{"title":"Cloud Telemetry Modeling via Residual Gauss-Markov Random Fields","authors":"Nicholas C. Landolfi, Daniel C. O’Neill, S. Lall","doi":"10.1109/ICIN51074.2021.9385544","DOIUrl":"https://doi.org/10.1109/ICIN51074.2021.9385544","url":null,"abstract":"Can probabilistic graphical models characterize cloud telemetry? This paper promotes the affirmative view. Cloud systems are large, connected, and dynamic. Consequently, databased techniques to model their telemetry are high-dimensional, spatial, and unsupervised. Undirected probabilistic graphical models seem natural, but remain unexplored. We discuss one way around the limitation that cloud measurements violate usual assumptions of normality, and give a tractable estimation procedure for a candidate data model. As a preliminary test, we fit the model and use it to detect and localize anomalies in a synthetic environment and for a small-scale software system.","PeriodicalId":347933,"journal":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121317078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meghna Khaturia, Akshatha Nayak Manjeshwar, P. Jha, A. Karandikar
{"title":"5G-Serv: Decoupling User Control and Network Control in the 3GPP 5G Network","authors":"Meghna Khaturia, Akshatha Nayak Manjeshwar, P. Jha, A. Karandikar","doi":"10.1109/ICIN51074.2021.9385552","DOIUrl":"https://doi.org/10.1109/ICIN51074.2021.9385552","url":null,"abstract":"The Third Generation Partnership Project (3GPP) Fifth Generation (5G) network employs Software Defined Networking (SDN) paradigm allowing for a clear separation of control and data plane functionalities. However, the control plane in a 5G network not only performs network control tasks involving control and management of data plane functions but is also responsible for executing UE-specific control tasks. We think these two tasks are independent of each other and present 5G-Serv, a new architecture for 5G and beyond mobile networks. The paper presents a preliminary analysis and evaluation of the proposed architecture through flow diagrams. As demonstrated, 5G-Serv simplifies the information flow in the 5G network and enhances its modularity and flexibility. The architecture may also be better aligned with the standard SDN paradigm vis-a-vis the 3GPP architecture.","PeriodicalId":347933,"journal":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130164878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the impact of Tower Companies on the telecommunications market","authors":"F. Guillemin, V. Q. Rodriguez","doi":"10.1109/ICIN51074.2021.9385547","DOIUrl":"https://doi.org/10.1109/ICIN51074.2021.9385547","url":null,"abstract":"The introduction of virtualization techniques in radio cellular networks allows the emergence of a business based on the outsourcing of towers hosting antennas and operated by the so-called Tower Companies (TowerCos). In this paper, we develop a baseline business model for studying the potential relationships between network operators and TowerCos. It turns out that the gain in operational costs achieved when network operators outsource the management of towers can be gracefully utilized to reduce prices so as to attract more customers. The price drop has however to be carefully realized so as not to break the market share between operators and to preserve competition. To prove this claim, we adopt in a first step a centralized optimization formulation. In a second step, we develop a game theoretic framework.","PeriodicalId":347933,"journal":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120848827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh, Martin Hell
{"title":"On-demand Key Distribution for Cloud Networks","authors":"Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh, Martin Hell","doi":"10.1109/ICIN51074.2021.9385528","DOIUrl":"https://doi.org/10.1109/ICIN51074.2021.9385528","url":null,"abstract":"Emerging fine-grained cloud resource billing creates incentives to review the software execution footprint in virtual environments. Operators can use novel virtual execution environments with ever lower overhead: from virtual machines to containers, to unikernels and serverless functions. However, the execution footprint of security mechanisms in virtualized deployments has either remained the same or even increased. In this demo, we present a novel key provisioning mechanism for cloud networks that unlocks scalable use of symmetric keys and significantly reduces the related computational load on network endpoints.","PeriodicalId":347933,"journal":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132208131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Operative QoE Models using Virtual Multimedia IP-based Streaming Services","authors":"Sofiene Jelassi, G. Rubino","doi":"10.1109/ICIN51074.2021.9385556","DOIUrl":"https://doi.org/10.1109/ICIN51074.2021.9385556","url":null,"abstract":"The measurement of the Quality of Experience (QoE) of multimedia streaming services (MMSS) over IP networks may be realized thanks to objective QoE models. They are mathematical functions transforming metrics from technical to user domains. An interesting category of QoE models predicts QoE scores of MMSS at runtime, letting use them for the monitoring operation. This requires integrating them inside the production environments, i.e., where the actual MMSS are consumed by end-users. This aspect is often neglected by QoE modelers that focus mainly on the accuracy and fitness of their designed models with respect to a given set of settings and conditions. As a consequence, a considerable technical effort should be made in order to bring them from the laboratory to the production environments. This obviously discourages MMSS providers to easily accept and adopt them. For the sake of enhancing QoE models integration, we propose Mesukal, a software-layer ensuring portability of QoE models over a variety of underlying MMSS, e.g. YouTube or Netflix. Specifically, Mesukal acts as a Java Virtual Machine (JVM) enabling to build portable applications over different OS, e.g. Windows, Linux or MacOS. Mesukal can be considered as a virtual MMSS that is able to seamlessly interact with QoE models, on the one hand, and arbitrary real MMSS, on the other hand. Each considered MMSS over IP networks is appropriately virtualized by a dedicated Mesukal App. Besides real MMSS, Mesukal can be used to instantiate experimental MMSS where the accuracy and portability of QoE models may be inspected and checked under controlled conditions. The inputs needed by the concerned QoE models are fetched from each real MMSS using probes that are tailored following the technology used by the considered multimedia service. In addition, Mesukal includes a rich GUI dashboard that enables to inspect QoE results.","PeriodicalId":347933,"journal":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124612732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SYN Flood Attack Detection and Mitigation using Machine Learning Traffic Classification and Programmable Data Plane Filtering","authors":"Marinos Dimolianis, A. Pavlidis, B. Maglaris","doi":"10.1109/ICIN51074.2021.9385540","DOIUrl":"https://doi.org/10.1109/ICIN51074.2021.9385540","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are widely used by malicious actors to disrupt network infrastructures/services. A common attack is TCP SYN Flood that attempts to exhaust memory and processing resources. Typical mitigation mechanisms, i.e. SYN cookies require significant processing resources and generate large rates of backscatter traffic to block them. In this paper, we propose a detection and mitigation schema that focuses on generating and optimizing signature-based rules. To that end, network traffic is monitored and appropriate packet-level data are processed to form signatures i.e. unique combinations of packet field values. These are fed to machine learning models that classify them to malicious/benign. Malicious signatures corresponding to specific destinations identify potential victims. TCP traffic to victims is redirected to high-performance programmable XDPenabled firewalls that filter off ending traffic according to signatures classified as malicious. To enhance mitigation performance malicious signatures are subjected to a reduction process, formulated as a multi-objective optimization problem. Minimization objectives are (i) the number of malicious signatures and (ii) collateral damage on benign traffic. We evaluate our approach in terms of detection accuracy and packet filtering performance employing traces from production environments and high rate generated attack traffic. We showcase that our approach achieves high detection accuracy, significantly reduces the number of filtering rules and outperforms the SYN cookies mechanism in high-speed traffic scenarios.","PeriodicalId":347933,"journal":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121512353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marion Ficher, F. Berthoud, Anne-Laure Ligozat, Patrick Sigonneau, Maxime Wisslé, Badis Tebbani
{"title":"Assessing the carbon footprint of the data transmission on a backbone network","authors":"Marion Ficher, F. Berthoud, Anne-Laure Ligozat, Patrick Sigonneau, Maxime Wisslé, Badis Tebbani","doi":"10.1109/ICIN51074.2021.9385551","DOIUrl":"https://doi.org/10.1109/ICIN51074.2021.9385551","url":null,"abstract":"The goal of this paper is to assess the carbon footprint of data transmission on a network via a simplified Life Cycle Assessment (LCA) methodology. We did direct measures of the electricity consumption and the IP traffic of most of the devices required for the transmission between two sites on the backbone network. Our case study aims to compare two conditions for the data transmission, varying infrastructure density and network activity. The results for the peak day are 1.4 gCO2e/GB for the transmission across France and 2 gCO2e/GB for a more local transmission, and respectively 0.6 gCO2e/GB and 1.1 gCO2e/GB for an off-peak day.","PeriodicalId":347933,"journal":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tangui Le Gléau, Xavier Marjou, Tayeb Lemlouma, Benoit Radier
{"title":"A Multi-agent OpenAI Gym Environment for Telecom Providers Cooperation","authors":"Tangui Le Gléau, Xavier Marjou, Tayeb Lemlouma, Benoit Radier","doi":"10.1109/ICIN51074.2021.9385538","DOIUrl":"https://doi.org/10.1109/ICIN51074.2021.9385538","url":null,"abstract":"The ever-increasing use of the Internet (streaming, Internet of things, etc.) constantly demands more connectivity, which incentivises telecommunications providers to collaborate by sharing resources to collectively increase the quality of service without deploying more infrastructure. However, to the best of our knowledge, there is no tool for testing and evaluating participation strategies in such collaborations. This article presents a new adaptable framework, based on the OpenAI Gym toolkit, allowing to generate customisable environments for cooperating on radio resources. This framework facilitates the development and comparison of agents (such as reinforcement learning agents) in a generic way. The main goal of the paper is to detail the available functionalities of our framework. We then focus on game theory aspects as multi-player games induced by these environments can be considered as sequential social dilemmas. We show in particular that although each agent has no incentive to remain cooperative at each step of such iterated games, a mutual cooperation provides better outcomes (in other words, Nash Equilibrium is non optimal)","PeriodicalId":347933,"journal":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117166664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting VNF chains: an implementation using Segment Routing and PCEP","authors":"Cees Portegies, Marijke Kaat, P. Grosso","doi":"10.1109/ICIN51074.2021.9385527","DOIUrl":"https://doi.org/10.1109/ICIN51074.2021.9385527","url":null,"abstract":"The paradigm of Network Function Virtualization (NFV) requires the underlying networks to be able to route traffic through dynamically deployed nodes. The research presented here demonstrates the feasibility of using segment routing (SR), a modern incarnation of the source routing paradigm, and suitable SDN controllers to accomplish the traffic steering goal. Specifically, we focused on IPv4 SR and built a proof of concept SRMPLS network using Juniper vQFX routers with custom VNFs. The Juniper NorthStar SDN controller was used to build SR- MPLS LSPs via the Path Computation Element Communication Protocol (PCEP). We validated the operation of our proof of concept in two scenarios: VNFs reinstantiation and service chain creation and support. In both cases traffic can be successfully steered through the functions, hence demonstrating for the first time the feasibility of adoption of the proposed technologies.","PeriodicalId":347933,"journal":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICIN 2021 Additional Reviewers","authors":"","doi":"10.1109/icin51074.2021.9385555","DOIUrl":"https://doi.org/10.1109/icin51074.2021.9385555","url":null,"abstract":"","PeriodicalId":347933,"journal":{"name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130108522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}