Xinghong Jiang, Xuan Li, Chenyang Lv, Yong Ma, Yulong Shen, Meibin He, Guozheng Li
{"title":"An Encrypted Abnormal Stream Detection Method Based on Improved Skyline Computation","authors":"Xinghong Jiang, Xuan Li, Chenyang Lv, Yong Ma, Yulong Shen, Meibin He, Guozheng Li","doi":"10.1109/NaNA56854.2022.00041","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00041","url":null,"abstract":"With the development of a new generation of mobile communication technology and the enhancement of user security awareness, a large amount of data containing private information generated by users every day will be transmitted in an encrypted form in the network, and it is difficult for traditional abnormal stream detection methods to detect encrypted data, which will increase the likelihood of DDoS attacks on servers that store user information. In response to this problem, this paper proposes a method called detection of encrypted abnormal stream based on improved skyline(DEF-IS). First of all, the Order-Revealing Encryption algorithm is used to encrypt the data stream to ensure the security of the data stream; Then, efficient encrypted abnormal data stream detection is carried out based on reservoir sampling algorithm and improved skyline algorithm; Finally, the performance of the DEF-IS algorithm is verified in the simulation environment. The experimental results show that DEF-IS algorithm can quickly and accurately detect abnormal data while ensuring the safety of data.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116049211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Committees: NaNA 2022","authors":"","doi":"10.1109/nana56854.2022.00006","DOIUrl":"https://doi.org/10.1109/nana56854.2022.00006","url":null,"abstract":"","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133803373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zuobin Ying, Yangzong Zhang, Shengmin Xu, Guowen Xu, Wenjian Liu
{"title":"Anteater: Malware Injection Detection with Program Network Traffic Behavior","authors":"Zuobin Ying, Yangzong Zhang, Shengmin Xu, Guowen Xu, Wenjian Liu","doi":"10.1109/NaNA56854.2022.00036","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00036","url":null,"abstract":"Recent stealth attacks conceal malicious behavior behind seemingly normal connections to popular online services provided by seemingly harmless applications. These attacks are undetectable using traditional network monitoring and signature-based detection techniques. Because attackers frequently use well-known cloud vendors to conceal C&C servers, anomalous traffic appears to be normal. In this paper, we propose an application-level monitoring system named “Anteater”. Our “Anteater” generates a fine-grained profile of each benign software's network traffic behavior, describing the “expected” network traffic behavior. By analyzing the program's network traffic configuration, our “Anteater” can quickly determine the IP address of the program's abnormal access and intercept it in real-time. “Anteater” was implemented in a real-world enterprise dataset containing over 400 million real-world network traffic sessions. The evaluation results indicate that “Anteater” has a high detection rate for malware injection, with a true positive rate of 94.5% and a false positive rate of less than 0.1%.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127559345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Blockchain Usage for 5G Message Service","authors":"Wang Ke, YaLing He, He Yuhuang","doi":"10.1109/NaNA56854.2022.00092","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00092","url":null,"abstract":"5G message service faces security challenges and requirements like bad message control, access authentication, and trust usage which need cooperation and trust among stakeholders for 5G message service. Blockchain can be used for uniformity, data sharing, trust data, trust interactive among multi-parties. This paper studies the security requirements of 5G message service which can be solved by blockchain and provides potential framework and procedures.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116231424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FedDBG: Privacy-Preserving Dynamic Benchmark Gradient in Federated Learning Against Poisoning Attacks","authors":"Mengfan Xu","doi":"10.1109/NaNA56854.2022.00089","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00089","url":null,"abstract":"The federated learning's (FL) ability to protect local data privacy while cooperatively training powerful global models has received extensive attention. Although some researchers have carried out researches on gradient privacy disclosure under poisoning attacks, the existing works still ignore the unreliability of initial data, which makes it difficult to obtain the benign initial reference gradient, resulting in a significant decline in the accuracy of the final global model. To solve this problem, we propose a privacy-preserving gradient framework in FL based on homomorphic encryption. The framework can ensure that malicious initial users and subsequent users cannot interfere with the accuracy of the global model by uploading the poisoning gradients. In this process, key parameters such as gradients of local users won't be leaked. We then design a dynamic reference gradient aggregation algorithm to mitigate the poisoning attack in FL, dynamically dividing the sub-gradients of each round of local uploads by clustering the gradients of different local uploads. Furthermore, the malicious and benign gradients are further separated and the optimal global model is obtained by iterative updating. We proved the security of the scheme theoretically, and verified the effectiveness of the scheme through experiments. The accuracy of the proposed scheme is at least 80% higher than that of the scheme without anti-poisoning measures.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"729 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116984349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dapeng Huang, Haoran Chen, Kai Wang, Chen Chen, Weili Han
{"title":"A Traceability Method for Bitcoin Transactions Based on Gateway Network Traffic Analysis","authors":"Dapeng Huang, Haoran Chen, Kai Wang, Chen Chen, Weili Han","doi":"10.1109/NaNA56854.2022.00037","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00037","url":null,"abstract":"Cryptocurrencies like Bitcoin have become a popular weapon for illegal activities. They have the characteristics of decentralization and anonymity, which can effectively avoid the supervision of government departments. How to de-anonymize Bitcoin transactions is a crucial issue for regulatory and judicial investigation departments to supervise and combat crimes involving Bitcoin effectively. This paper aims to de-anonymize Bitcoin transactions and present a Bitcoin transaction traceability method based on Bitcoin network traffic analysis. According to the characteristics of the physical network that the Bitcoin network relies on, the Bitcoin network traffic is obtained at the physical convergence point of the local Bitcoin network. By analyzing the collected network traffic data, we realize the traceability of the input address of Bitcoin transactions and test the scheme in the distributed Bitcoin network environment. The experimental results show that this traceability mechanism is suitable for nodes connected to the Bitcoin network (except for VPN, Tor, etc.), and can obtain 47.5% recall rate and 70.4% precision rate, which are promising in practice.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124173928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on DDoS Attack Detection Method Based on Deep Neural Network Model inSDN","authors":"Wanqi Zhao, H. Sun, Dawei Zhang","doi":"10.1109/NaNA56854.2022.00038","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00038","url":null,"abstract":"This paper studies Distributed Denial of Service (DDoS) attack detection by adopting the Deep Neural Network (DNN) model in Software Defined Networking (SDN). We first deploy the flow collector module to collect the flow table entries. Considering the detection efficiency of the DNN model, we also design some features manually in addition to the features automatically obtained by the flow table. Then we use the preprocessed data to train the DNN model and make a prediction. The overall detection framework is deployed in the SDN controller. The experiment results illustrate DNN model has higher accuracy in identifying attack traffic than machine learning algorithms, which lays a foundation for the defense against DDoS attack.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130704224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dynamic Reconfiguration Method of Communication Groups for Parallel Volunteer Computing","authors":"Taiki Tomita, Keiichi Inohara, Yota Kurokawa, Masaru Fukushi","doi":"10.1109/NaNA56854.2022.00093","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00093","url":null,"abstract":"This paper deals with a challenging issue of realizing parallel Volunteer Computing (VC) environments on the Internet. Due to the nature of volatility of participant nodes, current VC supports only distributed computing, which limits the widespread use of VC. To solve this problem, this paper defines a redundant parallel VC model consisting of several node groups, called communication groups, and propose a dynamic reconfiguration method of communication groups. The proposed method consists of three procedures which function in a decentralized manner to cope with the volatility of nodes. Experimental result shows that the proposed method works effective in the environments where join and defection rates are relatively high.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130813769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message from the General Conference Chairs: NaNA 2022","authors":"Nana","doi":"10.1109/nana56854.2022.00005","DOIUrl":"https://doi.org/10.1109/nana56854.2022.00005","url":null,"abstract":"The NaNA2017 is technically sponsored by Future University Hakodate, Japan, Xidian University, China, Kathmandu Engineering College, Nepal, and Wakkanai Hokusei Gakuen University, Japan. At this very moment, we would like to thank the program committees and the organizing staffs for their hard work. We would like to deliver our appreciation to the keynote speakers for their great contributions to this conference.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133891572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relation Transformation based on Graph Convolution Network for Entity Alignment","authors":"Luheng Yang, Zhihui Wang, Tingting Zhu, Jianrui Chen","doi":"10.1109/NaNA56854.2022.00060","DOIUrl":"https://doi.org/10.1109/NaNA56854.2022.00060","url":null,"abstract":"Entity alignment has lately received great attention for its key role in knowledge fusion, which has a goal that links entities with the same meaning from different knowledge graph. Most recently, many novel methods based on graph convolution network (GCN) have emerged as interesting models for entity alignment. Although these existing methods can further improve the quality of entity embedding, they ignored the influence of the embeddings of multiple relationships between entities on entity alignment. In addition, current models do not considerably learn the embeddings of relationship. To address these problems, we adopt a novel Relation Transformation based on Graph Convolution Network for entity alignment, named RT-GCN. Specifically, we point out a new GCN to aggregate the information of entities, which aims to strikingly obtain entities embeddings. Moreover, we develop a novel relational transformation method to generate relational embeddings. The crucial role of relational transformation is to strengthen the process of alignment and improve the robustness of the model. Experimental results on three datasets state that the proposed model RT-GCN performs surprisingly better than the state-of-the-art methods.","PeriodicalId":113743,"journal":{"name":"2022 International Conference on Networking and Network Applications (NaNA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116588051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}