2012 IEEE Network Operations and Management Symposium最新文献

筛选
英文 中文
Cost-effective complex service mapping in cloud infrastructures 云基础设施中具有成本效益的复杂服务映射
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211876
K. Tran, N. Agoulmine, Y. Iraqi
{"title":"Cost-effective complex service mapping in cloud infrastructures","authors":"K. Tran, N. Agoulmine, Y. Iraqi","doi":"10.1109/NOMS.2012.6211876","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211876","url":null,"abstract":"In cloud computing, instead of building their own network and facilities, companies can allocate resources from network operators, thus reducing hardware investment and maintenance cost. The company's IT infrastructure can be designed as an abstract virtual graph of services to be mapped into the substrate network of the operator. In this paper, we refer to the virtual graph mapping problem as service composition. How to identify and locate the substrate components to map the virtual graph to in an optimal way is the subject of this paper. We propose three algorithms for three different graph topologies: path, star, and tree, whose complexity is O(V3) + O(ERV2) where V is the set of substrate network nodes and ER is the set of virtual links. We also provide simulations to evaluate the performance of our algorithms.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131254050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Distributed service control technique for detecting security attacks 用于检测安全攻击的分布式服务控制技术
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211959
U. Tupakula, V. Varadharajan
{"title":"Distributed service control technique for detecting security attacks","authors":"U. Tupakula, V. Varadharajan","doi":"10.1109/NOMS.2012.6211959","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211959","url":null,"abstract":"We propose Distributed Service Control (DSC) technique for securing critical services. One of the main aims of DSC is to deal with the attacks by minimising the attack surface between two hosts. In our model, light weight security policies are enforced at the client machines to ensure that the client can access the services using legitimate traffic only. This will minimise the number of attacks that can be generated by the malicious client machine on the server. We will show that our model can increase the availability of the critical services. Our model can also be used as an early detection technique for the outbreak of worms.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133414759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy consumption analysis of video streaming to Android mobile devices Android移动设备视频流的能耗分析
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211929
R. Trestian, Arghir-Nicolae Moldovan, Olga Ormond, Gabriel-Miro Muntean
{"title":"Energy consumption analysis of video streaming to Android mobile devices","authors":"R. Trestian, Arghir-Nicolae Moldovan, Olga Ormond, Gabriel-Miro Muntean","doi":"10.1109/NOMS.2012.6211929","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211929","url":null,"abstract":"Energy conservation has become a critical issue around the world. In smart phones, battery power capabilities are not keeping up with the advances in other technologies (e.g., processing and memory) and are rapidly becoming a concern, especially in view of the growth in usage of energy-hungry mobile multimedia streaming. The deficiency in battery power and the need for reduced energy consumption provides motivation for researchers to develop energy efficient techniques in order to manage the power consumption in next-generation wireless networks. As there is little analysis in the literature on the relationship between the wireless environment and the mobile device energy consumption, this paper investigates the impact of network-related factors (e.g., network load and signal quality level) on the power consumption of the mobile device in the context of video delivery. This paper analyzes the energy consumption of an Android device and the efficiency of the system in several scenarios while performing video delivery (over UDP or TCP) on an IEEE 802.11g network. The results show that the network load and the signal quality level have a combined significant impact on the energy consumption. This analysis can be further used when proposing energy efficient adaptive multimedia and handover mechanisms.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 125
SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation SeRViTR:用于安全Internet的信任和策略管理框架及其概念验证实现
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6212043
Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, S. Ata, Dijiang Huang, D. Medhi
{"title":"SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation","authors":"Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, S. Ata, Dijiang Huang, D. Medhi","doi":"10.1109/NOMS.2012.6212043","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6212043","url":null,"abstract":"A secure network is considered to be an important goal of the Future Internet; one way this can be embodied is by having flexible and robust routing functionalities with intrinsic security mechanisms. It is also desirable to provide user-centric or service-centric routing capabilities to achieve service-oriented traffic controls as well as trust and policy management for security. Based on these potential needs, a flexible, scalable, and robust routing framework that enables fine-grained flow control under fixed or dynamic policies called the Virtual Trusted Routing and Provisioning Domain (VTRouPD)[11] has been recently proposed. In this paper, we present a framework called the Secure and Resilient Virtual Trust Routing (SeRViTR) framework, which is a proof-of-concept model of VTRouPD at the implementation level. SeRViTR has particular entities that are designed for policy management and trust management between different VTRouPDs to enable a secure Internet. We define the roles of each entity within the SeRViTR framework as well as the messages exchanged between them. We also discuss how policy management and trust negotiation can be achieved. Moreover, we present validation on the functional implementation of several SeRViTR components to illustrate how to create virtual domains and change of trust levels between virtual domains.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131980201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Integrated user activity monitoring for regulatory services 用于监管服务的集成用户活动监控
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211992
Mattias Marder, K. Bhaskaran, Milton Hernandez, Jim Laredo, D. Rosu, Yaoping Ruan, Paul Driscoll, Alan Skinner
{"title":"Integrated user activity monitoring for regulatory services","authors":"Mattias Marder, K. Bhaskaran, Milton Hernandez, Jim Laredo, D. Rosu, Yaoping Ruan, Paul Driscoll, Alan Skinner","doi":"10.1109/NOMS.2012.6211992","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211992","url":null,"abstract":"Regulations such as FFIEC [5] and HIPAA [6] require activities of system administration to be captured and reviewed regularly. In IT service delivery environment, system maintenance activities are usually performed by the service provider whose system administrators access customer environment based on problem and change ticket being assigned.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CloudVS: Enabling version control for virtual machines in an open-source cloud under commodity settings clouddvs:在商品设置下为开源云中的虚拟机启用版本控制
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211898
C. Tang, T. Wong, P. Lee
{"title":"CloudVS: Enabling version control for virtual machines in an open-source cloud under commodity settings","authors":"C. Tang, T. Wong, P. Lee","doi":"10.1109/NOMS.2012.6211898","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211898","url":null,"abstract":"Open-source cloud platforms provide a feasible alternative of deploying cloud computing in low-cost commodity hardware and operating systems. To enhance the reliability of an open-source cloud, we propose CloudVS, an add-on system that enables version control for virtual machines (VMs). CloudVS targets a commodity cloud platform that has limited available resources. It exploits content similarities across different VM versions using redundancy elimination (RE), such that only non-redundant data chunks of a VM version are transmitted over the network and kept in persistent storage. Using RE as a building block, we propose a suite of performance adaptation mechanisms that make CloudVS amenable to different commodity settings. Specifically, we propose a tunable mechanism to balance the storage and disk seek overheads, as well as various I/O optimization techniques to minimize the interferences to other coresident processes. Using a 3-month span of real VM snapshots, we experiment CloudVS in an open-source cloud testbed built on Eucalyptus. We demonstrate how CloudVS leverages RE to save the storage cost and the VM operation time than simply keeping full VM images. More importantly, we show how CloudVS can be parameterized to balance the performance trade-offs between version control and normal VM operations.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133593614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An optimized seamless IP flow mobility management architecture for traffic offloading 优化的无缝IP流移动性管理架构,实现流量分流
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211903
Jinho Kim, Y. Morioka, J. Hagiwara
{"title":"An optimized seamless IP flow mobility management architecture for traffic offloading","authors":"Jinho Kim, Y. Morioka, J. Hagiwara","doi":"10.1109/NOMS.2012.6211903","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211903","url":null,"abstract":"In recent years, mobile users have desire for the simultaneous access of multiple wireless networks as well as seamless movement of selected IP flow traffic between different wireless radio technologies according to user preferences. This paper proposes an optimized seamless IP flow handover mechanism for traffic offloading, based on mobile-initiated with network-based mobility management. The proposed mechanism enhances handover performances by enabling the simultaneous use of multiple interfaces during flow mobility.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133602727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Revenue-maximizing server selection and admission control for IPTV content servers using available bandwidth estimates 利用可用带宽估计实现收益最大化的IPTV内容服务器选择和准入控制
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211914
Brian Meskill, A. Davy, B. Jennings
{"title":"Revenue-maximizing server selection and admission control for IPTV content servers using available bandwidth estimates","authors":"Brian Meskill, A. Davy, B. Jennings","doi":"10.1109/NOMS.2012.6211914","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211914","url":null,"abstract":"We present a server selection and admission control algorithm for IPTV networks that uses available bandwidth estimation to assess bandwidth available on the path from an end-user point of attachment to one or more IPTV content servers and that employs a revenue maximising admission decision process that prioritizes requests for high revenue content item types over requests for lower revenue item types. The algorithm operates by estimating expected request arrival rates for different content item types based on past arrival rates and, based on these and available bandwidth estimates decides whether to accept a new request and, when accepting requests, which of the available content servers to use. Results of a simulation study show that the algorithm succeeds in 1) maintaining acceptable packet delays for accepted flows in the presence of fluctuating background traffic on network paths and 2) when available bandwidth is limited prioritizing requests for higher revenue content types.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129327204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Spring-based geolocation 基于spring的地理位置
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211952
Stephan M. Günther, Johann Schlamp, G. Carle
{"title":"Spring-based geolocation","authors":"Stephan M. Günther, Johann Schlamp, G. Carle","doi":"10.1109/NOMS.2012.6211952","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211952","url":null,"abstract":"Given an IP address, it is a challenging task to obtain its geographic location. Besides approaches which associate coordinates with IP addresses in a predominantly static way, there are also measurement based approaches that exploit the correlation between the propagation delay of signals and round trip times of probe packets. We analyze multiple approaches solely based on delay measurements, i. e. without the use of third-party knowledge, and obtain mean errors of just under 100 km. In this paper, we propose a new model for IP geolocation which combines the strengths of different previous techniques and reduces IP geolocation to the problem of finding equilibrium points in a spring system. Our approach, called Spring-Based Geolocation (SBG), is able to reduce the mean error to less than 75km in our experiments without adding significant complexity. In fact, our model allows for additional data sources in a natural way, which has the potential to further improve results.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123472141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Firewall anomaly detection with a model checker for visibility logic 防火墙异常检测与可见性逻辑的模型检查器
2012 IEEE Network Operations and Management Symposium Pub Date : 2012-04-16 DOI: 10.1109/NOMS.2012.6211932
Bassam Khorchani, Sylvain Hallé, Roger Villemaire
{"title":"Firewall anomaly detection with a model checker for visibility logic","authors":"Bassam Khorchani, Sylvain Hallé, Roger Villemaire","doi":"10.1109/NOMS.2012.6211932","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211932","url":null,"abstract":"An anomaly in a firewall is a relationship between two of its rules that may hint at a possible misconfiguration of its filter. One notable limitation of existing solutions for firewall analysis is that they provide algorithms tailored for the verification of specific anomalies. We introduce a modal logic, called Visibility Logic (VL), which can be used to express arbitrary patterns between rules inside a firewall. A model checker allows one to verify any formula expressed in visibility logic, of which traditional anomalies are merely particular instances, with running times of under one second for 1,500 rules.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123823776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信