{"title":"Protecting servers against DDoS attacks with improved source IP address monitoring scheme","authors":"H. H. Takada, A. Anzaloni","doi":"10.1109/NGI.2006.1678236","DOIUrl":"https://doi.org/10.1109/NGI.2006.1678236","url":null,"abstract":"DDoS attacks have caused severe damage to servers and are a great intimidation to the development of new services. Recently, a simple but robust detection system was proposed. The referred scheme is based on the monitoring of the source IP addresses of the incoming packets. However, it is possible to show that the proposed scheme is unable to identify correctly the end of an attack and a high variance in the measured statistic degrades its performance. In this paper, it is presented a detection algorithm to monitor the source IP addresses of the incoming packets. The new algorithm requires little calculations and it meets the requirement of real time detection. Simulations using both real and synthetic attacks proved that the improved system presents lower number of false positive alarms, is able to detect correctly the end of the attacks and to deal with high variances in the measured statistics","PeriodicalId":179284,"journal":{"name":"2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125409787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A model for TCP congestion control capturing the correlations in times between the congestion events","authors":"Esa Hyytiä, P. Emstad","doi":"10.1109/NGI.2006.1678238","DOIUrl":"https://doi.org/10.1109/NGI.2006.1678238","url":null,"abstract":"We consider a simplified model for the rate control of TCP sources. In particular, we assume idealized negative feedbacks upon reaching a certain total sending rate, i.e., at the moment when the total sending rate attains a given capacity limit c one of the TCP sources is given a negative feedback and the source reduces its sending rate in a multiplicative manner. Thus, the model takes into account the interactions between different flows appropriately at the microscopic level instead of assuming independence. For this model we are able to derive steady state equations and solve them. Furthermore, we are able to compute several important performance measures such as the mean and the variance of the total sending rate. Moreover, we are able to characterize the packet loss process at the bottleneck link and, in particular, the correlations therein","PeriodicalId":179284,"journal":{"name":"2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116619185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implicit admission control for a differentiated services network","authors":"Yuming Jiang, Anne Nevin, P. Emstad","doi":"10.1109/NGI.2006.1678262","DOIUrl":"https://doi.org/10.1109/NGI.2006.1678262","url":null,"abstract":"Admission control is a crucial network element for providing quality of service (QoS) guarantees in the Internet. In this paper, we propose a novel framework approach, called implicit admission control (iAC), for admission control in a differentiated services (DiffServ) network. In the iAC approach, admission control is performed distributedly at routers. No signaling is needed for exchanging service and traffic information between flows and routers. The service requirement and some coarse traffic information of a flow are carried by packets of the flow. Specifically, the DiffServ field is utilized for this purpose. At each router, admission control for the flow is performed when its first packet is detected. The admission test is based on the service requirement and traffic information carried by the DiffServ field of the packet, as well as the local traffic and resource information. In addition, to simplify admission control, two flow aggregation methods are adopted at each router. One is link-based fair aggregation (LBFA) for the deterministic expedited forwarding (EF) service. The other is dynamic priority based flow aggregation (DPFA) for the statistical assured forwarding (AF) service. Analytical results show that with these flow aggregation approaches, a newly admitted flow does not adversely affect QoS guarantees of existing flows. Consequently, admission test is needed only for the new flow","PeriodicalId":179284,"journal":{"name":"2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133012896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the optimal configuration of metro Ethernet for triple play","authors":"A. Kern, I. Moldován, T. Cinkler","doi":"10.1109/NGI.2006.1678259","DOIUrl":"https://doi.org/10.1109/NGI.2006.1678259","url":null,"abstract":"Triple Play requires cost-effective implementation of three services that are different in both traffic and QoS requirements. The methods applied for optimization of Ethernet trees must support not only point-to-point pipes but also point-to-multipoint connections for multicast and statistical multiplexing models for better resource allocation. In this paper we present a QoS architecture for Triple Play service over metro Ethernet networks. Based on the architecture we propose an optimization framework and a novel scalable heuristic algorithm that supports optimal off-line configuration of trees and optimal VLAN assignment to these trees. The optimized configuration considers traffic engineering (TE) objectives and can be performed via centralized management plane. The obtained results show, that the performance of the proposed optimization framework can be further improved if the aggregation pipes are statistically multiplexed. Meanwhile, the proposed algorithm remains scalable, i.e. its complexity does not increase at all","PeriodicalId":179284,"journal":{"name":"2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133753321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges in multi-hop networks","authors":"C. Rosenberg","doi":"10.1109/NGI.2006.1678214","DOIUrl":"https://doi.org/10.1109/NGI.2006.1678214","url":null,"abstract":"Wireless multi-hop networks have generated a lot of interest in the recent past due to their many potential applications. Examples of such networks are sensor, ad hoc, and mesh networks. These networks bring a lot of new challenges; some are linked to the wireless physical layer, some to the end-devices, and some to the multi-hop characteristic. A wireless channel is usually characterized by its broadcast nature, strong path loss, time varying fading and shadowing. Many wireless devices have limited battery and processing power. Multi-hopping implies the existence of many geographically distributed devices that share the wireless medium which creates the needs for efficient MAC and routing protocols to mitigate interference and take full advantage of spatial reuse. The complexity and time-varying attributes of the wireless channel seem to call for cross-layer integration, i.e., the need for the higher layers of the protocol stack to take into account the characteristics of the physical layer. In spite of a vast amount of research on multi-hop networks in the past few years, many fundamental challenges have not been answered. This presentation will ask fundamental questions on 3 of these challenges and bring some elements of response. The first challenge is the design of a fair and efficient MAC protocol. Another one is to find the right level of cross-layer interactions to design schemes that are more efficient while maintaining the robustness and the usability of the system. Another challenge is to understand the fundamental limits of multi-hop networks in realistic scenarios","PeriodicalId":179284,"journal":{"name":"2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116474854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fault-tolerant protocol for railway control systems","authors":"Jaime Lloret, F. Sánchez, J. Díaz, J. M. Jiménez","doi":"10.1109/NGI.2006.1678256","DOIUrl":"https://doi.org/10.1109/NGI.2006.1678256","url":null,"abstract":"Railway control systems are largely based on data communication and network technologies. With the adoption of Ethernet-IP as the main technology for building end-to-end real-time networks on railway control systems, the requirement to deliver high availability, quality and secure services over Ethernet has become strategic. Critical real-time traffic is generally penalized and the maximum restoration time of 50 msec sometimes is exceeded because of real-time applications hangings, so passengers' safety could be committed. It occurs on more than twenty percent of critical fail tests performed. Our main goal is to minimize restoration time from the application point of view. This article describes a protocol to improve critical real-time railway control systems. The algorithm designed gives us fast recoveries when railway computers fail down. The protocol permits to manage the railway control system from every computer in the network mixing unicast and multicast messages. Simulations obtained for a real railway line are shown. We have reached excellent results limiting critical failures recoveries to less than 50 msec","PeriodicalId":179284,"journal":{"name":"2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128336713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic predictability based on ARIMA/GARCH model","authors":"B. Zhou, D. He, Z. Sun","doi":"10.1109/NGI.2006.1678242","DOIUrl":"https://doi.org/10.1109/NGI.2006.1678242","url":null,"abstract":"The predictability of Internet traffic is a significant interest in many domains such as adaptive applications, congestion control, admission control, and network management. In this paper, we propose a new traffic prediction model called autoregressive integrated moving average with generalized autoregressive conditional heteroscedasticity (ARIMA/GARCH), which can capture traffic burstiness and exhibit self-similarity and long-range dependence (LRD). We discuss network traffic predictability related to different prediction applications and measure methods. We validate our prediction model by comparing with other models, includes non-model-based minimum mean square error (MMSE), pure self-similar fractional ARIMA (FARIMA). We use the real network traces to evaluate models. The results show that MMSE computation is simplest and fastest and can apply for online prediction applications. The results also show that FARIMA predictability relies on strong degree of self-similarity, our proposed ARIMA/GARCH model get the best adaptability and accuracy. Therefore ARIMA/GARCH model can be used for exact prediction applications","PeriodicalId":179284,"journal":{"name":"2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129356096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detailed analysis of eDonkey transfers on ADSL","authors":"Louis Plissonneau, Jean-Laurent Costeux, P. Brown","doi":"10.1109/NGI.2006.1678249","DOIUrl":"https://doi.org/10.1109/NGI.2006.1678249","url":null,"abstract":"The large use of P2P systems gives rise to the question of the performance of these applications. The performance evaluation of P2P systems can be undertaken in many ways. Here, we focus mainly on file retrieval performance, i.e., the time to download a file, the throughput of downloads and the waiting time before the transfer begins. Our study is based on an ADSL concentration point with a large number of residential users. We analyze the TCP connections of eDonkey peers. Our measurement tool gives us the possibility to put together all the connections downloading the same file and thus, to study the general efficiency of file download. Our results indicate that the waiting time is important and independent of file popularity and that the average throughput is very low and has an unexpected dependence on file popularity. The performances vary significantly, such that on the one hand most of the transfers encounter low throughputs, and on the other hand some achieve very fast download rates","PeriodicalId":179284,"journal":{"name":"2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126972599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A fast and efficient backup routing scheme with bounded delay guarantees","authors":"Enrique Hernández-Orallo, J. Vila-Carbó","doi":"10.1109/NGI.2006.1678252","DOIUrl":"https://doi.org/10.1109/NGI.2006.1678252","url":null,"abstract":"Reliable transmission is essential for several real-time applications. Backup channels introduce the notion of availability at the cost of increasing the use of network resources. However, this over provisioning of resources is potentially wasted, since packet delays are usually lower than the required end-to-end channel delay. The goal of this paper is to present a new scheme for obtaining the primary and backup paths maximizing the admission of channel in a network. This paper uses a new failure detection scheme for selecting the primary and backup paths denominated proactive backup channel. This scheme is based on activating the backup channel before a fail is produced. The experiments show that using this new scheme the admission rate (the number of channels a network can accept) is improved considerably. The paper also presents the application of this scheme to IP networks using TCP trunking","PeriodicalId":179284,"journal":{"name":"2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126935510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grade of service balancing for originating and handoff calls and system cost minimization using genetic algorithm","authors":"S. Fakoorian, H. Taheri","doi":"10.1109/NGI.2006.1678226","DOIUrl":"https://doi.org/10.1109/NGI.2006.1678226","url":null,"abstract":"With the increasing popularity of mobile wireless communication systems, customers are expecting the same quality of service (QoS), availability and performance from the wireless communication networks as the traditional wire-line networks. Currently the research work on radio channel allocation in cellular mobile systems focuses mainly on two aspects, improving the user admission capability and protecting the connection continuity for handoff calls as a QoS constraint. However, given a QoS constraint, a wireless network has to sacrifice its capacity in order to support an increase in handoff rate. In this paper, we propose and analyze a different handoff scheme which not only gives priority to handoff calls, due to importance of them from QoS standpoint, but also protects originating calls to keep system capacity at an acceptable level. We will describe the optimum design of our scheme to minimize the system cost. We use genetic algorithm (GA) to solve optimum design problem. To do so, a model of cost characteristics has been derived for the proposed scheme. Indeed, the robustness of our approach is that analytically minimizes the system cost. We use a system model defined by a two dimensional Markov chain which computes mathematically the performance in terms of the blocking probability of originating calls, forced termination probability and call incompletion probability. Results are compared with conventional guard channel (GC) scheme","PeriodicalId":179284,"journal":{"name":"2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121004110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}