29th Annual IEEE International Conference on Local Computer Networks最新文献

筛选
英文 中文
Extracting attack knowledge using principal-subordinate consequence tagging case grammar and alerts semantic networks 利用主从推理标注、大小写语法和警报语义网络提取攻击知识
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.57
W. Yan, E. Hou, N. Ansari
{"title":"Extracting attack knowledge using principal-subordinate consequence tagging case grammar and alerts semantic networks","authors":"W. Yan, E. Hou, N. Ansari","doi":"10.1109/LCN.2004.57","DOIUrl":"https://doi.org/10.1109/LCN.2004.57","url":null,"abstract":"The increasing use of intrusion detection systems and a relatively high false alarm rate can lead to a huge volume of alerts. This makes it very difficult for security administrators to analyze and detect network attacks. Our solution for this problem is to make the alerts machine understandable. We propose a novel way to convert the raw alerts into machine understandable uniform streams, correlate the streams, and extract the attack scenario knowledge. The modified case grammar principal-subordinate consequence tagging case grammar and the 2-atom alert semantic network are used to generate the attack scenario classes. Alert mutual information is also applied to calculate the alert semantic context window size. Based on the alert context, the attack scenario instances are extracted and the attack scenario descriptions are forwarded to the security administrator.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131282093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Estimating coverage holes and enhancing coverage in mixed sensor networks 混合传感器网络中覆盖漏洞估计与增强覆盖
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.53
Aniruddha Ghosh
{"title":"Estimating coverage holes and enhancing coverage in mixed sensor networks","authors":"Aniruddha Ghosh","doi":"10.1109/LCN.2004.53","DOIUrl":"https://doi.org/10.1109/LCN.2004.53","url":null,"abstract":"Area coverage is one of the most fundamental problems in ad hoc wireless sensor networks because it directly relates to optimization of resources in a sensing field. Maximizing the coverage area while maintaining a lower cost of deployment has always been a challenge, especially when the monitoring region is unknown and possibly hazardous. In this paper, we present a method to deterministically estimate the exact amount of coverage holes under random deployment using Voronoi diagrams and use the static nodes to collaborate and estimate the number of additional mobile nodes needed to be deployed and relocated to optimal positions to maximize coverage. We follow a two-step deployment process in a mixed sensor network and we argue by simulation and analysis that our collaborative coverage enhancing algorithm (COVEN) can achieve a tradeoff between the cost of deployment and percentage of area covered.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132722935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 165
Introducing a hybrid Fast and Hierarchical MIPv6 scheme in a UMTS-IP converged architecture 在UMTS-IP融合架构中引入快速和分层混合的MIPv6方案
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.68
L. Dimopoulou, G. Leoleis, I. Venieris
{"title":"Introducing a hybrid Fast and Hierarchical MIPv6 scheme in a UMTS-IP converged architecture","authors":"L. Dimopoulou, G. Leoleis, I. Venieris","doi":"10.1109/LCN.2004.68","DOIUrl":"https://doi.org/10.1109/LCN.2004.68","url":null,"abstract":"IP technology will play a key role in beyond 3G systems, which face the great challenge of integration so as to provide seamless services to users anywhere and anytime. Apart from its natural role as a unifier, IP also comprises the main drive for network evolution towards all-IP network infrastructures. In this regard, we exploit IP as an enabler for the evolution of the UMTS packet-switched core network, eliminating its duality at user and transport level. We focus on mobility management in the core network, which is handled by pure IP mechanisms, and on the support of fast handoff across UMTS access networks by means of a hybrid Fast and Hierarchical Mobile IPv6 (F/HMIPv6) proposal. Emphasis is also put on identifying the proper points of interaction between the F/HMIPv6 operation and the UMTS-specific serving radio network subsystem (SRNS) relocation procedure in order to provide a seamless handoff service to the user while not compromising the network's performance and scalability.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Human mobility in MANET disaster area simulation - a realistic approach MANET灾害区域模拟中的人员移动性——一种现实方法
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.64
N. Aschenbruck, M. Frank, P. Martini, J. Tölle
{"title":"Human mobility in MANET disaster area simulation - a realistic approach","authors":"N. Aschenbruck, M. Frank, P. Martini, J. Tölle","doi":"10.1109/LCN.2004.64","DOIUrl":"https://doi.org/10.1109/LCN.2004.64","url":null,"abstract":"Disaster areas have been figured out as a typical usage scenario for mobile wireless ad-hoc networks (MANETs). In contrast to this, there are no specific mobility or traffic models for MANETs. We present a realistic approach to realize mobility in disaster areas based on tactical issues of civil protection. The new model is analyzed and compared to Gauss-Markov and random waypoint mobility models. Furthermore, we present first simulation results. The mobility model analysis as well as the simulation are based on two real disasters that occurred in Germany in 1999 and 2001. We show that disaster area scenarios have specific characteristics. Thus, they should be considered in MANET performance evaluation.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114697481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Efficient hybrid multicast routing protocol for ad-hoc wireless networks ad-hoc无线网络的高效混合组播路由协议
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.47
J. Biswas, M. Barai, S. Nandy
{"title":"Efficient hybrid multicast routing protocol for ad-hoc wireless networks","authors":"J. Biswas, M. Barai, S. Nandy","doi":"10.1109/LCN.2004.47","DOIUrl":"https://doi.org/10.1109/LCN.2004.47","url":null,"abstract":"An ad hoc network is composed of mobile nodes without any infrastructure. Mobile nodes self organize themselves to form a network over radio links. The trend of applications of mobile ad hoc networks requires increased group oriented services. Hence multicast support is critical for ad hoc networks. As the number of participating nodes increase, scalability becomes an important issue. The on demand multicast routing protocol (ODMRP) provides high packet delivery ratio in presence of high mobility. But ODMRP suffers from higher control overhead as the network size and the number of source nodes increase. In this paper we present an efficient hybrid multicast routing protocol suitable for high mobility applications which addresses the scalability issue of the ODMRP protocol. This protocol separates out the data forwarding path from the join-query forwarding path. We incorporate a low overhead local clustering technique to classify all nodes into core and normal categories. When multicast routes to destination nodes are unavailable, join-query messages are sent to all nodes in the network and data packets are forwarded by the core nodes to the destination nodes using differential destination multicast. Through simulations we show that this protocol reduces control overhead and increases packet delivery ratio by 20-50% for different network scenarios.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117171009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A novel approach to quality of service in active networks 主动网络服务质量的一种新方法
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.4
David Fuin, Éric Garcia, H. Guyennet
{"title":"A novel approach to quality of service in active networks","authors":"David Fuin, Éric Garcia, H. Guyennet","doi":"10.1109/LCN.2004.4","DOIUrl":"https://doi.org/10.1109/LCN.2004.4","url":null,"abstract":"This work presents the two approaches usually chosen in order to obtain quality of service (QoS) in active networks. The first one, we call the \"active approach\", allows us to define protocols (or services) adapted to flow contents (in particular their semantics) but does not permit us to set priorities to flows. The second one uses QoS provided by the IP network layer (under active networks). The weakness of this latter approach is then identified: while it simplifies the implementation of QoS in active networks, the obtained QoS is almost as flexible as the service offered by IP layer. We propose a new approach where QoS is managed at \"active network\" layer rather than at IP layer. This new approach is far more flexible and allows us to provide QoS mechanisms not limited by those at the IP layer. We show that our solution offers QoS with a better granularity: packet-grained rather than flow-grained We have performed many experiments that validate this flexible approach of QoS at the active network layer in particular on the high-speed active node Tamanoir.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127589924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An adaptive distributed ID assignment scheme for CSMA/IC 一种CSMA/IC自适应分布式ID分配方案
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.16
Tiantong You, C. Yeh, H. Hassanein
{"title":"An adaptive distributed ID assignment scheme for CSMA/IC","authors":"Tiantong You, C. Yeh, H. Hassanein","doi":"10.1109/LCN.2004.16","DOIUrl":"https://doi.org/10.1109/LCN.2004.16","url":null,"abstract":"We investigate a new collision-free MAC protocol for ad hoc wireless networks, namely carrier sense media access/ID countdown (CSMA/IC), which can achieve 100% collision-free performance by solving both the \"hidden terminal\" and the concurrent sending problems. Furthermore, we propose an efficient ID assignment mechanism for CSMA/IC. With the new ID assignment mechanism, the length of the medium competition period before data transmission is greatly decreased. This further leads to an increase in network throughput, especially in high speed wireless networks.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124554039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Consensus: a system study of monitoring applications for wireless sensor networks 共识:无线传感器网络监测应用的系统研究
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.37
A. D. Chowdhury, Shivashankar Balu
{"title":"Consensus: a system study of monitoring applications for wireless sensor networks","authors":"A. D. Chowdhury, Shivashankar Balu","doi":"10.1109/LCN.2004.37","DOIUrl":"https://doi.org/10.1109/LCN.2004.37","url":null,"abstract":"The ease of deployment and the low cost of static ad-hoc wireless sensor networks, make them an ideal infrastructure of choice for various monitoring applications. The flexibility of expressing meaningful queries in terms of user defined regions form an important goal of any such monitoring and query framework. Towards efficient implementation of that goal, we emphasize upon the need for supporting application-defined regions, in contrast to network driven automatic cluster-formations (either flat or hierarchical - which are typically query-agnostic).","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124827786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Identification of intrusion scenarios through classification, characterization and analysis of firewall events 通过对防火墙事件的分类、表征和分析,识别入侵场景
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.65
L. Gaspary, Cristina Melchiors, Fábio Elias Locatelli, F. Dillenburg
{"title":"Identification of intrusion scenarios through classification, characterization and analysis of firewall events","authors":"L. Gaspary, Cristina Melchiors, Fábio Elias Locatelli, F. Dillenburg","doi":"10.1109/LCN.2004.65","DOIUrl":"https://doi.org/10.1109/LCN.2004.65","url":null,"abstract":"The content analysis of firewall logs is essential (i) to quantify and identify accesses to external and private networks, (ii) to follow the historical growth of accesses volume and applications used, (iii) to debug problems on the configuration of filtering rules and (iv) to recognize suspicious event sequences that indicate strategies used by intruders in attempts to obtain non-authorized access to stations and services. The paper presents an approach to classify, characterize and analyze events generated by firewalls. The proposed approach explores the case-based reasoning technique to identify possible intrusion scenarios. The paper also describes the validation of our approach carried out based on real logs generated during one week by the university firewall.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134329816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance evaluation of multi-fractal nature of TCP traffic with RED gateway 基于RED网关的TCP流量多重分形性能评价
29th Annual IEEE International Conference on Local Computer Networks Pub Date : 2004-11-16 DOI: 10.1109/LCN.2004.95
H. Doi, T. Matsuda, M. Yamamoto
{"title":"Performance evaluation of multi-fractal nature of TCP traffic with RED gateway","authors":"H. Doi, T. Matsuda, M. Yamamoto","doi":"10.1109/LCN.2004.95","DOIUrl":"https://doi.org/10.1109/LCN.2004.95","url":null,"abstract":"TCP traffic has been reported to have not only self-similarity but also a multi-fractal nature. The multi-fractal nature of traffic volume in general is well known to have a significant influence on queueing behavior in short time scales. In our previous study, we showed that the retransmission time out (RTO) mechanism plays an important role in the multi-fractal nature of TCP traffic. In this paper, we investigate how to control the multifractal nature of TCP traffic in a real network. Here we focus on the random early detection (RED) mechanism in order to reduce the occurrence of RTO. We evaluate the RED mechanism from the viewpoint of its multi-fractal nature and show that the RED mechanism improves not only throughput and delay performance, but also the multi-fractal nature of TCP traffic.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书