Please note: We are currently experiencing some performance issues across the site, and some pages may be slow to load. We are working on restoring normal service soon. Importing new articles from Word documents is also currently unavailable. We apologize for any inconvenience.

Federico Tonini

and 5 more

Online service provisioning involves two main entities, i.e., cloud providers renting cloud resources to service providers. In this process, the service provider would like to minimize its costs, while the cloud providers seek ways to increase their profit. Novel container orchestration platforms like Kubernetes allow deploying services on the same physical or virtual (e.g., virtual machines) infrastructure while delivering both hard and soft resource isolation. When the soft resource isolation is allowed, guaranteed (or request) resources of one service can be used (if idle) by another one as limit resources, for short time intervals in a best-effort manner. The use of limit resources represents an extra font of revenue for the cloud provider to charge different service providers for the same resources. At the same time, soft isolation allows service providers to decrease the number of request resources and rely on more limit resources, paid only when accessed, reducing the overall resources needed. Therefore, soft resource isolation has potential benefits for both cloud and service providers. To enable these benefits, the price of limit resources should be carefully set by the cloud provider to generate, on one hand, extra profits and, on the other, be appealing to service providers. This paper proposes a framework for evaluating the pricing window for the limit resources under which it is possible to reduce the cost for service providers and increase the profits of cloud providers. Results in a sample simulated scenario show that by pricing limit resources within six to twelve times the request resources, cloud and service providers can achieve financial gains in the order of 10%-20%.

Carlos Natalino

and 3 more

The ongoing evolution of optical networks towards autonomous systems supporting high-performance services beyond 5G requires advanced functionalities for automated security management. To cope with evolving threat landscape, security diagnostic approaches should be able to detect and identify the nature not only of existing attack techniques, but also those hitherto unknown or insufficiently represented. Machine Learning (ML)-based algorithms perform well when identifying known attack types, but cannot guarantee precise identification of unknown attacks. This makes Root Cause Analysis (RCA) crucial for enabling timely attack response when human intervention is unavoidable. We address these challenges by establishing an ML-based framework for security assessment and analyzing RCA alternatives for physical-layer attacks. We first scrutinize different Network Management System (NMS) architectures and the corresponding security assessment capabilities. We then investigate the applicability of supervised and unsupervised learning (SL and UL) approaches for RCA and propose a novel UL-based RCA algorithm called Distance-Based Root Cause Analysis (DB-RCA). The framework’s applicability and performance for autonomous optical network security management is validated on an experimental physical-layer security dataset, assessing the benefits and drawbacks of the SL- and UL-based RCA. Besides confirming that SL-based approaches can provide precise RCA output for known attack types upon training, we show that the proposed UL-based RCA approach offers meaningful insight into the anomalies caused by novel attack types, thus supporting the human security officers in advancing the physical-layer security diagnostics.