{"title":"Cost-effective complex service mapping in cloud infrastructures","authors":"K. Tran, N. Agoulmine, Y. Iraqi","doi":"10.1109/NOMS.2012.6211876","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211876","url":null,"abstract":"In cloud computing, instead of building their own network and facilities, companies can allocate resources from network operators, thus reducing hardware investment and maintenance cost. The company's IT infrastructure can be designed as an abstract virtual graph of services to be mapped into the substrate network of the operator. In this paper, we refer to the virtual graph mapping problem as service composition. How to identify and locate the substrate components to map the virtual graph to in an optimal way is the subject of this paper. We propose three algorithms for three different graph topologies: path, star, and tree, whose complexity is O(V3) + O(ERV2) where V is the set of substrate network nodes and ER is the set of virtual links. We also provide simulations to evaluate the performance of our algorithms.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131254050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed service control technique for detecting security attacks","authors":"U. Tupakula, V. Varadharajan","doi":"10.1109/NOMS.2012.6211959","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211959","url":null,"abstract":"We propose Distributed Service Control (DSC) technique for securing critical services. One of the main aims of DSC is to deal with the attacks by minimising the attack surface between two hosts. In our model, light weight security policies are enforced at the client machines to ensure that the client can access the services using legitimate traffic only. This will minimise the number of attacks that can be generated by the malicious client machine on the server. We will show that our model can increase the availability of the critical services. Our model can also be used as an early detection technique for the outbreak of worms.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133414759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Trestian, Arghir-Nicolae Moldovan, Olga Ormond, Gabriel-Miro Muntean
{"title":"Energy consumption analysis of video streaming to Android mobile devices","authors":"R. Trestian, Arghir-Nicolae Moldovan, Olga Ormond, Gabriel-Miro Muntean","doi":"10.1109/NOMS.2012.6211929","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211929","url":null,"abstract":"Energy conservation has become a critical issue around the world. In smart phones, battery power capabilities are not keeping up with the advances in other technologies (e.g., processing and memory) and are rapidly becoming a concern, especially in view of the growth in usage of energy-hungry mobile multimedia streaming. The deficiency in battery power and the need for reduced energy consumption provides motivation for researchers to develop energy efficient techniques in order to manage the power consumption in next-generation wireless networks. As there is little analysis in the literature on the relationship between the wireless environment and the mobile device energy consumption, this paper investigates the impact of network-related factors (e.g., network load and signal quality level) on the power consumption of the mobile device in the context of video delivery. This paper analyzes the energy consumption of an Android device and the efficiency of the system in several scenarios while performing video delivery (over UDP or TCP) on an IEEE 802.11g network. The results show that the network load and the signal quality level have a combined significant impact on the energy consumption. This analysis can be further used when proposing energy efficient adaptive multimedia and handover mechanisms.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, S. Ata, Dijiang Huang, D. Medhi
{"title":"SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation","authors":"Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, S. Ata, Dijiang Huang, D. Medhi","doi":"10.1109/NOMS.2012.6212043","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6212043","url":null,"abstract":"A secure network is considered to be an important goal of the Future Internet; one way this can be embodied is by having flexible and robust routing functionalities with intrinsic security mechanisms. It is also desirable to provide user-centric or service-centric routing capabilities to achieve service-oriented traffic controls as well as trust and policy management for security. Based on these potential needs, a flexible, scalable, and robust routing framework that enables fine-grained flow control under fixed or dynamic policies called the Virtual Trusted Routing and Provisioning Domain (VTRouPD)[11] has been recently proposed. In this paper, we present a framework called the Secure and Resilient Virtual Trust Routing (SeRViTR) framework, which is a proof-of-concept model of VTRouPD at the implementation level. SeRViTR has particular entities that are designed for policy management and trust management between different VTRouPDs to enable a secure Internet. We define the roles of each entity within the SeRViTR framework as well as the messages exchanged between them. We also discuss how policy management and trust negotiation can be achieved. Moreover, we present validation on the functional implementation of several SeRViTR components to illustrate how to create virtual domains and change of trust levels between virtual domains.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131980201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mattias Marder, K. Bhaskaran, Milton Hernandez, Jim Laredo, D. Rosu, Yaoping Ruan, Paul Driscoll, Alan Skinner
{"title":"Integrated user activity monitoring for regulatory services","authors":"Mattias Marder, K. Bhaskaran, Milton Hernandez, Jim Laredo, D. Rosu, Yaoping Ruan, Paul Driscoll, Alan Skinner","doi":"10.1109/NOMS.2012.6211992","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211992","url":null,"abstract":"Regulations such as FFIEC [5] and HIPAA [6] require activities of system administration to be captured and reviewed regularly. In IT service delivery environment, system maintenance activities are usually performed by the service provider whose system administrators access customer environment based on problem and change ticket being assigned.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134473269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CloudVS: Enabling version control for virtual machines in an open-source cloud under commodity settings","authors":"C. Tang, T. Wong, P. Lee","doi":"10.1109/NOMS.2012.6211898","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211898","url":null,"abstract":"Open-source cloud platforms provide a feasible alternative of deploying cloud computing in low-cost commodity hardware and operating systems. To enhance the reliability of an open-source cloud, we propose CloudVS, an add-on system that enables version control for virtual machines (VMs). CloudVS targets a commodity cloud platform that has limited available resources. It exploits content similarities across different VM versions using redundancy elimination (RE), such that only non-redundant data chunks of a VM version are transmitted over the network and kept in persistent storage. Using RE as a building block, we propose a suite of performance adaptation mechanisms that make CloudVS amenable to different commodity settings. Specifically, we propose a tunable mechanism to balance the storage and disk seek overheads, as well as various I/O optimization techniques to minimize the interferences to other coresident processes. Using a 3-month span of real VM snapshots, we experiment CloudVS in an open-source cloud testbed built on Eucalyptus. We demonstrate how CloudVS leverages RE to save the storage cost and the VM operation time than simply keeping full VM images. More importantly, we show how CloudVS can be parameterized to balance the performance trade-offs between version control and normal VM operations.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133593614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimized seamless IP flow mobility management architecture for traffic offloading","authors":"Jinho Kim, Y. Morioka, J. Hagiwara","doi":"10.1109/NOMS.2012.6211903","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211903","url":null,"abstract":"In recent years, mobile users have desire for the simultaneous access of multiple wireless networks as well as seamless movement of selected IP flow traffic between different wireless radio technologies according to user preferences. This paper proposes an optimized seamless IP flow handover mechanism for traffic offloading, based on mobile-initiated with network-based mobility management. The proposed mechanism enhances handover performances by enabling the simultaneous use of multiple interfaces during flow mobility.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133602727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revenue-maximizing server selection and admission control for IPTV content servers using available bandwidth estimates","authors":"Brian Meskill, A. Davy, B. Jennings","doi":"10.1109/NOMS.2012.6211914","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211914","url":null,"abstract":"We present a server selection and admission control algorithm for IPTV networks that uses available bandwidth estimation to assess bandwidth available on the path from an end-user point of attachment to one or more IPTV content servers and that employs a revenue maximising admission decision process that prioritizes requests for high revenue content item types over requests for lower revenue item types. The algorithm operates by estimating expected request arrival rates for different content item types based on past arrival rates and, based on these and available bandwidth estimates decides whether to accept a new request and, when accepting requests, which of the available content servers to use. Results of a simulation study show that the algorithm succeeds in 1) maintaining acceptable packet delays for accepted flows in the presence of fluctuating background traffic on network paths and 2) when available bandwidth is limited prioritizing requests for higher revenue content types.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129327204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spring-based geolocation","authors":"Stephan M. Günther, Johann Schlamp, G. Carle","doi":"10.1109/NOMS.2012.6211952","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211952","url":null,"abstract":"Given an IP address, it is a challenging task to obtain its geographic location. Besides approaches which associate coordinates with IP addresses in a predominantly static way, there are also measurement based approaches that exploit the correlation between the propagation delay of signals and round trip times of probe packets. We analyze multiple approaches solely based on delay measurements, i. e. without the use of third-party knowledge, and obtain mean errors of just under 100 km. In this paper, we propose a new model for IP geolocation which combines the strengths of different previous techniques and reduces IP geolocation to the problem of finding equilibrium points in a spring system. Our approach, called Spring-Based Geolocation (SBG), is able to reduce the mean error to less than 75km in our experiments without adding significant complexity. In fact, our model allows for additional data sources in a natural way, which has the potential to further improve results.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123472141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Firewall anomaly detection with a model checker for visibility logic","authors":"Bassam Khorchani, Sylvain Hallé, Roger Villemaire","doi":"10.1109/NOMS.2012.6211932","DOIUrl":"https://doi.org/10.1109/NOMS.2012.6211932","url":null,"abstract":"An anomaly in a firewall is a relationship between two of its rules that may hint at a possible misconfiguration of its filter. One notable limitation of existing solutions for firewall analysis is that they provide algorithms tailored for the verification of specific anomalies. We introduce a modal logic, called Visibility Logic (VL), which can be used to express arbitrary patterns between rules inside a firewall. A model checker allows one to verify any formula expressed in visibility logic, of which traditional anomalies are merely particular instances, with running times of under one second for 1,500 rules.","PeriodicalId":364494,"journal":{"name":"2012 IEEE Network Operations and Management Symposium","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123823776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}