Andreea Cirneci, Stefan Boboc, C. Leordeanu, V. Cristea, Cristian Estan
{"title":"Netpy: Advanced Network Traffic Monitoring","authors":"Andreea Cirneci, Stefan Boboc, C. Leordeanu, V. Cristea, Cristian Estan","doi":"10.1109/INCOS.2009.13","DOIUrl":"https://doi.org/10.1109/INCOS.2009.13","url":null,"abstract":"The paper presents an extension of NetPy, a network traffic visualization tool using NetFlow records. NetPy offers traffic visualization as well as a traffic analysis, which is very useful for the network administrators. NetPy has been re-designed to include a better Graphical User Interface to make the application easier to use and to present the information in the best way possible. The new version also improves the former analysis modules and offers new ways for the administrator to monitor and control events in the network, such as a comparative analysis. The application also integrates a new advanced intrusion detection module. The attacks that this module is able to detect will be presented, as well as the methods used. The Denial of Service, PortScan and custom defined attacks, based on the number of connections, the number of packets or the payload between hosts can be detected with a very good accuracy. The new NetPy version has been developed by a team from Politehnica University of Bucharest in collaboration with the department of Computer Science of the University of Wisconsin-Madison U.S.A.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129498629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harnessing Pseudonyms with Implicit Attributes for Privacy-Respecting Mission Log Analysis","authors":"Stefan G. Weber","doi":"10.1109/INCOS.2009.40","DOIUrl":"https://doi.org/10.1109/INCOS.2009.40","url":null,"abstract":"Many applications in the area of collaborative work can be enhanced by tracking users regularly. Consider a future emergency management application, in which mobile first responders are continuously tracked in order to support a better coordination of the rescue missions and to create a mission log. However, continuous tracking of individuals and storing the data for later use is often in conflict with individual privacy preferences. Therefore, it is a challenge to deal with conflicting traceability and privacy protection requirements. A common way to implement some kind of privacy protection is to use pseudonyms instead of fixed IDs for each user. However, in order to build a multilateral secure and acceptable solution, a more complex system design w.r.t. to pseudonym linkability is required, that also allows third parties to analyze the logs for organizational and legal reasons. In this paper, we present our approach to deal with this issue: we propose to encode additional information into pseudonyms that are used in location tracking systems and stored in data logs. Our concept comprises both access rights for the user herself and implicit attributes that may be verified by third parties in a privacy-respecting manner. We introduce the cryptographic constructions, which employ cryptographically secure pseudorandom number generators, threshold cryptography and techniques for securely evaluating encrypted data. Moreover, in this paper, we sketch a practical application example in the area of emergency mission log analysis and discuss the main security properties of our concepts.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115245808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-cell Interference Reduction Packet Control for Improving Cell Boundary Throughput for Multi-hop Cellular System","authors":"Yuji Okamoto, T. Fujii","doi":"10.1109/INCOS.2009.64","DOIUrl":"https://doi.org/10.1109/INCOS.2009.64","url":null,"abstract":"In order to improve the cell boundary throughput performance and to extend the coverage area, relay transmission with relay stations (RSs) is becoming a promising architecture. However, if RSs are introduced, interference between cells increases and the throughput improvement effect with RSs is prone to be restricted. In this paper, we propose a scheme reducing the interference from other cells by using packet transmission control. The proposed scheme can improve the throughput around the cell boundary and the system throughput considering the users of whole cell by controlling the timing of transmission of each cell.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125729364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Probe Intervals to Improve Accuracy of CoMPACT Monitor","authors":"Kohei Watabe, Y. Honma, M. Aida","doi":"10.1109/INCOS.2009.42","DOIUrl":"https://doi.org/10.1109/INCOS.2009.42","url":null,"abstract":"We have proposed CoMPACT monitor that achieves scalable measurement of one-way delay distribution for each flow. CoMPACT monitor is technique that transforms one-way delay data obtained by active measurement by using passively monitored traffic data of the target flow. In a recent study, it was reported that by using an inter-probe time that has a Gamma distribution can improve the accuracy of simple active measurement. The improvement is in terms of the ensemble mean of stationary stochastic process. In this paper, to improve accuracy of CoMPACT monitor, we apply Gamma-probing as an active measurement of CoMPACT monitor. The significant issue in this application is in the difference between objects to measure; CoMPACT monitor estimates not the ensemble mean but the time average of sample path. We investigate the characteristics of CoMPACT monitor and Gamma-probing, and verify the accuracy improvement of CoMPACT monitor through simulations.","PeriodicalId":145328,"journal":{"name":"2009 International Conference on Intelligent Networking and Collaborative Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128476474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}