Changes between Version 57 and Version 58 of GENIBibliography


Ignore:
Timestamp:
08/24/17 17:04:17 (7 years ago)
Author:
Mark Berman
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIBibliography

    v57 v58  
    229229<li>
    230230<b>Arezoumand, Saeed and Bannazadeh, Hadi and Leon-Garcia, Alberto</b>,
     231&quot;HyperExchange: A protocol-agnostic exchange fabric enabling peering of Virtual Networks.&quot;
     2322017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, IEEE,
     2332017.
     234doi:10.23919/inm.2017.7987281.
     235<a href="http://dx.doi.org/10.23919/inm.2017.7987281">http://dx.doi.org/10.23919/inm.2017.7987281</a>
     236<br><br><b>Abstract: </b>With the growing pervasiveness of virtualization technologies, carrier networks are shifting from simple packet delivery platforms to multi-tenant integrated clouds offering fine-grained resource management. The need for interoperability among these autonomous cloud-based service providers has created demand for versatile and extensible exchange points to interconnect the future Internet. A novel SDX (Software Defined Exchange) can address this challenge and help redefine the Internet exchange by leveraging SDN. Current implementations of SDXs have focused on traffic exchange between conventional IP networks and have not been specifically intended for exchange between multi-tenant environments and virtual networks; and they have mostly relied on OpenFlow for network forwarding and functionality. While OpenFlow is the de-facto solution for fine-grained forwarding, it nevertheless provides limited network functionality. In this paper we present HyperExchange, a protocol-agnostic exchange fabric for peering of virtual networks. HyperExchange is designed to provide exchange services between autonomous Infrastructure Providers and their hosted Virtual Networks. As a result, it specifically offers solutions for inter-domain tenant authentication and authorization for network control. By leveraging SDI as the core building architecture, HyperExchange uses SDN to forward and steer traffic in a fine-grained manner and yet relies on NFV to push all network functionalities to standard servers as software-based functions. This solution meets both scalability and extensibility requirements for long-term use. We have deployed a prototype of the HyperExchange between SAVI and GENI testbeds to serve real world exchange experiments.
     237</li>
     238<br>
     239
     240<li>
     241<b>Arezoumand, Saeed and Bannazadeh, Hadi and Leon-Garcia, Alberto</b>,
    231242&quot;Layer-two peering across SAVI and GENI testbeds using HyperExchange.&quot;
    2322432017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, IEEE,
     
    235246<a href="http://dx.doi.org/10.23919/inm.2017.7987407">http://dx.doi.org/10.23919/inm.2017.7987407</a>
    236247<br><br><b>Abstract: </b>We demonstrate the peering of virtual networks between the SAVI and GENI testbeds using HyperExchange 1, a software-defined exchange fabric. The exchange is deployed between the physical networks of the two testbeds. Specifically, a layer-two WAN including nodes in SAVI testbed is peered with a VLAN in GENI testbed without using encapsulation and overlays. Each of these testbeds has a different logic to create and manage layer-two networks, so this demonstration shows how the HyperExchange is protocol-agnostic and allows tenants to create networks across dissimilar networks.
    237 </li>
    238 <br>
    239 
    240 <li>
    241 <b>Arezoumand, Saeed and Bannazadeh, Hadi and Leon-Garcia, Alberto</b>,
    242 &quot;HyperExchange: A protocol-agnostic exchange fabric enabling peering of Virtual Networks.&quot;
    243 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, IEEE,
    244 2017.
    245 doi:10.23919/inm.2017.7987281.
    246 <a href="http://dx.doi.org/10.23919/inm.2017.7987281">http://dx.doi.org/10.23919/inm.2017.7987281</a>
    247 <br><br><b>Abstract: </b>With the growing pervasiveness of virtualization technologies, carrier networks are shifting from simple packet delivery platforms to multi-tenant integrated clouds offering fine-grained resource management. The need for interoperability among these autonomous cloud-based service providers has created demand for versatile and extensible exchange points to interconnect the future Internet. A novel SDX (Software Defined Exchange) can address this challenge and help redefine the Internet exchange by leveraging SDN. Current implementations of SDXs have focused on traffic exchange between conventional IP networks and have not been specifically intended for exchange between multi-tenant environments and virtual networks; and they have mostly relied on OpenFlow for network forwarding and functionality. While OpenFlow is the de-facto solution for fine-grained forwarding, it nevertheless provides limited network functionality. In this paper we present HyperExchange, a protocol-agnostic exchange fabric for peering of virtual networks. HyperExchange is designed to provide exchange services between autonomous Infrastructure Providers and their hosted Virtual Networks. As a result, it specifically offers solutions for inter-domain tenant authentication and authorization for network control. By leveraging SDI as the core building architecture, HyperExchange uses SDN to forward and steer traffic in a fine-grained manner and yet relies on NFV to push all network functionalities to standard servers as software-based functions. This solution meets both scalability and extensibility requirements for long-term use. We have deployed a prototype of the HyperExchange between SAVI and GENI testbeds to serve real world exchange experiments.
    248248</li>
    249249<br>
     
    10181018<li>
    10191019<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>,
     1020&quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot;
     1021Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
     10222015.
     1023doi:10.1109/milcom.2015.7357519.
     1024<a href="http://dx.doi.org/10.1109/milcom.2015.7357519">http://dx.doi.org/10.1109/milcom.2015.7357519</a>
     1025<br><br><b>Abstract: </b>Software Defined Networking (SDN) has the potential to enable novel security applications that support flexible, on-demand deployment of system elements. It can offer targeted forensic evidence collection and investigation of computer network attacks. Such unique capabilities are instrumental to network intrusion detection that is challenged by large volumes of data and complex network topologies. This paper presents an innovative approach that coordinates distributed network traffic Monitors and attack Correlators supported by Open Virtual Switches (OVS). The Monitors conduct anomaly detection and the Correlators perform deep packet inspection for attack signature recognition. These elements take advantage of complementary views and information availability on both the data and control planes. Moreover, they collaboratively look for network flooding attack signature constituents that possess different characteristics in the level of information abstraction. Therefore, this approach is able to not only quickly raise an alert against potential threats, but also follow it up with careful verification to reduce false alarms. We experiment with this SDN-supported collaborative approach to detect TCP SYN flood attacks on the Global Environment for Network Innovations (GENI), a realistic virtual testbed. The response times and detection accuracy, in the context of a small to medium corporate network, have demonstrated its effectiveness and scalability.
     1026</li>
     1027<br>
     1028
     1029<li>
     1030<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>,
    10201031&quot;Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).&quot;
    10211032Distributed Computing Systems Workshops (ICDCSW), 2015 IEEE 35th International Conference on, IEEE,
     
    10271038<br>
    10281039
    1029 <li>
    1030 <b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>,
    1031 &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot;
    1032 Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
    1033 2015.
    1034 doi:10.1109/milcom.2015.7357519.
    1035 <a href="http://dx.doi.org/10.1109/milcom.2015.7357519">http://dx.doi.org/10.1109/milcom.2015.7357519</a>
    1036 <br><br><b>Abstract: </b>Software Defined Networking (SDN) has the potential to enable novel security applications that support flexible, on-demand deployment of system elements. It can offer targeted forensic evidence collection and investigation of computer network attacks. Such unique capabilities are instrumental to network intrusion detection that is challenged by large volumes of data and complex network topologies. This paper presents an innovative approach that coordinates distributed network traffic Monitors and attack Correlators supported by Open Virtual Switches (OVS). The Monitors conduct anomaly detection and the Correlators perform deep packet inspection for attack signature recognition. These elements take advantage of complementary views and information availability on both the data and control planes. Moreover, they collaboratively look for network flooding attack signature constituents that possess different characteristics in the level of information abstraction. Therefore, this approach is able to not only quickly raise an alert against potential threats, but also follow it up with careful verification to reduce false alarms. We experiment with this SDN-supported collaborative approach to detect TCP SYN flood attacks on the Global Environment for Network Innovations (GENI), a realistic virtual testbed. The response times and detection accuracy, in the context of a small to medium corporate network, have demonstrated its effectiveness and scalability.
    1037 </li>
    1038 <br>
    1039 
    1040 
     1040
     1041
     1042<li>
     1043<b>Chin, Tommy and Xiong, Kaiqi</b>,
     1044&quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot;
     1045Wireless Algorithms, Systems, and Applications, Springer International Publishing,
     10462016.
     1047doi:10.1007/978-3-319-42836-9&#x005F;43.
     1048<a href="http://dx.doi.org/10.1007/978-3-319-42836-9&#x005F;43">http://dx.doi.org/10.1007/978-3-319-42836-9&#x005F;43</a>
     1049<br><br><b>Abstract: </b>This paper addresses one major concern on how to secure the location information of a base station in a compromised Wireless Sensor Network (WSN). In this concern, disrupting or damaging the wireless base station can be catastrophic for a WSN. To aid in the mitigation of this challenge, we present Moving Proximity Base Station Defense (MPBSD), a Moving Target Defense (MTD) approach to concealing the location of a base station within a WSN. In this approach, we employ multiple base stations to serve a WSN where one of the multiple base stations is elected to serve the WSN in a specific period of time. Specifically, our approach periodically changes the designation over a period of time to provide obscurity in the location information of the base station. We further evaluate MPBSD using a real-world testbed environment utilizing Wi-Fi frequencies. Our results show that MPBSD is an effective MTD approach to securing base stations for a WSN in term of sensory performance such as end-to-end delay.
     1050</li>
     1051<br>
    10411052
    10421053<li>
     
    10481059<a href="http://dx.doi.org/10.1109/eitec.2016.7503690">http://dx.doi.org/10.1109/eitec.2016.7503690</a>
    10491060<br><br><b>Abstract: </b>Supervisory Control and Data Acquisition (SCADA) systems are critical assets to public utility and manufacturing organizations. These systems, although critical, are prone to numerous cyber security related threats and attacks. To combat such challenges, we propose a Dynamic Generated Containment System (DGCS), a moving target defense model as a method of threat evasion. Under the proposed approach, we employ the use of intrusion detection systems (IDS) in conjunction with virtualization solution - Docker. The proposed approach provides an individual Docker container for each threat detected by our IDS. We conduct several experiments using high performance computing systems to measure and demonstrate our proposed approach.
    1050 </li>
    1051 <br>
    1052 
    1053 <li>
    1054 <b>Chin, Tommy and Xiong, Kaiqi</b>,
    1055 &quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot;
    1056 Wireless Algorithms, Systems, and Applications, Springer International Publishing,
    1057 2016.
    1058 doi:10.1007/978-3-319-42836-9&#x005F;43.
    1059 <a href="http://dx.doi.org/10.1007/978-3-319-42836-9&#x005F;43">http://dx.doi.org/10.1007/978-3-319-42836-9&#x005F;43</a>
    1060 <br><br><b>Abstract: </b>This paper addresses one major concern on how to secure the location information of a base station in a compromised Wireless Sensor Network (WSN). In this concern, disrupting or damaging the wireless base station can be catastrophic for a WSN. To aid in the mitigation of this challenge, we present Moving Proximity Base Station Defense (MPBSD), a Moving Target Defense (MTD) approach to concealing the location of a base station within a WSN. In this approach, we employ multiple base stations to serve a WSN where one of the multiple base stations is elected to serve the WSN in a specific period of time. Specifically, our approach periodically changes the designation over a period of time to provide obscurity in the location information of the base station. We further evaluate MPBSD using a real-world testbed environment utilizing Wi-Fi frequencies. Our results show that MPBSD is an effective MTD approach to securing base stations for a WSN in term of sensory performance such as end-to-end delay.
    10611061</li>
    10621062<br>
     
    16621662<li>
    16631663<b>Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>,
    1664 &quot;The design of an instrumentation system for federated and virtualized network testbeds.&quot;
    1665 Network Operations and Management Symposium (NOMS), 2012 IEEE, IEEE,
    1666 2012.
    1667 doi:10.1109/NOMS.2012.6212061.
    1668 <a href="http://dx.doi.org/10.1109/NOMS.2012.6212061">http://dx.doi.org/10.1109/NOMS.2012.6212061</a>
    1669 <br><br><b>Abstract: </b>Much of the GENI effort in developing network testbeds has been focused on building the control frameworks needed to allocate and initialize the network resources that make up an experiment. We argue that building the instrumentation and measurement system to monitor and capture the behavior of the network is just as important and challenging as setting up the network itself, especially in a virtualized and federated environment where getting information from experimental nodes is too complicated and too much to handle for a typical user. In this paper, we describe the design of an instrumentation and measurement infrastructure that allows users to monitor their experiments. The challenge that virtualization and federation of GENI testbeds bring to instrumentation and monitoring is how to hide the details of instrumentation setup from users so that users do not need to be experts in system administration or network management of virtualized and federated systems, but are still able to ” see” what is going on with their experiments. Our instrumentation tool sets up experiment-specific monitoring infrastructure that is tailored to capture, record, and display only information associated with that experiment. Our tools are currently available in GENI, and we present a simple example of how to use them to instrument an experiment.
    1670 </li>
    1671 <br>
    1672 
    1673 <li>
    1674 <b>Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>,
    16751664&quot;GENI-Enabled Programming Experiments for Networking Classes.&quot;
    16761665Research and Educational Experiment Workshop (GREE), 2013 Second GENI, IEEE,
     
    16791668<a href="http://dx.doi.org/10.1109/gree.2013.30">http://dx.doi.org/10.1109/gree.2013.30</a>
    16801669<br><br><b>Abstract: </b>Although GENI has been readily embraced by the research community as a testbed for exploring new network architectures and services, its use as an educational tool has not seen the same level of acceptance and usage. There are multiple reasons for this, not the least of which is a lack of good examples showing how to use GENI in an educational setting. This paper attempts to remedy this by describing our experiences using GENI in our networking classes at the University of Kentucky. Using GENI as the experimental basis for the projects in our classes allowed us to leverage several of its rich set of features including its global span of resources, programmability, virtualization, and instrumentation and measurement tools. In particular, we describe two projects that we have used in our networking classes, and we share some of the experience we gained in the process. As a result, these experiences motivated us to develop and integrate new functions into the GENI desktop in order to make it easier to access and control GENI's various resources and tools.
     1670</li>
     1671<br>
     1672
     1673<li>
     1674<b>Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>,
     1675&quot;The design of an instrumentation system for federated and virtualized network testbeds.&quot;
     1676Network Operations and Management Symposium (NOMS), 2012 IEEE, IEEE,
     16772012.
     1678doi:10.1109/NOMS.2012.6212061.
     1679<a href="http://dx.doi.org/10.1109/NOMS.2012.6212061">http://dx.doi.org/10.1109/NOMS.2012.6212061</a>
     1680<br><br><b>Abstract: </b>Much of the GENI effort in developing network testbeds has been focused on building the control frameworks needed to allocate and initialize the network resources that make up an experiment. We argue that building the instrumentation and measurement system to monitor and capture the behavior of the network is just as important and challenging as setting up the network itself, especially in a virtualized and federated environment where getting information from experimental nodes is too complicated and too much to handle for a typical user. In this paper, we describe the design of an instrumentation and measurement infrastructure that allows users to monitor their experiments. The challenge that virtualization and federation of GENI testbeds bring to instrumentation and monitoring is how to hide the details of instrumentation setup from users so that users do not need to be experts in system administration or network management of virtualized and federated systems, but are still able to ” see” what is going on with their experiments. Our instrumentation tool sets up experiment-specific monitoring infrastructure that is tailored to capture, record, and display only information associated with that experiment. Our tools are currently available in GENI, and we present a simple example of how to use them to instrument an experiment.
    16811681</li>
    16821682<br>
     
    19721972<li>
    19731973<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>,
     1974&quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot;
     1975NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,
     19762016.
     1977doi:10.1109/noms.2016.7502805.
     1978<a href="http://dx.doi.org/10.1109/noms.2016.7502805">http://dx.doi.org/10.1109/noms.2016.7502805</a>
     1979<br><br><b>Abstract: </b>Dynamic Adaptive Streaming over HTTP (DASH) enables the video player to adapt the bitrate of the video while streaming to ensure playback without interruptions even with varying throughput. A DASH server hosts multiple representations of the same video, each of which is broken down into small segments of fixed playback duration. The video bitrate adaptation is purely driven by the player at the endhost. Typically, the player employs an Adaptive Bitrate (ABR) algorithm, that determines the most appropriate representation for the next segment to be downloaded, based on the current network conditions and user preferences. The aim of an ABR algorithm is to dynamically manage the Quality of Experience (QoE) of the user during the playback. ABR algorithms manage the QoE by maximizing the bitrate while at the same time trying to minimize the other QoE metrics: playback start time, duration and number of buffering events, and the number of bitrate switching events. Typically, the ABR algorithms manage the QoE by using the measured network throughput and buffer occupancy to adapt the playback bitrate. However, due to the video encoding schemes employed, the sizes of the individual segments may vary significantly. For low bandwidth networks, fluctuation in the segment sizes results in inaccurate estimation the expected segment fetch times, thereby resulting in inaccurate estimation of the optimum bitrate. In this paper we demonstrate how the Segment-Aware Rate Adaptation (SARA) algorithm, that considers the measured throughput, buffer occupancy, and the variation in segment sizes helps in better management of the users' QoE in a DASH system. By comparing with a typical throughput-based and buffer-based adaptation algorithm under varying network conditions, we demonstrate that SARA manages the QoE better, especially in a low bandwidth network. We also developed AStream, an open-source Python-based emulated DASH-video player that was used to evaluate three different ABR algor- thms and measure the QoE metrics with each of them.
     1980</li>
     1981<br>
     1982
     1983<li>
     1984<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>,
    19741985&quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot;
    19751986Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,
     
    19781989<a href="http://dx.doi.org/10.1109/iccw.2015.7247436">http://dx.doi.org/10.1109/iccw.2015.7247436</a>
    19791990<br><br><b>Abstract: </b>Dynamic adaptive HTTP (DASH) based streaming is steadily becoming the most popular online video streaming technique. DASH streaming provides seamless playback by adapting the video quality to the network conditions during the video playback. A DASH server supports adaptive streaming by hosting multiple representations of the video and each representation is divided into small segments of equal playback duration. At the client end, the video player uses an adaptive bitrate selection (ABR) algorithm to decide the bitrate to be selected for each segment depending on the current network conditions. Currently, proposed ABR algorithms ignore the fact that the segment sizes significantly vary for a given video bitrate. Due to this, even though an ABR algorithm is able to measure the network bandwidth, it may fail to predict the time to download the next segment In this paper, we propose a segment-aware rate adaptation (SARA) algorithm that considers the segment size variation in addition to the estimated path bandwidth and the current buffer occupancy to accurately predict the time required to download the next segment We also developed an open source Python based emulated DASH video player, that was used to compare the performance of SARA and a basic ABR. Our results show that SARA provides a significant gain over the basic algorithm in the video quality delivered, without noticeably impacting the video switching rates.
    1980 </li>
    1981 <br>
    1982 
    1983 <li>
    1984 <b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>,
    1985 &quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot;
    1986 NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,
    1987 2016.
    1988 doi:10.1109/noms.2016.7502805.
    1989 <a href="http://dx.doi.org/10.1109/noms.2016.7502805">http://dx.doi.org/10.1109/noms.2016.7502805</a>
    1990 <br><br><b>Abstract: </b>Dynamic Adaptive Streaming over HTTP (DASH) enables the video player to adapt the bitrate of the video while streaming to ensure playback without interruptions even with varying throughput. A DASH server hosts multiple representations of the same video, each of which is broken down into small segments of fixed playback duration. The video bitrate adaptation is purely driven by the player at the endhost. Typically, the player employs an Adaptive Bitrate (ABR) algorithm, that determines the most appropriate representation for the next segment to be downloaded, based on the current network conditions and user preferences. The aim of an ABR algorithm is to dynamically manage the Quality of Experience (QoE) of the user during the playback. ABR algorithms manage the QoE by maximizing the bitrate while at the same time trying to minimize the other QoE metrics: playback start time, duration and number of buffering events, and the number of bitrate switching events. Typically, the ABR algorithms manage the QoE by using the measured network throughput and buffer occupancy to adapt the playback bitrate. However, due to the video encoding schemes employed, the sizes of the individual segments may vary significantly. For low bandwidth networks, fluctuation in the segment sizes results in inaccurate estimation the expected segment fetch times, thereby resulting in inaccurate estimation of the optimum bitrate. In this paper we demonstrate how the Segment-Aware Rate Adaptation (SARA) algorithm, that considers the measured throughput, buffer occupancy, and the variation in segment sizes helps in better management of the users' QoE in a DASH system. By comparing with a typical throughput-based and buffer-based adaptation algorithm under varying network conditions, we demonstrate that SARA manages the QoE better, especially in a low bandwidth network. We also developed AStream, an open-source Python-based emulated DASH-video player that was used to evaluate three different ABR algor- thms and measure the QoE metrics with each of them.
    19911991</li>
    19921992<br>
     
    25642564<li>
    25652565<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>,
     2566&quot;Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques.&quot;
     2567Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA,
     25682016.
     2569doi:10.1145/2955193.2955194.
     2570<a href="http://dx.doi.org/10.1145/2955193.2955194">http://dx.doi.org/10.1145/2955193.2955194</a>
     2571<br><br><b>Abstract: </b>Providing services for multiple tenants within a single or federated distributed cloud environment requires a variety of special considerations related to network design, provisioning, and operations. Especially important are multiple topics concerning the implementation of multiple parallel programmable virtual networks for large numbers of tenants, who require autonomous management, control, and data planes. This paper provides an overview of some of the challenges that arise from developing and implementing parallel programmable virtual networks, describes experiences with several experimental techniques for addressing those challenges based on large scale distributed testbeds, and presents the results of the experiments that were conducted. Distributed environments used include a distributed cloud testbed, the Chameleon Cloud, sponsored by the National Science Foundation's NSFCloud program, the NSF's Global Environment for Network Innovations (GENI), an international distributed OpenFlow testbed, and the Open Science Data Cloud.
     2572</li>
     2573<br>
     2574
     2575<li>
     2576<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>,
    25662577&quot;Creating environments for innovation: Designing and implementing advanced experimental network research testbeds based on the Global Lambda Integrated Facility and the StarLight Exchange.&quot;
    25672578Computer Networks,
     
    25702581<a href="http://dx.doi.org/10.1016/j.bjp.2013.12.024">http://dx.doi.org/10.1016/j.bjp.2013.12.024</a>
    25712582<br><br><b>Abstract: </b>Large scale national and international experimental research environments are required to advance communication services and supporting network architecture, technology, and infrastructure. Theories and concepts are often explored using simulation and modeling techniques within labs or on small scale testbeds. However, while such testbeds are valuable resources for the research process, these facilities alone cannot provide an appropriate approximation of the real world conditions required to explore ideas at scale. Very large scale global, experimental network research capabilities are required to deeply investigate innovative concepts. For many years, network testbeds were created to address fairly specific, well defined, limited research goals, and they were implemented for fairly short periods. Recently, taking advantage of a number of macro information technology trends, such as virtualization and programmable resources, several network research communities have been developing innovative types of network research environments. Instead of designing traditional network testbeds, research communities are designing large scale, highly flexible distributed platforms that can be used to create many different types of testbeds. Also, rather than creating short term testbeds for limited research objectives, these new environments are being designed as long term persistent resources to support many types of experimental research. This paper describes the motivations for this trend, provides several examples of large scale distributed network research environments based on the Global Lambda Integrated Facility (GLIF) and the StarLight Exchange Facility, including the Global Environment for Network Innovation (GENI), and indicates emerging future trends for these types of environments.
    2572 </li>
    2573 <br>
    2574 
    2575 <li>
    2576 <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>,
    2577 &quot;Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques.&quot;
    2578 Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA,
    2579 2016.
    2580 doi:10.1145/2955193.2955194.
    2581 <a href="http://dx.doi.org/10.1145/2955193.2955194">http://dx.doi.org/10.1145/2955193.2955194</a>
    2582 <br><br><b>Abstract: </b>Providing services for multiple tenants within a single or federated distributed cloud environment requires a variety of special considerations related to network design, provisioning, and operations. Especially important are multiple topics concerning the implementation of multiple parallel programmable virtual networks for large numbers of tenants, who require autonomous management, control, and data planes. This paper provides an overview of some of the challenges that arise from developing and implementing parallel programmable virtual networks, describes experiences with several experimental techniques for addressing those challenges based on large scale distributed testbeds, and presents the results of the experiments that were conducted. Distributed environments used include a distributed cloud testbed, the Chameleon Cloud, sponsored by the National Science Foundation's NSFCloud program, the NSF's Global Environment for Network Innovations (GENI), an international distributed OpenFlow testbed, and the Open Science Data Cloud.
    25832583</li>
    25842584<br>
     
    29512951
    29522952<li>
     2953<b>Nussbaum, Lucas</b>,
     2954&quot;Testbeds Support for Reproducible Research.&quot;
     2955Proceedings of the Reproducibility Workshop, Los Angeles, CA, USA, ACM, New York, NY, USA,
     29562017.
     2957doi:10.1145/3097766.3097773.
     2958<a href="http://dx.doi.org/10.1145/3097766.3097773">http://dx.doi.org/10.1145/3097766.3097773</a>
     2959<br><br><b>Abstract: </b>In the context of experimental research, testbeds play an important role in enabling reproducibility of experiments, by providing a set of services that help experiments with setting up the experimental environment, and collecting data about it. This paper explores the status of three different testbeds (Chameleon, CloudLab and Grid'5000) regarding features required for, or related to reproducible research, and discusses some open questions on that topic.
     2960</li>
     2961<br>
     2962
     2963
     2964
     2965<li>
    29532966<b>O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</b>,
    29542967&quot;Experiment Replication Using ProtoGENI nodes.&quot;
     
    29782991<li>
    29792992<b>Ozcelik, Ilker and Brooks, Richard R.</b>,
     2993&quot;Security experimentation using operational systems.&quot;
     2994Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, Tennessee, ACM, New York, NY, USA,
     29952011.
     2996doi:10.1145/2179298.2179388.
     2997<a href="http://dx.doi.org/10.1145/2179298.2179388">http://dx.doi.org/10.1145/2179298.2179388</a>
     2998<br><br><b>Abstract: </b>Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of this growing dependence, there is a concern that these systems remain protected and available. This concern increases exponentially when considering systems such as smart power grids. Therefore, research should be conducted to develop effective ways of detecting system anomalies. To have realistic results, the studies should be tested on real systems. However, it is not possible to test these experiments on the live network. With the recent collaboration of Universities and research labs, a new experiment test bed has been established. As a result, experiments can now be implemented on real networks. In our study, we design an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic. The approach that we use in our study can easily be generalized to apply to smart power grids.
     2999</li>
     3000<br>
     3001
     3002<li>
     3003<b>Ozcelik, Ilker and Brooks, Richard R.</b>,
    29803004&quot;Performance Analysis of DDoS Detection Methods on Real Network.&quot;
    29813005First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
     
    29983022<br>
    29993023
    3000 <li>
    3001 <b>Ozcelik, Ilker and Brooks, Richard R.</b>,
    3002 &quot;Security experimentation using operational systems.&quot;
    3003 Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, Tennessee, ACM, New York, NY, USA,
    3004 2011.
    3005 doi:10.1145/2179298.2179388.
    3006 <a href="http://dx.doi.org/10.1145/2179298.2179388">http://dx.doi.org/10.1145/2179298.2179388</a>
    3007 <br><br><b>Abstract: </b>Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of this growing dependence, there is a concern that these systems remain protected and available. This concern increases exponentially when considering systems such as smart power grids. Therefore, research should be conducted to develop effective ways of detecting system anomalies. To have realistic results, the studies should be tested on real systems. However, it is not possible to test these experiments on the live network. With the recent collaboration of Universities and research labs, a new experiment test bed has been established. As a result, experiments can now be implemented on real networks. In our study, we design an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic. The approach that we use in our study can easily be generalized to apply to smart power grids.
    3008 </li>
    3009 <br>
    3010 
    30113024
    30123025
     
    38573870
    38583871<li>
     3872<b>Teixeira, Thiago and Marentes, Andres and Wolf, Tilman</b>,
     3873&quot;Economic incentives in virtualized access networks.&quot;
     38742017 IEEE International Conference on Communications (ICC), Paris, France, IEEE,
     38752017.
     3876doi:10.1109/icc.2017.7996957.
     3877<a href="http://dx.doi.org/10.1109/icc.2017.7996957">http://dx.doi.org/10.1109/icc.2017.7996957</a>
     3878<br><br><b>Abstract: </b>Monopolies in access networks present challenging problems for network users: providers have no economic incentives to improve service quality or reduce cost. Virtualization of the access infrastructure can enable competition between providers without the need for deploying different physical access networks. For example, municipal broadband networks are owned by local governments and can be sliced to host multiple service providers. In this work, we evaluate the economic incentives in virtualized access networks and compare them to current access networks with limited (or no) provider competition. We also consider fine-grained competition among transit providers to reflect emerging ideas on offering network connectivity and services dynamically through marketplaces. We use an agent-based simulator in a research testbed to obtain results on quality and cost trends as well as on the ability of providers to thrive in the marketplace. Our findings show that having a shared infrastructure and multiple Internet providers is beneficial for subscribers while maintaining a sustainable ecosystem. Moreover, because the risk associated with deploying infrastructure is shared, Internet providers have more incentive to innovate. Thus, our results highlight the importance of virtualizing access networks to leverage economic drivers in this environment.
     3879</li>
     3880<br>
     3881
     3882
     3883
     3884<li>
    38593885<b>Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</b>,
    38603886&quot;A Passive Measurement System for Network Testbeds.&quot;
     
    42714297
    42724298<li>
     4299<b>Wang, Xiaoyu and Veeraraghavan, Malathi and Lin, Zongli and Oki, Eiji</b>,
     4300&quot;Optical Switch in the Middle (OSM) architecture for DCNs with Hadoop adaptations.&quot;
     43012017 IEEE International Conference on Communications (ICC), Paris, France, IEEE,
     43022017.
     4303doi:10.1109/icc.2017.7996504.
     4304<a href="http://dx.doi.org/10.1109/icc.2017.7996504">http://dx.doi.org/10.1109/icc.2017.7996504</a>
     4305<br><br><b>Abstract: </b>Optical switching technologies offer a cost-and power-efficient approach for handling the DataCenter Network (DCN) oversubscription problem. We propose a hybrid DCN architecture named Optical Switch in the Middle (OSM), which offers increased flexibility (when compared to prior hybrid architectures) for supporting multiple simultaneous high-speed TOR-to-TOR paths through an Optical Circuit Switch (OCS) and a core-level Electrical Packet Switch (EPS). A multilayer SDN controller supports advanced-reservation scheduling of optical circuits, and the integration of storage in the core EPS increases the usage rate of optical circuits. To effectively use the OSM architecture, we propose four modifications to Hadoop, and illustrate the potential of this architecture for achieving higher compute-resource utilization while simultaneously offering users shorter job completion times.
     4306</li>
     4307<br>
     4308
     4309
     4310
     4311<li>
    42734312<b>Wang, Yuefeng and Akhtar, Nabeel and Matta, Ibrahim</b>,
    42744313&quot;Programming Routing Policies for Video Traffic.&quot;
     
    48374876<li>
    48384877<b>Arezoumand, Saeed and Bannazadeh, Hadi and Leon-Garcia, Alberto</b>,
     4878&quot;HyperExchange: A protocol-agnostic exchange fabric enabling peering of Virtual Networks.&quot
     48792017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, IEEE,
     48802017.
     4881doi:10.23919/inm.2017.7987281.
     4882</li>
     4883<br>
     4884
     4885<li>
     4886<b>Arezoumand, Saeed and Bannazadeh, Hadi and Leon-Garcia, Alberto</b>,
    48394887&quot;Layer-two peering across SAVI and GENI testbeds using HyperExchange.&quot
    484048882017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, IEEE,
    484148892017.
    48424890doi:10.23919/inm.2017.7987407.
    4843 </li>
    4844 <br>
    4845 
    4846 <li>
    4847 <b>Arezoumand, Saeed and Bannazadeh, Hadi and Leon-Garcia, Alberto</b>,
    4848 &quot;HyperExchange: A protocol-agnostic exchange fabric enabling peering of Virtual Networks.&quot
    4849 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal, IEEE,
    4850 2017.
    4851 doi:10.23919/inm.2017.7987281.
    48524891</li>
    48534892<br>
     
    54185457<li>
    54195458<b>Chen, Kang and Shen, Haiying</b>,
     5459&quot;Global optimization of file availability through replication for efficient file sharing in MANETs.&quot
     5460Network Protocols (ICNP), 2011 19th IEEE International Conference on, Vancouver, AB, Canada, IEEE,
     54612011.
     5462doi:10.1109/icnp.2011.6089056.
     5463</li>
     5464<br>
     5465
     5466<li>
     5467<b>Chen, Kang and Shen, Haiying</b>,
    54205468&quot;Cont2: Social-Aware Content and Contact Based File Search in Delay Tolerant Networks.&quot
    54215469Proceedings of the 2013 42Nd International Conference on Parallel Processing, IEEE Computer Society, Washington, DC, USA,
    542254702013.
    54235471doi:10.1109/icpp.2013.28.
    5424 </li>
    5425 <br>
    5426 
    5427 <li>
    5428 <b>Chen, Kang and Shen, Haiying</b>,
    5429 &quot;Global optimization of file availability through replication for efficient file sharing in MANETs.&quot
    5430 Network Protocols (ICNP), 2011 19th IEEE International Conference on, Vancouver, AB, Canada, IEEE,
    5431 2011.
    5432 doi:10.1109/icnp.2011.6089056.
    54335472</li>
    54345473<br>
     
    55045543<li>
    55055544<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>,
     5545&quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot
     5546Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
     55472015.
     5548doi:10.1109/milcom.2015.7357519.
     5549</li>
     5550<br>
     5551
     5552<li>
     5553<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>,
    55065554&quot;Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).&quot
    55075555Distributed Computing Systems Workshops (ICDCSW), 2015 IEEE 35th International Conference on, IEEE,
     
    55115559<br>
    55125560
    5513 <li>
    5514 <b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>,
    5515 &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot
    5516 Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
    5517 2015.
    5518 doi:10.1109/milcom.2015.7357519.
    5519 </li>
    5520 <br>
    5521 
    5522 
     5561
     5562
     5563<li>
     5564<b>Chin, Tommy and Xiong, Kaiqi</b>,
     5565&quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot
     5566Wireless Algorithms, Systems, and Applications, Springer International Publishing,
     55672016.
     5568doi:10.1007/978-3-319-42836-9&#x005F;43.
     5569</li>
     5570<br>
    55235571
    55245572<li>
     
    552855762016.
    55295577doi:10.1109/eitec.2016.7503690.
    5530 </li>
    5531 <br>
    5532 
    5533 <li>
    5534 <b>Chin, Tommy and Xiong, Kaiqi</b>,
    5535 &quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot
    5536 Wireless Algorithms, Systems, and Applications, Springer International Publishing,
    5537 2016.
    5538 doi:10.1007/978-3-319-42836-9&#x005F;43.
    55395578</li>
    55405579<br>
     
    60486087<li>
    60496088<b>Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>,
    6050 &quot;The design of an instrumentation system for federated and virtualized network testbeds.&quot
    6051 Network Operations and Management Symposium (NOMS), 2012 IEEE, IEEE,
    6052 2012.
    6053 doi:10.1109/NOMS.2012.6212061.
    6054 </li>
    6055 <br>
    6056 
    6057 <li>
    6058 <b>Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>,
    60596089&quot;GENI-Enabled Programming Experiments for Networking Classes.&quot
    60606090Research and Educational Experiment Workshop (GREE), 2013 Second GENI, IEEE,
    606160912013.
    60626092doi:10.1109/gree.2013.30.
     6093</li>
     6094<br>
     6095
     6096<li>
     6097<b>Griffioen, J. and Fei, Zongming and Nasir, H. and Wu, Xiongqi and Reed, J. and Carpenter, C.</b>,
     6098&quot;The design of an instrumentation system for federated and virtualized network testbeds.&quot
     6099Network Operations and Management Symposium (NOMS), 2012 IEEE, IEEE,
     61002012.
     6101doi:10.1109/NOMS.2012.6212061.
    60636102</li>
    60646103<br>
     
    63106349<li>
    63116350<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>,
     6351&quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot
     6352NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,
     63532016.
     6354doi:10.1109/noms.2016.7502805.
     6355</li>
     6356<br>
     6357
     6358<li>
     6359<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>,
    63126360&quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot
    63136361Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,
    631463622015.
    63156363doi:10.1109/iccw.2015.7247436.
    6316 </li>
    6317 <br>
    6318 
    6319 <li>
    6320 <b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>,
    6321 &quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot
    6322 NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,
    6323 2016.
    6324 doi:10.1109/noms.2016.7502805.
    63256364</li>
    63266365<br>
     
    68016840<li>
    68026841<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>,
     6842&quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot
     6843Teletraffic Congress (ITC), 2014 26th International, IEEE,
     68442014.
     6845doi:10.1109/itc.2014.6932970.
     6846</li>
     6847<br>
     6848
     6849<li>
     6850<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>,
    68036851&quot;Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques.&quot
    68046852Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA,
    680568532016.
    68066854doi:10.1145/2955193.2955194.
    6807 </li>
    6808 <br>
    6809 
    6810 <li>
    6811 <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>,
    6812 &quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot
    6813 Teletraffic Congress (ITC), 2014 26th International, IEEE,
    6814 2014.
    6815 doi:10.1109/itc.2014.6932970.
    68166855</li>
    68176856<br>
     
    71377176
    71387177<li>
     7178<b>Nussbaum, Lucas</b>,
     7179&quot;Testbeds Support for Reproducible Research.&quot
     7180Proceedings of the Reproducibility Workshop, Los Angeles, CA, USA, ACM, New York, NY, USA,
     71812017.
     7182doi:10.1145/3097766.3097773.
     7183</li>
     7184<br>
     7185
     7186
     7187
     7188<li>
    71397189<b>O'Neill, Derek and Aikat, Jay and Jeffay, Kevin</b>,
    71407190&quot;Experiment Replication Using ProtoGENI nodes.&quot
     
    79037953
    79047954<li>
     7955<b>Teixeira, Thiago and Marentes, Andres and Wolf, Tilman</b>,
     7956&quot;Economic incentives in virtualized access networks.&quot
     79572017 IEEE International Conference on Communications (ICC), Paris, France, IEEE,
     79582017.
     7959doi:10.1109/icc.2017.7996957.
     7960</li>
     7961<br>
     7962
     7963
     7964
     7965<li>
    79057966<b>Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</b>,
    79067967&quot;A Passive Measurement System for Network Testbeds.&quot
     
    82538314
    82548315<li>
     8316<b>Wang, Xiaoyu and Veeraraghavan, Malathi and Lin, Zongli and Oki, Eiji</b>,
     8317&quot;Optical Switch in the Middle (OSM) architecture for DCNs with Hadoop adaptations.&quot
     83182017 IEEE International Conference on Communications (ICC), Paris, France, IEEE,
     83192017.
     8320doi:10.1109/icc.2017.7996504.
     8321</li>
     8322<br>
     8323
     8324
     8325
     8326<li>
    82558327<b>Wang, Yuefeng and Akhtar, Nabeel and Matta, Ibrahim</b>,
    82568328&quot;Programming Routing Policies for Video Traffic.&quot
     
    83648436<li>
    83658437<b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b>,
     8438&quot;Scaling up applications over distributed clouds with dynamic layer-2 exchange and broadcast service.&quot
     8439Teletraffic Congress (ITC), 2014 26th International, IEEE,
     84402014.
     8441doi:10.1109/itc.2014.6932973.
     8442</li>
     8443<br>
     8444
     8445<li>
     8446<b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b>,
    83668447&quot;Capacity of Inter-cloud Layer-2 Virtual Networking.&quot
    83678448Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA,
    836884492014.
    83698450doi:10.1145/2627566.2627573.
    8370 </li>
    8371 <br>
    8372 
    8373 <li>
    8374 <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b>,
    8375 &quot;Scaling up applications over distributed clouds with dynamic layer-2 exchange and broadcast service.&quot
    8376 Teletraffic Congress (ITC), 2014 26th International, IEEE,
    8377 2014.
    8378 doi:10.1109/itc.2014.6932973.
    83798451</li>
    83808452<br>
     
    89729044<li> Lin, Shan </li>
    89739045<li> Lin, Yue H. </li>
     9046<li> Lin, Zongli </li>
    89749047<li> Lincke, Jens </li>
    89759048<li> Little, Joseph </li>
     
    90079080<li> Marasevic, J. </li>
    90089081<li> Marcondes, Cesar </li>
     9082<li> Marentes, Andres </li>
    90099083<li> Marquez-Barja, Johann M. </li>
    90109084<li> Martin, James (Martin, J., Martin, Jim) </li>
     
    90719145<li> Nishioka, Itaru </li>
    90729146<li> Nozaki, Yoshihiro </li>
     9147<li> Nussbaum, Lucas </li>
    90739148<li> Nutaro, J. </li>
    90749149<li> O'Connell, Patrick </li>
     
    90789153<li> Ogan, Kemafor </li>
    90799154<li> Okamoto, S. </li>
     9155<li> Oki, Eiji </li>
    90809156<li> Oraibi, Z. </li>
    90819157<li> Orlikowski, Victor (Orlikowski, V.) </li>
     
    92919367<li> Wang, Kuang-Ching (Wang, K. C.) </li>
    92929368<li> Wang, Qing </li>
     9369<li> Wang, Xiaoyu </li>
    92939370<li> Wang, Xiong </li>
    92949371<li> Wang, Yuefeng </li>