首页期刊导航|International journal of network management
期刊信息/Journal information
International journal of network management
John Wiley & Sons Ltd.
International journal of network management

John Wiley & Sons Ltd.

1055-7148

International journal of network management/Journal International journal of network managementSCI
正式出版
收录年代

    Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks

    Daniel Spiekermann
    e2326.1-e2326.17页
    查看更多>>摘要:Anomaly detection in multitenant virtual networks presents significant challenges due to the dynamic, ephemeral nature of virtualized environments and the complex traffic patterns they generate. This paper presents a definition of preferable positions within virtual networks to enhance anomaly detection efficacy. Leveraging a combination of overlay and underlay capture positions, this paper examines the strategic impact of network positioning on anomaly detection accuracy, particularly in environments utilizing software-defined networking (SDN) and network function virtualization (NFV). Through controlled testing with realistic attack scenarios, including data exfiltration, denial of service, and malware infiltration, the advantages and constraints of each capture position are demonstrated. The findings underscore the necessity of adaptable capture mechanisms to address variability in data volume, encapsulation challenges, and privacy concerns unique to virtualized ecosystems. The paper further introduces a cost calculation model that evaluates each capture position by weighting key factors, enabling an optimized trade-off between detection accuracy and resource efficiency. The derived classification of the positional value significantly improves real-time detection of both internal and external threats within multitenant networks.

    Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture

    Peng LiJianing Du
    e70009.1-e70009.14页
    查看更多>>摘要:The rapid growth of networking technology has generated several situations and issues in the field of safeguarding critical brand design data in the present hyper connected context, particularly with the arrival of the 6th Generation (6G). As brand development relies more on cloud-based services, protecting client data and intellectual property (IP) is essential. By using 6G network slicing architecture, which contains dedicated, secure network sections for brand design services, improved encryption, and anomaly detection systems, the research suggested a solution to such issues. The data includes features such as network performance, security measurements, and user data privacy measures. The methodology entails pre-processing brand design data with Z-score normalization to standardize feature distributions, followed by Principal Component Analysis (PCA) for a decrease of dimensions. The proposed method uses a Fully Homomorphic Encryption Driven Quantum Support Vector Machine (FHE-QSVM) to detect anomalies in real time while assuring safe and efficient resource allocation in dedicated slices. FHE-QSVM anomaly detection model produced significant metrics, with accuracy (98%), recall (96%), precision (97%), and F1-score (96%) data by accurately categorizing threats while maintaining data confidentiality. The finding shows the FHE-QSVM enhances both the security and privacy of brand design data by accurately categorizing threats while maintaining data confidentiality. Overall, this strategy offers a scalable solution for secure AI-powered brand design services, highlighting the importance of creative encryption, real-time monitoring, and 6G network slicing to meet contemporary data security standards.

    Mitigating BGP Route Leaks With Attributes and Communities: A Stopgap Solution for Path Plausibility

    Nils HoegerNils RoddayGabi Dreo Rodosek
    e70002.1-e70002.12页
    查看更多>>摘要:The Border Gateway Protocol (BGP) is known to have serious security vulnerabilities. One of these vulnerabilities is BGP route leaks. A BGP route leak describes the propagation of route announcements beyond their intended scope, violating the Gao-Rexford model. Route leaks may lead to traffic misdirection, causing performance issues and potential security risks, often due to mistakes and misconfiguration. Several potential solutions have been published and are currently greatly discussed within the Internet Engineering Task Force (IETF) but have yet to be widely implemented. One approach is the Autonomous System Provider Authorization (ASPA). In addition to these new approaches, there are also efforts to use existing BGP functionalities to detect and prevent route leaks. In this paper, we implement the Down Only (DO) Community and Only to Customer (OTC) Attribute approaches, using them isolated and in conjunction with ASPA. Our research indicates that implementing a DO/OTC deployment strategy focusing on well-interconnected ASes could significantly reduce route leaks. Specifically, we observed mitigation of over 98% of all route leaks when DO and OTC were deployed by the top 5% of the most connected ASes. We show that combining DO/OTC and ASPA can greatly enhance ASPA's route leak prevention capabilities.

    SDOG: Scalable Scheduling of Flows Based on Dynamic Online Grouping in Industrial Time-Sensitive Networks

    Chang LiuJin WangChang Liu SrJie Wang...
    e70001.1-e70001.16页
    查看更多>>摘要:Although many studies have conducted the traffic scheduling of time-sensitive networks, most focus on small-scale static scheduling for specific scenarios, which cannot cope with dynamic and rapid scheduling of time-triggered (TT) flows generated in scalable scenarios in the Industrial Internet of Things. In this paper, we propose a Scalable TT flow scheduling method based on Dynamic Online Grouping in industrial time-sensitive networks (SDOG). To achieve that, we establish an undirected weighted flow graph based on the conflict index between TT flows and divide available time into equally spaced time windows. We dynamically group the TT flows within each window locally. When the number of flows to be scheduled doubles, we can achieve scalable and efficient solutions to efficiently schedule dynamic TT flows, avoiding unnecessary conflicts during data communication. In addition, a topology pruning strategy is adopted to prune the network topology of each group, reducing unnecessary link variables and further effectively shortening the scheduling time. Experimental results validated our expected performance and demonstrated that our proposed SDOG scheduling method has advantages in terms of overall traffic schedulability and average time for scheduling individual traffic.

    Innovative Application of 6G Network Slicing Driven by Artificial Intelligence in the Internet of Vehicles

    Xueqin NiZhiyuan DongXia Rong
    e70004.1-e70004.15页
    查看更多>>摘要:The rapid growth of vehicle networks in the Internet of Vehicles (IoV) needs novel approaches to optimizing network resource allocation and enhancing traffic management. Sixth-generation (6G) network slicing, when paired with artificial intelligence (AI), has enormous potential in this field. The purpose of this research is to investigate the use of AI-driven 6G network slicing (NS) for efficient usage of resources and accurate traffic prediction in IoV systems. A unique network design is suggested, combining data-driven approaches and dynamic network slicing. Data are acquired from vehicular sensors and traffic monitoring systems, and log transformation is used to handle exponential growth patterns like vehicle counts and congestion levels. The Fourier transform (FT) is used to extract frequency-domain information from traffic data, which allows for the detection of periodic patterns, trends, and anomalies such as vehicle velocity and traffic density. The Dipper Throated Optimized Efficient Elman Neural Network (DTO-EENN) is used to forecast traffic and optimize resources. This technology allows the system to predict traffic patterns and dynamically alter network slices to ensure optimal resource allocation while reducing latency. The results show that the suggested AI-driven NS technique increases forecast accuracy and network performance while dramatically reducing congestion levels. The research indicates that AI-driven 6G based NS offers a solid framework for optimizing IoV performance.

    Network Security Threats and Defense Mechanisms for 6G Multi-Virtual Network Scenarios

    Yu Zhou
    e70003.1-e70003.15页
    查看更多>>摘要:The introduction of 6G networks presents substantial challenges for network security, particularly in multi-virtual network topologies. The combination of network function virtualization (NFV) and software-defined networking (SDN) in 6G is designed to increase scalability and flexibility; nevertheless, these advances complicate network security management. The goal is to identify risks to network security and develop defense solutions for 6G multi-virtual network situations. SDN's virtualized network functions (VNFs) are utilized to provide stateful firewall services that provide scalable and dynamic threat prevention. The SDN controller is critical in developing a set of rules to prevent risky network connectivity and decrease possible risks. 6G multi-virtual network domains-attacking threats that involve different socket addresses so complex that usually applicable protection measures hardly tackle that scenario, machine learning (ML) algorithms, and Intelligent Osprey Optimized Versatile Random Forest (IOO-VRF) model-have been proposed for potentially harmful connection detection and predicting cyber threats accessing the network. Multiple open-access sources can be exploited to gather diverse data for collecting valuable information on studying network traffic and cyber threats. The experimental results indicate that IOO-VRF achieved prediction accuracy comparable to that of other traditional algorithms. The proposed model is assessed on various types of metrics, including accuracy (98%), precision (97.4%), recall (94%), and F1-score (93%). The results emphasized the importance of ML in combination with SDN and NFV for security in the case of resilient, expandable, and flexible security measures for future multi-virtual 6G network communications networks.

    Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing

    Na Liu
    e70011.1-e70011.12页
    查看更多>>摘要:Rapid growth in intelligent digital media interaction systems (IDMIS) has created new difficulties in controlling and optimizing content distribution and engagement, especially with the impending 6G networks. The purpose of the investigate is to create an intelligent system that uses 6G network slicing to increase digital media communication and user experience through seamless connectivity, dynamic content distribution, and real-time engagement. The structure includes a dynamic, multilayered architecture for IDMIS, and network capital is allocated through 6G network slicing based on user demand and content type. The system includes machine learning (ML) algorithms that predict user behavior and optimize media delivery in real time. To correctly predict user behavior, the research gathers data that capture users' performance and preference (historical interaction data, demographics, contextual data, and user feedback). Once collected, data are processed to reduce dimensionality using principal component analysis (PCA). Refined Support Vector Machine Integrated with Flying Fox Optimization (RSVM-FFO) predicts user behavior and optimizes media delivery in real time. Metrics are used to evaluate the RSVM-FFO approach, such as F1-score (98.12%), accuracy (98.59%), precision (98.57%), and recall (98.17%). The results reveal that the suggested systems considerably improve media interaction effectiveness by reducing latency and bandwidth usage while providing a highly responsive user experience. Finally, advancement in the delivery of high-performance, customized media services is the combination of an IDMIS with 6G network slicing.

    Option Contracts in the DeFi Ecosystem: Opportunities, Solutions, and Technical Challenges

    Srisht Fateh SinghVladyslav NekriachPanagiotis MichalopoulosAndreas Veneris...
    e70005.1-e70005.16页
    查看更多>>摘要:This paper investigates the current landscape of option trading platforms for cryptocurrencies, encompassing both centralized and decentralized exchanges. Option contracts in cryptocurrency markets offer functionalities akin to traditional markets, providing investors with tools to mitigate risks, particularly those arising from price volatility, while also allowing them to capitalize on future volatility trends. The paper discusses these applications of option contracts in the context of decentralized finance (DeFi), emphasizing their utility in managing market uncertainties. Despite a recent surge in the trading volume of options contracts on cryptocurrencies, decentralized platforms account for less than 1% of this total volume. Hence, this paper takes a closer look by examining the design choices of these platforms to understand the challenges hindering their growth and adoption. It identifies technical, financial, and adoption-related challenges that decentralized exchanges face and provides commentary on existing platform responses. Subsequently, the paper analyzes the impact of absent options markets on the inefficiencies of automated market maker liquidity. It examines historical on-chain data for 14 ERC20 token pairs on Ethereum. The analysis shows 1143 instances in which deeper liquidity levels, as high as × 6 more, could have been achieved by establishing an options market.

    An Adaptive Routing Architecture for IoT Multipath Video Transmission

    Fabiano BheringDebora OliveiraCelio AlbuquerqueDiego Passos...
    e70013.1-e70013.15页
    查看更多>>摘要:Video applications in wireless multihop Internet of Things (IoT) scenarios can benefit from multipath routing strategies to meet their often stringent quality of service (QoS) requirements. However, the dynamics of the underlying network and video service requirements call for a multipath routing fabric that can dynamically adapt to changing conditions. In this paper, we present a wireless multipath routing architecture that is able to adapt to varying network topology conditions and video traffic characteristics by finding new paths dynamically, resulting in enhanced end user's quality of experience. Additionally, we provide an overview of the IoT wireless video application landscape and a taxonomy of the state-of- the- art in route selection mechanisms for multipath routing.

    Computationally Efficient Approach for 6G-AI-IoT Network Slicing and Error-Free Transmission

    Yunxiang Qi
    e70007.1-e70007.19页
    查看更多>>摘要:Many smart gadgets are connecting to the Internet, and Internet-of- Things (IoT) technologies are enabling a variety of applications. Artificial intelligence (AI) of Things (AIoT) devices are anticipated to possess human-like decision-making, reasoning, perception, and other capacities with the combination of AI and IoT. AIoT gadgets are expected to be extensively utilized across several domains, as anticipated by 6G networks. With AI's steady advancements in speech recognition, computer vision, and natural language processing-not to mention its ability to analyze large amounts of data-semantic communication is now feasible. A new paradigm in wireless communication is opened by semantic communication, which seeks to explore the meaning behind the bits and only transmits the information that may be used, as opposed to attaining error-free transmission. The combination of IoT with AI provides prominent features to overcome various important issues in cloud computing networks. However, there is bottleneck of delay and precision. Therefore, this paper proposed a new method to overcome this problem. First, the network slicing feature maps were extracted by convolutional neural networks. Next, the processing delay is reduced by semantic compression. Simulation results show that the proposed approach makes 99.2% reduction in communication complexity and an 80% reduction in transmission delay as compared with traditional methods. Taking the Resnet18 network as an example, the running time of the semantic communication method is only 0.8% of the traditional method.