F. Martinez, Manuel Fogué, Manuel Coll, Juan-Carlos Cano, C. Calafate, P. Manzoni
{"title":"Assessing the Impact of a Realistic Radio Propagation Model on VANET Scenarios Using Real Maps","authors":"F. Martinez, Manuel Fogué, Manuel Coll, Juan-Carlos Cano, C. Calafate, P. Manzoni","doi":"10.1109/NCA.2010.24","DOIUrl":"https://doi.org/10.1109/NCA.2010.24","url":null,"abstract":"Research in Vehicular Ad hoc Networks (VANETs) has found in simulation the most useful method to test new algorithms and techniques. This is mainly due to the high cost of deploying such systems in real scenarios. However, when determining the factors that should be taken into account in these simulations, some features such as using real topologies, radio signal absorption due to obstacles and channel access are rarely included, and therefore, results obtained are far from being realistic. In this paper, we present a new Radio Propagation Model (RPM), called Real Attenuation and Visibility (RAV), proposed to simulate more realistically both attenuation of wireless signals (signal power loss) and the radio visibility scheme (presence of obstacles interfering with the signal path). We evaluated this model and compared it against existing RPMs using real scenarios. Simulation results confirmed that our proposed RAV scheme can better reflect realistic scenarios.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128955130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Goseva-Popstojanova, Risto Pantev, Ana Dimitrijevikj, Brandon Miller
{"title":"Quantification of Attackers Activities on Servers Running Web 2.0 Applications","authors":"K. Goseva-Popstojanova, Risto Pantev, Ana Dimitrijevikj, Brandon Miller","doi":"10.1109/NCA.2010.21","DOIUrl":"https://doi.org/10.1109/NCA.2010.21","url":null,"abstract":"The widespread use of Web applications, in conjunction with large number of vulnerabilities, makes them very attractive targets for malicious attackers. The increasing popularity of Web 2.0 applications, such as blogs, wikis, and social sites, makes Web servers even more attractive targets. In this paper we present empirical analysis of attackers activities based on data collected by two high-interaction honeypots which have typical three-tier architectures and include Web 2.0 applications. The contributions of our work include in-depth characterization of different types of malicious activities aimed at Web servers that deploy blog and wiki applications, as well as formal inferential statistical analysis of the malicious Web sessions.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125372079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Architectures for Range Encoding in Packet Classification System","authors":"Xin He, Jorgen Peddersen, S. Parameswaran","doi":"10.1109/NCA.2010.9","DOIUrl":"https://doi.org/10.1109/NCA.2010.9","url":null,"abstract":"Packet classification is an important aspect of modern network systems. Packet classification systems have traditionally been built utilizing Ternary Content Addressable Memory (TCAM) due to the high throughput needed. However, TCAMs are expensive in terms of area and power consumption. An alternative to TCAM based systems using SRAM and a novel rule encoding method has been proposed to match multiple packets simultaneously (using multiple store_compare_units). This alternative achieves similar or better throughput than the traditional TCAM approach while occupying smaller space and consuming less energy. This paper revamps the existing SRAM-based architecture to reduce area and power consumption without threatening throughput. Two methods are shown. The first method allows for range encoding SRAMs to be shared between store_compare_units (SCUs) to lower area and power consumption with minor effect on throughput. The second method discusses a hybrid system allowing rules with prefixes (single rules) and ranges (rules which match a range of addresses, usually translated to many prefixes) to exist in parallel for the same domain. This allows for lower power consumption than utilizing fixed range encoding due to optimization of the ruleset. Results show that this hybrid architecture saves more than 20% of power/field if half of the TCP ports contain ranges (and the other half contains prefixes). The new extensions have been tested in over ten benchmarks (including the SNORT ruleset) to verify the claimed improvements.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131535328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks","authors":"N. Yaakob, I. Khalil, Jiankun Hu","doi":"10.1109/NCA.2010.37","DOIUrl":"https://doi.org/10.1109/NCA.2010.37","url":null,"abstract":"While witnessing a remarkable and rapid emergence of Wireless Sensor Network (WSN) that seems to facilitate promising features, congestion problem still remains the key issue that attract very high attention in research community. Congestion not only severely degrades network performance, but also gives adverse quality to various related applications such as real-time monitoring systems that demands strict and stringent requirements. A robust solution is therefore required to mitigate this critical issue, yet to cope with challenging dynamic WSN's nature. Concerning this issue, in this paper, we have investigated a potential solution to alleviate congestion by determining an appropriate packet size in various error conditions. This prospective factor have high potential in improving network efficiency by maximizing the link utilization and minimizing the number of retransmissions, thus ensuring reliability. In addition, the error-prone characteristic and noisy channel in sensor network increase the needs for determining appropriate packet size during data transmission in order to massively reduce congestion and helps providing consistent WSN's performance. This paper investigates the impact of varying packet size in various Bit Error Rate (BER) conditions and highlights other key factors that may help alleviate congestion in WSN. Simulation study demonstrates an overall network efficiency improvement and favourable performance.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pareto-Based Optimization of Multicast Flows with QoS and Traffic Engineering Requirements","authors":"Marcos L. P. Bueno, G. Oliveira","doi":"10.1109/NCA.2010.47","DOIUrl":"https://doi.org/10.1109/NCA.2010.47","url":null,"abstract":"Multicast routing consists in sending information in computer networks to a selective number of destinations. QoS and Traffic Engineering requirements can also be considered in such kind of routing, leading to the need of optimizing a set of objectives subject to constraints. We investigated algorithms to perform the calculus of multicast routes while minimizing four objectives - maximum link utilization, total cost, maximum end-to-end delay and mean end-to-end delay - attending a link capacity constraint. New multiobjective evolutionary models to tackle multicast routing are discussed here based on SPEA2. Besides, two heuristics for subtrees reconnection to be used on crossover and mutation operators are investigated. The first heuristic uses a shortest path algorithm; the second one employs a random search. Our results indicate that the evolutionary model based on SPEA2 using the random search heuristic returned the best performance. The advantage of such approach is observed by comparing the routes obtained using our multiobjective environment with those returned by SPT.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fábio D. Beirão, João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, M. Freire
{"title":"NetOdyssey - A New Tool for Real-Time Analysis of Network Traffic","authors":"Fábio D. Beirão, João V. P. Gomes, Pedro R. M. Inácio, Manuela Pereira, M. Freire","doi":"10.1109/NCA.2010.43","DOIUrl":"https://doi.org/10.1109/NCA.2010.43","url":null,"abstract":"Traffic monitoring and analysis is of critical importance for managing and designing modern computer networks, and constitutes nowadays a very active research field. In most of their studies, researchers use techniques and tools that follow a statistical approach to obtain a deeper knowledge about the traffic behaviour. Network administrators also find great value in statistical analysis tools. Many of those tools return similar metrics calculated for common properties of network packets. This paper presents NetOdyssey, a new tool for the statistical analysis of network traffic. It is able to capture the traffic from the network card or from a pre-collected trace, and generates several statistics calculated for different traffic properties in separate threads. Its modular architecture allows one to adapt NetOdyssey to specific analysis purposes, resorting to the possibility to easily implement custom-made modules, whose implementation principles are also described in here.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133840632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Free Authenticated Byzantine Consensus","authors":"Moumen Hamouma, A. Mostéfaoui","doi":"10.1109/NCA.2010.25","DOIUrl":"https://doi.org/10.1109/NCA.2010.25","url":null,"abstract":"This paper presents a simple protocol that solves the authenticated Byzantine Consensus problem in asynchronous distributed systems. To circumvent the FLP impossibility result in a deterministic way, synchrony assumptions should be added. In the context of Byzantine failures for systems where at most t processes may exhibit a Byzantine behavior and where not all the system is assumed eventually synchronous, Moumen et al. provide the main result. They assume at least one correct process, called 2t-bisource, connected with 2t privileged neighbors with eventually timely outgoing and incoming links. The present paper shows that a deterministic solution for the authenticated byzantine consensus problem is possible if the system model satisfies an additional assumption that does not rely on physical time but on the pattern of messages that are exchanged. The basic message exchange between processes is the query-response mechanism. To solve the Consensus problem, we assume a correct process p, called 2t-winning process, and a set Q of 2t processes such that, eventually, for each query issued by p, any process q of Q receives a response from p among the (n - t) first responses to that query. The processes in the set Q can exhibit a Byzantine behavior and this set may change over time. Whereas many time-free solutions have been designed for the consensus problem in the crash model, this is, to our knowledge, the first time-free deterministic solution to the Byzantine consensus problem.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AGGRO: Boosting STM Replication via Aggressively Optimistic Transaction Processing","authors":"R. Palmieri, F. Quaglia, P. Romano","doi":"10.1109/NCA.2010.10","DOIUrl":"https://doi.org/10.1109/NCA.2010.10","url":null,"abstract":"Software Transactional Memories (STMs) are emerging as a potentially disruptive programming model. In this paper we are address the issue of how to enhance dependability of STM systems via replication. In particular we present AGGRO, an innovative Optimistic Atomic Broadcast-based (OAB) active replication protocol that aims at maximizing the overlap between communication and processing through a novel AGGRessively Optimistic concurrency control scheme. The key idea underlying AGGRO is to propagate dependencies across uncommitted transactions in a controlled manner, namely according to a serialization order compliant with the optimistic message delivery order provided by the OAB service. Another relevant distinguishing feature of AGGRO is of not requiring a-priori knowledge about read/write sets of transactions, but rather to detect and handle conflicts dynamically, i.e. as soon (and only if) they materialize. Based on a detailed simulation study we show the striking performance gains achievable by AGGRO (up to 6x increase of the maximum sustainable throughput, and 75% response time reduction) compared to literature approaches for active replication of transactional systems.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122590889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Game-Play Arbitrators with 3D Voronoi Diagrams","authors":"Mahathir Almashor, I. Khalil, G. Leach","doi":"10.1109/NCA.2010.46","DOIUrl":"https://doi.org/10.1109/NCA.2010.46","url":null,"abstract":"Voronoi Diagrams (VD) have recently been proposed as a way to enable Massively Multi-player On-line Games (MMOG) and Virtual Environments (VE) on fully Peer-to-Peer (P2P) network architectures. Using typical two-dimensional varieties, the peers maintain direct single-hop connections to others in the game-world in a scalable manner. However, direct connections do not guarantee the timely delivery of update messages amongst peers. There is also the issue of fair game-play resolution between opposing players. Thus, as is standard industry practice, game-play arbitrators are needed. Arbitrators also incorporate lag-compensation techniques which improve the responsiveness felt by individual players, thereby enhancing their experience. The approach outlined in this short paper aims to bridge the gap between industry and academia, by introducing the use of an additional 3rd dimension when deriving the VDs. Initial experimentation indicates that 3D-VD is computationally feasible within the time constraints of a typical game. A discussion into several metrics that can act as the differentiating 3rd dimension is also included.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132921623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SOAP Web Services Compression Using Variable and Fixed Length Coding","authors":"Dhiah Al-Shammary, I. Khalil","doi":"10.1109/NCA.2010.18","DOIUrl":"https://doi.org/10.1109/NCA.2010.18","url":null,"abstract":"SOAP Web services create high network traffic because of its generated large XML messages resulting in poor network performance. Therefore, enhancing the performance of Web services by compressing SOAP messages is considered to be an important issue. Compression ratios achieved by most of the existing techniques and tools are not high enough, and even a tiny improvement could save tremendous amount of network bandwidth in emerging cloud and mobile scenarios. In this paper, we try to achieve this objective by proposing two innovative techniques capable of reducing small as well as very large messages. Instead of encoding the characters of XML message individually, Fixed-length encoding and Huffman encoding as a variable-length technique are developed to deal with XML tags as individual input items. XML tree and binary tree are constructed that support the encoding algorithm by removing the closing tags. A high Compression Ratio has been achieved that is up to 7.8 and around 13.5 for large and very large messages respectively.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124718865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}