Samuel Jero, V. Gurbani, Raymond B. Miller, Bruce Cilli, Chuck Payette, Sameerkumar Sharma
{"title":"Dynamic control of real-time communication (RTC) using SDN: A case study of a 5G end-to-end service","authors":"Samuel Jero, V. Gurbani, Raymond B. Miller, Bruce Cilli, Chuck Payette, Sameerkumar Sharma","doi":"10.1109/NOMS.2016.7502922","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502922","url":null,"abstract":"The next-generation 5G mobile network architecture will support the rapid deployment of new, dynamic network services that are capable of responding to current network conditions and demands. Software-defined Networking (SDN), virtualization technologies, and real-time analytics are the core components that will enable an adaptive and responsive 5G network. We present a case study of a real-time communications (RTC) video service that highlights the manner in which the core components (SDN, virtualization, analytics) allow a flexible and elastic 5G network. Because an end-to-end 5G network does not exist today, we construct one using artifacts from the current 4G/LTE network to host our dynamic network enabled RTC service. We identify three main insights from executing our service that could prove beneficial to the 5G network evolution: need for efficient horizontal control, need to limit identifier proliferation, and the existence of control-plane network functions in service network-function graphs.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126914047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ricardo Macedo, A. Santos, Y. Ghamri-Doudane, M. N. Lima
{"title":"A scheme for DDoS attacks mitigation in IdM systems through reorganizations","authors":"Ricardo Macedo, A. Santos, Y. Ghamri-Doudane, M. N. Lima","doi":"10.1109/NOMS.2016.7502825","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502825","url":null,"abstract":"Identity management (IdM) systems employ Identity Providers (IdPs), as guardians of users' critical information. However, Distributed Denial-of-Service (DDoS) attacks can make IdPs operations unavailable, compromising legitimate users. In the literature, the main countermeasures against DDoS attacks are based on either the application of external resources to extend the system lifetime (replication) or on the DDoS attacks detection. The first approach increases the solutions cost, and in general the second one is prone to high rates of false negatives and/or false positives. This work presents SAMOS, a first scheme to mitigate DDoS attacks in IdM systems through a novel approach: organizations of IdP clustering using optimization techniques. SAMOS is started based on the monitoring of processing and memory resources, differently from the solutions in the literature that are started based on the attack detection by the network traffic analysis. SAMOS minimizes the DDoS attacks effects using operational IdPs in the system, differently from the works that employ external computer resources. Results considering data from real IdM systems indicate the scheme viability.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121494826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naomi Kuze, S. Ishikura, Takeshi Yagi, Daiki Chiba, M. Murata
{"title":"Detection of vulnerability scanning using features of collective accesses based on information collected from multiple honeypots","authors":"Naomi Kuze, S. Ishikura, Takeshi Yagi, Daiki Chiba, M. Murata","doi":"10.1109/NOMS.2016.7502962","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502962","url":null,"abstract":"Attacks against websites are increasing rapidly with the expansion of web services. An increasing number of diversified web services make it difficult to prevent such attacks due to many known vulnerabilities in websites. To overcome this problem, it is necessary to collect the most recent attacks using decoy web honeypots and to implement countermeasures against malicious threats. Web honeypots collect not only malicious accesses by attackers but also benign accesses such as those by web search crawlers. Thus, it is essential to develop a means of automatically identifying malicious accesses from mixed collected data including both malicious and benign accesses. Specifically, detecting vulnerability scanning, which is a preliminary process, is important for preventing attacks. In this study, we focused on classification of accesses for web crawling and vulnerability scanning since these accesses are too similar to be identified. We propose a feature vector including features of collective accesses, e.g., intervals of request arrivals and the dispersion of source port numbers, obtained with multiple honeypots deployed in different networks for classification. Through evaluation using data collected from 37 honeypots in a real network, we show that features of collective accesses are advantageous for vulnerability scanning and crawler classification.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"129-132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114752692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Where am I? Characterizing and improving the localization performance of off-the-shelf mobile devices through cooperation","authors":"Huiguang Liang, Hyong S. Kim, H. Tan, W. Yeow","doi":"10.1109/NOMS.2016.7502834","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502834","url":null,"abstract":"We are increasingly reliant on cellular data services for many types of day-to-day activities, from hailing a cab, to searching for nearby restaurants. Geo-location has become a ubiquitous feature that underpins the functionality of such applications. Network operators can also benefit from accurate mobile terminal localization in order to quickly detect and identify location-related network performance issues, such as coverage holes and congestion, based on mobile measurements. Current implementations of mobile localization on the wildly-popular Android platform depend on either the Global Positioning System (GPS), Android's Network Location Provider (NLP), or a combination of both. In this paper, we extensively study the performance of such systems, in terms of its localization accuracy. We show through real-world measurements that the performance of GPS+NLP is heavily dependent on the mobility of the user, and its gains on localization performance is minimal, and often even detrimental, especially for network round-trip delays up to 1s. Building upon these findings, we evaluate the efficacy of using Tattle, a cooperative local measurement-exchange system, and propose Delay-Adjusted U-CURE, a clustering algorithm that greatly improves the localization performance of both GPS-only, and GPS+NLP techniques, without keeping expensive system states, nor requiring any location anchors nor additional instrumentation, nor any external knowledge that is not available programmatically to application designers. Our results are promising, demonstrating that median location accuracy improvements of over 30% is achievable with just 3 co-located devices, and close to 60% with just 6 co-located devices. These findings can be used by operators to better manage their networks, or by application designers to improve their location-based services.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125665420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tamper-resistant autonomous agents-based mobile-cloud computing","authors":"Pelin Angin, B. Bhargava, R. Ranchal","doi":"10.1109/NOMS.2016.7502912","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502912","url":null,"abstract":"The rise of the mobile-cloud computing paradigm has enabled mobile devices with limited processing power and battery life to achieve complex tasks in real-time. While mobile-cloud computing is promising to overcome limitations of mobile devices for real-time computing needs, the reliance of existing models on strong assumptions such as the availability of a full clone of the application code and non-standard system environments in the cloud makes it harder to manage the performance of mobile-cloud computing based applications. Furthermore, offloading mobile computation to the cloud entails security risks associated with sending data and code to an untrusted platform and perfect security is hard to achieve due to the extra computational overhead introduced by complex mechanisms. In this paper, we present a dynamic computation-offloading model for mobile-cloud computing, based on autonomous agent-based application partitions. We propose a dynamic tamper-resistance approach for managing the security of offloaded computation, by augmenting agents with self-protection capability using a low-overhead introspection and integrity-preserving communication mechanism. Experiments with a real-world mobile application demonstrates the effectiveness of the approach for high-performance, tamper-resistant mobile-cloud computing.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127968536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hui-Feng Yu, Jiahai Yang, Cong Xu, Hui Wang, Zi Liang
{"title":"SpongeNet: Towards bandwidth guarantees of cloud datacenter with two-phase VM placement","authors":"Hui-Feng Yu, Jiahai Yang, Cong Xu, Hui Wang, Zi Liang","doi":"10.1109/NOMS.2016.7502838","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502838","url":null,"abstract":"In today's production-grade cloud datacenter, cloud service providers do not offer any bandwidth guarantees between VMs, which results in unpredictable performance of tenants' applications. To address this issue, we present SpongeNet, a solution that provides bandwidth guarantees for tenants with a novel network abstraction model and a two-phase VM placement algorithm. Prior solutions have significant limitations: 1) the existing coarse-grained network abstraction models cannot fully express tenants' network requirements and waste a lot of bandwidth resources in demand level; 2) the prior VM placement algorithms, take neither the two scheduling phases nor the tenants' requirements into consideration. As an extension of the existing studies, the proposed network abstraction model in this paper, called Fine-grained Virtual Cluster or FGVC, provides a more precise and flexible way for tenants to specify network requirements and realizes bandwidth saving. SpongeNet also proposes a novel two-phase VM placement algorithm that provides the optimal combinations of ordering policies and dispatching policies in consideration of different goals. Extensive simulations based on real application traces and 3-level tree topology show that SpongeNet provides 48% bandwidth saving than the state-of-art solutions (e.g., the Oktopus system), while significantly improving the throughput rates by 18% and response times by 92%.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132517557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Gomes, Vitor Fonseca, B. Sousa, David Palma, P. Simões, E. Monteiro, Luís Cordeiro
{"title":"A mobile follow-me cloud content caching model","authors":"A. Gomes, Vitor Fonseca, B. Sousa, David Palma, P. Simões, E. Monteiro, Luís Cordeiro","doi":"10.1109/NOMS.2016.7502894","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502894","url":null,"abstract":"With the increasing usage of mobile devices for traffic-heavy applications, mobile operators struggle for delivering good performance while, at the same time, optimizing resource consumption. By resorting to Information-Centric Networking and mobile cloud computing paradigms, mobile operators are able to tackle this challenge, simultaneously supporting more users and reducing operational costs. In this paper we propose a Mobile Follow-Me Cloud (M-FMC) model for enhancing the migration of content caches located at the edge of cloudified mobile networks, leveraging the benefits of such paradigms. This is achieved by accounting for content popularity and user mobility, optimizing systems' caches according to user interests and improving resource management. Evaluation results demonstrate that M-FMC model achieves more than 90% accuracy in real-time selection of content objects to be migrated between caches. This performance is reflected in higher cache-hit rates, therefore representing an improvement in content-access latency and overall bandwidth savings.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130002175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing NFV using SDN and control theory","authors":"Nabeel Akhtar, I. Matta, Yuefeng Wang","doi":"10.1109/NOMS.2016.7502945","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502945","url":null,"abstract":"Control theory and SDN (Software Defined Networking) are key components for NFV (Network Function Virtualization) deployment. However little has been done to use a control-theoretic approach for SDN and NFV management. In this paper, we describe a use case for NFV management using control theory and SDN. We use the management architecture of RINA (a clean-slate Recursive InterNetwork Architecture) to manage Virtual Network Function (VNF) instances over the GENI testbed. We deploy Snort, an Intrusion Detection System (IDS) as the VNF. Our network topology has source and destination hosts, multiple IDSes, an Open vSwitch (OVS) and an OpenFlow controller. A distributed management application running on RINA measures the state of the VNF instances and communicates this information to a Proportional Integral (PI) controller, which then provides load balancing information to the OpenFlow controller. The latter controller in turn updates traffic flow forwarding rules on the OVS switch, thus balancing load across the VNF instances. This paper demonstrates the benefits of using such a control-theoretic load balancing approach and the RINA management architecture in virtualized environments for NFV management. It also illustrates that GENI can easily support a wide range of SDN and NFV related experiments.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130139517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A data fusion protocol for WSN performance and data retrieval","authors":"Vasco Pereira, E. Monteiro, J. Silva","doi":"10.1109/NOMS.2016.7502910","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502910","url":null,"abstract":"The specific capabilities of Wireless Sensor Networks (WSNs), such as fast deployment and flexibility, together with the low cost solutions that can be achieved, bring new opportunities for an all-new range of applications, far from the typical scenarios of low requirements and high redundancy. Some of these new scenarios involve the assurance of predefined performance goals. To guarantee that these goals are achieved, a careful constant monitoring must exist. However, this monitoring depletes nodes energy (especially in middle nodes that have to retransmit the information to the sink), increases interference between nodes and causes an overhead in the used bandwidth, a foreseeable result if measuring performance of a large multilevel WSN. In the protocol to be presented, data fusion is used to enhance the benefits of continuous monitoring while minimizing its implied overhead, using the specific characteristics of WSNs in its favor.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Marquezan, Xueli An, Z. Despotovic, R. Khalili, A. Hecker
{"title":"Dispatching PACKET_INs to the right SDN control application via context interpretation in Mobile Core Networks","authors":"C. Marquezan, Xueli An, Z. Despotovic, R. Khalili, A. Hecker","doi":"10.1109/NOMS.2016.7502877","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502877","url":null,"abstract":"Telco operators started to apply the SDN technologies also in the design of Mobile Core Networks (MCNs). In this change towards SDNized Mobile Core Network, it is crucial to understand how conventional interfaces among different mobile network entities should evolve. The issues derived from this change have not been tackled by current research approaches. This paper presents the first initiative to close this research gap. We tackle the key problem of how to identify which mobile SDN applications (APPs) should be invoked once a PACKET_IN (the OpenFlow message that transport information from the data plane to the control plane) is received at the control level. We propose data structures, a model, and detailed examples of three important PACKET_IN context interpretation for MCNs. Initial experiments, based on Floodlight controller and Mininet emulation environment were carried out. The results indicate that it is feasible to use our proposed approach to dispatch PACKET_INs to the right SDN APP. The delay introduced due to invocation of such mechanism to interpret the context of the PACKET_IN and activate the appropriate mobile SDN APPs is only in the order of microseconds. Our proposal can be used to simplify current Mobile Core Network interface design by exploiting the SDN mechanisms. We believe, this work helps to pave the way towards fully SDNized Mobile Core Networks.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127422735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}