{"title":"Towards adopting a tooldriven, integrated and automated change management process for virtual machine provisioning","authors":"M. Hauser","doi":"10.1109/INM.2011.5990509","DOIUrl":"https://doi.org/10.1109/INM.2011.5990509","url":null,"abstract":"Integrating legacy applications and establishing automated process flows often is a main requirement while establishing an effective IT service management (ITSM) system on historically grown and functionally separated organizations. The Leibniz Supercomputing Centre (LRZ, Leibniz-Rechenzentrum) as the main IT service provider for all universities in the area of Munich (Bavaria, Germany) handles IT services for more than 100,000 academic customers. Therefore the LRZ launched an ITSM project and aims to become one of the first ISO/IEC 20000 certified academic IT service providers. As a first pilot service for establishing a change management process, the ITSM working group at the LRZ chose the provisioning of virtual machines. On one hand the attention was turned on implementing an ISO/IEC 20000 compliant process model as well as the integration of legacy tools and applications. Another important requirement is the automation of the process, as the number of hosted virtual machines continual grows. This paper gives a hint on structuring legacy workflows and shows a way to describe them sufficiently. It is shown how to apply concepts on legacy applications and describes some challenges in implementing such an integrated and automated ITSM process.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124875613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thorsten Höllrigl, H. Kühner, J. Dinger, H. Hartenstein
{"title":"Extension for information card systems to achieve User-Controlled Automated Identity Delegation","authors":"Thorsten Höllrigl, H. Kühner, J. Dinger, H. Hartenstein","doi":"10.1109/INM.2011.5990580","DOIUrl":"https://doi.org/10.1109/INM.2011.5990580","url":null,"abstract":"The growing number of IT services in distributed systems is directly related to the security and privacy of personal data. User-centric federated identity management (FIM) attends to the privacy issue by enabling users to approve each data dissemination between the providers of identity-related information, so-called identity providers (IdPs), and the consumers of this information, the service providers (SPs). Furthermore, user-centric FIM tries to improve security and usability by providing users with a consistent digital-identity experience using so-called information cards (InfoCards). The InfoCard-based approach can help to improve usability, privacy and security, however, the approach is limited to front-channel communication and requires that each data exchange is manually approved by the user. A back-channel communication might be required in scenarios, in which an IdP wants to notify SPs about e.g. a deactivation of a user. In [3] we proposed an approach, named User-Controlled Automated Identity Delegation, that allows a back-channel communication by automating user approval based on delegation. In this paper we demonstrate the practicality of the approach in a real-world scenario by providing a performance evaluation conducted on a prototypical implementation.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115464256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COPD24: From Future Internet technologies to health telemonitoring and teletreatment application","authors":"K. Wac, D. Hausheer","doi":"10.1109/INM.2011.5990491","DOIUrl":"https://doi.org/10.1109/INM.2011.5990491","url":null,"abstract":"The emergence of high bandwidth public wireless networks and miniaturized personal mobile devices gives rise to new mobile healthcare services. To this end, the COPD24 system provides highly customizable vital signs tele-monitoring and tele-treatment for Chronic Obtrusive Pulmonary Disease (COPD) patients based on a body area network (BAN) and a mobile health care (m-health) service platform utilizing next generation public wireless networks. The developed system allows the incorporation of diverse medical sensors via wireless connections, and the live transmission of the measured vital signs to healthcare providers as well as real-time feedback to the patient. The system also incorporates environmental state sensors, e.g., air quality sensors deployed in access points of Future Internet (FI) infrastructure, enabling to derive high-granularity, up to date information about the state of the air the patient is in and thus enabling him to make an informed choice on how to manage his health. In this paper we present the COPD system case study, and we derive its design implications for m-health and FI technologies.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"681 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123050948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conflict analysis during authoring of management policies for federations","authors":"J. Barron, S. Davy, B. Jennings","doi":"10.1109/INM.2011.5990579","DOIUrl":"https://doi.org/10.1109/INM.2011.5990579","url":null,"abstract":"We outline a policy conflict analysis process for the analysis of newly specified federation-level policies against previously deployed local/federation policies. The process is generic in the sense that it can be employed by each domain participating in a federation to help maintain the consistency of their local system with that of the federation. The conflict analysis process utilises an information model and associated ontology for representing both the static and dynamic application-specific aspects of the local operating environment and the federation to aid in the detection of potential inconsistencies. It employs two algorithms, one for the selection of previously deployed policies related to the federation-level policy and the other for analysing the returned policies against the federation-level policy. The selection algorithm reduces the number of deployed policies required to be retrieved for analysis against any newly specified federation-level policy, while the conflict analysis algorithm detects inconsistencies relating to the conditional element of a policy rule. We discuss a concrete example in the form of a federated XMPP communication scenario.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the design of Virtual machine Intrusion detection system","authors":"U. Tupakula, V. Varadharajan","doi":"10.1109/INM.2011.5990655","DOIUrl":"https://doi.org/10.1109/INM.2011.5990655","url":null,"abstract":"In this paper we propose comprehensive security architecture called VICTOR to deal with different types of attacks on virtual machines. Our model takes into account the specific characteristics of operating system and applications running in each virtual machine (VM) at a fine granular level to deal with the attacks. Our architecture has several components such as entity validation, intrusion detection engine and dynamic analyzer. The entity validation component is used in the detection of attack traffic with spoofed source address, secure logging, and capturing information of the operating system and applications running in the virtual machines. The intrusion detection engine component is used for detection of known attacks and suspicious behaviour by monitoring the incoming and outgoing traffic of virtual machines. The dynamic analyzer is used for detection and validation of suspicious processes, detection of zero day attacks and fine granular isolation of malicious process or application that is generating the attack traffic.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125202561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incorporating virtualization awareness in service monitoring systems","authors":"M. D. Carvalho, L. Granville","doi":"10.1109/INM.2011.5990704","DOIUrl":"https://doi.org/10.1109/INM.2011.5990704","url":null,"abstract":"Traditional service monitoring systems (e.g., Nagios and Cacti) have been conceived to monitor services hosted in physical computers. With the recent popularization of server virtualization platforms (e.g., Xen and VMware), monitored services can migrate from a physical computer to another, invalidating the original monitoring logic. In this paper, we investigate which strategies should be used to modify traditional service monitoring systems so that they can still provide accurate status information even for monitored services that are constantly moving on top of a set of servers with virtualization support.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126094040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. H. Cherkaoui, N. Agoulmine, Thinh P. Q. Nguyen, L. Toni, J. Fontaine
{"title":"Taking advantage of the diversity in wireless access networks: On the simulation of a user centric approach","authors":"E. H. Cherkaoui, N. Agoulmine, Thinh P. Q. Nguyen, L. Toni, J. Fontaine","doi":"10.1109/INM.2011.5990516","DOIUrl":"https://doi.org/10.1109/INM.2011.5990516","url":null,"abstract":"“Always Best Connected” or simply ABC concept has been introduced to express the possibility for mobile users to experience with smartphone/computer a continuity of service at any place any time. In this context, the aim of the fourth generation of wireless networks is to not only support high speed connection but also implement ABC taking benefit of the numerous underlying wireless technologies. For that, smart-phones should implement sophisticated access network selection mechanism to take benefit of this diversity. In our previous works, we have used the utility theory to propose several utility functions that measures the value of each access network vs. the preferences of the end users and we have shown how these preferences can be used by the user terminal to select the most appropriate access network. In this paper, we extend that work with the implementation of the solution in a simulator of heterogeneous access networks and perform a set of simulations to highlight the value added of the proposed solution. The obtained results show similar results as those obtained analytically and confirm the validity of the approach for the end users and the operators.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123698005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manish Sethi, Narendran Sachindran, Manoj Soni, Manish Gupta, P. Gupta
{"title":"A framework for migrating production snapshots of composite applications to virtualized environments","authors":"Manish Sethi, Narendran Sachindran, Manoj Soni, Manish Gupta, P. Gupta","doi":"10.1109/INM.2011.5990562","DOIUrl":"https://doi.org/10.1109/INM.2011.5990562","url":null,"abstract":"Migrating production applications from physical datacenters to a virtualized environment is becoming essential to reduce operational costs. In order to avoid direct access to production systems, migration from disk snapshots is preferable. Model based migration approaches are not suitable for this purpose since they need to perform configuration discovery on production systems. Recent approaches that rely upon an isolated network require special setup and are limited to handling network configurations only. In this paper we present a framework for instantiating an application from disk snapshots in a virtualized environment. Our approach comprises of formally specifying the knowledge about product configurations and compiling the knowledge into a plan. The plan is capable of discovering application configurations in an inconsistent configuration setup. A key feature of our framework is that knowledge is specified once per product and re-used across applications that use the product. We have implemented a prototype of our approach and evaluated it on a real world application. The evaluation demonstrates the feasibility of our approach for migration using disk snapshots.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116341420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flow signatures of popular applications","authors":"Vladislav Perelman, N. Melnikov, J. Schönwälder","doi":"10.1109/INM.2011.5990668","DOIUrl":"https://doi.org/10.1109/INM.2011.5990668","url":null,"abstract":"Network flow data is widely used to analyze the protocol mix forwarded by a router or to identify anomalies that may be caused by hardware and software failures, configuration errors, or intrusion attempts. The goal of our research is to find application signatures in network flow traces that can be used to pinpoint certain applications, such as specific web browsers, mail clients, or media-players. Our starting point is the hypothesis that popular applications generate application specific flow signatures. In order to verify our hypothesis, we recorded traffic traces of several applications and we subsequently analyzed the traces to identify flow signatures of these applications. The flow signatures were formalized as queries of a stream-based flow query language. The queries have been executed on several flow traces in order to evaluate our approach.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121186009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cost-efficient deployment of a wireless sensor network under dynamic spectrum sharing","authors":"Jae-Young Seol, Seong-Lyun Kim","doi":"10.1109/INM.2011.5990555","DOIUrl":"https://doi.org/10.1109/INM.2011.5990555","url":null,"abstract":"In this paper, we consider a way to deploy a wireless sensor network under the dynamic spectrum sharing. The dynamic spectrum sharing technique can help a sensor network overcome the shortage of radio resources because of getting crowded unlicensed ISM bands commonly used by it. For the purpose of this, we analyze the aggregate interference to a primary network from the sensor network as a secondary network. Base on the analysis, we propose a cost-efficient deployment algorithm. The proposed algorithm consists of the power control framework to avoid harmful interference and the inhomogeneous deployment strategy to guarantee k-coverage and k-connectivity with the least number of additional sensor nodes reducing the deployment cost. Through the numerical analysis to verify the performance of the proposed algorithm, we show the power control framework makes it possible that the sensor network is deployed with a primary network even under more restricted conditions, and the inhomogeneous deployment strategy saves the number of additional sensor nodes needed to cover a given sensing area by about 20%.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116314256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}