Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne...Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.展开更多
In this paper,recent developments on the Internet of Things(IoT)and its applications are surveyed,and the impact of newly developed Big Data(BD)on manufacturing information systems is especially discussed.Big Data ana...In this paper,recent developments on the Internet of Things(IoT)and its applications are surveyed,and the impact of newly developed Big Data(BD)on manufacturing information systems is especially discussed.Big Data analytics(BDA)has been identified as a critical technology to support data acquisition,storage,and analytics in data management systems in modern manufacturing.The purpose of the presented work is to clarify the requirements of predictive systems,and to identify research challenges and opportunities on BDA to support cloudbased information systems.展开更多
The field of software engineering and software technology is developing very fast. Perhaps as a consequence, there is seldom enough interest or opportunity for systematic investigation of how the underlying technology...The field of software engineering and software technology is developing very fast. Perhaps as a consequence, there is seldom enough interest or opportunity for systematic investigation of how the underlying technology will actually perform. That is, we introduce new concepts, methods, techniques and tools – or change existing ones and emphasize their value. A major turn in software engineering leading to Componentware has dramatically changed the shape of software development and introduced interesting methods for the design and rapid development of systems which may provide cost-effective benefits. In this paper we will discuss Componentware, process model, architecture, principles and the drivers, advantages, disadvantage and reveal profound changes from the traditional software engineering approaches.展开更多
This research report makes an analysis of some problems that arise in the software and hardware environment of Shaanxi economic society. It also adopts some approaches of frontier economics and sociology to the study ...This research report makes an analysis of some problems that arise in the software and hardware environment of Shaanxi economic society. It also adopts some approaches of frontier economics and sociology to the study of some deep causes of poor social economics environment of Shaanxi and puts forward focal points of work and strategic options in creating a good social economic environmert of Shaanxi.展开更多
IoV(Internet of Vehicles)is a promising paradigm to the future of automobiles,which will undoubtedly boost the automobile market as well as accelerate innovation in Internet services and applications.The concept of SD...IoV(Internet of Vehicles)is a promising paradigm to the future of automobiles,which will undoubtedly boost the automobile market as well as accelerate innovation in Internet services and applications.The concept of SD-IoV(Software Defined IoV)is presented,which is capable of improving resource utilization,service quality,and network optimization in the harsh vehicular network environments.First,A generalized SD-IoV architecture as an intuitive big picture is presented.Then,the major functions realized by SD-IoV are elabrated on to illustrate how the current challenges are resolved.As the key enablers of SD-IoV,three possible implementation methods of the wireless control path are described and compared.Finally,the challenges and existing solutions of SD-IoV are disuessed and open issues are pointed out so as to shed light on future research.展开更多
基金This work was funded by the Deanship of Scientific Research at Jouf University under Grant Number(DSR2022-RG-0102).
文摘Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.
文摘In this paper,recent developments on the Internet of Things(IoT)and its applications are surveyed,and the impact of newly developed Big Data(BD)on manufacturing information systems is especially discussed.Big Data analytics(BDA)has been identified as a critical technology to support data acquisition,storage,and analytics in data management systems in modern manufacturing.The purpose of the presented work is to clarify the requirements of predictive systems,and to identify research challenges and opportunities on BDA to support cloudbased information systems.
文摘The field of software engineering and software technology is developing very fast. Perhaps as a consequence, there is seldom enough interest or opportunity for systematic investigation of how the underlying technology will actually perform. That is, we introduce new concepts, methods, techniques and tools – or change existing ones and emphasize their value. A major turn in software engineering leading to Componentware has dramatically changed the shape of software development and introduced interesting methods for the design and rapid development of systems which may provide cost-effective benefits. In this paper we will discuss Componentware, process model, architecture, principles and the drivers, advantages, disadvantage and reveal profound changes from the traditional software engineering approaches.
文摘This research report makes an analysis of some problems that arise in the software and hardware environment of Shaanxi economic society. It also adopts some approaches of frontier economics and sociology to the study of some deep causes of poor social economics environment of Shaanxi and puts forward focal points of work and strategic options in creating a good social economic environmert of Shaanxi.
基金supported by the Natural Sciences and Engineering Research Council of Canada(NSERC).
文摘IoV(Internet of Vehicles)is a promising paradigm to the future of automobiles,which will undoubtedly boost the automobile market as well as accelerate innovation in Internet services and applications.The concept of SD-IoV(Software Defined IoV)is presented,which is capable of improving resource utilization,service quality,and network optimization in the harsh vehicular network environments.First,A generalized SD-IoV architecture as an intuitive big picture is presented.Then,the major functions realized by SD-IoV are elabrated on to illustrate how the current challenges are resolved.As the key enablers of SD-IoV,three possible implementation methods of the wireless control path are described and compared.Finally,the challenges and existing solutions of SD-IoV are disuessed and open issues are pointed out so as to shed light on future research.