2009 Seventh Annual Communication Networks and Services Research Conference最新文献

筛选
英文 中文
Online Classification of Network Flows 网络流在线分类
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.22
Mahbod Tavallaee, Wei Lu, A. Ghorbani
{"title":"Online Classification of Network Flows","authors":"Mahbod Tavallaee, Wei Lu, A. Ghorbani","doi":"10.1109/CNSR.2009.22","DOIUrl":"https://doi.org/10.1109/CNSR.2009.22","url":null,"abstract":"Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we propose a hybrid mechanism for online classification of network traffic, in which we apply a signature-based method at the first level, and then we take advantage of a learning algorithm to classify the remaining unknown traffic using statistical features. Our evaluation with over 250 thousand flows collected over three consecutive hours on a large-scale ISP network shows promising results in detecting encrypted and tunneled applications compared to other existing methods.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124525952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Web Site Auditing Using Web Access Log Data 使用Web访问日志数据进行网站审计
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.24
Si He, Nabil Balecel, H. Hamam, Y. Bouslimani
{"title":"Web Site Auditing Using Web Access Log Data","authors":"Si He, Nabil Balecel, H. Hamam, Y. Bouslimani","doi":"10.1109/CNSR.2009.24","DOIUrl":"https://doi.org/10.1109/CNSR.2009.24","url":null,"abstract":"This paper applies a method to use the access log data to audit websites. It studies website auditing by (1) proposing a new fuzzy clustering algorithm that combines standard Fuzzy C-Means and the Artificial Fish Swarm Algorithm; (2) presenting a new measurement index for similarities between user sessions; and (3) providing an experiment on the execution of this new method. The results are encouraging and show the potential of our fuzzy clustering approach to assist in auditing web site.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interference Aware Route Optimization with Predicted Network Conditions – Extended Abstract 具有预测网络条件的干扰感知路由优化——扩展摘要
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.83
Till Wollenberg, T. Mundt
{"title":"Interference Aware Route Optimization with Predicted Network Conditions – Extended Abstract","authors":"Till Wollenberg, T. Mundt","doi":"10.1109/CNSR.2009.83","DOIUrl":"https://doi.org/10.1109/CNSR.2009.83","url":null,"abstract":"The basic idea presented in this paper is to use interference aware routing with predicted interference. Noise values are measured over a long time and within a wide area in order to find recurring patterns. Routing parameters are adjusted according to these patterns. The objective is to improve the general network performance without permanently transmitting status information. In contrast to this, a predefined schedule derived from predicted interference is deployed once and updated only from time to time, thus reducing the overhead for network control. In this paper we introduce the new idea in general and investigate pattern recognition within the noise values for its suitability.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semiblind Multiuser MIMO Channel Estimators Using PM and RRQR Methods 基于PM和RRQR方法的半盲多用户MIMO信道估计
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.11
Gami Hiren, M. Qasaymeh, Tayem Nizar, R. Pendse, M. E. Sawan
{"title":"Semiblind Multiuser MIMO Channel Estimators Using PM and RRQR Methods","authors":"Gami Hiren, M. Qasaymeh, Tayem Nizar, R. Pendse, M. E. Sawan","doi":"10.1109/CNSR.2009.11","DOIUrl":"https://doi.org/10.1109/CNSR.2009.11","url":null,"abstract":"Estimating the channel state information (CSI) of several transmitters that use orthogonal space-time block codes (OSTBC) to communicate with a single receiver is considered. Based on Rank Revealing QR (RRQR) factorization and Propagator method (PM), two new algorithms to estimate multiuser MIMO channels are proposed. The algorithm estimates the subspace spanned by the user channels use only a few training blocks to extract the users CSI from this subspace. Our both algorithms achieve better performance in comparison with reference LS based approach. Computer simulations are included to validate proposed methods.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115746026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Architectural Framework for Web Portal in Ubiquitous Pervasive Environment 泛在普适环境下门户网站的体系结构框架
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.25
M. T. Raza, Ryu Jeatek, S. Yoo, Ki-Hyung Kim, Seong-Soon Joo, Wun-Cheol Jeong
{"title":"An Architectural Framework for Web Portal in Ubiquitous Pervasive Environment","authors":"M. T. Raza, Ryu Jeatek, S. Yoo, Ki-Hyung Kim, Seong-Soon Joo, Wun-Cheol Jeong","doi":"10.1109/CNSR.2009.25","DOIUrl":"https://doi.org/10.1109/CNSR.2009.25","url":null,"abstract":"Web Portal functions as a single point of access to information on the World Wide Web (WWW). The web portal always contacts portal’s gateway for the information flow that causes network traffic over the Internet. Moreover it provides real time/dynamic access to the stored information, but not access to the real time information. This inherit functionality of web portal limits its role for the resource constrained digital devices in Ubiquitous era (U-era). This paper presents a framework for the web portal in U-era. We have introduced the concept of Portal Locals in the proposed framework, so that the local queries could be solved locally rather than to route them over the Internet. Moreover our framework enables one-to-one device communication for the real time information flow. To provide the in-depth analysis, firstly we have evaluated our approach through mathematical analysis. At the end, we have deployed a test-bed and real time measurements are observed, which proves the efficacy and workability of the proposed framework.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint User-Centric and System-Centric Channel Allocation in Cognitive Radio Networks: A Game-Theoretic Perspective 认知无线网络中以用户为中心和以系统为中心的联合信道分配:博弈论视角
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.69
Wei Yuan, Wei Liu, W. Cheng, Shu Wang
{"title":"Joint User-Centric and System-Centric Channel Allocation in Cognitive Radio Networks: A Game-Theoretic Perspective","authors":"Wei Yuan, Wei Liu, W. Cheng, Shu Wang","doi":"10.1109/CNSR.2009.69","DOIUrl":"https://doi.org/10.1109/CNSR.2009.69","url":null,"abstract":"In this paper, we consider the channel allocation for selfish secondary user (SU) in cognitive radio networks. In general, there are two allocation approaches for our scenario. The user-centric allocation approach aims to maximize the revenues of individual SUs and the system-centric allocation approach attempts to maximize the system revenue. In this paper, we focus on the joint user-centric and system-centric allocation approach and aim to investigate two fundamental issues below: 1) Is there an allocation profile which maximizes the revenues of the SU sand the system? 2) How to achieve this desirable allocation if it exists? We use the game theory approach to investigate these issues. We model the problem of the channel allocation as an ordinal potential game and prove the existence of the desirable allocation profile. Furthermore, we propose a simple protocol to achieve it. Finally, considering the practical issues, we propose a self-enforcing truth-telling method and a Best Response Based algorithm which uses only local information.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126425723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TEREC: Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs 基于信任评估和信誉交换的manet协同入侵检测
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.65
P. Ebinger, N. Bißmeyer
{"title":"TEREC: Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs","authors":"P. Ebinger, N. Bißmeyer","doi":"10.1109/CNSR.2009.65","DOIUrl":"https://doi.org/10.1109/CNSR.2009.65","url":null,"abstract":"Mobile ad hoc networks (MANETs) are particularly vulnerable to attacks from malicious nodes as the reliability of all communication and data exchange on the network depends on collaboration of participating network nodes.In order to strengthen overall mobile network security and avoid attack, malicious nodes should be detected and appropriate measures taken, e.g. exclusion from network communications.In order to effectively identify malicious nodes we propose a system for Trust Evaluation and Reputation Exchange for Cooperative intrusion detection in MANETs (TEREC). Each node should monitor its directly connected neighbour nodes and resulting measurements and trust information should be gathered and exchanged cooperatively between all network nodes. These measurements when combined with information from other nodes can construct a node reputation value representing the trustworthiness of a specific network node.We propose to split reputation information into two values:trust and confidence. This allows each node to successively determine the reliability of other nodes without the need or reliance on a static, pre-established trust infrastructure (e.g.digital certificates) which requires significant overhead and can not be recovered once compromised.TEREC is evaluated via simulation and its performance measured in the presence of an increasing amount of malicious nodes. Evaluation results show that a benign majority of nodes prevail over malicious attacking nodes as they are able to accurately classify network nodes based on reputation estimations.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134051930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A Two-Step TOA Estimation Method Based on Energy Detection for IR-UWB Sensor Networks 基于能量检测的红外-超宽带传感器网络两步TOA估计方法
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.30
Z. Tingting, Zhang Qinyu, Zhang Nai-tong
{"title":"A Two-Step TOA Estimation Method Based on Energy Detection for IR-UWB Sensor Networks","authors":"Z. Tingting, Zhang Qinyu, Zhang Nai-tong","doi":"10.1109/CNSR.2009.30","DOIUrl":"https://doi.org/10.1109/CNSR.2009.30","url":null,"abstract":"In order to design a low-computational time of arrival (TOA) estimation algorithm for the ultra wideband (UWB) based wireless sensor networks, a two-step TOA estimation method which focuses on the direct path (DP) component based on energy detection is proposed in this paper. The first step is to determine which energy block the DP locates by generalized likelihood ratio test (GLRT). During the second step, the precise position of DP within the detected energy block is obtained by maximum likelihood (ML) estimation. A mathematical model is set up for this two-step method which is verified by the simulation results, and system parameters that affect the performance are studied by analytical and numerical methods. The results compared with traditional ranging algorithms also show that this method can achieve relative high performance under low complexity conditions.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Parallel MIMO Channel Measurement Architecture 并行MIMO通道测量架构
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.77
Wesley Miller, B. Petersen, B. Colpitts
{"title":"Parallel MIMO Channel Measurement Architecture","authors":"Wesley Miller, B. Petersen, B. Colpitts","doi":"10.1109/CNSR.2009.77","DOIUrl":"https://doi.org/10.1109/CNSR.2009.77","url":null,"abstract":"Optimal methods of developing Multiple-Input Multiple- Output (MIMO) systems have been an active area of interest in recent communications research. This technology enables wireless communication systems to achieve higher data rates with good bit error rate (BER) and signal-to-noise ratio (SNR) performance, but at the expense of added system complexity due to the circuitry and algorithms that must be implemented to facilitate communication among multiple transmitters and receivers over wireless channels. The goal of this project is to develop and investigate the architecture of a MIMO radio frequency (RF) antenna testbed for parallel channel impulse response measurements using four transmitters and four receivers, with central control and signal processing to be carried out using two Altera Stratix II field-programmable gate arrays (FPGAs).","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116456554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages 一种优先级重传机制,实现Syslog消息的可靠高效传递
2009 Seventh Annual Communication Networks and Services Research Conference Pub Date : 2009-05-11 DOI: 10.1109/CNSR.2009.33
H. Tsunoda, T. Maruyama, K. Ohta, Yuji Waizumi, G. Keeni, Y. Nemoto
{"title":"A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages","authors":"H. Tsunoda, T. Maruyama, K. Ohta, Yuji Waizumi, G. Keeni, Y. Nemoto","doi":"10.1109/CNSR.2009.33","DOIUrl":"https://doi.org/10.1109/CNSR.2009.33","url":null,"abstract":"Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes, it is important that logs are reliably retrieved from hosts in the intranet. But thesyslog protocol which is widely used for network logging does not meet this requirement.Thus, the use of TCP for improving the reliability is being standardized at the IETF.However, TCP is not effective for providing the reliability in terms of cost and delay.In this paper, we examine the issues and requirements of network logging based on experiments in a real network environment and point out problems of TCP.Then we propose an efficient mechanism for the reliable delivery of syslog messages and validate its effectiveness thorough NS-2 simulations.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124844777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信