Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection appr...Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection approaches use either signature-based approaches to detect known TCs or anomaly-based approach by modeling the legitimate network traffic in order to detect unknown TCs. Un-fortunately, in a software-defined networking (SDN) environment, most existing TC detection approaches would fail due to factors such as volatile network traffic, imprecise timekeeping mechanisms, and dynamic network topology. Furthermore, stealthy TCs can be designed to mimic the legitimate traffic pattern and thus evade anomalous TC detection. In this paper, we overcome the above challenges by presenting a novel framework that harnesses the advantages of elastic re-sources in the cloud. In particular, our framework dynamically configures SDN to enable/disable differential analysis against outbound network flows of different virtual machines (VMs). Our framework is tightly coupled with a new metric that first decomposes the timing data of network flows into a number of using the discrete wavelet-based multi-resolution transform (DWMT). It then applies the Kullback-Leibler divergence (KLD) to measure the variance among flow pairs. The appealing feature of our approach is that, compared with the existing anomaly detection approaches, it can detect most existing and some new stealthy TCs without legitimate traffic for modeling, even with the presence of noise and imprecise timekeeping mechanism in an SDN virtual environment. We implement our framework as a prototype system, OBSERVER, which can be dynamically deployed in an SDN environment. Empirical evaluation shows that our approach can efficiently detect TCs with a higher detection rate, lower latency, and negligible performance overhead compared to existing approaches.展开更多
In this work,a frame work for time-varying channel modeling and simulation is proposed by using neural network(NN)to overcome the shortcomings in geometry based stochastic model(GBSM)and simulation approach.Two NN mod...In this work,a frame work for time-varying channel modeling and simulation is proposed by using neural network(NN)to overcome the shortcomings in geometry based stochastic model(GBSM)and simulation approach.Two NN models are developed for modeling of path loss together with shadow fading(SF)and joint small scale channel parameters.The NN models can predict path loss plus SF and small scale channel parameters accurately compared with measurement at 26 GHz performed in an outdoor microcell.The time-varying path loss and small scale channel parameters generated by the NN models are proposed to replace the empirical path loss and channel parameter random numbers in GBSM-based framework to playback the measured channel and match with its environment.Moreover,the sparse feature of clusters,delay and angular spread,channel capacity are investigated by a virtual array measurement at 28 GHz in a large waiting hall.展开更多
The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex vi...The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex virtual network work oriented to the cross-domain requirement. In this paper, we focus on the multi-domain virtual network embedding in a heterogeneous 5G network infrastructure, which facilitates the resource sharing for diverse-function demands from fixed/mobile end users. We proposed the mathematical ILP model for this problem.And based on the layered-substrate-resource auxiliary graph and an effective six-quadrant service-type-judgment method, 5G embedding demands can be classified accurately to match different user access densities. A collection of novel heuristic algorithms of virtual 5G network embedding are proposed. A great deal of numerical simulation results testified that our algorithm performed better in terms of average blocking rate, routing latency and wireless/wired resource utilization, compared with the benchmark.展开更多
A new ant-algorithm-based routing approach is proposed for the VC routing problem with considering the comprehensive effect between the resource utilization and the load balance in ATM networks. In the approach, the b...A new ant-algorithm-based routing approach is proposed for the VC routing problem with considering the comprehensive effect between the resource utilization and the load balance in ATM networks. In the approach, the backup paths are calculated first, and then an ant algorithm based on the ability of ants to find the shortest path between their nest and the food source during their searching food, is constructed to optimize the VC global route. Simulation results show that the proposed approach can realize VC routing effectively according to the current traffic states in the networks and the user-specified delay requirements.展开更多
This paper presents the development of a network based real time condition monitoring system of rotating machinery. The system is built up in a double net structure consisting of local net (including client and server...This paper presents the development of a network based real time condition monitoring system of rotating machinery. The system is built up in a double net structure consisting of local net (including client and server) and intranet. The client serves as a field data collector and processor that samples the vibration signals and process parameters of a machine monitored in the net and processes the sampled data. The data collected by the client are transmitted to the server that processes the data further and provides the results of the diagnosis of each machine to any distant terminals through intranet or internet. Such a structure of the monitoring system is advantageous in safety, reliability and reasonably shares the existing net resources. In order to ensure real time transmission of the data, two procedures of data transmission, virtual channel and data pool, are developed and applied in the monitoring system. The experimental results show that the monitoring system works well and is suitable to monitor a large group of rotating machines.展开更多
以太网光纤通道FCoE(Fiber Channel Over Ethernet)实现了数据中心前端计算网络与后端存储网络的无缝融合,降低了数据中心基础设施的单位建设成本、维护成本,支持数据中心异构网络环境与不同的接口类型。存储区域网络SAN(Storage Area N...以太网光纤通道FCoE(Fiber Channel Over Ethernet)实现了数据中心前端计算网络与后端存储网络的无缝融合,降低了数据中心基础设施的单位建设成本、维护成本,支持数据中心异构网络环境与不同的接口类型。存储区域网络SAN(Storage Area Network)中交换机数量受到8比特域ID唯一的限制最多可以有239台。N端口虚拟化技术NPV(N Port Virtualization)极大地克服了SAN网络在规模上受限的问题,能够让更多的服务器或存储设备接入到网络中,扩大网络容量。NPV交换机与传统FCF(Fabric Channel Forward)交换机最大的差别是上下行流量转发机制不同,它采用上行流量从映射端口转发,下行流量查表转发。NPV交换机驱动层路由模块的设计与实现采用敏捷开发模式进行,主要包括端口设置、下发NPV Mapping表项、路由表项、Fips规则下发。实验测试证明该设计实现了NPV交换机对FCoE流量的正常转发,确保了可行性。展开更多
文摘Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection approaches use either signature-based approaches to detect known TCs or anomaly-based approach by modeling the legitimate network traffic in order to detect unknown TCs. Un-fortunately, in a software-defined networking (SDN) environment, most existing TC detection approaches would fail due to factors such as volatile network traffic, imprecise timekeeping mechanisms, and dynamic network topology. Furthermore, stealthy TCs can be designed to mimic the legitimate traffic pattern and thus evade anomalous TC detection. In this paper, we overcome the above challenges by presenting a novel framework that harnesses the advantages of elastic re-sources in the cloud. In particular, our framework dynamically configures SDN to enable/disable differential analysis against outbound network flows of different virtual machines (VMs). Our framework is tightly coupled with a new metric that first decomposes the timing data of network flows into a number of using the discrete wavelet-based multi-resolution transform (DWMT). It then applies the Kullback-Leibler divergence (KLD) to measure the variance among flow pairs. The appealing feature of our approach is that, compared with the existing anomaly detection approaches, it can detect most existing and some new stealthy TCs without legitimate traffic for modeling, even with the presence of noise and imprecise timekeeping mechanism in an SDN virtual environment. We implement our framework as a prototype system, OBSERVER, which can be dynamically deployed in an SDN environment. Empirical evaluation shows that our approach can efficiently detect TCs with a higher detection rate, lower latency, and negligible performance overhead compared to existing approaches.
基金supported by the National Nature Science Foundation of China(NSFC)under grant No.61771194supported by Key Program of Beijing Municipal Natural Science Foundation with No.17L20052
文摘In this work,a frame work for time-varying channel modeling and simulation is proposed by using neural network(NN)to overcome the shortcomings in geometry based stochastic model(GBSM)and simulation approach.Two NN models are developed for modeling of path loss together with shadow fading(SF)and joint small scale channel parameters.The NN models can predict path loss plus SF and small scale channel parameters accurately compared with measurement at 26 GHz performed in an outdoor microcell.The time-varying path loss and small scale channel parameters generated by the NN models are proposed to replace the empirical path loss and channel parameter random numbers in GBSM-based framework to playback the measured channel and match with its environment.Moreover,the sparse feature of clusters,delay and angular spread,channel capacity are investigated by a virtual array measurement at 28 GHz in a large waiting hall.
基金supported in part by Open Foundation of State Key Laboratory of Information Photonics and Optical Communications (Grant No. IPOC2014B009)Fundamental Research Funds for the Central Universities (Grant Nos. N130817002, N150401002)+1 种基金Foundation of the Education Department of Liaoning Province (Grant No. L2014089)National Natural Science Foundation of China (Grant Nos. 61302070, 61401082, 61471109, 61502075, 91438110)
文摘The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex virtual network work oriented to the cross-domain requirement. In this paper, we focus on the multi-domain virtual network embedding in a heterogeneous 5G network infrastructure, which facilitates the resource sharing for diverse-function demands from fixed/mobile end users. We proposed the mathematical ILP model for this problem.And based on the layered-substrate-resource auxiliary graph and an effective six-quadrant service-type-judgment method, 5G embedding demands can be classified accurately to match different user access densities. A collection of novel heuristic algorithms of virtual 5G network embedding are proposed. A great deal of numerical simulation results testified that our algorithm performed better in terms of average blocking rate, routing latency and wireless/wired resource utilization, compared with the benchmark.
基金Supported by Shanghai Post & Telecom Administration-SJTU Information and Telecom Joint Lab Project(1999-GR1-3)
文摘A new ant-algorithm-based routing approach is proposed for the VC routing problem with considering the comprehensive effect between the resource utilization and the load balance in ATM networks. In the approach, the backup paths are calculated first, and then an ant algorithm based on the ability of ants to find the shortest path between their nest and the food source during their searching food, is constructed to optimize the VC global route. Simulation results show that the proposed approach can realize VC routing effectively according to the current traffic states in the networks and the user-specified delay requirements.
文摘This paper presents the development of a network based real time condition monitoring system of rotating machinery. The system is built up in a double net structure consisting of local net (including client and server) and intranet. The client serves as a field data collector and processor that samples the vibration signals and process parameters of a machine monitored in the net and processes the sampled data. The data collected by the client are transmitted to the server that processes the data further and provides the results of the diagnosis of each machine to any distant terminals through intranet or internet. Such a structure of the monitoring system is advantageous in safety, reliability and reasonably shares the existing net resources. In order to ensure real time transmission of the data, two procedures of data transmission, virtual channel and data pool, are developed and applied in the monitoring system. The experimental results show that the monitoring system works well and is suitable to monitor a large group of rotating machines.
文摘以太网光纤通道FCoE(Fiber Channel Over Ethernet)实现了数据中心前端计算网络与后端存储网络的无缝融合,降低了数据中心基础设施的单位建设成本、维护成本,支持数据中心异构网络环境与不同的接口类型。存储区域网络SAN(Storage Area Network)中交换机数量受到8比特域ID唯一的限制最多可以有239台。N端口虚拟化技术NPV(N Port Virtualization)极大地克服了SAN网络在规模上受限的问题,能够让更多的服务器或存储设备接入到网络中,扩大网络容量。NPV交换机与传统FCF(Fabric Channel Forward)交换机最大的差别是上下行流量转发机制不同,它采用上行流量从映射端口转发,下行流量查表转发。NPV交换机驱动层路由模块的设计与实现采用敏捷开发模式进行,主要包括端口设置、下发NPV Mapping表项、路由表项、Fips规则下发。实验测试证明该设计实现了NPV交换机对FCoE流量的正常转发,确保了可行性。