P. Alemany, Thomas Soenen, Carlos Parada, José Bonnet, R. Casellas, R. Martínez, R. Vilalta, R. Muñoz, J. D. L. Cruz, Ana Pol, Antón Román, P. Trakadas, P. Karkazis, M. Touloupou, E. Kapassa, D. Kyriazis
{"title":"Network Slicing Over A Packet/Optical Network For Vertical Applications Applied To Multimedia Real-Time Communications","authors":"P. Alemany, Thomas Soenen, Carlos Parada, José Bonnet, R. Casellas, R. Martínez, R. Vilalta, R. Muñoz, J. D. L. Cruz, Ana Pol, Antón Román, P. Trakadas, P. Karkazis, M. Touloupou, E. Kapassa, D. Kyriazis","doi":"10.1109/NFV-SDN47374.2019.9040062","DOIUrl":"https://doi.org/10.1109/NFV-SDN47374.2019.9040062","url":null,"abstract":"This demo presents the deployment of two network slices with different QoS using a packet and optical networks for the deployment of multiple real-time communication suites. Two novel features of SONATA Service Platform are demonstrated: QoS-based network slices and WIM support through ONF Transport API.","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114863141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Contoli, Fabio Palumbo, Flavio Esposito, F. Callegati, A. Pescapé
{"title":"Flock: A Live Migration Protocol for SDN Controllers","authors":"C. Contoli, Fabio Palumbo, Flavio Esposito, F. Callegati, A. Pescapé","doi":"10.1109/NFV-SDN47374.2019.9040146","DOIUrl":"https://doi.org/10.1109/NFV-SDN47374.2019.9040146","url":null,"abstract":"Availability is a fundamental operational challenge of any networked system. Software-Defined Networks (SDN) and Network Function Virtualization (NFV) systems are no exception. While extensive work exists on lightweight virtual machines live migration, and SDN controllers are claimed to be only logically centralized, specifications for a live controller migration protocol have not been written yet.In this paper, we propose the design and implementation of Flock, a live controller migration protocol that works independently from the underlying software-defined infrastructure, a feature lacking in every related solution. We also propose the controller-switch assignment problem and show that no pseudo-polynomial algorithm exists to solve it, unless P=NP. Our initial evaluation results with the Ryu controller show expected minimal protocol overhead.","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126933408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating Adversarial Attacks against Network Intrusion Detection Systems in SDNs","authors":"James Aiken, Sandra Scott-Hayward","doi":"10.1109/NFV-SDN47374.2019.9040101","DOIUrl":"https://doi.org/10.1109/NFV-SDN47374.2019.9040101","url":null,"abstract":"Machine-learning based network intrusion detection systems (ML-NIDS) are increasingly popular in the fight against network attacks. In particular, promising detection results have been demonstrated in conjunction with Software-Defined Networks (SDN), in which the logically centralized control plane provides access to data from across the network. However, research into adversarial attacks against machine learning classifiers has highlighted vulnerabilities in a number of fields. These vulnerabilities raise concerns about the implementation of similar classifiers in anomaly-based NIDSs within SDNs. In this work, we investigate the viability of adversarial attacks against classifiers in this field. We implement an anomaly-based NIDS, Neptune, as a target platform that utilises a number of different machine learning classifiers and traffic flow features. We develop an adversarial test tool, Hydra, to evaluate the impact of adversarial evasion classifier attacks against Neptune with the goal of lowering the detection rate of malicious network traffic. The results demonstrate that with the perturbation of a few features, the detection accuracy of a specific SYN flood Distributed Denial of Service (DDoS) attack by Neptune decreases from 100% to 0% across a number of classifiers. Based on these results, recommendations are made as to how to increase the robustness of classifiers against the demonstrated attacks.","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Novel Security Architectures for Network Functions Virtualization","authors":"M. Repetto, A. Carrega, G. Lamanna","doi":"10.1109/NFV-SDN47374.2019.9040068","DOIUrl":"https://doi.org/10.1109/NFV-SDN47374.2019.9040068","url":null,"abstract":"The definition of elastic network services that can be orchestrated at run-time brings unprecedented agility and dynamicity in network operation, but also complicates security management. As a matter of fact, cyber-security appliances are still largely stuck to traditional paradigms, based on relatively static topologies and the security perimeter model. The uptake of service-oriented architectures and microservices is now suggesting to compose security services by orchestrating monitoring, inspection, and enforcement capabilities, which are natively implemented in each elementary component (virtual functions, software-defined network equipment). In this paper, we describe and evaluate a novel framework for monitoring, inspection and enforcement that provides a broad and heterogeneous security context for centralized analytics, correlation and detection. Our work represents the preliminary step towards the creation of true Security-as-a-Service (SecaaS) paradigms in virtualized environments, through programmatic composition of common capabilities available in each virtual function.","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121699110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomalous Rule Detection using Machine Learning in Software Defined Networks","authors":"Vignesh Sridharan, G. Mohan, A. Leon-Garcia","doi":"10.1109/NFV-SDN47374.2019.9039984","DOIUrl":"https://doi.org/10.1109/NFV-SDN47374.2019.9039984","url":null,"abstract":"The centralized control plane in Software Defined Networking (SDN) introduces new security threats to the network. A compromised controller can install malicious rules at the switches to perform stealthy attacks such as intermittent packet dropping, route misdirection etc. Replication based approaches in the literature require the switches to broadcast the requests to multiple controllers and verify the rules for consistency before installing them. However, they result in heavy load on the control plane and longer response time for requests from the switches. Other approaches assume forwarding elements, rather than the controller, to be compromised and propose packet sampling and active probing to identify malicious behavior. In this work, we: i) propose a machine learning based framework to detect anomalous behavior at the flow table and identify the compromised controller, ii) develop MTADS, a M achine learning based detection T echnique for A nomaly D etection in S DN, which uses D BSCAN algorithm to identify anomalous rules and behavior, and iii) implement MTADS on top of Floodlight controller managing a network emulated in Mininet and test its detection capabilities against various attacks such as route misdirection, packet drop etc. We compare the performance of MTADS (based on DBSCAN) with K-Means algorithm and show that MTADS (DBSCAN) outperforms the K-Means version and achieves precision and recall of about 85% and 95&, respectively.","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114589913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NFV-SDN 2019 Welcome","authors":"","doi":"10.1109/nfv-sdn47374.2019.9040107","DOIUrl":"https://doi.org/10.1109/nfv-sdn47374.2019.9040107","url":null,"abstract":"","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134140375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Wernecke, Helge Parzyjegla, Gero Mühl, E. Schweissguth, D. Timmermann
{"title":"Flexible Notification Forwarding for Content-Based Publish/Subscribe Using P4","authors":"Christian Wernecke, Helge Parzyjegla, Gero Mühl, E. Schweissguth, D. Timmermann","doi":"10.1109/NFV-SDN47374.2019.9040048","DOIUrl":"https://doi.org/10.1109/NFV-SDN47374.2019.9040048","url":null,"abstract":"Publish/subscribe is a versatile communication pattern for realizing loosely coupled distributed applications. In its content-based variant, the content of each published notification is matched against the active subscriptions to determine the set of subscribers that shall receive the notification. The fact that this set may be completely different compared to that of a preceding or a succeeding notification makes it difficult to find and install beneficial forwarding rules on the network switches. In this paper, we present novel forwarding schemes based on the P4 language that (i) use dynamic forwarding information placed in the notification’s header, (ii) use static forwarding rules installed on the network switches, and (iii) combine dynamic forwarding information with static forwarding rules to precisely set the respective trade-off. We evaluate our forwarding strategies, show their applicability as well as their benefits for content-based publish/subscribe, and discuss future research directions.","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114267892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roberto Torre Arranz, Goiuri Peralta, Oleksandr Zhdanenko, Alexander Kropp, H. Salah, Giang T. Nguyen, S. Mudriievskyi, F. Fitzek
{"title":"Enhanced Driving with 5G: A New Approach for Alleviating Traffic Congestion","authors":"Roberto Torre Arranz, Goiuri Peralta, Oleksandr Zhdanenko, Alexander Kropp, H. Salah, Giang T. Nguyen, S. Mudriievskyi, F. Fitzek","doi":"10.1109/NFV-SDN47374.2019.9040009","DOIUrl":"https://doi.org/10.1109/NFV-SDN47374.2019.9040009","url":null,"abstract":"Traffic congestion and jams cause delays, which can be critical in public safety use cases where lives are at stake. Vehicle to Everything (V2X), by enabling vehicles to communicate with each others and with roadside infrastructure, provides revolutionary applications such as grouping the vehicles into platoons, autonomous driving, and traffic flow management. While these applications help to leverage road capacity, thus to improve traffic efficiency and safety, they require an ultra-reliable low latency communications and high data traffic. 5G enabling technologies such as Network Function Virtualization (NFV) and Multi-access Edge Computing (MEC) help to meet these requirements. Our contribution is twofold: First, we introduce a novel approach, exploiting the aforementioned technologies, to alleviate traffic congestion and jams. Second, we demonstrate our approach and its utility through a realistic emergency use case.","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126090203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Reinforcement Learning for Topology-Aware VNF Resource Prediction in NFV Environments","authors":"Nikita Jalodia, Shagufta Henna, A. Davy","doi":"10.1109/NFV-SDN47374.2019.9040154","DOIUrl":"https://doi.org/10.1109/NFV-SDN47374.2019.9040154","url":null,"abstract":"Network Function Virtualisation (NFV) has emerged as a key paradigm in network softwarisation, enabling virtualisation in future generation networks. Once deployed, the Virtual Network Functions (VNFs) in an NFV application’s Service Function Chain (SFC) experience dynamic fluctuations in network traffic and requests, which necessitates dynamic scaling of resource instances. Dynamic resource management is a critical challenge in virtualised environments, specifically while balancing the trade-off between efficiency and reliability. Since provisioning of virtual infrastructures is time-consuming, this negates the Quality of Service (QoS) requirements and reliability criterion in latency-critical applications such as autonomous driving. This calls for predictive scaling decisions to balance the provisioning time sink, with a methodology that preserves the topological dependencies between the nodes in an SFC for effective resource forecasting. To address this, we propose the model for an Asynchronous Deep Reinforcement Learning (DRL) enhanced Graph Neural Networks (GNN) for topology-aware VNF resource prediction in dynamic NFV environments.","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"67 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120838972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Flávio Meneses, M. Fernandes, T. Vieira, Daniel Corujo, Sérgio Figueiredo, A. Neto, R. Aguiar
{"title":"Traffic-aware Live Migration in Virtualized CPE Scenarios","authors":"Flávio Meneses, M. Fernandes, T. Vieira, Daniel Corujo, Sérgio Figueiredo, A. Neto, R. Aguiar","doi":"10.1109/NFV-SDN47374.2019.9039975","DOIUrl":"https://doi.org/10.1109/NFV-SDN47374.2019.9039975","url":null,"abstract":"Virtual Customer Premises Equipments (vCPE) are one of the most prominent use cases enabled by the combined usage of Software Defined Networking (SDN) and Network Function Virtualization (NFV), bringing among others significant flexibility and agility in the way services are delivered. This paper proposes a framework architecture to enable CPE virtualization (i.e., vCPE) in centralized or edge data-centres, considering user traffic requirements. In light of this, our framework leverages SDN, NFV, and Management and Orchestration (MANO) mechanisms to periodically monitor the user traffic in the vCPE, and to dynamically instantiate and migrate the vCPE on the basis of such data requirements. The framework was implemented and experimentally evaluated in full and ultra High-Definition live streaming scenarios, where the vCPE migration presented near-zero downtime and did not negatively impact the quality of experience of end-users.","PeriodicalId":394933,"journal":{"name":"2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116039548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}