Changes between Version 31 and Version 32 of GENIBibliography
- Timestamp:
- 09/15/15 14:52:40 (9 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENIBibliography
v31 v32 1016 1016 1017 1017 <li> 1018 <b>Fund, Fraida and Dong, Chen and Korakis, Thanasis and Panwar, Shivendra</b> 1019 , "A Framework for Multidimensional Measurements on an Experimental WiMAX Testbed." 1020 Testbeds and Research Infrastructure. Development of Networks and Communities, Springer Berlin Heidelberg, 1021 2012. 1022 doi:10.1007/978-3-642-35576-9_32. 1023 <a href="http://dx.doi.org/10.1007/978-3-642-35576-9_32">http://dx.doi.org/10.1007/978-3-642-35576-9_32</a> 1024 <br><br><b>Abstract: </b>A major difficulty in the design, study, and implementation of wireless protocols and applications is the multitude of nondeterministic factors (e.g. interference, weather conditions, competing traffic) that can affect their performance. For this reason, testbeds that enable researchers to quantify these influences have become increasingly essential in the wireless research community. The growing sophistication of wireless testbeds and the wide array of services they can provide to researchers have advanced the field tremendously. Toward this end, we present an early implementation of an instrumentation and measurement framework that we have deployed on an open-access 802.16e wireless research testbed at the Polytechnic Institute of NYU. We have created a set of tools to allow experimenters to routinely collect measurements of environmental conditions during experiment runtime. These tools integrate high volumes of multidimensional measurement data from a diverse array of sources, including measurements from software defined radio peripherals, sensors, and network device drivers. With this, we aim to give researchers the ability to conduct rigorous and repeatable over-the-air experiments. We also foresee potential applications for this framework beyond its use in experiments, such as in long-term testbed monitoring. 1025 </li> 1026 <br> 1027 1028 1029 1030 <li> 1018 1031 <b>Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</b> 1019 1032 , "Exercises for Graduate Students using GENI." … … 1134 1147 <li> 1135 1148 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b> 1149 , "Performance of GENI Cloud Testbeds for Real Time Scientific Application." 1150 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles, 1151 2012. 1152 1153 1154 <br><br><b>Abstract: </b>Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform. 1155 </li> 1156 <br> 1157 1158 <li> 1159 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b> 1136 1160 , "Network capabilities of cloud services for a real time scientific application." 1137 1161 37th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, IEEE, … … 1143 1167 <br> 1144 1168 1145 <li>1146 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>1147 , "Performance of GENI Cloud Testbeds for Real Time Scientific Application."1148 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,1149 2012.1150 1151 1152 <br><br><b>Abstract: </b>Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.1153 </li>1154 <br>1155 1156 1169 1157 1170 … … 1406 1419 <b>Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</b> 1407 1420 , "A Passive Measurement System for Network Testbeds." 1408 8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012),1409 2012. 1410 1411 1412 <br><br><b>Abstract: </b>The ability to capture and process packet-level data is of intrinsic importance in network testbeds that offer broad experimental capabilities to researchers. In this paper we describe the design and implementation of a passive measurement system for network testbeds called GIMS. The system enables users to specify and centrally manage packet capture on a set of dedicated measurement nodes deployed on links in a distributed testbed. The first component of GIMS is a scalable experiment management system that coordinates multi-tenant access to measurement nodes through a web-based user interface. The second component of GIMS is a node management system that enables \\\\em (i) local processing on packets (\\\\em e.g., flow aggregation and sampling), \\\\em (ii) meta-data to be added to captured packets (\\\\em e.g., timestamps), \\\\em (iii) packet anonymization per local security policy, and \\\\em(iv) flexible data storage including transfer to remote archives. We demonstrate the capabilities of GIMS through a set of micro-benchmarks that specifically highlight the performance of the node management system deployed on a commodity workstation. Our implementations are openly available to the community and our development efforts are on-going.1421 Testbeds and Research Infrastructure. Development of Networks and Communities, Springer Berlin Heidelberg, 1422 2012. 1423 doi:10.1007/978-3-642-35576-9_14. 1424 <a href="http://dx.doi.org/10.1007/978-3-642-35576-9_14">http://dx.doi.org/10.1007/978-3-642-35576-9_14</a> 1425 <br><br><b>Abstract: </b>The ability to capture and process packet-level data is of intrinsic importance in network testbeds that offer broad experimental capabilities to researchers. In this paper we describe the design and implementation of a passive measurement system for network testbeds called GIMS. The system enables users to specify and centrally manage packet capture on a set of dedicated measurement nodes deployed on links in a distributed testbed. The first component of GIMS is a scalable experiment management system that coordinates multi-tenant access to measurement nodes through a web-based user interface. The second component of GIMS is a node management system that enables (i) local processing on packets (e.g., flow aggregation and sampling), (ii) meta-data to be added to captured packets (e.g., timestamps), (iii) packet anonymization per local security policy, and (iv) flexible data storage including transfer to remote archives. We demonstrate the capabilities of GIMS through a set of micro-benchmarks that specifically highlight the performance of the node management system deployed on a commodity workstation. Our implementations are openly available to the community and our development efforts are on-going. 1413 1426 </li> 1414 1427 <br> … … 1889 1902 1890 1903 <li> 1904 <b>Tsai, Pang-Wei and wen Cheng, Pei and Yang, Chu-Sing and Luo, Mon-Yen</b> 1905 , "Supporting Extensions of VLAN-tagged traffic across OpenFlow Networks." 1906 2013 Proceedings Second GENI Research and Educational Experiment Workshop, Salt Lake City, UT, IEEE, 1907 2013. 1908 doi:10.1109/GREE.2013.20. 1909 <a href="http://dx.doi.org/10.1109/GREE.2013.20">http://dx.doi.org/10.1109/GREE.2013.20</a> 1910 1911 </li> 1912 <br> 1913 1914 1915 1916 <li> 1891 1917 <b>Valancius, Vytautas and Ravi, Bharath and Feamster, Nick and Snoeren, Alex C.</b> 1892 1918 , "Quantifying the benefits of joint content and network routing." … … 2036 2062 2037 2063 <li> 2038 <b>Augé, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo \\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</b>2064 <b>Augé, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Loïc and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</b> 2039 2065 , "Tools to foster a global federation of testbeds." 2040 2066 Computer Networks, … … 2697 2723 2698 2724 <li> 2699 <b>Schwerdel, Dennis and Reuther, Bernd and Zinner, Thomas and M \\uller, Paul and Tran-Gia, Phouc</b>2725 <b>Schwerdel, Dennis and Reuther, Bernd and Zinner, Thomas and Müller, Paul and Tran-Gia, Phouc</b> 2700 2726 , "Future Internet research and experimentation: The G-Lab approach." 2701 2727 Computer Networks, … … 2749 2775 2750 2776 <li> 2751 <b>Suñé, M. and Bergesio, L. and Woesner, H. and Rothe, T. and K \\opsel, A. and Colle, D. and Puype, B. and Simeonidou, D. and Nejabati, R. and Channegowda, M. and Kind, M. and Dietz, T. and Autenrieth, A. and Kotronis, V. and Salvadori, E. and Salsano, S. and K\\orner, M. and Sharma, S.</b>2777 <b>Suñé, M. and Bergesio, L. and Woesner, H. and Rothe, T. and Köpsel, A. and Colle, D. and Puype, B. and Simeonidou, D. and Nejabati, R. and Channegowda, M. and Kind, M. and Dietz, T. and Autenrieth, A. and Kotronis, V. and Salvadori, E. and Salsano, S. and Körner, M. and Sharma, S.</b> 2752 2778 , "Design and implementation of the OFELIA FP7 facility: The European OpenFlow testbed." 2753 2779 Computer Networks, … … 2893 2919 <li> 2894 2920 <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> 2921 , "Scaling up applications over distributed clouds with dynamic layer-2 exchange and broadcast service." 2922 Teletraffic Congress (ITC), 2014 26th International, IEEE, 2923 2014. 2924 doi:10.1109/itc.2014.6932973. 2925 <a href="http://dx.doi.org/10.1109/itc.2014.6932973">http://dx.doi.org/10.1109/itc.2014.6932973</a> 2926 <br><br><b>Abstract: </b>In this paper, we study the problem of provisioning large-scale virtual clusters over federated clouds connected by multi-domain, layer-2 wide area networks. We first present the virtual cluster request abstraction and the abstraction models for substrate resource pools. Based on these two abstraction models, we developed a novel layer-2 exchange mechanism and an implementation of it in a multi-domain networked cloud environment. The design of the mechanism takes into consideration the realistic constraints in current network and cloud systems. We show that efficient cluster splitting, cloud data center selection and resource allocation algorithms can be developed to provision large-scale virtual clusters across cloud sites. A prototype system has been deployed and integrated into the ExoGENI testbed for about a year, and is being heavily used by scientific and data analytic applications. 2927 </li> 2928 <br> 2929 2930 <li> 2931 <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> 2895 2932 , "Capacity of Inter-cloud Layer-2 Virtual Networking." 2896 2933 Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA, … … 2902 2939 <br> 2903 2940 2904 <li>2905 <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b>2906 , "Scaling up applications over distributed clouds with dynamic layer-2 exchange and broadcast service."2907 Teletraffic Congress (ITC), 2014 26th International, IEEE,2908 2014.2909 doi:10.1109/itc.2014.6932973.2910 <a href="http://dx.doi.org/10.1109/itc.2014.6932973">http://dx.doi.org/10.1109/itc.2014.6932973</a>2911 <br><br><b>Abstract: </b>In this paper, we study the problem of provisioning large-scale virtual clusters over federated clouds connected by multi-domain, layer-2 wide area networks. We first present the virtual cluster request abstraction and the abstraction models for substrate resource pools. Based on these two abstraction models, we developed a novel layer-2 exchange mechanism and an implementation of it in a multi-domain networked cloud environment. The design of the mechanism takes into consideration the realistic constraints in current network and cloud systems. We show that efficient cluster splitting, cloud data center selection and resource allocation algorithms can be developed to provision large-scale virtual clusters across cloud sites. A prototype system has been deployed and integrated into the ExoGENI testbed for about a year, and is being heavily used by scientific and data analytic applications.2912 </li>2913 <br>2914 2915 2941 2916 2942 … … 2982 3008 <br> 2983 3009 <a id="full-2015"><H2>GENI Publications for 2015</H2></a> 3010 3011 3012 <li> 3013 <b>Özçelik, İlker and Brooks, Richard R.</b> 3014 , "Deceiving entropy based DoS detection." 3015 Computers & Security, 3016 2015. 3017 doi:10.1016/j.cose.2014.10.013. 3018 <a href="http://dx.doi.org/10.1016/j.cose.2014.10.013">http://dx.doi.org/10.1016/j.cose.2014.10.013</a> 3019 <br><br><b>Abstract: </b>Denial of Service (DoS) attacks disable network services for legitimate users. As a result of growing dependence on the Internet by both the general public and service providers, the availability of Internet services has become a concern. While DoS attacks cause inconvenience for users, and revenue loss for service providers; their effects on critical infrastructures like the smart grid and public utilities could be catastrophic. For example, an attack on a smart grid system can cause cascaded power failures and lead to a major blackout. Researchers have proposed approaches for detecting these attacks in the past decade. Anomaly based DoS detection is the most common. The detector uses network traffic statistics; such as the entropy of incoming packet header fields (e.g. source IP addresses or protocol type). It calculates the observed statistical feature and triggers an alarm if an extreme deviation occurs. Entropy features are common in recent DDoS detection publications. They are also one of the most effective features for detecting these attacks. However, intrusion detection systems (IDS) using entropy based detection approaches can be a victim of spoofing attacks. An attacker can sniff the network and calculate background traffic entropy before a (D)DoS attack starts. They can then spoof attack packets to keep the entropy value in the expected range during the attack. This paper explains the vulnerability of entropy based network monitoring systems. We present a proof of concept entropy spoofing attack and show that by exploiting this vulnerability, the attacker can avoid detection or degrade detection performance to an unacceptable level. 3020 </li> 3021 <br> 3022 2984 3023 2985 3024 … … 3011 3050 3012 3051 <li> 3052 <b>Chen, Xinming and Wolf, Tilman and Griffioen, Jim and Ascigil, Onur and Dutta, Rudra and Rouskas, George and Bhat, Shireesh and Baldin, Ilya and Calvert, Ken</b> 3053 , "Design of a protocol to enable economic transactions for network services." 3054 Communications (ICC), 2015 IEEE International Conference on, IEEE, 3055 2015. 3056 doi:10.1109/icc.2015.7249175. 3057 <a href="http://dx.doi.org/10.1109/icc.2015.7249175">http://dx.doi.org/10.1109/icc.2015.7249175</a> 3058 <br><br><b>Abstract: </b>Deployment of innovative new networking services requires support by network providers. Since economic motivation plays an important role for network providers, it is critical that a network architecture intrinsically considers economic relationships. We present the design of a protocol that associates access to network services with economic contracts. We show how this protocol can be realized in fundamentally different ways, using out-of-band signaling and in-band signaling, based on two different prototype implementations. We present results that show the effectiveness of the proposed protocol and thus demonstrate a first step toward realizing an economy plane for the Internet. 3059 </li> 3060 <br> 3061 3062 3063 3064 <li> 3013 3065 <b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b> 3014 3066 , "Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN)." … … 3063 3115 3064 3116 <li> 3117 <b>Juluri, Parikshit</b> 3118 , "Measurement And Improvement of Quality-of-Experience For Online Video Streaming Services." 3119 3120 2015. 3121 3122 <a href="https://mospace.umsystem.edu/xmlui/bitstream/handle/10355/46696/JuluriMeaImpQua.pdf?sequence=1&#38;isAllowed=y">https://mospace.umsystem.edu/xmlui/bitstream/handle/10355/46696/JuluriMeaImpQua.pdf?sequence=1&#38;isAllowed=y</a> 3123 <br><br><b>Abstract: </b>HTTP based online video streaming services have been consistently dominating the online traffic for the past few years. Measuring and improving the performance of these services is an important challenge. Traditional Quality-of-Service (QoS) metrics such as packet loss, jitter and delay which were used for networked services are not easily understood by the users. Instead, Quality-of-Experience (QoE) metrics which capture the overall satisfaction are more suitable for measuring the quality as perceived by the users. However, these QoE metrics have not yet been standardized and their measurement and improvement poses unique challenges. In this work we first present a comprehensive survey of the different set of QoE metrics and the measurement methodologies suitable for HTTP based online video streaming services. We then present our active QoE measurement tool Pytomo that measures the QoE of YouTube videos. A case study on the measurement of QoE of YouTube videos when accessed by residential users from three different Internet Service Providers (ISP) in a metropolitan area is discussed. This is the first work that has collected QoE data from actual residential users using active measurements for YouTube videos. Based on these measurements we were able to study and compare the QoE of YouTube videos across multiple ISPs. We also were able to correlate the QoE observed with the server clusters used for the different users. Based on this correlation we were able to identify the server clusters that were experiencing diminished QoE. DynamicAdaptive Streaming overHTTP (DASH) is an HTTP based video streaming that enables the video players to adapt the video quality based on the network conditions. We next present a rate adaptation algorithm that improves the QoE of DASH video streaming services that selects the most optimum video quality. With DASH the video server hosts multiple representation of the same video and each representation is divided into small segments of constant playback duration. The DASH player downloads the appropriate representation based on the network conditions, thus, adapting the video quality to match the conditions. Currently deployed Adaptive Bitrate (ABR) algorithms use throughput and buffer occupancy to predict segment fetch times. These algorithms assume that the segments are of equal size. However, due to the encoding schemes employed this assumption does not hold. In order to overcome these limitations, we propose a novel Segment Aware Rate Adaptation algorithm (SARA) that leverages the knowledge of the segment size variations to improve the prediction of segment fetch times. Using an emulated player in a geographically distributed virtual network setup, we compare the performance of SARA with existing ABR algorithms. We demonstrate that SARA helps to improve the QoE of the DASH video streaming with improved convergence time, better bitrate switching performance and better video quality. We also show that unlike the existing adaptation schemes, SARA provides a consistent QoE irrespective of the segment size distributions. 3124 </li> 3125 <br> 3126 3127 3128 3129 <li> 3130 <b>Liu, Xuan</b> 3131 , "Dynamic Virtual Network Restoration with Optimal Standby Virtual Router Selection." 3132 3133 2015. 3134 3135 <a href="https://mospace.umsystem.edu/xmlui/bitstream/handle/10355/46697/LiuDynVirNet.pdf?sequence=1&#38;isAllowed=y">https://mospace.umsystem.edu/xmlui/bitstream/handle/10355/46697/LiuDynVirNet.pdf?sequence=1&#38;isAllowed=y</a> 3136 <br><br><b>Abstract: </b>Network virtualization technologies allow service providers to request partitioned, QoS guaranteed and fault-tolerant virtual networks provisioned by the substrate network provider (i.e., physical infrastructure provider). A virtualized networking environment (VNE) has common features such as partition, flexibility, etc., but fault-tolerance requires additional efforts to provide survivability against failures on either virtual networks or the substrate network. Two common survivability paradigms are protection (proactive) and restoration (reactive). In the protection scheme, the substrate network provider (SNP) allocates redundant resources (e.g., nodes, paths, bandwidths, etc) to protect against potential failures in the VNE. In the restoration scheme, the SNP dynamically allocates resources to restore the networks, and it usually occurs after the failure is detected. In this dissertation, we design a restoration scheme that can be dynamically implemented in a centralized manner by an SNP to achieve survivability against node failures in the VNE. The proposed restoration scheme is designed to be integrated with a protection scheme, where the SNP allocates spare virtual routers (VRs) as standbys for the virtual networks (VN) and they are ready to serve in the restoration scheme after a node failure has been identified. These standby virtual routers (S-VR) are reserved as a sharedbackup for any single node failure, and during the restoration procedure, one of the S-VR will be selected to replace the failed VR. In this work, we present an optimal S-VR selection approach to simultaneously restore multiple VNs affected by failed VRs, where these VRs may be affected by failures within themselves or at their substrate host (i.e., power outage, hardware failures, maintenance, etc.). Furthermore, the restoration scheme is embedded into a dynamic reconfiguration scheme (DRS), so that the affected VNs can be dynamically restored by a centralized virtual network manager (VNM). We first introduce a dynamic reconfiguration scheme (DRS) against node failures in a VNE, and then present an experimental study by implementing this DRS over a realistic VNE using GpENI testbed. For this experimental study, we ran the DRS to restore one VN with a single-VR failure, and the results showed that with a proper S-VR selection, the performance of the affected VN could be well restored. Next, we proposed an Mixed-Integer Linear Programming (MILP) model with dual–goals to optimally select S-VRs to restore all VNs affected by VR failures while load balancing. We also present a heuristic algorithm based on the model. By considering a number of factors, we present numerical studies to show how the optimal selection is affected. The results show that the proposed heuristic's performance is close to the optimization model when there were sufficient standby virtual routers for each virtual network and the substrate nodes have the capability to support multiple standby virtual routers to be in service simultaneously. Finally, we present the design of a software-defined resilient VNE with the optimal S-VR selection model, and discuss a prototype implementation on the GENI testbed. 3137 </li> 3138 <br> 3139 3140 3141 3142 <li> 3065 3143 <b>Liu, Xuan and Edwards, Sarah and Riga, Niky and Medhi, Deep</b> 3066 3144 , "Design of a software-defined resilient virtualized networking environment." … … 3167 3245 3168 3246 <li> 3169 <b> \\Ozçelik, İlker and Brooks, Richard R.</b>3170 , " Deceiving entropy based DoS detection."3171 Com puters & Security,3247 <b>Zhang, Miao and Kissel, Ezra and Swany, Martin</b> 3248 , "Using phoebus data transfer accelerator in cloud environments." 3249 Communications (ICC), 2015 IEEE International Conference on, IEEE, 3172 3250 2015. 3173 doi:10.1 016/j.cose.2014.10.013.3174 <a href="http://dx.doi.org/10.1 016/j.cose.2014.10.013">http://dx.doi.org/10.1016/j.cose.2014.10.013</a>3175 <br><br><b>Abstract: </b> Denial of Service (DoS) attacks disable network services for legitimate users. As a result of growing dependence on the Internet by both the general public and service providers, the availability of Internet services has become a concern. While DoS attacks cause inconvenience for users, and revenue loss for service providers; their effects on critical infrastructures like the smart grid and public utilities could be catastrophic. For example, an attack on a smart grid system can cause cascaded power failures and lead to a major blackout. Researchers have proposed approaches for detecting these attacks in the past decade. Anomaly based DoS detection is the most common. The detector uses network traffic statistics; such as the entropy of incoming packet header fields (e.g. source IP addresses or protocol type). It calculates the observed statistical feature and triggers an alarm if an extreme deviation occurs. Entropy features are common in recent DDoS detection publications. They are also one of the most effective features for detecting these attacks. However, intrusion detection systems (IDS) using entropy based detection approaches can be a victim of spoofing attacks. An attacker can sniff the network and calculate background traffic entropy before a (D)DoS attack starts. They can then spoof attack packets to keep the entropy value in the expected range during the attack. This paper explains the vulnerability of entropy based network monitoring systems. We present a proof of concept entropy spoofing attack and show that by exploiting this vulnerability, the attacker can avoid detection or degrade detection performance to an unacceptable level.3251 doi:10.1109/icc.2015.7248346. 3252 <a href="http://dx.doi.org/10.1109/icc.2015.7248346">http://dx.doi.org/10.1109/icc.2015.7248346</a> 3253 <br><br><b>Abstract: </b>The quality of data exchange in cloud computing applications relies on the connection performance between user clients and their cloud storage providers, and is often dependent on the wide area network (WAN) properties among data centers. For certain classes of applications, it can be crucial to provide an end-to-end solution that accelerates large data transfers and improves overall user experience. The development and deployment of WAN optimization technology has been investigated for improving application perfor- mance in heterogeneous, multi-domain environments. WAN opti- mization devices and services implement a number of approaches for performance improvement, and one key insight is that in contrast to traditional end-to-end TCP connections, middleboxes that segment and optimize transport-layer connections can im- prove the performance of wide area data transfers. In the context of dynamic cloud computing environments, there is an obvious target for implementations of WAN optimization as Network Function Virtualization (NFV), where the flexibility of virtualized cloud environments can be exploited. This paper describes recent developments and experimentation of our Phoebus WAN accelerator framework. We introduce a software suite that includes new Phoebus clients that operate with the Phoebus Gateway network. We test and discuss virtualizing Phoebus Gateways to provide acceleration services in cloud data transfers. Use cases and performance evaluations are conducted on FutureGrid and Internet2 testbeds, and we demonstrate the effectiveness of a virtualized Phoebus deployment. 3176 3254 </li> 3177 3255 <br> … … 4019 4097 4020 4098 <li> 4099 <b>Fund, Fraida and Dong, Chen and Korakis, Thanasis and Panwar, Shivendra</b> 4100 , "A Framework for Multidimensional Measurements on an Experimental WiMAX Testbed." 4101 Testbeds and Research Infrastructure. Development of Networks and Communities, Springer Berlin Heidelberg, 4102 2012. 4103 doi:10.1007/978-3-642-35576-9_32. 4104 </li> 4105 <br> 4106 4107 4108 4109 <li> 4021 4110 <b>Gangam, Sriharsha and Blanton, Ethan and Fahmy, Sonia</b> 4022 4111 , "Exercises for Graduate Students using GENI." … … 4119 4208 <li> 4120 4209 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b> 4210 , "Performance of GENI Cloud Testbeds for Real Time Scientific Application." 4211 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles, 4212 2012. 4213 4214 </li> 4215 <br> 4216 4217 <li> 4218 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b> 4121 4219 , "Network capabilities of cloud services for a real time scientific application." 4122 4220 37th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, IEEE, 4123 4221 2012. 4124 4222 doi:10.1109/lcn.2012.6423665. 4125 </li>4126 <br>4127 4128 <li>4129 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>4130 , "Performance of GENI Cloud Testbeds for Real Time Scientific Application."4131 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,4132 2012.4133 4134 4223 </li> 4135 4224 <br> … … 4349 4438 <b>Thomas, Charles and Sommers, Joel and Barford, Paul and Kim, Dongchan and Das, Ananya and Segebre, Roberto and Crovella, Mark</b> 4350 4439 , "A Passive Measurement System for Network Testbeds." 4351 8th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2012),4352 2012. 4353 4440 Testbeds and Research Infrastructure. Development of Networks and Communities, Springer Berlin Heidelberg, 4441 2012. 4442 doi:10.1007/978-3-642-35576-9_14. 4354 4443 </li> 4355 4444 <br> … … 4758 4847 4759 4848 <li> 4849 <b>Tsai, Pang-Wei and wen Cheng, Pei and Yang, Chu-Sing and Luo, Mon-Yen</b> 4850 , "Supporting Extensions of VLAN-tagged traffic across OpenFlow Networks." 4851 2013 Proceedings Second GENI Research and Educational Experiment Workshop, Salt Lake City, UT, IEEE, 4852 2013. 4853 doi:10.1109/GREE.2013.20. 4854 </li> 4855 <br> 4856 4857 4858 4859 <li> 4760 4860 <b>Valancius, Vytautas and Ravi, Bharath and Feamster, Nick and Snoeren, Alex C.</b> 4761 4861 , "Quantifying the benefits of joint content and network routing." … … 4883 4983 4884 4984 <li> 4885 <b>Augé, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo \\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</b>4985 <b>Augé, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Loïc and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</b> 4886 4986 , "Tools to foster a global federation of testbeds." 4887 4987 Computer Networks, … … 5442 5542 5443 5543 <li> 5444 <b>Schwerdel, Dennis and Reuther, Bernd and Zinner, Thomas and M \\uller, Paul and Tran-Gia, Phouc</b>5544 <b>Schwerdel, Dennis and Reuther, Bernd and Zinner, Thomas and Müller, Paul and Tran-Gia, Phouc</b> 5445 5545 , "Future Internet research and experimentation: The G-Lab approach." 5446 5546 Computer Networks, … … 5486 5586 5487 5587 <li> 5488 <b>Suñé, M. and Bergesio, L. and Woesner, H. and Rothe, T. and K \\opsel, A. and Colle, D. and Puype, B. and Simeonidou, D. and Nejabati, R. and Channegowda, M. and Kind, M. and Dietz, T. and Autenrieth, A. and Kotronis, V. and Salvadori, E. and Salsano, S. and K\\orner, M. and Sharma, S.</b>5588 <b>Suñé, M. and Bergesio, L. and Woesner, H. and Rothe, T. and Köpsel, A. and Colle, D. and Puype, B. and Simeonidou, D. and Nejabati, R. and Channegowda, M. and Kind, M. and Dietz, T. and Autenrieth, A. and Kotronis, V. and Salvadori, E. and Salsano, S. and Körner, M. and Sharma, S.</b> 5489 5589 , "Design and implementation of the OFELIA FP7 facility: The European OpenFlow testbed." 5490 5590 Computer Networks, … … 5608 5708 <li> 5609 5709 <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> 5710 , "Scaling up applications over distributed clouds with dynamic layer-2 exchange and broadcast service." 5711 Teletraffic Congress (ITC), 2014 26th International, IEEE, 5712 2014. 5713 doi:10.1109/itc.2014.6932973. 5714 </li> 5715 <br> 5716 5717 <li> 5718 <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b> 5610 5719 , "Capacity of Inter-cloud Layer-2 Virtual Networking." 5611 5720 Proceedings of the 2014 ACM SIGCOMM Workshop on Distributed Cloud Computing, Chicago, Illinois, USA, ACM, New York, NY, USA, 5612 5721 2014. 5613 5722 doi:10.1145/2627566.2627573. 5614 </li>5615 <br>5616 5617 <li>5618 <b>Xin, Yufeng and Baldin, Ilya and Heermann, Chris and Mandal, Anirban and Ruth, Paul</b>5619 , "Scaling up applications over distributed clouds with dynamic layer-2 exchange and broadcast service."5620 Teletraffic Congress (ITC), 2014 26th International, IEEE,5621 2014.5622 doi:10.1109/itc.2014.6932973.5623 5723 </li> 5624 5724 <br> … … 5683 5783 <br> 5684 5784 <a id="concise-2015"><H2>GENI Publications for 2015</H2></a> 5785 5786 5787 <li> 5788 <b>Özçelik, İlker and Brooks, Richard R.</b> 5789 , "Deceiving entropy based DoS detection." 5790 Computers & Security, 5791 2015. 5792 doi:10.1016/j.cose.2014.10.013. 5793 </li> 5794 <br> 5795 5685 5796 5686 5797 … … 5708 5819 5709 5820 <li> 5821 <b>Chen, Xinming and Wolf, Tilman and Griffioen, Jim and Ascigil, Onur and Dutta, Rudra and Rouskas, George and Bhat, Shireesh and Baldin, Ilya and Calvert, Ken</b> 5822 , "Design of a protocol to enable economic transactions for network services." 5823 Communications (ICC), 2015 IEEE International Conference on, IEEE, 5824 2015. 5825 doi:10.1109/icc.2015.7249175. 5826 </li> 5827 <br> 5828 5829 5830 5831 <li> 5710 5832 <b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b> 5711 5833 , "Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN)." … … 5752 5874 5753 5875 <li> 5876 <b>Juluri, Parikshit</b> 5877 , "Measurement And Improvement of Quality-of-Experience For Online Video Streaming Services." 5878 5879 2015. 5880 5881 </li> 5882 <br> 5883 5884 5885 5886 <li> 5887 <b>Liu, Xuan</b> 5888 , "Dynamic Virtual Network Restoration with Optimal Standby Virtual Router Selection." 5889 5890 2015. 5891 5892 </li> 5893 <br> 5894 5895 5896 5897 <li> 5754 5898 <b>Liu, Xuan and Edwards, Sarah and Riga, Niky and Medhi, Deep</b> 5755 5899 , "Design of a software-defined resilient virtualized networking environment." … … 5840 5984 5841 5985 <li> 5842 <b> \\Ozçelik, İlker and Brooks, Richard R.</b>5843 , " Deceiving entropy based DoS detection."5844 Com puters & Security,5986 <b>Zhang, Miao and Kissel, Ezra and Swany, Martin</b> 5987 , "Using phoebus data transfer accelerator in cloud environments." 5988 Communications (ICC), 2015 IEEE International Conference on, IEEE, 5845 5989 2015. 5846 doi:10.1 016/j.cose.2014.10.013.5990 doi:10.1109/icc.2015.7248346. 5847 5991 </li> 5848 5992 <br>