{"title":"Challenges in intrusion detection for wireless ad-hoc networks","authors":"P. Brutch, C. Ko","doi":"10.1109/SAINTW.2003.1210188","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210188","url":null,"abstract":"This paper presents a brief survey of current research in intrusion detection for wireless ad-hoc networks. In addition to examining the challenges of providing intrusion detection in this environment, this paper reviews current efforts to detect attacks against the ad-hoc routing infrastructure, as well as detecting attacks directed against the mobile nodes. This paper also examines the intrusion detection architectures that may be deployed for different wireless ad-hoc network infrastructures, as well as proposed methods of intrusion response.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132027277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Masatoshi Kakiuchi, N. Morishima, Yutaka Nakamura, K. Fujikawa, H. Sunahara
{"title":"KUPF: 2-phase selection model of classification records","authors":"Masatoshi Kakiuchi, N. Morishima, Yutaka Nakamura, K. Fujikawa, H. Sunahara","doi":"10.1109/SAINTW.2003.1210169","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210169","url":null,"abstract":"With the advance of computing and internetworking technologies, various services, which need classification of data, are provided. Firewall and QoS control are typical services which classify the data flow. These services are based on two or more rules, and select a rule to classify the data. However, some of their rules may conflict with one another and it is necessary to resolve conflicts in these classification mechanisms. We discuss the classification of data with generalization of the parameter filter. Then we arrange the parameter filter and propose a 2-phase selection model of classification records. In this model, we consider the procedure of the parameter filter as the phase depending only on the schema of the filter rule and the phase depending on the service. We also implement the KUPF framework based on this model and a sample service which provides QoS control over a IPv4/IPv6 network. With this sample implementation, we validate the availability and evaluate the performance of KUPF.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123898223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information extraction from HTML pages and its integration","authors":"K. Itai, A. Takasu, J. Adachi","doi":"10.1109/SAINTW.2003.1210172","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210172","url":null,"abstract":"We propose a method for transforming HTML tables that have different structures into a common XML list structure and integrating them. This integration enables us to browse and compare all information in separate HTML pages uniformly. This paper focuses on the tasks of information extraction from tables and its data categorization. For this purpose, we compare three algorithms: (I) data classification using a support vector machine, (II) table structure estimation and data categorization using a hidden Markov model, and (III) data classification by the combination of a support vector machine and hidden Markov model. Finally, we report the experimental results.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study of Personal Data Protection Bill in Japan with UK Data Protection Act 1998","authors":"I. Takahashi","doi":"10.1109/SAINTW.2003.1210142","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210142","url":null,"abstract":"In Japan, \"Personal Data Protection Bill\" and \"Law concerning Protection of Personal Data possessed by Administrative Organizations\" were discussed in the Diets in 2002. Both bills failed to pass in the Diet. They will be discussed in the Diets in 2003 again. I can point out some problems involved in bills such as \"data possessed in public organizations\" International Aspects\" \"Enforcement\" \"Ambiguous status of rights of the data subjects\" in comparing both bills with UK Data Protection Act 1998.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"24 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and operation of a satellite-based broadcast IP network","authors":"Hidetaka Izumiyama, H. Kusumoto","doi":"10.1109/SAINTW.2003.1210122","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210122","url":null,"abstract":"This paper summarizes the advantage of satellite communication in order to build a wide-coverage broadcast IP network in conjunction with the Internet. Taking various technical factors into consideration, the broadcast IP network has been designed and built in the Asia Pacific region by using an existing satellite. Details such as those regarding broadcast capable datalink technology, Earth station composition, satellite link budget (calculation of carrier-noise ratio margin), and IP and TCP performance are illustrated. This paper also discusses operational experiments conducted on the network exemplified by a vehicle for providing new distance education, and demonstrates the feasibility of practical use of the broadcast IP network using a unidirectional satellite link.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128042333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability assessment in wireless networks","authors":"R. Henning","doi":"10.1109/SAINTW.2003.1210186","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210186","url":null,"abstract":"Wireless access points bring great convenience to the enterprise network, and also bring a large collection of vulnerabilities into the enterprise environment. Wireless users pose new difficulties in authentication and confidentiality that can intentionally or inadvertently pose a threat to their wired colleagues. A comprehensive network vulnerability analysis must address wireless environment threats and vulnerabilities, including identification of unauthorized Wireless Access Points and incorrectly configured clients. This paper discusses the issues associated with vulnerability assessment in a wireless network and a recommended approach to integrating wireless devices into vulnerability scanning methodologies.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125105345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Satellite bandwidth requirements for an MCS based multimedia conference","authors":"S. Ramadass, R. Budiarto, V. Siva","doi":"10.1109/SAINTW.2003.1210127","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210127","url":null,"abstract":"Videoconferencing has always been associated with deterministic networks or circuit switched networks (physical or virtual). In the past, it was almost unthinkable to send voice and video over an undeterministic network like Ethernet. However, recent trends in the field of multimedia communications (audio, video and documents) have indicated that it is not only possible but also practical to carry such communications over Ethernet. The MCS (Multimedia Conferencing System) which was recently developed and implemented by the Network Research Group, School of Computer Sciences, USM is a full blown audio, video and document conferencing system that works on classical Ethernet as well as satellite networks using the RSW Control Criteria. This paper discusses the bandwidth requirements of using the MCS system on satellite-based networks.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123761058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Current status of IAA (I Am Alive) system and IAA alliance","authors":"M. Nakayama, Hiroyuki Ohno","doi":"10.1109/SAINTW.2003.1210178","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210178","url":null,"abstract":"This paper describes an overview of the IAA (I Am Alive) system, which was originally developed in the WIDE project from 1995, and its current status. The IAA system is a distributed database system which contains victims' safety information. When a disaster occurs, victims can register their safety status information to the database and anyone who knows the victim's name can check his/her situation at any time. The IAA system has many user interfaces to accept any kind of user requests, e.g. Web client interface, windows client interface, fax interface using OCR/OMR, phone interface using DTMF tone and i-mode mobile phone interface. The IAA system also consists of many database nodes called \"IAA clusters\" to avoid paralysis of the system and network from a huge number of simultaneous requests. IAA clusters are located at deferent places and users' requests are distributed among them. All IAA clusters are loosely coupled by the IAA transport mechanism and synchronize victim information among them. In 1998, a prototype implementation was developed, so victim data format and request/response format between the client program and IAA cluster was established. Many organizations started to develop other implementations of the IAA system such as the CRL-IAA system, Monster-IAA system and NetStar-IAA system. The IAA Alliance was organized in 2002 to examine interoperability of these implementations and exchange information between developers. This organization also introduces the IAA system to many organizations including local government and gathers feedback from them to developers. We also introduce activity of this organization briefly.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When and where is a service? Investigating temporal and locative service properties","authors":"Justin O'Sullivan, D. Edmond","doi":"10.1109/SAINTW.2003.1210133","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210133","url":null,"abstract":"An understanding of the temporal and locative constraints surrounding a service are important for interacting with it. These constraints apply to both the service requestor and the service provider. We discuss service interactions including the less common ones of cancellation, suspension and resumption. We then discuss various kinds of temporal windows and argue for certain locative constraints.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123826052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planning for web services the hard way","authors":"Mark James Carman, L. Serafini","doi":"10.1109/SAINTW.2003.1210130","DOIUrl":"https://doi.org/10.1109/SAINTW.2003.1210130","url":null,"abstract":"We outline a framework for performing automated discovery, composition and execution of Web services based solely on the information available in interface descriptions and service directories. In our framework we do not rely on the existence of semantic mark-up in service descriptions, thus making our approach \"hard\". (From a planning perspective, we tackle the problem of planning in a semantically heterogeneous domain.) The framework consists of a domain model, a planning and execution algorithm, and learning procedures. Preliminary work on implementing a service matching system is also discussed.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"58-60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123126584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}