Skip to main content

Users and Services in Intelligent Networks

  • Conference paper
Book cover Technologies for Advanced Heterogeneous Networks (AINTEC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3837))

Included in the following conference series:

Abstract

We present a vision of an Intelligent Network in which users dynamically indicate their requests for services, and formulate needs in terms of Quality of Service (QoS) and price. Users can also monitor on-line the extent to which their requests are being satisfied. In turn the services will dynamically try to satisfy the user as best as they can, and inform the user of the level at which the requests are being satisfied, and at what cost. The network will provide guidelines and constraints to users and services, to avoid that they impede each others’ progress. This intelligent and sensible dialogue between users, services and the network can proceed constantly based on mutual observation, network and user self-observation, and on-line adaptive and locally distributed feedback control which proceeds at the same speed as the traffic flows and events being controlled. We review issues such as network “situational awareness”, self-organisation, and structure, and relate these concepts to the ongoing research on autonomic communication systems. We relate the search for services in the network to the question of QoS and routing. We examine the need to dynamically protect the networked system from denial of service (DoS) attacks, and propose an approch to DoS defence which uses the detection of violations of QoS constraints and the automatic throttling or dropping of traffic to protect critacl nodes. We also discuss how this vision of an Intelligent Network can benefit from techniques that have been experimented in the Cognitive Packet Network (CPN) test-bed at Imperial College, thanks to “smart packets” and reinforcement learning, which offers routing that is dynamically modified using on on-line sensing and monitoring, based on users’ QoS needs and overall network objectives.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Morris, R.T.: A Weakness in the 4.2BSD Unix TCP/IP Software. Technical Report Computer Science #117, AT&T Bell Labs (February 1985)

    Google Scholar 

  2. Ferguson, P., Senie, D.: Network Ingress Filtering: Defeating Denial of Service Attacks which Employ IP Source Address Spoofing. Tech. Rep. RFC 2267 (January 1998)

    Google Scholar 

  3. Williams, D., Apostolopoulos, G.: QoS Routing Mechanisms and OSPF Extensions. RFC 2676 (August 1999)

    Google Scholar 

  4. Bonabeau, E., Dorigo, M., Theraulaz, G.: Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press, New York (1999)

    MATH  Google Scholar 

  5. Gelenbe, E., Xu, Z., Şeref, E.: Cognitive packet networks. In: Proc. 11th IEEE Int. Conf. on Tools with Artificial Intelligence (TAI 1999), Chicago, Ill, pp. 47–54 (1999)

    Google Scholar 

  6. Savage, S., Wetherall, D., Karlin, A., Anderson, T.: Practical Network Support for IP Traceback. In: Proc. ACM SIGCOMM, Stockholm, Sweden, August 2000, pp. 295–306 (2000)

    Google Scholar 

  7. Tschudin, C., Lundgren, H., Gulbrandsen, H.: Active Routing for Ad Hoc Networks. IEEE Communications Magazine (April 2000)

    Google Scholar 

  8. Song, D., Perrig, A.: Advanced and Authenticated Marking Schemes for IP Traceback. In: Proc. Infocom 2001, Anchorage, Alaska, USA, April 22-26, vol. 2, pp. 878–886 (2001)

    Google Scholar 

  9. Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web. Scientific American (May 2001)

    Google Scholar 

  10. Picco, G.P., Murphy, A.L., Roman, G.C.: LIME: a Middleware for Logical and Physical Mobility. In: 22nd IEEE Intl. Conference Distributed Computing Systems (2001)

    Google Scholar 

  11. Ratsanamy, S., Francis, P., Handley, M., Karp, R.: A Scalable Content-Addressable Network. In: ACM SIGCOMM Conference (August 2001)

    Google Scholar 

  12. Gelenbe, E., Seref, E., Xu, Z.: Simulation with learning agents. Proceedings of the IEEE 89(2), 148–157 (2001)

    Article  Google Scholar 

  13. Paxson, V.: An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. ACM Computer Communications Review 31(3) (July 2001)

    Google Scholar 

  14. Gelenbe, E., Lent, R., Xu, Z.: Design and performance of cognitive packet networks. Performance Evaluation 46, 155–176 (2001)

    Article  MATH  Google Scholar 

  15. Rice, G., Davis, J.: A Genealogical Approach to Analyzing Post-Mortem Denial of Service Attacks. In: Secure and Dependable System Forensics Workshop, University of Idaho, September 23-25 (2002)

    Google Scholar 

  16. BBC News. Mafiaboy hacker jailed (September 13, 2001), http://news.bbc.co.uk/1/hi/sci/tech/1541252.stm

  17. Gelenbe, E., Lent, R., Xu, Z.: Cognitive Packet Networks: QoS and Performance. In: Proc. IEEE MASCOTS Conference, ISBN 0-7695-0728-X, Fort Worth, TX, October 2002, pp. 3–12 (2002)

    Google Scholar 

  18. Horrocks, I., Patel-Schneider, P., van Harmelen, F.: Reviewing the design of DAML+OIL: An ontology language for the semantic web. In: National Conference on Artificial Intelligence, Edmonton, Alberta, Canada (2002)

    Google Scholar 

  19. Mahajan, R., Bellovin, S., Floyd, S., Ioannidis, J., Paxson, V., Shenker, S.: Controlling High Bandwidth Aggregates in the Network. ACM SIGCOMM Computer Communication Review 32(3), 62–73 (2002)

    Article  Google Scholar 

  20. Gelenbe, E., Lent, R., Xu, Z.: Cognitive Packet Networks: QoS and Performance. In: Proc. IEEE MASCOTS Conference, Fort Worth, TX, pp. 3–12 (October 2002) ISBN 0-7695-0728-X

    Google Scholar 

  21. Albert, R., Barabasi, A.: Statistical Mechanics of Complex Networks. Rev. Mod. Phys. 74(47) (2002)

    Google Scholar 

  22. Borcea, C., et al.: Cooperative Computing for Distributed Embedded Systems. In: 22nd International Conference on Distributed Computing Systems, Vienna (A), pp. 227–238. IEEE CS Press, Los Alamitos (2002)

    Google Scholar 

  23. Estrin, D., Culler, D., Pister, K., Sukjatme, G.: Connecting the Physical World with Pervasive Networks”. IEEE Pervasive Computing 1(1), 59–69 (2002)

    Article  Google Scholar 

  24. Snoeren, A., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Schwartz, B., Kent, S., Strayer, W.T.: Single-Packet IP Traceback. IEEE/ACM Transactions on Networking 10(6), 721–734 (2002) ISSN: 1063-6692

    Article  Google Scholar 

  25. Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Mishra, V., Rubenstein, D.: Using Graphic Turing Tests to Counter Automated DDoS Attacks against Web Servers. In: Proc. 10th ACM Int’l. Conference on Computer and Communications Security (CCS 2003), Washington DC, USA, October 27-30, pp. 8–19 (2003) ISBN: 1-58113-738-9

    Google Scholar 

  26. Capra, L., Emmerich, W., Mascolo, C.: CARISMA: Context-Aware Reflective mIddleware System for Mobile Applications”. IEEE Transactions of Software Engineering Journal (TSE) 29(10), 929–945 (2003)

    Article  Google Scholar 

  27. Kephart, J., Chess, D.: The Vision of Autonomic Computing”. IEEE Computer 36(1) (2003)

    Google Scholar 

  28. Zambonelli, F., Jennings, N., Wooldridge, M.: Developing Multiagent Systems: the Gaia Methodology”. ACM Transactions on Software Engineering and Methodology 12(3), 317–370 (2003)

    Article  Google Scholar 

  29. Papazoglou, M., Aiello, M., Pistore, M., Yang, J.: XSRL: A Request Language for Web Services (2003), www.webservices.org

  30. Philipose, M., Fishkin, K., Perkowitz, M., Patterson, D., Fox, D., Kautz, H., Hahnel, D.: Inferring Activities from Interactions with Object. IEEE Pervasive Computing 3(4), 50–57 (2004)

    Article  Google Scholar 

  31. Jing, S., Wang, H., Shin, K.: Hop-Count Filtering An Effective Defense Against Spoofed Traffic. In: Proc. ACM Conference on Computer and Communications Security, Washington DC, October 2003, pp. 30–41 (2003) ISBN 1-58113-738-9

    Google Scholar 

  32. Mori, G., Malik, J.: Recognizing objects in adversarial clutter - Breaking a visual CAPTCHA. In: Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition 2003 (CVPR 2003), Madison, WI, USA, June 18-20, vol. 1, pp. 134–141 (2003) ISSN: 1063-6919, ISBN: 0-7695-1900-8

    Google Scholar 

  33. Sung, M., Xu, J.: IP Traceback-Based Intelligent Packet Filtering: A Novel Technique for Defending against Internet DDoS Attacks. IEEE Transactions on Parallel and Distributed Systems 14, 861–872 (2003)

    Article  Google Scholar 

  34. Thomas, R., Mark, B., Johnson, T., Croall, J.: NetBouncer: client-legitimacy-based high-performance DDoS filtering. In: Proc. DARPA Information Survivability Conference and Exposition, April 22-24, vol. 1, pp. 14–25 (2003)

    Google Scholar 

  35. Hussain, A., Heidermann, J., Papadopoulos, C.: A Framework for Classifying Denial of Service Attacks. In: Proc. ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication 2003, Karlsruhe, Germany, August 25-29, pp. 99–110 (2003) ISBN: 1-58113-735-4

    Google Scholar 

  36. Mirkovic, J., Reiher, P., Robinson, M.: Forming Alliance for DDoS Defense. In: Proc. 2003 workshop on New security paradigms, Ascona, Switzerland, August 2003, pp. 11–18 (2003) ISBN 1-58113-880-6

    Google Scholar 

  37. Liu, H., Parashar, M.: Component-based Programming Model for Autonomic Applications. In: Proc. First International Conference on Autonomic Computing, New York, USA (2004)

    Google Scholar 

  38. Mikic-Rakic, M., Medvidovic, N.: Support for Disconnected Operation via Architectural Self-Reconfiguration. In: Proc. First International Conference on Autonomic Computing, New York. IEEE Computer Society, Los Alamitos (2004) ISBN 0-7695-2114-2

    Google Scholar 

  39. Gelenbe, E., Gellman, M., Lent, R., Liu, P.: Autonomous smart routing for network QoS. In: Proc. First International Conference on Autonomic Computing, New York, pp. 232–239. IEEE Computer Society, Los Alamitos (2004) ISBN 0-7695-2114-2

    Chapter  Google Scholar 

  40. Gelenbe, E., Lent, R., Nunez, A.: Self-aware networks and QoS. Proceedings of the IEEE 92(9), 1478–1489 (2004)

    Article  Google Scholar 

  41. Gelenbe, E., Lent, R.: Adhoc power aware Cognitive Packet Networks. Ad Hoc Networks Journal 2(3), 1570–8705 (2004) (ISN: 1570-8705).

    Google Scholar 

  42. Gelenbe, E.: Cognitive Packet Network. U.S. Patent No. 6,804,201 B1(October 12, 2004)

    Google Scholar 

  43. Frey, J., Hughes, G., Mills, H., Schraefel, M., Smith, G., De Roure, D.: Less is More: Lightweight Ontologies and User Interfaces for Smart Labs. In: UK e-Science All Hands Meeting, Nottingham (2004)

    Google Scholar 

  44. Yau, D.K.Y., Lui, J.C.S., Liang, F., Yam, Y.: Defending Against Distributed Denial-of-Service Attacks With Max-Min Fair Server-Centric Router Throttles. IEEE/ACM Transactions on Networking 13(1), 29–42 (2005)

    Article  Google Scholar 

  45. Tummolini, L., Castelfranchi, C., Ricci, A., Viroli, M., Omicini, A.: Exhibitionists and Voyeurs do it better: A Shared Environment Approach for Flexible Coordination with Tacit Messages. In: Weyns, D., Van Dyke Parunak, H., Michel, F. (eds.) E4MAS 2004. LNCS (LNAI), vol. 3374, pp. 215–231. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  46. Zambonelli, F., Gleizes, M.P., Mamei, M., Tolksdorf, R.: Spray Computers: Explorations in Self Organization. Journal of Pervasive and Mobile Computing 1(1) (May 2005)

    Google Scholar 

  47. Kandula, S., Katabi, D., Jacob, M., Berger, A.: Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds. In: Proc. 2nd USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, MA, USA, May 2-4 (2005)

    Google Scholar 

  48. Mirkovic, J., Reiher, P.: D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks. IEEE Transactions on Dependable and Secure Computing 2(3), 216–232 (2005)

    Article  Google Scholar 

  49. Bouquet, P., Serafini, L., Zanobini, S.: Peer-to-Peer Semantic Coordination. Journal of Web Semantics 2(1) (2005)

    Google Scholar 

  50. Gelenbe, E., Gellman, M., Loukas, G.: An autonomic approach to denial of service defence. In: Proc. of the IEEE Int. Symp. on a World of Wireless, Mobile and Multimedia Networks, June 2005, pp. 537–541 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gelenbe, E. (2005). Users and Services in Intelligent Networks. In: Cho, K., Jacquet, P. (eds) Technologies for Advanced Heterogeneous Networks. AINTEC 2005. Lecture Notes in Computer Science, vol 3837. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599593_3

Download citation

  • DOI: https://doi.org/10.1007/11599593_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30884-3

  • Online ISBN: 978-3-540-32292-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics