The 46th IEEE Conference on Local Computer Networks (LCN), October 4-7, 2021, to be held virtually

The 46th IEEE Conference on Local Computer Networks (LCN), October 4-7, 2021, virtually hosted in Edmonton, Canada

Demonstrations


Accepted Demos


Demo 1: Analysis and Classification of Cyberattack Traffic using the SecGrid Platform
Authors: Jan von der Assen, Muriel F. Franco, Bruno Rodrigues, and Burkhard Stiller (University of Zürich, Switzerland)

Abstract: Distributed Denial-of-Service (DDoS) attacks remain a notorious threat to businesses and governments. As defense mechanisms and investments therein were extended, the dynamics of attacks have adapted accordingly. Not only have attacks gained in frequency and size, but the underlying attack vectors have also evolved. Thus, there is a need for capable tooling that allows researchers, operators, and decision-makers to obtain insights into the behavioral aspects of attacks and their impacts. Such tooling needs to be able to keep up with the dynamic nature and with strong scalability requirements. In this demonstration, the SecGrid platform is introduced to facilitate traffic analysis and visualization of volumetric data. Using the SecGrid’s engine, a range of applications from behavioral visualization, impact estimation, or ML-based attack classification are enabled.

Demo 2: Demo of Slips, a Free-Software IPS with Behavioral Machine Learning Detection
Authors: Kamila Babayeva, Sebastian Garcia, Alya Gomaa, and Ondrej Lukas (Czech Technical University in Prague, Czech Republic)

Abstract: Slips is a behavioral-based Python IDS, and the first free software that uses machine learning to detect malicious behaviour in the network traffic of the devices. It creates behavioral profiles of IP addresses seen in the network traffic and performs detection on the profiles in time windows. Its modular architecture allows for combination of traditional approaches such as threat intelligence and rule-based detections with advanced machine learning methods. Therefore, Slips is able to detect various types of attacks and visualize the detections using GUI Kalipso. In this demo, we demonstrate the usage of Slips on the network traffic of a real Android Remote Access Trojan attack, and show how it can be used for analysing the traffic of such advanced threats.

Demo 3: Science Federation Emulation Testbed: Demonstration of VFSIE Functionalities
Authors: Anees Al-Najjar, Nageswara Rao, Neena Imam, Seth Hitefield, and Thomas Naughton (Oak Ridge National Laboratory, USA)

Abstract: The Virtual Federated Science Instrument Environment (VFSIE) is a digital twin of a federated infrastructure of multiple sites with science instruments and computing systems that are geographically dispersed. It emulates the federation using containers and virtual hosts (vhosts) connected over local and wide-area networks for the main purpose of supporting the development and testing of science workflows and software stacks, which will subsequently transition to the physical infrastructure. In this demo, we present VFSIE of a four sites scenario and illustrate the following use cases: (i) execution of federation stack components that expose resources to enable a science user to execute workflows, (ii) execution of remote control commands of beam-line instruments to collect measurements and position the sensor, and (iii) remote execution and access of Jupyter Notebook for tomographic image computations.

Demo 4: A Demo of Workload Offloading in Mobile Edge Computing Using the Reliable Server Pooling Framework
Authors: Thomas Dreibholz (Simula Metropolitan Centre for Digital Engineering, Norway); Somnath Mazumdar (Copenhagen Business School, Denmark)

Abstract: Mobile Edge Computing (MEC) places cloud resources nearby the user, to provide support for latency-sensitive applications. Offloading workload from resource-constrained mobile devices (such as smartphones) into the cloud ecosystem is becoming increasingly popular. In this demonstration, we show how to deploy a mobile network with OpenAirInterface and Open Source MANO. We also demonstrate how to adapt the Reliable Server Pooling (RSerPool) framework to efficiently manage MEC as well as multi-cloud resources.

Demo 5: Privacy-Preserving Social Distancing Bracelet
Authors: Asaad AlGhamdi and Louai Al-Awami (King Fahd University of Petroleum and Minerals, Saudi Arabia)

Abstract: This demo presents a functional Proof-of-Concept prototype of a smart bracelet that utilizes IoT and ML to help in the effort to contain pandemics such as COVID-19. The designed smart bracelet aids people to navigate life safely by monitoring health signs; and detecting and alerting people when they violate social distancing regulations. In addition, the bracelet communicates with similar bracelets to keep track of recent contacts. Using RFID technology, the bracelet helps in automating access control to premises such as workplaces. All this is achieved while preserving the privacy of the users.

Demo 6: On Combining Reinforcement Learning and Monte Carlo for Dynamic Virtual Network Embedding
Authors: Ghina Dandachi (Inria, France); Yassine Hadjadj-Aoul (University of Rennes 1, France); Abdelkader Outtagarts (Nokia Bell Labs France, France)

Abstract: Network slicing is one of the key building blocks in the evolution towards "zero touch networks." Indeed, this will allow 5G and beyond 5G networks to deploy services dynamically, on the same substrate network, regardless of their constraints. In this demo, we introduced a platform for dynamic virtual network embedding, a problem class known to be NP-hard. The proposed solution is based on a combination of a deep reinforcement learning strategy and a Monte Carlo (MC) approach. The idea here is to learn to generate, using a Deep Q-Network (DQN), a distribution of the placement solution, on which a MC-based search technique is applied. This makes the agent's exploration of the solution space more efficient.

Demo 7: IDN-NetConfig: A Flexible Extension of the IDN-Hello Protocol (ILDA Digital Network) to Control Application Specific Parameters
Authors: Matthias Frank (University of Bonn, Germany)

Abstract: The ILDA Digital Network (IDN) is a novel protocol family providing digital data transmission for laser projection. While the new standards at first glance aim to replace the old analogue signal transmission, the digital streaming concept also enables completely new applications and flexible networked scenarios. The IDN-Hello protocol is the basic protocol for exchange of information between IDN enabled devices. It also includes procedures for IDN device and service discovery as well as exchange of laser specific parameters. Our paper presents an extension to IDN-Hello to allow for a configuration of application specific parameters via the local network, our so-called "IDN-NetConfig". The virtual demo will showcase IDN-NetConfig with two applications for laser show data visualization.

Demo 8: When a BRAT Fools Your Bridge: A Cyber Security Test Environment for Integrated Bridge Systems
Authors: Merlin von Rechenberg (Fraunhofer FKIE, Germany); Mari Schmidt (Fraunhofer FKIE & University of Bonn, Germany); Christian Hemminghaus, Jan Bauer and Elmar Padilla (Fraunhofer FKIE, Germany)

Abstract: Despite the increase of cyber threats in the maritime domain, there is a serious lack of adequate security testing in maritime systems engineering. To address this gap, we present a holistic, simulative testing environment to instrument cyber attacks and devices for automated testing on soft- and hardware level, which can be integrated already in the development phase. Our environment consists of a network attack tool targeting bridge systems of seagoing vessels as well as various security components allowing to evaluate the impact of an attack and to develop effective countermeasures to protect maritime systems. In our demonstration, we will exemplarily showcase prominent cyber attacks against safe navigation, introduce possible security means, and discuss potential use cases.

Demo 9: Demo: Outsourcing Secure MPC to Untrusted Cloud Environments with Correctness Verification
Authors: Oscar Bautista (Florida International University, USA)

Abstract: Advances in Secure Multiparty Computation (MPC) is increasingly making this technology more attractive to solve problems on applications involving privacy-preserving computation. Considering the plethora of MPC protocols, some perform under a malicious security with dishonest majority attack model such as SPDZ, which also includes an important feature that enables the MPC nodes to verify the correctness of the computation. Despite those advances, in most cases, they consider that the computation nodes also supply the input data, which is not a realistic assumption for many practical use cases. In this demo, we show how our approach tackles the MPC outsourcing problem under malicious security with dishonest majority, while providing all the previous guarantees, namely, the verification of the correctness of the computation in addition to confidentiality of the inputs and outputs.

Demo 10: End-To-End Network Slicing Testbed with the COMETS Platform
Authors: Youssouf Drif (IRT Saint Exupéry / Institut de Recherche en Informatique de Toulouse, France); Emmanuel Lavinal (University of Toulouse & IRIT, France); Emmanuel Chaput (Irit-Enseeiht, France); Pascal Berthou (CNRS/LAAS - Université de Toulouse, France); Boris Tiomela Jou (Airbus Defence and Space, France); Olivier Gremillet and Fabrice Arnal (IRT Saint Exupéry, France)

Abstract: The integration of Non Terrestrial Networks in 5G networks is the result of many recent research results. This has led us to actively work on a deeper satellite backhaul integration based on network slicing. To evaluate the relevance of our work, we have developed a flexible container-based network slicing platform (COMETS) which is able to execute custom scenarios and evaluate their performances. In this demonstration, we present an end-to-end network slicing scenario where we deploy multiple 5G slices with a satellite network integrated as a slice-aware backhaul link. We focus on the respect of end-to-end slice Key Performance Indicators and Quality of Service within each slice. In the COMETS platform we have integrated multiple existing simulation tools, extended the functionalities of the 5G Core Network and developed our own tools which fully automate the deployment, execution and performance evaluation of the slices specified in the scenario's description.

Demo 11: Demonstration of Orchestration of 5G Core Network Functions with a Satellite Emulator
Authors: Ayoub Bergaoui (IRT Saint Exupéry, France); Youssouf Drif (IRT Saint Exupéry / Institut de Recherche en Informatique de Toulouse, France); Tanissia Djemai (IRT Saint Exupéry, France); Olivier Gremillet and Ahmad Al Sheikh (IRT Saint Exupéry, France); Pascal Berthou (CNRS/LAAS - Université de Toulouse, France)

Abstract: In this demonstration, we focus on the orchestration of Network Functions (NF) following the Network Function Virtualization (NFV) paradigm. The deployed NFs are 1) 5G core network, 2) User Equipment (UE) and Radio Access Network (RAN) simulator, and 3) Satellite Emulator. This orchestration combines different types of NFs. We will show how we can orchestrate 5G Core networks as a Kubernetes Network Function and Satellite network elements that can be seen as Virtual or Physical NFs. The aspects linked to the NF auto-scaling will also be demonstrated with a focus on container services. This work was performed in a research project dealing with the integration of satellite backhaul links in 5G networks. This particular context is exposed and also the intended scenarios. The demonstration platform hosting the services to be deployed is also described: architecture, components and infrastructure.


Demo Board

Demonstration chair: Kanchana Thilakarathna, University of Sydney, Australia

Demonstration Board members to be announced.