Users and services in intelligent networks

We present a vision of an intelligent network in which users dynamically indicate their requests for services, and formulate needs in terms of quality of service (QoS) and price. Users can also monitor on-line the extent to which their requests are being satisfied. In turn the services will dynamically try to satisfy the user as best as they can, and inform the user of the level at which the requests are being satisfied, and at what cost. The network will provide guidelines and constraints to users and services, to avoid that they impede each others' progress. This intelligent and sensible dialogue between users, services and the network can proceed constantly based on mutual observation, network and user self-observation, and on-line adaptive and locally distributed feedback control which proceeds at the same speed as the traffic flows and events being controlled. We illustrate these concepts via an experimental test-bed at Imperial College, based on the cognitive packet network (CPN), that embodies some of these functionalities thanks to "smart packets" and reinforcement learning. At its edges, CPN is fully compatible with the IP protocol, while internally it offers routing that is dynamically modified using on on-line sensing and monitoring, based on users' QoS needs and overall network objectives.

[1]  Erol Gelenbe,et al.  Measurement and performance of a cognitive packet network , 2001, Comput. Networks.

[2]  Angelos D. Keromytis,et al.  Using graphic turing tests to counter automated DDoS attacks against web servers , 2003, CCS '03.

[3]  Craig Partridge,et al.  Single-packet IP traceback , 2002, TNET.

[4]  Dawn Xiaodong Song,et al.  Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[5]  Salim Hariri,et al.  A component-based programming model for autonomic applications , 2004, International Conference on Autonomic Computing, 2004. Proceedings..

[6]  Jelena Mirkovic,et al.  Alliance formation for DDoS defense , 2003, NSPW '03.

[7]  Vern Paxson,et al.  An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.

[8]  Henry A. Kautz,et al.  Inferring activities from interactions with objects , 2004, IEEE Pervasive Computing.

[9]  Franco Zambonelli,et al.  Developing multiagent systems: The Gaia methodology , 2003, TSEM.

[10]  Erol Gelenbe,et al.  Simulation with learning agents , 2001, Proc. IEEE.

[11]  Ariel Orda,et al.  QoS Routing Mechanisms and OSPF Extensions , 1999, RFC.

[12]  Erol Gelenbe,et al.  Design and performance of cognitive packet networks , 2001, Perform. Evaluation.

[13]  Erol Gelenbe,et al.  QoS and routing in the cognitive packet network , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[14]  Jun Xu,et al.  IP traceback-based intelligent packet filtering: a novel technique for defending against Internet DDoS attacks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[15]  Jelena Mirkovic,et al.  D-WARD: a source-end defense against flooding denial-of-service attacks , 2005, IEEE Transactions on Dependable and Secure Computing.

[16]  Jitendra Malik,et al.  Recognizing objects in adversarial clutter: breaking a visual CAPTCHA , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..

[17]  Hong Zhu,et al.  NetBouncer: client-legitimacy-based high-performance DDoS filtering , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[18]  Kang G. Shin,et al.  Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.

[19]  Christian Tschudin,et al.  Active routing for ad hoc networks , 2000, IEEE Commun. Mag..

[20]  Erol Gelenbe,et al.  Cognitive packet networks , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.

[21]  Gaurav S. Sukhatme,et al.  Connecting the Physical World with Pervasive Networks , 2002, IEEE Pervasive Comput..

[22]  James A. Davis,et al.  A Genealogical Approach to Analyzing Post-Mortem Denial of Service Attacks , 2002 .

[23]  Erol Gelenbe,et al.  Learning in the Recurrent Random Neural Network , 1992, Neural Computation.

[24]  Amy L. Murphy,et al.  LIME: a middleware for physical and logical mobility , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[25]  David K. Y. Yau,et al.  Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles , 2005, IEEE/ACM Transactions on Networking.

[26]  Ratul Mahajan,et al.  Controlling high bandwidth aggregates in the network , 2002, CCRV.

[27]  John S. Heidemann,et al.  A framework for classifying denial of service attacks , 2003, SIGCOMM '03.

[28]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[29]  Marco Pistore,et al.  XSRL: An XML web-services request language , 2002 .

[30]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[31]  Kang G. Shin,et al.  Hop-Count Filtering : An Effective Defense Against Spoofed Traffic , 2003 .

[32]  Cecilia Mascolo,et al.  CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications , 2003, IEEE Trans. Software Eng..

[33]  James A. Hendler,et al.  The Semantic Web" in Scientific American , 2001 .

[34]  Srikanth Kandula,et al.  Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.

[35]  Robert Morris A Weakness in the 4.2BSD Unix† TCP/IP Software , 1999 .

[36]  Erol Gelenbe,et al.  Self-aware networks and QoS , 2004, Proceedings of the IEEE.

[37]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[38]  Paul Ferguson,et al.  Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.

[39]  Luciano Serafini,et al.  Peer-to-peer semantic coordination , 2004, J. Web Semant..

[40]  Andrea Omicini,et al.  "Exhibitionists" and "Voyeurs" Do It Better: A Shared Environment for Flexible Coordination with Tacit Messages , 2004, E4MAS.

[41]  Marco Pistore,et al.  XSRL : A request language for web services , 2002 .

[42]  David De Roure,et al.  Less is More: Lightweight Ontologies and User Interfaces for Smart Labs , 2004 .

[43]  Erol Gelenbe,et al.  Autonomous smart routing for network QoS , 2004, International Conference on Autonomic Computing, 2004. Proceedings..

[44]  Erol Gelenbe,et al.  Cognitive packet networks: QoS and performance , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.

[45]  Marco Dorigo,et al.  Swarm intelligence: from natural to artificial systems , 1999 .

[46]  Franco Zambonelli,et al.  Spray computers: Explorations in self-organization , 2005, Pervasive Mob. Comput..

[47]  Erol Gelenbe,et al.  An autonomic approach to denial of service defence , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[48]  Liviu Iftode,et al.  Cooperative computing for distributed embedded systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[49]  Liviu Iftode,et al.  Cooperative Computin for Distributed Embedded Systems , 2002, ICDCS 2002.

[50]  Marija Mikic-Rakic,et al.  Support for disconnected operation via architectural self-reconfiguration , 2004 .

[51]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM 2001.

[52]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[53]  ShenkerScott,et al.  A scalable content-addressable network , 2001 .

[54]  Frank van Harmelen,et al.  Reviewing the design of DAML+OIL: an ontology language for the semantic web , 2002, AAAI/IAAI.

[55]  Erol Gelenbe,et al.  Power-aware ad hoc cognitive packet networks , 2004, Ad Hoc Networks.