[{"language":[{"iso":"eng"}],"series_title":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)","doi":"10.1109/CSCloud/EdgeCom.2019.000-9","date_updated":"2022-01-06T06:53:16Z","publication_identifier":{"issn":["null"]},"department":[{"_id":"63"},{"_id":"541"}],"title":"Approaches for Collaborative Security Defences in Multi Network Environments","type":"conference","year":"2019","citation":{"ama":"Koning R, Polevoy G, Meijer L, de Laat C, Grosso P. Approaches for Collaborative Security Defences in Multi Network Environments. In: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). ; 2019:113-123. doi:10.1109/CSCloud/EdgeCom.2019.000-9","apa":"Koning, R., Polevoy, G., Meijer, L., de Laat, C., & Grosso, P. (2019). Approaches for Collaborative Security Defences in Multi Network Environments. In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (pp. 113–123). https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9","chicago":"Koning, Ralph, Gleb Polevoy, Lydia Meijer, Cees de Laat, and Paola Grosso. “Approaches for Collaborative Security Defences in Multi Network Environments.” In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 113–23. 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019. https://doi.org/10.1109/CSCloud/EdgeCom.2019.000-9.","bibtex":"@inproceedings{Koning_Polevoy_Meijer_de Laat_Grosso_2019, series={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}, title={Approaches for Collaborative Security Defences in Multi Network Environments}, DOI={10.1109/CSCloud/EdgeCom.2019.000-9}, booktitle={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}, author={Koning, Ralph and Polevoy, Gleb and Meijer, Lydia and de Laat, Cees and Grosso, Paola}, year={2019}, pages={113–123}, collection={2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)} }","mla":"Koning, Ralph, et al. “Approaches for Collaborative Security Defences in Multi Network Environments.” 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–23, doi:10.1109/CSCloud/EdgeCom.2019.000-9.","short":"R. Koning, G. Polevoy, L. Meijer, C. de Laat, P. Grosso, in: 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–123.","ieee":"R. Koning, G. Polevoy, L. Meijer, C. de Laat, and P. Grosso, “Approaches for Collaborative Security Defences in Multi Network Environments,” in 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 113–123."},"page":"113-123","main_file_link":[{"url":"https://ieeexplore.ieee.org/abstract/document/8854057/authors#authors"}],"_id":"17667","conference":{"name":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)"},"status":"public","date_created":"2020-08-06T15:23:23Z","author":[{"full_name":"Koning, Ralph","first_name":"Ralph","last_name":"Koning"},{"first_name":"Gleb","full_name":"Polevoy, Gleb","last_name":"Polevoy","id":"83983"},{"last_name":"Meijer","full_name":"Meijer, Lydia","first_name":"Lydia"},{"full_name":"de Laat, Cees","first_name":"Cees","last_name":"de Laat"},{"last_name":"Grosso","full_name":"Grosso, Paola","first_name":"Paola"}],"quality_controlled":"1","keyword":["computer network security","multinetwork environments","multidomain defensive action","task execution order","timing influence defense efficiency","distributed attacks","collaborative security defence approach","minimize propagation approach","minimize countermeasure approach","counteract everywhere approach","Conferences","Cloud computing","Computer crime","Edge computing","Security","Defense Approaches","Multi-Domain Defense","Collaborative Defense","Defense Algorithms","Computer Networks"],"publication":"2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)","user_id":"83983","extern":"1","abstract":[{"lang":"eng","text":"Resolving distributed attacks benefits from collaboration between networks. We present three approaches for the same multi-domain defensive action that can be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures, and 3) Minimize Propagation. First, we provide a formula to compute efficiency of a defense; then we use this formula to compute the efficiency of the approaches under various circumstances. Finally, we discuss how task execution order and timing influence defense efficiency. Our results show that the Minimize Propagation approach is the most efficient method when defending against the chosen attack."}]},{"place":"Darmstadt","title":"Service Function Chaining Across OpenStack and Kubernetes Domains","department":[{"_id":"34"}],"project":[{"name":"5G Programmable Infrastructure Converging disaggregated neTwork and compUte Resources","grant_number":"762057","_id":"23"},{"_id":"1","name":"SFB 901"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"SFB 901 - Subproject C4","_id":"16"}],"publication_status":"published","date_updated":"2022-01-06T07:04:21Z","doi":"10.1145/3328905.3332505","language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"Remarkable advantages of Containers (CNs) over Virtual Machines (VMs) such as lower overhead and faster startup has gained the attention of Communication Service Providers (CSPs) as using CNs for providing Virtual Network Functions (VNFs) can save costs while increasing the service agility. However, as it is not feasible to realise all types of VNFs in CNs, the coexistence of VMs and CNs is proposed. To put VMs and CNs together, an orchestration framework that can chain services across distributed and heterogeneous domains is required. To this end, we implemented a framework by extending and consolidating state-of-the-art tools and technologies originated from Network Function Virtualization (NFV), Software-defined Networking (SDN) and cloud computing environments. This framework chains services provisioned across Kubernetes and OpenStack domains. During the demo, we deploy a service consist of CN- and VM-based VNFs to demonstrate different features provided by our framework."}],"user_id":"477","ddc":["004"],"file":[{"file_name":"p240-Kouchaksaraei.pdf","date_created":"2019-08-26T09:09:50Z","access_level":"closed","file_size":1206037,"file_id":"12953","creator":"ups","date_updated":"2019-08-26T09:09:50Z","content_type":"application/pdf","relation":"main_file"}],"author":[{"first_name":"Hadi","full_name":"Razzaghi Kouchaksaraei, Hadi","last_name":"Razzaghi Kouchaksaraei","id":"60845"},{"full_name":"Karl, Holger","first_name":"Holger","id":"126","last_name":"Karl"}],"keyword":["Network Function Virtualization","Software-defined Networking","Cloud Computing","service orchestration","OpenStack","Kubernetes"],"publication":"13th ACM International Conference on Distributed and Event-based Systems","file_date_updated":"2019-08-26T09:09:50Z","has_accepted_license":"1","status":"public","date_created":"2019-05-14T05:43:57Z","_id":"9809","conference":{"end_date":"2019-06-28","location":"Darmstadt","start_date":"2019-06-24","name":"13th ACM International Conference on Distributed and Event-based Systems"},"type":"conference","year":"2019","citation":{"ieee":"H. Razzaghi Kouchaksaraei and H. Karl, “Service Function Chaining Across OpenStack and Kubernetes Domains,” in 13th ACM International Conference on Distributed and Event-based Systems, Darmstadt, 2019.","short":"H. Razzaghi Kouchaksaraei, H. Karl, in: 13th ACM International Conference on Distributed and Event-Based Systems, Darmstadt, 2019.","bibtex":"@inproceedings{Razzaghi Kouchaksaraei_Karl_2019, place={Darmstadt}, title={Service Function Chaining Across OpenStack and Kubernetes Domains}, DOI={10.1145/3328905.3332505}, booktitle={13th ACM International Conference on Distributed and Event-based Systems}, author={Razzaghi Kouchaksaraei, Hadi and Karl, Holger}, year={2019} }","mla":"Razzaghi Kouchaksaraei, Hadi, and Holger Karl. “Service Function Chaining Across OpenStack and Kubernetes Domains.” 13th ACM International Conference on Distributed and Event-Based Systems, 2019, doi:10.1145/3328905.3332505.","chicago":"Razzaghi Kouchaksaraei, Hadi, and Holger Karl. “Service Function Chaining Across OpenStack and Kubernetes Domains.” In 13th ACM International Conference on Distributed and Event-Based Systems. Darmstadt, 2019. https://doi.org/10.1145/3328905.3332505.","ama":"Razzaghi Kouchaksaraei H, Karl H. Service Function Chaining Across OpenStack and Kubernetes Domains. In: 13th ACM International Conference on Distributed and Event-Based Systems. Darmstadt; 2019. doi:10.1145/3328905.3332505","apa":"Razzaghi Kouchaksaraei, H., & Karl, H. (2019). Service Function Chaining Across OpenStack and Kubernetes Domains. In 13th ACM International Conference on Distributed and Event-based Systems. Darmstadt. https://doi.org/10.1145/3328905.3332505"}},{"department":[{"_id":"63"},{"_id":"541"}],"publication_identifier":{"issn":["2168-7161"]},"title":"Inter-Datacenter Scheduling of Large Data Flows","language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:53:16Z","doi":"10.1109/TCC.2015.2487964","author":[{"first_name":"R.","full_name":"Cohen, R.","last_name":"Cohen"},{"id":"83983","last_name":"Polevoy","full_name":"Polevoy, Gleb","first_name":"Gleb"}],"keyword":["Approximation algorithms","Approximation methods","Bandwidth","Cloud computing","Routing","Schedules","Scheduling"],"publication":"Cloud Computing, IEEE Transactions on","status":"public","date_created":"2020-08-06T15:20:58Z","volume":"PP","abstract":[{"lang":"eng","text":"Inter-datacenter transfers of non-interactive but timely large flows over a private (managed) network is an important problem faced by many cloud service providers. The considered flows are non-interactive because they do not explicitly target the end users. However, most of them must be performed on a timely basis and are associated with a deadline. We propose to schedule these flows by a centralized controller, which determines when to transmit each flow and which path to use. Two scheduling models are presented in this paper. In the first, the controller also determines the rate of each flow, while in the second bandwidth is assigned by the network according to the TCP rules. We develop scheduling algorithms for both models and compare their complexity and performance."}],"extern":"1","user_id":"83983","type":"journal_article","citation":{"ama":"Cohen R, Polevoy G. Inter-Datacenter Scheduling of Large Data Flows. Cloud Computing, IEEE Transactions on. 2015;PP(99):1-1. doi:10.1109/TCC.2015.2487964","apa":"Cohen, R., & Polevoy, G. (2015). Inter-Datacenter Scheduling of Large Data Flows. Cloud Computing, IEEE Transactions On, PP(99), 1–1. https://doi.org/10.1109/TCC.2015.2487964","chicago":"Cohen, R., and Gleb Polevoy. “Inter-Datacenter Scheduling of Large Data Flows.” Cloud Computing, IEEE Transactions On PP, no. 99 (2015): 1–1. https://doi.org/10.1109/TCC.2015.2487964.","bibtex":"@article{Cohen_Polevoy_2015, title={Inter-Datacenter Scheduling of Large Data Flows}, volume={PP}, DOI={10.1109/TCC.2015.2487964}, number={99}, journal={Cloud Computing, IEEE Transactions on}, author={Cohen, R. and Polevoy, Gleb}, year={2015}, pages={1–1} }","mla":"Cohen, R., and Gleb Polevoy. “Inter-Datacenter Scheduling of Large Data Flows.” Cloud Computing, IEEE Transactions On, vol. PP, no. 99, 2015, pp. 1–1, doi:10.1109/TCC.2015.2487964.","short":"R. Cohen, G. Polevoy, Cloud Computing, IEEE Transactions On PP (2015) 1–1.","ieee":"R. Cohen and G. Polevoy, “Inter-Datacenter Scheduling of Large Data Flows,” Cloud Computing, IEEE Transactions on, vol. PP, no. 99, pp. 1–1, 2015."},"year":"2015","page":"1-1","_id":"17657","issue":"99"},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T07:02:30Z","oa":"1","department":[{"_id":"277"}],"title":"Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-probabilistic Uncertainty","citation":{"ieee":"T. Püschel, G. Schryen, D. Hristova, and D. Neumann, “Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-probabilistic Uncertainty,” European Journal of Operational Research, vol. 244, no. 2, pp. 637–647, 2015.","short":"T. Püschel, G. Schryen, D. Hristova, D. Neumann, European Journal of Operational Research 244 (2015) 637–647.","mla":"Püschel, Tim, et al. “Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-Probabilistic Uncertainty.” European Journal of Operational Research, vol. 244, no. 2, Elsevier, 2015, pp. 637–47.","bibtex":"@article{Püschel_Schryen_Hristova_Neumann_2015, title={Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-probabilistic Uncertainty}, volume={244}, number={2}, journal={European Journal of Operational Research}, publisher={Elsevier}, author={Püschel, Tim and Schryen, Guido and Hristova, Diana and Neumann, Dirk}, year={2015}, pages={637–647} }","chicago":"Püschel, Tim, Guido Schryen, Diana Hristova, and Dirk Neumann. “Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-Probabilistic Uncertainty.” European Journal of Operational Research 244, no. 2 (2015): 637–47.","apa":"Püschel, T., Schryen, G., Hristova, D., & Neumann, D. (2015). Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-probabilistic Uncertainty. European Journal of Operational Research, 244(2), 637–647.","ama":"Püschel T, Schryen G, Hristova D, Neumann D. Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-probabilistic Uncertainty. European Journal of Operational Research. 2015;244(2):637-647."},"type":"journal_article","year":"2015","page":"637-647","intvolume":" 244","_id":"5679","issue":"2","file":[{"access_level":"open_access","file_name":"ELSEVIER_JOURNAL_VERSION.pdf","date_created":"2018-12-07T11:44:10Z","date_updated":"2018-12-13T15:09:12Z","content_type":"application/pdf","relation":"main_file","file_size":1270024,"file_id":"6036","creator":"hsiemes"}],"publisher":"Elsevier","author":[{"full_name":"Püschel, Tim","first_name":"Tim","last_name":"Püschel"},{"id":"72850","last_name":"Schryen","full_name":"Schryen, Guido","first_name":"Guido"},{"last_name":"Hristova","first_name":"Diana","full_name":"Hristova, Diana"},{"first_name":"Dirk","full_name":"Neumann, Dirk","last_name":"Neumann"}],"publication":"European Journal of Operational Research","file_date_updated":"2018-12-13T15:09:12Z","keyword":["admission control","informational uncertainty","revenue management","cloud computing"],"has_accepted_license":"1","status":"public","date_created":"2018-11-14T15:40:13Z","volume":244,"abstract":[{"text":"Cloud computing promises the flexible delivery of computing services in a pay-as-you-go manner. It allows customers to easily scale their infrastructure and save on the overall cost of operation. However Cloud service offerings can only thrive if customers are satisfied with service performance. Allow-ing instantaneous access and flexible scaling while maintaining the service levels and offering competitive prices poses a significant challenge to Cloud Computing providers. Furthermore services will remain available in the long run only if this business generates a stable revenue stream. To address these challenges we introduce novel policy-based service admission control mod-els that aim at maximizing the revenue of Cloud providers while taking in-formational uncertainty regarding resource requirements into account. Our evaluation shows that policy-based approaches statistically significantly out-perform first come first serve approaches, which are still state of the art. Furthermore the results give insights in how and to what extent uncertainty has a negative impact on revenue.","lang":"eng"}],"extern":"1","user_id":"61579","ddc":["000"]}]