Periódicos, Publicação

AN EVALUATION OF SECURITY FEATURES BASED ON ISO/IEC 25023 FOR A DISTRIBUTED AUTONOMIC SCIENTIFIC PUBLISHER TOOL ON A PERMISSIONED BLOCKCHAIN

In the development of projects that aim at management and editorial evaluation methods, mechanisms that foster the product’s quality final have great importance. In this scenario, several areas are working together in search of better adequacy and standardization in software development. A basic example is the adequations of evaluation of software engineering and computer networks, which work, so that distributed applications are developed following evaluation criteria and standardized quality standards. In this context, we present the DASP software, an open-source distributed autonomous scientific publisher executed through an allowed blockchain network, automatically organized through intelligent contracts, an alternative to the decentralized management of editorial models. As a form of evaluation, one of the most current standards used by the international organization for standardization (ISO) to perform software quality measurements, ISO/IEC 25023, is adopted. Furthermore, we focused on the security aspect, which is one of the categories of ISO/IEC. This aspect was chosen because it was based on the main features that underpin blockchain technology. The quality measurement was carried out following several steps, such as the definition of ISO/IEC 25023, an adaptation of metrics for DASP software evaluation, calculations of the quality value of each functionality, and determination of recommendations for improvements in the software according to the estimates made.

Artigos de Conferência, Publicação

Agregaçao e Desagregaçao de Dados IoT em Redes Definidas por Software Utilizando P4

Low-Power Internet-of-Things (LPIoT) networks are characterized by a large number of IoT nodes with resource limitations. Due to its limitations, it is common to use data aggregation techniques in LPIoT data traffic. However, any aggregated payload needs to be disaggregated before the data is delivered to IoT applications. This work proposes a new strategy for aggregating and disaggregating IoT data in software-defined networks (SDN) using the P4 language.

Artigos de Conferência, Publicação

Planejamento e Avaliaçao de Redes de Computadores Utilizando Cópias Digitais: Estudo da Rede Metropolitana de Belém (MetroBel)

The MetroBel network was a pioneer network in the national context, launched in 2007, connecting several teaching and research institutions in the metropolitan region of Belem/PA. Designed 15 years ago, it is still in produc- ´ tion, but needs to evolve to meet the new demands of user institutions. One of the obstacles to this evolution is the difficulty in carrying out tests to verify new configurations and adoption of new technologies. An innovative approach to overcoming these challenges is the use of Digital Shadow to address real-world problems. This approach uses digital techniques to represent real-world objects, has been gaining popularity in the industry and is beginning to be used in different scenarios. This paper proposes a four-step strategy to create a Digital Copy as an alternative to planning and evaluating computer networks. A case study of the MetroBel network is carried out to validate the proposal.

Artigos de Conferência, Publicação

Fatias (Leves) como um Serviço: Uma Solução para Dispositivos Móveis na Borda da Rede

Cloud Network Slicing (CNS) is the process of isolating end-to-end, on-demand, independently controlled, managed, and/or orchestrated cloud and network resources, which are called slices. In this context, one can consider devices with low computational power, such as mobile devices, to provide resources for slices, thus bringing services even closer to the end users. However, platforms that provide Slice as a Service (SlaaS) do not allocate mobile devices as part of the slice. In this sense, this paper presents a SlaaS platform that allocates mobile devices as part of the slice. For this, lightweight virtualization is used instead of full virtualization to do the slice instantiation. The results show it is possible to allocate mobile devices as part of the slice. The results obtained show that the solution is promising because of better performance in lightweight virtualization compared to full virtualization.

Artigos de Conferência, Publicação

Modularized and Contract-Based Prediction Models in Programmable Networks

Network traffic engineering aims at the network quality, optimizing routes and detecting network attacks. In this context, traffic prediction is an essential tool to capture the underlying behavior of a network. Therefore, this work proposes a modularization architecture for volumetric prediction models, allowing switching between models and setups at runtime in controllers of Software Defined Networks (SDN), dealing with short time series and delivering the data already processed for the prediction. The proposed architecture compares the results from four traditional predictors based on short-range time dependency.

Artigos de Conferência, Publicação

Sistema híbrido e on-line de detecção e classificação de tráfego malicioso

Several Machine Learning methodologies have been proposed to improve security in computer networks and reduce the damage caused by the action of malicious agents. However, detecting and classifying attacks with high accuracy and precision is still a major challenge in today’s networks. This paper proposes an online attack detection and network traffic classification system, which hybridly combines Stream Machine Learning, Deep Learning, and Ensemble technique. Using multiple stages of data analysis, the system can detect the presence of malicious traffic flows and classify them according to the type of attack they represent. The system was evaluated in three network security datasets, in which it obtained accuracy and precision above 90% with a reduced false alarm rate.

Artigos de Conferência, Publicação

Uma Abordagem de Aprendizado de Máquina Para Detecção Híbrida de Ataques no Plano de Dados SDN

The programmability of the SDN data plane allows users to write algorithms that define how network devices should process packets, including the use of programming interfaces (APIs) to take advantage of the network controller. With this great flexibility, the use of machine learning applications has been proposed for packet classification and attack detection. In this scenario, trained models are used to complete the action and correspondence table of pipeline P4 offering equal detection and processing time. Another approach used is network telemetry, which allows obtaining information on the state of the network and using it by applications running on the controller or external agent. In contrast, this work advances the state of the art by proposing a hybrid AM management architecture for SDN networks, combining the use of the P4 pipeline and strategic agents in the network to provide detection of multilevel attacks.

Artigos de Conferência, Publicação

Relatos de experiências do processo de implantação do testbed de aplicações blockchain brasileiro

This paper presents reports of experiences of IT teams in the creation of the Brazilian Blockchain Application Testbed (TABB). The TABB is an initiative project of the Technical Committee on Blockchain (CT-Blockchain), coordinated by the National Education and Research Network (RNP). Currently, this project comprises two blockchains from the Hyperledger project, Fabric and Indy, the former for general purpose and the latter for identity management. Questionnaires were designate and applied to collect the experiences of the IT teams doing the deployment. This survey identified that the methods currently used are not the most adequate for this process. It is hoped with this article a more assertive development will be made, through a new method or by improving the currently used ones.

Artigos de Conferência, Publicação

Deconn: Combining minimum and neutral energy consumption strategies in iot networks

In Low-Power Internet-of-Things (IoT), energy provisioning is often heterogeneous, meaning that nodes with rechargeable and non-rechargeable batteries coexist and collaborate to support data communication. Non-rechargeable nodes pose the requirement of minimum energy consumption for maximizing their network lifetime. Nodes powered by rechargeable batteries, in turn, must foster neutral energy consumption to avoid battery depletion and overflow. In this context, keeping one subset of nodes in neutral consumption and another subset in minimum consumption while maintaining proper network operation is a complex challenge to solve. To tackle this problem, we propose in this paper the Dual Energy COnsumption for interNet-of-thiNgs (DECONN). DECONN is a distributed solution designed to combine minimum and neutral consumption for IoT networks with heterogeneous energy provision. Using DECONN, nodes with the lowest amount of energy determine the energy consumption of the nodes located in the communication path. We compare DECONN with current IoT low-power standard protocols, such as RPL and CoAP. The results achieved provide evidence that DECONN may outperform standard protocols regarding the amount of saved energy for non-rechargeable and time in neutral operation for rechargeable nodes

Artigos de Conferência, Publicação

Ominacs: Online ml-based iot network attack detection and classification system

Several Machine Learning (ML) methodologies have been proposed to improve security in Internet Of Things (IoT) networks and reduce the damage caused by the action of malicious agents. However, detecting and classifying attacks with high accuracy and precision is still a major challenge. This paper proposes an online attack detection and network traffic classification system, which combines stream Machine Learning, Deep Learning, and Ensemble Learning technique. Using multiple stages of data analysis, the system can detect the presence of malicious traffic flows and classify them according to the type of attack they represent. Furthermore, we show how to implement this system both in an IoT network and from an ML point of view. The system was evaluated in three IoT network security datasets, in which it obtained accuracy and precision above 90% with a reduced false alarm rate.

Artigos de Conferência, Publicação

Desafios e oportunidades de pesquisa para o roteamento em redes quânticas

Communication between quantum devices has been advancing towards networks of complex topologies and long distances. However, intrinsic limitations of quantum signals mean that they cannot be replicated or amplified, making it difficult to adopt traditional routing techniques. Furthermore, the heterogeneity of technologies and different hardware implementations, and the lack of a well-defined Internet network stack model, open up several challenges to fully realize communication between quantum devices. Thus, this article presents the main challenges in the development of algorithms and routing protocols for quantum networks and discusses possible alternatives that are being developed