Skip to main content

Showing 1–24 of 24 results for author: Boutaba, R

.
  1. arXiv:2403.13936  [pdf, other

    cs.NI

    Secure and Efficient Group Handover Protocol in 5G Non-Terrestrial Networks

    Authors: Bohan Zhang, Peng Hu, Ahmad Akbari Azirani, Mohammad A. Salahuddin, Diogo Barradas, Noura Limam, Raouf Boutaba

    Abstract: The growing low-Earth orbit (LEO) satellite constellations have become an essential part of the fifth-generation (5G) non-terrestrial network (NTN) market. These satellites can enable direct-to-cell connectivity for mobile devices and support various applications with ubiquitous coverage for 5G and beyond networks. However, satellite-based NTNs bring several challenges to the 5G handover protocol… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Accepted by the 2024 IEEE International Conference on Communications (ICC), 9-13 June 2024, Denver, CO, USA

  2. arXiv:2310.11558  [pdf, other

    cs.LG cs.DS

    Online Algorithms with Uncertainty-Quantified Predictions

    Authors: Bo Sun, Jerry Huang, Nicolas Christianson, Mohammad Hajiesmaili, Adam Wierman, Raouf Boutaba

    Abstract: The burgeoning field of algorithms with predictions studies the problem of using possibly imperfect machine learning predictions to improve online algorithm performance. While nearly all existing algorithms in this framework make no assumptions on prediction quality, a number of methods providing uncertainty quantification (UQ) on machine learning models have been developed in recent years, which… ▽ More

    Submitted 3 June, 2024; v1 submitted 17 October, 2023; originally announced October 2023.

  3. arXiv:2310.06166  [pdf, other

    cs.GT cs.DS

    Threshold Policies with Tight Guarantees for Online Selection with Convex Costs

    Authors: Xiaoqi Tan, Siyuan Yu, Raouf Boutaba, Alberto Leon-Garcia

    Abstract: This paper provides threshold policies with tight guarantees for online selection with convex cost (OSCC). In OSCC, a seller wants to sell some asset to a sequence of buyers with the goal of maximizing her profit. The seller can produce additional units of the asset, but at non-decreasing marginal costs. At each time, a buyer arrives and offers a price. The seller must make an immediate and irrevo… ▽ More

    Submitted 23 January, 2024; v1 submitted 9 October, 2023; originally announced October 2023.

  4. arXiv:2308.02182  [pdf, other

    cs.NI cs.AI cs.CR cs.LG

    AutoML4ETC: Automated Neural Architecture Search for Real-World Encrypted Traffic Classification

    Authors: Navid Malekghaini, Elham Akbari, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, Stephane Tuffin

    Abstract: Deep learning (DL) has been successfully applied to encrypted network traffic classification in experimental settings. However, in production use, it has been shown that a DL classifier's performance inevitably decays over time. Re-training the model on newer datasets has been shown to only partially improve its performance. Manually re-tuning the model architecture to meet the performance expecta… ▽ More

    Submitted 13 October, 2023; v1 submitted 4 August, 2023; originally announced August 2023.

    Comments: Paper accepted for publication in IEEE TNSM journal. Please cite that version

    Journal ref: IEEE Transactions on Network and Service Management

  5. arXiv:2306.09290  [pdf, ps, other

    cs.NI cs.LG

    Generalizable Resource Scaling of 5G Slices using Constrained Reinforcement Learning

    Authors: Muhammad Sulaiman, Mahdieh Ahmadi, Mohammad A. Salahuddin, Raouf Boutaba, Aladdin Saleh

    Abstract: Network slicing is a key enabler for 5G to support various applications. Slices requested by service providers (SPs) have heterogeneous quality of service (QoS) requirements, such as latency, throughput, and jitter. It is imperative that the 5G infrastructure provider (InP) allocates the right amount of resources depending on the slice's traffic, such that the specified QoS levels are maintained d… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

  6. arXiv:2306.01072  [pdf

    cs.NI

    MonArch: Network Slice Monitoring Architecture for Cloud Native 5G Deployments

    Authors: Niloy Saha, Nashid Shahriar, Raouf Boutaba, Aladdin Saleh

    Abstract: Automated decision making algorithms are expected to play a key role in management and orchestration of network slices in 5G and beyond networks. State-of-the-art algorithms for automated orchestration and management tend to rely on data-driven methods which require a timely and accurate view of the network. Accurately monitoring an end-to-end (E2E) network slice requires a scalable monitoring arc… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: Accepted at IEEE/IFIP NOMS 2023

  7. arXiv:2003.05111  [pdf, ps, other

    cs.NI

    Constellation: A High Performance Geo-Distributed Middlebox Framework

    Authors: Milad Ghaznavi, Ali Jose Mashtizadeh, Bernard Wong, Raouf Boutaba

    Abstract: Middleboxes are increasingly deployed across geographically distributed data centers. In these scenarios, the WAN latency between different sites can significantly impact the performance of stateful middleboxes. The deployment of middleboxes across such infrastructures can even become impractical due to the high cost of remote state accesses. We introduce Constellation, a framework for the geo d… ▽ More

    Submitted 11 March, 2020; originally announced March 2020.

  8. arXiv:2001.09297  [pdf, other

    cs.RO cs.MA

    Vehicle Scheduling Problem

    Authors: Mirmojtaba Gharibi, Steven L. Waslander, Raouf Boutaba

    Abstract: We define a new problem called the Vehicle Scheduling Problem (VSP). The goal is to minimize an objective function, such as the number of tardy vehicles over a transportation network subject to maintaining safety distances, meeting hard deadlines, and maintaining speeds on each link between the allowed minimums and maximums. We prove VSP is an NP-hard problem for multiple objective functions that… ▽ More

    Submitted 25 January, 2020; originally announced January 2020.

  9. arXiv:2001.03321  [pdf, ps, other

    cs.NI eess.SY

    Fault Tolerance for Service Function Chains

    Authors: Milad Ghaznavi, Elaheh Jalalpour, Bernard Wong, Raouf Boutaba, Ali Jose Mashtizadeh

    Abstract: Enterprise network traffic typically traverses a sequence of middleboxes forming a service function chain, or simply a chain. Tolerating failures when they occur along chains is imperative to the availability and reliability of enterprise applications. Making a chain fault-tolerant is challenging since, in the event of failures, the state of faulty middleboxes must be correctly and quickly recover… ▽ More

    Submitted 25 February, 2020; v1 submitted 10 January, 2020; originally announced January 2020.

  10. arXiv:1909.04838  [pdf, other

    cs.RO cs.MA

    3D traffic flow model for UAVs

    Authors: Mirmojtaba Gharibi, Raouf Boutaba, Steven L. Waslander

    Abstract: In this work, we introduce a microscopic traffic flow model called Scalar Capacity Model (SCM) which can be used to study the formation of traffic on an airway link for autonomous Unmanned Aerial Vehicles (UAV) as well as for the ground vehicles on the road. Given the 3D nature of UAV flights, the main novelty in our model is to eliminate the commonly used notion of lanes and replace it with a not… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

    Comments: 1 Table, 6 Figures

  11. arXiv:1906.10265  [pdf, other

    cs.NI

    Reliable Slicing of 5G Transport Networks with Dedicated Protection

    Authors: Nashid Shahriar, Sepehr Taeb, Shihabur Rahman Chowdhury, Mubeen Zulfiqar, Massimo Tornatore, Raouf Boutaba, Jeebak Mitra, Mahdi Hemmati

    Abstract: In 5G networks, slicing allows partitioning of network resources to meet stringent end-to-end service requirements across multiple network segments, from access to transport. These requirements are sha** technical evolution in each of these segments. In particular, the transport segment is currently evolving in the direction of the so-called elastic optical networks (EONs), a new generation of o… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

  12. arXiv:1902.08538  [pdf, other

    cs.CR cs.LG

    A Graph-Based Machine Learning Approach for Bot Detection

    Authors: Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba

    Abstract: Bot detection using machine learning (ML), with network flow-level features, has been extensively studied in the literature. However, existing flow-based approaches typically incur a high computational overhead and do not completely capture the network communication patterns, which can expose additional aspects of malicious hosts. Recently, bot detection systems which leverage communication graph… ▽ More

    Submitted 22 February, 2019; originally announced February 2019.

    Comments: IFIP/IEEE International Symposium on Integrated Network Management,Washington DC, USA, April 2019

  13. arXiv:1709.06002  [pdf, other

    cs.NI

    NeuRoute: Predictive Dynamic Routing for Software-Defined Networks

    Authors: Abdelhadi Azzouni, Raouf Boutaba, Guy Pujolle

    Abstract: This paper introduces NeuRoute, a dynamic routing framework for Software Defined Networks (SDN) entirely based on machine learning, specifically, Neural Networks. Current SDN/OpenFlow controllers use a default routing based on Dijkstra algorithm for shortest paths, and provide APIs to develop custom routing applications. NeuRoute is a controller-agnostic dynamic routing framework that (i) predicts… ▽ More

    Submitted 18 September, 2017; originally announced September 2017.

    Comments: Accepted for CNSM 2017

  14. arXiv:1705.04527  [pdf, other

    cs.NI

    sOFTDP: Secure and Efficient Topology Discovery Protocol for SDN

    Authors: Abdelhadi Azzouni, Raouf Boutaba, Nguyen Thi Mai Trang, Guy Pujolle

    Abstract: Topology discovery is one of the most critical tasks of Software-Defined Network (SDN) controllers. Current SDN controllers use the OpenFlow Discovery Protocol (OFDP) as the de-facto protocol for discovering the underlying network topology. In a previous work, we have shown the functional, performance and security limitations of OFDP. In this paper, we introduce and detail a novel protocol called… ▽ More

    Submitted 15 May, 2017; v1 submitted 12 May, 2017; originally announced May 2017.

    Comments: Submitted for peer review

  15. arXiv:1705.00706  [pdf, other

    cs.NI

    Limitations of OpenFlow Topology Discovery Protocol

    Authors: Abdelhadi Azzouni, Nguyen Thi Mai Trang, Raouf Boutaba, Guy Pujolle

    Abstract: OpenFlow Discovery Protocol (OFDP) is the de-facto protocol used by OpenFlow controllers to discover the underlying topology. In this paper, we show that OFDP has some serious security, efficiency and functionality limitations that make it non suitable for production deployments. Instead, we briefly introduce sOFTD, a new discovery protocol with a built-in security characteristics and which is mor… ▽ More

    Submitted 12 May, 2017; v1 submitted 1 May, 2017; originally announced May 2017.

    Comments: The peer reviewed version can be found here (to be published soon)

  16. arXiv:1611.02370  [pdf, other

    cs.NI

    Fingerprinting OpenFlow controllers: The first step to attack an SDN control plane

    Authors: Abdelhadi Azzouni, Othmen Braham, Nguyen Thi Mai Trang, Guy Pujolle, Raouf Boutaba

    Abstract: Software-Defined Networking (SDN) controllers are considered as Network Operating Systems (NOSs) and often viewed as a single point of failure. Detecting which SDN controller is managing a target network is a big step for an attacker to launch specific/effective attacks against it. In this paper, we demonstrate the feasibility of fingerpirinting SDN controllers. We propose techniques allowing an a… ▽ More

    Submitted 1 May, 2017; v1 submitted 7 November, 2016; originally announced November 2016.

    Comments: Peer reviewed version can be fount here http://ieeexplore.ieee.org/document/7841843/

  17. arXiv:1603.08461  [pdf

    cs.NI

    Perspectives on Software-Defined Networks: interviews with five leading scientists from the networking community

    Authors: Daniel M Batista, Gordon Blair, Fabio Kon, Raouf Boutaba, David Hutchison, Raj Jain, Ramachandran Ramjee, Christian E Rothenberg

    Abstract: Software defined Networks (SDNs) have drawn much attention both from academia and industry over the last few years. Despite the fact that underlying ideas already exist through areas such as P2P applications and active networks (e.g. virtual topologies and dynamic changes of the network via software), only now has the technology evolved to a point where it is possible to scale the implementations,… ▽ More

    Submitted 28 March, 2016; originally announced March 2016.

    Journal ref: Journal of Internet Services and Applications, Springer London, October 2015, Print ISSN: 1867-4828, Online ISSN:1869-0238, Vol. 6, No. 1, pp. 1867-4828, DOI: 10.1186/s13174-015-0035-3

  18. arXiv:1601.01289  [pdf, other

    cs.NI cs.RO

    Internet of Drones

    Authors: Mirmojtaba Gharibi, Raouf Boutaba, Steven L. Waslander

    Abstract: The Internet of Drones (IoD) is a layered network control architecture designed mainly for coordinating the access of unmanned aerial vehicles to controlled airspace, and providing navigation services between locations referred to as nodes. The IoD provides generic services for various drone applications such as package delivery, traffic surveillance, search and rescue and more. In this paper, we… ▽ More

    Submitted 1 February, 2016; v1 submitted 6 January, 2016; originally announced January 2016.

  19. Service Function Chaining Simplified

    Authors: Milad Ghaznavi, Nashid Shahriar, Reaz Ahmed, Raouf Boutaba

    Abstract: Middleboxes have become a vital part of modern networks by providing service functions such as content filtering, load balancing and optimization of network traffic. An ordered sequence of middleboxes composing a logical service is called service chain. Service Function Chaining (SFC) enables us to define these service chains. Recent optimization models of SFCs assume that the functionality of a m… ▽ More

    Submitted 5 January, 2016; originally announced January 2016.

    Comments: 9 pages, 7 figures, 3 tables

  20. A Path Generation Approach to Embedding of Virtual Networks

    Authors: Rashid Mijumbi, Joan Serrat, Juan-Luis Gorricho, Raouf Boutaba

    Abstract: As the virtualization of networks continues to attract attention from both industry and academia, the Virtual Network Embedding (VNE) problem remains a focus of researchers. This paper proposes a one-shot, unsplittable flow VNE solution based on column generation. We start by formulating the problem as a path-based mathematical program called the primal, for which we derive the corresponding dual… ▽ More

    Submitted 25 September, 2015; originally announced September 2015.

    Comments: 14 Pages in IEEE Transactions on Network and Service Management, September 2015

  21. Network Function Virtualization: State-of-the-art and Research Challenges

    Authors: Rashid Mijumbi, Joan Serrat, Juan Luis Gorricho, Niels Bouten, Filip De Turck, Raouf Boutaba

    Abstract: Network Function Virtualization (NFV) has drawn significant attention from both industry and academia as an important shift in telecommunication service provisioning. By decoupling Network Functions (NFs) from the physical devices on which they run, NFV has the potential to lead to significant reductions in Operating Expenses (OPEX) and Capital Expenses (CAPEX) and facilitate the deployment of new… ▽ More

    Submitted 25 September, 2015; originally announced September 2015.

    Comments: 28 Pages in IEEE Communications Surveys and Tutorials. September 2015

  22. arXiv:1503.06377  [pdf, other

    cs.NI

    On Orchestrating Virtual Network Functions in NFV

    Authors: Md. Faizul Bari, Shihabur Rahman Chowdhury, Reaz Ahmed, Raouf Boutaba

    Abstract: Middleboxes or network appliances like firewalls, proxies and WAN optimizers have become an integral part of today's ISP and enterprise networks. Middlebox functionalities are usually deployed on expensive and proprietary hardware that require trained personnel for deployment and maintenance. Middleboxes contribute significantly to a network's capital and operational costs. In addition, organizati… ▽ More

    Submitted 25 March, 2015; v1 submitted 21 March, 2015; originally announced March 2015.

    Comments: NFV, VNF. Orchestration, Service Chaining, Network Function

  23. arXiv:1101.4260  [pdf, ps, other

    cs.NI cs.DC

    Networking

    Authors: Nashid Shahriar, Mahfuza Sharmin, Reaz Ahmed, Raouf Boutaba

    Abstract: This paper discusses an efficient approach to design and implement a highly available peer- to-peer system irrespective of peer timing and churn.

    Submitted 20 May, 2011; v1 submitted 21 January, 2011; originally announced January 2011.

  24. arXiv:1002.3190  [pdf, ps, other

    cs.CR cs.NI

    A Distributed Sequential Algorithm for Collaborative Intrusion Detection Networks

    Authors: Quanyan Zhu, Carol J. Fung, Raouf Boutaba, Tamer Basar

    Abstract: Collaborative intrusion detection networks are often used to gain better detection accuracy and cost efficiency as compared to a single host-based intrusion detection system (IDS). Through cooperation, it is possible for a local IDS to detect new attacks that may be known to other experienced acquaintances. In this paper, we present a sequential hypothesis testing method for feedback aggregation… ▽ More

    Submitted 16 February, 2010; originally announced February 2010.