2016 12th International Conference on Network and Service Management (CNSM)最新文献

筛选
英文 中文
On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC 椭圆曲线数字签名算法(ECDSA)在DNSSEC中的应用
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818428
R. V. Rijswijk-Deij, M. Jonker, A. Sperotto
{"title":"On the adoption of the elliptic curve digital signature algorithm (ECDSA) in DNSSEC","authors":"R. V. Rijswijk-Deij, M. Jonker, A. Sperotto","doi":"10.1109/CNSM.2016.7818428","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818428","url":null,"abstract":"The Domain Name System Security Extensions (DNSSEC) are steadily being deployed across the Internet. DNSSEC extends the DNS protocol with two vital security properties, authenticity and integrity, using digital signatures. While DNSSEC is meant to solve security issues in the DNS, it also introduces a new one: the digital signatures significantly increase DNS packet sizes, making DNSSEC an attractive vector to abuse in amplification denial-of-service attacks. By default, DNSSEC uses RSA for digital signatures. Earlier work has shown that alternative signature schemes, based on elliptic curve cryptography, can significantly reduce the impact of signatures on DNS response sizes. In this paper we study the actual adoption of ECDSA by DNSSEC operators, based on longitudinal datasets covering over 50% of the global DNS namespace over a period of 1.5 years. Adoption is still marginal, with just 2.3% of DNSSEC-signed domains in the .com TLD using ECDSA. Nevertheless, use of ECDSA is growing, with at least one large operator leading the pack. And adoption could be up to 42% higher. As we demonstrate, there are barriers to deployment that hamper adoption. Operators wishing to deploy DNSSEC using current recommendations (with ECDSA as signing algorithm) must be mindful of this when planning their deployment.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
On-demand, dynamic and at-the-edge VNF deployment model application to Web Real-Time Communications 按需、动态和边缘的VNF部署模型在Web实时通信中的应用
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818440
Amina Boubendir, E. Bertin, N. Simoni
{"title":"On-demand, dynamic and at-the-edge VNF deployment model application to Web Real-Time Communications","authors":"Amina Boubendir, E. Bertin, N. Simoni","doi":"10.1109/CNSM.2016.7818440","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818440","url":null,"abstract":"In the context of Network-as-a-Service (NaaS) for network operators openness towards Over-The-Top (OTTs) players, we propose an “On-demand and Dynamic Deployment Model for Virtual Network Functions (VNFs)”. We consider both, Telco's needs for more dynamicity in network service delivery, and OTTs' needs for network functions that support requirements of applications at the network-level. In order to allow third-party applications to request deployment of VNFs for specific needs, the proposed deployment model is based on an exposition approach that uses Network APIs over Network Functions Virtualization (NFV) Management and Orchestration modules. To illustrate the proposed model, we focus on Web Real-Time Communications (WebRTC). WebRTC applications are versatile and have strong needs for network functions which makes them a relevant use-case. We have implemented the proposed approach on OPNFV platform. We exploit the “at-the-edge” feature and location-awareness to respect the time-sensitivity and QoS constraints of WebRTC communications. For faster VNF instantiation, we rely on container-based virtualization (Docker containers). Finally, we perform experiments and evaluate the advantages of this model comparing to legacy and alternative approaches.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128146758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The curious case of parallel connections in HTTP/2 HTTP/2中并行连接的奇怪情况
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818414
Jawad Manzoor, I. Drago, R. Sadre
{"title":"The curious case of parallel connections in HTTP/2","authors":"Jawad Manzoor, I. Drago, R. Sadre","doi":"10.1109/CNSM.2016.7818414","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818414","url":null,"abstract":"Web pages and web-based services are becoming more and more complex. The average page size for the Alexa top 1000 websites in 2016 has reached 2.1 MB and fetching a page requires requests for 128 different objects. Although the bandwidth has been increasing exponentially in the last few years, the web experience is not improving at the same pace because of latency issues in HTTP/1. The HTTP/2 protocol aims to solve these issues by allowing clients and servers to multiplex HTTP requests and responses on a single TCP connection. If HTTP/2 is widely adopted, it can have enormous benefits not only for the user experience, but also for the servers and the network. Since clients do not have to open multiple parallel connections to avoid the problem of head-of-line blocking in HTTP/1.1, the number of concurrent TCP sessions can be significantly reduced. However, although multiplexing is one of the main features of HTTP/2, nothing actually prevents a client from opening multiple HTTP/2 connections to a server. In this paper we investigate the behavior of HTTP/2 traffic in the wild. We perform experiments to examine if web browsers use a single connection per domain over HTTP/2 in practice. Contrary to popular belief, our experiments on the traffic of a large university campus network and a residential network show that a significant number of HTTP/2 accesses are performed using parallel connections to a single domain on a server. We present two possible hypotheses for this behavior and discuss its implications for the future of the web.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132223595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Intent-based mobile backhauling for 5G networks 基于意图的5G网络移动回程
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818445
T. Subramanya, R. Riggio, T. Rasheed
{"title":"Intent-based mobile backhauling for 5G networks","authors":"T. Subramanya, R. Riggio, T. Rasheed","doi":"10.1109/CNSM.2016.7818445","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818445","url":null,"abstract":"Intent-based networking is a major component that will transform the manner in which the SDN/NFV-enabled future network infrastructures are operated. In particular, Intent-based networking is expected to play a major role in the multi-technological and software-defined 5G systems development roadmap. In this paper, we present the design and prototype implementation of an Intent-based mobile backhauling interface for 5G networks. Finally, we report on the empirical evaluation of of the proposed Intent-based interface over a small Enterprise WLAN. We also release the entire software stack under a permissive license for academic use.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Optimizing the RoI of cyber risk mitigation 优化网络风险缓解的投资回报率
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818421
Mohammed Noraden Alsaleh, G. Husari, E. Al-Shaer
{"title":"Optimizing the RoI of cyber risk mitigation","authors":"Mohammed Noraden Alsaleh, G. Husari, E. Al-Shaer","doi":"10.1109/CNSM.2016.7818421","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818421","url":null,"abstract":"In this paper, we present a security analytics framework that augments host compliance reports with network configuration to assess the risk globally and devise cost-effective mitigation plans. We define metrics to measure the global enterprise risk based on network assets' vulnerabilities, their inter-dependencies, and network configurations. Our framework takes the decision burden away from administrators by automatically recommending cost-effective mitigation actions that achieve the expected return on investment (RoI). We use XCCDF, a language defined as part of the Security Content Automation Protocol (SCAP), to communicate the compliance benchmarking and scoring reports. In addition, we utilize the basic metrics defined in the standard vulnerability scoring systems, such as CVSS, to accurately assess the global risk. We formalize our proposed mitigation planning solution as a constraints satisfaction problem and we solve it using the Z3 SMT solver.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126911265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Self-optimizing energy management in heterogeneous cellular networks 异构蜂窝网络中的自优化能量管理
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818418
Majid Ghaderi, Mohammad Naghibi
{"title":"Self-optimizing energy management in heterogeneous cellular networks","authors":"Majid Ghaderi, Mohammad Naghibi","doi":"10.1109/CNSM.2016.7818418","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818418","url":null,"abstract":"In this paper, we develop and evaluate a distributed algorithm to efficiently balance the trade-off between network throughput and energy consumption in a heterogeneous cellular network. We formulate the problem as a joint optimization of base station activation, power control and user association. To solve the problem, which is a non-convex optimization problem, we design a self-optimizing algorithm based on Gibbs sampling in which each base station individually optimizes its configuration without the involvement of any central controller. In our algorithm, base stations only need to exchange information in a locally defined neighborhood, yet the network state eventually converges to the global optimal. Simulation results are also provided, which show that, i) the proposed algorithm indeed converges to a state that is close to optimal, and ii) by dynamically activating base stations, we see about 10% reduction in network energy consumption without penalizing the network throughput.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128075499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NEMEA: A framework for network traffic analysis NEMEA:网络流量分析的框架
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818417
T. Čejka, Václav Bartos, Marek Svepes, Zdenek Rosa, H. Kubátová
{"title":"NEMEA: A framework for network traffic analysis","authors":"T. Čejka, Václav Bartos, Marek Svepes, Zdenek Rosa, H. Kubátová","doi":"10.1109/CNSM.2016.7818417","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818417","url":null,"abstract":"Since network attacks become more sophisticated, it is difficult to discover them using traditional analysis tools. For some kinds of attacks, it is necessary to analyze Application Layer (L7) information in order to detect them. However, there is a lack of existing tools capable of L7 processing and manipulation. Therefore, we propose a flow-based modular Network Measurements Analysis (NEMEA) system to overcome the situation. NEMEA is designed with respect to a stream-wise concept, i. e. data are analyzed continuously in memory with minimal data storage. NEMEA is developed as an open-source project and is publicly available for world-wide community. It is designed for both experimental and operational use. It is able to process off-line traffic traces as well as live network flows. The system is very flexible and can be easily extended by new modules. The modules are developed within a NEMEA framework that is a key component of the project. NEMEA thus represents a unified platform for research and development of new traffic analysis methods. It covers several important topics not limited to analysis and detection. Originally, NEMEA has been developed for the purposes of Czech National Research and Education Network operator. Therefore, it is focused on handling high speed network traffic with links working at 100Gbps.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Measuring auto switch between Wi-Fi and mobile data networks in an urban area 测量市区Wi-Fi和移动数据网络之间的自动切换
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818434
J. Hyun, Y. Won, D. Nahm, J. W. Hong
{"title":"Measuring auto switch between Wi-Fi and mobile data networks in an urban area","authors":"J. Hyun, Y. Won, D. Nahm, J. W. Hong","doi":"10.1109/CNSM.2016.7818434","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818434","url":null,"abstract":"To preserve consistent throughput, smartphones are equipped with a network switch feature (handover in heterogeneous networks). Frequent switching is often blamed to be a QoE downgrader in populated areas. In this paper, we measured auto switch occurrences between Wi-Fi and mobile data networks. We deployed an Android monitoring application for 89 participants and collected network status information up to 10 days long. We observed that auto switch occurred on average 2.53 times per hour and RTT decreased as the smartphone preferred to stay in Wi-Fi. Also, 68% of all users connected to Wi-Fi longer than the mobile data networks.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126499812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BRAHMA: An intelligent framework for automated scaling of streaming and deadline-critical workflows BRAHMA:一个智能框架,用于自动扩展流和截止日期关键工作流程
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818420
A. Atrey, Hendrik Moens, Gregory van Seghbroeck, B. Volckaert, F. Turck
{"title":"BRAHMA: An intelligent framework for automated scaling of streaming and deadline-critical workflows","authors":"A. Atrey, Hendrik Moens, Gregory van Seghbroeck, B. Volckaert, F. Turck","doi":"10.1109/CNSM.2016.7818420","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818420","url":null,"abstract":"The prevalent use of multi-component, multi-tenant models for building novel Software-as-a-Service (SaaS) applications has resulted in wide-spread research on automatic scaling of the resultant complex application workflows. In this paper, we propose a holistic solution to Automatic Workflow Scaling under the combined presence of Streaming and Deadline-critical workflows, called AWS-SD. To solve the AWS-SD problem, we propose a framework BRAHMA, that learns workflow behavior to build a knowledge-base and leverages this info to perform intelligent automated scaling decisions. We propose and evaluate different resource provisioning algorithms through CloudSim. Our results on time-varying workloads show that the proposed algorithms are effective and produce good cost-quality trade-offs while preventing deadline violations. Empirically, the proposed hybrid algorithm — combining learning and monitoring, is able to restrict deadline violations to a small fraction (3–5%), while only suffering a marginal increase in average cost per component of 1–2% over our baseline naïve algorithm, which provides the least costly provisioning but suffers from a large number (35–45%) of deadline violations.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130964013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detecting version number attacks in RPL-based networks using a distributed monitoring architecture 采用分布式监控架构检测基于路由控制协议的网络中的版本号攻击
2016 12th International Conference on Network and Service Management (CNSM) Pub Date : 2016-10-01 DOI: 10.1109/CNSM.2016.7818408
Anthéa Mayzaud, Rémi Badonnel, Isabelle Chrisment
{"title":"Detecting version number attacks in RPL-based networks using a distributed monitoring architecture","authors":"Anthéa Mayzaud, Rémi Badonnel, Isabelle Chrisment","doi":"10.1109/CNSM.2016.7818408","DOIUrl":"https://doi.org/10.1109/CNSM.2016.7818408","url":null,"abstract":"The concept of Internet of Things involves the deployment of Low power and Lossy Networks (LLN) allowing communications among pervasive devices such as embedded sensors. The IETF designed the Routing Protocol for Low power and Lossy Networks (RPL) for supporting these constrained networks. Keeping in mind the different requirements of such networks, the protocol supports multiple routing topologies, called DODAGs, built using different objective functions, so as to optimize routing based on several metrics. A DODAG versioning system is incorporated into RPL in order to ensure an optimized topology. However, an attacker can exploit this mechanism to damage the network and reduce its lifetime. In this paper we propose a detection strategy based on a distributed monitoring architecture with dedicated algorithms that is able to identify malicious nodes performing such attacks in RPL-based environments. The performance of this solution is evaluated through extensive experiments and its scalability is quantified considering a monitoring node placement method.","PeriodicalId":334604,"journal":{"name":"2016 12th International Conference on Network and Service Management (CNSM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133714808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信