2016 International Conference on Software Networking (ICSN)最新文献

筛选
英文 中文
A Sophisticated Packet Forwarding Scheme with Deep Packet Inspection in an OpenFlow Switch 一种基于OpenFlow交换机深度包检测的复杂包转发方案
2016 International Conference on Software Networking (ICSN) Pub Date : 2016-06-30 DOI: 10.1109/ICSN.2016.7501921
Choong-hee Cho, Jungbok Lee, Eun-Do Kim, J. Ryoo
{"title":"A Sophisticated Packet Forwarding Scheme with Deep Packet Inspection in an OpenFlow Switch","authors":"Choong-hee Cho, Jungbok Lee, Eun-Do Kim, J. Ryoo","doi":"10.1109/ICSN.2016.7501921","DOIUrl":"https://doi.org/10.1109/ICSN.2016.7501921","url":null,"abstract":"Network administrators can make their own programmable network by using an SDN infrastructure with the OpenFlow protocol. Through the OpenFlow protocol, a SDN controller instructs an OpenFlow switch to perform specific actions, such as service chaining, according to header fields of incoming packets. Our main goal is to support an extended view of the OpenFlow architecture by inspecting not only the packet header but also the payload information in the packets. For this purpose, we address a sophisticated packet forwarding scheme using DPI to inspect effectively all incoming packets. According to the results of our experiments, we choose the inside of a virtual switch as the most suitable position of the DPI module. In our scheme, there are a log server, a monitoring application, and DPI function for monitoring and managing network traffic. When the DPI module detects a predefined string pattern of bits in an incoming packet, the switch sends the matching information to the log server that stores logs that contain the detected pattern and resource usage. Then, the monitoring application periodically gathers log information on the log server to compare that information with predefined network policies. Finally, we show that the packets are dealt with in a more effective and efficient way in our sophisticated packet forwarding scheme.","PeriodicalId":282295,"journal":{"name":"2016 International Conference on Software Networking (ICSN)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Novel SDN Testbed with Virtual Network Functions Placement 虚拟网络功能配置的新型SDN试验台
2016 International Conference on Software Networking (ICSN) Pub Date : 2016-05-23 DOI: 10.1109/ICSN.2016.7501932
Li-Der Chou, Chia-Wei Tseng, Chih-Hua Tseng, Yi-Ming Chen
{"title":"The Novel SDN Testbed with Virtual Network Functions Placement","authors":"Li-Der Chou, Chia-Wei Tseng, Chih-Hua Tseng, Yi-Ming Chen","doi":"10.1109/ICSN.2016.7501932","DOIUrl":"https://doi.org/10.1109/ICSN.2016.7501932","url":null,"abstract":"The network architecture has been inadequate to meet the increasing internet demands driving the transformation of traditional network infrastructure. Software-defined networking (SDN), network functions virtualization (NFV) are complementary technologies that provide new solutions to design, build and operate networks. The purpose of this paper is to design and implement an SDN testbed that can provide experiment environment for researchers. NFV is the infrastructure upon which the SDN software can be run in addition to enhancing the operation efficiency and reducing the virtual network delays. The Shortest Path Algorithm based Sliced network Weighted Graph (SPA-SNWG) scheme is adopted to select the best use of virtual network resource for improving network utilization in the tsetbed. The experimental results show that the use of this mechanism can reduce the transmission delay from 3.21ms 0.46ms improving network performance and balancing bandwidth consumption among virtual network services.","PeriodicalId":282295,"journal":{"name":"2016 International Conference on Software Networking (ICSN)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114444890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IP Prefix Hijack Detection Using BGP Attack Signatures and Connectivity Tracking 基于BGP攻击签名和连通性跟踪的IP前缀劫持检测
2016 International Conference on Software Networking (ICSN) Pub Date : 2016-05-23 DOI: 10.1109/ICSN.2016.7501926
Hussain Alshamrani, B. Ghita
{"title":"IP Prefix Hijack Detection Using BGP Attack Signatures and Connectivity Tracking","authors":"Hussain Alshamrani, B. Ghita","doi":"10.1109/ICSN.2016.7501926","DOIUrl":"https://doi.org/10.1109/ICSN.2016.7501926","url":null,"abstract":"In spite of significant on-going research, the Border Gateway Protocol (BGP) still suffers vulnerability issues specially regarding impersonating the ownership of IP prefixes of ASes (Autonomous Systems). In this context, a number of research studies focused on securing the BGP through historical-based and statistical-based behavioural models. This paper proposes a novel method aiming to detect IP prefix hijacking incidents based on tracking the behaviour of suspicious ASes. The detection method uses signaturebased technique as a pre- process phase to separate suspicious announces (BGP updates) from benign announces. From a processing perspective, the outputs of signature-based algorithm are used as inputs for the detection method. Nine feature will be extracted from the ASpath attributes of potentially suspicious ASes. The features are considered a combination of the behavioral characteristics of the routers in relation to their connectivity. Based on these features and the best five supervised learning classifiers, we identify the hijacks. Under different learning algorithms, the detection method is able to detect the hijacks with a high accuracy especially with J48, which can detect the hijacks with 96%.","PeriodicalId":282295,"journal":{"name":"2016 International Conference on Software Networking (ICSN)","volume":"10 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120843618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Survey on Virtual Network Embedding in Optical Cloud Data Center Networks 光云数据中心网络中虚拟网络嵌入研究
2016 International Conference on Software Networking (ICSN) Pub Date : 2016-05-23 DOI: 10.1109/ICSN.2016.7501922
Cunqian Yu, Weigang Hou, Lei Guo
{"title":"A Survey on Virtual Network Embedding in Optical Cloud Data Center Networks","authors":"Cunqian Yu, Weigang Hou, Lei Guo","doi":"10.1109/ICSN.2016.7501922","DOIUrl":"https://doi.org/10.1109/ICSN.2016.7501922","url":null,"abstract":"An investigation on researches of technologies and applications tailored to optical-connection cloud data center networks (OCDCNs) is made in this article, moreover, the existing approaches of virtual network embedding (VNE) and future challenges are summarized for OCDCNs. Also, we propose a promising VNE solution in OCDCNs integrating both elastic optical networks and virtual concatenation technology.","PeriodicalId":282295,"journal":{"name":"2016 International Conference on Software Networking (ICSN)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123139938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of E-procurement System through UML using Data Mining Technique for Supplier Performance 基于UML的电子采购系统供应商绩效数据挖掘建模
2016 International Conference on Software Networking (ICSN) Pub Date : 2016-05-23 DOI: 10.1109/ICSN.2016.7501930
A. Alkhalifah, Gufran Ahmad Ansari
{"title":"Modeling of E-procurement System through UML using Data Mining Technique for Supplier Performance","authors":"A. Alkhalifah, Gufran Ahmad Ansari","doi":"10.1109/ICSN.2016.7501930","DOIUrl":"https://doi.org/10.1109/ICSN.2016.7501930","url":null,"abstract":"Nowadays, many business organizations face many challenges in their business environments. Most of the organizations have moved their business process from manual process to computerized process. To improve business activity and process efficiency. A number of studies point out the fact that software modeling has become the main concern of most of business organizations. The research on software modeling is still evolving. Moreover, the modeling of every business process is important to develop good software and design modeling and should not be ignored by the organization. This paper proposes a UML model for E-procurement System and implement model with the Data Mining technique. This model can be used to find the best suppliers for the organization. In this paper Activity diagram, Use Case diagram and Sequence diagram are designed.","PeriodicalId":282295,"journal":{"name":"2016 International Conference on Software Networking (ICSN)","volume":"88 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125939864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Estimating the Reliability of the Retrieval Systems Rankings 估计检索系统排名的可靠性
2016 International Conference on Software Networking (ICSN) Pub Date : 2016-05-23 DOI: 10.1109/ICSN.2016.7501924
Sri Devi Ravana, Zhang Shuxiang
{"title":"Estimating the Reliability of the Retrieval Systems Rankings","authors":"Sri Devi Ravana, Zhang Shuxiang","doi":"10.1109/ICSN.2016.7501924","DOIUrl":"https://doi.org/10.1109/ICSN.2016.7501924","url":null,"abstract":"Information retrieval evaluation based on the pooling method inherently poses biasness towards systems that contributed to the pool of judged documents. This may distort the results about the relative effectiveness of different retrieval strategies, or rather, the retrieval systems and thus result in unreliable system rankings. The purpose of this study is to suggest a technique to estimate the reliability of the retrieval system effectiveness rank in a list of ranked systems based on its performance in previous experiments. This can be also defined as the strength of rank for the individual retrieval system. By doing so, we will be able to predict the performance of each system in future experiments. To validate the proposed rank strength estimation method, an alternative systems ranking method is proposed to generate a new list of systems rankings which is used together with the proposed rank strength estimation method. The experimentation shows that the correlation coefficients remain above 0.8 across different number of experiments which means the new systems ranking is highly correlated with the gold standard. It suggests that the rank reliability estimation methods have effectively predicted the strength of the system ranks. And also, the results from both TREC 2004 and TREC 8 show the similar outcome which further confirms the effectiveness of the proposed rank reliability estimation method.","PeriodicalId":282295,"journal":{"name":"2016 International Conference on Software Networking (ICSN)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126728607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mac-Time-Stamping-based High-accuracy Time Synchronization for Wireless Sensor Networks 基于mac时间戳的无线传感器网络高精度时间同步
2016 International Conference on Software Networking (ICSN) Pub Date : 2016-05-23 DOI: 10.1109/ICSN.2016.7501927
Yushuang Zhang, Tie Qiu, Xize Liu, Yunchuan Sun, Aoyang Zhao, Feng Xia
{"title":"Mac-Time-Stamping-based High-accuracy Time Synchronization for Wireless Sensor Networks","authors":"Yushuang Zhang, Tie Qiu, Xize Liu, Yunchuan Sun, Aoyang Zhao, Feng Xia","doi":"10.1109/ICSN.2016.7501927","DOIUrl":"https://doi.org/10.1109/ICSN.2016.7501927","url":null,"abstract":"Time synchronization is essential for applications in Wireless Sensor Networks (WSNs). The accuracy and energy consumption are main factors to evaluate a time synchronization protocol. Pairwise Broadcast clock Synchronization (PBS) was proposed to greatly reduce energy consumption, especially in densely connected network. In PBS, some nodes only need to listen the overhead messages instead of broadcasting any messages. In this paper, we present a Mac-Time-Stamping-based High-accuracy Time Synchronization with 2 points Least Squares for Wireless Sensor Networks called PBS-2LS. It does not increase the number of broadcast messages compared with the original PBS, but changes the format of messages. The method of two points least squares is used to calculate the clock drift and offset. The timestamp of Mac layer is applied in our approach. Thus, the accuracy of our approach becomes higher than PBS and the energy consumption is similar to PBS. We use network tools NS-2 to evaluate our approach and compare it with PBS and TPSN, which are two existing time synchronization protocols. The simulation results show that accuracy and compensating clock drift are better than PBS and TPSN.","PeriodicalId":282295,"journal":{"name":"2016 International Conference on Software Networking (ICSN)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114707912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Flowtracker: A SDN Stateful Firewall Solution with Adaptive Connection Tracking and Minimized Controller Processing Flowtracker:一个具有自适应连接跟踪和最小化控制器处理的SDN状态防火墙解决方案
2016 International Conference on Software Networking (ICSN) Pub Date : 2016-05-23 DOI: 10.1109/ICSN.2016.7501925
Thuy Vinh Tran, Heejune Ahn
{"title":"Flowtracker: A SDN Stateful Firewall Solution with Adaptive Connection Tracking and Minimized Controller Processing","authors":"Thuy Vinh Tran, Heejune Ahn","doi":"10.1109/ICSN.2016.7501925","DOIUrl":"https://doi.org/10.1109/ICSN.2016.7501925","url":null,"abstract":"The introduction of Software Defined Networking (SDN) enables possibilities for the next generation of network where the network logic operation is separated from the constraints of underlying hardware. However, the new architecture of SDN also exposes many security risks such as controller DoS attack, configuration channel compromise. This paper analyzes the challenges of stateful firewall realization in SDN environment and presents FlowTracker - a novel stateful firewall solution focusing on maintaining the accuracy and agility of stateful firewall with reduced controller processing and communication overhead between control and data plane. The GENI test bed experiments validates FlowTracker its stateful packet tracking and acceptable level of latency increase.","PeriodicalId":282295,"journal":{"name":"2016 International Conference on Software Networking (ICSN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121812264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Model Driven Development of Android Application Prototypes from Windows Navigation Diagrams 基于Windows导航图的Android应用原型的模型驱动开发
2016 International Conference on Software Networking (ICSN) Pub Date : 2016-05-23 DOI: 10.1109/ICSN.2016.7501929
Thanaseth Channonthawat, Y. Limpiyakorn
{"title":"Model Driven Development of Android Application Prototypes from Windows Navigation Diagrams","authors":"Thanaseth Channonthawat, Y. Limpiyakorn","doi":"10.1109/ICSN.2016.7501929","DOIUrl":"https://doi.org/10.1109/ICSN.2016.7501929","url":null,"abstract":"In recent years, the growth of smartphone market has led to the increasing development of mobile application. The rapid approach of mobile application development would respond to the market growth. This paper presents a model driven approach for creating preliminary GUI source code of Android application from windows navigation diagrams. The input diagram is converted to XML used as the metadata for model transformation. The final results of XML and Java files will be obtained for each UI layout where the XML file contains UI element information, and the Java file contains the actions. The proposed methodology would promote the reusability due to the use of UI layout template. The automation with model transformation would also ensure the integrity of interfaces generated from the design with windows navigation diagrams.","PeriodicalId":282295,"journal":{"name":"2016 International Conference on Software Networking (ICSN)","volume":"264 20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Virtual Network Embedding in SDN/NFV based Fiber-Wireless Access Network 基于SDN/NFV的光纤无线接入网中的虚拟网络嵌入
2016 International Conference on Software Networking (ICSN) Pub Date : 2016-05-23 DOI: 10.1109/ICSN.2016.7501934
Pengchao Han, Lei Guo, Yejun Liu
{"title":"Virtual Network Embedding in SDN/NFV based Fiber-Wireless Access Network","authors":"Pengchao Han, Lei Guo, Yejun Liu","doi":"10.1109/ICSN.2016.7501934","DOIUrl":"https://doi.org/10.1109/ICSN.2016.7501934","url":null,"abstract":"Network Virtualization, which allows multiple Virtual Networks (VN) coexisting on a common Substrate Network (SN) with the guarantee of logical independence and security, provides a new solution for the global resource optimization of Fiber-Wireless (FiWi) access network. However, little attention has been paid to the implementation of the customized functions and protocols of VNs. Software-Defined Network (SDN), which changes how networks are managed by providing a logically centralized controller, is a revolution of network and becomes a promising way for the control and management of virtualized FiWi access network. Furthermore, Network Function Virtualization (NFV) has come into view for its ability of providing multiple network functions with low cost. Particularly, Virtual Network Embedding (VNE) is one of the most import issues in network virtualization. Prior works ignore the flexibility of resource reconfiguration of SN. In this paper, the architecture of SDN/NFV based FiWi access network virtualization is proposed. Under the proposed architecture, we further propose a VNE algorithm based on network reconfiguration. Two network reconfiguration operations are exploited and a channel reallocation scheme is proposed to restrict the channel reallocation cost of wireless radio interface. Simulation is implemented to demonstrate the effectiveness of proposed algorithm in increasing the VN acceptance ratio and the revenue of infrastructure provider.","PeriodicalId":282295,"journal":{"name":"2016 International Conference on Software Networking (ICSN)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134128947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信