International Conference on Dependable Systems and Networks (DSN'06)最新文献

筛选
英文 中文
A Statistical Analysis of Attack Data to Separate Attacks 对攻击数据进行统计分析,区分攻击
International Conference on Dependable Systems and Networks (DSN'06) Pub Date : 2006-06-25 DOI: 10.1109/DSN.2006.9
M. Cukier, R. Berthier, S. Panjwani, Stephanie Tan
{"title":"A Statistical Analysis of Attack Data to Separate Attacks","authors":"M. Cukier, R. Berthier, S. Panjwani, Stephanie Tan","doi":"10.1109/DSN.2006.9","DOIUrl":"https://doi.org/10.1109/DSN.2006.9","url":null,"abstract":"This paper analyzes malicious activity collected from a test-bed, consisting of two target computers dedicated solely to the purpose of being attacked, over a 109 day time period. We separated port scans, ICMP scans, and vulnerability scans from the malicious activity. In the remaining attack data, over 78% (i.e., 3,677 attacks) targeted port 445, which was then statistically analyzed. The goal was to find the characteristics that most efficiently separate the attacks. First, we separated the attacks by analyzing their messages. Then we separated the attacks by clustering characteristics using the K-Means algorithm. The comparison between the analysis of the messages and the outcome of the K-Means algorithm showed that 1) the mean of the distributions of packets, bytes and message lengths over time are poor characteristics to separate attacks and 2) the number of bytes, the mean of the distribution of bytes and message lengths as a function of the number packets are the best characteristics for separating attacks","PeriodicalId":228470,"journal":{"name":"International Conference on Dependable Systems and Networks (DSN'06)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Student Forum 学生论坛
International Conference on Dependable Systems and Networks (DSN'06) Pub Date : 2006-04-01 DOI: 10.1080/09747338.2006.11415869
Christof Fetzer
{"title":"Student Forum","authors":"Christof Fetzer","doi":"10.1080/09747338.2006.11415869","DOIUrl":"https://doi.org/10.1080/09747338.2006.11415869","url":null,"abstract":"The Student Forum will provide an opportunity for students working in the area of dependable computing to present and discuss their research objectives, approaches and preliminary results. The Forum is centered around a conference track during which the selected \"student research papers\" are presented.","PeriodicalId":228470,"journal":{"name":"International Conference on Dependable Systems and Networks (DSN'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A General Framework for Scalability and Performance Analysis of DHT Routing Systems DHT路由系统可扩展性和性能分析的通用框架
International Conference on Dependable Systems and Networks (DSN'06) Pub Date : 2006-03-28 DOI: 10.1109/DSN.2006.4
J. S. Kong, J. S. A. Bridgewater, V. Roychowdhury
{"title":"A General Framework for Scalability and Performance Analysis of DHT Routing Systems","authors":"J. S. Kong, J. S. A. Bridgewater, V. Roychowdhury","doi":"10.1109/DSN.2006.4","DOIUrl":"https://doi.org/10.1109/DSN.2006.4","url":null,"abstract":"In recent years, many DHT-based P2P systems have been proposed, analyzed, and certain deployments have reached a global scale with nearly one million nodes. One is thus faced with the question of which particular DHT system to choose, and whether some are inherently more robust and scalable. Toward developing such a comparative framework, we present the reachable component method (RCM) for analyzing the performance of different DHT routing systems subject to random failures. We apply RCM to five DHT systems and obtain analytical expressions that characterize their routability as a continuous function of system size and node failure probability. An important consequence is that in the large-network limit, the routability of certain DHT systems go to zero for any non-zero probability of node failure. These DHT routing algorithms are therefore unscalable, while some others, including Kademlia, which powers the popular eDonkey P2P system, are found to be scalable","PeriodicalId":228470,"journal":{"name":"International Conference on Dependable Systems and Networks (DSN'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123966907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage 擦除编码拜占庭分布式存储的最佳弹性
International Conference on Dependable Systems and Networks (DSN'06) Pub Date : 2005-09-26 DOI: 10.1109/DSN.2006.56
C. Cachin, Stefano Tessaro
{"title":"Optimal Resilience for Erasure-Coded Byzantine Distributed Storage","authors":"C. Cachin, Stefano Tessaro","doi":"10.1109/DSN.2006.56","DOIUrl":"https://doi.org/10.1109/DSN.2006.56","url":null,"abstract":"We analyze the problem of efficiently storing large amounts of data on a distributed set of servers that may be accessed concurrently from multiple clients by sending messages over an asynchronous network. Up to one third of the servers and an arbitrary number of clients may be faulty and exhibit Byzantine behavior. We provide the first simulation of a multiple-writer multiple-reader atomic read/write register using erasure-coding in this setting that achieves optimal resilience and minimal storage overhead. Additionally, we give the first implementation of non-skipping timestamps which provides optimal resilience and withstands Byzantine clients; it is based on threshold cryptography","PeriodicalId":228470,"journal":{"name":"International Conference on Dependable Systems and Networks (DSN'06)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128481532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 119
Automatic Instruction-Level Software-Only Recovery 自动指令级软件恢复
International Conference on Dependable Systems and Networks (DSN'06) Pub Date : 1900-01-01 DOI: 10.1109/MM.2007.4
George A. Reis, J. Chang, David I. August
{"title":"Automatic Instruction-Level Software-Only Recovery","authors":"George A. Reis, J. Chang, David I. August","doi":"10.1109/MM.2007.4","DOIUrl":"https://doi.org/10.1109/MM.2007.4","url":null,"abstract":"As chip densities and clock rates increase, processors are becoming more susceptible to transient faults that can affect program correctness. Computer architects have typically addressed reliability issues by adding redundant hardware, but these techniques are often too expensive to be used widely. Software-only reliability techniques have shown promise in their ability to protect against soft-errors without any hardware overhead. However, existing low-level software-only fault tolerance techniques have only addressed the problem of detecting faults, leaving recovery largely unaddressed. In this paper, we present the concept, implementation, and evaluation of automatic, instruction-level, software-only recovery techniques, as well as various specific techniques representing different trade-offs between reliability and performance. Our evaluation shows that these techniques fulfill the promises of instruction-level, software-only fault tolerance by offering a wide range of flexible recovery options","PeriodicalId":228470,"journal":{"name":"International Conference on Dependable Systems and Networks (DSN'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123958342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Fast Abstracts 快速提取
International Conference on Dependable Systems and Networks (DSN'06) Pub Date : 1900-01-01 DOI: 10.1109/DSN.2006.36
S. Bagchi
{"title":"Fast Abstracts","authors":"S. Bagchi","doi":"10.1109/DSN.2006.36","DOIUrl":"https://doi.org/10.1109/DSN.2006.36","url":null,"abstract":"Fast Abstracts are lightly refereed short presentations of work in progress or opinion pieces that can cover any and all facets of dependable systems and networks.","PeriodicalId":228470,"journal":{"name":"International Conference on Dependable Systems and Networks (DSN'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123216652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workshop on Architecting Dependable Systems (WADS) 建立可靠系统工作坊
International Conference on Dependable Systems and Networks (DSN'06) Pub Date : 1900-01-01 DOI: 10.1109/DSN.2006.78
R. Lemos, C. Gacek, A. Romanovsky
{"title":"Workshop on Architecting Dependable Systems (WADS)","authors":"R. Lemos, C. Gacek, A. Romanovsky","doi":"10.1109/DSN.2006.78","DOIUrl":"https://doi.org/10.1109/DSN.2006.78","url":null,"abstract":"This workshop will continue the initiative, which started four years ago, of bringing together the international communities of dependability and software architectures. The first workshop on Architecting Dependable Systems was organised during the International Conference on Software Engineering 2002 (ICSE), and since then five workshops were organised and three books were published (http://www.cs.kent.ac.uk/wads). This activity has culminated in 2004 with the organisation of the Twin Workshops that were held at ICSE 2004 and DSN 2004. This series of workshops have shown to be a fertile ground for both communities for clarifying approaches that have been previously tried and succeeded, as well as those that have been tried but have not yet shown to be successful. This not only helps avoid the reinvention of the wheel, but also clarifies and promotes areas where the most promising research may lie.","PeriodicalId":228470,"journal":{"name":"International Conference on Dependable Systems and Networks (DSN'06)","volume":"83 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信