954.2019.9012723
{"title":"CNSM 2019 Cover Page","authors":"","doi":"10.23919/cnsm46954.2019.9012723","DOIUrl":"https://doi.org/10.23919/cnsm46954.2019.9012723","url":null,"abstract":"","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network 基于区块链分散存储网络的任务分配池化方法
2019 15th International Conference on Network and Service Management (CNSM) Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012719
Iman Vakilinia, Shahin Vakilinia, S. Badsha, Engin Arslan, S. Sengupta
{"title":"Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network","authors":"Iman Vakilinia, Shahin Vakilinia, S. Badsha, Engin Arslan, S. Sengupta","doi":"10.23919/CNSM46954.2019.9012719","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012719","url":null,"abstract":"Blockchain technology has provided a solid system to develop incentivization algorithms using the smart contract. Blockchain applies the distributed ledger to store transaction histories, and the information is stored across a network of computers instead of on a single server. This facilitates the development of a new set of applications such as distributed file storage systems where users can rent out their storage in return for a premium. The distributed file storage systems provide more privacy and security compared to the centralized storage models as there is no need to have a trusted party. New schemes have been developed for distributed file storage systems on top of the blockchain platform, however, the problem of task/service allocation in these models have not been studied before. In this paper, we study the task/service allocation in the distributed file storage systems considering the challenge of computation cost. First, we formalize the problem of task/service allocation in a decentralized storage network, and then we discuss different approaches to allocate storage tasks to storage servers in an efficient manner. Moreover, we study the benefits of the cooperation (a.k.a pooling) in the storage and retrieval markets of distributed storage networks. The evaluation results show the benefit of our proposed pooling based approach in storage and retrieval markets.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"19 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120852830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Systematic Mapping on Orchestration of Container-based Applications in Fog Computing 雾计算中基于容器应用编排的系统映射
2019 15th International Conference on Network and Service Management (CNSM) Pub Date : 2019-10-01 DOI: 10.23919/CNSM46954.2019.9012677
Walter E. Santo, Rubens Souza Munhos Junior, A. Ribeiro, D. Silva, R. Santos
{"title":"Systematic Mapping on Orchestration of Container-based Applications in Fog Computing","authors":"Walter E. Santo, Rubens Souza Munhos Junior, A. Ribeiro, D. Silva, R. Santos","doi":"10.23919/CNSM46954.2019.9012677","DOIUrl":"https://doi.org/10.23919/CNSM46954.2019.9012677","url":null,"abstract":"There is an increasing number of Internet of Things (IoT) devices in the border of computer networks, requiring local processing and lightweight virtualization to deal with issues such as heterogeneity, Quality of Service (QoS) management, scalability, mobility, federation, and interoperability. Fog computing can provide the computational resources required by IoT devices to process their data. Low energy consumption and total cost of ownership are among the desirable properties for auxiliar infrastructures such as those deployed for fog computing, which do not require large computational power though. There is a noteworthy trend of undergoing research efforts towards the definition of software and hardware architectures for fog computing in this context. In this sense, this paper presents a Systematic Literature Mapping with the purpose of understanding and identifying metrics and gaps in current literature about orchestration of container-based applications, especially those hosted in clusters of Single Board Computer (SBC) platforms, such as Raspberry Pi, which have been used for deploying fog computing environments.","PeriodicalId":273818,"journal":{"name":"2019 15th International Conference on Network and Service Management (CNSM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129517597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信