Assessment of QoS adaptation and cyber-defense mechanisms in networked systems

The paper describes methods to evaluate the QoS capability of a networked system S operating under hostile environment conditions. We evaluate the run-time compliance of system S with the QoS prescription of applications in terms of non-functional attributes that capture the QoS behavior of S (e.g., transaction latency & drop rate in an on-line web service). We benchmark the QoS capability of S by exercising stress-tests on a simulation model of S with artificially injected environment conditions. Our model-based system assessment methods are anchored on PO-MDP frameworks that are currently advocated for network reliability and performance analysis. As case study, we describe the assessment of a CDN (content distribution network) vis-a-vis the content read latency and overhead experienced by clients. Our CDN assessment employs models of the internal algorithmic processes that strive to optimally place the content caching nodes in a distribution topology.

[1]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[2]  Kaliappa Nadar Ravindran,et al.  Autonomic Management of Replica Voting based Data Collection Systems in Malicious Environments , 2015, Q2SWinet@MSWiM.

[3]  Frank Eliassen,et al.  Quality of Adaptation , 2006, International Conference on Autonomic and Autonomous Systems (ICAS'06).

[4]  Jemal H. Abawajy,et al.  Determining Service Trustworthiness in Intercloud Computing Environments , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.

[5]  Walfredo Cirne,et al.  Evaluating architectures for independently auditing service level agreements , 2006, Future Gener. Comput. Syst..

[6]  Randy H. Katz,et al.  Dynamic Replica Placement for Scalable Content Delivery , 2002, IPTPS.

[7]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[8]  Angelos Stavrou,et al.  MOTAG: Moving Target Defense against Internet Denial of Service Attacks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[9]  Klara Nahrstedt,et al.  A control-based middleware framework for quality-of-service adaptations , 1999, IEEE J. Sel. Areas Commun..

[10]  Alba Cristina Magalhaes Alves de Melo,et al.  A WS-Agreement-Based QoS Auditor Negotiation Mechanism for Grids , 2011, 2011 IEEE/ACM 12th International Conference on Grid Computing.

[11]  Kaliappa Nadar Ravindran,et al.  Model-based techniques for QoS assessment of cloud-hosted CDN services , 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS).

[12]  Ivan Lanese,et al.  Formal Techniques for Distributed Objects, Components, and Systems , 2016, Lecture Notes in Computer Science.

[13]  Steven Drager,et al.  Assessment of QoS adaptation capability of complex network systems , 2016, 2016 12th International Conference on the Design of Reliable Communication Networks (DRCN).

[14]  Kaliappa Nadar Ravindran,et al.  QoS-Oriented Management of Automobile Cruise Control Processes , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[15]  Burkhard Stiller,et al.  AURIC: A Scalable and Highly Reusable SLA Compliance Auditing Framework , 2007, DSOM.