International Conference on Data Communication Networking最新文献

筛选
英文 中文
Virtualizing Service Infrastructure with Hardware Gateway in Data Center 使用硬件网关在数据中心虚拟化服务基础设施
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0005999100950098
Junji Kinoshita, N. Komoda
{"title":"Virtualizing Service Infrastructure with Hardware Gateway in Data Center","authors":"Junji Kinoshita, N. Komoda","doi":"10.5220/0005999100950098","DOIUrl":"https://doi.org/10.5220/0005999100950098","url":null,"abstract":"Service providers have been struggling with service infrastructure management in their data centers like \u0000 \u0000taking care of excess or shortage of physical resources. To solve the issue, we propose virtualization of \u0000 \u0000service infrastructure by connecting physical resources with hardware gateway and virtualize network \u0000 \u0000traffic among physical resources. With this approach, service providers can make their service infrastructure \u0000 \u0000more flexible and dynamically change service infrastructure configuration like adding or removing physical \u0000 \u0000resources on demand.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Histogram-based Network Anomaly Detection 一种新的基于直方图的网络异常检测方法
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0006013401030110
C. Callegari, M. Pagano, S. Giordano, F. Berizzi
{"title":"A Novel Histogram-based Network Anomaly Detection","authors":"C. Callegari, M. Pagano, S. Giordano, F. Berizzi","doi":"10.5220/0006013401030110","DOIUrl":"https://doi.org/10.5220/0006013401030110","url":null,"abstract":"The ability of capturing unknown attacks is an attractive feature of anomaly-based intrusion detection and it is not surprising that research on such a topic represents one of the most promising directions in the field of network security. In this work we consider two different traffic descriptors and evaluate their ability in capturing different kinds of anomalies, taking into account three different measures of similarity in order to discriminate between the normal network behaviour and the presence of anomalies. An extensive performance analysis, carried out over the publicly available MAWILab dataset, has highlighted that a proper choice of the relevant traffic descriptor and the similarity measure can be particularly efficient in the case of unknown attacks, i.e. those attacks that cannot be detected by standard misuse-based systems.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Host Discovery Solution: An Enhancement of Topology Discovery in OpenFlow based SDN Networks 主机发现解决方案:基于OpenFlow的SDN网络拓扑发现的增强
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0005967000800088
P. Manzanares-Lopez, J. P. Muñoz-Gea, Francisco M. Delicado Martínez, J. Malgosa-Sanahuja, Adrian Flores de la Cruz
{"title":"Host Discovery Solution: An Enhancement of Topology Discovery in OpenFlow based SDN Networks","authors":"P. Manzanares-Lopez, J. P. Muñoz-Gea, Francisco M. Delicado Martínez, J. Malgosa-Sanahuja, Adrian Flores de la Cruz","doi":"10.5220/0005967000800088","DOIUrl":"https://doi.org/10.5220/0005967000800088","url":null,"abstract":"Software Defined Networking (SDN) is an emerging paradigm based on the separation between the control \u0000 \u0000plane and the data plane. The knowledge of the network topology by the controller is essential to allow the \u0000 \u0000implementation of efficient solutions of network management and network resource utilization. Most of the \u0000 \u0000OpenFlow SDN controllers include a mechanism to discover the network nodes (router and switches) and \u0000 \u0000the links between them. However, they do not consider other important elements of the networks: the hosts. \u0000 \u0000In this paper we propose a host discovery mechanism to improve the topology discovery solutions in SDN \u0000 \u0000networks. The proposed mechanism, that has been coded as a software module in Ryu SDN controller, allows \u0000 \u0000the detection and tracking of hosts even when they don’t generate traffic. The implemented software module \u0000 \u0000has been tested in emulated SDN networks and in real scenarios using ONetSwitch, a real programmable SDN \u0000 \u0000platform.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116360764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Comparative Study of Android Malware Behavior in Different Contexts 不同环境下Android恶意软件行为的比较研究
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0005997300470054
Catherine Boileau, F. Gagnon, Jérémie Poisson, Simon Frenette, M. Mejri
{"title":"A Comparative Study of Android Malware Behavior in Different Contexts","authors":"Catherine Boileau, F. Gagnon, Jérémie Poisson, Simon Frenette, M. Mejri","doi":"10.5220/0005997300470054","DOIUrl":"https://doi.org/10.5220/0005997300470054","url":null,"abstract":"One of the numerous ways of addressing the Android malware threat is to run malicious applications in a sandbox environment while monitoring metrics. However, dynamic malware analysis is usually concerned with a one-time execution of an application, and information about behaviour in different environments is lacking in the literature. We fill this gap with a fuzzy-like approach to the problem: by running the same malware multiple times in different environments, we gain insight on the malware behaviour and his peculiarities. To implement this approach, we leverage a client-server sandbox to run experiments, based on a common suit of actions. Scenarios are executed multiple times on a malware sample, each time with a different parameter, and results are compared to determine variation in observed behaviour. In our current experiment, variation was introduced by different levels of simulation, allowing us to compare metrics such as failure rate, data leakages, sending of SMS, and the number of HTTP and DNS requests. We find the behaviour is different for data leakages, which require no simulation to leak information, while all results for other metrics were higher when simulation was used in experiments. We expect that a fuzzing approach with others parameters will further our understanding of malware behaviour, particularly for malware bound to such parameters.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129687364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TOWER: Topology Optimization for netWork Enhanced Resilience TOWER:网络增强弹性的拓扑优化
International Conference on Data Communication Networking Pub Date : 2016-07-26 DOI: 10.5220/0006017101210128
Enrique de la Hoz, J. M. Giménez-Guzmán, German Lopez-Civera, Ivan Marsá-Maestre, David Orden
{"title":"TOWER: Topology Optimization for netWork Enhanced Resilience","authors":"Enrique de la Hoz, J. M. Giménez-Guzmán, German Lopez-Civera, Ivan Marsá-Maestre, David Orden","doi":"10.5220/0006017101210128","DOIUrl":"https://doi.org/10.5220/0006017101210128","url":null,"abstract":"Nowadays society is more and more dependent on critical infrastructures. Critical network infrastructures (CNI) are communication networks whose disruption can create a severe impact on other systems including critical infrastructures. In this work, we propose TOWER, a framework for the provision of adequate strategies to optimize service provision and system resilience in CNIs. The goal of TOWER is being able to compute new network topologies for CNIs under the event of malicious attacks. For doing this, TOWER takes into account a risk analysis of the CNI, the results from a cyber-physical IDS and a multilayer model of the network, for taking into account all the existing dependences. TOWER analyses the network structure in order to determine the best strategy for obtaining a network topology, taking into account the existing dependences and the potential conflicting interests when not all requirements can be met. Finally, we present some lines for further development of TOWER.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128182788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indoor Localization of the Points of Interest using RO-SLAM 利用RO-SLAM进行室内兴趣点定位
International Conference on Data Communication Networking Pub Date : 2015-07-20 DOI: 10.5220/0005569400350042
Yamnia Rodríguez, Julio Barbancho Concejero, A. Viguria
{"title":"Indoor Localization of the Points of Interest using RO-SLAM","authors":"Yamnia Rodríguez, Julio Barbancho Concejero, A. Viguria","doi":"10.5220/0005569400350042","DOIUrl":"https://doi.org/10.5220/0005569400350042","url":null,"abstract":"This paper describes an indoor localization system based on RO-SLAM technique, which has been led to experimentation. The proposed system has been considered to have low power consumption. The nodes of the network are based on the well-known architecture TelosB. A distance estimation study has been developed in order to determine the relationship between radio power signal strength in a radio link and distance between nodes. This relationship has a high variability and given its importance for successful tracking, much of this work has been devoted to its study. This system could be applied as a usefull solution for localization in a warehouse, where GPS-based system does not work. Based on the results obtained, this system is deemed as feasible because the motes have been localized with an acceptable error (1.2 m) under real conditions.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reduction of Mutual Coupling for UWB MIMO Antenna with a Broadband Balance T-Line 宽频平衡t线UWB MIMO天线的互耦降低
International Conference on Data Communication Networking Pub Date : 1900-01-01 DOI: 10.5220/0006483100930096
Imtiaz Alam, Luqman Ali, Syed Shah
{"title":"Reduction of Mutual Coupling for UWB MIMO Antenna with a Broadband Balance T-Line","authors":"Imtiaz Alam, Luqman Ali, Syed Shah","doi":"10.5220/0006483100930096","DOIUrl":"https://doi.org/10.5220/0006483100930096","url":null,"abstract":"A broadband balance Ttype line is proposed to decrease the Mutual coupling of a smaller ultra-wide band (UWB) multiple-performance Multiple-Input-Multiple-Output receiving antenna. With the decoupling technique presented in this research, the UWB MIMO receiving antenna described covers the 3.1 – 9.4 GHz band with a decoupling of more than 17 dBs. The proposed broadband balance T-line is actually set in the margin area between two MIMO components and can be placed on the copper ground. A margin (radio antenna range) of 20*10 mm2 is achieved. The UWB MIMO receiving antenna is simulated and SParameters, radiation patterns are found to add productivity.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131112122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS Analysis on Cable Video Delivery Networks 有线视频传输网络的QoS分析
International Conference on Data Communication Networking Pub Date : 1900-01-01 DOI: 10.5220/0006436600850092
Hiroaki Shikano, Takeshi Shibata, Qi Shen, M. Hanaoka, Mariko Miyaki, Masahide Ban, Prasad Rallapalli, Yukinori Sakashita
{"title":"QoS Analysis on Cable Video Delivery Networks","authors":"Hiroaki Shikano, Takeshi Shibata, Qi Shen, M. Hanaoka, Mariko Miyaki, Masahide Ban, Prasad Rallapalli, Yukinori Sakashita","doi":"10.5220/0006436600850092","DOIUrl":"https://doi.org/10.5220/0006436600850092","url":null,"abstract":"Telecommunication service providers are now using analytics to differentiate their network services with better Quality of Service (QoS) and Quality of Experience (QoE) as well as to increase operational efficiency. Cable service providers have complex video delivery IP networks, and efficient management of such networks as well as reduction of service impairment time are imperative. We have developed a new cable service QoS analysis solution that provides an end-to-end view of the control and data-plane flows associated with delivery of a video channel and shows identified failure points. Initial evaluation revealed that the solution can reduce the service down time to 62.3% of what it would be without the solution.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115983888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Software Defined Networking Controller 混合软件定义网络控制器
International Conference on Data Communication Networking Pub Date : 1900-01-01 DOI: 10.5220/0006423800770084
Kosala Perera, Udesh Gunarathne, B. Chathuranga, Chamika Ramanayake, A. Pasqual
{"title":"Hybrid Software Defined Networking Controller","authors":"Kosala Perera, Udesh Gunarathne, B. Chathuranga, Chamika Ramanayake, A. Pasqual","doi":"10.5220/0006423800770084","DOIUrl":"https://doi.org/10.5220/0006423800770084","url":null,"abstract":"There exists some common bottlenecks among the many available Software Defined Networking (SDN) controllers. Of these, the current analysis uses the Floodlight software controller to identify bottlenecks. The analysis has implemented these bottlenecks in a Field Programmable Gate Array (FPGA) in order to assess its feasibility. Thereafter, a Hybrid SDN controller has been developed. Generally Hybrid SDN refers to a networking approach where traditional networking and SDN protocols are used and operated in the same environment. Hybrid in this paper context refers to a controller which is developed both on software and hardware platforms in order to achieve a higher scalability which is a current issue existing in software controller, and thereby overcoming the identified bottlenecks. The analysis has offloaded computational intensive models to an FPGA and tested for performance. These performance figures have then been compared against the performance figures as of a stand-alone software controller.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward Testing Security Attacks and Defense Mechanisms for P2PSIP in MANETs with a Simulator 用模拟器测试manet中P2PSIP的安全攻击和防御机制
International Conference on Data Communication Networking Pub Date : 1900-01-01 DOI: 10.5220/0006478300430054
Alexandre Cormier, F. Gagnon, B. Esfandiari, T. Kunz
{"title":"Toward Testing Security Attacks and Defense Mechanisms for P2PSIP in MANETs with a Simulator","authors":"Alexandre Cormier, F. Gagnon, B. Esfandiari, T. Kunz","doi":"10.5220/0006478300430054","DOIUrl":"https://doi.org/10.5220/0006478300430054","url":null,"abstract":"Mobile Ad hoc NETworks (MANETs) are comprised of mobile devices communicating with each other over multi-hop wireless links. Because they do not require any fixed infrastructure, these networks are appropriate for communication in military operations, for example. The Session Initiation Protocol (SIP) is a standard for session establishment in Voice over IP context, notably, but is not adapted to MANETs and peer-to-peer (P2P) networks. Though solutions have been proposed, their security properties are not addressed in depth. We thus analyze the different threats affecting a military MANET used for P2PSIP, propose a security solution, based in large part on cryptographic challenges, to counter the identified threats and present some simulation-based experiment results for our proposed solution.","PeriodicalId":172337,"journal":{"name":"International Conference on Data Communication Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123832708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信