2004 International Symposium on Applications and the Internet. Proceedings.最新文献

筛选
英文 中文
Malicious sniffing systems detection platform 恶意嗅探系统检测平台
2004 International Symposium on Applications and the Internet. Proceedings. Pub Date : 2004-08-24 DOI: 10.1109/SAINT.2004.1266117
Z. Trabelsi, H. Rahmani, Kamel Kaouech, M. Frikha
{"title":"Malicious sniffing systems detection platform","authors":"Z. Trabelsi, H. Rahmani, Kamel Kaouech, M. Frikha","doi":"10.1109/SAINT.2004.1266117","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266117","url":null,"abstract":"Among various types of attacks on an Ethernet network, a \"sniffing attack\" is probably one of the most difficult attacks to handle. Sniffers are programs that allow a host to capture any packets in an Ethernet network, by putting the host's network interface card (NIC) into the promiscuous mode. When a host's NIC is in the normal mode, it captures only the packets sent to the host. Since many basic services, such as FTP and SMTP, send passwords and data in clear text in the packets, Sniffers can be used by hackers to capture passwords and confidential data. This paper presents the design and implementation of two different techniques which can be used to detect any host running a sniffer on an Ethernet network. The first technique, ARP (address resolution protocol) detection, attempts first to send trap ARP request packets with fake hardware addresses, to a suspicious host. Then, based on the generated responses (ARP reply packets) and the operating system (OS) of the suspicious host, a decision is made on whether or not the suspicious host is running a sniffer. The second technique, RTT detection, uses the measurement of the RTT (round-trip time) of ICMP packets sent to suspicious hosts. Then, using a statistical model (the z-statistics) a probabilistic decision is made. The two techniques are implemented in two tools that automatically give system administrator a helping hand regarding the detection of sniffers on an Ethernet network. Related and future works are discussed.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122319270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
XML data integration with OWL: experiences and challenges 与OWL的XML数据集成:经验和挑战
2004 International Symposium on Applications and the Internet. Proceedings. Pub Date : 2004-08-24 DOI: 10.1109/SAINT.2004.1266111
P. Lehti, Péter Fankhauser
{"title":"XML data integration with OWL: experiences and challenges","authors":"P. Lehti, Péter Fankhauser","doi":"10.1109/SAINT.2004.1266111","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266111","url":null,"abstract":"XML has evolved to the format of choice for exposing data over the Web. Together with mature and maturing standards for querying XML (XSLT, XPath, and XQuery) the basic infrastructure for integrating multiple heterogeneous data sources is there. However, the versatility of XML as a data model and the unrestricted expressive power of XML query languages can lead to rather complex integration architectures, where low level syntactic heterogeneities and semantic heterogeneities are overcome all at once by means of complex query expressions. This paper explores how the Web Ontology Language OWL can be used as a more abstract modelling layer on top of XML data sources, described by an XML Schema, to which extent the semantic relationships provided by OWL can be used for mapping heterogeneous data sources to a common global schema, and how the inference mechanisms of OWL can be used to check the consistency of such mappings. Moreover, it introduces a query language for OWL as a natural extension of XQuery, and describes how these queries against a global schema are translated to XQueries against the original data sources.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121145150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
Single Sign On architecture with dynamic tokens 带有动态令牌的单点登录体系结构
2004 International Symposium on Applications and the Internet. Proceedings. Pub Date : 2004-08-24 DOI: 10.1109/SAINT.2004.1266116
Fumiko Satoh, T. Itoh
{"title":"Single Sign On architecture with dynamic tokens","authors":"Fumiko Satoh, T. Itoh","doi":"10.1109/SAINT.2004.1266116","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266116","url":null,"abstract":"Single Sign On (SSO) is a useful technology that allows users to skip bothersome authentication processes during accesses to multiple services. It is particularly useful for services for mobile terminals because of their limited resources and interfaces. Some existing SSO mechanisms only verify static data such as IDs and passwords. However, we consider that it will be quite useful if they could deal with dynamic data. We propose a new SSO architecture that uses a \"dynamic token\" that describe dynamic data such as a payment history. The architecture introduces an additional server, named \"Circulator\", which distributes the latest token values to service providers. Accordingly, the providers can correctly verify the token values sent from clients. This paper proposes an efficient algorithm for Circulator to effectively visit the providers. The result of our experiment shows the efficiency of the algorithm.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121885006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Remote visualization using resource monitoring technique for volume rendering of large datasets 利用资源监控技术实现大型数据集体绘制的远程可视化
2004 International Symposium on Applications and the Internet. Proceedings. Pub Date : 2004-08-24 DOI: 10.1109/SAINT.2004.1266135
Yasuo Ebara, Yasuhiro Watashiba, K. Koyamada, Koji Sakai, A. Doi
{"title":"Remote visualization using resource monitoring technique for volume rendering of large datasets","authors":"Yasuo Ebara, Yasuhiro Watashiba, K. Koyamada, Koji Sakai, A. Doi","doi":"10.1109/SAINT.2004.1266135","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266135","url":null,"abstract":"We present a remote visualization using resource monitoring technique for volume rendering which breaks a large volume data into pieces (sub-volumes) so as to maintain volume rendering processing in physical memory in consideration of the available system resources. Each sub-volume is transferred to a rendering PC (personal computer), which performs hardware accelerated volume rendering and generates a partial image (sub-image). The sub-images are piled up in depth order to complete the final image. This technique has been applied to remote visualization of 3D finite element analysis result of 3D flow through a lateral saccular aneurysm, and we evaluated at remote places between Kyoto and Iwate. As a result, we showed that it is possible to perform rendering of large dataset that surpasses the available resource on the client side, and our technique was effective the remote visualization.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127277752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Handling catastrophic failures in scalable Internet applications 处理可扩展Internet应用程序中的灾难性故障
2004 International Symposium on Applications and the Internet. Proceedings. Pub Date : 2004-08-24 DOI: 10.1109/SAINT.2004.1266115
Michael Haungs, R. Pandey, Earl T. Barr
{"title":"Handling catastrophic failures in scalable Internet applications","authors":"Michael Haungs, R. Pandey, Earl T. Barr","doi":"10.1109/SAINT.2004.1266115","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266115","url":null,"abstract":"User perceived quality is the most important aspect of Internet applications. After a single negative experience, users tend to switch to one of the other myriad of alternatives available to them on the Internet. Two key components of Internet application quality are scalability and reliability. In this paper, we present the first general-purpose mechanism capable of maintaining reliability in the face of process, machine, and catastrophic failures. We define catastrophic failures as events that cause entire clusters of servers to become unavailable such as network partitioning, router failures, natural disasters, or even terrorist attacks. Our mechanism utilizes client-side tunneling, client-side redirection, and implicit redirection triggers to deliver reliable communication channels. We capitalize on previous work, redirectable sockets (RedSocks), that focuses on Internet application scalability. RedSocks are communication channels enhanced with a novel session layer aimed at modernizing network communication. We modify Red-Socks to create the first fault tolerant socket solution that can handle all server-side failures. Our mechanism is compatible with NATs and firewalls, scalable, application independent, and backwards compatible.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A teleconferencing system with high-speed stream mixing for voice over IP 一种用于IP语音的高速流混合电话会议系统
2004 International Symposium on Applications and the Internet. Proceedings. Pub Date : 2004-08-24 DOI: 10.1109/SAINT.2004.1266132
Kohta Ohshima, Y. Tajima, M. Terada
{"title":"A teleconferencing system with high-speed stream mixing for voice over IP","authors":"Kohta Ohshima, Y. Tajima, M. Terada","doi":"10.1109/SAINT.2004.1266132","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266132","url":null,"abstract":"This paper presents a VoIP teleconferencing service that does not required expensive equipment and that can be administrated on a user level. The system is designed and developed so as to be independent of the user environment and to offer high QoS by reducing processing delay. This is achieved through the introduction of a high-speed mixing method to synchronize and mix RTP voice streams. The performance of a trial implementation of a teleconferencing server using this service is evaluated, and its effectiveness is confirmed.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129063960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MGMS/GML - towards a new policy specification framework for multicast group integrity MGMS/GML -迈向一个新的多播组完整性策略规范框架
2004 International Symposium on Applications and the Internet. Proceedings. Pub Date : 2004-08-24 DOI: 10.1109/SAINT.2004.1266121
A. Meissner, Sharath Babu Musunoori, L. Wolf
{"title":"MGMS/GML - towards a new policy specification framework for multicast group integrity","authors":"A. Meissner, Sharath Babu Musunoori, L. Wolf","doi":"10.1109/SAINT.2004.1266121","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266121","url":null,"abstract":"Addressing multicast group integrity management with particular regard to policy specification, this paper discusses our approach referred to as MGMS/GML - a tailored multicast group management system complemented by our group management language. We classify and compare existing policy specification approaches and find that none is sufficiently suitable for our problem domain, which includes tasks such as specifying and controlling integrity conditions on multicast group composition, e.g. limiting the number of senders in a group, or placing a cap on member fluctuation. Typical problems in group integrity management are identified, and an example illustrates the use of GML. Following an architectural and functional overview of our system, we look at selected implementation issues and describe how policies may be specified at runtime.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Multiple address service for transport (MAST) 多地址传输服务(MAST)
2004 International Symposium on Applications and the Internet. Proceedings. Pub Date : 2004-08-24 DOI: 10.1109/SAINT.2004.1266086
Dave Cocker
{"title":"Multiple address service for transport (MAST)","authors":"Dave Cocker","doi":"10.1109/SAINT.2004.1266086","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266086","url":null,"abstract":"Mobile and multihomed systems need to preserve transport and upper layer associations across changes. MAST augments classic IP with these \"multiaddressing\" capabilities, with IPv4 and IPv6, no change to packet headers and no required change to the infrastructure.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116026840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A distributed file system for Java Applet based distance learning 基于Java Applet的分布式文件系统远程学习
2004 International Symposium on Applications and the Internet. Proceedings. Pub Date : 2004-08-24 DOI: 10.1109/SAINT.2004.1266109
M. Uehara
{"title":"A distributed file system for Java Applet based distance learning","authors":"M. Uehara","doi":"10.1109/SAINT.2004.1266109","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266109","url":null,"abstract":"In our modern society, information literacy education for children in elementary school and junior high school is required. However, it can be difficult for these schools to effectively maintain a large number of PCs. In such cases, applet based educational content provided by ASP (application service provider) vendors can be useful. However, one problem with this approach is that applets cannot read or write local files. Therefore, we have developed a Java based distributed file system which is accessible from an applet. In this paper, we describe the design, implementation and evaluation of this distributed file system.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127057541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Leveraging broadband access for true on-demand delivery of Internet videos 利用宽带接入实现真正的按需互联网视频交付
2004 International Symposium on Applications and the Internet. Proceedings. Pub Date : 2004-08-24 DOI: 10.1109/SAINT.2004.1266112
Ying Cai, Zhan Chen, J. Wong
{"title":"Leveraging broadband access for true on-demand delivery of Internet videos","authors":"Ying Cai, Zhan Chen, J. Wong","doi":"10.1109/SAINT.2004.1266112","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266112","url":null,"abstract":"We consider in this paper how the increasingly popular broadband access can be leveraged for scalable and cost-effective video service. Although much work has been done for such service, the existing techniques either are not designed for on-demand video delivery, or do not take into account the vastly improved client receiving capability. In this paper, we address this problem and develop three novel video delivery techniques with two ultimate goals: minimizing service latency and maximize data sharing. With the new techniques, a client can be served as soon as server resource becomes available and meanwhile, all its receiving bandwidth can be used for data receiving. In particular, in the proposed dynamic scheduling algorithm, the efficiency of data sharing is further improved by also exploring server bandwidth for early delivery of video segments. This innovation is contradicted to the intuition that each video segment should be delivered as late as possible in order to maximize data sharing. We evaluate the performance of our new techniques using simulation and our study convincingly shows that with the new schemes, zero service latency can indeed be achieved with very minimal system resource.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128178818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信