BenchFaaS: Benchmarking Serverless Functions in an Edge Computing Network Testbed

  • Carpio, F., Michalke, M., & Jukan, A. (2022). Benchfaas: Benchmarking serverless functions in an edge computing network testbed. IEEE Network.
The serverless computing model has evolved as one of the key solutions in the cloud for fast autoscaling and capacity planning. In edge computing environments, however, the serverless model is challenged by the system heterogeneity and performance variability. In this paper, we introduce BenchFaaS, an open-source edge computing network testbed which automates the deployment and benchmarking of serverless functions.

Benchmarking Various ML Solutions in Complex Intent-Based Network Management Systems

  • Bensalem, M., Dizdarević, J., & Jukan, A. (2022, May). Benchmarking various ML solutions in complex intent-based network management systems.
  • In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO) (pp. 476-481). IEEE.
Intent-based networking (IBN) solutions to managing complex ICT systems have become one of the key enablers of intelligent and autonomous network management. As the number of machine learning (ML) techniques deployed in IBN increases, it becomes increasingly important to understand their expected performance.

Link Layer Connectivity as a Service for Ad-Hoc Microservice Platforms

  • Gonzalez, L. F., Vidal, I., Valera, F., & Lopez, D. R. (2022). Link Layer Connectivity as a Service for Ad-Hoc Microservice Platforms. IEEE Network, 36(1), 10-17.
Microservice platforms have brought many advantages to support the deployment of light-weight applications at both near the edge and data centers. Still, their suitability to support telecommunication and vertical services beyond the network edge is far from being a reality. On one hand, their flat networking approach does not support the establishment of link-layer connectivity among the different components of telecommunication and vertical services (e.g., access points, routers, specific-purpose servers, etc.) due to their reliance on high-level APIs.

A Secure Link-Layer Connectivity Platform for Multi-Site NFV Services

  • Vidal, I., Nogales, B., Lopez, D., Rodríguez, J., Valera, F., & Azcorra, A. (2021). A secure link-layer connectivity platform for multi-site NFV services. Electronics, 10(15), 1868.
Network Functions Virtualization (NFV) is a key technology for network automation and has been instrumental to materialize the disruptive view of 5G and beyond mobile networks. In particular, 5G embraces NFV to support the automated and agile provision of telecommunication and vertical services as a composition of versatile virtualized components, referred to as Virtual Network Functions (VNFs). It provides a high degree of flexibility in placing these components on distributed NFV infrastructures (e.g., at the network edge, close to end users).

Continuous Industrial Sector Cybersecurity Assessment Paradigm* : Proposed Model of Cybersecurity Certification

  • da Silva Oliveira, A., & Santos, H. (2022, March). Continuous Industrial Sector Cybersecurity Assessment Paradigm: Proposed Model of Cybersecurity Certification.
  • In 2022 18th International Conference on the Design of Reliable Communication Networks (DRCN) (pp. 1-6). IEEE.
The fourth industrial revolution is led by the most recent ICT developments and is associated with a substantial investment directed towards the development of smart manufacturing systems. The Industry 4.0 paradigm is characterized by a modular structure of smart factories, where CPS monitors the physical processes and develops a virtual copy of the physical world to test and make decisions.

A Machine Learning IDS for Known and Unknown Anomalies

  • Aguiló–Gost, F., Simó–Mezquita, E., Marín–Tordera, E., & Hussain, A. (2022, March). A Machine Learning IDS for Known and Unknown Anomalies.
  • In 2022 18th International Conference on the Design of Reliable Communication Networks (DRCN) (pp. 1-5). IEEE.
In this work an Intrusion Detection System to detect anomalies in networks system entries is presented. It is based on Machine Learning models and is composed of two components. The first component detects known anomalies with an accuracy beyond 95%. This component uses supervised models and several algorithms can be applied. In the use case analysed here, the best algorithm that fits the model is Random Forests. The second component detects unknown anomalies and benign entries and it is based on unsupervised models.

Engineering and Experimentally Benchmarking a Serverless Edge Computing System

  • Carpio, F., Michalke, M., & Jukan, A. (2021, December). Engineering and experimentally benchmarking a serverless edge computing system. In 2021 IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). IEEE.
Thanks to the latest advances in containerization, the serverless edge computing model is becoming close to reality. Serverless at the edge is expected to enable low latency applications with fast autoscaling mechanisms, all running on heterogeneous and resource-constrained devices. In this work, we engineer and experimentally benchmark a serverless edge computing system architecture.

A Combinatorial Reliability Analysis of Generic Service Function Chains in Data Center Networks

  • Engelmann, A., & Jukan, A. (2021). A combinatorial reliability analysis of generic service function chains in data center networks. ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 6(3), 1-24.
In data center networks, the reliability of Service Function Chain (SFC)—an end-to-end service presented by a chain of virtual network functions (VNFs)—is a complex and specific function of placement, configuration, and application requirements, both in hardware and software. Existing approaches to reliability analysis do not jointly consider multiple features of system components, including, (i) heterogeneity, (ii) disjointness, (iii) sharing, (iv) redundancy, and (v) failure interdependency.

Information Security Assessment and Certification within Supply Chains

  • Santos, H., Oliveira, A., Soares, L., Satis, A., & Santos, A. (2021, August). Information Security Assessment and Certification within Supply Chains. In Proceedings of the 16th International Conference on Availability, Reliability and Security (pp. 1-6).
Cybersecurity threats have been on the rise lately, along with the digital revolution. In the industrial area and the supply chains, the disruptions that have already occurred require the search for solutions that minimize the impact of those threats without hampering the digital transformation, equally and globally recognized as bringing enormous benefits. At the heart of the solutions is the ability to manage information security conveniently. To this end, it is essential to put a safety assessment program in place using a set of appropriate metrics.

Challenges in the Automotive Software Supply Chain, Connected CAR : Benefits from an Intent Policy framework

  • Soriano, J., Jiménez, G., Correa, E., & Ruiz, N. (2021, June). Challenges in the Automotive Software Supply Chain, Connected CAR: Benefits from an Intent Policy framework.
  • In 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR) (pp. 1-5). IEEE.
Car Manufacturer has to address today growing threats, cars have been incrementally becoming more complex with more code and on the other hand they have to maintain its components during extended life spans of several years compared with other industries. This, together with the increasing connectivity thanks to the connected car and 5G, is becoming a major concern for the industry. FISHY offers a prime opportunity to address some of these challenges since it will offer a homogenous way to tackle some of the threats.