2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems最新文献

筛选
英文 中文
A distributed intrusion detection model based on cloud theory 基于云理论的分布式入侵检测模型
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664443
Han Li, Qiuxin Wu
{"title":"A distributed intrusion detection model based on cloud theory","authors":"Han Li, Qiuxin Wu","doi":"10.1109/CCIS.2012.6664443","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664443","url":null,"abstract":"Cloud computing is defined as the storage, management, processing, and accessing information and other data stored in a specific server. With the advent of internet, intrusion attacks have gained sophistication over the time. Distributed attacks could not be detected by the present available intrusion detection system. In this case, we propose a distributed intrusion detection model based on Cloud theory. Our model is composed by Intrusion Detection Agent subsystem and Data Aggregation subsystem. Intrusion Detection Agent subsystem has three parts: data collection module, Cloud decision-making module and communication module. An intrusion detection algorithm based on Cloud theory was proposed to detect intrusion behavior and improve the detection ability to complicated intrusion. Followed by our model, we introduced a strategy to defend DDoS attack using the elastic properties of cloud platform.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116265012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A scalable and efficient multicast system for data center 一种可扩展、高效的数据中心多播系统
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664427
Dexin Cui, Guoliang Chen, Yinlong Xu, Gaifan Li
{"title":"A scalable and efficient multicast system for data center","authors":"Dexin Cui, Guoliang Chen, Yinlong Xu, Gaifan Li","doi":"10.1109/CCIS.2012.6664427","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664427","url":null,"abstract":"It is a common case in many cloud computing applications to transfer massive amount of data from a source to multiple destinations, which is usually be implemented with IP multicast. However, IP multicast is not supported in dater center, so to implement one-to-many communication in data center is an important issue. This paper addresses this problem by proposing JU, a new multicast system, which includes: 1) An application method with the topology knowledge to build and maintain multicast tree; 2) A scalable approach to forward multicast packets which is not limited by hardware; 3) A new TCP-friendly multicast transport protocol which makes the receivers get the packets as fast as they can. With simulation, we show that the multicast completion time of our approach is shorter than other technologies'. If IP multicast is deployed in data center without the limit, JU's completing time is only 50% of IP multicast. We also show that our transport protocol is fair with TCP.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121441896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The identification for P2P Thunder traffic based on deep flow identification 基于深度流识别的P2P雷电流量识别
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664225
Jie Liu, Fang Liu, Dazhong He
{"title":"The identification for P2P Thunder traffic based on deep flow identification","authors":"Jie Liu, Fang Liu, Dazhong He","doi":"10.1109/CCIS.2012.6664225","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664225","url":null,"abstract":"Network traffic analysis and identification play important roles in network traffic monitoring. The network applications are the root causes to generate network traffic and network behavior. Network traffic analysis and identification is the basis of other network problems, which provides ISP an effective basis to control and distinguish the network traffic. With the popularity of Internet, \"download\" has become one of the most important parts of the domestic Internet users. As more and more resources, there is more and more enthusiastic discussion of the download tools. This paper takes one of the most popular download applications Thunder (also called Xunlei) for example, indicating the significance of the flow-based statistical network traffic classification and identification. Through the characteristics extraction, we can identify the Thunder traffic with high accuracy, and at the same time, the time cost in the experiment is reduced a lot.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127793100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Android browser fuzzing based on bitmap structure 基于位图结构的Android浏览器模糊测试研究
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664259
Yuanwei Hou, Guo Tao, Zhiwei Shi, Liu Juan
{"title":"Research on Android browser fuzzing based on bitmap structure","authors":"Yuanwei Hou, Guo Tao, Zhiwei Shi, Liu Juan","doi":"10.1109/CCIS.2012.6664259","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664259","url":null,"abstract":"As one of the most important methods of vulnerability mining, the technology of fuzzing is developing rapidly and widely used during vulnerability analysis of various kinds of software. Nowadays, with the widespread craze of Android phones, the security of Android operating system has drawn more and more attention. However, fuzzing technology of Android is still in the beginning and professional fuzzing products of Android are unavailable. In this article, a fuzzing method of Android browser based on bitmap structure is presented. The result of experiment proves that this method is efficient in triggering Android browser crashes and can help with further work of analysis and exploitation.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session segmentation method based on COBWEB 基于COBWEB的会话分割方法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664386
Zhenshan Hou, Mingliang Cui, Ping Li, Liuliu Wei, Wenhao Ying, Wanli Zuo
{"title":"Session segmentation method based on COBWEB","authors":"Zhenshan Hou, Mingliang Cui, Ping Li, Liuliu Wei, Wenhao Ying, Wanli Zuo","doi":"10.1109/CCIS.2012.6664386","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664386","url":null,"abstract":"Session segmentation can not only facilitate further study of users' interest mining but also act as the foundation of other retrieval researches based on users' complicated search behaviors. This paper proposes session boundary discrimination model (the binary classification tree) utilizing time interval and query likelihood on the basis of COBWEB. The model has prominently improved recall ratio, precision ratio and value F to more than 90 percent and particularly the value F for yes class rises compared with previous study. It is an incremental algorithm that can deal with large scale data, which will be perfectly applied into user interest mining. Owing to its good performance in session boundary discrimination, the application of the model can serve as a tool in fields like personalized information retrieval, query suggestion, search activity analysis and other fields which have connection with search results improvement.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"310 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115904431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Archive-shared cooperative coevolutionary algorithm using Nash equilibria preservation 基于纳什均衡保存的档案共享协同进化算法
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664358
Haoyang Chen, Yasukuni Mori, I. Matsuba
{"title":"Archive-shared cooperative coevolutionary algorithm using Nash equilibria preservation","authors":"Haoyang Chen, Yasukuni Mori, I. Matsuba","doi":"10.1109/CCIS.2012.6664358","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664358","url":null,"abstract":"Cooperative Coevolutionary Algorithm (CCEA) has been widely applied to solve large scale and complex problems, which result in significant speedups over traditional genetic algorithm. However, CCEA do not search for the optimal solutions but the compromised solutions because of its nature of cooperation. So in the case that the object problem has infinite Nash equilibria, CCEA is expected to converge into suboptimal solution even employing the shared archive. In this paper, we propose a Nash equilibria preservation strategy which enables CCEA to jump out of the suboptimal solution and to keep searching without falling into the same suboptimal solutions found so far. The experiment results show that the capability of the archive-shared CCEA has been improved by using the proposed strategy, especially in dealing with problem having infinite Nash equilibria.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132537981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chinese Multimedia Messaging Service (MMS) analysis using hadoop 中文多媒体消息服务(MMS)分析使用hadoop
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664403
Chao Dong, Bolun Huang, Zhenming Lei, Jie Yang
{"title":"Chinese Multimedia Messaging Service (MMS) analysis using hadoop","authors":"Chao Dong, Bolun Huang, Zhenming Lei, Jie Yang","doi":"10.1109/CCIS.2012.6664403","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664403","url":null,"abstract":"Multimedia Messaging Service (MMS), is one of the most popular mobile data services in China. The current MMS user base is still undergoing steady growth with the popularization of 3G in China. Hence, a comprehensive understanding of the characteristics of MMS traffic is necessary to Internet Service Providers (ISPs) in network planning. In this paper, based on massive data captured from a backbone node for half a year, we provide a detailed analysis of MMS traffic, including the MMS successful receipt rate, the distribution of MMS content length, the distribution of MMS receipt duration and the distribution of average MMs transmission rate. Furthermore, we used K-means clustering method to evaluate the performances of the cell sites in the MMS network. All the analyses in this paper were based on our cloudy-computing platform, and the results also showed that this platform is very useful in network traffic analysis.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130099353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The research on distributed storage mechanism used in clustered opportunistic network 集群机会网络中分布式存储机制的研究
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664407
Jinglong Lv, Yong Zhang, Yinglei Teng, Yang Liu, Yihai Xing
{"title":"The research on distributed storage mechanism used in clustered opportunistic network","authors":"Jinglong Lv, Yong Zhang, Yinglei Teng, Yang Liu, Yihai Xing","doi":"10.1109/CCIS.2012.6664407","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664407","url":null,"abstract":"This paper presents a distributed storage mechanism to achieve the goal of data sharing based on clustered opportunistic network. The proposed mechanism includes two parts. The first part presents the list of the stored information based on models of different kinds of nodes in the cluster and the second part are the decision algorithm and configuration process for administrative behavior such as addition and deletion of data replica based on the list mentioned in the first part. The simulation result shows that the proposed mechanism can adapt well to the poor connectivity of the normal nodes in opportunistic network, thus achieving data sharing more efficiently.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130141536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on connect 6 programming based on MTD(F) and Deeper-Always Transposition Table 基于MTD(F)和deep - always换位表的连接6规划研究
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664397
Ruimei Zhang, Changcheng Liu, Chuandui Wang
{"title":"Research on connect 6 programming based on MTD(F) and Deeper-Always Transposition Table","authors":"Ruimei Zhang, Changcheng Liu, Chuandui Wang","doi":"10.1109/CCIS.2012.6664397","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664397","url":null,"abstract":"Chess computer game has always been the hot research topic in the field of artificial intelligence. Connect 6 as an emerging types of chess, has some characteristics such as simple rules, complex changes and fair play. Search engine is the core part on computer game programming. This paper introduces some of the traditional search algorithm in chess computer game, and introduced emphatically a search algorithm based on the MTD(F) and Deeper-Always Transposition Table. Then take Connect 6 as an example, experiments prove its efficiency is higher than alpha-beta pruning algorithm.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A cloud-based system for enhancing security of Android devices 基于云的系统,增强Android设备的安全性
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems Pub Date : 2012-10-01 DOI: 10.1109/CCIS.2012.6664405
Han Qian, Q. Wen
{"title":"A cloud-based system for enhancing security of Android devices","authors":"Han Qian, Q. Wen","doi":"10.1109/CCIS.2012.6664405","DOIUrl":"https://doi.org/10.1109/CCIS.2012.6664405","url":null,"abstract":"As the functions of smart mobile devices become stronger, the security issues of devices become more prominent. Compared with PC, the mobile device has its own features. The speed, storage and power of mobile devices are limited, so it's not suitable for running large-scale resource-intensive security applications on the mobile devices. In this paper, we implement a system based on cloud, which runs a large number of security functions on the cloud instead of the Android devices. The system can detect malicious applications, filter malicious Websites, and safeguard the network and device data security. Most of the functions are done by cloud. Compared with the common security applications run on the Android devices, the system can not only enhance the safety of the devices, but also reduce the system load of the devices.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信