{"title":"Malicious sniffing systems detection platform","authors":"Z. Trabelsi, H. Rahmani, Kamel Kaouech, M. Frikha","doi":"10.1109/SAINT.2004.1266117","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266117","url":null,"abstract":"Among various types of attacks on an Ethernet network, a \"sniffing attack\" is probably one of the most difficult attacks to handle. Sniffers are programs that allow a host to capture any packets in an Ethernet network, by putting the host's network interface card (NIC) into the promiscuous mode. When a host's NIC is in the normal mode, it captures only the packets sent to the host. Since many basic services, such as FTP and SMTP, send passwords and data in clear text in the packets, Sniffers can be used by hackers to capture passwords and confidential data. This paper presents the design and implementation of two different techniques which can be used to detect any host running a sniffer on an Ethernet network. The first technique, ARP (address resolution protocol) detection, attempts first to send trap ARP request packets with fake hardware addresses, to a suspicious host. Then, based on the generated responses (ARP reply packets) and the operating system (OS) of the suspicious host, a decision is made on whether or not the suspicious host is running a sniffer. The second technique, RTT detection, uses the measurement of the RTT (round-trip time) of ICMP packets sent to suspicious hosts. Then, using a statistical model (the z-statistics) a probabilistic decision is made. The two techniques are implemented in two tools that automatically give system administrator a helping hand regarding the detection of sniffers on an Ethernet network. Related and future works are discussed.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122319270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XML data integration with OWL: experiences and challenges","authors":"P. Lehti, Péter Fankhauser","doi":"10.1109/SAINT.2004.1266111","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266111","url":null,"abstract":"XML has evolved to the format of choice for exposing data over the Web. Together with mature and maturing standards for querying XML (XSLT, XPath, and XQuery) the basic infrastructure for integrating multiple heterogeneous data sources is there. However, the versatility of XML as a data model and the unrestricted expressive power of XML query languages can lead to rather complex integration architectures, where low level syntactic heterogeneities and semantic heterogeneities are overcome all at once by means of complex query expressions. This paper explores how the Web Ontology Language OWL can be used as a more abstract modelling layer on top of XML data sources, described by an XML Schema, to which extent the semantic relationships provided by OWL can be used for mapping heterogeneous data sources to a common global schema, and how the inference mechanisms of OWL can be used to check the consistency of such mappings. Moreover, it introduces a query language for OWL as a natural extension of XQuery, and describes how these queries against a global schema are translated to XQueries against the original data sources.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121145150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Single Sign On architecture with dynamic tokens","authors":"Fumiko Satoh, T. Itoh","doi":"10.1109/SAINT.2004.1266116","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266116","url":null,"abstract":"Single Sign On (SSO) is a useful technology that allows users to skip bothersome authentication processes during accesses to multiple services. It is particularly useful for services for mobile terminals because of their limited resources and interfaces. Some existing SSO mechanisms only verify static data such as IDs and passwords. However, we consider that it will be quite useful if they could deal with dynamic data. We propose a new SSO architecture that uses a \"dynamic token\" that describe dynamic data such as a payment history. The architecture introduces an additional server, named \"Circulator\", which distributes the latest token values to service providers. Accordingly, the providers can correctly verify the token values sent from clients. This paper proposes an efficient algorithm for Circulator to effectively visit the providers. The result of our experiment shows the efficiency of the algorithm.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121885006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yasuo Ebara, Yasuhiro Watashiba, K. Koyamada, Koji Sakai, A. Doi
{"title":"Remote visualization using resource monitoring technique for volume rendering of large datasets","authors":"Yasuo Ebara, Yasuhiro Watashiba, K. Koyamada, Koji Sakai, A. Doi","doi":"10.1109/SAINT.2004.1266135","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266135","url":null,"abstract":"We present a remote visualization using resource monitoring technique for volume rendering which breaks a large volume data into pieces (sub-volumes) so as to maintain volume rendering processing in physical memory in consideration of the available system resources. Each sub-volume is transferred to a rendering PC (personal computer), which performs hardware accelerated volume rendering and generates a partial image (sub-image). The sub-images are piled up in depth order to complete the final image. This technique has been applied to remote visualization of 3D finite element analysis result of 3D flow through a lateral saccular aneurysm, and we evaluated at remote places between Kyoto and Iwate. As a result, we showed that it is possible to perform rendering of large dataset that surpasses the available resource on the client side, and our technique was effective the remote visualization.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127277752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handling catastrophic failures in scalable Internet applications","authors":"Michael Haungs, R. Pandey, Earl T. Barr","doi":"10.1109/SAINT.2004.1266115","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266115","url":null,"abstract":"User perceived quality is the most important aspect of Internet applications. After a single negative experience, users tend to switch to one of the other myriad of alternatives available to them on the Internet. Two key components of Internet application quality are scalability and reliability. In this paper, we present the first general-purpose mechanism capable of maintaining reliability in the face of process, machine, and catastrophic failures. We define catastrophic failures as events that cause entire clusters of servers to become unavailable such as network partitioning, router failures, natural disasters, or even terrorist attacks. Our mechanism utilizes client-side tunneling, client-side redirection, and implicit redirection triggers to deliver reliable communication channels. We capitalize on previous work, redirectable sockets (RedSocks), that focuses on Internet application scalability. RedSocks are communication channels enhanced with a novel session layer aimed at modernizing network communication. We modify Red-Socks to create the first fault tolerant socket solution that can handle all server-side failures. Our mechanism is compatible with NATs and firewalls, scalable, application independent, and backwards compatible.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A teleconferencing system with high-speed stream mixing for voice over IP","authors":"Kohta Ohshima, Y. Tajima, M. Terada","doi":"10.1109/SAINT.2004.1266132","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266132","url":null,"abstract":"This paper presents a VoIP teleconferencing service that does not required expensive equipment and that can be administrated on a user level. The system is designed and developed so as to be independent of the user environment and to offer high QoS by reducing processing delay. This is achieved through the introduction of a high-speed mixing method to synchronize and mix RTP voice streams. The performance of a trial implementation of a teleconferencing server using this service is evaluated, and its effectiveness is confirmed.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129063960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MGMS/GML - towards a new policy specification framework for multicast group integrity","authors":"A. Meissner, Sharath Babu Musunoori, L. Wolf","doi":"10.1109/SAINT.2004.1266121","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266121","url":null,"abstract":"Addressing multicast group integrity management with particular regard to policy specification, this paper discusses our approach referred to as MGMS/GML - a tailored multicast group management system complemented by our group management language. We classify and compare existing policy specification approaches and find that none is sufficiently suitable for our problem domain, which includes tasks such as specifying and controlling integrity conditions on multicast group composition, e.g. limiting the number of senders in a group, or placing a cap on member fluctuation. Typical problems in group integrity management are identified, and an example illustrates the use of GML. Following an architectural and functional overview of our system, we look at selected implementation issues and describe how policies may be specified at runtime.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple address service for transport (MAST)","authors":"Dave Cocker","doi":"10.1109/SAINT.2004.1266086","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266086","url":null,"abstract":"Mobile and multihomed systems need to preserve transport and upper layer associations across changes. MAST augments classic IP with these \"multiaddressing\" capabilities, with IPv4 and IPv6, no change to packet headers and no required change to the infrastructure.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116026840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A distributed file system for Java Applet based distance learning","authors":"M. Uehara","doi":"10.1109/SAINT.2004.1266109","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266109","url":null,"abstract":"In our modern society, information literacy education for children in elementary school and junior high school is required. However, it can be difficult for these schools to effectively maintain a large number of PCs. In such cases, applet based educational content provided by ASP (application service provider) vendors can be useful. However, one problem with this approach is that applets cannot read or write local files. Therefore, we have developed a Java based distributed file system which is accessible from an applet. In this paper, we describe the design, implementation and evaluation of this distributed file system.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127057541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging broadband access for true on-demand delivery of Internet videos","authors":"Ying Cai, Zhan Chen, J. Wong","doi":"10.1109/SAINT.2004.1266112","DOIUrl":"https://doi.org/10.1109/SAINT.2004.1266112","url":null,"abstract":"We consider in this paper how the increasingly popular broadband access can be leveraged for scalable and cost-effective video service. Although much work has been done for such service, the existing techniques either are not designed for on-demand video delivery, or do not take into account the vastly improved client receiving capability. In this paper, we address this problem and develop three novel video delivery techniques with two ultimate goals: minimizing service latency and maximize data sharing. With the new techniques, a client can be served as soon as server resource becomes available and meanwhile, all its receiving bandwidth can be used for data receiving. In particular, in the proposed dynamic scheduling algorithm, the efficiency of data sharing is further improved by also exploring server bandwidth for early delivery of video segments. This innovation is contradicted to the intuition that each video segment should be delivered as late as possible in order to maximize data sharing. We evaluate the performance of our new techniques using simulation and our study convincingly shows that with the new schemes, zero service latency can indeed be achieved with very minimal system resource.","PeriodicalId":340968,"journal":{"name":"2004 International Symposium on Applications and the Internet. Proceedings.","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128178818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}