2,944 research outputs found

    Mining Network Events using Traceroute Empathy

    Full text link
    In the never-ending quest for tools that enable an ISP to smooth troubleshooting and improve awareness of network behavior, very much effort has been devoted in the collection of data by active and passive measurement at the data plane and at the control plane level. Exploitation of collected data has been mostly focused on anomaly detection and on root-cause analysis. Our objective is somewhat in the middle. We consider traceroutes collected by a network of probes and aim at introducing a practically applicable methodology to quickly spot measurements that are related to high-impact events happened in the network. Such filtering process eases further in- depth human-based analysis, for example with visual tools which are effective only when handling a limited amount of data. We introduce the empathy relation between traceroutes as the cornerstone of our formal characterization of the traceroutes related to a network event. Based on this model, we describe an algorithm that finds traceroutes related to high-impact events in an arbitrary set of measurements. Evidence of the effectiveness of our approach is given by experimental results produced on real-world data.Comment: 8 pages, 7 figures, extended version of Discovering High-Impact Routing Events using Traceroutes, in Proc. 20th International Symposium on Computers and Communications (ISCC 2015

    On the Effectiveness of BGP Hijackers That Evade Public Route Collectors

    Get PDF
    Routing hijack attacks have plagued the Internet for decades. After many failed mitigation attempts, recent Internet-wide BGP monitoring infrastructures relying on distributed route collection systems, called route collectors, give us hope that future monitor systems can quickly detect and ultimately mitigate hijacks. In this paper, we investigate the effectiveness of public route collectors with respect to future attackers deliberately engineering longer hijacks to avoid being recorded by route collectors. Our extensive simulations (and attacks we device) show that monitor-based systems may be unable to observe many carefully crafted hijacks diverting traffic from thousands of ASes. Hijackers could predict whether their attacks would propagate to some BGP feeders (i.e., monitors) of public route collectors. Then, manipulate BGP route propagation so that the attack never reaches those monitors. This observation remains true when considering plausible future Internet topologies, with more IXP links and up to 4 times more monitors peering with route collectors. We then evaluate the feasibility of performing hijacks not observed by route collectors in the real-world. We experiment with two classifiers to predict the monitors that are dangerous to report the attack to route collectors, one based on monitor proximities (i.e., shortest path lengths) and another based on Gao-Rexford routing policies. We show that a proximity-based classifier could be sufficient for the hijacker to identify all dangerous monitors for hijacks announced to peer-to-peer neighbors. For hijacks announced to transit networks, a Gao-Rexford classifier reduces wrong inferences by 91%\ge 91\% without introducing new misclassifications for existing dangerous monitors

    Fuzzy TOPSIS-based Secure Neighbor Discovery Mechanism for Improving Reliable Data Dissemination in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Networks (WSNs) being an indispensable entity of the Internet of Things (IoT) are found to be more and more widely utilized for the rapid advent of IoT environment. The reliability of data dissemination in the IoT environment completely depends on the secure neighbor discovery mechanism that are utilized for effective and efficient communication among the sensor nodes. Secure neighbor discovery mechanisms that significantly determine trustworthy sensor nodes are essential for maintaining potential connectivity and sustaining reliable data delivery in the energy-constrained self organizing WSN. In this paper, Fuzzy Technique of Order Preference Similarity to the Ideal Solution (TOPSIS)-based Secure Neighbor Discovery Mechanism (FTOPSIS-SNDM) is proposed for estimating the trust of each sensor node in the established routing path for the objective of enhancing reliable data delivery in WSNs. This proposed FTOPSIS-SNDM is proposed as an attempt to integrate the merits of Fuzzy Set Theory (FST) and TOPSIS-based Multi-criteria Decision Making (MCDM) approach, since the discovery of secure neighbors involves the exchange of imprecise data and uncertain behavior of sensor nodes. This secure neighbor is also influenced by the factors of packet forwarding potential, delay, distance from the Base Station (BS) and residual energy, which in turn depends on multiple constraints that could be possibly included into the process of secure neighbor discovery. The simulation investigations of the proposed FTOPSIS-SNDM confirmed its predominance over the benchmarked approaches in terms of throughput, energy consumption, network latency, communication overhead for varying number of genuine and malicious neighboring sensor nodes in network

    Actionable Supply Chain Management Insights for 2016 and Beyond

    Get PDF
    The summit World Class Supply Chain 2016: Critical to Prosperity , contributed to addressing a need that the Supply Chain Management (SCM) field’s current discourse has deemed as critical: that need is for more academia-­‐industry collaboration to develop the field’s body of actionable knowledge. Held on May 4th, 2016 in Milton, Ontario, the summit addressed that need in a way that proved to be both effective and distinctive in the Canadian SCM environment. The summit, convened in partnership between Wilfrid Laurier University’s Lazaridis School of Business & Economics and CN Rail, focused on building actionable SCM knowledge to address three core questions: What are the most significant SCM issues to be confronted now and beyond 2016? What SCM practices are imperative now and beyond 2016? What are optimal ways of ensuring that (a) issues of interest to SCM practitioners inform the scholarly activities of research and teaching and (b) the knowledge generated from those scholarly activities reciprocally guide SCM practice? These are important questions for supply chain professionals in their efforts to make sense of today’s business environment that is appropriately viewed as volatile, uncertain, complex, and ambiguous. The structure of the deliberations to address these questions comprised two keynote presentations and three panel discussions, all of which were designed to leverage the collective wisdom that comes from genuine peer-­‐to-­‐peer dialogue between the SCM practitioners and SCM scholars. Specifically, the structure aimed for a balanced blend of industry and academic input and for coverage of the SCM issues of greatest interest to attendees (as determined through a pre-­‐summit survey of attendees). The structure produced impressively wide-­‐ranging deliberations on the aforementioned questions. The essence of the resulting findings from the summit can be distilled into three messages: Given today’s globally significant trends such as changes in population demographics, four highly impactful levers that SCM executives must expertly handle to attain excellence are: collaboration; information; technology; and talent Government policy, especially for infrastructure, is a significant determinant of SCM excellence There is tremendous potential for mutually beneficial industry-academia knowledge co-creation/sharing aimed at research and student training This white paper reports on those findings as well as on the summit’s success in realizing its vision of fostering mutually beneficial industry-academia dialogue. The paper also documents what emerged as matters that are inadequately understood and should therefore be targeted in the ongoing quest for deeper understanding of actionable SCM insights. Deliberations throughout the day on May 4th, 2016 and the encouraging results from the pre-­‐summit and post-­‐summit surveys have provided much inspiration to enthusiastically undertake that quest. The undertaking will be through initiatives that include future research projects as well as next year’s summit–World Class Supply Chain 2017

    Extending the supply chain to address sustainability

    Full text link
    © 2019 Elsevier Ltd In today's growing economy, overconsumption and overproduction have accelerated environmental deterioration worldwide. Consumers, through unsustainable consumption patterns, and producers, through production based on traditional resource depleting practices, have contributed significantly to the socio-environmental problems. Consumers and producers are linked by supply chains, and as sustainability became seen as a way to reverse socio-environmental degradation, it has also started to be introduced in research on supply chains. We look at the evolution of research on sustainable supply chains and show that it is still largely focused on the processes and networks that take place between the producer and the consumer, hardly taking into account consumer behavior and its influence on the performance of the producer and the supply chain itself. We conclude that we cannot be talking about sustainability, without extending the supply chains to account for consumers' behavior and their influence on the overall system performance. A conceptual framework is proposed to explain how supply chains can become sustainable and improve their economic and socio-environmental performance by motivating consumer behavior toward green consumption patterns, which, in turn, motivate producers and suppliers to change their operations
    corecore