By Topic

2015 11th International Conference on Network and Service Management (CNSM)

9-13 Nov. 2015

Filter Results

Displaying Results 1 - 25 of 77
  • Contents

    Publication Year: 2015, Page(s):1 - 8
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (261 KB)
    Freely Available from IEEE
  • Message from the CNSM general chair

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (225 KB)
    Freely Available from IEEE
  • Message from the CNSM technical program co-chairs

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (226 KB)
    Freely Available from IEEE
  • Message from the ManSDN/NFV workshop co-chairs

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (227 KB)
    Freely Available from IEEE
  • Message from the DCM workshop co-chairs

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (221 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (247 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (241 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (240 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2015, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (236 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2015, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (229 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2015, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (219 KB)
    Freely Available from IEEE
  • LogCluster - A data clustering and pattern mining algorithm for event logs

    Publication Year: 2015, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB) | HTML iconHTML

    Modern IT systems often produce large volumes of event logs, and event pattern discovery is an important log management task. For this purpose, data mining methods have been suggested in many previous works. In this paper, we present the LogCluster algorithm which implements data clustering and line pattern mining for textual event logs. The paper also describes an open source implementation of Lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proactive failure detection learning generation patterns of large-scale network logs

    Publication Year: 2015, Page(s):8 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    With the growth of services in IP networks, network operators are required to perform proactive operation that quickly detects the signs of critical failures and prevents future problems. Network log data, including router syslog, are rich sources for such operations. However, it has become impossible to find genuinely important logs that lead to serious problems due to the large volume and comple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recommending ticket resolution using feature adaptation

    Publication Year: 2015, Page(s):15 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (686 KB) | HTML iconHTML

    In recent years, IT Service Providers have been rapidly introducing automation to their service delivery model. Driven by market pressure to reduce cost and maintain quality of services, they are looking for technologies that will allow rapid progress towards attainment of truly automated service delivery. Software monitoring systems are designed to actively collect and signal event occurrences an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a hierarchical software-defined storage system for data-intensive multi-tenant cloud applications

    Publication Year: 2015, Page(s):22 - 28
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    Software-Defined Storage (SDS) is an evolving concept in which the management and provisioning of data storage is decoupled from the physical storage hardware. Data-intensive multi-tenant SaaS applications running on the public cloud could benefit from the concepts introduced by SDS by managing the allocation of tenant data from the tenant's perspective, taking custom tenant policies and preferenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Forecasting methods for cloud hosted resources, a comparison

    Publication Year: 2015, Page(s):29 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    The emergence of cloud management systems, and the adoption of elastic cloud services enable dynamic adjustment of cloud hosted resources and provisioning. In order to effectively provision for dynamic workloads presented on cloud platforms, an accurate forecast of the load on the cloud resources is required. In this paper, we investigate various forecasting methods presented in recent research, i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICC: An incentive-compatible inter-cloud communication traffic management mechanism

    Publication Year: 2015, Page(s):36 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1663 KB) | HTML iconHTML

    In this paper we introduce the Inter-Cloud Communication Traffic Management mechanism (ICC). ICC performs rate control over the ISP transit link(s) aiming to attain a target reduction of transit cost. ICC reduces ISPs transit charge by shaping a portion of the inter-domain traffic (e.g. delay-tolerant inter-cloud traffic), which has been marked as time-shiftable by the traffic source, i.e. by the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A resource allocation mechanism for video mixing as a cloud computing service in multimedia conferencing applications

    Publication Year: 2015, Page(s):43 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1614 KB) | HTML iconHTML

    Multimedia conferencing is the conversational exchange of multimedia content between multiple parties. It has a wide range of applications (e.g. Massively Multiplayer Online Games (MMOGs) and distance learning). Many multimedia conferencing applications use video extensively, thus video mixing in conferencing settings is of critical importance. Cloud computing is a technology that can solve the sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On orchestrating virtual network functions

    Publication Year: 2015, Page(s):50 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    Middleboxes or network appliances like firewalls, proxies, and WAN optimizers have become an integral part of today's ISP and enterprise networks. Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance. Middleboxes contribute significantly to a network's capital and operational costs. In addition, organizat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Behavioral and dynamic security functions chaining for Android devices

    Publication Year: 2015, Page(s):57 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1064 KB) | HTML iconHTML

    We present an approach for dynamically outsourcing and composing security functions for mobile devices, according to the network behavior of their running applications. Applications are characterized from a network point of view using data mining and clustering techniques with the aim to select their appropriate security functions. Software-defined networking mechanisms are employed to chain the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VGuard: A distributed denial of service attack mitigation method using network function virtualization

    Publication Year: 2015, Page(s):64 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Distributed denial of service (DDoS) attacks have caused tremendous damage to ISPs and online services. They can be divided into attacks using spoofed IPs and attacks using real IPs (botnet). Among them the attacks from real IPs are much harder to mitigate since the attack traffic can be fabricated to be similar to legitimate traffic. The corresponding DDoS defence strategies proposed in past few ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A research process that ensures reproducible network security research

    Publication Year: 2015, Page(s):71 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Access to ground-truth data is limited in network security research, especially at large-scale. If data is available, sharing is typically not possible due to privacy concerns and contractual requirements. Hence, reproducibility of research and comparability of results is difficult. For a prevailing empirical domain of research, the resulting lack of transparency is a methodological problem which ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for autonomic, ontology-based IT management

    Publication Year: 2015, Page(s):78 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    The growing complexity and heterogeneity of modern IT systems demand for intelligent management tools, capable of horizontally integrating technologies of different vendors and domains and vertically relating them with business processes and high level requirements. Due to their often hard-coded and unextendable management models, existing tools are not able to meet those requirements well. Recent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling the impact of QoS pricing on ISP integrated services and OTT services

    Publication Year: 2015, Page(s):85 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB) | HTML iconHTML

    We are concerned with whether a vertically integrated broadband and content provider can unreasonably advantage itself over competing content providers, either by selling quality-of-service (QoS) to content providers at unreasonably high prices, or by refusing to provide access to QoS to competing content. We address this question by modeling the competition between one such vertically integrated ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.