2020 IEEE 45th Conference on Local Computer Networks (LCN)最新文献

筛选
英文 中文
Dytokinesis: A Cytokinesis-Inspired Anomaly Detection Technique for IoT Devices 细胞动力学:一种基于细胞动力学的物联网设备异常检测技术
2020 IEEE 45th Conference on Local Computer Networks (LCN) Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314856
Kashif Naveed, Hui Wu, Abdullah Abusaq
{"title":"Dytokinesis: A Cytokinesis-Inspired Anomaly Detection Technique for IoT Devices","authors":"Kashif Naveed, Hui Wu, Abdullah Abusaq","doi":"10.1109/LCN48667.2020.9314856","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314856","url":null,"abstract":"IoT devices are becoming ubiquitous and the availability of open-source botnets has made it very easy for anyone to attack and manipulate such connected devices and even infect them. These anomalies are getting sophisticated and powerful enough to generate network traffic at terabits per second (Tbps) and cost companies over a billion dollars a year. We present a novel technique, named Dytokinesis, to separate such anomalous entities. Dytokinesis is inspired by the biological Cytokinesis process in which a cell is divided into two. Dytokinesis, on a similar pattern, performs such a division on a dataset with high accuracy and low latency. Dytokinesis works in different phases and makes use of Empirical Data Analysis (EDA) and Gaussian kernel to bisect the dataset into normal and anomalous classes. Experimental results demonstrate that Dytokinesis obtains significantly higher accuracy compared to other state-of-the-art techniques while achieving the best run-time performance.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131941152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
List of Accepted Demonstrations 已接受的演示列表
2020 IEEE 45th Conference on Local Computer Networks (LCN) Pub Date : 2020-11-16 DOI: 10.1109/lcn48667.2020.9314843
{"title":"List of Accepted Demonstrations","authors":"","doi":"10.1109/lcn48667.2020.9314843","DOIUrl":"https://doi.org/10.1109/lcn48667.2020.9314843","url":null,"abstract":"","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133567256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCAN: Smart Collaborative Attack in Named Data Networking SCAN:命名数据网络中的智能协同攻击
2020 IEEE 45th Conference on Local Computer Networks (LCN) Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314807
Madhurima Buragohain, Chinmoy Jyoti Kathar, Chinmoy Kachari, S. Nandi, Sukumar Nandi
{"title":"SCAN: Smart Collaborative Attack in Named Data Networking","authors":"Madhurima Buragohain, Chinmoy Jyoti Kathar, Chinmoy Kachari, S. Nandi, Sukumar Nandi","doi":"10.1109/LCN48667.2020.9314807","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314807","url":null,"abstract":"Named Data Networking is a promising Future Internet Architecture, where consumers fetch contents from the network using unique names. It has in-built security features like data integrity, and data origin authentication as contents are signed by the original producer. Though, NDN’s stateful forwarding plane helps to remove some of the existing DDoS attacks in the current IP architecture, still it can face one specific kind of attack called Interest flooding attack (IFA). In this paper, we focus on one variant of IFA where malicious consumers and malicious producers collaboratively launch an attack to degrade the QoS of legitimate consumers. Here we have shown how attackers can intelligently fix the Interest sending rate so that attack goes undetected easily. Simulation results demonstrate that with proper placement of malicious consumers and producers, the attackers can successfully launch the attack with moderate traffic and less number of malicious consumers.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131065327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE LCN 2020 - Author Index IEEE LCN 2020 -作者索引
2020 IEEE 45th Conference on Local Computer Networks (LCN) Pub Date : 2020-11-16 DOI: 10.1109/lcn48667.2020.9314814
{"title":"IEEE LCN 2020 - Author Index","authors":"","doi":"10.1109/lcn48667.2020.9314814","DOIUrl":"https://doi.org/10.1109/lcn48667.2020.9314814","url":null,"abstract":"","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133629267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Don’t Stop at the Top: Using Certificate Transparency Logs to Extend Domain Lists for Web Security Studies 不要停留在顶部:使用证书透明度日志来扩展网络安全研究的域列表
2020 IEEE 45th Conference on Local Computer Networks (LCN) Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314793
Fabian Marquardt, Christopher Schmidt
{"title":"Don’t Stop at the Top: Using Certificate Transparency Logs to Extend Domain Lists for Web Security Studies","authors":"Fabian Marquardt, Christopher Schmidt","doi":"10.1109/LCN48667.2020.9314793","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314793","url":null,"abstract":"Comprehensive domain lists are a requirement for many Internet measurement studies. Currently, researchers rely on proprietary lists such as the Alexa top list. Recent research has identified many problems with the existing domain lists. Our work proposes Certificate Transparency (CT) logs as an alternative domain list source for use in internet measurement studies. We describe the process of deriving a domain list from available CT log servers and analyze the gathered domain list. Furthermore, we compare the CT domain list with existing domain top lists by scanning the gathered domains for various web application technologies. Our results indicate a high level of similarity between the lists, but also interesting differences.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mitigating the Impact of Cross-Tier Interference on Quality in Heterogeneous Cellular Networks 减轻异构蜂窝网络中跨层干扰对质量的影响
2020 IEEE 45th Conference on Local Computer Networks (LCN) Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314834
Bharat Agarwal, Mohammed Amine Togou, M. Ruffini, Gabriel-Miro Muntean
{"title":"Mitigating the Impact of Cross-Tier Interference on Quality in Heterogeneous Cellular Networks","authors":"Bharat Agarwal, Mohammed Amine Togou, M. Ruffini, Gabriel-Miro Muntean","doi":"10.1109/LCN48667.2020.9314834","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314834","url":null,"abstract":"Recently, the use of heterogeneous small-cell networks to offload traffic from existing cellular systems has attracted considerable attention. One of the significant challenges in heterogeneous networks (HetNet) is cross-tier interference, which becomes significant when macro-cell users (MUE) are in the vicinity of femtocell base stations (FBS). Indeed, the femtocell will cause significant interference to MUEs on the macrocell downlink (DL) while MUEs will induce hefty interference to the femtocell on the macrocell uplink (UL). Substantial work has focused on offloading and interference mitigation in HetNets; yet, none of them has considered the impact of cross-tier interference on quality of service (QoS), quality of experience (QoE). This paper proposes the Quality Efficient Femtocell Offloading Scheme (QEFOS) that selects the users most affected by the interference encountered and offloads them to nearby FBSs. QEFOS testing shows substantial improvements in terms of QoS and QoE perceived by users in heavy cross-tier interference scenarios in comparison with alternative approaches. In particular QEFOS’s impact on throughput, packet loss ratio (PLR), peak-to-signal-noise ratio (PSNR), and structural similarity identity matrix (SSIM) was assessed.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121135133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT 基于sdn的工业物联网后端网络安全可靠的数据传输
2020 IEEE 45th Conference on Local Computer Networks (LCN) Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314854
Tao Li, C. Hofmann, Elke Franz
{"title":"Secure and Reliable Data Transmission in SDN-based Backend Networks of Industrial IoT","authors":"Tao Li, C. Hofmann, Elke Franz","doi":"10.1109/LCN48667.2020.9314854","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314854","url":null,"abstract":"Software Defined Networking (SDN) is established as a widely used concept in networks and has been introduced into the network architecture of Industrial Internet of Things (IIoT). Adversaries targeting on disrupting the operation of an IIoT system can launch a simple yet effective attack – malicious packet-modification attack (MPA) – that was previously identified in IoT based on wireless sensor networks. To mitigate MPAs, we introduce an approach for secure and reliable data transmission in the presence of such active attackers by utilizing the programmability and flexibility offered by SDN. Our approach ensures that modifications are recognized by IIoT devices. The effectiveness and performance of the proposed solution was evaluated in comprehensive tests by means of a prototypical implementation. The results confirm that malicious forwarding devices can be reliably and quickly identified and, hence, bypassed even if they modify only a portion of the data.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123870653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
ReAL: A New ResNet-ALSTM Based Intrusion Detection System for the Internet of Energy ReAL:一种基于ResNet-ALSTM的能源互联网入侵检测系统
2020 IEEE 45th Conference on Local Computer Networks (LCN) Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314858
Jiarui Song, Beibei Li, Yuhao Wu, Yaxin Shi, Aohan Li
{"title":"ReAL: A New ResNet-ALSTM Based Intrusion Detection System for the Internet of Energy","authors":"Jiarui Song, Beibei Li, Yuhao Wu, Yaxin Shi, Aohan Li","doi":"10.1109/LCN48667.2020.9314858","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314858","url":null,"abstract":"The Internet of energy (IoE), envisioned to be a promising paradigm of the Internet of things (IoT), is characterized by the deep integration of various distributed energy systems. However, the fusion of heterogeneous IoE communication networks creates a new threat landscape. To thwart and mitigate various types of cyber threats to IoE networks, this paper proposes a novel intrusion detection system (IDS) based on a designed residual network with attention long short term memory (ReAL). Specifically, we design a light gradient boosting machine (LightGBM)-based feature selection method to identify the most useful features. Then, a residual network (ResNet) and a long short term memory neural network with an attention mechanism (ALSTM) are employed, to extract temporal patterns of network traffic events. After that, these patterns are orchestrated to identify the anomalies in IoE networks. The high effectiveness of the proposed IDS is validated on a real IoE dataset.","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123976346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System 基于区块链的端到端可验证远程电子投票系统
2020 IEEE 45th Conference on Local Computer Networks (LCN) Pub Date : 2020-11-16 DOI: 10.1109/LCN48667.2020.9314815
Christian Killer, B. Rodrigues, E. Scheid, M. Franco, M. Eck, Nik Zaugg, Alex Scheitlin, B. Stiller
{"title":"Provotum: A Blockchain-based and End-to-end Verifiable Remote Electronic Voting System","authors":"Christian Killer, B. Rodrigues, E. Scheid, M. Franco, M. Eck, Nik Zaugg, Alex Scheitlin, B. Stiller","doi":"10.1109/LCN48667.2020.9314815","DOIUrl":"https://doi.org/10.1109/LCN48667.2020.9314815","url":null,"abstract":"While the existence of Public Bulletin Boards (PBB) is often formulated as an assumption in related work on Remote Electronic Voting (REV) systems, this work here on Provotum focuses on the practical design and architecture of such a PBB, including its distributed execution. Further, Provotum leverages a public permissioned Blockchain (BC) as a PBB, where only authorized entities can sign blocks, while the general public can verify all BC data.Therefore, Provotum defines a new and fully decentralized BC-based REV system, which deploys a permissioned BC as a PBB and allows for the explicit distribution of trust across different permissioned BC nodes. Provotum is operated in a fully distributed fashion by using Smart Contracts (SC), Distributed Key Generation (DKG), Homomorphic Encryption (HE), and Cooperative Decryption (CD), as well as employing client-side encryption, which enables ballot secrecy, while the BC forms an audit trail, enabling public and End-to-end Verifiability (E2E-V).","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131655568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
LCN 2020 Keynote 1 - Do We Still Need Wi-Fi in the Era of 5G? LCN 2020主题演讲1 - 5G时代我们还需要Wi-Fi吗?
2020 IEEE 45th Conference on Local Computer Networks (LCN) Pub Date : 2020-11-16 DOI: 10.1109/lcn48667.2020.9314821
{"title":"LCN 2020 Keynote 1 - Do We Still Need Wi-Fi in the Era of 5G?","authors":"","doi":"10.1109/lcn48667.2020.9314821","DOIUrl":"https://doi.org/10.1109/lcn48667.2020.9314821","url":null,"abstract":"","PeriodicalId":245782,"journal":{"name":"2020 IEEE 45th Conference on Local Computer Networks (LCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132544148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信