2018 27th International Conference on Computer Communication and Networks (ICCCN)最新文献

筛选
英文 中文
2018 ICCCN Workshop Technical Committees 2018 ICCCN研讨会技术委员会
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/icccn.2018.8487314
{"title":"2018 ICCCN Workshop Technical Committees","authors":"","doi":"10.1109/icccn.2018.8487314","DOIUrl":"https://doi.org/10.1109/icccn.2018.8487314","url":null,"abstract":"","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133349798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection 基于局部二值模式的人脸呈现攻击检测
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487325
Fei Peng, Le Qin, Min Long
{"title":"CCoLBP: Chromatic Co-Occurrence of Local Binary Pattern for Face Presentation Attack Detection","authors":"Fei Peng, Le Qin, Min Long","doi":"10.1109/ICCCN.2018.8487325","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487325","url":null,"abstract":"To counter face presentation attack in face recognition system, the chromatic facial texture differences between the real faces and the facial artefacts are fully analyzed, and chromatic co-occurrence of local binary pattern (CCoLBP) is proposed to investigate the inter-channel based information. Based on the principle of presentation attack and its influence on color component of the face image, a face presentation attack detection (PAD) scheme based on CCoLBP is proposed. By combining intra-channel based facial texture and CCoLBP feature, the differences of color distortion and texture distribution between the real faces and the artefacts are characterized. With these features, the detection is accomplished by using a Softmax classifier. Experiments are done with 5 public databases, and the experimental results and analysis indicate the effectiveness of CCoLBP, and it can achieve good performance in cross-database testing. It has great potential in the application of face PAD with real-time requirement.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132181802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Leveraging the Potential of WSN for an Efficient Correction of Air Pollution Fine-Grained Simulations 利用无线传感器网络的潜力有效校正空气污染细粒度模拟
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487343
Ahmed Boubrima, Walid Bechkit, H. Rivano, L. Soulhac
{"title":"Leveraging the Potential of WSN for an Efficient Correction of Air Pollution Fine-Grained Simulations","authors":"Ahmed Boubrima, Walid Bechkit, H. Rivano, L. Soulhac","doi":"10.1109/ICCCN.2018.8487343","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487343","url":null,"abstract":"One of the main concerns of smart cities is to improve public health which is mainly threatened by air pollution due to the massively increasing urbanization. The reduction of air pollution starts first with an efficient monitoring of air quality where the main aim is to generate accurate pollution maps in real time. Spatiotemporally fine-grained air pollution maps can be obtained using physical models which simulate the phenomenon of pollution dispersion. However, these simulations are less accurate than measurements that can be obtained using pollution sensors. Combining simulations and measurements, also known as data assimilation, provides better pollution estimations through the correction of the fine-grained simulations of physical models. The quality of data assimilation mainly depends on the number of measurements and their locations. A careful deployment of nodes is therefore necessary in order to get better pollution maps. In this paper, we tackle the deployment problem of pollution sensors and propose a new mixed integer programming model allowing to minimize the overall deployment cost of the network while achieving a required assimilation quality and ensuring the connectivity of the network. We then design a heuristic algorithm to solve efficiently the problem in polynomial time. We perform extensive simulations on a dataset of the Lyon city, France and show that our approach provides better air quality monitoring when compared to existing deployment methods that are designed without taking into account the outputs of physical models. We also show that in terms of connectivity, the communication range of sensor nodes might have a noteworthy impact on the quality of pollution estimation.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114341352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Vulnerability Mining Method Based on Genetic Algorithm and Model Constraint 基于遗传算法和模型约束的漏洞挖掘方法
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487461
Jun Yang, Guojun Mei, Chen Chen
{"title":"Vulnerability Mining Method Based on Genetic Algorithm and Model Constraint","authors":"Jun Yang, Guojun Mei, Chen Chen","doi":"10.1109/ICCCN.2018.8487461","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487461","url":null,"abstract":"The fuzzy technology based on model constraint is lack of guidance in variation process, and the fuzzy technology based on coverage information has a weak code penetration ability when meeting a complex logic verification, what's more, these two methods' code coverage are deeply dependent on the initial samples, if there are no specific file structure types in the initial samples, the possibility of covering the corresponding code blocks will be very low. This paper proposes a vulnerability mining method based on genetic algorithm and constraint model. The method uses the model constraint technology to create test samples, and uses the fuzzy technology based on coverage information feedback to guide the direction of data variation. Besides that, using genetic algorithm to enrich the diversity of file structure types and combinations among test samples, and generate high-quality test samples gradually at the same time, which can greatly improve the efficiency of fuzzing test.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129407304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based Domains 基于主动探测的恶意快速流量网络伪装域调查方案和数据分析
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487410
Ziji Guo, Y. Guan
{"title":"Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based Domains","authors":"Ziji Guo, Y. Guan","doi":"10.1109/ICCCN.2018.8487410","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487410","url":null,"abstract":"There have been increasing levels of sophistication in the continuous battles between cyber criminals and law enforcement/cybersecurity practitioners. For example, Darknet operators often take advantage of the evasion techniques to hide their criminal activities, such as hosting illegal content, selling illegal materials, or terror-information exchanges. Web cloaking and fast-fluxing are the two common ones. Fast-fluxing constantly changes the host IP addresses and offers higher degree availability & robustness for malicious domain users. Web cloaking allows some dynamic web contents be sent at ordinary times, but different contents may be triggered by specific keywords on search engines or other geo-locations. Both contribute to the great challenges to cybersecurity and law enforcement practitioners, due to the fact that at the time of evidence collection, evidential data from the source may be simply not the same as that the evidence generated earlier for malicious purposes. In this paper, we will present new active probing-based schemes for detecting cloaking fast-flux malicious domains. In our prototype platform, we have integrated our schemes with the Tor system in order that our query and evidence collection are anonymous and distributed, to avoid the detection of malicious domain hosting servers. During the last 10 months, we have used this system to collect evidence data using the six of top ten worldwide search engines (e.g., Bing, Baidu, Ask, AoL, Lycos and Search). With the collected data, we developed algorithmic data analytic solutions to extract and classify the malicious fast-fluxing and web-cloaking domains. The effective evidence collection and analytic solutions will help law enforcement practitioners in their case work handling such malicious domains.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121849213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
TW-FCM: An Improved Fuzzy-C-Means Algorithm for SPIT Detection TW-FCM:一种改进的模糊c均值算法用于SPIT检测
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487369
Yu Zhang, Huan Wu, Jianzhong Zhang, Jingjing Wang, Xueqiang Zou
{"title":"TW-FCM: An Improved Fuzzy-C-Means Algorithm for SPIT Detection","authors":"Yu Zhang, Huan Wu, Jianzhong Zhang, Jingjing Wang, Xueqiang Zou","doi":"10.1109/ICCCN.2018.8487369","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487369","url":null,"abstract":"With the popularity of VoIP (Voice over Internet Protocol) systems, there has been an explosive growth in VoIP spam. In order to effectively prevent spam calls, various methods based on the analysis of call behavior features have been proposed. However, few of the existing methods consider that different features have different weights, resulting in a low detection precision of SPIT (Spam over Internet Telephony) users. Meanwhile, most methods are tested based on the experimental data generated by simulation, it is not sure whether these methods work well in the real world. In this paper, we propose a Weighted-Fuzzy-C-Means (W- FCM) algorithm, which can automatically adjust the weight of each call feature in the clustering process. Experiments based on the real world data show that our proposed algorithm could effectively improve the detection precision (about 6.7%) and recall (about 0.3%) of SPIT users. We also analyze the impact of different membership thresholds on the clustering results and propose a Threshold-W-FCM (TW-FCM) algorithm, through which we can select appropriate membership thresholds to alleviate the class-imbalance problem, and thereby improve the overall performance of SPIT detection compared with traditional FCM method.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125699457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Harnessing Uncertainty in Vulnerability Market 利用脆弱性市场的不确定性
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487368
Z. Li, Qi Liao
{"title":"Harnessing Uncertainty in Vulnerability Market","authors":"Z. Li, Qi Liao","doi":"10.1109/ICCCN.2018.8487368","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487368","url":null,"abstract":"Zero-day vulnerabilities pose significant threats in computer and network security, and have attracted attentions in recent years not only to malicious attackers but government and law enforcement users who need to control (e.g., for forensics purpose) the computer systems which otherwise are inaccessible through traditional channels. Based on the observation that vulnerabilities are acquired and traded in a different way than commodities, we study and propose a vulnerability market model by taking into consideration cheating and uncertainty in the market. The paper illustrates the interactions between the vulnerability sellers and buyers in a game theoretic framework. By modeling the economic aspects of the vulnerability market with a focus on information asymmetry and distinctive incentives of malicious and defensive buyers, we propose active and strategic market participation by defenders to obtain vulnerability information from the marketplace in a cost-effective way. Rather than killing the market, defenders can take advantage of the incomplete information feature of the vulnerability market to improve cyber-security. To further maximize the uncertainty, defenders may also play in the supply side of the vulnerability market to provide low or no value vulnerabilities to dilute the market.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124191155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Density Estimation Algorithm for Ultra Dense Wireless Networks 超密集无线网络的高效密度估计算法
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/icccn.2018.8487416
Thierry Arrabal, D. Dhoutaut, Eugen Dedu
{"title":"Efficient Density Estimation Algorithm for Ultra Dense Wireless Networks","authors":"Thierry Arrabal, D. Dhoutaut, Eugen Dedu","doi":"10.1109/icccn.2018.8487416","DOIUrl":"https://doi.org/10.1109/icccn.2018.8487416","url":null,"abstract":"Extremely dense wireless network topologies gradually become a reality, especially through wireless sensors networks and more recently nanonetworks. Electromagnetic nanonetworks are expected to allow a very large amount of extremely small and capability-limited devices to communicate with each others. In nanonetworks, even in a communication range limited to tens of centimeters, thousands of neighbors can be found. Information diffusion and routing protocols would greatly benefit from having an accurate estimation of the density of nodes. However, in this context, most traditional wireless communication protocols are not suited. We propose Density Estimator for Dense Networks (DEDeN), a distributed algorithm able to provide the required density estimation. It allows confidence tuning and can cope with an extreme range of local densities. A formal analysis of DEDeN is provided and corroborated by extensive simulations. DEDeN interest is then demonstrated through application to two information diffusion protocols tailored for very dense networks, and also to a routing protocol specific to nanonetworks.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127209372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures 软件定义网络中的网络隔离攻击:新的攻击及对策
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487340
Rui Xiao, Hui Zhu, Chao Song, Ximeng Liu, Jian Dong, Hui Li
{"title":"Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures","authors":"Rui Xiao, Hui Zhu, Chao Song, Ximeng Liu, Jian Dong, Hui Li","doi":"10.1109/ICCCN.2018.8487340","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487340","url":null,"abstract":"With the development of virtualization technology and fast expansion of network-scale, SDN has been employed in various cases from campus networks to cloud data center networks. However, SDN networks are also facing some new security issues, relative to the traditional networks. In this work, we demonstrate a novel network isolation attack in SDN networks, called Network Harvesting, that lets an attacker can access to the user's network privileges without the awareness of victim and OpenFlow SDN architecture, which significantly increases persistence. We then present a defense, SpoofDefender, that prevents network isolation attacks or other spoofing attacks by leveraging SDN's data and control plane separation, global network view, and programmatic control of the network, while building upon IEEE 802.1x and encryption. In addition, we also implement SpoofDefender on ONOS 1.10.4 and Mininet with a real network, and extensive simulation results demonstrate that our proposed SpoofDefender is highly effective in terms of computation and communication costs.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127330356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IoTAegis: A Scalable Framework to Secure the Internet of Things IoTAegis:保护物联网的可扩展框架
2018 27th International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2018-07-01 DOI: 10.1109/ICCCN.2018.8487335
Zhiyuan Zheng, Allen T. Webb, A. Reddy, R. Bettati
{"title":"IoTAegis: A Scalable Framework to Secure the Internet of Things","authors":"Zhiyuan Zheng, Allen T. Webb, A. Reddy, R. Bettati","doi":"10.1109/ICCCN.2018.8487335","DOIUrl":"https://doi.org/10.1109/ICCCN.2018.8487335","url":null,"abstract":"The infamous Mirai attack which hijacked nearly half a million Internet connected devices demonstrated the widespread security vulnerabilities of the Internet-of-Things (IoT). This study employs a set of active and passive observation methods to discover the security vulnerabilities of IoT devices within a university campus. We show that (a) the number of non-compute devices dominates the number of compute devices with open ports in a campus network; (b) 58.9% or more devices do not keep up-to-date firmware and 51.3% or more do not have a user defined password; and (c) the number of devices together with the diversity of device ages and vendors make the protection of IoT devices a difficult problem. We further develop IoTAegis framework which offers device-level protection to automatically manage device configurations and security updates. Our solution is shown to be effective, scalable, lightweight, and deployable in different forms and network types.","PeriodicalId":399145,"journal":{"name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信