Erkin Kirdan, Daniel Raumer, Paul Emmerich, G. Carle
{"title":"Building a Traffic Policer for DDoS Mitigation on Top of Commodity Hardware","authors":"Erkin Kirdan, Daniel Raumer, Paul Emmerich, G. Carle","doi":"10.1109/ISNCC.2018.8531043","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531043","url":null,"abstract":"Traffic policing is the process of ensuring that network traffic complies with its policies with methods like traffic shaping. As the distribution of sources involved in a DDoS attack differs significantly from the typical distribution of customers for web services, traffic shapers and policers can be used in DDoS mitigation. In the past, software-based middleboxes, like traffic shapers, easily became overloaded and therefore a vulnerability for DDoS attacks. Although recent advances in network stack design on commodity hardware increased the performance, the software on top of the network stack also needs to provide adequate throughput and scalability regarding the number of limited subnets. Therefore, we build a high-performance and scalable traffic policer called MoonPol and evaluated it in a DDoS mitigation scenario. MoonPol runs on any commodity hardware, takes advantage of the underlying framework, DPDK, and combines it with appropriate algorithms and data structures. Data structures for efficient lookups are implemented together with the token bucket algorithm to police a traffic of fine-grained IP address ranges. Benchmarking results show that the single core throughput of the policer running on a 3.2 GHz CPU, is 6.5 Mpps with limiting 1 Million subnets, i.e., 492 CPU cycles per packet. With 250K subnets of all countries in the world, the throughput is 6.66 Mpps.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123270151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Vázquez-Castro, Paresh Saxena, Tan Do-Duy, TF. Vamstad, H. Skinnemoen
{"title":"SatNetCode: Functional Design and Experimental Validation of Network Coding over Satellite","authors":"M. Vázquez-Castro, Paresh Saxena, Tan Do-Duy, TF. Vamstad, H. Skinnemoen","doi":"10.1109/ISNCC.2018.8530981","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530981","url":null,"abstract":"In this paper, we present the functional design and experimental validation of network coding technology over hybrid networks including satellite links. We first describe our design framework based on a holistic modelling of (overlay) heterogeneous networking satellite scenarios. We then define different types of logical nodes depending on their encoding, re-encoding and decoding functionalities and whether or not the satellite (overlay) application designer has control over them. Nodes are assumed strategically chosen to recode, which may result in a small number of re-encoding nodes that suffice to optimize selected performance metrics. Our main contribution is a system-oriented functional design of network coding that enables flexible instantiation of different types of network codes via configurable network coding (C-NC) functions. Random or structured NC coefficients can be remotely or locally generated and a packet scheduler can forward packets according to different policies. The choice of coefficients and overall NC scheme depend on the SATCOM-specific performance target, namely delay or bandwidth constraints. Here, we present a preliminary design and experimental testebed validation for the case of delay constrained transmission. Our results show the practical benefits of re-encoding and performance tradeoffs of different network coding schemes. In particular, our results show the good structural properties and delay-reliability tradeoffs of our novel proposal of structured network codes using Pascal matrices due to the regenerative properties of the coding coefficients.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127839446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-physical Threats and Vulnerabilities Analysis for Train Control and Monitoring Systems","authors":"M. Rekik, C. Gransart, M. Berbineau","doi":"10.1109/ISNCC.2018.8531005","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531005","url":null,"abstract":"Cyber-physical security is a major concern for the new generation of trains. In fact, trains are increasingly relying on automation, control and communication technologies in order to improve the efficiency and safety of their services as well as the comfort of passengers. This dependency introduces certainly new vulnerabilities and entry points to the system which exposes the system to new threat scenarios. This paper deals with cyber-physical security aspects of Train Control and Monitoring Systems (TCMSs). We analyse vulnerabilities and characteristics of railway threat landscape including potential threats, threats agents and motivations. We discuss, also, direct impacts and cascading consequences on the whole system as well as the risk generated.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115761747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Ijaz, A. Iftikhar, K. Alimgeer, M. S. Khan, R. Shubair
{"title":"A Frequency Reconfigurable Dual-Band Monopole Antenna for Wireless Applications","authors":"B. Ijaz, A. Iftikhar, K. Alimgeer, M. S. Khan, R. Shubair","doi":"10.1109/ISNCC.2018.8530987","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530987","url":null,"abstract":"A dual-band frequency reconfigurable monopole antenna is presented in this paper. Reconfiguration of frequency bands is achieved using RF PIN diodes. An already published antenna design is used as a starting point and is then modified to achieve frequency reconfiguration mechanism by incorporating RF PIN diodes. The antenna resonates at center frequency of 2.4 GHz and 4.25 GHz when RF PIN diodes are switched OFF. However, RF PIN diodes ON state resulted in 1.84 and 3.66 GHz frequency bands. The 1.84 and 2.45 GHz bands are controlled by altering the electrical length of inverted L-shaped resonator. Whereas, C-shaped radiator is used to resonate the proposed antenna at 3.66 GHz and 4.56 GHz frequency bands. Overall, the simulation and measurement results showed a good agreement.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"16 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of MPLS SDN Controller Application based on OpenDaylight","authors":"E. Husni, A. Bramantyo","doi":"10.1109/ISNCC.2018.8530900","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530900","url":null,"abstract":"This paper discusses design and implementation of SDN Controller application in a Multi-Protocol Label Switching (MPLS) network based on OpenDaylight. In this paper, we first briefly review Traffic Engineering challenges in MPLS networks. We then discuss on how Software-Defined Networking (SDN) could overcome Label Switched Path (LSP) path calculation challenges in MPLS Traffic Engineering. We discuss that a centralized SDN Controller has network-wide visibility thus should become “source of truth” of network state. We discuss that OpenDaylight has capabilities as centralized SDN Controller, however one needs to build application on top of OpenDaylight. An application of SDN Controller based on OpenDaylight is proposed in this paper. To verify the application functionalities, a virtual lab is created to model an MPLS network and an OpenDaylight SDN Controller. A performance measurement of the OpenDaylight SDN Controller is also discussed in this paper.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117313660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Base Stations Diversity for UNB Systems: Theoretical Analysis and Performances","authors":"Yuqi Mo, C. Goursaud, J. Gorce","doi":"10.1109/ISNCC.2018.8531010","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531010","url":null,"abstract":"UNB (Ultra Narrow Band) is one of the technologies dedicated to low-power wide-area communication for IoT, currently exploited by SigFox. The specificity of UNB is the Aloha-type channel access scheme, both asynchronized in time and frequency domain. This randomness can cause partial spectral interference. In this paper, we take advantage of the spatial diversity of multiple base stations to improve the UNB performance, by using selection combining. In the presence of pathloss and spectral randomness of UNB, the channels are considered correlated. A theoretical analysis of outage probability is demonstrated by considering this correlation, for the case of 2 base stations. This methodology of probability computing can be extended to general $K$ BSs. The diversity of multiple receivers is proved to be beneficial in enhancing the performance of UNB networks. This gain is shown to be related to the density of the base stations, as well as the distance between each of them.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134119825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xianyong Meng, K. Qian, D. Lo, P. Bhattacharya, Fan Wu
{"title":"Secure Mobile Software Development with Vulnerability Detectors in Static Code Analysis","authors":"Xianyong Meng, K. Qian, D. Lo, P. Bhattacharya, Fan Wu","doi":"10.1109/ISNCC.2018.8531071","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531071","url":null,"abstract":"The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of our software, and militate the consequence of damages of data loss caused by potential malicious attacking. However, many software developer professionals lack the necessary security knowledge and skills at the development stage and Secure Mobile Software Development (SMSD) is not yet well represented in current computing curriculum. In this paper we present a static security analysis approach with open source FindSecurityBugs plugin for Android Studio IDE. We categorized the common mobile vulnerability for developers based on OWASP mobile security recommendations and developed detectors to meet the SMSD needs in industry and education.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121326976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Synthesis Technique for Concentric Rings Array Using Sectional Excitation","authors":"Salman Behboudi Amlashi","doi":"10.1109/ISNCC.2018.8530906","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530906","url":null,"abstract":"Many configuration have been used for the array antenna and rectangular or triangular networks have been the most attentive topology. In fact, Synthesis techniques can take the advantage of periodicity of these type of networks. Concentric rings array are a special type of array antennas that are used in tracking radars and acoustic systems. This type of arrays does not have linear periodicity in a plane. Therefore, many methods that are based on the linear periodicity of elements are unable to deal with the difficulty of the calculations. Besides, the number of elements in this type of arrays may be very high or even thousands of elements which makes the synthesis procedure more complicated and time consuming. In this paper, these deficiencies and complexity have been reduced in very great extent by using non-uniform sampling and sectional excitation. In the proposed technique, each array is divided into the smaller sub-arrays making up more control over the symmetric array factor by sectional excitation. This control over array factor makes possible to synthesize asymmetric pattern from such circularly symmetric arrays. The results confirm that using sectional excitation maintains the parameters of the array factor at the desired values and this is done with less time.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122704123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Efficient Adaptive Normalized Min-Sum Decoder for Irregular LDPC Codes in OFDM","authors":"Amir Atashbar-Tehrani, S. Ghazi-Maghrebi","doi":"10.1109/ISNCC.2018.8530965","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530965","url":null,"abstract":"In this letter a new decoding algorithm based on the adaptive normalized min-sum algorithm and the joint decoding algorithm is proposed for irregular low density parity check codes in OFDM system. The new proposed algorithm changes the update rule of the normalized min-sum algorithm to improve its performance. Also, instead of having separate horizontal and vertical processing phases in decoding algorithm, the vertical phase is merged with the horizontal phase. The proposed decoder improves the performance in waterfall and error floor regions. The convergence speed of the proposed algorithm is much faster. Therefore, the proposed decoder is able to converge to its final bit error rate in fewer iterations.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124773495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Jabbar, Mohammed Hayyan Alsibai, Nur Syaira S. Amran, Samiah K. Mahayadin
{"title":"Design and Implementation of IoT-Based Automation System for Smart Home","authors":"W. Jabbar, Mohammed Hayyan Alsibai, Nur Syaira S. Amran, Samiah K. Mahayadin","doi":"10.1109/ISNCC.2018.8531006","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531006","url":null,"abstract":"Home Automation System (HAS) gains popularity due to communication technology advancement. Smart home is one of the Internet of Things (IoT) applications that facilitates the control of home appliances over the Internet using automation system. This paper proposes a low-cost Wi-Fi based automation system for Smart Home (SH) in order to monitor and control home appliances remotely using Android-based application. An Arduino Mega microcontroller provided with Wi-Fi module is utilized to build the automation system. In addition, several sensors are used to monitor the temperature, humidity and motion in home. A relay board is exploited to connect the HAS with home under controlled appliances. The proposed automation system, can easily and efficiently control the electrical appliances via Wi-Fi and Virtuino mobile application.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122912224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}