-
GreenNFV: Energy-Efficient Network Function Virtualization with Service Level Agreement Constraints
Authors:
MD S Q Zulkar Nine,
Tevfik Kosar,
Fatih Bulut,
**ho Hwang
Abstract:
Network Function Virtualization (NFV) platforms consume significant energy, introducing high operational costs in edge and data centers. This paper presents a novel framework called GreenNFV that optimizes resource usage for network function chains using deep reinforcement learning. GreenNFV optimizes resource parameters such as CPU sharing ratio, CPU frequency scaling, last-level cache (LLC) allo…
▽ More
Network Function Virtualization (NFV) platforms consume significant energy, introducing high operational costs in edge and data centers. This paper presents a novel framework called GreenNFV that optimizes resource usage for network function chains using deep reinforcement learning. GreenNFV optimizes resource parameters such as CPU sharing ratio, CPU frequency scaling, last-level cache (LLC) allocation, DMA buffer size, and packet batch size. GreenNFV learns the resource scheduling model from the benchmark experiments and takes Service Level Agreements (SLAs) into account to optimize resource usage models based on the different throughput and energy consumption requirements. Our evaluation shows that GreenNFV models achieve high transfer throughput and low energy consumption while satisfying various SLA constraints. Specifically, GreenNFV with Throughput SLA can achieve $4.4\times$ higher throughput and $1.5\times$ better energy efficiency over the baseline settings, whereas GreenNFV with Energy SLA can achieve $3\times$ higher throughput while reducing energy consumption by 50%.
△ Less
Submitted 17 October, 2023;
originally announced October 2023.
-
Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Authors:
Asif Imran,
Tevfik Kosar,
Jaroslaw Zola,
Muhammed Fatih Bulut
Abstract:
Automated batch refactoring has become a de-facto mechanism to restructure software that may have significant design flaws negatively impacting the code quality and maintainability. Although automated batch refactoring techniques are known to significantly improve overall software quality and maintainability, their impact on resource utilization is not well studied. This paper aims to bridge the g…
▽ More
Automated batch refactoring has become a de-facto mechanism to restructure software that may have significant design flaws negatively impacting the code quality and maintainability. Although automated batch refactoring techniques are known to significantly improve overall software quality and maintainability, their impact on resource utilization is not well studied. This paper aims to bridge the gap between batch refactoring code smells and consumption of resources. It determines the relationship between software code smell batch refactoring, and resource consumption. Next, it aims to design algorithms to predict the impact of code smell refactoring on resource consumption. This paper investigates 16 code smell types and their joint effect on resource utilization for 31 open source applications. It provides a detailed empirical analysis of the change in application CPU and memory utilization after refactoring specific code smells in isolation and in batches. This analysis is then used to train regression algorithms to predict the impact of batch refactoring on CPU and memory utilization before making any refactoring decisions. Experimental results also show that our ANN-based regression model provides highly accurate predictions for the impact of batch refactoring on resource consumption. It allows the software developers to intelligently decide which code smells they should refactor jointly to achieve high code quality and maintainability without increasing the application resource utilization. This paper responds to the important and urgent need of software engineers across a broad range of software applications, who are looking to refactor code smells and at the same time improve resource consumption. Finally, it brings forward the concept of resource aware code smell refactoring to the most crucial software applications.
△ Less
Submitted 27 June, 2023;
originally announced June 2023.
-
Automated Compliance Blueprint Optimization with Artificial Intelligence
Authors:
Abdulhamid Adebayo,
Daby Sow,
Muhammed Fatih Bulut
Abstract:
For highly regulated industries such as banking and healthcare, one of the major hindrances to the adoption of cloud computing is compliance with regulatory standards. This is a complex problem due to many regulatory and technical specification (techspec) documents that the companies need to comply with. The critical problem is to establish the map** between techspecs and regulation controls so…
▽ More
For highly regulated industries such as banking and healthcare, one of the major hindrances to the adoption of cloud computing is compliance with regulatory standards. This is a complex problem due to many regulatory and technical specification (techspec) documents that the companies need to comply with. The critical problem is to establish the map** between techspecs and regulation controls so that from day one, companies can comply with regulations with minimal effort. We demonstrate the practicality of an approach to automatically analyze regulatory standards using Artificial Intelligence (AI) techniques. We present early results to identify the map** between techspecs and regulation controls, and discuss challenges that must be overcome for this solution to be fully practical.
△ Less
Submitted 22 June, 2022;
originally announced June 2022.
-
Vulnerability Prioritization: An Offensive Security Approach
Authors:
Muhammed Fatih Bulut,
Abdulhamid Adebayo,
Daby Sow,
Steve Ocepek
Abstract:
Organizations struggle to handle sheer number of vulnerabilities in their cloud environments. The de facto methodology used for prioritizing vulnerabilities is to use Common Vulnerability Scoring System (CVSS). However, CVSS has inherent limitations that makes it not ideal for prioritization. In this work, we propose a new way of prioritizing vulnerabilities. Our approach is inspired by how offens…
▽ More
Organizations struggle to handle sheer number of vulnerabilities in their cloud environments. The de facto methodology used for prioritizing vulnerabilities is to use Common Vulnerability Scoring System (CVSS). However, CVSS has inherent limitations that makes it not ideal for prioritization. In this work, we propose a new way of prioritizing vulnerabilities. Our approach is inspired by how offensive security practitioners perform penetration testing. We evaluate our approach with a real world case study for a large client, and the accuracy of machine learning to automate the process end to end.
△ Less
Submitted 22 June, 2022;
originally announced June 2022.
-
Attack Techniques and Threat Identification for Vulnerabilities
Authors:
Constantin Adam,
Muhammed Fatih Bulut,
Daby Sow,
Steven Ocepek,
Chris Bedell,
Lilian Ngweta
Abstract:
Modern organizations struggle with insurmountable number of vulnerabilities that are discovered and reported by their network and application vulnerability scanners. Therefore, prioritization and focus become critical, to spend their limited time on the highest risk vulnerabilities. In doing this, it is important for these organizations not only to understand the technical descriptions of the vuln…
▽ More
Modern organizations struggle with insurmountable number of vulnerabilities that are discovered and reported by their network and application vulnerability scanners. Therefore, prioritization and focus become critical, to spend their limited time on the highest risk vulnerabilities. In doing this, it is important for these organizations not only to understand the technical descriptions of the vulnerabilities, but also to gain insights into attackers' perspectives. In this work, we use machine learning and natural language processing techniques, as well as several publicly available data sets to provide an explainable map** of vulnerabilities to attack techniques and threat actors. This work provides new security intelligence, by predicting which attack techniques are most likely to be used to exploit a given vulnerability and which threat actors are most likely to conduct the exploitation. Lack of labeled data and different vocabularies make map** vulnerabilities to attack techniques at scale a challenging problem that cannot be addressed easily using supervised or unsupervised (similarity search) learning techniques. To solve this problem, we first map the vulnerabilities to a standard set of common weaknesses, and then common weaknesses to the attack techniques. This approach yields a Mean Reciprocal Rank (MRR) of 0.95, an accuracy comparable with those reported for state-of-the-art systems. Our solution has been deployed to IBM Security X-Force Red Vulnerability Management Services, and in production since 2021. The solution helps security practitioners to assist customers to manage and prioritize their vulnerabilities, providing them with an explainable map** of vulnerabilities to attack techniques and threat actors
△ Less
Submitted 22 June, 2022;
originally announced June 2022.
-
Technical Health Check For Cloud Service Providers
Authors:
Muhammed Fatih Bulut,
Hongtan Sun,
Pritpal Arora,
Maja Vukovic,
Klaus Koenig,
Jonathan Young
Abstract:
Understanding the overall health of an IT Infrastructure is a key part of IT Service Management. Traditional approach to perform technical health check is by visiting customer's physical site and rigorously examining the IT infrastructure with Subject Matter Experts. Alternatively, periodic surveys are sent to Technical Architects who are responsible for the managed IT infrastructure. In essence,…
▽ More
Understanding the overall health of an IT Infrastructure is a key part of IT Service Management. Traditional approach to perform technical health check is by visiting customer's physical site and rigorously examining the IT infrastructure with Subject Matter Experts. Alternatively, periodic surveys are sent to Technical Architects who are responsible for the managed IT infrastructure. In essence, both site visits and surveys suffer from reactive nature, and subjective assessment. In this paper, we present technical health check for cloud providers, that monitors, assesses operational data and depicts the current health of an IT infrastructure in real time. We also discuss challenges and opportunities of technical health check in Hybrid Cloud Environment.
△ Less
Submitted 25 June, 2019;
originally announced June 2019.
-
Energy-Efficient High-Throughput Data Transfers via Dynamic CPU Frequency and Core Scaling
Authors:
Luigi Di Tacchio,
Zulkar Nine,
Tevfik Kosar,
Fatih M. Bulut,
**ho Hwang
Abstract:
The energy footprint of global data movement has surpassed 100 terawatt hours, costing more than 20 billion US dollars to the world economy. Depending on the number of switches, routers, and hubs between the source and destination nodes, the networking infrastructure consumes 10% - 75% of the total energy during active data transfers, and the rest is consumed by the end systems. Even though there…
▽ More
The energy footprint of global data movement has surpassed 100 terawatt hours, costing more than 20 billion US dollars to the world economy. Depending on the number of switches, routers, and hubs between the source and destination nodes, the networking infrastructure consumes 10% - 75% of the total energy during active data transfers, and the rest is consumed by the end systems. Even though there has been extensive research on reducing the power consumption at the networking infrastructure, the work focusing on saving energy at the end systems has been limited to the tuning of a few application level parameters such as parallelism, pipelining, and concurrency. In this paper, we introduce three novel application-level parameter tuning algorithms which employ dynamic CPU frequency and core scaling, combining heuristics and runtime measurements to achieve energy efficient data transfers. Experimental results show that our proposed algorithms outperform the state-of-the-art solutions, achieving up to 48% reduced energy consumption and 80% higher throughput.
△ Less
Submitted 11 April, 2019;
originally announced April 2019.
-
GreenDataFlow: Minimizing the Energy Footprint of Global Data Movement
Authors:
MD S Q Zulkar Nine,
Luigi Di Tacchio,
Asif Imran,
Tevfik Kosar,
M. Fatih Bulut,
**ho Hwang
Abstract:
The global data movement over Internet has an estimated energy footprint of 100 terawatt hours per year, costing the world economy billions of dollars. The networking infrastructure together with source and destination nodes involved in the data transfer contribute to overall energy consumption. Although considerable amount of research has rendered power management techniques for the networking in…
▽ More
The global data movement over Internet has an estimated energy footprint of 100 terawatt hours per year, costing the world economy billions of dollars. The networking infrastructure together with source and destination nodes involved in the data transfer contribute to overall energy consumption. Although considerable amount of research has rendered power management techniques for the networking infrastructure, there has not been much prior work focusing on energy-aware data transfer solutions for minimizing the power consumed at the end-systems. In this paper, we introduce a novel application-layer solution based on historical analysis and real-time tuning called GreenDataFlow, which aims to achieve high data transfer throughput while kee** the energy consumption at the minimal levels. GreenDataFlow supports service level agreements (SLAs) which give the service providers and the consumers the ability to fine tune their goals and priorities in this optimization process. Our experimental results show that GreenDataFlow outperforms the closest competing state-of-the art solution in this area 50% for energy saving and 2.5x for the achieved end-to-end performance.
△ Less
Submitted 13 October, 2018;
originally announced October 2018.
-
Energy-Efficient Mobile Network I/O Optimization at the Application Layer
Authors:
Kemal Guner,
MD S Q Zulkar Nine,
Tevfik Kosar,
Fatih Bulut
Abstract:
Mobile data traffic (cellular + WiFi) will exceed PC Internet traffic by 2020. As the number of smartphone users and the amount of data transferred per smartphone grow exponentially, limited battery power is becoming an increasingly critical problem for mobile devices which depend on the network I/O. Despite the growing body of research in power management techniques for the mobile devices at the…
▽ More
Mobile data traffic (cellular + WiFi) will exceed PC Internet traffic by 2020. As the number of smartphone users and the amount of data transferred per smartphone grow exponentially, limited battery power is becoming an increasingly critical problem for mobile devices which depend on the network I/O. Despite the growing body of research in power management techniques for the mobile devices at the hardware layer as well as the lower layers of the networking stack, there has been little work focusing on saving energy at the application layer for the mobile systems during network I/O. In this paper, to the best of our knowledge, we are first to provide an in-depth analysis of the effects of application-layer data transfer protocol parameters on the energy consumption of mobile phones. We propose a novel model, called FastHLA, that can achieve significant energy savings at the application layer during mobile network I/O without sacrificing the performance. In many cases, our model achieves performance increase and energy saving simultaneously.
△ Less
Submitted 19 May, 2018;
originally announced May 2018.