Lisandro Zambenedetti Granville

Lisandro Zambenedetti Granville
Universidade Federal do Rio Grande do Sul | UFRGS · Departamento de Informática Aplicada

PhD

About

393
Publications
99,509
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,782
Citations
Additional affiliations
September 2007 - September 2008
University of Twente
Position
  • Professor
February 2003 - present
Federal University of Rio Grande do Sul
Position
  • Professor
July 1998 - February 2003
University of Santa Cruz do Sul
Position
  • Professor (Associate)

Publications

Publications (393)
Article
SDN is an emerging paradigm currently evidenced as a new driving force in the general area of computer networks. Many investigations have been carried out in the last few years about the benefits and drawbacks in adopting SDN. However, there are few discussions on how to manage networks based on this new paradigm. This article contributes to this d...
Conference Paper
The composition of network management information is a feature widely required but not properly supported in traditional management technologies. Web services technology has been investigated to enable more sophisticated management solutions. In this paper, we show that Web services have more to offer to the network management discipline than just...
Conference Paper
The rational management of IT infrastructures is a goal of modern organizations that aim to deliver high quality services to their customers in an affordable way. Since changes are imminent in such a dynamic environment, failures during this process may directly affect business continuity. Hence, risk assessment is a key process in IT change manage...
Conference Paper
Important steps have been taken in the recent years towards evaluating the performance of Web services for network management. Due to the lack of specific standards for Web services-based management, previous evaluations have been carried out measuring only the performance of SOAP (the basic Web services protocol) running in network management envi...
Conference Paper
As interações humanas virtuais têm sido ampliadas com o uso crescente da Internet e redes sociais, elevando os riscos de ameaças cibernéticas de Engenharia Social. O uso de Bots nesses ataques permite escalabilidade na exploração da confiança dos usuários, provocando riscos de segurança. Poucos são os trabalhos com foco nas ações automatizadas de E...
Article
Intents brought significant improvements in network management by the use of intent-level languages. Despite these improvements, intents are not yet fully integrated and deployed in most large-scale networks. As a result, network operators may still experience problems when deploying new intents, for instance, learning a vendor-specific language to...
Article
Network function virtualization (NFV) is a key networking concept whose benefits include scalability, flexibility, and cost-effective service provisioning. In NFV, service function chains (SFCs) adaptable to customers' needs are created by chaining virtualized network functions (VNFs). VNFs and SFCs are sensitive elements that, if compromised, woul...
Preprint
The IETF is responsible for the standardization and development of Internet protocols and this is based on the voluntary participation ofprofessionals, academics, and resear- chers from around the world. Volunteers work together through email lists and in three face-to-face meetings yearly. This proposal considers the importance ofidentifying mul-...
Article
Network Neutrality (NN) is a principle that is not taken for granted on the Internet. Instead, it must be enforced by regulation that defines which Traffic Differentiation (TD) practices are allowed or prohibited from being adopted by ISPs. Thus, the regulation is the proper source of NN definitions to design solutions for detecting NN violations....
Conference Paper
The COVID-19 pandemic, caused by the quick dissemination of the SARS-CoV-2 vírus, deeply impacted the world. The use of digital technologies has been crucial in the effort to control it, and, among others, digital contact tracing (DCT) applications stood out. DCT was successfully employed to face other infectious diseases in the past. However, its...
Chapter
Full-text available
Identify and classify attacks through Intrusion Detection Systems is one constant challenge for security professionals. Computer networks are one of the significant IT components that support classification operations. Machine Learning (ML) techniques can aid in this process by providing methods capable of making decisions based on previously known...
Preprint
Full-text available
The 2019 Coronavirus disease (COVID-19) pandemic, caused by a quick dissemination of the Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2), has had a deep impact worldwide, both in terms of the loss of human life and the economic and social disruption. The use of digital technologies has been seen as an important effort to combat the pan...
Article
Full-text available
Network Functions Virtualization (NFV) promotes a paradigm shift in the core network, by enabling the execution of network functions on a virtualized software plane instead of on dedicated hardware. Despite its benefits, NFV introduces new challenges, of which we highlight those related to the deployment of virtualized network services. Current NFV...
Preprint
Full-text available
Critical networked services enable significant revenue for network operators and, in turn, are regulated by Service Level Agreements (SLAs). In order to ensure SLAs are being met, service levels need to be monitored. One technique for this involves active measurement mechanisms which employ measurement probes along the network to inject synthetic t...
Article
Full-text available
With the emergence of 5G networks and the stringent Quality of Service (QoS) requirements of Mission-Critical Applications (MCAs), co-existing networks are expected to deliver higher-speed connections, enhanced reliability, and lower latency. IEEE 802.11 networks, which co-exist with 5G, continue to be the access choice for indoor networks. However...
Article
Full-text available
Internet eXchange Points (IXPs) are Internet infrastructures composed of high-performance networks that allow multiple autonomous systems to exchange traffic. Given the challenges of managing the flows that cross an IXP, identifying elephant flows may help improve the quality of services provided to its participants. In this context, we leverage th...
Conference Paper
Full-text available
Businesses were moving during the past decades to-ward full digital models, which made companies face new threatsand cyberattacks affecting their services and, consequently, theirprofits. To avoid negative impacts, companies’ investments incybersecurity are increasing considerably. However, Small andMedium-sized Enterprises (SMEs) operate on small...
Article
Full-text available
The massive industrial adoption of cloud technology has led to research into cloud-enabling traditional applications. The EMD research project proposes an elastic, reliable, and secure cloud-enabled Audio and Video (A/V) collaboration platform in replacement of a reliable hardware appliance based which had fixed constraints in terms of scalability....
Preprint
Anycast routing is an area of studies that has been attracting interest of several researchers in recent years. Most anycast studies conducted in the past relied on coarse measurement data, mainly due to the lack of infrastructure where it is possible to test and collect data at same time. In this paper we present Tangled, an anycast test environme...
Preprint
Full-text available
Recent advances in artificial intelligence (AI) offer an opportunity for the adoption of self-driving networks. However, network operators or home-network users still do not have the right tools to exploit these new advancements in AI, since they have to rely on low-level languages to specify network policies. Intent-based networking (IBN) allows o...
Article
The advent of the function virtualization concept, especially that of network functions, leads to important benefits for future networks. Although the orchestration of virtualized functions presents gains for network operators and clients alike, the overhead for moving functions has not been thoroughly explored so far, especially considering functi...
Article
Dynamic Cloud Radio Access Networks (C-RAN) is an emerging wireless architecture that splits radio functions in a hierarchical cloud-based infrastructure. In Dynamic C-RAN, wireless functionalities can be divided into smaller components and distributed along with a hierarchical cloud infrastructure. Network Functions Virtualization (NFV) concepts h...
Article
Full-text available
Traffic Monitoring assists in achieving network stability by observing and quantifying its behavior. A proper traffic monitoring solution requires the accurate and timely collection of flow statistics. Many approaches have been proposed to monitor Software-Defined Networks. However, these approaches have some disadvantages. First, they are unconcer...
Chapter
Internet eXchange Points (IXPs) are high-performance networks that allow multiple autonomous systems to exchange traffic. As in any network, IXP operators face management challenges to promote better usage of the services provided by the network. Among these, a critical problem lies in the identification of elephant flows, which are characterized b...
Chapter
The Internet Domain Naming System (DNS) is one of the pillars for the Internet and has been the subject of various Distributed Denial-of-Service (DDoS) attacks over the years. As a countermeasure, the DNS infrastructure has been engineered with a series of replication measures, such as relying on multiple authoritative name servers and using IP any...
Chapter
Full-text available
Computer networks and their services have become increasingly dynamic with the introduction of concepts such as Network Functions Virtualization (NFV) and cloud computing. To understand and configure such a complex network to their best interests, users must use several management tools that they are not necessarily familiar with. In this paper, we...
Chapter
Intent-Based Networking (IBN) is showing significant improvements in network management, especially by reducing the complexity through intent-level languages. However, IBN is not yet integrated and widely deployed in most networks. Network operators may still encounter several issues deploying new intents, such as reasoning about complex configurat...
Chapter
Internet Exchange Points (IXPs) are high-performance networks that allow multiple autonomous systems to exchange traffic, with benefits ranging from cost reductions to performance improvements. As in any network, IXP operators face daily management challenges to promote better usage of the services provided by the network. An essential problem in I...
Chapter
The proper execution of Virtualized Network Functions (VNFs) depends on the employment of platforms specifically created to fulfill multiple Network Function Virtualization (NFV) requirements (e.g., performance, integration, and management). However, existing VNF platforms implement different architectures, thus resulting in proprietary or limited...
Article
Network Functions Virtualization (NFV) presents several advantages over traditional network architectures, such as flexibility, security, and reduced CAPEX/OPEX. In traditional middleboxes, network functions are usually executed on specialized hardware (e.g., firewall, DPI). Virtual Network Functions (VNFs) on the other hand, are executed on commod...
Article
Network Functions Virtualisation (NFV) presents several advantages over traditional network architectures, such as flexibility, security, and reduced CAPEX/OPEX. In traditional middleboxes, network functions are usually executed on specialised hardware (e.g., firewall, DPI). Virtual Network Functions (VNFs) on the other hand, are executed on commod...
Conference Paper
The proper execution and management of heterogeneous Virtualized Network Functions (VNFs) relies on the employment of efficient and comprehensive VNF platforms. However, current systems are developed without following any standardized reference architecture, thus leading to proprietary and monolithic solutions. Furthermore, those platforms lack sup...
Chapter
Network Functions Virtualization (NFV) decouples the network package performed by network functions from dedicated hardware appliance by running Virtual Network Functions (VNF) on commercial off-the-shelf hardware. Network operators can create customized network services by chaining multiple VNFs, defining a so-called Service Function Chaining (SFC...
Article
In this work we describe FT-Aurora, a highly available IaaS (Infrastructure as a Service) cloud manager that allows cloud resources to be accessed even if the manager itself crashes. FT-Aurora provides flexible and efficient resource management by supporting network programmability. FT-Aurora is based on clusters of cloud managers running on multip...
Article
Full-text available
Network slicing emerges as a key technology in next generation networks, boosted by the integration of software‐defined networking and network functions virtualization. However, while allowing resource sharing among multiple tenants, such networks must also ensure the security requirements needed for the scenarios they are employed. This letter pre...
Article
Full-text available
Audio and video (A/V) collaboration platforms often use Internet cloud technologies to ensure elasticity. They generally operate on a best-effort basis, without quality or delivery guarantees. However, such guarantees are a premise of business-focused platforms, which often rely on static/dedicated infrastructure and hardware-based components. This...
Conference Paper
Full-text available
The fact that most IoT solutions are provided by third parties, along with the pervasiveness of the collected data, raises privacy and security concerns. There is a need to verify which data is being sent to the third party, as well as preventing those channels from becoming an exploitation avenue. We propose to use existing API definition language...
Conference Paper
The ever-increasing deployment of new wireless technologies and the demand for mobile services delivery has hampered the efficient and reliable wireless communication. While traditional IEEE 802.11 Wireless Local Area Networks (WLANs) suffer interference from other wireless technologies, their manageability is currently limited. In this context, th...
Article
In Network Functions Virtualization (NFV), service providers create customized network services by chaining Virtual Network Functions (VNFs) in forwarding graphs, according to individual client demands. Despite the flexibility promoted by the NFV paradigm, specific VNFs used in network services may become bottlenecks due to a number of factors, e.g...
Conference Paper
Full-text available
Network Functions Virtualization (NFV) is transforming the way in which network operators acquire and manage network services. By using virtualization technologies to move packet processing from dedicated hardware to software, NFV has introduced a new market focused on the offer and distribution of Virtual Network Functions (VNF). Infrastructure Pr...
Conference Paper
Full-text available
Service Level Agreements (SLA) are documents that specify what Service Providers (SP) are delivering to customers. They contain information about the service, such as target performance level or monthly availability, and penalties for the violations of the SLA. The information about the penalties is essential because if the SP does not deliver what...
Conference Paper
Full-text available
The heterogeneity of 5G requirements commands more complex network architectures, imposing the need for network orchestration. ETSI NFV MANO is the standard which defines a common framework for vendors and operators to integrate their orchestration efforts. In this paper, we evaluated how an ETSI NFV MANO compliant orchestrator (OSM) fares while or...
Article
Full-text available
IoT botnets have been used to launch Distributed Denial-of-Service (DDoS) attacks affecting the Internet infrastructure. To protect the Internet from such threats and improve security mechanisms, it is critical to understand the botnets’ intents and characterize their behavior. Current malware analysis solutions, when faced with IoT, present limita...
Article
Full-text available
The increasing demand for wireless broadband connectivity is leading mobile network operators towards new means to expand their infrastructures efficiently and without increasing the cost of operation. Network Functions Virtualization (NFV) is a step towards virtualization-based, low-cost flexible and adaptable networking services. In the context o...
Article
Full-text available
Recent advances in artificial intelligence (AI) offer an opportunity for the adoption of self-driving networks. However, network operators or home-network users still do not have the right tools to exploit these new advancements in AI, since they have to rely on low-level languages to specify network policies. Intent-based networking (IBN) allows o...
Article
Full-text available
Heterogeneous networks offer a wide range of multimedia services , such as entertainment, advertising, and video conferences. In this multimedia scenario, users can access video content via heterogeneous wireless networks, such as LTE macro and small cells. Users also expect to receive real-time videos with Quality of Experience (QoE) support, whic...
Article
The emergence of NFV has drawn the attention of academia, standardization bodies, and industry, because of the possibility of reducing capital and operational costs while introducing innovation in computer networks. To enable developers to independently publish and distribute VNFs, marketplaces akin to online application stores are essential. Resea...
Chapter
Modern IT service provider organizations are under a continuous pressure to increase their competitiveness. Ways to reduce costs while improving performance of services are a key focus area for companies in the IT industry. However, despite all the solutions that have been proposed, modeling and optimizing human-centered processes remains a challen...
Article
Self-organizing networks able to adapt to changes in the environment have already been a longstanding research topic. Given the limited number of license-free Industrial, Scientific, and Medical (ISM) radio bands, wireless technologies end up competing with one another for the wireless spectrum. As such, the proper employment of Medium Access Contr...
Article
Network Neutrality is an Internet principle that needs to be enforced by normative, which is valid just within a jurisdiction that is usually limited by the borders of a country or region. However, existing solutions designed to assess end-to-end neutrality violations do not consider the normative jurisdictions. We argue that jurisdiction-aware vio...