2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)最新文献

筛选
英文 中文
A load balancing mechanism for multiple SDN controllers based on load informing strategy 基于负载通知策略的多SDN控制器负载均衡机制
2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2016-10-01 DOI: 10.1109/APNOMS.2016.7737283
Jinke Yu, Y. Wang, Keke Pei, Shujuan Zhang, Jiacong Li
{"title":"A load balancing mechanism for multiple SDN controllers based on load informing strategy","authors":"Jinke Yu, Y. Wang, Keke Pei, Shujuan Zhang, Jiacong Li","doi":"10.1109/APNOMS.2016.7737283","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737283","url":null,"abstract":"Software defined networking (SDN) is currently regarded as one of the most promising paradigms of future Internet. Although the availability and scalability that a single and centralized controller suffers from could be alleviated by using multiple controllers, there lacks a flexible mechanism to balance load among controllers. This paper proposes a load balancing mechanism based on a load informing strategy for multiple distributed controllers. With the mechanism, a controller can make load balancing decision locally as rapidly as possible. Experiments based on floodlight show that our mechanism can balance the load of each controller dynamically and reduce the time of load balancing.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128812099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Whitelist representation for FTP service in SCADA system by using structured ACL model 用结构化ACL模型表示SCADA系统中FTP服务的白名单
2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2016-10-01 DOI: 10.1109/APNOMS.2016.7737251
W. Jung, Sung-Min Kim, Young-Hoon Goo, Myung-Sup Kim
{"title":"Whitelist representation for FTP service in SCADA system by using structured ACL model","authors":"W. Jung, Sung-Min Kim, Young-Hoon Goo, Myung-Sup Kim","doi":"10.1109/APNOMS.2016.7737251","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737251","url":null,"abstract":"Due to recent integration of SCADA systems with business systems, SCADA systems became open(unprotected), leading to not only security vulnerabilities increase but also sophisticated and intelligent cyber-attacks specifically targeting SCADA systems. A whitelist based security control technique that has attracted a lot of attention, is an emerging systems control, currently can be applied to solve security problems of the SCADA system. Most of the current security techniques for systems control based on whitelist, use static ACL model. But the static ACL model has limitations in use of ANY-ANY rule which is the only way to express communications using dynamic server port and express ranges of communication features in a control device. In this paper, we propose an structured ACL model to represent an FTP service to overcome the problem of dynamice server port in passive FTP. We demonstrate the feasibility of the proposed model in this paper by applying the FTP features extraction algorithm to FTP traffic.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121727654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An optimized solution of application layer protocol identification based on regular expressions 一种基于正则表达式的应用层协议识别优化方案
2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2016-10-01 DOI: 10.1109/APNOMS.2016.7737250
Tian Chen, X. Liao
{"title":"An optimized solution of application layer protocol identification based on regular expressions","authors":"Tian Chen, X. Liao","doi":"10.1109/APNOMS.2016.7737250","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737250","url":null,"abstract":"Deep Packet Inspection (DPI) is a widely used network protocol identification technology. Currently, Data flows on Internet are growing in every minute. Therefore, it's urgently demanded to improve the processing performance of the DPI engine. In this paper, we proposed an optimized solution based on regular expressions. We used an optimized algorithm to reduce the number of states of a deterministic finite automaton, in order to reduce memory space requirement of the DPI engine. Meanwhile, we improved the matching performance of the DPI engine by adopting a hybrid packet matching pattern.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121585988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Crowdsourcing platform for collaboration management in vulnerability verification 漏洞验证协同管理的众包平台
2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2016-10-01 DOI: 10.1109/APNOMS.2016.7737235
Hung-Jen Su, Jen-Yi Pan
{"title":"Crowdsourcing platform for collaboration management in vulnerability verification","authors":"Hung-Jen Su, Jen-Yi Pan","doi":"10.1109/APNOMS.2016.7737235","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737235","url":null,"abstract":"In recent years, vulnerability collection platforms become an important part to facilitate development of information security. Usually, platform administrators collect and ratify vulnerability information, which white hat hackers report at first hand, and users hence know which applications have doubts via vulnerability reports published on the platform. However, there are still few reported but unverified vulnerabilities, which may be caused from scarcity of testing targets and limitation of man power. These vulnerabilities might agitate those users who have related applications. This study initiates crowdsourcing to vulnerability collection platforms. The proposed platform collaborates administrators with two new added roles, script writers and target providers, aiming at vulnerability verification. In addition we design two agents, the test scheduler and the log collector, to automatically arrange test cases and collect logs, respectively. With properly scoring on task assignment, these crowd sources can effectively and efficiently collaborate on verification of timely and severe vulnerabilities. Hence this platform can speed up the progress of vulnerability assessment in information security.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133126492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ICBMS SM: A Smart Mediator for mashup service development ICBMS SM:用于混搭服务开发的智能中介
2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2016-10-01 DOI: 10.1109/APNOMS.2016.7737201
Doyoung Lee, Seyeon Jeong, Taeyeol Jeong, Jae-Hyoung Yoo, J. W. Hong
{"title":"ICBMS SM: A Smart Mediator for mashup service development","authors":"Doyoung Lee, Seyeon Jeong, Taeyeol Jeong, Jae-Hyoung Yoo, J. W. Hong","doi":"10.1109/APNOMS.2016.7737201","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737201","url":null,"abstract":"With the advancement of the Internet technologies, cloud services and various open data, there have been many active attempts to develop mashup services. To develop a mashup service, many data sources and service platforms should be interlinked. Therefore, efficient ways of interconnecting various service platforms and managing data are essential to provide easy service development environment. However, current mashup service development environments do not provide any of them, which forces each developer to fully understand every platforms, interfaces and data format to develop a mahsup service. So, it gives a big burden to mashup service developers and also hinders growth of mashup service industry. In this paper, we propose ICBMS Smart Mediator which connects IoT, cloud, big data, mobile, and security platforms and helps developers to easily utilize them with less overhead and provides easy access to data. We have designed and implemented the proposed ICBMS Smart Mediator and created a new mahsup service with the ICBMS Smart Mediator.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115767094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimating available bandwidth in mobile networks by correlation coefficient 利用相关系数估计移动网络的可用带宽
2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2016-10-01 DOI: 10.1109/APNOMS.2016.7737275
Yosuke Takano, Ryoichi Mutoh, N. Oguchi, S. Abe
{"title":"Estimating available bandwidth in mobile networks by correlation coefficient","authors":"Yosuke Takano, Ryoichi Mutoh, N. Oguchi, S. Abe","doi":"10.1109/APNOMS.2016.7737275","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737275","url":null,"abstract":"In recent years, as mobile devices increase, the demands for measuring the available bandwidth in a wireless network increase more and more to provide high quality network services. The available bandwidth is one of the most important parameters to determine the sending rate in WAN optimization. Pathload [2] is a technique to measure the available bandwidth by detecting the point where the receiving rate becomes lower than the sending rate of test packets. However, Pathload misdetects this point in mobile networks with packet losses caused by fading, interference, and so on. So, we propose a method to measure the available bandwidth by using correlation coefficients between the sending rate and packet loss rate, and then evaluate the accuracy of the proposed method.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Auto scaling of containerized ACSs for CPE management 用于CPE管理的容器化ACSs的自动扩展
2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2016-10-01 DOI: 10.1109/APNOMS.2016.7737232
Tse-Han Wang, Yen-Cheng Chen, Chen-Min Hsu, Kai-Sheng Hsu, Hey-Chyi Young
{"title":"Auto scaling of containerized ACSs for CPE management","authors":"Tse-Han Wang, Yen-Cheng Chen, Chen-Min Hsu, Kai-Sheng Hsu, Hey-Chyi Young","doi":"10.1109/APNOMS.2016.7737232","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737232","url":null,"abstract":"The increased popularity of over-the-top (OTT) services such as voice calls and text messaging popular has a great impact on the business of traditional telecom operations. It is important for a telecommunications company to maximize resource utilization so as to decrease OPEX/CAPEX (Operating Expense/Capital Expenditure). On the other hand, the deployment of a variety of digital services for broadband Internet access may complicate telecom operations. When more digital appliances, such as set-top boxes and IP cameras, are deployed at home, more configurations are required in both CPEs and POPs. CWMP is a management protocol between CPEs and auto configuration servers (ACSs) for remote management of those home network devices. It simplifies the service activation and configuration, and provides functionalities of diagnostics and monitoring. The scalability of ACS is an important issue as more CPEs and more configurations are needed, especially when a lot of Internet of Things (IoT) are widely adopted. This paper focuses on ACS containerization to deliver services quickly and to scale well. To dynamically control and manage the containerize ACS, we propose a middleware approach to support container management and to improve scalability horizontally based on designated policies.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mitigating DDoS attacks towards Top Level Domain name service 减少针对顶级域名服务的DDoS攻击
2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2016-10-01 DOI: 10.1109/APNOMS.2016.7737252
Lanlan Pan, Xuebiao Yuchi, Yong Chen
{"title":"Mitigating DDoS attacks towards Top Level Domain name service","authors":"Lanlan Pan, Xuebiao Yuchi, Yong Chen","doi":"10.1109/APNOMS.2016.7737252","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737252","url":null,"abstract":"As the largest country code Top Level Domain (ccTLD) name service, .CN receives billions of queries every day. Under the threat of Distributed Denial-of-Service (DDoS) attacks, effective mechanism for client classification is especially important for such busy ccTLD service. In this paper, by analyzing the query log of .CN name service, we propose a novel client classification method based on client query entropy and global recursive DNS service architecture. By checking with the query frequencies of the clients, we validate the effectiveness of the proposed method on both busy and long-tailed clients. We find that 2.32% clients can cover the most important web spiders, recursive servers, and well-known internet services, etc. The results indicate that, our method can bring significant benefits for creating the client whitelist, which is useful for mitigating DDoS attack towards Top Level Domain (TLD) name service.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mobile malware detection in sandbox with live event feeding and log pattern analysis 移动恶意软件检测沙箱与实时事件馈送和日志模式分析
2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2016-10-01 DOI: 10.1109/APNOMS.2016.7737204
Wei-Ting Lin, Jen-Yi Pan
{"title":"Mobile malware detection in sandbox with live event feeding and log pattern analysis","authors":"Wei-Ting Lin, Jen-Yi Pan","doi":"10.1109/APNOMS.2016.7737204","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737204","url":null,"abstract":"In recent years, the use of smart devices is becoming increasingly popular. All kinds of mobile applications are emerging. In addition to the official market, there are also many ways to allow users to download the mobile app. As unidentified instances of malware grow day by day, off-the-shelf malware detection methods identify malicious programs mainly with extracted signatures of codes, which only can effectively identify already known malwares, but not new malwares in initial spread. If no samples of these malwares are reported and the virus code library is not patched, users won't be alerted to the malwares. Therefore, this paper proposed a new detection method by live log analysis. A sandbox is conducted to mimic human operations and monitor responses from APPs. Feeding these manual events can excite deactivated malwares and improve the accuracy of log analysis, even though these malware are unknown yet. This study takes recent malwares and benign programs to conduct experiments, and then verifies the effectiveness of the proposed method comparing with those in other papers. The experimental results show that the proposed method outperforms in both hit rate and pass rate.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127546563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improvement of WMNs routing method for the purpose of reduction of control communications 改进WMNs路由方法以减少控制通信
2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS) Pub Date : 2016-10-01 DOI: 10.1109/APNOMS.2016.7737291
Shinya Yano, Kazunori Ueda
{"title":"Improvement of WMNs routing method for the purpose of reduction of control communications","authors":"Shinya Yano, Kazunori Ueda","doi":"10.1109/APNOMS.2016.7737291","DOIUrl":"https://doi.org/10.1109/APNOMS.2016.7737291","url":null,"abstract":"We propose the multiple branch collection routing (MBCR), a routing method for wireless mesh networks (WMNs), and the main purpose of which is to reduce control communications. The virtual address of a node is generated when the node joins a network through MBCR. Nodes that join the network can obtain necessary information only from their neighboring nodes. When data are transmitted to a destination node, each node uses information of its virtual address, and the virtual addresses of its neighboring and destination nodes. However, MBCR does not include a method to retrieve a destination virtual address.","PeriodicalId":194123,"journal":{"name":"2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124437870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信