{"title":"On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC","authors":"R. V. Rijswijk-Deij, M. Jonker, A. Sperotto","doi":"10.1109/CNSM.2016.7818428","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818428","url":null,"abstract":"The Domain Name System Security Extensions (DNSSEC) are steadily being deployed across the Internet. DNSSEC extends the DNS protocol with two vital security properties, authenticity and integrity, using digital signatures. While DNSSEC is meant to solve security issues in the DNS, it also introduces a new one: the digital signatures significantly increase DNS packet sizes, making DNSSEC an attractive vector to abuse in amplification denial-of-service attacks. By default, DNSSEC uses RSA for digital signatures. Earlier work has shown that alternative signature schemes, based on elliptic curve cryptography, can significantly reduce the impact of signatures on DNS response sizes. In this paper we study the actual adoption of ECDSA by DNSSEC operators, based on longitudinal datasets covering over 50% of the global DNS namespace over a period of 1.5 years. Adoption is still marginal, with just 2.3% of DNSSEC-signed domains in the .com TLD using ECDSA. Nevertheless, use of ECDSA is growing, with at least one large operator leading the pack. And adoption could be up to 42% higher. As we demonstrate, there are barriers to deployment that hamper adoption. Operators wishing to deploy DNSSEC using current recommendations (with ECDSA as signing algorithm) must be mindful of this when planning their deployment.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-demand, dynamic and at-the-edge VNF deployment model application to Web Real-Time Communications","authors":"Amina Boubendir, E. Bertin, N. Simoni","doi":"10.1109/CNSM.2016.7818440","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818440","url":null,"abstract":"In the context of Network-as-a-Service (NaaS) for network operators openness towards Over-The-Top (OTTs) players, we propose an “On-demand and Dynamic Deployment Model for Virtual Network Functions (VNFs)”. We consider both, Telco's needs for more dynamicity in network service delivery, and OTTs' needs for network functions that support requirements of applications at the network-level. In order to allow third-party applications to request deployment of VNFs for specific needs, the proposed deployment model is based on an exposition approach that uses Network APIs over Network Functions Virtualization (NFV) Management and Orchestration modules. To illustrate the proposed model, we focus on Web Real-Time Communications (WebRTC). WebRTC applications are versatile and have strong needs for network functions which makes them a relevant use-case. We have implemented the proposed approach on OPNFV platform. We exploit the “at-the-edge” feature and location-awareness to respect the time-sensitivity and QoS constraints of WebRTC communications. For faster VNF instantiation, we rely on container-based virtualization (Docker containers). Finally, we perform experiments and evaluate the advantages of this model comparing to legacy and alternative approaches.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128146758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The curious case of parallel connections in HTTP/2","authors":"Jawad Manzoor, I. Drago, R. Sadre","doi":"10.1109/CNSM.2016.7818414","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818414","url":null,"abstract":"Web pages and web-based services are becoming more and more complex. The average page size for the Alexa top 1000 websites in 2016 has reached 2.1 MB and fetching a page requires requests for 128 different objects. Although the bandwidth has been increasing exponentially in the last few years, the web experience is not improving at the same pace because of latency issues in HTTP/1. The HTTP/2 protocol aims to solve these issues by allowing clients and servers to multiplex HTTP requests and responses on a single TCP connection. If HTTP/2 is widely adopted, it can have enormous benefits not only for the user experience, but also for the servers and the network. Since clients do not have to open multiple parallel connections to avoid the problem of head-of-line blocking in HTTP/1.1, the number of concurrent TCP sessions can be significantly reduced. However, although multiplexing is one of the main features of HTTP/2, nothing actually prevents a client from opening multiple HTTP/2 connections to a server. In this paper we investigate the behavior of HTTP/2 traffic in the wild. We perform experiments to examine if web browsers use a single connection per domain over HTTP/2 in practice. Contrary to popular belief, our experiments on the traffic of a large university campus network and a residential network show that a significant number of HTTP/2 accesses are performed using parallel connections to a single domain on a server. We present two possible hypotheses for this behavior and discuss its implications for the future of the web.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132223595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intent-based mobile backhauling for 5G networks","authors":"T. Subramanya, R. Riggio, T. Rasheed","doi":"10.1109/CNSM.2016.7818445","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818445","url":null,"abstract":"Intent-based networking is a major component that will transform the manner in which the SDN/NFV-enabled future network infrastructures are operated. In particular, Intent-based networking is expected to play a major role in the multi-technological and software-defined 5G systems development roadmap. In this paper, we present the design and prototype implementation of an Intent-based mobile backhauling interface for 5G networks. Finally, we report on the empirical evaluation of of the proposed Intent-based interface over a small Enterprise WLAN. We also release the entire software stack under a permissive license for academic use.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing the RoI of cyber risk mitigation","authors":"Mohammed Noraden Alsaleh, G. Husari, E. Al-Shaer","doi":"10.1109/CNSM.2016.7818421","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818421","url":null,"abstract":"In this paper, we present a security analytics framework that augments host compliance reports with network configuration to assess the risk globally and devise cost-effective mitigation plans. We define metrics to measure the global enterprise risk based on network assets' vulnerabilities, their inter-dependencies, and network configurations. Our framework takes the decision burden away from administrators by automatically recommending cost-effective mitigation actions that achieve the expected return on investment (RoI). We use XCCDF, a language defined as part of the Security Content Automation Protocol (SCAP), to communicate the compliance benchmarking and scoring reports. In addition, we utilize the basic metrics defined in the standard vulnerability scoring systems, such as CVSS, to accurately assess the global risk. We formalize our proposed mitigation planning solution as a constraints satisfaction problem and we solve it using the Z3 SMT solver.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126911265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self-optimizing energy management in heterogeneous cellular networks","authors":"Majid Ghaderi, Mohammad Naghibi","doi":"10.1109/CNSM.2016.7818418","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818418","url":null,"abstract":"In this paper, we develop and evaluate a distributed algorithm to efficiently balance the trade-off between network throughput and energy consumption in a heterogeneous cellular network. We formulate the problem as a joint optimization of base station activation, power control and user association. To solve the problem, which is a non-convex optimization problem, we design a self-optimizing algorithm based on Gibbs sampling in which each base station individually optimizes its configuration without the involvement of any central controller. In our algorithm, base stations only need to exchange information in a locally defined neighborhood, yet the network state eventually converges to the global optimal. Simulation results are also provided, which show that, i) the proposed algorithm indeed converges to a state that is close to optimal, and ii) by dynamically activating base stations, we see about 10% reduction in network energy consumption without penalizing the network throughput.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128075499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Čejka, Václav Bartos, Marek Svepes, Zdenek Rosa, H. Kubátová
{"title":"NEMEA: A framework for network traffic analysis","authors":"T. Čejka, Václav Bartos, Marek Svepes, Zdenek Rosa, H. Kubátová","doi":"10.1109/CNSM.2016.7818417","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818417","url":null,"abstract":"Since network attacks become more sophisticated, it is difficult to discover them using traditional analysis tools. For some kinds of attacks, it is necessary to analyze Application Layer (L7) information in order to detect them. However, there is a lack of existing tools capable of L7 processing and manipulation. Therefore, we propose a flow-based modular Network Measurements Analysis (NEMEA) system to overcome the situation. NEMEA is designed with respect to a stream-wise concept, i. e. data are analyzed continuously in memory with minimal data storage. NEMEA is developed as an open-source project and is publicly available for world-wide community. It is designed for both experimental and operational use. It is able to process off-line traffic traces as well as live network flows. The system is very flexible and can be easily extended by new modules. The modules are developed within a NEMEA framework that is a key component of the project. NEMEA thus represents a unified platform for research and development of new traffic analysis methods. It covers several important topics not limited to analysis and detection. Originally, NEMEA has been developed for the purposes of Czech National Research and Education Network operator. Therefore, it is focused on handling high speed network traffic with links working at 100Gbps.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring auto switch between Wi-Fi and mobile data networks in an urban area","authors":"J. Hyun, Y. Won, D. Nahm, J. W. Hong","doi":"10.1109/CNSM.2016.7818434","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818434","url":null,"abstract":"To preserve consistent throughput, smartphones are equipped with a network switch feature (handover in heterogeneous networks). Frequent switching is often blamed to be a QoE downgrader in populated areas. In this paper, we measured auto switch occurrences between Wi-Fi and mobile data networks. We deployed an Android monitoring application for 89 participants and collected network status information up to 10 days long. We observed that auto switch occurred on average 2.53 times per hour and RTT decreased as the smartphone preferred to stay in Wi-Fi. Also, 68% of all users connected to Wi-Fi longer than the mobile data networks.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126499812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Atrey, Hendrik Moens, Gregory van Seghbroeck, B. Volckaert, F. Turck
{"title":"BRAHMA: An intelligent framework for automated scaling of streaming and deadline-critical workflows","authors":"A. Atrey, Hendrik Moens, Gregory van Seghbroeck, B. Volckaert, F. Turck","doi":"10.1109/CNSM.2016.7818420","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818420","url":null,"abstract":"The prevalent use of multi-component, multi-tenant models for building novel Software-as-a-Service (SaaS) applications has resulted in wide-spread research on automatic scaling of the resultant complex application workflows. In this paper, we propose a holistic solution to Automatic Workflow Scaling under the combined presence of Streaming and Deadline-critical workflows, called AWS-SD. To solve the AWS-SD problem, we propose a framework BRAHMA, that learns workflow behavior to build a knowledge-base and leverages this info to perform intelligent automated scaling decisions. We propose and evaluate different resource provisioning algorithms through CloudSim. Our results on time-varying workloads show that the proposed algorithms are effective and produce good cost-quality trade-offs while preventing deadline violations. Empirically, the proposed hybrid algorithm — combining learning and monitoring, is able to restrict deadline violations to a small fraction (3–5%), while only suffering a marginal increase in average cost per component of 1–2% over our baseline naïve algorithm, which provides the least costly provisioning but suffers from a large number (35–45%) of deadline violations.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130964013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting version number attacks in RPL-based networks using a distributed monitoring architecture","authors":"Anthéa Mayzaud, Rémi Badonnel, Isabelle Chrisment","doi":"10.1109/CNSM.2016.7818408","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818408","url":null,"abstract":"The concept of Internet of Things involves the deployment of Low power and Lossy Networks (LLN) allowing communications among pervasive devices such as embedded sensors. The IETF designed the Routing Protocol for Low power and Lossy Networks (RPL) for supporting these constrained networks. Keeping in mind the different requirements of such networks, the protocol supports multiple routing topologies, called DODAGs, built using different objective functions, so as to optimize routing based on several metrics. A DODAG versioning system is incorporated into RPL in order to ensure an optimized topology. However, an attacker can exploit this mechanism to damage the network and reduce its lifetime. In this paper we propose a detection strategy based on a distributed monitoring architecture with dedicated algorithms that is able to identify malicious nodes performing such attacks in RPL-based environments. The performance of this solution is evaluated through extensive experiments and its scalability is quantified considering a monitoring node placement method.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}