Qi-pei Qian, Hui Li, Yuefeng Ji, Qiang Wu, Yan Shao, Zheng-da Ma
{"title":"Planning Method of PON Based on Traffic Analysis","authors":"Qi-pei Qian, Hui Li, Yuefeng Ji, Qiang Wu, Yan Shao, Zheng-da Ma","doi":"10.1109/NaNA56854.2022.00040","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00040","url":null,"abstract":"The upgrading of PON network is an important part to meet the needs and development of user traffic in the future. In this paper, the network data collection style is specified by telemetry, and the partial least squares method is used to predict the future traffic trend, so as to formulate the PON network cutover strategy._Finally the gap between the peak traffic of the OLT in different time periods is narrowed, and the load balance is achieved.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131109802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Low-cost Active Defense Mechanism against DDoS Attacks in Streaming Media Scenarios","authors":"Yiting Huang, Shujie Yang, Tengchao Ma, Zhaoyang Liu, Zhongyi Ding, Qingzhao An","doi":"10.1109/NaNA56854.2022.00030","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00030","url":null,"abstract":"Streaming is the new form of video transmission, and after its development in recent year, streaming video has become popular in our life. Major video websites also widely favor streaming video's immediacy and low consumption characteristics. However, streaming media faces many security threats, such as the most widespread Distributed Denial of Service (DDoS) attacks. The attacker initiates too much traffic by manipulating many bot clients, which can cause the server to overload and stop service. Therefore, this will threaten the security and availability of the server. To defend against DDoS attacks in streaming media, this paper proposes a low-consumption active defense mechanism that allows clients to be assigned to different streaming servers when requesting different video clips. One of the controller assignment algorithms enables clients to be assigned to different streaming servers in a balanced manner. Through simulation and comparison experiments, our proposed defense mechanism can effectively cope with DDoS attacks in streaming scenarios and ensure the security of servers and the viewing quality of users.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134110072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Feature Extraction Techniques for Ambient Sensor-based In-home Activity Recognition","authors":"Aiguo Wang, Yue Meng, Liang Zhao, Jinjun Liu, Guilin Chen","doi":"10.1109/NaNA56854.2022.00072","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00072","url":null,"abstract":"Ambient sensor-based in-home activity recognition plays a crucial role in the design and development of a smart home to better and actively respond to population aging. From the perspective of machine learning, how to extract features from sensor data largely determines the power of a data-driven human activity recognizer. However, few studies systematically investigate how to encode streaming sensor events. To this end, we herein conduct a comparison of different feature extraction techniques for activity recognition. Specifically, we explore two types of feature representations (i.e., statistical features and structural features) and evaluate their single use and joint use. Besides, we experimentally analyze the impact of window size on prediction accuracy. Finally, we perform experiments on three public datasets with 15 different feature encodings and 6 classifiers. Results show that the joint use of different features generally obtains enhanced accuracy and that the interval 60s of window size achieves a better accuracy-speed tradeoff.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133708932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongbin Gao, Shangxing Wang, Hongbin Zhang, B. Liu, Dongmei Zhao, Z. Liu
{"title":"Network Security Situation Assessment Method Based on Absorbing Markov Chain","authors":"Hongbin Gao, Shangxing Wang, Hongbin Zhang, B. Liu, Dongmei Zhao, Z. Liu","doi":"10.1109/NaNA56854.2022.00102","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00102","url":null,"abstract":"This paper has a new network security evaluation method as an absorbing Markov chain-based assessment method. This method is different from other network security situation assessment methods based on graph theory. It effectively refinement issues such as poor objectivity of other methods, incomplete consideration of evaluation factors, and mismatching of evaluation results with the actual situation of the network. Firstly, this method collects the security elements in the network. Then, using graph theory combined with absorbing Markov chain, the threat values of vulnerable nodes are calculated and sorted. Finally, the maximum possible attack path is obtained by blending network asset information to determine the current network security status. The experimental results prove that the method fully considers the vulnerability and threat node ranking and the specific case of system network assets, which makes the evaluation result close to the actual network situation.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116519502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure and anonymous communication scheme based on Internet public service environment","authors":"Kaijun Wu, Bo Tian, Xue Wang, Qi Zhao","doi":"10.1109/NaNA56854.2022.00079","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00079","url":null,"abstract":"With the continuous expansion of the Internet and the full popularization of intelligent terminal devices, the risk of a large amount of personal privacy data such as identity, location, and preferences being leaked during Internet communication is getting higher and higher. Although the existing cryptographic technologies such as encryption and authentication can realize the security of information content and can effectively prevent attackers from obtaining information illegally, they cannot prevent attackers from obtaining important information such as the location and identity of nodes through eavesdropping and traffic analysis. The secure and anonymous communication technology represented by Tor has always been the focus of researchers. It is essential to realize free and open communication on today's Internet, but it is usually only when large institutions invest huge resources to complete the construction of a secure and anonymous system. This paper proposes a method for constructing a secure and anonymous transmission network based on Internet public services (such as VPS, cloud storage services, P2P networks, etc.), and at the same time, a redundant sharding mechanism is designed to improve the transmission capacity. Then complete the construction of the system prototype by renting a virtual host, and realize the practical ability test of the safe and anonymous system. Provide small-scale and convenient secure and anonymous transmission capabilities in emergencies such as epidemics.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132202575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A LSTM Forecasting Model Based on ASSOMA","authors":"Xiaofeng Rong, Chang Wang, Zijian Cao","doi":"10.1109/NaNA56854.2022.00091","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00091","url":null,"abstract":"Long short-term memory (LSTM) network model is widely used in time series prediction because of its outstanding performance on the time-series problems. However, in engineering application, LSTM is faced with the problem of network structure and hyperparameters being difficult to determine. In this paper, a self organizing migration algorithm with adaptive migration step size (ASSOMA) is proposed to optimize the LSTM structure and hyperparameters. Firstly, based on the original SOMA, a scheme based on logistic chaos mapping and adaptive step size is proposed, named ASSOMA. Then the prediction model was built based on household power usage, and its structure and hyperparameters were optimized by ASSOMA. The experimental results show that ASSOMA has better predictive performance than SOMA and related variants.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128641652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elastic Optimized Edge Federated Learning","authors":"Khadija Sultana, K. Ahmed, Bruce Gu, Hua Wang","doi":"10.1109/NaNA56854.2022.00056","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00056","url":null,"abstract":"To fully exploit the enormous data generated by the devices in edge computing, edge federated learning (EFL) is envisioned as a promising solution. The distributed collaborative training in EFL deals with the delay and privacy issues as compared to the traditional model training. However, the existence of straggling devices degrades the model performance. The stragglers are manifested due to the data or system heterogeneity. In this paper, we introduce elastic optimized edge federated learning (FedEN) approach to mitigate the straggling-effect due to the data heterogeneity. This issue can be alleviated by the reinforced device selection by the edge server which can solve device heterogeneity to some extent. But, the statistical heterogeneity remains unsolved. Specifically, we define the problem of stragglers in EFL. Then, we formulate the optimization problem to be solved at the edge devices. We experimented on the MNIST and CIFAR-10 datasets for the proposed model. Simulated experiments demonstrates that the proposed approach improves the training performance. The results confirm the improved performance of FedEN approach over the baselines.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}