This book constitutes the refereed proceedings of the Third International Conference on Autonomous Infrastructure, Management and Security, AIMS 2009, held in Enschede, The Netherlands, during June 30 - July 2, 2009 under the auspices of IFIP. The 12 revised full papers and three short papers presented together with 8 papers of the AIMS PhD workshop were carefully reviewed and selected from 28 submissions to the main conference and 15 papers for the PhD workshop respectively. The papers are organized in topical sections on network resource management, overlays and P2P networks, network configuration and optimization, as well as monitoring and visualization.
Author(s): Ramin Sadre, Aiko Pras
Edition: 1
Year: 2009
Language: English
Pages: 211
front-matter.pdf......Page 1
Introduction......Page 12
User Centric Identity Management......Page 13
Trust Model......Page 15
Architectural Overview......Page 17
Cross Domain Provisioning......Page 18
Implementation......Page 20
Related Work......Page 22
Discussion and Conclusions......Page 23
References......Page 24
Introduction......Page 26
Related Work......Page 27
List of Potential Network Parameters......Page 28
Collecting Network Traces......Page 29
The Steps of Our Statistical Analysis......Page 30
Results......Page 32
Volume vs. Considered Metrics......Page 33
Conclusions and Future Work......Page 36
References......Page 37
Introduction......Page 39
A Scalar-Value Management Problem......Page 40
Observability......Page 42
The Resource Closure......Page 43
Simulation Results......Page 44
Simulating the Model......Page 45
Effect of Increment Magnitude......Page 46
Effect of Noise......Page 48
Limitations......Page 49
Future Work......Page 50
References......Page 51
Introduction......Page 53
Churn Problem in a DHT......Page 54
Churn Tolerance Techniques......Page 55
Replication......Page 56
Join-Time Transfer......Page 57
Repeated Implicit Put......Page 58
Effect of Techniques......Page 59
Results......Page 61
Cost Performance of Churn Tolerance Techniques......Page 62
Related Work......Page 64
References......Page 65
Introduction......Page 67
Related Work......Page 68
Roles......Page 69
Voting Algorithm and Data Structure......Page 70
P2P Collaboration Application Implementation......Page 72
Simulation and Experimental Settings......Page 73
Results and Discussion......Page 74
Summary, Conclusions, and Future Work......Page 78
References......Page 79
Motivation and Scope of Work......Page 81
Overview of KAD......Page 82
Previous Attacks in KAD......Page 83
Protections in KAD......Page 84
Methodology......Page 86
Results......Page 87
Distributed Eclipse Attack......Page 90
Conclusion......Page 91
References......Page 92
Introduction......Page 94
NETCONF Overview......Page 95
Systems Under Test......Page 97
Test Plan......Page 99
Test Tool (NIT)......Page 100
Preliminary Observations......Page 102
Conclusions and Future Work......Page 103
References......Page 104
Promises and Topics......Page 106
Promise Theory......Page 108
Promises in Cfengine......Page 109
Introduction......Page 110
The Cfengine Topic Map Model......Page 112
Modelling Configuration Promises as Topic Maps......Page 113
Knowledge about Promises......Page 115
Conclusions......Page 117
References......Page 118
Introduction......Page 119
Overall System Architecture......Page 120
Design of Traffic Engineering Components......Page 121
Design of Policy Components......Page 122
IP Traffic Engineering......Page 123
Policies for Optimizing Military Networks......Page 126
Evaluation on a Synthetic Network......Page 127
Case Study......Page 128
Conclusions......Page 131
References......Page 132
Introduction......Page 133
Multi-Agent Systems......Page 134
Agent-Based Propositions in WSN......Page 135
Energy......Page 137
Position within the Network......Page 138
Simulation Setup......Page 139
Results and Analysis......Page 141
References......Page 143
Introduction......Page 145
Related Work......Page 146
Architecture......Page 147
Probe Organization......Page 150
Data Representation and Manipulation......Page 151
Simulation Setup and Scenario......Page 152
Accuracy......Page 153
Scalability......Page 154
Conclusions and Future Work......Page 155
References......Page 156
Introduction......Page 158
Related Work......Page 159
Experiment #1: NAM......Page 160
Description of nam......Page 161
Conversion Algorithm for SNMP Traces......Page 162
Results and Discussion......Page 163
Experiment #2: NetViz/JUNG......Page 164
Conversion Algorithm for SNMP Traces......Page 165
Results and Discussion......Page 166
Application to NetFlow Traces......Page 167
Conclusions......Page 168
References......Page 170
Introduction......Page 172
Cloud Architecture......Page 173
Pro-active Change Management......Page 174
References......Page 177
Introduction......Page 178
Pricing Scheme......Page 179
Simulation and Evaluation......Page 181
Conclusion......Page 182
References......Page 183
Introduction......Page 184
Fake Gaps......Page 185
Analysing Repositories......Page 186
Conclusions......Page 188
References......Page 189
Problem Description......Page 190
Challenges......Page 191
Approach......Page 192
References......Page 193
Introduction and Motivation......Page 194
Problem Statement......Page 195
Design and Evaluation......Page 196
References......Page 197
Introduction......Page 198
Current Research......Page 199
The Idea: Fast Learning Neural Network IDS......Page 200
References......Page 201
Introduction......Page 202
Autonomous Semantic Composition......Page 203
Resource Efficient Service Deployment......Page 204
References......Page 205
Introduction......Page 206
Approach......Page 207
Architecture and Evaluation......Page 208
References......Page 209
Introduction......Page 210
Planned Approach......Page 211
Concluding Remarks......Page 212
References......Page 213
Introduction......Page 214
Building a Cost-Aware Multipath Architecture......Page 215
References......Page 217
Introduction......Page 218
Building a Cost-Aware Multipath Architecture......Page 219
References......Page 221
back-matter.pdf......Page 222