12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops最新文献

筛选
英文 中文
Towards global service level guarantee within autonomic computing systems 实现自主计算系统的全球服务水平保证
N. Mbarek, M. Chalouf, F. Krief
{"title":"Towards global service level guarantee within autonomic computing systems","authors":"N. Mbarek, M. Chalouf, F. Krief","doi":"10.1109/INM.2011.5990545","DOIUrl":"https://doi.org/10.1109/INM.2011.5990545","url":null,"abstract":"In this paper, we specify a global service level guarantee including not only QoS but also security and taking into account user mobility. This global service level could be guaranteed within several autonomic computing systems managed by different autonomic domain managers. For that purpose, we propose an end-to-end Service Level Negotiation Protocol, called SLNP, to provide those autonomic managers with a negotiation capability. This allows achieving an agreement on the service level of each offered service between the different domains involved in the transport of that service. SLNP Implementation is made of Web Services technologies to enable interoperability in the negotiation process between different autonomic computing systems using heterogeneous technologies.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Self-management of hybrid optical and packet switching networks 混合光分组交换网络的自我管理
T. Fioreze, A. Pras
{"title":"Self-management of hybrid optical and packet switching networks","authors":"T. Fioreze, A. Pras","doi":"10.1109/INM.2011.5990527","DOIUrl":"https://doi.org/10.1109/INM.2011.5990527","url":null,"abstract":"Hybrid optical and packet switching networks enable data to be forwarded at multiple levels. Large IP flows at the IP level may be therefore moved to the optical level bypassing the per hop routing decisions of the IP level. Such move could be beneficial since congested IP networks could be offloaded; leaving more resources for other smaller IP flows. At the same time, the flows switched at the optical level would experience better quality of service (QoS) thanks to larger bandwidth and negligible jitter. Moving these large flows to the optical level requires the creation of lightpaths. Current approaches to manage lightpaths rely on decisions of which IP flows will be moved to lightpaths taken by network managers. As a result, only IP flows explicitly selected by such managers will take advantage of being transferred over lightpaths. However, it may be that there are also other large IP flows, not known to the manager, which could potentially profit from being moved to the optical level. The objective of this Ph.D. thesis is to investigate the feasibility of employing self-management capabilities on hybrid optical and packet switching networks in order to autonomically move large IP flows from the IP level to the optical level, as well as, creating and releasing lightpaths to transport such flows at the optical level.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133753250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Pattern-based composite application deployment 基于模式的复合应用程序部署
T. Eilam, Michael Elder, A. Konstantinou, E. Snible
{"title":"Pattern-based composite application deployment","authors":"T. Eilam, Michael Elder, A. Konstantinou, E. Snible","doi":"10.1109/INM.2011.5990694","DOIUrl":"https://doi.org/10.1109/INM.2011.5990694","url":null,"abstract":"The deployment of composite applications and services in distributed or compute cloud environments is still a challenging task that is a key source of operational cost and risk. Current approaches to composite deployments can be categorized as workflow based and model based. In the workflow based approach, deployers create end-to-end workflows to automate application deployment, while in the model based approach architects design detailed “desired state” models and validate they meet all requirements and constraints. Today, there is no formally understood relationship and mapping between “desired state” models and deployment workflows, posing a challenge and limitation on architects and deployers. In this paper we propose a new model based approach to bridge the gap between deployment models and workflows. Our approach supports separation of concerns where basic automation building blocks (such as scripts and workflows) can be developed independently of the resource model and with no knowledge of it. Therefore, the method enables deployers to continue to leverage useful libraries of automation building blocks, while enjoying the benefits of a sound resource model, used for validation and constraint satisfaction. We propose algorithms and implementation to generate end-to-end workflows for input “desired state” resource models, based on given libraries of automation building blocks. Our approach has been incorporated into IBM's leading deployment modeling platform [15] and is in active use by customers in a large range of applications.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131489253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
On the inefficacy of Euclidean classifiers for detecting self-similar Session Initiation Protocol (SIP) messages 欧几里得分类器检测自相似会话发起协议(SIP)消息的有效性
Anil Mehta, Neda Hantehzadeh, V. Gurbani, T. Ho, Jun Koshiko, R. Viswanathan
{"title":"On the inefficacy of Euclidean classifiers for detecting self-similar Session Initiation Protocol (SIP) messages","authors":"Anil Mehta, Neda Hantehzadeh, V. Gurbani, T. Ho, Jun Koshiko, R. Viswanathan","doi":"10.1109/INM.2011.5990708","DOIUrl":"https://doi.org/10.1109/INM.2011.5990708","url":null,"abstract":"The Session Initiation Protocol (SIP) is an important multimedia session establishment protocol used on the Internet. Due to the nature and deployment realities of the protocol (ASCII message representation, most deployments over UDP, limited use of message encryption), it becomes relatively easy to attack the protocol at the message level. To mitigate this, self-learning systems have been proposed to counteract new threats. However the efficacy of existing machine learning algorithms must be studied on varied data sets before they can be successfully used. Existing literature indicates that Euclidean distance based classifiers work well to detect anomalous messages. Our work suggests that such classifiers do not produce adequate results for well-crafted malicious messages that differ very slightly from normal messages. To demonstrate this, we gather SIP traffic and minimally perturb it using 13 generic transforms to create malicious SIP messages. We use the Levenshtein distance, L, as a measure of similarity between normal and malicious SIP messages. We subject our dataset — consisting of malicious and normal SIP messages — to Euclidean distance-based classifiers as well as four standard classifiers. Our results show vast differences for Euclidean distance-based classifiers on our dataset than reported in current literature. We further see that the standard classifiers are better able to classify an anomalous message when L is small.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124006676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Cloud services for SMEs: Contract Management's requirements specification 中小企业云服务:合同管理的需求规范
Mario Alessandro Bochicchio, A. Longo, Caterina Mansueto
{"title":"Cloud services for SMEs: Contract Management's requirements specification","authors":"Mario Alessandro Bochicchio, A. Longo, Caterina Mansueto","doi":"10.1109/INM.2011.5990685","DOIUrl":"https://doi.org/10.1109/INM.2011.5990685","url":null,"abstract":"Software tools for Contract Management (CM) are designed to support a wide range of contracts, but they can fall short in the case of cloud contracts. Cloud services, in fact, cross national boundaries and this entails complex problems (security, non disclosure, privacy, …) about applicable laws, jurisdiction, accountability, third parties etc. Moreover, cloud services must be monitored and managed according to specific contract's elements (service level agreements, penalties, etc. ) and this prefigures tighter integration among CM tools and other IT management tools. These aspects are even more relevant to Small and Medium IT Enterprises (SMEs) adopting open CM tools to manage their contracts about own cloud services, because they often lack skills, maturity and sophisticated tools already acquired by the larger companies. In this scenario we propose a requirement elicitation approach based on CM process modeling and information modeling to extend the current generation of open CM tools with the above mentioned features, for SMEs.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124012272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures VoIP企业架构中运行时风险管理的广谱策略
O. Dabbebi, Rémi Badonnel, O. Festor
{"title":"A broad-spectrum strategy for runtime risk management in VoIP enterprise architectures","authors":"O. Dabbebi, Rémi Badonnel, O. Festor","doi":"10.1109/INM.2011.5990549","DOIUrl":"https://doi.org/10.1109/INM.2011.5990549","url":null,"abstract":"Telephony over IP (ToIP) has known a large scale deployment and is supported by the standardization of dedicated signalling protocols. This service is less confined than traditional telephony and is exposed to multiple security attacks. In the meantime, protection mechanisms may seriously impact on its performance. Risk management provides new opportunities for dynamically controlling the service exposure while maintaining low security costs. We propose in this paper a broad-spectrum strategy for runtime risk management in VoIP networks and services. We first analyse and model VoIP attacks based on their observability properties. We then generalize a runtime risk model capable of automatically assessing and treating risks based on dynamic safeguards. In particular, we quantify the potentiality of VoIP attacks and the induced risks with respect to their observability. We evaluate the benefits as well as the limits of our solution through an implementation prototype and an extensive set of simulations.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127769087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An approach for autonomic performance management in SOA workflows 一种在SOA工作流中进行自主性能管理的方法
M. Schmid
{"title":"An approach for autonomic performance management in SOA workflows","authors":"M. Schmid","doi":"10.1109/INM.2011.5990659","DOIUrl":"https://doi.org/10.1109/INM.2011.5990659","url":null,"abstract":"Traditional hierarchical Service Level Management (SLM) frameworks fail to cope with the challenges imposed by the runtime dynamics of Service Oriented Architectures (SOA). This paper presents an approach for coordinating autonomous management components for SOA services, which focuses on optimizing the overall response time of a workflow: management components can either tighten or loosen their individual response time objectives by trading response time shares with other participating components in a way that does not affect the globally defined SLA. Trading of response times is based on an auctioning protocol.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115911800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The impact of power management to spectrum trading 电源管理对频谱交易的影响
G. Alptekin, A. Bener
{"title":"The impact of power management to spectrum trading","authors":"G. Alptekin, A. Bener","doi":"10.1109/INM.2011.5990705","DOIUrl":"https://doi.org/10.1109/INM.2011.5990705","url":null,"abstract":"In this paper, we consider a spectrum trading network. The primary service providers (PSPs), which are the long term owners of chunks of frequency spectrum, lease portions of their licensed frequency bands to secondary users for short term basis. The PSPs have also their own regular customers who expect to receive a minimum amount of bandwidth and a minimum level of quality of service. The existence of various network elements that want to maximize its own profits makes the problem very complex, with usually conflicting objective functions. The proposed framework in this paper aims at investigating the impact of power emission of secondary users to the pricing process. We have used a model based on game theory for PSPs' pricing problem to provide with a well defined equilibrium. The spectrum demand of secondary users is modeled using the multi-nomial logit (MNL) which is a kind of discrete choice model. We have used the MNL model to estimate the probability that a secondary user chooses a particular PSP as the seller. The application of the framework is shown on a simple demonstrative example. The results show that the proposed framework allows PSPs to make additional profit while preserving the social welfare of the network.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115156798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flow-based intrusion detection 基于流的入侵检测
A. Sperotto
{"title":"Flow-based intrusion detection","authors":"A. Sperotto","doi":"10.1109/INM.2011.5990529","DOIUrl":"https://doi.org/10.1109/INM.2011.5990529","url":null,"abstract":"The spread of 1–10 Gbps technology has in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services. At the same time, we have also observed increasingly frequent and widely diversified attacks. To this threat, the research community has answered with a growing interest in intrusion detection, aiming to timely detect intruders and prevent damage. We believe that the detection problem is a key component in the field of intrusion detection. Our studies, however, made us realize that additional research is needed, in particular focusing on validation and automatic tuning of Intrusion Detection Systems (IDSs).","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114754536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
VMSpreader: Multi-tier application resiliency through virtual machine striping VMSpreader:通过虚拟机条带化实现多层应用程序弹性
Pradipta De, Sambuddha Roy
{"title":"VMSpreader: Multi-tier application resiliency through virtual machine striping","authors":"Pradipta De, Sambuddha Roy","doi":"10.1109/INM.2011.5990690","DOIUrl":"https://doi.org/10.1109/INM.2011.5990690","url":null,"abstract":"With the growing use of virtual servers for hosting applications, management of large IT infrastructure faces new challenges. In order to reduce the capital expenditure at data centers, virtual server consolidation approaches has been the focus of attention. However, server consolidation inadvertently introduces a new point of failure, which is the physical resource on which the virtual machines are hosted. A common practice is that for a multi-tier application, different tiers of the application are hosted from a single physical machine. Although this is beneficial in maintaining low cost of ownership when the number of hosted applications is low, with increasing number of hosted applications this leads to a skewed distribution of the applications. We propose that spreading the virtual servers of different applications across the available physical resources can lead to a more resilient design for multi-tier application hosting. We formulate the problem of striping the virtual machines across multiple physical machines as an optimization problem. We propose two MIP based techniques, where the first solution is fast but may be infeasible in many cases, while the other one is better in terms of accuracy but takes more time. The solution is tested on data sets representing typical hosting environments.","PeriodicalId":433520,"journal":{"name":"12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125809180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信