2018 International Conference on Information Networking (ICOIN)最新文献

筛选
英文 中文
Analyzing darknet TCP traffic stability at different timescales 分析暗网TCP流量在不同时间尺度下的稳定性
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343098
Napaphat Vichaidis, H. Tsunoda, G. Keeni
{"title":"Analyzing darknet TCP traffic stability at different timescales","authors":"Napaphat Vichaidis, H. Tsunoda, G. Keeni","doi":"10.1109/ICOIN.2018.8343098","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343098","url":null,"abstract":"Darknet traffic analysis is a possible choice for observing global trends in security threats and analyzing the behavior of Internet attacks. We previously analyzed darknet traffic and evaluated the day to day stability. The investigation of traffic data identifies several anomalous events with drastic changes in instability mainly caused by distributed denial-of-service attacks, misconfigurations, scans, and backscatters. Our previous proposal is not adapted to detect small-scale events, where a small number of attackers send packets to the destination targets in a short duration. We analyze herein the cause of instabilities in transmission control protocol traffic at different timescales by investigating the number of senders to each destination port and the duration of the attack to classify the characteristics of diverse events. Some large-scale events can be detected from the instabilities in daily traffic, while some small-scale events can be detected from the instabilities of hourly traffic.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132506498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed detection and response for the mitigation of distributed denial of service attacks 用于缓解分布式拒绝服务攻击的分布式检测和响应
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343168
D. Grant
{"title":"Distributed detection and response for the mitigation of distributed denial of service attacks","authors":"D. Grant","doi":"10.1109/ICOIN.2018.8343168","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343168","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks continue to escalate in size and impact despite efforts to control and limit exposures that enable them to be successful. This proposal takes a novel approach to the DDoS problem, by combining separate existing information security technologies in a collaborative system. Devices used to gather evidence on attack methods and provide for reverse engineering malware are ‘honeypots’. These devices provide researchers with critically important information for analysis and eventually allow for development of detection and response mechanisms to malicious attacks. Intrusion prevention systems (IPS) can take action to alert administrators to potential misuse of computing assets, and in many cases execute predetermined response to malicious activity. This work tests operational communication between distributed honeypots and IPS devices to detect and actively respond to denial of service attacks at near machine speed.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130409436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of TCP congestion control algorithms with convolution neural networks 用卷积神经网络识别TCP拥塞控制算法
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343201
Takahiro Nogiwa, K. Hirata
{"title":"Identification of TCP congestion control algorithms with convolution neural networks","authors":"Takahiro Nogiwa, K. Hirata","doi":"10.1109/ICOIN.2018.8343201","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343201","url":null,"abstract":"Currently, various high-speed congestion control algorithms such as CUBIC and Compound TCP are used in order to accommodate sufficient bandwidths over high delay-bandwidth networks. CUBIC and Compound TCP have been implemented as the default congestion control algorithms in Linux and Microsoft Windows OS, respectively. However, Compound TCP drastically decreases its throughput when traffic flows of CUBIC and Compound TCP share a bottleneck link. In order to resolve this problem, it is necessary to identify them at the bottleneck link and suppress the throughput of CUBIC flows. In this paper, we propose an identification method of congestion control algorithms with image recognition using convolution neural networks. Through simulation experiments, we show the effectiveness of the proposed identification method.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An interest-driven peer-to-peer micro-blogging system over delay tolerant networks 基于延迟容忍网络的兴趣驱动点对点微博系统
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343169
Paul Alvin V. Sacedor, Victor M. Romero
{"title":"An interest-driven peer-to-peer micro-blogging system over delay tolerant networks","authors":"Paul Alvin V. Sacedor, Victor M. Romero","doi":"10.1109/ICOIN.2018.8343169","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343169","url":null,"abstract":"Micro-blogging has shown an astounding growth and has displayed people's affinity to share and consume information. Similarly, the capabilities of mobile devices such as smart phones have considerably improved revealing new approaches for content sharing and consumption. One can imagine that the important role played by micro-blogging services will persist, if not increase, in the years to come. While this may be true, it is also a fact that access to such services remain difficult for challenged areas where little to no infrastructure exists. To address this issue, We design a peer-to-peer micro-blogging system over delay tolerant networks using mobile devices as primary communication medium. Our approach leverages advancements in social network file sharing to facilitate better information dissemination and retrieval.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121403004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of nomadic computing devices for storage synchronization 使用游牧计算设备进行存储同步
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343204
A. Wickramarachchi, Dulaj Atapattu, Pamoda Wimalasiri, Ravidu Mallawa Arachchi, G. Dias
{"title":"Use of nomadic computing devices for storage synchronization","authors":"A. Wickramarachchi, Dulaj Atapattu, Pamoda Wimalasiri, Ravidu Mallawa Arachchi, G. Dias","doi":"10.1109/ICOIN.2018.8343204","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343204","url":null,"abstract":"The use of nomadic computing devices for synchronization aims to synchronize storage devices without the use of Internet connectivity, but by the use of moving devices between the storages. The synchronization data is transferred using the nomadic device that moves in a roundtrip manner between the synchronization endpoints. Although there exist network-based and distributed file synchronization mechanisms, the consumption of network bandwidth and cost of transmission of data is a major concern for the users. Furthermore, the use of Internet for synchronization of large media are often limited with lower upload speeds, which makes the entire process slower. The work presents a solution that uses devices such as computers, mobile phones and other network attached IoT devices to carry data required for synchronization. The work demonstrates the implementation of an efficient synchronization scheme for bulk media by means of nomadic computing devices. The results demonstrated competitive performance with existing synchronization mechanisms given the users do not anticipate real-time synchronization but nomadic access exists. The presented architecture does the needful for synchronization of storages with a minimum cost while utilizing redundant storages as event brokers to communicate file changes.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123005863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud of things based on linked data 基于关联数据的物云
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343157
Yun-Hee Son, Kyu-Chul Lee
{"title":"Cloud of things based on linked data","authors":"Yun-Hee Son, Kyu-Chul Lee","doi":"10.1109/ICOIN.2018.8343157","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343157","url":null,"abstract":"At present, interest in the fourth industrial revolution based on information and communications technology is increasing. The topics of the fourth industrial revolution, including connectivity, intelligence, automation, and the IoT (Internet of Things), AI (artificial intelligence), robotics, and big data, are being considered as technologies that can realize these goals. The Internet of Things is one of the most remarkable technologies, and it can serve as the by which to realize the fourth industrial revolution. However, due to the distributed environment of different sensors, devices, and actuators, the IoT is constantly experiencing heterogeneity problems given the use of different protocols. Moreover, there is a need for a method capable of intelligently and meaningfully utilizing the big data produced by the rapidly increasing use of IoT devices. In this paper, we propose a method to virtualize various IoT devices into what is termed a Cloud of Things based on linked data. Virtualized devices in the cloud using metadata from real-world devices are used to solve heterogeneity problems and organize virtualized objects into linked data forms to form device meshes that connect many objects. This enables autonomous intelligence, such as ensuring connectivity through a linked-data-based device mesh and deriving meaningful analytical results through the linking of big data. We illustrate how this study can be utilized through scenarios for the Cloud of Things based on linked data.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"1034 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123134197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Resource management for mobile edge computing using user mobility prediction 使用用户移动性预测的移动边缘计算资源管理
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343212
Takayuki Ojima, T. Fujii
{"title":"Resource management for mobile edge computing using user mobility prediction","authors":"Takayuki Ojima, T. Fujii","doi":"10.1109/ICOIN.2018.8343212","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343212","url":null,"abstract":"This paper proposes a resource management for Mobile Edge Computing (MEC) using user mobility prediction. MEC is a new technology in which distributed edge servers (ESs) proceed the task of users in real-time. In MEC, ESs are distributedly installed and users have to decide which ESs they use to proceed the tasks. At this time, the users have to consider the connectivity of ESs. When the tasks of the user are distributedly proceeded with multiple ESs, and the connection of ESs is terminated by user mobility when users collect the computational results from ESs, the users cannot collect results of tasks and users have to proceed the tasks again. The connection loss due to mobility of the users is a big issue. Therefore, this paper predicts user mobility with Kalman filter for estimation of the connectivity. Using mobility prediction, users can select the stable ES during task request and task collection. By using this process, it has been shown that the success rate of collecting results improves.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126345901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Multi-finger motion inference using M1 neural decoding 基于M1神经解码的多指运动推理
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343076
Hwayoung Choi, Kyung-Jin You, Hyun-Chool Shin
{"title":"Multi-finger motion inference using M1 neural decoding","authors":"Hwayoung Choi, Kyung-Jin You, Hyun-Chool Shin","doi":"10.1109/ICOIN.2018.8343076","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343076","url":null,"abstract":"This paper proposed a novel decoding method, which is the decoding technique for inferring multi-finger motions trained by the neural activities acquired in single finger motions. We have exploited the relationship between single and multi-finger motions. Then the model for multi-finger motions was built. The proposed method decoded multi-finger motions with 100% accuracy without a priori training information of multi-finger. These results suggest that only with the neural activities on single finger motions we can infer multi-finger motions.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121249548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fair slot assignment in elastic optical networks under dynamic traffic 动态流量下弹性光网络的公平槽位分配
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343146
N. Ravi, A. Yayimli
{"title":"Fair slot assignment in elastic optical networks under dynamic traffic","authors":"N. Ravi, A. Yayimli","doi":"10.1109/ICOIN.2018.8343146","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343146","url":null,"abstract":"The elastic optical network (EON) is a very promising solution where spectral resources are used in flexible frequency grid. When multi-bandwidth services are blended together without proper bandwidth management, high slot requests are more likely to be blocked compared to low slot requests. To solve this unfairness problem, we proposed two methods: Equal Opportunity Slot Assignment (EOSA), where we determine the start slot based on the number of slots requested, and Nigh-Fairness Slot Assignment (NFSA), where the idea is to divide the whole spectrum into two parts and use different algorithms for each part. Simulation results for different topologies show that, our NFSA method achieves the desired fairness and improves the performance of the entire network in terms of blocking probability.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133273205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavior recognition and disaster detection by the abnormal analysis using SVM for ERESS 基于支持向量机的ERESS异常分析行为识别与灾害检测
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343198
Shingo Nakajima, Toshiki Yamasaki, Koki Matsumoto, Kazuki Uemura, T. Wada, K. Ohtsuki
{"title":"Behavior recognition and disaster detection by the abnormal analysis using SVM for ERESS","authors":"Shingo Nakajima, Toshiki Yamasaki, Koki Matsumoto, Kazuki Uemura, T. Wada, K. Ohtsuki","doi":"10.1109/ICOIN.2018.8343198","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343198","url":null,"abstract":"Many lives have been lost for many years in all parts of the world by the sudden disasters such as fire and terrorism. Main causes of the damage expansion in these disasters include the escape delay of the evacuees. To support evacuation safely and quickly is one of the effective measures to reduce the victim by the disaster. So, we develop the system named Emergency Rescue Evacuation Support System (ERESS) as a system to detect a disaster using handheld terminals quickly and to guide to safety zone. This system automatically detects a disaster by analysis of the information of terminal holders, and sharing information with neighboring terminals. This paper focuses on behavior analysis of terminal holders and disaster detection which is big characteristics of ERESS. We propose an activity recognition using Support Vector Machine (SVM) and a disaster detection method by the abnormal analysis using SVM. The results of the performance evaluation by two experiments show the validity of the proposed method.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133910984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信