Emerging Management Mechanisms for the Future Internet

The current Internet paradigm and its core technologies have been designed to support connections between endpoints (hosts). It is widely deployed and IP (Internet Protocol) management tools are largely used by network operators. Yet, nowadays user needs are not host-centric; users care about accessing content. Recent research activities for the Future Internet point to information-centric networking (ICN), centered on the production, consumption, and transformation of information matching user interest, moving away from the current endpoint-oriented approach. Several ICN solutions are proposed and amongst them, Content-centric Networking (CCN) is one of the most promising ones. However, CCN networks will not be deployed by a network operator, if a management solution will not be available. Having an efficient management system is a strong requirement to rapidly react to problems in the network. Furthermore, a network operator needs to be aware of the traffic transiting in its network and, thus, needs to be able to monitor, classify, and qualify it. Research on ICN started 5-6 years ago, but there is not yet any significant effort on the management of such networks. It just started few months ago and a first proposal was presented in the 86 IRTF ICNRG meeting in March 2013. Since this is a critical issue, this talk will focus on it from a network operator’s point of view. This talk will also introduce the ICN paradigm, with a special focus on the CCN solution. Additionally, requirements and challenges for managing and monitoring the CCN network will be presented.

[1]  Sebastian Abt,et al.  Towards Efficient and Privacy-Preserving Network-Based Botnet Detection Using Netflow Data , 2012, INC.

[2]  Radu State,et al.  BotTrack: Tracking Botnets Using NetFlow and PageRank , 2011, Networking.

[3]  A. Atiya,et al.  Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond , 2005, IEEE Transactions on Neural Networks.

[4]  Huan Liu,et al.  Discretization: An Enabling Technique , 2002, Data Mining and Knowledge Discovery.

[5]  Johannes M. Bauer,et al.  The Role of Internet Service Providers in Botnet Mitigation an Empirical Analysis Based on Spam Data , 2010, WEIS.

[6]  Bernhard E. Boser,et al.  A training algorithm for optimal margin classifiers , 1992, COLT '92.

[7]  Ron Kohavi,et al.  Supervised and Unsupervised Discretization of Continuous Features , 1995, ICML.

[8]  Dayu Yang,et al.  Anomaly-Based Intrusion Detection for SCADA Systems , 2006 .

[9]  J. Ross Quinlan,et al.  C4.5: Programs for Machine Learning , 1992 .

[10]  Jürgen Quittek,et al.  Flow Information Export ( IPFIX ) Implementation Guidelines Status of This Memo , 2008 .

[11]  Antonio F. Gómez-Skarmeta,et al.  RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms , 2012, Journal of Network and Systems Management.

[12]  Leyla Bilge,et al.  Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis , 2012, ACSAC '12.

[13]  Yang Xiao,et al.  Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures , 2009, EURASIP J. Wirel. Commun. Netw..

[14]  Peter Neumann,et al.  Ethernet-based real-time communications with PROFINET IO , 2005 .

[15]  Sureswaran Ramadass,et al.  A Survey of Botnet and Botnet Detection , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.

[16]  Liu Peng,et al.  Study on Comparison of Discretization Methods , 2009, 2009 International Conference on Artificial Intelligence and Computational Intelligence.