2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)最新文献

筛选
英文 中文
On Black-Box Monitoring Techniques for Multi-Component Services 多组件服务的黑盒监控技术研究
R. Filipe, Jaime Correia, Filipe Araújo, Jorge S. Cardoso
{"title":"On Black-Box Monitoring Techniques for Multi-Component Services","authors":"R. Filipe, Jaime Correia, Filipe Araújo, Jorge S. Cardoso","doi":"10.1109/NCA.2018.8548336","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548336","url":null,"abstract":"Despite the advantages of microservice and function-oriented architectures, there is an increase in complexity to monitor such highly dynamic systems. In this paper, we analyze two distinct methods to tackle the monitoring problem in a system with reduced instrumentation. Our goal is to understand the feasibility of such approach with one specific driver: simplicity. We aim to determine the extent to which it is possible to characterize the state of two generic tandem processes, using as little information as possible. To answer this question, we resorted to a simulation approach. Using a queue system, we simulated two services, that we could manipulate with distinct operation sets for each module. We used the total response time seen upstream of the system. Having this setup and metric, we applied two distinct methods to analyze the results. First, we used supervised machine learning algorithms to identify where the bottleneck is happening. Secondly, we used an exponential decomposition to identify the occupation in the two components in a more black-box fashion. Results show that both methodologies have their advantages and limitations. The separation of the signal more accurately identifies occupation in low occupied resources, but when a service is totally dominating the overall time, it lacks precision. The machine learning has a more stable error, but needs the training set. This study suggest that a black-box occupation approach with both techniques is possible and very useful.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128806356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Modeling of Hyperledger Fabric (Permissioned Blockchain Network) Hyperledger Fabric (Permissioned Blockchain Network)性能建模
H. Sukhwani, Nan Wang, Kishor S. Trivedi, A. Rindos
{"title":"Performance Modeling of Hyperledger Fabric (Permissioned Blockchain Network)","authors":"H. Sukhwani, Nan Wang, Kishor S. Trivedi, A. Rindos","doi":"10.1109/NCA.2018.8548070","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548070","url":null,"abstract":"Hyperledger Fabric (HLF) is an open-source implementation of a distributed ledger platform for running smart contracts in a modular architecture. In this paper, we present a performance model of Hyperledger Fabric v1.0+ using Stochastic Reward Nets (SRN). From our detailed model, we can compute the throughput, utilization and mean queue length at each peer and critical processing stages within a peer. To validate our model, we setup an HLF network in our lab and run workload using Hyperledger Caliper. From our analysis results, we find that time to complete the endorsement process is significantly affected by the number of peers and policies such as AND (). The performance bottleneck of the ordering service and ledger write can be mitigated using a larger block size, albeit with an increase in latency. For the committing peer, the transaction validation check (using Validation System Chaincode (VSCC)) is a time-consuming step, but its performance impact can be easily mitigated since it can be parallelized. However, its performance is critical, since it absorbs the shock of bursty block arrivals. We also analyze various what-if scenarios, such as peers processing transactions in a pipeline, and multiple endorsers per organization.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129006856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 123
Efficient and Robust WiFi Indoor Positioning Using Hierarchical Navigable Small World Graphs 基于分层可导航小世界图的高效鲁棒WiFi室内定位
Max Willian Soares Lima, Horácio Oliveira, E. Santos, E. Moura, R. Costa, M. Levorato
{"title":"Efficient and Robust WiFi Indoor Positioning Using Hierarchical Navigable Small World Graphs","authors":"Max Willian Soares Lima, Horácio Oliveira, E. Santos, E. Moura, R. Costa, M. Levorato","doi":"10.1109/NCA.2018.8548076","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548076","url":null,"abstract":"Indoor positioning systems consist of identifying the physical location of devices inside buildings. They are usually based on the signal strength of a device packet received by a set of WiFi access points. Among the most precise solutions, are those based on machine learning algorithms, such as kNN (k-Nearest Neighbors). This technique is known as fingerprint positioning. Even though kNN is one of the most used classification methods due to its high precision results, it lacks scalability since an instance we need to classify must be compared to all other instances in the training base. In this work, we use a novel hierarchical navigable small world graph technique to fit the training database so that the samples can be efficiently classified in the online phase of the fingerprint positioning, allowing it to be used in large-scale scenarios and/or to be executed in resource-limited devices. We evaluated the performance of this solution using both synthetic and real-world training data and compared its performance to other known kNN variants such as kd-tree and ball-tree. Our results clearly show the performance gains of the graph-based solution, while still being able to maintain or even reduce the positioning error.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126336935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Estimating the Environmental Impact of Data Centers 评估数据中心的环境影响
João Ferreira, G. Callou, Albert Josua, P. Maciel
{"title":"Estimating the Environmental Impact of Data Centers","authors":"João Ferreira, G. Callou, Albert Josua, P. Maciel","doi":"10.1109/NCA.2018.8548326","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548326","url":null,"abstract":"The demands of performance, availability and storage of new technologies have increased significantly the energy consumption of data centers. This consumption is rising both the environmental impact and operational costs of computational systems that support those technologies. Assuming the electricity consumption and CO2 emissions, the adopted utility power source is of substantial importance. This work estimates the availability, and conducts an evaluation of cost and CO2 emissions of electrical infrastructures in data centers, considering different energy sources. We use a multi-layered artificial neural network, which is able to forecast consumption over the following months, based on the energy consumption history of the data center. All these features are supported by a tool, the applicability of which is demonstrated through a case study that computes the CO2 emissions and operational costs of a data center using the energy mix adopted in Brazil. China. Germany and the US.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131845391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic 深度内容:从加密WiFi流量中揭示视频流内容
Ying Li, Yi Huang, R. Xu, Suranga Seneviratne, Kanchana Thilakarathna, A. Cheng, Darren Webb, Guillaume Jourjon
{"title":"Deep Content: Unveiling Video Streaming Content from Encrypted WiFi Traffic","authors":"Ying Li, Yi Huang, R. Xu, Suranga Seneviratne, Kanchana Thilakarathna, A. Cheng, Darren Webb, Guillaume Jourjon","doi":"10.1109/NCA.2018.8548317","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548317","url":null,"abstract":"The proliferation of smart devices has led to an exponential growth in digital media consumption, especially mobile video for content marketing. The vast majority of the associated Internet traffic is now end-to-end encrypted, and while encryption provides better user privacy and security, it has made network surveillance an impossible task. The result is an unchecked environment for exploiters and attackers to distribute content such as fake, radical and propaganda videos. Recent advances in machine learning techniques have shown great promise in characterising encrypted traffic captured at the end points. However, video fingerprinting from passively listening to encrypted traffic, especially wireless traffic, has been reported as a challenging task due to the difficulty in distinguishing retransmissions and multiple flows on the same link. We show the potential of fingerprinting videos by passively sniffing WiFi frames in air, even without connecting to the WiFi network. We have developed Multi-Layer Perceptron (MLP) and Recurrent Neural Networks (RNNs) that are able to identify streamed YouTube videos from a closed set, by sniffing WiFi traffic encrypted at both Media Access Control (MAC) and Network layers. We compare these models to the state-of-the-art wired traffic classifier based on Convolutional Neural Networks (CNNs), and show that our models obtain similar results while requiring significantly less computational power and time (approximately a threefold reduction).","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130849769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
How Kernel Randomization is Canceling Memory Deduplication in Cloud Computing Systems 在云计算系统中,内核随机化如何取消内存重复数据删除
Fernando Vano-Garcia, Héctor Marco-Gisbert
{"title":"How Kernel Randomization is Canceling Memory Deduplication in Cloud Computing Systems","authors":"Fernando Vano-Garcia, Héctor Marco-Gisbert","doi":"10.1109/NCA.2018.8548338","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548338","url":null,"abstract":"Cloud computing dramatically impacted the way we play, work and live. It has been widely adopted in many sectors mainly because it reduces the cost of performing tasks in a flexible, scalable and reliable way. The highest possible level of protection must be applied in order to provide a secure cloud computing architecture. Unfortunately, the cloud computing paradigm introduces new scenarios where security protection techniques are weakened or disabled to obtain better performance and resources exploitation. An important case is the memory deduplication mechanism which is canceled by the address space layout randomization (ASLR) protection technique. In this paper, we present a precise analysis of the impact on the memory deduplication technique when kernel randomization is enabled. Our experiments show that the memory overhead to run 24 kernels is increased by 534% (from 613 MiB to 3.9 GiB) when kernel ASLR is enabled.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133241949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Monitoring IoT Networks for Botnet Activity 监控物联网网络的僵尸网络活动
S. Chawathe
{"title":"Monitoring IoT Networks for Botnet Activity","authors":"S. Chawathe","doi":"10.1109/NCA.2018.8548330","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548330","url":null,"abstract":"The Internet of Things (IoT) has rapidly transitioned from a novelty to a common, and often critical, part of residential, business, and industrial environments. Security vulnerabilities and exploits in the IoT realm have been well documented. In many cases, improving the security of an IoT device by hardening its software is not a realistic option, especially in the cost-sensitive consumer market or in legacy-bound industrial settings. As part of a multifaceted defense against botnet activity on the IoT, this paper explores a method based on monitoring the network activity of IoT devices. A notable benefit of this approach is that it does not require any special access to the devices and adapts well to the addition of new devices. The method is evaluated on a publicly available dataset drawn from a real IoT network.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"8 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133852838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples 基于敌对样本流和随机森林的僵尸网络检测器规避
Giovanni Apruzzese, M. Colajanni
{"title":"Evading Botnet Detectors Based on Flows and Random Forest with Adversarial Samples","authors":"Giovanni Apruzzese, M. Colajanni","doi":"10.1109/NCA.2018.8548327","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548327","url":null,"abstract":"Machine learning is increasingly adopted for a wide array of applications, due to its promising results and autonomous capabilities. However, recent research efforts have shown that, especially within the image processing field, these novel techniques are susceptible to adversarial perturbations. In this paper, we present an analysis that highlights and evaluates experimentally the fragility of network intrusion detection systems based on machine learning algorithms against adversarial attacks. In particular, our study involves a random forest classifier that utilizes network flows to distinguish between botnet and benign samples. Our results, derived from experiments performed on a public real dataset of labelled network flows, show that attackers can easily evade such defensive mechanisms by applying slight and targeted modifications to the network activity generated by their controlled bots. These findings pave the way for future techniques that aim to strengthen the performance of machine learning-based network intrusion detection systems.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Analytical Hierarchy Process Multi-Metric Objective Function for RPL RPL的层次分析法多度量目标函数
W. Alayed, L. Mackenzie, D. Pezaros
{"title":"Analytical Hierarchy Process Multi-Metric Objective Function for RPL","authors":"W. Alayed, L. Mackenzie, D. Pezaros","doi":"10.1109/NCA.2018.8548054","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548054","url":null,"abstract":"IPv6 Routing Protocol for Low Power and Lossy Networks (RPL), is based on building an acyclic graph where an Objective Function (OF) is responsible for selecting the preferred parent during Destination Oriented Directed Acyclic Graph (DODAG) construction. In this paper, we propose a new multi-metric OF based on Analytical Hierarchy Processes decision masking algorithm. AHP-OF, combines a set of routing metrics aiming to provide the best routing decision for RPL to satisfy the different application requirements for LLN s such as reliable applications, real time applications and highly available applications. Here we focus on the theoretical aspect of AHP-OF, and finally we evaluate the performance of AHP-OF compared to other OFs using Cooja simulator.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130739491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture 基于运行时策略的安全Android应用上下文及其体系结构
Guillaume Averlant, E. Alata, M. Kaâniche, V. Nicomette, Yuxiao Mao
{"title":"SAAC: Secure Android Application Context a Runtime Based Policy and its Architecture","authors":"Guillaume Averlant, E. Alata, M. Kaâniche, V. Nicomette, Yuxiao Mao","doi":"10.1109/NCA.2018.8548343","DOIUrl":"https://doi.org/10.1109/NCA.2018.8548343","url":null,"abstract":"A smartphone runtime environment consists of multiple entities with different goals and scope. Indeed, critical applications such as banking applications that make contactless payments, share the same environment with other applications of varying levels of trust. This paper presents a novel approach allowing a standard Android user to launch its applications in a configurable secure execution context. The security rules defined for each application are enforced by a dedicated security architecture implemented in several parts of the Android ecosystem. A performance assessment of the solution is also provided.","PeriodicalId":268662,"journal":{"name":"2018 IEEE 17th International Symposium on Network Computing and Applications (NCA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132978667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信