2009 International Conference on Intelligent Networking and Collaborative Systems最新文献

筛选
英文 中文
Netpy: Advanced Network Traffic Monitoring Netpy:高级网络流量监控
Andreea Cirneci, Stefan Boboc, C. Leordeanu, V. Cristea, Cristian Estan
{"title":"Netpy: Advanced Network Traffic Monitoring","authors":"Andreea Cirneci, Stefan Boboc, C. Leordeanu, V. Cristea, Cristian Estan","doi":"10.1109/INCOS.2009.13","DOIUrl":"https://doi.org/10.1109/INCOS.2009.13","url":null,"abstract":"The paper presents an extension of NetPy, a network traffic visualization tool using NetFlow records. NetPy offers traffic visualization as well as a traffic analysis, which is very useful for the network administrators. NetPy has been re-designed to include a better Graphical User Interface to make the application easier to use and to present the information in the best way possible. The new version also improves the former analysis modules and offers new ways for the administrator to monitor and control events in the network, such as a comparative analysis. The application also integrates a new advanced intrusion detection module. The attacks that this module is able to detect will be presented, as well as the methods used. The Denial of Service, PortScan and custom defined attacks, based on the number of connections, the number of packets or the payload between hosts can be detected with a very good accuracy. The new NetPy version has been developed by a team from Politehnica University of Bucharest in collaboration with the department of Computer Science of the University of Wisconsin-Madison U.S.A.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129498629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis 利用隐式属性的假名进行任务日志隐私分析
Stefan G. Weber
{"title":"Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis","authors":"Stefan G. Weber","doi":"10.1109/INCOS.2009.40","DOIUrl":"https://doi.org/10.1109/INCOS.2009.40","url":null,"abstract":"Many applications in the area of collaborative work can be enhanced by tracking users regularly. Consider a future emergency management application, in which mobile first responders are continuously tracked in order to support a better coordination of the rescue missions and to create a mission log. However, continuous tracking of individuals and storing the data for later use is often in conflict with individual privacy preferences. Therefore, it is a challenge to deal with conflicting traceability and privacy protection requirements. A common way to implement some kind of privacy protection is to use pseudonyms instead of fixed IDs for each user. However, in order to build a multilateral secure and acceptable solution, a more complex system design w.r.t. to pseudonym linkability is required, that also allows third parties to analyze the logs for organizational and legal reasons. In this paper, we present our approach to deal with this issue: we propose to encode additional information into pseudonyms that are used in location tracking systems and stored in data logs. Our concept comprises both access rights for the user herself and implicit attributes that may be verified by third parties in a privacy-respecting manner. We introduce the cryptographic constructions, which employ cryptographically secure pseudorandom number generators, threshold cryptography and techniques for securely evaluating encrypted data. Moreover, in this paper, we sketch a practical application example in the area of emergency mission log analysis and discuss the main security properties of our concepts.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115245808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Multi-cell Interference Reduction Packet Control for Improving Cell Boundary Throughput for Multi-hop Cellular System 提高多跳蜂窝系统小区边界吞吐量的多小区干扰抑制分组控制
Yuji Okamoto, T. Fujii
{"title":"Multi-cell Interference Reduction Packet Control for Improving Cell Boundary Throughput for Multi-hop Cellular System","authors":"Yuji Okamoto, T. Fujii","doi":"10.1109/INCOS.2009.64","DOIUrl":"https://doi.org/10.1109/INCOS.2009.64","url":null,"abstract":"In order to improve the cell boundary throughput performance and to extend the coverage area, relay transmission with relay stations (RSs) is becoming a promising architecture. However, if RSs are introduced, interference between cells increases and the throughput improvement effect with RSs is prone to be restricted. In this paper, we propose a scheme reducing the interference from other cells by using packet transmission control. The proposed scheme can improve the throughput around the cell boundary and the system throughput considering the users of whole cell by controlling the timing of transmission of each cell.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125729364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of Probe Intervals to Improve Accuracy of CoMPACT Monitor 提高紧凑型监测仪精度的探头间隔设计
Kohei Watabe, Y. Honma, M. Aida
{"title":"Design of Probe Intervals to Improve Accuracy of CoMPACT Monitor","authors":"Kohei Watabe, Y. Honma, M. Aida","doi":"10.1109/INCOS.2009.42","DOIUrl":"https://doi.org/10.1109/INCOS.2009.42","url":null,"abstract":"We have proposed CoMPACT monitor that achieves scalable measurement of one-way delay distribution for each flow. CoMPACT monitor is technique that transforms one-way delay data obtained by active measurement by using passively monitored traffic data of the target flow. In a recent study, it was reported that by using an inter-probe time that has a Gamma distribution can improve the accuracy of simple active measurement. The improvement is in terms of the ensemble mean of stationary stochastic process. In this paper, to improve accuracy of CoMPACT monitor, we apply Gamma-probing as an active measurement of CoMPACT monitor. The significant issue in this application is in the difference between objects to measure; CoMPACT monitor estimates not the ensemble mean but the time average of sample path. We investigate the characteristics of CoMPACT monitor and Gamma-probing, and verify the accuracy improvement of CoMPACT monitor through simulations.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128476474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信