{"title":"Online Classification of Network Flows","authors":"Mahbod Tavallaee, Wei Lu, A. Ghorbani","doi":"10.1109/CNSR.2009.22","DOIUrl":"https://doi.org/10.1109/CNSR.2009.22","url":null,"abstract":"Online classification of network traffic is very challenging and still an issue to be solved due to the increase of new applications and traffic encryption. In this paper, we propose a hybrid mechanism for online classification of network traffic, in which we apply a signature-based method at the first level, and then we take advantage of a learning algorithm to classify the remaining unknown traffic using statistical features. Our evaluation with over 250 thousand flows collected over three consecutive hours on a large-scale ISP network shows promising results in detecting encrypted and tunneled applications compared to other existing methods.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124525952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Site Auditing Using Web Access Log Data","authors":"Si He, Nabil Balecel, H. Hamam, Y. Bouslimani","doi":"10.1109/CNSR.2009.24","DOIUrl":"https://doi.org/10.1109/CNSR.2009.24","url":null,"abstract":"This paper applies a method to use the access log data to audit websites. It studies website auditing by (1) proposing a new fuzzy clustering algorithm that combines standard Fuzzy C-Means and the Artificial Fish Swarm Algorithm; (2) presenting a new measurement index for similarities between user sessions; and (3) providing an experiment on the execution of this new method. The results are encouraging and show the potential of our fuzzy clustering approach to assist in auditing web site.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interference Aware Route Optimization with Predicted Network Conditions – Extended Abstract","authors":"Till Wollenberg, T. Mundt","doi":"10.1109/CNSR.2009.83","DOIUrl":"https://doi.org/10.1109/CNSR.2009.83","url":null,"abstract":"The basic idea presented in this paper is to use interference aware routing with predicted interference. Noise values are measured over a long time and within a wide area in order to find recurring patterns. Routing parameters are adjusted according to these patterns. The objective is to improve the general network performance without permanently transmitting status information. In contrast to this, a predefined schedule derived from predicted interference is deployed once and updated only from time to time, thus reducing the overhead for network control. In this paper we introduce the new idea in general and investigate pattern recognition within the noise values for its suitability.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134096627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gami Hiren, M. Qasaymeh, Tayem Nizar, R. Pendse, M. E. Sawan
{"title":"Semiblind Multiuser MIMO Channel Estimators Using PM and RRQR Methods","authors":"Gami Hiren, M. Qasaymeh, Tayem Nizar, R. Pendse, M. E. Sawan","doi":"10.1109/CNSR.2009.11","DOIUrl":"https://doi.org/10.1109/CNSR.2009.11","url":null,"abstract":"Estimating the channel state information (CSI) of several transmitters that use orthogonal space-time block codes (OSTBC) to communicate with a single receiver is considered. Based on Rank Revealing QR (RRQR) factorization and Propagator method (PM), two new algorithms to estimate multiuser MIMO channels are proposed. The algorithm estimates the subspace spanned by the user channels use only a few training blocks to extract the users CSI from this subspace. Our both algorithms achieve better performance in comparison with reference LS based approach. Computer simulations are included to validate proposed methods.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115746026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. T. Raza, Ryu Jeatek, S. Yoo, Ki-Hyung Kim, Seong-Soon Joo, Wun-Cheol Jeong
{"title":"An Architectural Framework for Web Portal in Ubiquitous Pervasive Environment","authors":"M. T. Raza, Ryu Jeatek, S. Yoo, Ki-Hyung Kim, Seong-Soon Joo, Wun-Cheol Jeong","doi":"10.1109/CNSR.2009.25","DOIUrl":"https://doi.org/10.1109/CNSR.2009.25","url":null,"abstract":"Web Portal functions as a single point of access to information on the World Wide Web (WWW). The web portal always contacts portal’s gateway for the information flow that causes network traffic over the Internet. Moreover it provides real time/dynamic access to the stored information, but not access to the real time information. This inherit functionality of web portal limits its role for the resource constrained digital devices in Ubiquitous era (U-era). This paper presents a framework for the web portal in U-era. We have introduced the concept of Portal Locals in the proposed framework, so that the local queries could be solved locally rather than to route them over the Internet. Moreover our framework enables one-to-one device communication for the real time information flow. To provide the in-depth analysis, firstly we have evaluated our approach through mathematical analysis. At the end, we have deployed a test-bed and real time measurements are observed, which proves the efficacy and workability of the proposed framework.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129897986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Joint User-Centric and System-Centric Channel Allocation in Cognitive Radio Networks: A Game-Theoretic Perspective","authors":"Wei Yuan, Wei Liu, W. Cheng, Shu Wang","doi":"10.1109/CNSR.2009.69","DOIUrl":"https://doi.org/10.1109/CNSR.2009.69","url":null,"abstract":"In this paper, we consider the channel allocation for selfish secondary user (SU) in cognitive radio networks. In general, there are two allocation approaches for our scenario. The user-centric allocation approach aims to maximize the revenues of individual SUs and the system-centric allocation approach attempts to maximize the system revenue. In this paper, we focus on the joint user-centric and system-centric allocation approach and aim to investigate two fundamental issues below: 1) Is there an allocation profile which maximizes the revenues of the SU sand the system? 2) How to achieve this desirable allocation if it exists? We use the game theory approach to investigate these issues. We model the problem of the channel allocation as an ordinal potential game and prove the existence of the desirable allocation profile. Furthermore, we propose a simple protocol to achieve it. Finally, considering the practical issues, we propose a self-enforcing truth-telling method and a Best Response Based algorithm which uses only local information.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126425723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TEREC: Trust Evaluation and Reputation Exchange for Cooperative Intrusion Detection in MANETs","authors":"P. Ebinger, N. Bißmeyer","doi":"10.1109/CNSR.2009.65","DOIUrl":"https://doi.org/10.1109/CNSR.2009.65","url":null,"abstract":"Mobile ad hoc networks (MANETs) are particularly vulnerable to attacks from malicious nodes as the reliability of all communication and data exchange on the network depends on collaboration of participating network nodes.In order to strengthen overall mobile network security and avoid attack, malicious nodes should be detected and appropriate measures taken, e.g. exclusion from network communications.In order to effectively identify malicious nodes we propose a system for Trust Evaluation and Reputation Exchange for Cooperative intrusion detection in MANETs (TEREC). Each node should monitor its directly connected neighbour nodes and resulting measurements and trust information should be gathered and exchanged cooperatively between all network nodes. These measurements when combined with information from other nodes can construct a node reputation value representing the trustworthiness of a specific network node.We propose to split reputation information into two values:trust and confidence. This allows each node to successively determine the reliability of other nodes without the need or reliance on a static, pre-established trust infrastructure (e.g.digital certificates) which requires significant overhead and can not be recovered once compromised.TEREC is evaluated via simulation and its performance measured in the presence of an increasing amount of malicious nodes. Evaluation results show that a benign majority of nodes prevail over malicious attacking nodes as they are able to accurately classify network nodes based on reputation estimations.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134051930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Two-Step TOA Estimation Method Based on Energy Detection for IR-UWB Sensor Networks","authors":"Z. Tingting, Zhang Qinyu, Zhang Nai-tong","doi":"10.1109/CNSR.2009.30","DOIUrl":"https://doi.org/10.1109/CNSR.2009.30","url":null,"abstract":"In order to design a low-computational time of arrival (TOA) estimation algorithm for the ultra wideband (UWB) based wireless sensor networks, a two-step TOA estimation method which focuses on the direct path (DP) component based on energy detection is proposed in this paper. The first step is to determine which energy block the DP locates by generalized likelihood ratio test (GLRT). During the second step, the precise position of DP within the detected energy block is obtained by maximum likelihood (ML) estimation. A mathematical model is set up for this two-step method which is verified by the simulation results, and system parameters that affect the performance are studied by analytical and numerical methods. The results compared with traditional ranging algorithms also show that this method can achieve relative high performance under low complexity conditions.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"244 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116114666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel MIMO Channel Measurement Architecture","authors":"Wesley Miller, B. Petersen, B. Colpitts","doi":"10.1109/CNSR.2009.77","DOIUrl":"https://doi.org/10.1109/CNSR.2009.77","url":null,"abstract":"Optimal methods of developing Multiple-Input Multiple- Output (MIMO) systems have been an active area of interest in recent communications research. This technology enables wireless communication systems to achieve higher data rates with good bit error rate (BER) and signal-to-noise ratio (SNR) performance, but at the expense of added system complexity due to the circuitry and algorithms that must be implemented to facilitate communication among multiple transmitters and receivers over wireless channels. The goal of this project is to develop and investigate the architecture of a MIMO radio frequency (RF) antenna testbed for parallel channel impulse response measurements using four transmitters and four receivers, with central control and signal processing to be carried out using two Altera Stratix II field-programmable gate arrays (FPGAs).","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116456554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Tsunoda, T. Maruyama, K. Ohta, Yuji Waizumi, G. Keeni, Y. Nemoto
{"title":"A Prioritized Retransmission Mechanism for Reliable and Efficient Delivery of Syslog Messages","authors":"H. Tsunoda, T. Maruyama, K. Ohta, Yuji Waizumi, G. Keeni, Y. Nemoto","doi":"10.1109/CNSR.2009.33","DOIUrl":"https://doi.org/10.1109/CNSR.2009.33","url":null,"abstract":"Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes, it is important that logs are reliably retrieved from hosts in the intranet. But thesyslog protocol which is widely used for network logging does not meet this requirement.Thus, the use of TCP for improving the reliability is being standardized at the IETF.However, TCP is not effective for providing the reliability in terms of cost and delay.In this paper, we examine the issues and requirements of network logging based on experiments in a real network environment and point out problems of TCP.Then we propose an efficient mechanism for the reliable delivery of syslog messages and validate its effectiveness thorough NS-2 simulations.","PeriodicalId":103090,"journal":{"name":"2009 Seventh Annual Communication Networks and Services Research Conference","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124844777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}