Change search
Link to record
Permanent link

Direct link
BETA
Natalino, Carlos, Dr.ORCID iD iconorcid.org/0000-0001-7501-5547
Publications (10 of 19) Show all publications
Natalino, C., Idzikowski, F., Chiaraviglio, L., Wosinska, L. & Monti, P. (2019). Energy- and fatigue-aware RWA in optical backbone networks. Optical Switching and Networkning Journal, 31, 193-201
Open this publication in new window or tab >>Energy- and fatigue-aware RWA in optical backbone networks
Show others...
2019 (English)In: Optical Switching and Networkning Journal, ISSN 1573-4277, E-ISSN 1872-9770, Vol. 31, p. 193-201Article in journal (Refereed) Published
Abstract [en]

Connection provisioning in Wavelength Division Multiplexing (WDM) networks needs to account for a number of crucial parameters. On the one hand, operators need to ensure the connection availability requirements defined in Service Level Agreements (SLAs). This is addressed by selecting an appropriate amount of backup resources and recovery strategies for the connections over which services are provisioned. Services requiring less strict availability requirements can be routed over unprotected lightpaths. Services with more strict availability requirements are provisioned over protected lightpaths in order to cope with possible failures in the network. Another important aspect to consider during the provisioning process is energy efficiency. Green strategies leverage on setting network devices in Sleep Mode (SM) or Active Mode (AM) depending on whether or not they are needed to accommodate traffic. However, frequent power state changes introduce thermal fatigue which in turn has a negative effect on the device lifetime. Finally, in multi-period traffic scenarios, it is also important to minimize the number of reconfigurations of lightpaths already established in the network in order to avoid possible traffic disruptions at higher layers. The work presented in this paper tackles the connection provisioning paradigm in an optical backbone network with a multi-period traffic scenario. More specifically the paper looks into the interplay among (i) energy efficiency, (ii) thermal fatigue, and (iii) lightpath reconfiguration aspects. To this end, the Energy and Fatigue Aware Heuristic with Unnecessary Reconfiguration Avoidance (EFAH-URA) is introduced, showing that it is possible to balance the three aspects mentioned above in an efficient way. When compared to the pure energy-aware strategies, EFAH-URA significantly improves the average connection availability for both unprotected and protected connections. On the other hand, it is done at the expense of reduced energy saving.

Place, publisher, year, edition, pages
ELSEVIER SCIENCE BV, 2019
Keywords
Acceleration factor, Connection availability, Device lifetime, Green provisioning, Lightpath reconfiguration, Optical backbone network operation, Thermal fatigue
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-241188 (URN)10.1016/j.osn.2018.10.007 (DOI)000454380100016 ()2-s2.0-85056257635 (Scopus ID)
Note

QC 20190121

Available from: 2019-01-21 Created: 2019-01-21 Last updated: 2019-01-21Bibliographically approved
Furdek, M., Natalino, C., Schiano, M. & Di Giglio, A. (2019). Experiment-based detection of service disruption attacks in optical networks using data analytics and unsupervised learning. In: Srivastava, AK Glick, M Akasaka, Y (Ed.), METRO AND DATA CENTER OPTICAL NETWORKS AND SHORT-REACH LINKS II: . Paper presented at Conference on Metro and Data Center Optical Networks and Short-Reach Links II, FEB 05-06, 2019, San Francisco, CA. SPIE-INT SOC OPTICAL ENGINEERING, Article ID 109460D.
Open this publication in new window or tab >>Experiment-based detection of service disruption attacks in optical networks using data analytics and unsupervised learning
2019 (English)In: METRO AND DATA CENTER OPTICAL NETWORKS AND SHORT-REACH LINKS II / [ed] Srivastava, AK Glick, M Akasaka, Y, SPIE-INT SOC OPTICAL ENGINEERING , 2019, article id 109460DConference paper, Published paper (Refereed)
Abstract [en]

The paper addresses the detection of malicious attacks targeting service disruption at the optical layer as a key prerequisite for fast and effective attack response and network recovery. We experimentally demonstrate the effects of signal insertion attacks with varying intensity in a real-life scenario. By applying data analytics tools, we analyze the properties of the obtained dataset to determine how the relationships among different optical performance monitoring (OPM) parameters of the signal change in the presence of an attack as opposed to the normal operating conditions. In addition, we evaluate the performance of an unsupervised learning technique, i.e., a clustering algorithm for anomaly detection, which can detect attacks as anomalies without prior knowledge of the attacks. We demonstrate the potential and the challenges of unsupervised learning for attack detection, propose guidelines for attack signature identification needed for the detection of the considered attack methods, and discuss remaining challenges related to optical network security.

Place, publisher, year, edition, pages
SPIE-INT SOC OPTICAL ENGINEERING, 2019
Series
Proceedings of SPIE, ISSN 0277-786X ; 10946
Keywords
Optical network security, dataset exploration, data analytics, unsupervised learning, anomaly detection
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-259466 (URN)10.1117/12.2509613 (DOI)000483011800010 ()2-s2.0-85068262171 (Scopus ID)978-1-5106-2535-8 (ISBN)
Conference
Conference on Metro and Data Center Optical Networks and Short-Reach Links II, FEB 05-06, 2019, San Francisco, CA
Note

QC 20190920

Available from: 2019-09-20 Created: 2019-09-20 Last updated: 2019-09-20Bibliographically approved
Natalino, C., Yayimli, A., Wosinska, L. & Furdek, M. (2019). Infrastructure upgrade framework for Content Delivery Networks robust to targeted attacks. Optical Switching and Networkning Journal, 31, 202-210
Open this publication in new window or tab >>Infrastructure upgrade framework for Content Delivery Networks robust to targeted attacks
2019 (English)In: Optical Switching and Networkning Journal, ISSN 1573-4277, E-ISSN 1872-9770, Vol. 31, p. 202-210Article in journal (Refereed) Published
Abstract [en]

Content Delivery Networks (CDNs) are crucial for enabling delivery of services that require high capacity and low latency, primarily through geographically-diverse content replication. Optical networks are the only available future-proof technology that meets the reach and capacity requirements of CDNs. However, the underlying physical network infrastructure is vulnerable to various security threats, and the increasing importance of CDNs in supporting vital services intensifies the concerns related to their robustness. Malicious attackers can target critical network elements, thus severely degrading network connectivity and causing large-scale service disruptions. One way in which network operators and cloud computing providers can increase the robustness against malicious attacks is by changing the topological properties of the network through infrastructure upgrades. This work proposes a framework for CDN infrastructure upgrade that performs sparse link and replica addition with the objective of maximizing the content accessibility under targeted link cut attacks. The framework is based on a newly defined content accessibility metric denoted as mu-ACA which allows the network operator to gauge the CDN robustness over a range of attacks with varying intensity. Two heuristics, namely Content-Accessibility Aware Link Addition Heuristic (CAA-LAH), and Content-Accessibility-Aware Replica Addition Heuristic (CAA-RAH) are developed to perform strategic link and replica placement, respectively, and hamper attackers from disconnecting users from the content even in severe attack scenarios. Extensive experiments on real-world reference network topologies show that the proposed framework effectively increases the CDN robustness by adding a few links or replicas to the network.

Place, publisher, year, edition, pages
ELSEVIER SCIENCE BV, 2019
Keywords
Content delivery networks, Content replica addition, Infrastructure upgrade, Link addition, Network robustness, Optical networks, Targeted attacks
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-241189 (URN)10.1016/j.osn.2018.10.006 (DOI)000454380100017 ()2-s2.0-85056237720 (Scopus ID)
Note

QC 20190121

Available from: 2019-01-21 Created: 2019-01-21 Last updated: 2019-01-21Bibliographically approved
Natalino, C., Coelho, F., Lacerda, G., Braga, A., Wosinska, L. & Monti, P. (2018). A Proactive Restoration Strategy for Optical Cloud Networks Based on Failure Predictions. In: Jaworski, M Marciniak, M (Ed.), 20th International Conference on Transparent Optical Networks, ICTON 2018: . Paper presented at 20th International Conference on Transparent Optical Networks (ICTON), JUL 01-05, 2018, Univ Politehnica Bucharest, Cent Lib, Bucharest, ROMANIA. Institute of Electrical and Electronics Engineers (IEEE), Article ID 8473938.
Open this publication in new window or tab >>A Proactive Restoration Strategy for Optical Cloud Networks Based on Failure Predictions
Show others...
2018 (English)In: 20th International Conference on Transparent Optical Networks, ICTON 2018 / [ed] Jaworski, M Marciniak, M, Institute of Electrical and Electronics Engineers (IEEE), 2018, article id 8473938Conference paper, Published paper (Refereed)
Abstract [en]

Failure prediction based on the anomaly detection/forecasting is becoming a reality thanks to the introduction of machine learning techniques. The orchestration layer can leverage on this new feature to proactively reconfigure cloud services that might find themselves traversing an element that is about to fail. As a result, the number of cloud service interruptions can be reduced with beneficial effects in terms of cloud service availability. Based on the above intuition, this paper presents an orchestration strategy for optical cloud networks able to reconfigure vulnerable cloud services (i.e., the ones that would be disrupted if a predicted failure happens) before an actual failure takes place. Simulation results demonstrate that, with a single link failure scenario, proactive restoration can lead to up to 97% less cloud services having to be relocated. This result brings considerable benefits in terms of cloud service availability, especially in low load conditions. It is also shown that these improvements come with almost no increase in the cloud service blocking probability performance,i.e., resource efficiency is not impacted.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2018
Series
International Conference on Transparent Optical Networks-ICTON, ISSN 2162-7339
Keywords
Proactive recovery, Failure prediction, Resiliency, Cloud services, Availability, Restoration, Software defined networking (SDN), Orchestration, Cloud service relocation
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-249911 (URN)10.1109/ICTON.2018.8473938 (DOI)000462559300315 ()2-s2.0-85055475932 (Scopus ID)978-1-5386-6605-0 (ISBN)
Conference
20th International Conference on Transparent Optical Networks (ICTON), JUL 01-05, 2018, Univ Politehnica Bucharest, Cent Lib, Bucharest, ROMANIA
Note

QC 20190502

Available from: 2019-05-02 Created: 2019-05-02 Last updated: 2019-05-02Bibliographically approved
Raza, M. R., Natalino, C., Öhlen, P., Wosinska, L. & Monti, P. (2018). A Slice Admission Policy Based on Reinforcement Learning for a 5G Flexible RAN. In: : . Paper presented at 44th European Conference and Exhibition on Optical Communication (ECOC).
Open this publication in new window or tab >>A Slice Admission Policy Based on Reinforcement Learning for a 5G Flexible RAN
Show others...
2018 (English)Conference paper, Published paper (Refereed)
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-235258 (URN)
Conference
44th European Conference and Exhibition on Optical Communication (ECOC)
Note

QC 20180920

Available from: 2018-09-19 Created: 2018-09-19 Last updated: 2018-10-19Bibliographically approved
Araujo, I. M., Natalino, C., Santana, A. L. & Cardoso, D. L. (2018). Accelerating VNF-based Deep Packet Inspection with the use of GPUs. In: Jaworski, M Marciniak, M (Ed.), 2018 20TH ANNIVERSARY INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON): . Paper presented at 20th International Conference on Transparent Optical Networks (ICTON), JUL 01-05, 2018, Univ Politehnica Bucharest, Cent Lib, Bucharest, ROMANIA. Institute of Electrical and Electronics Engineers (IEEE), Article ID 8473638.
Open this publication in new window or tab >>Accelerating VNF-based Deep Packet Inspection with the use of GPUs
2018 (English)In: 2018 20TH ANNIVERSARY INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON) / [ed] Jaworski, M Marciniak, M, Institute of Electrical and Electronics Engineers (IEEE), 2018, article id 8473638Conference paper, Published paper (Refereed)
Abstract [en]

Network Function Virtualization (NFV) replaces the hardware that supports packet processing in network operation from specific-by general-purpose ones, reducing costs and bringing more flexibility and agility to the network operation. However, this shift can cause performance losses due to the non-optimal packet processing capabilities of the general-purpose hardware. Moreover, supporting the line rate of optical network channels with Virtualized Network Functions (VNFs) is a challenging task. This work analyzes the benefits of using Graphics Processing Units (GPUs) to support the execution of a Deep Packet Inspection (DPI) VNF towards supporting the line rate of an optical channel. The use of GPUs in VNFs has a great potential to increase throughput, but the delay incurred might be an issue for some functions. Our simulation was performed using an Intrusion Detection Systems (IDS) which performs DPI deployed as a VNF under real-world traffic scaled to high bit rates. Results show that the packet processing speedup achieved by using GPUs can reach up to 19 times, at the expense of a higher packet delay.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2018
Series
International Conference on Transparent Optical Networks-ICTON, ISSN 2162-7339
Keywords
Network Function Virtualization, Deep Packet Inspection, Graphics Processing Unit, Intrusion Detection System
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-249909 (URN)10.1109/ICTON.2018.8473638 (DOI)000462559300062 ()2-s2.0-85055558488 (Scopus ID)978-1-5386-6605-0 (ISBN)
Conference
20th International Conference on Transparent Optical Networks (ICTON), JUL 01-05, 2018, Univ Politehnica Bucharest, Cent Lib, Bucharest, ROMANIA
Note

QC 20190502

Available from: 2019-05-02 Created: 2019-05-02 Last updated: 2019-05-02Bibliographically approved
Dobrijevic, O., Natalino, C., Furdek, M., Hodzic, H., Dzanko, M. & Wosinska, L. (2018). Another price to pay: An availability analysis for SDN virtualization with network hypervisors. In: Proceedings of 2018 10th International Workshop on Resilient Networks Design and Modeling, RNDM 2018: . Paper presented at 10th International Workshop on Resilient Networks Design and Modeling, RNDM 2018, 27 August 2018 through 29 August 2018. Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Another price to pay: An availability analysis for SDN virtualization with network hypervisors
Show others...
2018 (English)In: Proceedings of 2018 10th International Workshop on Resilient Networks Design and Modeling, RNDM 2018, Institute of Electrical and Electronics Engineers Inc. , 2018Conference paper, Published paper (Refereed)
Abstract [en]

Communication networks are embracing the software defined networking (SDN) paradigm. Its architectural shift assumes that a remote SDN controller (SDNC) in the control plane is responsible for configuring the underlying devices of the forwarding plane. In order to support flexibility-motivated network slicing, SDN-based networks employ another entity in the control plane, a network hypervisor (NH). This paper first discusses different protection strategies for the control plane with NHs and presents the corresponding availability models, which assume possible failures of links and nodes in the forwarding plane and the control plane. An analysis of these protection alternatives is then performed so as to compare average control plane availability, average path length for the control communication that traverses NH, and infrastructure resources required to support them. Our results confirm the intuition that the NH introduction generally results in a reduction of the control plane availability, which stresses the need for appropriate protection. However, the availability achieved by each of the considered strategies is impacted differently by the node availability and the link failure probability, thus calling for a careful selection that is based on the infrastructure features.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2018
Keywords
availability analysis, network hypervisor, reliability, SDN controller, Software defined networking (SDN), Availability, Reliability analysis, Software defined networking, Software reliability, Virtualization, Availability models, Control communications, Hypervisor, Infrastructure resources, Link-failure probabilities, Sdn controllers, Controllers
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-247140 (URN)10.1109/RNDM.2018.8489784 (DOI)2-s2.0-85056653439 (Scopus ID)9781538670309 (ISBN)
Conference
10th International Workshop on Resilient Networks Design and Modeling, RNDM 2018, 27 August 2018 through 29 August 2018
Note

QC 20190403

Available from: 2019-04-03 Created: 2019-04-03 Last updated: 2019-04-03Bibliographically approved
Zhu, J., Natalino, C., Wosinska, L., Furdek, M. & Zhu, Z. (2018). Control Plane Robustness in Software-Defined Optical Networks under Targeted Fiber Cuts. In: Ruffini, M Tzanakaki, A Casellas, R Autenrieth, A MarquezBarja, JM (Ed.), 22ND INTERNATIONAL CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELING (ONDM 2018): . Paper presented at 22ND INTERNATIONAL CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELING (ONDM 2018) (pp. 118-123). IEEE
Open this publication in new window or tab >>Control Plane Robustness in Software-Defined Optical Networks under Targeted Fiber Cuts
Show others...
2018 (English)In: 22ND INTERNATIONAL CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELING (ONDM 2018) / [ed] Ruffini, M Tzanakaki, A Casellas, R Autenrieth, A MarquezBarja, JM, IEEE , 2018, p. 118-123Conference paper, Published paper (Refereed)
Abstract [en]

The Software-Defined Optical Networking (SDON) paradigm enables programmable, adaptive and application-aware backbone networks. However, aside from the manifold advantages, the centralized Network Control and Management in SDONs also gives rise to a number of security concerns at different network layers. As communication between the control and the data plane devices in an SDON utilizes the common optical fiber infrastructure, it can be subject to various targeted attacks aimed at disabling the underlying optical network infrastructure and disrupting the services running in the network. In this work, we focus on the threats from targeted fiber cuts to the control plane (CP) robustness in an SDON under different link cut attack scenarios with diverse damaging potential, modeled through a newly defined link criticality measure based on the routing of control paths. To quantify the robustness of a particular CP realization, we propose a metric called Average Control Plane Connectivity (ACPC) and analyze the CP robustness for a varying number of controller instances in master/slave configuration. Simulation results indicate that CP enhancements in terms of controller addition do not necessarily yield linear improvements in CP robustness but require tailored CP design strategies.

Place, publisher, year, edition, pages
IEEE, 2018
Keywords
Control plane robustness, Physical-layer security, Software-defined optical networks, Targeted fiber cuts
National Category
Physical Sciences
Identifiers
urn:nbn:se:kth:diva-252684 (URN)000465419800016 ()
Conference
22ND INTERNATIONAL CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELING (ONDM 2018)
Note

QC 20190603

Available from: 2019-06-03 Created: 2019-06-03 Last updated: 2019-06-03Bibliographically approved
Raza, M. R., Natalino, C., Vidal, A., Santos, M., Öhlen, P., Wosinska, L. & Monti, P. (2018). Demonstration of Resource Orchestration Using Big Data Analytics for Dynamic Slicing in 5G Networks. In: : . Paper presented at 44th European Conference and Exhibition on Optical Communication (ECOC).
Open this publication in new window or tab >>Demonstration of Resource Orchestration Using Big Data Analytics for Dynamic Slicing in 5G Networks
Show others...
2018 (English)Conference paper, Published paper (Refereed)
Abstract [en]

We present a proof-of-concept demonstration of an SDN/NFV-based orchestrator for sharing infrastructure resources among different tenants. The designed orchestrator maximizes the profit of an infrastructure provider by using a dynamic slicing approach based on big data analytics.

National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-231958 (URN)10.1109/ECOC.2018.8535466 (DOI)2-s2.0-85063225079 (Scopus ID)
Conference
44th European Conference and Exhibition on Optical Communication (ECOC)
Note

QC 20180808

Available from: 2018-07-05 Created: 2018-07-05 Last updated: 2019-10-29Bibliographically approved
Natalino, C., Schiano, M., Di Giglio, A., Wosinska, L. & Furdek, M. (2018). Field Demonstration of Machine-Learning-Aided Detection and Identification of Jamming Attacks in Optical Networks. In: European Conference on Optical Communication, ECOC: . Paper presented at 2018 European Conference on Optical Communication, ECOC 2018, 23 September 2018 through 27 September 2018. Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>Field Demonstration of Machine-Learning-Aided Detection and Identification of Jamming Attacks in Optical Networks
Show others...
2018 (English)In: European Conference on Optical Communication, ECOC, Institute of Electrical and Electronics Engineers Inc. , 2018Conference paper, Published paper (Refereed)
Abstract [en]

We develop a machine-learning-aided framework for detection and identification of optical network jamming signal attacks of varying intensities. Trained with data gathered in our field-deployed experimental setup, the approach achieves 93% accuracy on average over the considered attack scenarios.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2018
Keywords
Fiber optic networks, Jamming, Machine learning, Attack scenarios, Detection and identifications, Jamming attacks, Jamming signals, Optical communication
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-252253 (URN)10.1109/ECOC.2018.8535155 (DOI)2-s2.0-85063210375 (Scopus ID)9781538648629 (ISBN)
Conference
2018 European Conference on Optical Communication, ECOC 2018, 23 September 2018 through 27 September 2018
Note

QC20190614

Available from: 2019-06-14 Created: 2019-06-14 Last updated: 2019-06-14Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-7501-5547

Search in DiVA

Show all publications