{"title":"A new approach for clustering alarm sequences in mobile operators","authors":"Selçuk Sözüer, Ç. Etemoglu, E. Zeydan","doi":"10.1109/NOMS.2016.7502960","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502960","url":null,"abstract":"Telecom Networks produce huge amount of daily alarm logs. These alarms usually arrive from different regions and network equipments of mobile operators at different times. In a typical network operator, Network Operations Centers (NOCs) constantly monitor those alarms in a central location and try to fix issues raised by intelligent warning systems by performing a trouble ticketing based management system. In order to automate rule findings, different sequential rule mining algorithms can be exploited. However, the number of sequential rules and alarm correlations that can be generated by using these algorithms can overwhelm the NOC administrators since some of those rules are neither utilized nor reduced appropriately by the non-customized sequential rule mining algorithms. Therefore, additional efficient and intelligent rule identification techniques need to be developed depending on the characteristic of the data. In this paper, two new metrics that is inspired from document classification approaches are proposed in order to increase the accuracy of the sequential alarm rules. This approach utilizes new definition of identifying transactions as alarm features and clustering the alarms by their occurrences in built transactions. Experimental evaluations demonstrate that up to 61% accuracy improvements can be achieved through utilizing the proposed appropriate metrics compared to a sequential rule mining algorithm.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127952134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time analysis of NetFlow data for generating network traffic statistics using Apache Spark","authors":"Milan Cermák, Tomás Jirsík, Martin Laštovička","doi":"10.1109/NOMS.2016.7502952","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502952","url":null,"abstract":"In this paper, we present a framework for the real-time generation of network traffic statistics on Apache Spark Streaming, a modern distributed stream processing system. Our previous results showed that stream processing systems provide enough throughput to process a large volume of NetFlow data and hence they are suitable for network traffic monitoring. This paper describes the integration of Apache Spark Streaming into a current network monitoring architecture. We prove that it is possible to implement the same basic methods for NetFlow data analysis in the stream processing framework as in the traditional ones. Moreover, our stream processing implementation discovers new information which is not available when using traditional network monitoring approaches.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Barron, Micheal Crotty, E. Elahi, R. Riggio, D. López, M. P. D. Leon
{"title":"Towards self-adaptive network management for a recursive network architecture","authors":"J. Barron, Micheal Crotty, E. Elahi, R. Riggio, D. López, M. P. D. Leon","doi":"10.1109/NOMS.2016.7502977","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502977","url":null,"abstract":"Traditionally, network management tasks manually performed by system administrators include monitoring alarms based on collected statistics across many heterogeneous systems, correlating these alarms to identify potential problems or changes to management policies and responding by performing system re-configurations to ensure optimal performance of network services. System administrators have a narrow focus of factors impacting network service provisioning and performance due to the heterogeneity and scale of generated underlying network events. However, self-adaption principles are conceptual approaches for autonomously managing such complex distributed systems. Network management systems that harness such principles can dynamically and autonomously optimise the operation of network services, responding quickly to changes in user requirements and underlying network conditions. In this paper, we present a novel self-adaptive network management framework that takes advantage of a recursive network architecture for a simpler and more comprehensive application of ontologies, semantic web rules and machine learning to automatically adjust network configuration parameters to provide more optimal QoS management of network services. We demonstrate the applicability of the approach using a content distribution network (CDN) operating over such a recursive network architecture.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121372529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource management of replicated service systems provisioned in the cloud","authors":"Mathias Björkqvist, R. Birke, Walter Binder","doi":"10.1109/NOMS.2016.7502933","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502933","url":null,"abstract":"Service providers seek scalable and cost-effective cloud solutions for hosting their applications. Despite significant advances facilitating cloud services deployment and management, a number of challenges still remain. Service providers are confronted with time-varying workloads, inter-dependencies between components, performance variability of the procured virtual resources, and cost structures that differ from conventional data centers. Moreover, fulfilling service level agreements (SLAs), such as the throughput and response time percentiles, becomes of paramount importance for ensuring business advantages. In this dissertation paper, we explore service provisioning in clouds from multiple points of view. The aim is to best provide service replicas in the form of VMs to various applications, such that their tail throughputs and tail response times, as well as resource utilization, meet the SLAs in the most cost effective manner. In particular, we develop models, algorithms and replication strategies that consider multi-tier services provisioned in the cloud, investigate how a service provider can opportunistically take advantage of observed cloud performance variability and provide means of guaranteeing tail throughput and response times in the face of the aforementioned performance variability. Overall, this dissertation paper provides not only a multi-faceted approach to exploring several crucial aspects of cloud-hosted services, i.e., cost, tail throughput, and tail response times, but our proposed management strategies are also rigorously validated via trace-driven simulations and extensive experiments.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129049158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. R. Chowdhury, Reaz Ahmed, Md Mashrur Alam Khan, Nashid Shahriar, R. Boutaba, J. Mitra, Feng Zeng
{"title":"Protecting virtual networks with DRONE","authors":"S. R. Chowdhury, Reaz Ahmed, Md Mashrur Alam Khan, Nashid Shahriar, R. Boutaba, J. Mitra, Feng Zeng","doi":"10.1109/NOMS.2016.7502799","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502799","url":null,"abstract":"Network virtualization is enabling infrastructure providers (InPs) to offer new services to higher level service providers (SPs). InPs are usually bound by Service Level Agreements (SLAs) to ensure various levels of resource availability for different SPs' virtual networks (VNs). They provision redundant backup resources while embedding an SP's VN request to conform to the SLAs during physical failures in the infrastructure. An extreme of this backup resource provisioning is to reserve a dedicated backup of each element in an SP's VN request. Such dedicated protection scheme can enable an InP to ensure fast VN recovery, thus, providing high uptime guarantee to the SPs. In this paper, we study the 1 + 1-Protected Virtual Network Embedding (1 + 1-ProViNE) problem. We propose Dedicated Protection for Virtual Network Embedding (DRONE), a suite of solutions to the 1 + 1-ProViNE. DRONE includes an Integer Linear Programming (ILP) formulation for optimal solution (OPT-DRONE) and a heuristic (FAST-DRONE) to tackle the computational complexity in computing the optimal solution. Trace driven simulations show that FAST-DRONE allocates only 14.3% extra backup resources on average compared to the optimal solution, while executing 200-12000x faster.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"417 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an approximate graph entropy measure for identifying incidents in network event data","authors":"P. Tee, G. Parisis, I. Wakeman","doi":"10.1109/NOMS.2016.7502959","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502959","url":null,"abstract":"A key objective of monitoring networks is to identify potential service threatening outages from events within the network before service is interrupted. Identifying causal events, Root Cause Analysis (RCA), is an active area of research, but current approaches are vulnerable to scaling issues with high event rates. Elimination of noisy events that are not causal is key to ensuring the scalability of RCA. In this paper, we introduce vertex-level measures inspired by Graph Entropy and propose their suitability as a categorization metric to identify nodes that are a priori of more interest as a source of events. We consider a class of measures based on Structural, Chromatic and Von Neumann Entropy. These measures require NP-Hard calculations over the whole graph, an approach which obviously does not scale for large dynamic graphs that characterise modern networks. In this work we identify and justify a local measure of vertex graph entropy, which behaves in a similar fashion to global measures of entropy when summed across the whole graph. We show that such measures are correlated with nodes that generate incidents across a network from a real data set.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114127427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Can Altay, Nazli Zeynep Bozdemir, Erdogan Camcioglu
{"title":"Standalone eNode-B design with integrated virtual EPC in public safety networks","authors":"Can Altay, Nazli Zeynep Bozdemir, Erdogan Camcioglu","doi":"10.1109/NOMS.2016.7502887","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502887","url":null,"abstract":"LTE technology is considered as the next enabler of the public safety networks with regard of its performance and reliability. The mission critical communication in public safety network requires non-stop connectivity, especially in natural disaster scenarios. To provide further reliability, the eNode-Bs should ensure connectivity when the backhaul connection fails. This paper proposes a standalone eNode-B architecture, which deploys its own integrated virtual EPC to ensure service without backhaul connection. The proposed standalone eNode-Bs are also designed to establish backhaul connection with each other to extend the coverage without need for a central EPC structure. Standalone LTE solutions for PSNs that fall within the scope of this paper, aim to offer resiliency, robustness, dynamicity, and high quality service. The basic LTE functions and further design challenges, related to connected or non-connected standalone eNode-Bs, are discussed through the paper.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126799772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Obinna Anya, Heiko Ludwig, Mohamed Mohamed, S. Tata
{"title":"SLA analytics for adaptive service provisioning in the cloud","authors":"Obinna Anya, Heiko Ludwig, Mohamed Mohamed, S. Tata","doi":"10.1109/NOMS.2016.7502967","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502967","url":null,"abstract":"Service level agreements (SLAs) are considered not only a central tool for managing QoS compliance, but also a differentiating factor between service implementations. In today's application environments with fast instrumentation deployment cycles in hybrid Cloud platforms, managing QoS compliance poses tremendous challenges, including how to deliver solutions that live up to promised QoS properties and preemptively identify provisioning risks before they lead to violations. Current approaches are usually reactive, i.e. the application infrastructure reacts to changes in QoS metrics, with a huge focus on compliance enforcement after violations have occurred. Cloud service provisioning demands a proactive approach to QoS management, with support for robust predictive scaling of service capacity based on multiple metrics, including business goals as well as infrastructure-level and QoS metrics. This paper presents an approach for adaptive service provisioning in the Cloud based on QoS analytics. A major contribution of the approach is the development of an analytics engine for predictive elasticity management of Cloud service provisioning that integrates in-depth mining of SLA compliance history with knowledge of business context, e.g. workload variability, a customer's business goals, application performance, and service operational context. In this work-in-progress report, we describe the proposed framework and discuss possible implementation and deployment scenarios.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126214280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User-centered security management of API-based data integration workflows","authors":"Bojan Suzic","doi":"10.1109/NOMS.2016.7502993","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502993","url":null,"abstract":"One of the consequences of the present adoption of cloud-based services among organizations is the increasing rate of outsourcing of business and technical functions to third parties. The recent approaches such as cloud integration platforms (iPaaS) facilitate this trend even further. In this scenario, users' resources distributed across different cloud systems are accessed, shared and processed completely in the cloud, at third-party premises, effectively transferring the execution of entire business processes to the cloud. In this work, we approach security challenges and issues that arise from data and resource integrations of such scale. Our contribution aims at advancing privacy and confidentiality in collaboration flows of distributed, cross-domain systems. We focus on the perspective of resource owners, enabling automated, structured discovery and security orchestration of their resources hosted at various cloud premises. We furthermore consider the perspective of integration clients that access and process distributed resources on behalf of resource owners, providing the model for discovery, integration and fine-grained constraints of sharing requests. Our contribution is examined on a basis of the focused prototype that allows proxy-based integration with existing systems and web authorization protocols.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126414179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Josh Kunz, Christopher Becker, M. Jamshidy, S. Kasera, R. Ricci, J. Merwe
{"title":"OpenEdge: A dynamic and secure open service edge network","authors":"Josh Kunz, Christopher Becker, M. Jamshidy, S. Kasera, R. Ricci, J. Merwe","doi":"10.1109/NOMS.2016.7502820","DOIUrl":"https://doi.org/10.1109/NOMS.2016.7502820","url":null,"abstract":"High performance edge networks, such as fiber-to-the-premises (FTTP), are increasingly being deployed by municipalities and communities to support advanced services and applications. The complexity of operating these networks often means that their full potential is not being reached and they are relegated to being fast access pipes to the Internet. In this paper, we present our work on OpenEdge, a dynamic and secure open service edge network architecture. OpenEdge provides a control architecture that automates the configuration of the edge network in a cloud-like manner to simplify the introduction of new network services and applications.","PeriodicalId":344879,"journal":{"name":"NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}