2010 Ninth IEEE International Symposium on Network Computing and Applications最新文献

筛选
英文 中文
Assessing the Impact of a Realistic Radio Propagation Model on VANET Scenarios Using Real Maps 使用真实地图评估真实无线电传播模型对VANET情景的影响
F. Martinez, Manuel Fogué, Manuel Coll, Juan-Carlos Cano, C. Calafate, P. Manzoni
{"title":"Assessing the Impact of a Realistic Radio Propagation Model on VANET Scenarios Using Real Maps","authors":"F. Martinez, Manuel Fogué, Manuel Coll, Juan-Carlos Cano, C. Calafate, P. Manzoni","doi":"10.1109/NCA.2010.24","DOIUrl":"https://doi.org/10.1109/NCA.2010.24","url":null,"abstract":"Research in Vehicular Ad hoc Networks (VANETs) has found in simulation the most useful method to test new algorithms and techniques. This is mainly due to the high cost of deploying such systems in real scenarios. However, when determining the factors that should be taken into account in these simulations, some features such as using real topologies, radio signal absorption due to obstacles and channel access are rarely included, and therefore, results obtained are far from being realistic. In this paper, we present a new Radio Propagation Model (RPM), called Real Attenuation and Visibility (RAV), proposed to simulate more realistically both attenuation of wireless signals (signal power loss) and the radio visibility scheme (presence of obstacles interfering with the signal path). We evaluated this model and compared it against existing RPMs using real scenarios. Simulation results confirmed that our proposed RAV scheme can better reflect realistic scenarios.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128955130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Quantification of Attackers Activities on Servers Running Web 2.0 Applications 在运行Web 2.0应用程序的服务器上量化攻击者的活动
K. Goseva-Popstojanova, Risto Pantev, Ana Dimitrijevikj, Brandon Miller
{"title":"Quantification of Attackers Activities on Servers Running Web 2.0 Applications","authors":"K. Goseva-Popstojanova, Risto Pantev, Ana Dimitrijevikj, Brandon Miller","doi":"10.1109/NCA.2010.21","DOIUrl":"https://doi.org/10.1109/NCA.2010.21","url":null,"abstract":"The widespread use of Web applications, in conjunction with large number of vulnerabilities, makes them very attractive targets for malicious attackers. The increasing popularity of Web 2.0 applications, such as blogs, wikis, and social sites, makes Web servers even more attractive targets. In this paper we present empirical analysis of attackers activities based on data collected by two high-interaction honeypots which have typical three-tier architectures and include Web 2.0 applications. The contributions of our work include in-depth characterization of different types of malicious activities aimed at Web servers that deploy blog and wiki applications, as well as formal inferential statistical analysis of the malicious Web sessions.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125372079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Improved Architectures for Range Encoding in Packet Classification System 分组分类系统中范围编码的改进体系结构
Xin He, Jorgen Peddersen, S. Parameswaran
{"title":"Improved Architectures for Range Encoding in Packet Classification System","authors":"Xin He, Jorgen Peddersen, S. Parameswaran","doi":"10.1109/NCA.2010.9","DOIUrl":"https://doi.org/10.1109/NCA.2010.9","url":null,"abstract":"Packet classification is an important aspect of modern network systems. Packet classification systems have traditionally been built utilizing Ternary Content Addressable Memory (TCAM) due to the high throughput needed. However, TCAMs are expensive in terms of area and power consumption. An alternative to TCAM based systems using SRAM and a novel rule encoding method has been proposed to match multiple packets simultaneously (using multiple store_compare_units). This alternative achieves similar or better throughput than the traditional TCAM approach while occupying smaller space and consuming less energy. This paper revamps the existing SRAM-based architecture to reduce area and power consumption without threatening throughput. Two methods are shown. The first method allows for range encoding SRAMs to be shared between store_compare_units (SCUs) to lower area and power consumption with minor effect on throughput. The second method discusses a hybrid system allowing rules with prefixes (single rules) and ranges (rules which match a range of addresses, usually translated to many prefixes) to exist in parallel for the same domain. This allows for lower power consumption than utilizing fixed range encoding due to optimization of the ruleset. Results show that this hybrid architecture saves more than 20% of power/field if half of the TCP ports contain ranges (and the other half contains prefixes). The new extensions have been tested in over ten benchmarks (including the SNORT ruleset) to verify the claimed improvements.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks 无线传感器网络拥塞控制中最优数据包大小的性能分析
N. Yaakob, I. Khalil, Jiankun Hu
{"title":"Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks","authors":"N. Yaakob, I. Khalil, Jiankun Hu","doi":"10.1109/NCA.2010.37","DOIUrl":"https://doi.org/10.1109/NCA.2010.37","url":null,"abstract":"While witnessing a remarkable and rapid emergence of Wireless Sensor Network (WSN) that seems to facilitate promising features, congestion problem still remains the key issue that attract very high attention in research community. Congestion not only severely degrades network performance, but also gives adverse quality to various related applications such as real-time monitoring systems that demands strict and stringent requirements. A robust solution is therefore required to mitigate this critical issue, yet to cope with challenging dynamic WSN's nature. Concerning this issue, in this paper, we have investigated a potential solution to alleviate congestion by determining an appropriate packet size in various error conditions. This prospective factor have high potential in improving network efficiency by maximizing the link utilization and minimizing the number of retransmissions, thus ensuring reliability. In addition, the error-prone characteristic and noisy channel in sensor network increase the needs for determining appropriate packet size during data transmission in order to massively reduce congestion and helps providing consistent WSN's performance. This paper investigates the impact of varying packet size in various Bit Error Rate (BER) conditions and highlights other key factors that may help alleviate congestion in WSN. Simulation study demonstrates an overall network efficiency improvement and favourable performance.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Pareto-Based Optimization of Multicast Flows with QoS and Traffic Engineering Requirements 基于pareto的具有QoS和流量工程需求的组播流优化
Marcos L. P. Bueno, G. Oliveira
{"title":"Pareto-Based Optimization of Multicast Flows with QoS and Traffic Engineering Requirements","authors":"Marcos L. P. Bueno, G. Oliveira","doi":"10.1109/NCA.2010.47","DOIUrl":"https://doi.org/10.1109/NCA.2010.47","url":null,"abstract":"Multicast routing consists in sending information in computer networks to a selective number of destinations. QoS and Traffic Engineering requirements can also be considered in such kind of routing, leading to the need of optimizing a set of objectives subject to constraints. We investigated algorithms to perform the calculus of multicast routes while minimizing four objectives - maximum link utilization, total cost, maximum end-to-end delay and mean end-to-end delay - attending a link capacity constraint. New multiobjective evolutionary models to tackle multicast routing are discussed here based on SPEA2. Besides, two heuristics for subtrees reconnection to be used on crossover and mutation operators are investigated. The first heuristic uses a shortest path algorithm; the second one employs a random search. Our results indicate that the evolutionary model based on SPEA2 using the random search heuristic returned the best performance. The advantage of such approach is observed by comparing the routes obtained using our multiobjective environment with those returned by SPT.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
NetOdyssey - A New Tool for Real-Time Analysis of Network Traffic NetOdyssey -一个实时分析网络流量的新工具
Fábio D. Beirão, João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, M. Freire
{"title":"NetOdyssey - A New Tool for Real-Time Analysis of Network Traffic","authors":"Fábio D. Beirão, João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, M. Freire","doi":"10.1109/NCA.2010.43","DOIUrl":"https://doi.org/10.1109/NCA.2010.43","url":null,"abstract":"Traffic monitoring and analysis is of critical importance for managing and designing modern computer networks, and constitutes nowadays a very active research field. In most of their studies, researchers use techniques and tools that follow a statistical approach to obtain a deeper knowledge about the traffic behaviour. Network administrators also find great value in statistical analysis tools. Many of those tools return similar metrics calculated for common properties of network packets. This paper presents NetOdyssey, a new tool for the statistical analysis of network traffic. It is able to capture the traffic from the network card or from a pre-collected trace, and generates several statistics calculated for different traffic properties in separate threads. Its modular architecture allows one to adapt NetOdyssey to specific analysis purposes, resorting to the possibility to easily implement custom-made modules, whose implementation principles are also described in here.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133840632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Time-Free Authenticated Byzantine Consensus 时间自由认证拜占庭共识
Moumen Hamouma, A. Mostéfaoui
{"title":"Time-Free Authenticated Byzantine Consensus","authors":"Moumen Hamouma, A. Mostéfaoui","doi":"10.1109/NCA.2010.25","DOIUrl":"https://doi.org/10.1109/NCA.2010.25","url":null,"abstract":"This paper presents a simple protocol that solves the authenticated Byzantine Consensus problem in asynchronous distributed systems. To circumvent the FLP impossibility result in a deterministic way, synchrony assumptions should be added. In the context of Byzantine failures for systems where at most t processes may exhibit a Byzantine behavior and where not all the system is assumed eventually synchronous, Moumen et al. provide the main result. They assume at least one correct process, called 2t-bisource, connected with 2t privileged neighbors with eventually timely outgoing and incoming links. The present paper shows that a deterministic solution for the authenticated byzantine consensus problem is possible if the system model satisfies an additional assumption that does not rely on physical time but on the pattern of messages that are exchanged. The basic message exchange between processes is the query-response mechanism. To solve the Consensus problem, we assume a correct process p, called 2t-winning process, and a set Q of 2t processes such that, eventually, for each query issued by p, any process q of Q receives a response from p among the (n - t) first responses to that query. The processes in the set Q can exhibit a Byzantine behavior and this set may change over time. Whereas many time-free solutions have been designed for the consensus problem in the crash model, this is, to our knowledge, the first time-free deterministic solution to the Byzantine consensus problem.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AGGRO: Boosting STM Replication via Aggressively Optimistic Transaction Processing AGGRO:通过积极乐观的事务处理提升STM复制
R. Palmieri, F. Quaglia, P. Romano
{"title":"AGGRO: Boosting STM Replication via Aggressively Optimistic Transaction Processing","authors":"R. Palmieri, F. Quaglia, P. Romano","doi":"10.1109/NCA.2010.10","DOIUrl":"https://doi.org/10.1109/NCA.2010.10","url":null,"abstract":"Software Transactional Memories (STMs) are emerging as a potentially disruptive programming model. In this paper we are address the issue of how to enhance dependability of STM systems via replication. In particular we present AGGRO, an innovative Optimistic Atomic Broadcast-based (OAB) active replication protocol that aims at maximizing the overlap between communication and processing through a novel AGGRessively Optimistic concurrency control scheme. The key idea underlying AGGRO is to propagate dependencies across uncommitted transactions in a controlled manner, namely according to a serialization order compliant with the optimistic message delivery order provided by the OAB service. Another relevant distinguishing feature of AGGRO is of not requiring a-priori knowledge about read/write sets of transactions, but rather to detect and handle conflicts dynamically, i.e. as soon (and only if) they materialize. Based on a detailed simulation study we show the striking performance gains achievable by AGGRO (up to 6x increase of the maximum sustainable throughput, and 75% response time reduction) compared to literature approaches for active replication of transactional systems.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122590889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Dynamic Game-Play Arbitrators with 3D Voronoi Diagrams 动态游戏与3D Voronoi图表仲裁
Mahathir Almashor, I. Khalil, G. Leach
{"title":"Dynamic Game-Play Arbitrators with 3D Voronoi Diagrams","authors":"Mahathir Almashor, I. Khalil, G. Leach","doi":"10.1109/NCA.2010.46","DOIUrl":"https://doi.org/10.1109/NCA.2010.46","url":null,"abstract":"Voronoi Diagrams (VD) have recently been proposed as a way to enable Massively Multi-player On-line Games (MMOG) and Virtual Environments (VE) on fully Peer-to-Peer (P2P) network architectures. Using typical two-dimensional varieties, the peers maintain direct single-hop connections to others in the game-world in a scalable manner. However, direct connections do not guarantee the timely delivery of update messages amongst peers. There is also the issue of fair game-play resolution between opposing players. Thus, as is standard industry practice, game-play arbitrators are needed. Arbitrators also incorporate lag-compensation techniques which improve the responsiveness felt by individual players, thereby enhancing their experience. The approach outlined in this short paper aims to bridge the gap between industry and academia, by introducing the use of an additional 3rd dimension when deriving the VDs. Initial experimentation indicates that 3D-VD is computationally feasible within the time constraints of a typical game. A discussion into several metrics that can act as the differentiating 3rd dimension is also included.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132921623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SOAP Web Services Compression Using Variable and Fixed Length Coding 使用可变和固定长度编码的SOAP Web服务压缩
Dhiah Al-Shammary, I. Khalil
{"title":"SOAP Web Services Compression Using Variable and Fixed Length Coding","authors":"Dhiah Al-Shammary, I. Khalil","doi":"10.1109/NCA.2010.18","DOIUrl":"https://doi.org/10.1109/NCA.2010.18","url":null,"abstract":"SOAP Web services create high network traffic because of its generated large XML messages resulting in poor network performance. Therefore, enhancing the performance of Web services by compressing SOAP messages is considered to be an important issue. Compression ratios achieved by most of the existing techniques and tools are not high enough, and even a tiny improvement could save tremendous amount of network bandwidth in emerging cloud and mobile scenarios. In this paper, we try to achieve this objective by proposing two innovative techniques capable of reducing small as well as very large messages. Instead of encoding the characters of XML message individually, Fixed-length encoding and Huffman encoding as a variable-length technique are developed to deal with XML tags as individual input items. XML tree and binary tree are constructed that support the encoding algorithm by removing the closing tags. A high Compression Ratio has been achieved that is up to 7.8 and around 13.5 for large and very large messages respectively.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信