2007 IEEE International Performance, Computing, and Communications Conference最新文献

筛选
英文 中文
Optimising Networks Against Malware 针对恶意软件优化网络
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358935
P. Bureau, José M. Fernandez
{"title":"Optimising Networks Against Malware","authors":"P. Bureau, José M. Fernandez","doi":"10.1109/PCCC.2007.358935","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358935","url":null,"abstract":"Rapidly-spreading malicious software is an important threat on today's computer networks. Most solutions that have been proposed to counter this threat are based on our ability to quickly detect the malware-generated traffic or the malware instances themselves, something that in many cases can be beyond our ability. Nonetheless, it seems intuitive that certain defensive postures adopted in configuring networks or machines can have a positive impact on countering malware, regardless of our ability to detect it. It is thus important to quantitatively understand how changes in design and deployment strategies can affect malware performance; only then does it become possible to make optimal decisions. To that purpose, we study in this paper the impact of network interconnection topologies on the propagation of malware. We first use a theoretical model based on Markov processes to try to predict the progression of an infection under varying interconnection scenarios. We then compare these predictions with experimental results obtained by launching a malware emulation agent on three differently configured networks. Both theoretical and experimental results provide quantitative confirmation of the intuition that networks with higher degrees of interconnection allow faster spread of malware. In addition to this, we believe that the models, experimental methodology and tools described here can be safely and fruitfully used to study other aspects of malware performance, and hence of the relative effectiveness of defensive counter-measures.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124211251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TCP Vegas Performance with Streaming Media TCP Vegas性能与流媒体
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358877
Sean D. Boyden, A. Mahanti, C. Williamson
{"title":"TCP Vegas Performance with Streaming Media","authors":"Sean D. Boyden, A. Mahanti, C. Williamson","doi":"10.1109/PCCC.2007.358877","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358877","url":null,"abstract":"In this paper we study the use of TCP Vegas as a transport protocol for streaming media. We also consider TCP NewReno as a transport protocol for streaming media. We find that: 1) TCP is able to transport streaming media with good performance in a wide variety of scenarios; 2) TCP Vegas performs better than TCP NewReno in many cases; and 3) for viable media streams, both TCP variants need to achieve mean throughputs that are at least 1.5 times the encoding rate of the media objects being carried.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133849606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce 移动电子商务中电子支付系统的欺诈与入侵检测方法
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358919
P. Venkataram, B. Babu, M. Naveen, G. H. S. Gungal
{"title":"A Method of Fraud & Intrusion Detection for E-payment Systems in Mobile e-Commerce","authors":"P. Venkataram, B. Babu, M. Naveen, G. H. S. Gungal","doi":"10.1109/PCCC.2007.358919","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358919","url":null,"abstract":"The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abases in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as activity-event-symptoms (AES) model for detecting fraud and intrusion attacks which appears daring payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs daring mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133987792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Composite Event Detection in Wireless Sensor Networks 无线传感器网络中的复合事件检测
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358903
Chinh T. Vu, R. Beyah, Yingshu Li
{"title":"Composite Event Detection in Wireless Sensor Networks","authors":"Chinh T. Vu, R. Beyah, Yingshu Li","doi":"10.1109/PCCC.2007.358903","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358903","url":null,"abstract":"Sensor networks can be used for event alarming applications. To date, in most of the proposed schemes, the raw or aggregated sensed data is periodically sent to a data consuming center. However, with this scheme, the occurrence of an emergency event such as a fire is hardly reported in a timely manner which is a strict requirement for event alarming applications. In sensor networks, it is also highly desired to conserve energy so that the network lifetime can be maximized. Furthermore, to ensure the quality of surveillance, some applications require that if an event occurs, it needs to be detected by at least k sensors where k is a user-defined parameter. In this work, we examine the timely energy-efficient k-watching event detection problem (TEKWEO). A topology-and-routing-supported algorithm is proposed which constructs a set of detection sets that satisfy the short notification time, energy conservation, and tunable quality of surveillance requirements for event alarming applications. Simulation results are shown to validate the proposed algorithm.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130134781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Self-Adaptive Two-Dimensional RAID Arrays 自适应二维RAID
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358901
Jehan-Francois Pâris, T. Schwarz, D. Long
{"title":"Self-Adaptive Two-Dimensional RAID Arrays","authors":"Jehan-Francois Pâris, T. Schwarz, D. Long","doi":"10.1109/PCCC.2007.358901","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358901","url":null,"abstract":"We propose increasing the survivability of data stored in two-dimensional RAID arrays by causing these arrays to reorganize themselves whenever they detect a disk failure. This reorganization will rebalance as much as possible the redundancy level of all stored data, thus reducing the potential impact of additional disk failures. It remains in effect until the failed disk gets repaired. We show how our technique can be applied to two-dimensional RAID arrays consisting of n2 data disks and 2n parity disks and show how it can increase the mean time to data loss of the array by at least 200 percent as long as the reorganization process takes less than half the time it takes to replace a failed disk.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121286538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Additive Increase Smooth Decrease (AISD) Strategy for Data and Streaming Applications 数据和流应用的加性增加平滑减少(AISD)策略
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-11 DOI: 10.1109/PCCC.2007.358876
Sivakumar Bakthavachalu, Steven Bassi, Xu Jianxuan, M. Labrador
{"title":"An Additive Increase Smooth Decrease (AISD) Strategy for Data and Streaming Applications","authors":"Sivakumar Bakthavachalu, Steven Bassi, Xu Jianxuan, M. Labrador","doi":"10.1109/PCCC.2007.358876","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358876","url":null,"abstract":"Voice over IP and video applications continue to increase the amount of real-time traffic over the Internet. These applications utilize the UDP protocol because TCP is not suitable for streaming applications since its congestion control mechanism can change the connection's transmission rate drastically, affecting the user-perceived quality of the transmission. Nonetheless, the use of end-to-end flow and congestion control mechanisms for streaming applications has been acknowledged as an important measure to ease or eliminate the congestion collapse problem in the Internet, and the unfairness problem that exist when TCP and UDP share the same congested bottleneck link. In this paper, we propose the smooth fair TCP SACK-based (SF-SACK) protocol to address these problems. SF-SACK implements the well-known end-to-end window-based congestion control algorithm of TCP but uses an additive increase smooth decrease (AISD) strategy that considers history in the evolution of the congestion window. Through simulations and experimentation, we show that if SF-SACK is used by both streaming and data-oriented applications, streaming applications receive a smooth service, and fairness is achieved. If SF-SACK is used for streaming applications only, it is unfair to TCP (not TCP-friendly) but substantially fairer and beneficial than UDP.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127859500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Scheduling of Periodic Packets in Energy-Aware Wireless Networks 能量感知无线网络中周期数据包的调度
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-01 DOI: 10.1109/PCCC.2007.358897
X. Qin, Mohammed I. Alghamdi, Mais Nijim, Ziliang Zong, K. Bellam
{"title":"Scheduling of Periodic Packets in Energy-Aware Wireless Networks","authors":"X. Qin, Mohammed I. Alghamdi, Mais Nijim, Ziliang Zong, K. Bellam","doi":"10.1109/PCCC.2007.358897","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358897","url":null,"abstract":"Existing packets scheduling algorithms designed for energy-efficient wireless networks ignore important features of periodic packets, thereby being inadequate for periodic packets with energy constraints. To remedy this problem, we present in this paper an approach to scheduling periodic packets in wireless networks subject to both timing and energy constraints. We propose a necessary and sufficient feasibility check for a set of periodic packets to be transmitted over a wireless link. Next, we develop an algorithm to schedule periodic packets (or ESPP for short) over a wireless link. The ESPP algorithm aims at minimizing energy dissipation of periodic packets without missing deadlines of periodic packets. We show through simulation studies that ESPP can significantly reduce energy consumption of wireless networks by an average of 46.4% while guaranteeing timing constraints of periodic packets.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128054552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Workload Characterization for News-on-Demand Streaming Services 新闻点播流媒体服务的工作负载表征
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-01 DOI: 10.1109/PCCC.2007.358909
F. T. Johnsen, T. Hafsoe, C. Griwodz, P. Halvorsen
{"title":"Workload Characterization for News-on-Demand Streaming Services","authors":"F. T. Johnsen, T. Hafsoe, C. Griwodz, P. Halvorsen","doi":"10.1109/PCCC.2007.358909","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358909","url":null,"abstract":"This paper focuses on design issues for multimedia distribution architectures and the impact workload characteristics have on architecture design. Our contribution is an analysis of server load and user behavior in a news-on-demand environment, with focus on access patterns, popularity modeling, and the formation of traffic peaks. Finally, we evaluate an existing synthetic workload generator, MediSyn, and suggest some enhancements which will improve its suitability for news-on-demand workload modeling.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128621847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures 面向第一响应者和关键基础设施的公共安全无线电和商用蜂窝综合网络的QoS提供
2007 IEEE International Performance, Computing, and Communications Conference Pub Date : 2007-04-01 DOI: 10.1109/PCCC.2007.358942
F. Yu, Helen Tang, Victor C. M. Leung
{"title":"QoS Provisioning in Public Safety Radio and Commercial Cellular Integrated Networks for First Responders and Critical Infrastructures","authors":"F. Yu, Helen Tang, Victor C. M. Leung","doi":"10.1109/PCCC.2007.358942","DOIUrl":"https://doi.org/10.1109/PCCC.2007.358942","url":null,"abstract":"The complementary characteristics of public safety radio networks and commercial cellular networks make it attractive to integrate these two wireless access technologies to provide first responders with a wide variety of advanced services (e.g., multimedia). In this integrated system, service availability is a critical quality of service (QoS) requirement. This paper formulates the QoS provisioning problem and proposes an algorithm for solving the problem. The QoS constraint can be guaranteed in the proposed scheme by reserving some bandwidth in cellular networks for first responders. Numerical examples illustrate that the proposed scheme can significantly improve the service availability QoS for first responders.","PeriodicalId":356565,"journal":{"name":"2007 IEEE International Performance, Computing, and Communications Conference","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123658837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信