NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium最新文献

筛选
英文 中文
Anomaly detection for SOME/IP using complex event processing 使用复杂事件处理的SOME/IP异常检测
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502991
N. Herold, S. Posselt, Oliver Hanka, G. Carle
{"title":"Anomaly detection for SOME/IP using complex event processing","authors":"N. Herold, S. Posselt, Oliver Hanka, G. Carle","doi":"10.1109/NOMS.2016.7502991","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502991","url":null,"abstract":"Recent developments favor the adoption of IP-based protocols in automotive and aerospace domains. The increased connectivity between components helps to cut costs and enables better re-use of standardized components. However, increased connectivity also increases the attack surface of the overall system and necessitates dedicated security solutions. This paper presents an anomaly detection system for SOME/IP, a standardized automotive middleware protocol. Within the system, Esper, a complex event processing engine, applies a domain-specific rule set to a stream of SOME/IP packets. Possible attacks and protocol violations on the SOME/IP protocol are identified, suitable rules for detection are presented, and finally, the performance of the system is evaluated.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124202422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On-demand provisioning of long-tail services in distributed clouds 分布式云中按需提供长尾服务
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7503011
Pieter Smet, B. Dhoedt, P. Simoens
{"title":"On-demand provisioning of long-tail services in distributed clouds","authors":"Pieter Smet, B. Dhoedt, P. Simoens","doi":"10.1109/NOMS.2016.7503011","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7503011","url":null,"abstract":"We see a trend to design services as a suite of small service components instead of the typical monolithic nature of classic web services, which led to an increasing amount of long-tail services on the Internet. Deploying instances everywhere to achieve a fast response time results in high costs, especially when these services are used infrequently and remain idle most of the time. One way to avoid needless over-provisioning is to deploy instances on-demand but this requires every component to be available upon request arrival. We propose a placement algorithm to maximize the amount of clients we can serve on-demand using the Docker layered filesystem. Docker facilitates automated deployment of services in lightweight software containers, allowing almost instantaneous deployment. Our algorithm finds the optimal storage location for layers so we can retrieve all service layers, deploy a service instance and provide a first response to a request within the desired time. We solve this problem using integer linear programming (ILP) and present techniques to improve the scalability of ILP while minimizing the performance loss. Results show that our approximation performs better with large scale problems than the classic ILP case.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126114858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic virtual network restoration with optimal standby virtual router selection 基于最佳备用虚拟路由器选择的动态虚拟网络恢复
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502935
Xuan Liu, D. Medhi
{"title":"Dynamic virtual network restoration with optimal standby virtual router selection","authors":"Xuan Liu, D. Medhi","doi":"10.1109/NOMS.2016.7502935","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502935","url":null,"abstract":"Fault-tolerance in a virtualized networking environment (VNE) requires additional efforts to provide the survivability against failures on either virtual networks (VNs) or the underlying substrate network. In this dissertation, we design a software-defined resilient VNE using a hybrid scheme of protection and restoration, where for each VN, a set of redundant virtual routers (VRs) are reserved as shared standby virtual routers (S-VRs), and any S-VR can be activated to replace a failed VR in the existed VN dynamically after the failure is identified. We first introduce a dynamic reconfiguration scheme (DRS) for node failures in a VNE, and then propose a Mixed-Integer Linear Programming (MILP) model with dual goals to optimally select S-VRs to restore all VNs while load balancing, and a heuristic algorithm based on the model is also presented. By considering a number of factors, the results showed that the proposed heuristics performance was close to the optimization model when there were sufficient standby virtual routers for each virtual network and the substrate nodes had the capability to support multiple standby virtual routers to be in service simultaneously. Finally, we present a prototyping design and implementation on the realistic virtual network testbeds (i.e., GpENI and GENI).","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129964544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improve round-trip time measurement quality via clustering in inter-domain traffic engineering 利用聚类技术提高域间流量工程中往返时间测量质量
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502970
Wenqin Shao, J. Rougier, F. Devienne, M. Viste
{"title":"Improve round-trip time measurement quality via clustering in inter-domain traffic engineering","authors":"Wenqin Shao, J. Rougier, F. Devienne, M. Viste","doi":"10.1109/NOMS.2016.7502970","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502970","url":null,"abstract":"For multi-homed networks, inter-domain traffic engineering (TE) consists in selecting the best path via available transit providers, so that the transmission quality is improved in front of network events, such as congestion and fail-over. In practice, this choice bases on end-to-end (e2e) measurements toward destination networks. These measurements, especially Round-Trip Time (RTT), are expected to offer an faithful view on inter-domain path properties. Hosts in destination networks with open ports are deliberately discovered for active measurement. RTT traces so obtained can be influenced by host-local factors that are not relevant to inter-domain routing and eventually mislead route decisions. We data-mined the RTT time-series between two ASes with unsupervised learning method - clustering, on a set of statistic features. Achieved results showed that our method was capable of improving data quality, by excluding less reliable traces. Moreover, we considered traceroute measurements. Early results suggested that most variations of e2e delay actually occured in access networks. We thus believe that the proposed scheme can improve the accuracy and stability of the route selection for multi-homed networks.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Assessing the impact of cryptographic access control solutions on multimedia delivery in information-centric networks 评估加密访问控制解决方案对信息中心网络中多媒体传输的影响
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502840
Elisa Mannes, C. Maziero, L. Lassance, Fábio Borges
{"title":"Assessing the impact of cryptographic access control solutions on multimedia delivery in information-centric networks","authors":"Elisa Mannes, C. Maziero, L. Lassance, Fábio Borges","doi":"10.1109/NOMS.2016.7502840","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502840","url":null,"abstract":"Information-centric Networks (ICN) aims to improve content delivery by promoting the content as the protagonist of the network layer. By naming, routing, and forwarding named content directly on the network layer, ICN allows the same content to satisfy requests from different users, enabling innetwork caches to place contents strategically near the interested users. This characteristic is especially interesting for multimedia content distribution, since it represents a better quality of experience for users due to low round-trip time, bandwidth use, and load on content providers. However, caching protected multimedia content on uncontrolled third party devices may impair access control policies enforcement by the content providers. Many encryption-based access control solutions have been proposed for ICN, applying different cryptographic strategies leading to distinct features which may not be appropriate for multimedia content protection. In this paper, we simulate, evaluate, and discuss the individual characteristics of three encryption-based access control solutions in light of multimedia distribution in ICN. We show that leveraging cache efficiency, computational load to encrypt and decrypt content, and user revocation are the biggest challenges for the enforcement of access control policies on ICN.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122317413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Empowering network operating systems with memory management techniques 为网络操作系统提供内存管理技术
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502889
R. D. Corin, D. Siracusa, E. Salvadori, Arne Schwabe
{"title":"Empowering network operating systems with memory management techniques","authors":"R. D. Corin, D. Siracusa, E. Salvadori, Arne Schwabe","doi":"10.1109/NOMS.2016.7502889","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502889","url":null,"abstract":"Similarly to computer operating systems which guarantee safe access to memory resources, Network Operating Systems shall grant SDN applications a reliable access to neatly organized flow table resources. This paper presents the architecture for a controller-agnostic Memory Management System and some of its functionalities that aim at improving flow table usage and preventing network misconfigurations. From the implementation perspective, this work discusses the applicability of the proposed system, a strategy to evaluate it and current open challenges.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"35 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121014217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards flexbile SDN-based management for cloud-based mobile networks 面向基于云的移动网络灵活的sdn管理
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502846
M. Artuso, C. Caba, H. Christiansen, José Soler
{"title":"Towards flexbile SDN-based management for cloud-based mobile networks","authors":"M. Artuso, C. Caba, H. Christiansen, José Soler","doi":"10.1109/NOMS.2016.7502846","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502846","url":null,"abstract":"New technologies and architectures arise in the telecommunications industry in order to cater to the ever growing demands in terms of resource utilization, manageability and user experience. C-RAN and SDN represent two such novel paradigms, both advocating for centralization of a set of resources or control capabilities respectively. The C-RAN architecture requires a significant amount of link capacity which may be a prohibitive factor in its adoption hence an obvious solution is to intelligently share the physical infrastructure among several virtual operators. In this context, a new challenge is to flexibly manage the sharing of the infrastructure. This paper argues that a centralized, SDN-based approach can bring the needed flexibility in the management of the C-RAN. More specifically, this paper proposes a policy-centric management framework, which uses the SDN architecture to enforce various rules for sharing the physical infrastructure. A testbed based on Floodlight and Mininet has been implemented to show the benefits of using this automatic management tool for sharing the mobile site capacity.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132655779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of probabilistic flooding in VANETs for optimal rebroadcast probabilities VANETs中最优重播概率的概率泛洪分析
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502984
Taqwa Saeed, M. Lestas, Y. Mylonas, A. Pitsillides, V. P. Lesta
{"title":"Analysis of probabilistic flooding in VANETs for optimal rebroadcast probabilities","authors":"Taqwa Saeed, M. Lestas, Y. Mylonas, A. Pitsillides, V. P. Lesta","doi":"10.1109/NOMS.2016.7502984","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502984","url":null,"abstract":"A number of probabilistic flooding schemes have been recently considered in VANETs to address problems of information dissemination in safety applications. The design approach has so far been simulative, a method which does not guarantee that the derived protocols will work when the simulation settings are violated in practice. In this paper, motivated by the need to design information dissemination protocols with verifiable properties prior to implementation, we employ mathematical models of single and multiple lane roads to investigate probabilistic flooding in VANETs using mathematical analysis. We demonstrate that the system can be described by linear difference equations the solutions of which yield the probability of all vehicles receiving the critical message as a function of the rebroadcast probability, the number of neighbors of each vehicle and the number of vehicles. We utilize the obtained solutions to derive the desired rebroadcast probabilities as a function of the transmission range, the vehicle density and the dissemination distance. The obtained results are in line with results obtained using extensive simulations and can be used as a baseline to develop information dissemination protocols with verifiable properties.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133791001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Resource allocation in optical beam-steered indoor networks 光束控制室内网络中的资源分配
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502839
M. T. Vega, J. Famaey, A. Koonen, A. Liotta
{"title":"Resource allocation in optical beam-steered indoor networks","authors":"M. T. Vega, J. Famaey, A. Koonen, A. Liotta","doi":"10.1109/NOMS.2016.7502839","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502839","url":null,"abstract":"Optical Wireless (OW) technologies deploying narrow multiwavelength light beams offer a promising alternative to traditional wireless indoor communications as they provide higher bandwidths and overcome the radio spectrum congestion typical of the 2.4 and 5GHz frequency bands. However, unlocking their full potential requires exploring novel control and management techniques. Specifically, there is a need for efficient and intelligent resource management and localization techniques that allot wavelengths and capacity to devices. In this paper we present a resource allocation model for one such indoor optical wireless approach, a Beam-steered Reconfigurable Optical-Wireless System for Energy-efficient communication (BROWSE). BROWSE aims to supply each user within a room with its own downstream infrared light beam with at least 10Gbps throughput, while providing a 60GHz radio channel upstream. Using Integer Linear Programming (ILP) techniques, we have designed and implemented a resource allocation model for the BROWSE OW downstream connection. The designed model optimises the trade-off between energy-consumption and throughput, while providing TDM capabilities to effectively serve densely deployed devices with a limited number of simultaneous available wavelengths. Through several test-scenarios we have assessed the model's performance, as well as its applicability to future ultra-high bandwidth video streaming applications.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"32 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114002811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enabling QoS in peer to peer live streaming through dynamic bandwidth or playback rate control 通过动态带宽或播放速率控制实现对等直播的QoS功能
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Pub Date : 2016-04-25 DOI: 10.1109/NOMS.2016.7502875
Maria Efthymiopoulou, N. Efthymiopoulos, Athanasios Christakidis
{"title":"Enabling QoS in peer to peer live streaming through dynamic bandwidth or playback rate control","authors":"Maria Efthymiopoulou, N. Efthymiopoulos, Athanasios Christakidis","doi":"10.1109/NOMS.2016.7502875","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502875","url":null,"abstract":"Live video streaming over internet is becoming popular more and more. Current commercial live video streaming systems are based either on a typical client-server (cloud) or on a peer-to-peer (P2P) architecture. The former is preferred for stability and QoS, provided that the system is not stretched beyond the server's bandwidth capacity, while the latter is scalable with small bandwidth and management cost. In this paper, we stabilize live streaming with a cloud assisted P2P live streaming system without sacrificing scalability. In order to achieve this we develop: i) a scalable gossip protocol with low bandwidth overhead for the cloud that monitors dynamically the total available bandwidth resources of the participating peers, ii) a control strategy that dynamically allocates from the cloud the exact amount of required bandwidth in order to guarantee the complete and on time stream distribution, iii) an alternative control strategy that dynamically adapts the playback rate to the available bandwidth resources. All these are achieved by modeling analytically through difference equations the dynamic relationship between the total bandwidth surplus (idle peers' bandwidth) and the playback rate. Finally, we evaluate our proposed architecture in a packet level simulator of a complete P2P live streaming system that designed in OPNET Modeler. Our evaluation testifies the uninterrupted and complete stream delivery even in adverse bandwidth changes.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114571969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信