Gyeongsik Yang, Kyungwoon Lee, Wontae Jeong, C. Yoo
{"title":"Flo-v: Low Overhead Network Monitoring Framework in Virtualized Software Defined Networks","authors":"Gyeongsik Yang, Kyungwoon Lee, Wontae Jeong, C. Yoo","doi":"10.1145/2935663.2935677","DOIUrl":"https://doi.org/10.1145/2935663.2935677","url":null,"abstract":"Network virtualization involves creating multiple virtual networks within a physical network, based on the flexible network environment of software-defined networking (SDN). In a virtualized SDN (vSDN), a network hypervisor plays a key role in translating physical network resources into virtual network resources. However, this translation in vSDN incurs considerable overhead in network monitoring that is critical for network management. In this paper, we propose Flo-v to provide network monitoring in a vSDN. Flo-v provides accurate monitoring information to a vSDN and, by applying selective and adaptive approaches, it monitors traffic in a network hypervisor with lower overhead than existing schemes. We compare the proposed Flo-v with existing schemes, and demonstrate that Flo-v provides accurate network information with reduced resource usage in terms of both the network and CPU, with approximately 50% less overhead than existing schemes.","PeriodicalId":305382,"journal":{"name":"Proceedings of the 11th International Conference on Future Internet Technologies","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132957975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuan Hu, Banghuai Li, Yang Zhang, Changling Zhou, Hao Ma
{"title":"Detecting Compromised Email Accounts from the Perspective of Graph Topology","authors":"Xuan Hu, Banghuai Li, Yang Zhang, Changling Zhou, Hao Ma","doi":"10.1145/2935663.2935672","DOIUrl":"https://doi.org/10.1145/2935663.2935672","url":null,"abstract":"While email plays a growingly important role on the Internet, we are faced with more severe challenges brought by compromised email accounts, especially for the administrators of institutional email service providers. Inspired by the previous experience on spam filtering and compromised accounts detection, we propose several criteria, like Success Outdegree Proportion, Reverse Pagerank, Recipient Clustering Coefficient and Legitimate Recipient Proportion, for compromised email accounts detection from the perspective of graph topology in this paper. Specifically, several widely used social network analysis metrics are used and adapted according to the characteristics of mail log analysis. We evaluate our methods on a dataset constructed by mining the one month (30 days) mail log from an university with 118,617 local users and 11,460,399 mail log entries. The experimental results demonstrate that our methods achieve very positive performance, and we also prove that these methods can be efficiently applied on even larger datasets.","PeriodicalId":305382,"journal":{"name":"Proceedings of the 11th International Conference on Future Internet Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114430071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Easy Defense Mechanism Against Botnet-based DDoS Flooding Attack Originated in SDN Environment Using sFlow","authors":"Yiqin Lu, M. Wang","doi":"10.1145/2935663.2935674","DOIUrl":"https://doi.org/10.1145/2935663.2935674","url":null,"abstract":"As today's networks become larger and more complex, the Distributed Denial of Service (DDoS) flooding attack threats may not only come from the outside of networks but also from inside, such as cloud computing network where exists multiple tenants possibly containing malicious tenants. So, the need of source-based defense mechanism against such attacks is pressing. In this paper, we mainly focus on the source-based defense mechanism against Botnet-based DDoS flooding attack through combining the power of Software-Defined Networking (SDN) and sample flow (sFlow) technology. Firstly, we defined a metric to measure the essential features of this kind attack which means distribution and collaboration. Then we designed a simple detection algorithm based on statistical inference model and response scheme through the abilities of SDN. Finally, we developed an application to realize our idea and also tested its effect on emulation network with real network traffic. The result shows that our mechanism could effectively detect DDoS flooding attack originated in SDN environment and identify attack flows for avoiding the harm of attack spreading to target or outside. We advocate the advantages of SDN in the area of defending DDoS attacks, because it is difficult and laborious to organize selfish and undisciplined traditional distributed network to confront well collaborative DDoS flooding attacks.","PeriodicalId":305382,"journal":{"name":"Proceedings of the 11th International Conference on Future Internet Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130240646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting DNS services from IP spoofing: SDN collaborative authentication approach","authors":"Nm Sahri, K. Okamura","doi":"10.1145/2935663.2935666","DOIUrl":"https://doi.org/10.1145/2935663.2935666","url":null,"abstract":"As DNS packet are mostly UDP-based, make it as a perfect tool for hackers to launch a well-known type of distributed denial of service (DDoS). The purpose of this attack is to saturate the DNS server availability and resources. This type of attack usually utilizes a large number of botnet and perform spoofing on the IP address of the targeted victim. We take a different approach for IP spoofing detection and mitigation strategies to protect the DNS server by utilizing Software Defined Networking (SDN). In this paper, we present CAuth, a novel mechanism that autonomously block the spoofing query packet while authenticate the legitimate query. By manipulating Openflow control message, we design a collaborative approach between client and server network. Whenever a server controller receives query packet, it will send an authentication packet back to the client network and later the client controller also replies via authentication packet back to the server controller. The server controller will only forward the query to the DNS server if it receives the replied authentication packet from the client. From the evaluation, CAuth instantly manage to block spoofing query packet while authenticate the legitimate query as soon as the mechanism started. Most notably, our mechanism designed with no changes in existing DNS application and Openflow protocol.","PeriodicalId":305382,"journal":{"name":"Proceedings of the 11th International Conference on Future Internet Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127909502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Establish the Intrinsic Binding in Naming Space for Future Internet Using Combined Public Key","authors":"Hongwei Meng, Zhong Chen, Jian-bin Hu, Zhi Guan","doi":"10.1145/2935663.2935676","DOIUrl":"https://doi.org/10.1145/2935663.2935676","url":null,"abstract":"In order to enable intrinsic security without the Public Key Infrastructure (PKI) deployment, flat self-certifying addresses have been involved into the future Internet architecture (FIA) designs. In contrast to deriving a self-certifying address from hashing of a correspondent prepared public key, we build up this self-certifying relationship along the reverse path using Combined Public Key (CPK). Our design develop the chain of trust embedded in the Internet name/address registration and allocation process for domains, hosts, services and content, to establish intrinsic bindings between three different identities: user-level human-readable names, network-level routable flat identifiers and the correspondent public keys. This binding connects the accountability between real-world space and network space. The use cases of our design are also given in named data networking (NDN) and identity/locator splitting network architecture, i.e. XIA and MobilityFirst. The analysis also shows that identity authentication based on CPK is capable of resource-constrained nodes in large-scale networks without scalability tradeoffs.","PeriodicalId":305382,"journal":{"name":"Proceedings of the 11th International Conference on Future Internet Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117031371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing a Dynamically Reconfigurable Wireless Mesh Network Testbed for Multi-Faceted QoS Support","authors":"Si Young Jang, B. Shin, Dongman Lee","doi":"10.1145/2935663.2935678","DOIUrl":"https://doi.org/10.1145/2935663.2935678","url":null,"abstract":"Various mobile applications require different QoS requirements, thus there is a need to resolve the application requirement into the underlying mesh network to support them. Existing approach to coordinate the application traffic requirement to underlying network has been applied in wired domains. However, it is complex in the wireless domain due to the mobility and diversity of mobile applications. Much interest is focused on resolving application QoS and match request to mesh network link availability. We propose a testbed architecture which allows dynamic configuration of mesh networks and coordination of each flow to support application-aware QoS. Our prototype testbed shows adaptive change in mesh network routing configuration depending on application requests.","PeriodicalId":305382,"journal":{"name":"Proceedings of the 11th International Conference on Future Internet Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116858471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deployment and Evaluation of Software-Defined Inter-Connections for Multi-domain Federated SDN-Cloud","authors":"A. C. Risdianto, Junsik Shin, JongWon Kim","doi":"10.1145/2935663.2935683","DOIUrl":"https://doi.org/10.1145/2935663.2935683","url":null,"abstract":"In this paper, we describe an on-going experimental effort to inter-connect and federate distributed SDN-cloud resources that are spread over separate administrative domains. The proposed Software-Defined Inter-Connections utilizes the mixture of tunnel-based overlay virtual networking and BGP-leveraged routing exchange for multi-domain-federated SDN-cloud. By leveraging SDN paradigm, the deployed prototype for Software- Defined Inter-Connections can enable mixture layer 2 and layer 3 inter-connection with flexible selection. The evaluation result shows the resemblance performance for layer 2 and layer 3, as well as the switchover between them.","PeriodicalId":305382,"journal":{"name":"Proceedings of the 11th International Conference on Future Internet Technologies","volume":"328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127129954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Directed-Propagation Link-State Routing Protocol for Information-Centric Networks","authors":"Lemei Huang, Yu Guan, Xinggong Zhang, Zongming Guo","doi":"10.1145/2935663.2935667","DOIUrl":"https://doi.org/10.1145/2935663.2935667","url":null,"abstract":"This paper presents the design of Directed-Propagation Link-State Routing Protocol (DPLSR), which tries to address the issue of prefix flooding storm in NDN Link-state Routing Protocol. Since the number of data object is several order of magnitude of that of routers, legacy Link State Advertisements (LSAs) flooding model is no more appropriate in NDN. This paper proposes a LSA directed-propagation scheme that LSA messages are only forwarded towards Root anchor, not flooding. Upon requesting a data object, a Look-up message is sent towards Root anchor. When it encounters a router with accroding anchor and prefix information, an anchor list is returned. Users are able to access the nearest copy or build one or multi-path connections to the anchors. In DPLSR, messages are propagated along some paths, and only parts of router store prefix and anchor information. Thus, the communication overhead and prefix storage are reduced significantly compared with the existing NDN routing protocols. Simulated experiments also verifies the performance gain of DPLSR.","PeriodicalId":305382,"journal":{"name":"Proceedings of the 11th International Conference on Future Internet Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123514191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Fast Recovery from Unanticipated Data Access Failure in Named Data Networking","authors":"Xiaoyan Hu, J. Gong","doi":"10.1145/2935663.2935681","DOIUrl":"https://doi.org/10.1145/2935663.2935681","url":null,"abstract":"We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data as the Interest sent upstream in advance is recognized as a duplicate one due to its multipath forwarding and dropped by an upstream node. Furthermore, we introduce NDRUDAF, a mechanism based on negative acknowledgement for the router that aggregates the Interests to detect such unanticipated data access failure and assist the requester whose Interest is aggregated fast recovering from the failure. We qualitatively analyze the performance of the NDN with our proposal NDRUDAF and compare its performance with that of the present NDN. NDRUDAF improves the system performance in case of the unanticipated data access failure in terms of data access delay and network resource utilization efficiency at routers.","PeriodicalId":305382,"journal":{"name":"Proceedings of the 11th International Conference on Future Internet Technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126440668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Matching Algorithm for Content-based Publish/Subscribe Systems with Compound Predicates","authors":"Xilai Lv, Yongqiang Dong","doi":"10.1145/2935663.2935679","DOIUrl":"https://doi.org/10.1145/2935663.2935679","url":null,"abstract":"Publish/Subscribe paradigm has been widely used in large-scale distributed systems, as well as in information-centric networks (ICNs) due to its properties of asynchronous, loosely-coupled and many-to-many communications. This paper focuses on matching algorithms which support compound predicates for content-based Publish/Subscribe systems. By using index structures and transforming the complex subscription expressions, our algorithms can not only find proper recipients for emerging events, but also identify matched events for new subscription requests. Theoretical analysis and experimental results show that transforming the subscription expression by appropriate methods can enhance matching efficiency in terms of event and subscription matching time.","PeriodicalId":305382,"journal":{"name":"Proceedings of the 11th International Conference on Future Internet Technologies","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}