{"title":"Virtualizing Service Infrastructure with Hardware Gateway in Data Center","authors":"Junji Kinoshita, N. Komoda","doi":"10.5220/0005999100950098","DOIUrl":"https://doi.org/10.5220/0005999100950098","url":null,"abstract":"Service providers have been struggling with service infrastructure management in their data centers like \u0000 \u0000taking care of excess or shortage of physical resources. To solve the issue, we propose virtualization of \u0000 \u0000service infrastructure by connecting physical resources with hardware gateway and virtualize network \u0000 \u0000traffic among physical resources. With this approach, service providers can make their service infrastructure \u0000 \u0000more flexible and dynamically change service infrastructure configuration like adding or removing physical \u0000 \u0000resources on demand.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Histogram-based Network Anomaly Detection","authors":"C. Callegari, M. Pagano, S. Giordano, F. Berizzi","doi":"10.5220/0006013401030110","DOIUrl":"https://doi.org/10.5220/0006013401030110","url":null,"abstract":"The ability of capturing unknown attacks is an attractive feature of anomaly-based intrusion detection and it is not surprising that research on such a topic represents one of the most promising directions in the field of network security. In this work we consider two different traffic descriptors and evaluate their ability in capturing different kinds of anomalies, taking into account three different measures of similarity in order to discriminate between the normal network behaviour and the presence of anomalies. An extensive performance analysis, carried out over the publicly available MAWILab dataset, has highlighted that a proper choice of the relevant traffic descriptor and the similarity measure can be particularly efficient in the case of unknown attacks, i.e. those attacks that cannot be detected by standard misuse-based systems.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Manzanares-Lopez, J. P. Muñoz-Gea, Francisco M. Delicado Martínez, J. Malgosa-Sanahuja, Adrian Flores de la Cruz
{"title":"Host Discovery Solution: An Enhancement of Topology Discovery in OpenFlow based SDN Networks","authors":"P. Manzanares-Lopez, J. P. Muñoz-Gea, Francisco M. Delicado Martínez, J. Malgosa-Sanahuja, Adrian Flores de la Cruz","doi":"10.5220/0005967000800088","DOIUrl":"https://doi.org/10.5220/0005967000800088","url":null,"abstract":"Software Defined Networking (SDN) is an emerging paradigm based on the separation between the control \u0000 \u0000plane and the data plane. The knowledge of the network topology by the controller is essential to allow the \u0000 \u0000implementation of efficient solutions of network management and network resource utilization. Most of the \u0000 \u0000OpenFlow SDN controllers include a mechanism to discover the network nodes (router and switches) and \u0000 \u0000the links between them. However, they do not consider other important elements of the networks: the hosts. \u0000 \u0000In this paper we propose a host discovery mechanism to improve the topology discovery solutions in SDN \u0000 \u0000networks. The proposed mechanism, that has been coded as a software module in Ryu SDN controller, allows \u0000 \u0000the detection and tracking of hosts even when they donât generate traffic. The implemented software module \u0000 \u0000has been tested in emulated SDN networks and in real scenarios using ONetSwitch, a real programmable SDN \u0000 \u0000platform.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116360764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Catherine Boileau, F. Gagnon, Jérémie Poisson, Simon Frenette, M. Mejri
{"title":"A Comparative Study of Android Malware Behavior in Different Contexts","authors":"Catherine Boileau, F. Gagnon, Jérémie Poisson, Simon Frenette, M. Mejri","doi":"10.5220/0005997300470054","DOIUrl":"https://doi.org/10.5220/0005997300470054","url":null,"abstract":"One of the numerous ways of addressing the Android malware threat is to run malicious applications in a sandbox environment while monitoring metrics. However, dynamic malware analysis is usually concerned with a one-time execution of an application, and information about behaviour in different environments is lacking in the literature. We fill this gap with a fuzzy-like approach to the problem: by running the same malware multiple times in different environments, we gain insight on the malware behaviour and his peculiarities. To implement this approach, we leverage a client-server sandbox to run experiments, based on a common suit of actions. Scenarios are executed multiple times on a malware sample, each time with a different parameter, and results are compared to determine variation in observed behaviour. In our current experiment, variation was introduced by different levels of simulation, allowing us to compare metrics such as failure rate, data leakages, sending of SMS, and the number of HTTP and DNS requests. We find the behaviour is different for data leakages, which require no simulation to leak information, while all results for other metrics were higher when simulation was used in experiments. We expect that a fuzzing approach with others parameters will further our understanding of malware behaviour, particularly for malware bound to such parameters.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129687364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enrique de la Hoz, J. M. Giménez-Guzmán, German Lopez-Civera, Ivan Marsá-Maestre, David Orden
{"title":"TOWER: Topology Optimization for netWork Enhanced Resilience","authors":"Enrique de la Hoz, J. M. Giménez-Guzmán, German Lopez-Civera, Ivan Marsá-Maestre, David Orden","doi":"10.5220/0006017101210128","DOIUrl":"https://doi.org/10.5220/0006017101210128","url":null,"abstract":"Nowadays society is more and more dependent on critical infrastructures. Critical network infrastructures (CNI) are communication networks whose disruption can create a severe impact on other systems including critical infrastructures. In this work, we propose TOWER, a framework for the provision of adequate strategies to optimize service provision and system resilience in CNIs. The goal of TOWER is being able to compute new network topologies for CNIs under the event of malicious attacks. For doing this, TOWER takes into account a risk analysis of the CNI, the results from a cyber-physical IDS and a multilayer model of the network, for taking into account all the existing dependences. TOWER analyses the network structure in order to determine the best strategy for obtaining a network topology, taking into account the existing dependences and the potential conflicting interests when not all requirements can be met. Finally, we present some lines for further development of TOWER.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128182788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yamnia Rodríguez, Julio Barbancho Concejero, A. Viguria
{"title":"Indoor Localization of the Points of Interest using RO-SLAM","authors":"Yamnia Rodríguez, Julio Barbancho Concejero, A. Viguria","doi":"10.5220/0005569400350042","DOIUrl":"https://doi.org/10.5220/0005569400350042","url":null,"abstract":"This paper describes an indoor localization system based on RO-SLAM technique, which has been led to experimentation. The proposed system has been considered to have low power consumption. The nodes of the network are based on the well-known architecture TelosB. A distance estimation study has been developed in order to determine the relationship between radio power signal strength in a radio link and distance between nodes. This relationship has a high variability and given its importance for successful tracking, much of this work has been devoted to its study. This system could be applied as a usefull solution for localization in a warehouse, where GPS-based system does not work. Based on the results obtained, this system is deemed as feasible because the motes have been localized with an acceptable error (1.2 m) under real conditions.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduction of Mutual Coupling for UWB MIMO Antenna with a Broadband Balance T-Line","authors":"Imtiaz Alam, Luqman Ali, Syed Shah","doi":"10.5220/0006483100930096","DOIUrl":"https://doi.org/10.5220/0006483100930096","url":null,"abstract":"A broadband balance Ttype line is proposed to decrease the Mutual coupling of a smaller ultra-wide band (UWB) multiple-performance Multiple-Input-Multiple-Output receiving antenna. With the decoupling technique presented in this research, the UWB MIMO receiving antenna described covers the 3.1 – 9.4 GHz band with a decoupling of more than 17 dBs. The proposed broadband balance T-line is actually set in the margin area between two MIMO components and can be placed on the copper ground. A margin (radio antenna range) of 20*10 mm2 is achieved. The UWB MIMO receiving antenna is simulated and SParameters, radiation patterns are found to add productivity.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131112122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS Analysis on Cable Video Delivery Networks","authors":"Hiroaki Shikano, Takeshi Shibata, Qi Shen, M. Hanaoka, Mariko Miyaki, Masahide Ban, Prasad Rallapalli, Yukinori Sakashita","doi":"10.5220/0006436600850092","DOIUrl":"https://doi.org/10.5220/0006436600850092","url":null,"abstract":"Telecommunication service providers are now using analytics to differentiate their network services with better Quality of Service (QoS) and Quality of Experience (QoE) as well as to increase operational efficiency. Cable service providers have complex video delivery IP networks, and efficient management of such networks as well as reduction of service impairment time are imperative. We have developed a new cable service QoS analysis solution that provides an end-to-end view of the control and data-plane flows associated with delivery of a video channel and shows identified failure points. Initial evaluation revealed that the solution can reduce the service down time to 62.3% of what it would be without the solution.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115983888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kosala Perera, Udesh Gunarathne, B. Chathuranga, Chamika Ramanayake, A. Pasqual
{"title":"Hybrid Software Defined Networking Controller","authors":"Kosala Perera, Udesh Gunarathne, B. Chathuranga, Chamika Ramanayake, A. Pasqual","doi":"10.5220/0006423800770084","DOIUrl":"https://doi.org/10.5220/0006423800770084","url":null,"abstract":"There exists some common bottlenecks among the many available Software Defined Networking (SDN) controllers. Of these, the current analysis uses the Floodlight software controller to identify bottlenecks. The analysis has implemented these bottlenecks in a Field Programmable Gate Array (FPGA) in order to assess its feasibility. Thereafter, a Hybrid SDN controller has been developed. Generally Hybrid SDN refers to a networking approach where traditional networking and SDN protocols are used and operated in the same environment. Hybrid in this paper context refers to a controller which is developed both on software and hardware platforms in order to achieve a higher scalability which is a current issue existing in software controller, and thereby overcoming the identified bottlenecks. The analysis has offloaded computational intensive models to an FPGA and tested for performance. These performance figures have then been compared against the performance figures as of a stand-alone software controller.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandre Cormier, F. Gagnon, B. Esfandiari, T. Kunz
{"title":"Toward Testing Security Attacks and Defense Mechanisms for P2PSIP in MANETs with a Simulator","authors":"Alexandre Cormier, F. Gagnon, B. Esfandiari, T. Kunz","doi":"10.5220/0006478300430054","DOIUrl":"https://doi.org/10.5220/0006478300430054","url":null,"abstract":"Mobile Ad hoc NETworks (MANETs) are comprised of mobile devices communicating with each other over multi-hop wireless links. Because they do not require any fixed infrastructure, these networks are appropriate for communication in military operations, for example. The Session Initiation Protocol (SIP) is a standard for session establishment in Voice over IP context, notably, but is not adapted to MANETs and peer-to-peer (P2P) networks. Though solutions have been proposed, their security properties are not addressed in depth. We thus analyze the different threats affecting a military MANET used for P2PSIP, propose a security solution, based in large part on cryptographic challenges, to counter the identified threats and present some simulation-based experiment results for our proposed solution.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123832708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}