Proceedings of the 2020 8th International Conference on Communications and Broadband Networking最新文献

筛选
英文 中文
Cryptographic Randomness Test of the Modified Hashing Function of SHA256 to Address Length Extension Attack 修改后的SHA256哈希函数对地址长度扩展攻击的密码随机性检验
Dan Michael A. Cortez, Ariel M. Sison, Ruji P. Medina
{"title":"Cryptographic Randomness Test of the Modified Hashing Function of SHA256 to Address Length Extension Attack","authors":"Dan Michael A. Cortez, Ariel M. Sison, Ruji P. Medina","doi":"10.1145/3390525.3390540","DOIUrl":"https://doi.org/10.1145/3390525.3390540","url":null,"abstract":"Length Extension attack is vulnerable to SHA256. It is a type of attack where certain types of hashes are misused as message authentication codes and allowing for inclusion of extra information. In this study, the researchers introduced an improved padding scheme and hashing process for SHA256 to address this problem. To prove that the modified hash function is cryptographically secure, statistical tests using Strict Avalanche Effect, Frequency Test (Monobit), Frequency Test within a Block, and Run Test were performed to evaluate the results of the Message Digest. Test results show that the number of ones and zeros in each element is distributed uniformly random in the final hash value. Additionally, runtime execution is much faster in generating the hash code since it has reduced the number of rounds to 32.","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129013917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Quasi Analysis of Rainfall Prediction during Floods using Machine Learning 洪水期间降雨预测的机器学习拟分析
K. Bhargavi, G. Suma
{"title":"Quasi Analysis of Rainfall Prediction during Floods using Machine Learning","authors":"K. Bhargavi, G. Suma","doi":"10.1145/3390525.3390535","DOIUrl":"https://doi.org/10.1145/3390525.3390535","url":null,"abstract":"Floods are the most common natural disasters and researchers turned their spotlight on prediction of rainfall for rescuing lives of the people before or after its arrival. The intensity of flood majorly relies on heavy rainfall. If the rainfall is predicted well in advance it will be useful for taking precautionary measures. In this paper, predictive analysis is carried out using both classification and regression models. The prediction analysis is evaluated with the feature rain Tomorrow feature in the dataset. The computation analysis shows that prediction using Random Forest classifier and nth Polynomial regression gives exactness for assessment.","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132386056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of TCP Congestion Control in Data Center Networks Based on Stable Round Trip Time 基于稳定往返时间的数据中心网络TCP拥塞控制设计
Yi-Cheng Tsai, T. Hou, M. Chiu
{"title":"Design of TCP Congestion Control in Data Center Networks Based on Stable Round Trip Time","authors":"Yi-Cheng Tsai, T. Hou, M. Chiu","doi":"10.1145/3390525.3390528","DOIUrl":"https://doi.org/10.1145/3390525.3390528","url":null,"abstract":"Data center networks have become increasingly important over the years as they are what make cloud computing, mobile computing, machine learning, and artificial intelligence possible. TCP is the main transport layer protocol in the Internet. Its congestion control has evolved for decades, with many versions or variants having been proposed and improved. Among them, several well-known TCP versions have been implemented either in different versions of the OS kernel or in the data center. Whether it is based on packet loss, round-trip-time (RTT), or bandwidth-delay product (BDP), each has its own advantages and disadvantages. In this paper, we will review the characteristics of the data center, and then propose a TCP version that is more suitable for the data center and achieves reliable transmission with high throughput and low latency.","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crytojacking Classification based on Machine Learning Algorithm 基于机器学习算法的密码劫持分类
Wan Nur Aaisyah Binti Wan Mansor, Azuan Ahmad, Wan Shafiuddin Zainudin, M. Saudi, M. Kama
{"title":"Crytojacking Classification based on Machine Learning Algorithm","authors":"Wan Nur Aaisyah Binti Wan Mansor, Azuan Ahmad, Wan Shafiuddin Zainudin, M. Saudi, M. Kama","doi":"10.1145/3390525.3390537","DOIUrl":"https://doi.org/10.1145/3390525.3390537","url":null,"abstract":"The rise of cryptocurrency has resulted in a number of concerns. A new threat known as cryptojacking\" has entered the picture where cryptojacking malware is the trend for future cyber criminals, who infect computers, install cryptocurrency miners, and use stolen information from victim databases to set up wallets for illicit funds transfers. Worst by 2020, researchers estimate there will be 30 billion of IoT devices in the world. Majority of the devices are highly vulnerable to simple attacks based on weak passwords and unpatched vulnerabilities and poorly monitored. Thus it is the best projection that IoT become a perfect target for cryptojacking malwares. There are lacks of study that provide in depth analysis on cryptojacking malware especially in the classification model. As IoT devices requires small processing capability, a lightweight model are required for the cryptojacking malware detection algorithm to maintain its accuracy without sacrificing the performance of other process. As a solution, we propose a new lightweight cryptojacking classifier model based on instruction simplification and machine learning technique that can detect the cryptojacking classification algorithm. This research aims to study the features of existing cryptojacking classification algorithm, to enhanced existing algorithm and to evaluate the enhanced algorithm for cryptojacking malware classification. The output of this research will be significant used in detecting cryptojacking malware attacks that benefits multiple industries including cyber security contractors, oil and gas, water, power and energy industries which align with the National Cyber Security Policy (NCSP) which address the risks to the Critical National Information Infrastructure (CNII).","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133346316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MOOCs
M. Mahmud, Shiau Foong Wong, M. S. A. Bakar
{"title":"MOOCs","authors":"M. Mahmud, Shiau Foong Wong, M. S. A. Bakar","doi":"10.4135/9781483381503.n783","DOIUrl":"https://doi.org/10.4135/9781483381503.n783","url":null,"abstract":"Comparison of cMOOCs and xMOOCs. http://moocnewsandreviews.com/ultimate-guide-to-xmoocs-and-cmoocso/ http://www.mooc.es MiriadaX: plataforma en español de MiriadaX, impulsada por Telefónica y Universia (quien integra a 1.232 universidades de 23 países de Iberoamérica). http://miriadax.net/home Cursos Online Masivos y Abiertos, de la UNED: https://unedcoma.es Compare EdX and OpenMooc (both FLOSS) http://openmooc.org/2013/06/13/edx-source-code-released-and-compared-to-openmooc/","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116194689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Aided Color Shift Keying Transmission for LCD-to-Smartphone Optical Camera Communication Links lcd到智能手机光学相机通信链路的数据辅助色移键控传输
A. Pepe, S. Kumar, Zixian Wei, Hongyan Fu
{"title":"Data-Aided Color Shift Keying Transmission for LCD-to-Smartphone Optical Camera Communication Links","authors":"A. Pepe, S. Kumar, Zixian Wei, Hongyan Fu","doi":"10.1145/3390525.3390534","DOIUrl":"https://doi.org/10.1145/3390525.3390534","url":null,"abstract":"We propose and experimentally validate a data-aided optical camera communication link between commercially available liquid crystals display (LCD) transmitter and smartphone rear camera receiver. The wireless link has been tested on 4, 8 and 16-color shift keying (CSK) modulated signals and paired with an offline artificial neural network-based classification strategy to overcome distortions and disparities in the color representation. For a low luminosity transmitter of 250 cd/m2 and a 12-megapixels camera with 60 fps capture rate placed at 50 cm away were reached 1.95 kbps at 100% symbol classification accuracy, 2.93 kbps at 96.4% and 4.86 kbps at 93.8% for 4, 8 and 16-CSK, respectively.","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125006783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Quick Available-Bandwidth Measurement Method Based on Link Delay Growth Rate 一种基于链路延迟增长率的可用带宽快速测量方法
Junzheng Shi, Qingya Yang, Gaopeng Gou, G. Xiong
{"title":"An Quick Available-Bandwidth Measurement Method Based on Link Delay Growth Rate","authors":"Junzheng Shi, Qingya Yang, Gaopeng Gou, G. Xiong","doi":"10.1145/3390525.3390531","DOIUrl":"https://doi.org/10.1145/3390525.3390531","url":null,"abstract":"Available bandwidth(ABW) has become a key indicator of network measurement, in order to measuring measurement accuracy, in particular, the measurement speed with available bandwidth measurement is also very important. This paper proposes a quick available bandwidth method named QuickAbw, which obtains the available bandwidth quickly under the two link delay growth rates. The link delay growth rate is the rate of growth in the interval between probe packets over time when low-intrusion probe packets with equal intervals just cause link congestion. It is worth mentioning that the probe packets stop sending immediately after causing the link node to overflow, so this method has little impact on the link. Simulations show that QuickAbw has higher measurement accuracy and shorter measurement time than other well-known available bandwidth tools for comparison in a network with single bottleneck-link. Finally, we tested in a real environment consistent with the simulation environment settings, and the experimental results were basically consistent with the simulation results.","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129280628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proceedings of the 2020 8th International Conference on Communications and Broadband Networking 2020年第八届通信与宽带网络国际会议论文集
{"title":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","authors":"","doi":"10.1145/3390525","DOIUrl":"https://doi.org/10.1145/3390525","url":null,"abstract":"","PeriodicalId":201179,"journal":{"name":"Proceedings of the 2020 8th International Conference on Communications and Broadband Networking","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116609148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信