2012 IEEE Network Operations and Management Symposium最新文献

筛选
英文 中文
Proposal and development of the Web services input validation model Web服务输入验证模型的建议和开发
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211976
Rafael Bosse Brinhosa, C. Westphall, Carlos Becker Westphall
{"title":"Proposal and development of the Web services input validation model","authors":"Rafael Bosse Brinhosa, C. Westphall, Carlos Becker Westphall","doi":"10.1109/NOMS.2012.6211976","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211976","url":null,"abstract":"The SOA architecture primarily based on Web services is experiencing a steady adoption, although its growth was lower than expected when it was launched, mainly because of security related concerns. Web services inherited many well-known security problems of Web applications and brought new ones. Major data breaches today are consequences of bad input validation at the application level. This paper presents a way to implement an input validation model for Web services which can be used to prevent cross-site scripting and SQL injection through the use of predefined models which specify valid inputs. The proposed WSIVM (Web Services Input Validation Model) consists of an XML schema, an XML specification, and a module for performing input validation according to the schema. A case study showing the effectiveness and performance of this mechanism is also presented.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132461127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Feature placement algorithms for high-variability applications in cloud environments 云环境中高可变性应用的特征放置算法
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211878
Hendrik Moens, E. Truyen, Stefan Walraven, W. Joosen, B. Dhoedt, F. Turck
{"title":"Feature placement algorithms for high-variability applications in cloud environments","authors":"Hendrik Moens, E. Truyen, Stefan Walraven, W. Joosen, B. Dhoedt, F. Turck","doi":"10.1109/NOMS.2012.6211878","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211878","url":null,"abstract":"While the use of cloud computing is on the rise, many obstacles to its adoption remain. One of the weaknesses of current cloud offerings is the difficulty of developing highly customizable applications while retaining the increased scalability and lower cost offered by the multi-tenant nature of cloud applications. In this paper we describe a Software Product Line Engineering (SPLE) approach to the modelling and deployment of customizable Software as a Service (SaaS) applications. Afterwards we define a formal feature placement problem to manage these applications, and compare several heuristic approaches to solve the problem. The scalability and performance of the algorithms is investigated in detail. Our experiments show that the heuristics scale and perform well for systems with a reasonable load.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132145574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Converged network and device management for data offloading 用于数据卸载的融合网络和设备管理
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211938
A. Hadjiantonis, G. Ellinas
{"title":"Converged network and device management for data offloading","authors":"A. Hadjiantonis, G. Ellinas","doi":"10.1109/NOMS.2012.6211938","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211938","url":null,"abstract":"The rapid adoption of the Internet and the ubiquitous coverage of cellular/wireless technologies, all concur to the fusion of networks' physical boundaries. At the same time, the proliferation of mobile and wireless devices changes our expectations as users, forcing providers to rethink their network and device management (NDM) approaches. Our work contributes to the convergence of NDM, with an early prototype of a resource-oriented cloud-based management service, using YANG data modeling language and JSON notation to model and encode policies. A proof-of-concept prototype implementation on a Linux-based smartphone demonstrates how policies achieve data offloading between wireless and mobile networks, for the benefit of users and operators.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123356703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Estimating the number of active flows from sampled packets 从采样包中估计活动流的数量
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211984
Guang Cheng
{"title":"Estimating the number of active flows from sampled packets","authors":"Guang Cheng","doi":"10.1109/NOMS.2012.6211984","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211984","url":null,"abstract":"A flow is active during a measurement period if it sends at least one packet. It is essential to control resource consumption in network monitoring by traffic sampling, so most high-end routers provide sampling network traffic function. The number of original flow is an important metrics to many network applications such as congestion control and network security. In this paper, we present a EUF algorithm that can accurately infer the number of original flow from the sampled packet traffic. Using the EUF algorithm, the number of unsampled flows can be estimated by an iteration method based on random sampling, and then the number of original flows can be precisely estimated according to both the number of the sampled flows and the unsampled flow. The EUF algorithm is also compared with the EM algorithm using multiple traffic traces collected from a Tier-1 ISP backbone networks. The result shows that the EUF algorithm is superior to EM and can provide highly accurate estimation on the number of the original flow.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132654268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-task overlapping coalition formation mechanism in wireless sensor network 无线传感器网络多任务重叠联盟形成机制
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211974
Xiao-fei Bao, Yang Yang, Xue-song Qiu
{"title":"Multi-task overlapping coalition formation mechanism in wireless sensor network","authors":"Xiao-fei Bao, Yang Yang, Xue-song Qiu","doi":"10.1109/NOMS.2012.6211974","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211974","url":null,"abstract":"Coalition formation is an essential component for in wireless sensor network (WSN). Most of current coalition formation algorithms have focused on disjoint coalitions. We develop an improved ant colony algorithm to solve the overlapping coalition formation(OCF) problem in multiple coalitions in WSN domain. In this improved ant colony algorithm, we bring in mutation operation and elite strategy from genic algorithm. By doing this, it will improve the pheromone update strategy and allow sensors to allocate different parts of their resources to serve different coalitions simultaneously.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132223470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hercules: Integrated control framework for datacenter traffic management Hercules:数据中心流量管理的集成控制框架
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211884
Wonho Kim, P. Sharma
{"title":"Hercules: Integrated control framework for datacenter traffic management","authors":"Wonho Kim, P. Sharma","doi":"10.1109/NOMS.2012.6211884","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211884","url":null,"abstract":"The large scale and high performance requirements of Cloud computing pose many challenges to the data center network operators. These networks typically require high bisection bandwidth, strict performance isolation, and power-efficient operation. Recently, many researchers have proposed various network controller systems for programming networks, each of them to individually address only one of these challenges. In this paper, however, we show that running multiple controllers in a shared network fabric independently is not only inefficient but conflicting control decisions by different controllers can also lead to serious network performance degradation. We present HERCULES, an integrated control framework, to enable coexistence and operation of multiple controllers. As an initial proof of concept, we have integrated four existing controllers into HERCULES framework. Our evaluation of the integrated controller shows that it can enable multiple controllers to leverage each other and collectively achieve the multiple goals of the controllers simultaneously.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134193148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A framework for the design and evaluation of network resilience management 网络弹性管理的设计与评估框架
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211924
A. E. S. Filho, Paul Smith, A. Mauthe, D. Hutchison, Yue Yu, M. Fry
{"title":"A framework for the design and evaluation of network resilience management","authors":"A. E. S. Filho, Paul Smith, A. Mauthe, D. Hutchison, Yue Yu, M. Fry","doi":"10.1109/NOMS.2012.6211924","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211924","url":null,"abstract":"Network resilience strategies aim to maintain acceptable levels of network operation in the face of challenges, such as malicious attacks, operational overload or equipment failures. Often the nature of these challenges requires resilience strategies comprising mechanisms across multiple protocol layers and in disparate locations of the network. In this paper, we address the problem of resilience management and advocate that a new approach is needed for the design and evaluation of resilience strategies. To support the realisation of this approach we propose a framework that enables (1) the offline evaluation of resilience strategies to combat several types of challenges, (2) the generalisation of successful solutions into reusable patterns of mechanisms, and (3) the rapid deployment of appropriate patterns when challenges are observed at run-time. The evaluation platform permits the simulation of a range of challenge scenarios and the resilience strategies used to combat these challenges. Strategies that can successfully address a particular type of challenge can be promoted to become resilience patterns. Patterns can thus be used to rapidly deploy resilience configurations of mechanisms when similar challenges are detected in the live network.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115540884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
End-to-end verification of QoS policies QoS策略的端到端验证
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211927
A. El-Atawy, T. Samak
{"title":"End-to-end verification of QoS policies","authors":"A. El-Atawy, T. Samak","doi":"10.1109/NOMS.2012.6211927","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211927","url":null,"abstract":"Configuring a large number of routers and network devices to achieve quality of service (QoS) goals is a challenging task. In a differentiated services (DiffServ) environment, traffic flows are assigned specific classes of service, and service level agreements (SLA) are enforced at routers within each domain. We present a model for QoS configurations that facilitates efficient property-based verification. Network configuration is given as a set of policies governing each device. The model efficiently checks the required properties against the current configuration using computation tree logic (CTL) model checking. By symbolically modeling possible decision paths for different flows from source to destination, properties can be checked at each hop, and assessments can be made on how closely configurations adhere to the specified agreement. The model also covers configuration debugging given a specific QoS violation. Efficiency and scalability of the model are analyzed for policy per-hop behavior (PHB) parameters over large network configurations.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114732815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PCA-subspace method — Is it good enough for network-wide anomaly detection pca -子空间方法-对于全网范围的异常检测是否足够好
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211919
Bin Zhang, Jiahai Yang, Jianping Wu, Donghong Qin, Lei Gao
{"title":"PCA-subspace method — Is it good enough for network-wide anomaly detection","authors":"Bin Zhang, Jiahai Yang, Jianping Wu, Donghong Qin, Lei Gao","doi":"10.1109/NOMS.2012.6211919","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211919","url":null,"abstract":"PCA-subspace method has been proposed for network-wide anomaly detection. Normal subspace contamination is still a great challenge for PCA although some methods are proposed to reduce the contamination. In this paper, we apply PCA-subspace method to six-month Origin-Destination (OD) flow data from the Abilene. The result shows that normal subspace contamination is mainly caused by anomalies from a few strongest OD flows, and seems unavoidable for subspace method. Further comparison of anomalies detected by subspace method and manually tagged anomalies from each OD flows, we find that anomalies detected by subspace method are mainly caused by anomalies from medium and a few large OD flows, and most anomalies of minor OD flows are buried in abnormal subspace and hard to be detected by PCA-subspace method. We analyze the reason for those anomalies undetected by subspace method and suggest to use normal subspace to detect anomalies caused by a few strongest OD flows, and to further divide abnormal subspace to detect more anomalies from minor OD flows. The goal of this paper is to address limitations neglected by prior works and further improve the subspace method on one hand, also call for novel detection methods for network-wide traffic on another hand.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115769427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Distributed multi-agent algorithm for residential energy management in smart grids 智能电网住宅能源管理的分布式多智能体算法
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211928
Kevin Mets, M. Strobbe, Tom Verschueren, Thomas Roelens, F. Turck, Chris Develder
{"title":"Distributed multi-agent algorithm for residential energy management in smart grids","authors":"Kevin Mets, M. Strobbe, Tom Verschueren, Thomas Roelens, F. Turck, Chris Develder","doi":"10.1109/NOMS.2012.6211928","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211928","url":null,"abstract":"Distributed renewable power generators, such as solar cells and wind turbines are difficult to predict, making the demand-supply problem more complex than in the traditional energy production scenario. They also introduce bidirectional energy flows in the low-voltage power grid, possibly causing voltage violations and grid instabilities. In this article we describe a distributed algorithm for residential energy management in smart power grids. This algorithm consists of a market-oriented multi-agent system using virtual energy prices, levels of renewable energy in the real-time production mix, and historical price information, to achieve a shifting of loads to periods with a high production of renewable energy. Evaluations in our smart grid simulator for three scenarios show that the designed algorithm is capable of improving the self consumption of renewable energy in a residential area and reducing the average and peak loads for externally supplied power.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123020234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信