2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)最新文献

筛选
英文 中文
Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors 反病毒产品检测能力比较——基于同一厂商不同版本产品的实证研究
Areej Algaith, Ilir Gashi, Bertrand Sobesto, M. Cukier, Selman Haxhijaha, Gazmend Bajrami
{"title":"Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same Vendors","authors":"Areej Algaith, Ilir Gashi, Bertrand Sobesto, M. Cukier, Selman Haxhijaha, Gazmend Bajrami","doi":"10.1109/DSN-W.2016.45","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.45","url":null,"abstract":"In this paper we report results of an empirical analysis of the detection capabilities of 9 AntiVirus (AV) products when they were subjected to 3605 malware samples collected on an experimental network over a period of 31 days in NovemberDecember 2013. We compared the detection capabilities of the version of the AV products that the vendors make available for free in VirusTotal versus the full capability products that they make available via their own website. The analysis has been done using externally observable properties of the AV products: namely whether they detect a given malware. The paper reports extensive analysis of the results. A surprising finding of our study was that only one of the vendors had a full capability version which detected all the malware that their VirusTotal version could detect.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130362340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Profiling Memory Vulnerability of Big-Data Applications 大数据应用内存漏洞分析
N. Rameshan, R. Birke, Leandro Navarro-Moldes, Vladimir Vlassov, B. Urgaonkar, G. Kesidis, M. Schmatz, L. Chen
{"title":"Profiling Memory Vulnerability of Big-Data Applications","authors":"N. Rameshan, R. Birke, Leandro Navarro-Moldes, Vladimir Vlassov, B. Urgaonkar, G. Kesidis, M. Schmatz, L. Chen","doi":"10.1109/DSN-W.2016.58","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.58","url":null,"abstract":"Motivated by the increasing popularity of hosting in-memory big-data analytics in cloud, we present a profiling methodology that can understand how different memory subsystems, i.e., cache and memory bandwidth, are susceptible to the impact of interference from co-located applications. We first describe the design of the proposed tool and demonstrate a case study consisting of five Spark applications on real-life data set.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125886965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers 路由验证即服务(RVaaS):不受不安全提供者影响的可靠路由
Liron Schiff, K. Thimmaraju, S. Schmid
{"title":"Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers","authors":"Liron Schiff, K. Thimmaraju, S. Schmid","doi":"10.1109/DSN-W.2016.42","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.42","url":null,"abstract":"Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not!) been taken by their packets. Rather, it seems inevitable that as soon as a packet leaves the network card, the user is forced to trust the network provider to forward the packets as expected or agreed upon. This can be undesirable, especially in the light of today's trend toward more programmable networks: after a successful cyber attack on the network management system or Software-Defined Network (SDN) control plane, an adversary in principle has complete control over the network. This paper presents a low-cost and efficient solution to detect misbehaviors and ensure trustworthy routing over untrusted or insecure providers, in particular providers whose management system or control plane has been compromised (e.g., using a cyber attack). We propose Routing-Verification-as-a-Service (RVaaS): RVaaS offers clients a flexible interface to query information relevant to their traffic, while respecting the autonomy of the network provider. RVaaS leverages key features of OpenFlow-based SDNs to combine (passive and active) configuration monitoring, logical data plane verification and actual in-band tests, in a novel manner.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115723178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers MimeoDroid:通过机器学习分类器对克隆设备进行大规模动态应用分析
Parvez Faruki, A. Zemmari, M. Gaur, V. Laxmi, M. Conti
{"title":"MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers","authors":"Parvez Faruki, A. Zemmari, M. Gaur, V. Laxmi, M. Conti","doi":"10.1109/DSN-W.2016.33","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.33","url":null,"abstract":"The exponential adoption of Android applications (apps) among the users has attracted malware authors to evade the default emulator based dynamic analysis systems. The evolving Android malware behaves benign once it identifies Goldfish emulator, often used for app development and malware analysis. Once a malware identifies the Goldfish virtual device, it behaves benign or prevents malicious code execution. The exponential increase of such stealth malware necessitates a detection approach which coerces the malicious apps to reveal the hidden behavior. To detect malicious apps and characterize their association we propose MimeoDroid (enriched replica of real Android device), a modified virtual clone to coerce the malware to believe being executed on an actual device. We automate relevant feature extraction and classification of Processor, memory usage, Binder IPC transfers, network interaction, battery charging status and manifest permission(s) to detect malicious behavior using Tree based machine learning classifiers. MimeoDroid is a lightweight machine learning based malware analysis and characterization to detect malicious apps that would evade the existing analyzers.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"58 S276","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132227958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Towards Black-Box Anomaly Detection in Virtual Network Functions 虚拟网络功能中的黑匣子异常检测研究
Carla Sauvanaud, Kahina Lazri, M. Kaâniche, K. Kanoun
{"title":"Towards Black-Box Anomaly Detection in Virtual Network Functions","authors":"Carla Sauvanaud, Kahina Lazri, M. Kaâniche, K. Kanoun","doi":"10.1109/DSN-W.2016.17","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.17","url":null,"abstract":"The maturity of hardware virtualization has motivated communication service providers to apply this paradigm to network services. Virtual Network Functions (VNFs) come from this motivation and refer to any virtual execution environment configured to provide a given network service. VNFs constitute a new paradigm and related dependability evaluation mechanisms are still not thoroughly defined. In this paper we propose a preliminary evaluation of an anomaly detection approach applied to VNFs. Our approach uses a supervised machine learning algorithm. It notably relies on data provided by the underlying hypervisor of the VMs hosting the VNF, making it a black-box approach. Such an approach is actually well suited for infrastructure or telecommunication service providers willing to deploy tools that are easily configurable while reducing deployment costs. We validate our approach with the case study of the vIMS (IP Multimedia Subsystem) implemented by the Clearwater project.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116960234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Bayesian Networks Based Method for Ship Reliability Assessment 基于贝叶斯网络的船舶可靠性评估方法
Hong Dong Wang, Xiaofeng Liang, H. Yi, Dan Li
{"title":"A Bayesian Networks Based Method for Ship Reliability Assessment","authors":"Hong Dong Wang, Xiaofeng Liang, H. Yi, Dan Li","doi":"10.1109/DSN-W.2016.16","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.16","url":null,"abstract":"Reliability assessment is a key step to reveal whether ships feature an acceptable level of reliability. Ships are typical dynamic systems, and their reliability cannot be evaluated using the static logic based methods, such as the analytic method, multilevel synthesis method and numerical simulation method. Fully considering the characteristics of ships, we proposed a new reliability assessment method based on dynamic Bayesian networks and numerical simulation. The proposed method overcomes the limitations of the analytic method and multilevel synthesis method, as well as provides an effective means for the reliability assessment of ships. The proposed method is also suitable for the reliability assessment of other complex dynamic systems.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123158430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Avionics Communication Network 分布式航空电子通信网络
Paul Boivin Champeaux, D. Faura, M. Gatti, William Terroy
{"title":"A Distributed Avionics Communication Network","authors":"Paul Boivin Champeaux, D. Faura, M. Gatti, William Terroy","doi":"10.1109/DSN-W.2016.60","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.60","url":null,"abstract":"Today, the avionics platforms are developedaccording to the Integrated Modular Avionics (IMA) concept, allowing one processing module to host one or several applications in order to reduce Space, Weight, Power (SWaP) and costs. According to this evolution, network architectures were developed inwhich modules are interconnected and communicate through a deterministic network which should support critical inter system communications and also a part of intra system communications. The favored answer fully compliant with IMA platform properties for the Avionic Data Network architecture is a centralized communication system using several Avionic Switches as centralequipment's compliant to the standard ARINC 664 Part 7, which defines a deterministic switched communication network at 100 Mbps per link using an Ethernet frame structure. However, a centralized communication system for some aircrafts or helicopters requiring a \"small\"Avionics Data Network is a major overhead for the avionics suite in term of size, weight and globallycost like to the fact that to fulfill the constraints of availability and segregation inside the communication system at least a number of 2 or 4 switches shall be used. This negative impact is stressed by the necessity to upload the configuration tables for each location and to monitor A664 part 7 switch as avionics equipment. A promising approach that allows optimizing SWaP (less Size, Weight and Power) than the currentmain A664 Avionic Data Network is the evolution from the centralized communication system to a distributed communication system without anyadditional dedicated communication equipment. Nevertheless, to fulfill issues like data flow latency mastering, segregation, network availability in case of subscriber loss, configuration should beaddressed while keeping the ARINC 664 properties as data flow partitioning, monitoring and frame structure.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128440376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Availability Modelling of Software-Defined Backbone Networks 软件定义骨干网的可用性建模
G. Nencioni, B. Helvik, Andrés J. Gonzalez, P. Heegaard, Andrzej Kamisiński
{"title":"Availability Modelling of Software-Defined Backbone Networks","authors":"G. Nencioni, B. Helvik, Andrés J. Gonzalez, P. Heegaard, Andrzej Kamisiński","doi":"10.1109/DSN-W.2016.28","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.28","url":null,"abstract":"Software-Defined Networking (SDN) promises to improve the programmability and flexibility of networks, but it may also bring new challenges that need to be explored. The main objective of this paper is to present a quantitative assessment of the properties of SDN backbone networks to determine whether they can provide similar availability to the traditional IP backbone networks. To achieve this goal, we have completed the following steps: i) we formalized a two-level availability model that is able to capture the global network connectivity without neglecting the essential details: ii) we proposed Markov models for characterizing the single network elements in both SDN and traditional networks: iii) we carried out an extensive sensitivity analysis of a~national and a~world-wide backbone networks. The results have highlighted the considerable impact of operational and management (O&M) failures on the overall availability of SDN. High O&M failure intensity may reduce the availability of SDN as much as one order of magnitude compared to traditional networks. Moreover, the results show that the impact of software and hardware failures on the overall availability of SDN can be significantly reduced through proper overprovisioning of the SDN controller(s).","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Experience with 3 SDN Controllers in an Enterprise Setting 具有在企业环境中使用3个SDN控制器的经验
Zhiyuan Teo, K. Birman, R. V. Renesse
{"title":"Experience with 3 SDN Controllers in an Enterprise Setting","authors":"Zhiyuan Teo, K. Birman, R. V. Renesse","doi":"10.1109/DSN-W.2016.20","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.20","url":null,"abstract":"Interest in OpenFlow and software-defined network (SDNs) has resulted in a boom in SDN hardware and controller offerings, with varying degrees of maturity, popularity and support. However, few studies have been conducted to investigate the interaction between SDN hardware and software, as well as its impact on controller design and implementation. In this paper, we chronicle our experience with deploying two commodity SDN controllers and a new system, IronStack, of our own design in a production enterprise network at Cornell University, and describe the lessons learnt. We also report on several practical limitations of SDN and controller technology, and detail important future challenges for SDN adopters and developers.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130612707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
KAR: Key-for-Any-Route, a Resilient Routing System Key-for-Any-Route,一个弹性路由系统
Rodolfo R. Gomes, A. Liberato, C. Dominicini, M. Ribeiro, M. Martinello
{"title":"KAR: Key-for-Any-Route, a Resilient Routing System","authors":"Rodolfo R. Gomes, A. Liberato, C. Dominicini, M. Ribeiro, M. Martinello","doi":"10.1109/DSN-W.2016.11","DOIUrl":"https://doi.org/10.1109/DSN-W.2016.11","url":null,"abstract":"This paper proposes KAR (Key-for-Any-Route), a new intra-domain resilient routing system in which edge-nodes set a route ID to select any existing route as an alternative to safely forward packets to their destination. In KAR routing system, a route is defined as the remainder of the division between a route ID and a set of switch IDs along the path(s) between a pair of nodes. KAR-enabled switches explore the existing routes by using special properties of Residue Number System as our encoding technique. Packets are deviated from the faulty link (liveness condition) with routing deflections. Deflected packets are guided to their original destination due to resilient forwarding paths added to the route ID. Three deflection methods are discussed along emulation experiments. Results show that KAR efficiently allows deflected packets to automatically reach their destination, imposing a bound on packets disordering measured in TCP throughput.","PeriodicalId":184154,"journal":{"name":"2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132524281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信