{"title":"A survey of defense mechanisms against application layer distributed denial of service attacks","authors":"Yadong Wang, Lianzhong Liu, Bo Sun, Yingbo Li","doi":"10.1109/ICSESS.2015.7339229","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339229","url":null,"abstract":"Application layer Distributed Denial of Service (DDoS) attacks, which are legitimate in packets and protocols, gradually become a pressing problem to the current network. How to effectively resist this type of attack is becoming even more challenging with the vast resources and techniques increasingly available to attackers. This paper studies the existing application layer DDoS attacks and provides a comprehensive survey of contemporary defense mechanisms. Our primary intention is to comprehensively understand application layer DDoS and the techniques proposed recently to resist it. And we anticipate that the research community could develop better defense mechanisms to counter this type of attack in the near future.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134262648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of P2P users' action simulation system","authors":"Yulong Yang, Lianzhong Liu, Shu Min","doi":"10.1109/ICSESS.2015.7339011","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339011","url":null,"abstract":"With the rapid development of P2P network technology, the share of P2P Internet traffic is growing among the total internet traffic. Because of the complex structure of P2P network and its protocals is flexible, most of the traditional P2P simulations simulate P2P protocols. This paper presents a distributed P2P users' action simulation system which is able to flexibly configure the content and P2P users' action sequence. Meantime, the system can simulate the execution progress of the action sequence of the P2P network for multiple users with generated data traffic containing specific content. At the same time, the system also provides rich users' action sequence templates, and records the execution progress and corresponding results. Experiments show that the system can simulate real users' action P2P sequence through simple and flexible configuration.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134432462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information security risk assessment based on two stages decision model with grey synthetic measure","authors":"Hongsheng Luo, Yongjun Shen, Guidong Zhang, Liangliang Huang","doi":"10.1109/ICSESS.2015.7339176","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339176","url":null,"abstract":"To solve the fuzziness and uncertainty from many aspects on information security risk assessment, this paper proposes the information security risk assessment approach based on two stages decision model with grey synthetic measure. Firstly, the assessment criteria weights are determined by means of the combination of Delphi method and the adjacent criterion comparison method, and the grades of assessment results are determined; secondly, unity grey clustering coefficients or decision coefficients with synthetic measure are computed by grey clustering theory; at last, the grey classes of objects are determined and objects are squenced by risk values. Through case study, this method solves the uncertainty in parameter values and other factors, reduces the subjectivity of assessment process, and provides a new thought to information security risk assessment.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134517001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of multimedia repository system based on middle tier structure","authors":"Lingzi Xiao, Sanxing Cao","doi":"10.1109/ICSESS.2015.7339032","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339032","url":null,"abstract":"Omni Media has become an important trend with the development of information services in the context of network convergence and screen integration. In such an environment, Internet interaction is no longer limited to the computer, users can also access Internet resources through wearable and other smart computing devices. This paper proposes a multimedia repository system, which is composed of client file upload module, task allocation core middle tier module of server side, file fragments merge module and media transcoding module. In section I, we comprehensively analyzed the current mainstream large file upload method based on the browser and discuss the features of each method. Then we proposed a combination of Ajax with XMLHttpRequest Level 2, File API and other technologies to achieve large media file segments upload in section II. In section III, we described the core task allocation middle tier module of server architecture which allows the system to receive media resources from various types of terminals and upload to the cloud server repository without size limit. Furthermore, we gave an example of completing the file upload and file fragments merge by using the core task allocation middle tier.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133884749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Person attributes extraction in profiles based on SVM and pattern","authors":"Zhen Zhu, Yuan Sun","doi":"10.1109/ICSESS.2015.7339037","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339037","url":null,"abstract":"This paper is an exploration to find a way to get the person attributes in profiles. Considering those attributes exists in large volume of unstructured data, and it is very difficult to gain in a short time. So, we use a method combing the pattern and SVM to extract the person attributes. Firstly, we collect many raw profiles in websites by our configurable crawler. Secondly, we use statistic methods to do pre-processing works include lexical analysis and name recognition. Thirdly, we build the patterns, which can use in model to extract the person attributes. Also we generalize those patterns to SVM features. Finally, we use SVM assisted with pattern-based method to predict the person attributes. The results prove the method is effective and the data we extracted is useful in building specific-areas' expert database and information retrieval.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127578479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improved map-matching algorithmbased on lowfrequency GPS data","authors":"Guicheng Shen, Baicheng Tang, Cailin Zhang","doi":"10.1109/ICSESS.2015.7339186","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339186","url":null,"abstract":"It is important to match vehicle GPS points onto a map. Many map-matching algorithms, which use heading, speed and position to complete the map-matching process, are not suitable for the low frequency GPS data. The distance between two adjacent GPS points in the low frequency GPS data can range from 500m to 1000m, and the vehicle can cross several streets. This paper puts forward a modified weight-based algorithm using the vertical distance and the shortest path. This weight-based algorithm uses the instantaneous speed of two points to estimate the vehicle travel distance. Therefore, the improved algorithm has the higher accuracy.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130932838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parametric hierarchical mesh interconnected structure for Network-on-Chip","authors":"Yuhan Zhou, Gang Jian, Guodong Han","doi":"10.1109/ICSESS.2015.7339035","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339035","url":null,"abstract":"With the integration of cores increasing, the on-chip-network (NoC) latency and the throughput are getting worse in traditional structures. This paper proposed a novel parameter-based on the hierarchical mesh interconnected NoC (PHMNoC) to improve the integration and performance. We use structural parameters and cross-layer threshold parameter to achieve scalability for different system size and balance traffic load among layers respectively. Experimental results demonstrated that PHMNoC had lower latency and higher throughput than conventional 2D mesh and hierarchical NoC such as Concentrated-Mesh and Cluster-Hierarchical-Mesh in different size systems, while the increasement of resources overhead was modest.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128839562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prioritization of test scenarios using hybrid genetic algorithm based on UML activity diagram","authors":"Xinying Wang, Xiajun Jiang, Huibin Shi","doi":"10.1109/ICSESS.2015.7339189","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339189","url":null,"abstract":"Software testing is an essential part of the SDLC(Software Development Life Cycle). Test scenarios are used to derive test cases for model based testing. However, with the software rapidly growing in size and complexity, the cost of software will be too high if we want to test all the test cases. So this paper presents an approach using Hybrid Genetic Algorithm(HGA) to prioritize test scenarios, which improves efficiency and reduces cost as well. The algorithm combines Genetic Algorithm(GA) with Particle Swarm Optimization(PSO) algorithm and uses Local Search Strategy to update the local and global best information of the PSO. The proposed algorithm can prioritize test scenarios so as to find a critical scenario. Finally, the proposed method is applied to several typical UML activity diagrams, and compared with the Simple Genetic Algorithm(SGA). The experimental results show that the proposed method not only prioritizes test scenarios, but also improves the efficiency, and further saves effort, time as well as cost.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114764495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of the Mongolian synergistic index technology based on Lucene","authors":"Wei Dong, H. Mei, Song Yun","doi":"10.1109/ICSESS.2015.7339065","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339065","url":null,"abstract":"Based on deep analysis and research on the Lucene index mechanism, the paper uses memory as buffer to construct index file, combined with disk index storage, and carries on the collaborative index, forming an extensible search engine solution, which greatly alleviates the bottleneck problem of building index to search.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117070907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the semi-supervised fuzzy clustering algorithm with pariwise constraints for intrusion detection","authors":"Feng Guorui","doi":"10.1109/ICSESS.2015.7339078","DOIUrl":"https://doi.org/10.1109/ICSESS.2015.7339078","url":null,"abstract":"Traditional FCM algorithm has the problems of sensitivity to initialization, local optimal and the Euclidean distance is only applied to handle the dataset of spatial data structure for the super-ball. Hence a semi-supervised Fuzzy C-Means algorithm based on pairwise constraints for the intrusion detection is proposed. The pairwise constraints can be used to improve the learning ability of the algorithm and the detection rate. The KDDCUP99 data sets were selected as the experimental object. The experiment result proves that the detection rate and the false rate can be more efficiently improved by the semi-supervised FCM clustering algorithm than the traditional FCM algorithm.","PeriodicalId":335871,"journal":{"name":"2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123585943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}