Abstract
We present a vision of an Intelligent Network in which users dynamically indicate their requests for services, and formulate needs in terms of Quality of Service (QoS) and price. Users can also monitor on-line the extent to which their requests are being satisfied. In turn the services will dynamically try to satisfy the user as best as they can, and inform the user of the level at which the requests are being satisfied, and at what cost. The network will provide guidelines and constraints to users and services, to avoid that they impede each others’ progress. This intelligent and sensible dialogue between users, services and the network can proceed constantly based on mutual observation, network and user self-observation, and on-line adaptive and locally distributed feedback control which proceeds at the same speed as the traffic flows and events being controlled. We review issues such as network “situational awareness”, self-organisation, and structure, and relate these concepts to the ongoing research on autonomic communication systems. We relate the search for services in the network to the question of QoS and routing. We examine the need to dynamically protect the networked system from denial of service (DoS) attacks, and propose an approch to DoS defence which uses the detection of violations of QoS constraints and the automatic throttling or dropping of traffic to protect critacl nodes. We also discuss how this vision of an Intelligent Network can benefit from techniques that have been experimented in the Cognitive Packet Network (CPN) test-bed at Imperial College, thanks to “smart packets” and reinforcement learning, which offers routing that is dynamically modified using on on-line sensing and monitoring, based on users’ QoS needs and overall network objectives.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Morris, R.T.: A Weakness in the 4.2BSD Unix TCP/IP Software. Technical Report Computer Science #117, AT&T Bell Labs (February 1985)
Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. Tech. Rep. RFC 2267 (January 1998)
Williams, D., Apostolopoulos, G.: QoS Routing Mechanisms and OSPF Extensions. RFC 2676 (August 1999)
Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press, New York (1999)
Gelenbe, E., Xu, Z., Şeref, E.: Cognitive packet networks. In: Proc. 11th IEEE Int. Conf. on Tools with Artificial Intelligence (TAI 1999), Chicago, Ill, pp. 47–54 (1999)
Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. In: Proc. ACM SIGCOMM, Stockholm, Sweden, August 2000, pp. 295–306 (2000)
Tschudin, C., Lundgren, H., Gulbrandsen, H.: Active Routing for Ad Hoc Networks. IEEE Communications Magazine (April 2000)
Song, D., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: Proc. Infocom 2001, Anchorage, Alaska, USA, April 22-26, vol. 2, pp. 878–886 (2001)
Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web. Scientific American (May 2001)
Picco, G.P., Murphy, A.L., Roman, G.C.: LIME: a Middleware for Logical and Physical Mobility. In: 22nd IEEE Intl. Conference Distributed Computing Systems (2001)
Ratsanamy, S., Francis, P., Handley, M., Karp, R.: A Scalable Content-Addressable Network. In: ACM SIGCOMM Conference (August 2001)
Gelenbe, E., Seref, E., Xu, Z.: Simulation with learning agents. Proceedings of the IEEE 89(2), 148–157 (2001)
Paxson, V.: An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. ACM Computer Communications Review 31(3) (July 2001)
Gelenbe, E., Lent, R., Xu, Z.: Design and performance of cognitive packet networks. Performance Evaluation 46, 155–176 (2001)
Rice, G., Davis, J.: A Genealogical Approach to Analyzing Post-Mortem Denial of Service Attacks. In: Secure and Dependable System Forensics Workshop, University of Idaho, September 23-25 (2002)
BBC News. Mafiaboy hacker jailed (September 13, 2001), http://news.bbc.co.uk/1/hi/sci/tech/1541252.stm
Gelenbe, E., Lent, R., Xu, Z.: Cognitive Packet Networks: QoS and Performance. In: Proc. IEEE MASCOTS Conference, ISBN 0-7695-0728-X, Fort Worth, TX, October 2002, pp. 3–12 (2002)
Horrocks, I., Patel-Schneider, P., van Harmelen, F.: Reviewing the design of DAML+OIL: An ontology language for the semantic web. In: National Conference on Artificial Intelligence, Edmonton, Alberta, Canada (2002)
Mahajan, R., Bellovin, S., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S.: Controlling High Bandwidth Aggregates in the Network. ACM SIGCOMM Computer Communication Review 32(3), 62–73 (2002)
Gelenbe, E., Lent, R., Xu, Z.: Cognitive Packet Networks: QoS and Performance. In: Proc. IEEE MASCOTS Conference, Fort Worth, TX, pp. 3–12 (October 2002) ISBN 0-7695-0728-X
Albert, R., Barabasi, A.: Statistical Mechanics of Complex Networks. Rev. Mod. Phys. 74(47) (2002)
Borcea, C., et al.: Cooperative Computing for Distributed Embedded Systems. In: 22nd International Conference on Distributed Computing Systems, Vienna (A), pp. 227–238. IEEE CS Press, Los Alamitos (2002)
Estrin, D., Culler, D., Pister, K., Sukjatme, G.: Connecting the Physical World with Pervasive Networks”. IEEE Pervasive Computing 1(1), 59–69 (2002)
Snoeren, A., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Schwartz, B., Kent, S., Strayer, W.T.: Single-Packet IP Traceback. IEEE/ACM Transactions on Networking 10(6), 721–734 (2002) ISSN: 1063-6692
Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Mishra, V., Rubenstein, D.: Using Graphic Turing Tests to Counter Automated DDoS Attacks against Web Servers. In: Proc. 10th ACM Int’l. Conference on Computer and Communications Security (CCS 2003), Washington DC, USA, October 27-30, pp. 8–19 (2003) ISBN: 1-58113-738-9
Capra, L., Emmerich, W., Mascolo, C.: CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications”. IEEE Transactions of Software Engineering Journal (TSE) 29(10), 929–945 (2003)
Kephart, J., Chess, D.: The Vision of Autonomic Computing”. IEEE Computer 36(1) (2003)
Zambonelli, F., Jennings, N., Wooldridge, M.: Developing Multiagent Systems: the Gaia Methodology”. ACM Transactions on Software Engineering and Methodology 12(3), 317–370 (2003)
Papazoglou, M., Aiello, M., Pistore, M., Yang, J.: XSRL: A Request Language for Web Services (2003), www.webservices.org
Philipose, M., Fishkin, K., Perkowitz, M., Patterson, D., Fox, D., Kautz, H., Hahnel, D.: Inferring Activities from Interactions with Object. IEEE Pervasive Computing 3(4), 50–57 (2004)
Jing, S., Wang, H., Shin, K.: Hop-Count Filtering An Effective Defense Against Spoofed Traffic. In: Proc. ACM Conference on Computer and Communications Security, Washington DC, October 2003, pp. 30–41 (2003) ISBN 1-58113-738-9
Mori, G., Malik, J.: Recognizing objects in adversarial clutter - Breaking a visual CAPTCHA. In: Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition 2003 (CVPR 2003), Madison, WI, USA, June 18-20, vol. 1, pp. 134–141 (2003) ISSN: 1063-6919, ISBN: 0-7695-1900-8
Sung, M., Xu, J.: IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. IEEE Transactions on Parallel and Distributed Systems 14, 861–872 (2003)
Thomas, R., Mark, B., Johnson, T., Croall, J.: NetBouncer: client-legitimacy-based high-performance DDoS filtering. In: Proc. DARPA Information Survivability Conference and Exposition, April 22-24, vol. 1, pp. 14–25 (2003)
Hussain, A., Heidermann, J., Papadopoulos, C.: A Framework for Classifying Denial of Service Attacks. In: Proc. ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication 2003, Karlsruhe, Germany, August 25-29, pp. 99–110 (2003) ISBN: 1-58113-735-4
Mirkovic, J., Reiher, P., Robinson, M.: Forming Alliance for DDoS Defense. In: Proc. 2003 workshop on New security paradigms, Ascona, Switzerland, August 2003, pp. 11–18 (2003) ISBN 1-58113-880-6
Liu, H., Parashar, M.: Component-based Programming Model for Autonomic Applications. In: Proc. First International Conference on Autonomic Computing, New York, USA (2004)
Mikic-Rakic, M., Medvidovic, N.: Support for Disconnected Operation via Architectural Self-Reconfiguration. In: Proc. First International Conference on Autonomic Computing, New York. IEEE Computer Society, Los Alamitos (2004) ISBN 0-7695-2114-2
Gelenbe, E., Gellman, M., Lent, R., Liu, P.: Autonomous smart routing for network QoS. In: Proc. First International Conference on Autonomic Computing, New York, pp. 232–239. IEEE Computer Society, Los Alamitos (2004) ISBN 0-7695-2114-2
Gelenbe, E., Lent, R., Nunez, A.: Self-aware networks and QoS. Proceedings of the IEEE 92(9), 1478–1489 (2004)
Gelenbe, E., Lent, R.: Adhoc power aware Cognitive Packet Networks. Ad Hoc Networks Journal 2(3), 1570–8705 (2004) (ISN: 1570-8705).
Gelenbe, E.: Cognitive Packet Network. U.S. Patent No. 6,804,201 B1(October 12, 2004)
Frey, J., Hughes, G., Mills, H., Schraefel, M., Smith, G., De Roure, D.: Less is More: Lightweight Ontologies and User Interfaces for Smart Labs. In: UK e-Science All Hands Meeting, Nottingham (2004)
Yau, D.K.Y., Lui, J.C.S., Liang, F., Yam, Y.: Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles. IEEE/ACM Transactions on Networking 13(1), 29–42 (2005)
Tummolini, L., Castelfranchi, C., Ricci, A., Viroli, M., Omicini, A.: Exhibitionists and Voyeurs do it better: A Shared Environment Approach for Flexible Coordination with Tacit Messages. In: Weyns, D., Van Dyke Parunak, H., Michel, F. (eds.) E4MAS 2004. LNCS (LNAI), vol. 3374, pp. 215–231. Springer, Heidelberg (2005)
Zambonelli, F., Gleizes, M.P., Mamei, M., Tolksdorf, R.: Spray Computers: Explorations in Self Organization. Journal of Pervasive and Mobile Computing 1(1) (May 2005)
Kandula, S., Katabi, D., Jacob, M., Berger, A.: Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds. In: Proc. 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, MA, USA, May 2-4 (2005)
Mirkovic, J., Reiher, P.: D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Transactions on Dependable and Secure Computing 2(3), 216–232 (2005)
Bouquet, P., Serafini, L., Zanobini, S.: Peer-to-Peer Semantic Coordination. Journal of Web Semantics 2(1) (2005)
Gelenbe, E., Gellman, M., Loukas, G.: An autonomic approach to denial of service defence. In: Proc. of the IEEE Int. Symp. on a World of Wireless, Mobile and Multimedia Networks, June 2005, pp. 537–541 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gelenbe, E. (2005). Users and Services in Intelligent Networks. In: Cho, K., Jacquet, P. (eds) Technologies for Advanced Heterogeneous Networks. AINTEC 2005. Lecture Notes in Computer Science, vol 3837. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599593_3
Download citation
DOI: https://doi.org/10.1007/11599593_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30884-3
Online ISBN: 978-3-540-32292-4
eBook Packages: Computer ScienceComputer Science (R0)