2012 IEEE Network Operations and Management Symposium最新文献

筛选
英文 中文
Bussiness-driven automatic IT change management based on machine learning 基于机器学习的业务驱动的自动IT变更管理
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6212078
Haochen Li, Zhiqiang Zhan
{"title":"Bussiness-driven automatic IT change management based on machine learning","authors":"Haochen Li, Zhiqiang Zhan","doi":"10.1109/NOMS.2012.6212078","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6212078","url":null,"abstract":"Growing complexity of customer needs is one of the prevailing problems faced by IT enterprises at present, leading to increasingly complex IT service management systems. At the same time, quick response to unexpected problems and externally imposed requirements are testing the IT change management. In order to solve the problems mentioned above and satisfy the customer needs timely, we consider automating the change management process with business-driven perspective so as to reduce the service interruption time and cost brings by changes. This paper proposes a solution for automation of the whole change management process and also assesses and validates the change solution we selected.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116460740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
End-to-end verification of QoS policies QoS策略的端到端验证
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211927
A. El-Atawy, T. Samak
{"title":"End-to-end verification of QoS policies","authors":"A. El-Atawy, T. Samak","doi":"10.1109/NOMS.2012.6211927","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211927","url":null,"abstract":"Configuring a large number of routers and network devices to achieve quality of service (QoS) goals is a challenging task. In a differentiated services (DiffServ) environment, traffic flows are assigned specific classes of service, and service level agreements (SLA) are enforced at routers within each domain. We present a model for QoS configurations that facilitates efficient property-based verification. Network configuration is given as a set of policies governing each device. The model efficiently checks the required properties against the current configuration using computation tree logic (CTL) model checking. By symbolically modeling possible decision paths for different flows from source to destination, properties can be checked at each hop, and assessments can be made on how closely configurations adhere to the specified agreement. The model also covers configuration debugging given a specific QoS violation. Efficiency and scalability of the model are analyzed for policy per-hop behavior (PHB) parameters over large network configurations.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114732815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PCA-subspace method — Is it good enough for network-wide anomaly detection pca -子空间方法-对于全网范围的异常检测是否足够好
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211919
Bin Zhang, Jiahai Yang, Jianping Wu, Donghong Qin, Lei Gao
{"title":"PCA-subspace method — Is it good enough for network-wide anomaly detection","authors":"Bin Zhang, Jiahai Yang, Jianping Wu, Donghong Qin, Lei Gao","doi":"10.1109/NOMS.2012.6211919","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211919","url":null,"abstract":"PCA-subspace method has been proposed for network-wide anomaly detection. Normal subspace contamination is still a great challenge for PCA although some methods are proposed to reduce the contamination. In this paper, we apply PCA-subspace method to six-month Origin-Destination (OD) flow data from the Abilene. The result shows that normal subspace contamination is mainly caused by anomalies from a few strongest OD flows, and seems unavoidable for subspace method. Further comparison of anomalies detected by subspace method and manually tagged anomalies from each OD flows, we find that anomalies detected by subspace method are mainly caused by anomalies from medium and a few large OD flows, and most anomalies of minor OD flows are buried in abnormal subspace and hard to be detected by PCA-subspace method. We analyze the reason for those anomalies undetected by subspace method and suggest to use normal subspace to detect anomalies caused by a few strongest OD flows, and to further divide abnormal subspace to detect more anomalies from minor OD flows. The goal of this paper is to address limitations neglected by prior works and further improve the subspace method on one hand, also call for novel detection methods for network-wide traffic on another hand.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115769427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A framework for the design and evaluation of network resilience management 网络弹性管理的设计与评估框架
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211924
A. E. S. Filho, Paul Smith, A. Mauthe, D. Hutchison, Yue Yu, M. Fry
{"title":"A framework for the design and evaluation of network resilience management","authors":"A. E. S. Filho, Paul Smith, A. Mauthe, D. Hutchison, Yue Yu, M. Fry","doi":"10.1109/NOMS.2012.6211924","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211924","url":null,"abstract":"Network resilience strategies aim to maintain acceptable levels of network operation in the face of challenges, such as malicious attacks, operational overload or equipment failures. Often the nature of these challenges requires resilience strategies comprising mechanisms across multiple protocol layers and in disparate locations of the network. In this paper, we address the problem of resilience management and advocate that a new approach is needed for the design and evaluation of resilience strategies. To support the realisation of this approach we propose a framework that enables (1) the offline evaluation of resilience strategies to combat several types of challenges, (2) the generalisation of successful solutions into reusable patterns of mechanisms, and (3) the rapid deployment of appropriate patterns when challenges are observed at run-time. The evaluation platform permits the simulation of a range of challenge scenarios and the resilience strategies used to combat these challenges. Strategies that can successfully address a particular type of challenge can be promoted to become resilience patterns. Patterns can thus be used to rapidly deploy resilience configurations of mechanisms when similar challenges are detected in the live network.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115540884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A first look into SCADA network traffic 首先看看SCADA网络流量
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211945
R. Barbosa, R. Sadre, A. Pras
{"title":"A first look into SCADA network traffic","authors":"R. Barbosa, R. Sadre, A. Pras","doi":"10.1109/NOMS.2012.6211945","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211945","url":null,"abstract":"Supervisory Control and Data Acquisition (SCADA) networks are commonly deployed to aid the operation of critical infrastructures, such as water distribution facilities. These networks provide automated processes that ensure the correct functioning of these infrastructures, in a operation much similar to those of management operations found in traditional Internet Protocol (IP), in particular the Simple Network Management Protocol (SNMP). In this paper we provide a first look into characteristics of SCADA traffic, with the goal of building an empirical foundation for future research, and investigate to what extent the SCADA traffic patterns are similar to SNMP.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123892818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Performance assessment of cluster load balancing routing methods for triple play services in Wireless Mesh Networks 无线Mesh网络中三网融合业务集群负载均衡路由方法的性能评估
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6212017
Vinicius C. M. Borges, Erik Dimitrov, M. Curado, E. Monteiro
{"title":"Performance assessment of cluster load balancing routing methods for triple play services in Wireless Mesh Networks","authors":"Vinicius C. M. Borges, Erik Dimitrov, M. Curado, E. Monteiro","doi":"10.1109/NOMS.2012.6212017","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6212017","url":null,"abstract":"Wireless Mesh Networks (WMNs) are being called upon to improve their management policies to support a wide range of multimedia applications. As gateways towards wired networks are potential bottlenecks, cluster load balancing routing methods between multiple gateways play a central role in the routing management of the WMNs. This is especially important for demanding interactive applications, for instance triple play services which include traditional applications such as data applications, voice, and video over IP. However, the current performance assessment of these methods does not take into consideration triple play services in their traffic model and this paper seeks to fill this gap. This entails providing a detailed description of each method and carrying out a comparative evaluation by simulating a traffic model for triple play services. This performance assessment compares these cluster load balancing methods by assessing the traditional traffic performance parameters, while varying the traffic load which is the main variable factor that affects the load balancing methods. The results support that the cluster load balancing routing methods as well as the traffic load have a significant impact on each application performance when the applications are evaluated separately and moreover, they still have impact on the triple play services but it is lesser significant than when a single application is evaluated. Furthermore, the most agile and flexible method results in more scalable triple play service.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121896737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards the assessment of distributed vulnerabilities in autonomic networks and systems 对自主网络和系统中的分布式漏洞进行评估
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211916
Martín Barrère, Rémi Badonnel, O. Festor
{"title":"Towards the assessment of distributed vulnerabilities in autonomic networks and systems","authors":"Martín Barrère, Rémi Badonnel, O. Festor","doi":"10.1109/NOMS.2012.6211916","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211916","url":null,"abstract":"Vulnerability management constitutes a crucial activity within autonomic networks and systems. Distributed vulnerabilities must be assessed over a consolidated view of the network in order to detect vulnerable states that may simultaneously involve two or more devices. In this work, we present a novel approach for describing and assessing distributed vulnerabilities in such self-governed environments. We put forward a mathematical construction for defining distributed vulnerabilities as well as an extension of the OVAL language called DOVAL for describing them. We then define a framework for assessing distributed vulnerabilities in autonomic environments that exploits the knowledge provided by such descriptions. We finally show the feasibility of our solution by analyzing the behavior of the proposed algorithms and strategies through a comprehensive set of experiments.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129611910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Optimization for time-driven link sleeping reconfigurations in ISP backbone networks ISP骨干网中时间驱动的链路休眠重构优化
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211902
Frédéric François, Ning Wang, K. Moessner, S. Georgoulas
{"title":"Optimization for time-driven link sleeping reconfigurations in ISP backbone networks","authors":"Frédéric François, Ning Wang, K. Moessner, S. Georgoulas","doi":"10.1109/NOMS.2012.6211902","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211902","url":null,"abstract":"Backbone network energy efficiency has recently become a primary concern for Internet Service Providers and regulators. The common solutions for energy conservation in such an environment include sleep mode reconfigurations and rate adaptation at network devices when the traffic volume is low. It has been observed that many ISP networks exhibit regular traffic dynamicity patterns which can be exploited for practical time-driven link sleeping configurations. In this work, we propose a joint optimization algorithm to compute the reduced network topology and its actual configuration duration during daily operations. The main idea is first to intelligently remove network links using a greedy heuristic, without causing network congestion during off-peak time. Following that, a robust algorithm is applied to determine the window size of the configuration duration of the reduced topology, making sure that a unified configuration with optimized energy efficiency performance can be enforced exactly at the same time period on a daily basis. Our algorithm was evaluated using on a Point-of-Presence representation of the GÉANT network and its real traffic matrices. According to our simulation results, the reduced network topology obtained is able to achieve 18.6% energy reduction during that period without causing significant network performance deterioration. The contribution from this work is a practical but efficient approach for energy savings in ISP networks, which can be directly deployed on legacy routing platforms without requiring any protocol extension.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Network-based synchronizing control of a practical microgrid 实用微电网的基于网络的同步控制
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211989
Changhee Cho, J. Jeon, Jong-Yul Kim, Soonman Kwon, Sungshin Kim
{"title":"Network-based synchronizing control of a practical microgrid","authors":"Changhee Cho, J. Jeon, Jong-Yul Kim, Soonman Kwon, Sungshin Kim","doi":"10.1109/NOMS.2012.6211989","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211989","url":null,"abstract":"This application track paper describes the network-based distributed control technology that is applied to practical microgrid application. The paper is dealing with network-based remote sensors, central calculation of control offset signals, and the remote control of distributed generation resources. Through the dynamic modeling and experimental test results, characteristics of the proposed control scheme is shown and the performance is verified.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131120374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SAAM: A self-adaptive aggregation mechanism for autonomous management systems SAAM:自治管理系统的自适应聚合机制
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211982
R. Makhloufi, G. Doyen, Grégory Bonnet, D. Gaïti
{"title":"SAAM: A self-adaptive aggregation mechanism for autonomous management systems","authors":"R. Makhloufi, G. Doyen, Grégory Bonnet, D. Gaïti","doi":"10.1109/NOMS.2012.6211982","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211982","url":null,"abstract":"In this paper, we propose a decentralized Self-Adaptive Aggregation Mechanism (SAAM) that adapts itself to the supporting network operational behavior by dynamically selecting the best aggregation approach to use. SAAM is based on (1) a fuzzy-based model that estimates the cost and performance of each aggregation scheme and (2) Multiple Attribute Decision Making (MADM) to make decisions on the best approach to use in this context. We validate SAAM by evaluating its fuzzy model and adaptation cost, and by comparing its utility to the one of existing situated and global schemes.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128469832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书