2014 23rd International Conference on Computer Communication and Networks (ICCCN)最新文献

筛选
英文 中文
An energy efficient algorithm based on multi-topology routing in IP networks IP网络中基于多拓扑路由的高能效算法
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911772
Lei Xie, Xiaoning Zhang, Sheng Wang
{"title":"An energy efficient algorithm based on multi-topology routing in IP networks","authors":"Lei Xie, Xiaoning Zhang, Sheng Wang","doi":"10.1109/ICCCN.2014.6911772","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911772","url":null,"abstract":"Energy saving in the Internet has become important since the massive new applications are increasing tremendously, along with their energy consumption. In this paper we propose an energy efficient algorithm based on multi-topology routing. Since traffic flow dynamically changed in actual IP network scenarios, the proposed algorithm has to adapt the network energy consumption to daily traffic scenarios. The proposed algorithm is a three-phases algorithm: first, one day is divided into multiple time periods according to the daily traffic flow; second, in each time period, a corresponding energy efficient sub-topology is obtained by utilizing neighboring region search to configure link weights and switch off low loaded links; last, to improve network performance (such as packet loss rate) during energy efficient sub-topology changes in different time periods, an IP fast rerouting strategy is proposed. Simulation results show that the proposed algorithm has a better performance in energy efficiency than current energy efficient algorithm, and improve the network performance during time period changes.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117059557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach 基于新的加性噪声方法的数据发布中个人敏感值的隐私保护
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911855
Hong Zhu, Shengli Tian, Meiyi Xie, Mengyuan Yang
{"title":"Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach","authors":"Hong Zhu, Shengli Tian, Meiyi Xie, Mengyuan Yang","doi":"10.1109/ICCCN.2014.6911855","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911855","url":null,"abstract":"The disclosure of individuals' sensitive values is a potentially serious problem in privacy preserving data publishing. The popular ℓ-diversity model is able to prevent victim' sensitive value from being revealed with a certainty higher than 1/ℓ. But, the anonymized tables with ℓ-diversity generated by the methods, such as generalization, anatomy and slicing, are all vulnerable to the attacker with some individuals' sensitive values. In this paper we propose a new approach to publish anonymized table with ℓ-diversity against the attacker having publishing algorithm and some individuals' sensitive values. Such an approach replaces the sensitive attribute (SA) value of each record with an values set consisted of the real SA value and several random noise values. The method can be applied to protect numerical and nominal SA, existing additive noise only is used to protect the numerical SA of anonymized table. Comparing with randomization, our method retains the frequency distribution of SA values of original data and retains more correlations (between SA and other attributes). Experimental evaluation shows that our method preserves more correlations than that of generalization, slicing and anatomy.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116142596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
NDI: Node-dependence-based Dynamic gaming Incentive algorithm in opportunistic networks 机会网络中基于节点依赖的动态博弈激励算法
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911796
Ruiyun Yu, Pengfei Wang, Zhijie Zhao
{"title":"NDI: Node-dependence-based Dynamic gaming Incentive algorithm in opportunistic networks","authors":"Ruiyun Yu, Pengfei Wang, Zhijie Zhao","doi":"10.1109/ICCCN.2014.6911796","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911796","url":null,"abstract":"Opportunistic networks are lack of end-to-end paths between source nodes and destination nodes, so the communications are mainly carried out by the “store-carry-forward” strategy. Selfish behaviors of rejecting packet relay requests will severely worsen the network performance. Incentive is an efficient way to reduce selfish behaviors, and hence improves the reliability and robustness of the networks. In this paper, we propose the Node-dependence-based Dynamic gaming Incentive (NDI) algorithm, which exploits the dynamic repeated gaming to motivate nodes relaying packets for other nodes. The NDI algorithm presents a mechanism of tolerating selfish behaviors of nodes. Reward and punishment methods are also designed based on the node dependence degree. Simulation results show that the NDI algorithm is effective on increase the delivery ratio and decrease average latency when there are a lot of selfish nodes in the opportunistic networks.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123718652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A measurement study on BGP AS path looping (BAPL) behavior BGP AS路径环路(BAPL)行为度量研究
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911734
Shenglin Zhang, Y. Liu, Dan Pei
{"title":"A measurement study on BGP AS path looping (BAPL) behavior","authors":"Shenglin Zhang, Y. Liu, Dan Pei","doi":"10.1109/ICCCN.2014.6911734","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911734","url":null,"abstract":"As a path vector protocol, Border Gateway Protocol (BGP) messages contain the entire Autonomous System (AS) path to each destination for breaking arbitrary long AS path loops. However, after observing the global routing data from RouteViews, we find that BGP AS path looping (BAPL) behavior does occur and in fact can lead to multi-AS forwarding loops in both IPv4 and IPv6. The number and ratio of BAPLs in IPv4 and IPv6 for 1456 days on a daily basis are analyzed. Moreover, the distribution of BAPL duration and loop length in IPv4 and IPv6 are also studied. Some possible explanations for BAPLs are discussed in this paper. Private AS number leaking has contributed to 1.76% of BAPLs in IPv4 and 0.00027% in IPv6, and at least 2.85% of BAPLs in IPv4 were attributed to faulty configurations and malicious attacks. Valid explanations, including multinational companies, preventing particular AS from accepting routes, can also lead to BAPLs.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125158959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly 基于流量异常局部周期性分析的RoQ攻击两阶段检测算法
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911829
Kun Wen, Jiahai Yang, Fengjuan Cheng, Chenxi Li, Ziyu Wang, Hui Yin
{"title":"Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly","authors":"Kun Wen, Jiahai Yang, Fengjuan Cheng, Chenxi Li, Ziyu Wang, Hui Yin","doi":"10.1109/ICCCN.2014.6911829","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911829","url":null,"abstract":"Reduction of Quality (RoQ) attack is a stealthy denial of service attack. It can decrease or inhibit normal TCP flows in network. Victims are hard to perceive it as the final network throughput is decreasing instead of increasing during the attack. Therefore, the attack is strongly hidden and it is difficult to be detected by existing detection systems. Based on the principle of Time-Frequency analysis, we propose a two-stage detection algorithm which combines anomaly detection with misuse detection. In the first stage, we try to detect the potential anomaly by analyzing network traffic through Wavelet multiresolution analysis method. According to different time-domain characteristics, we locate the abrupt change points. In the second stage, we further analyze the local traffic around the abrupt change point. We extract the potential attack characteristics by autocorrelation analysis. By the two-stage detection, we can ultimately confirm whether the network is affected by the attack. Results of simulations and real network experiments demonstrate that our algorithm can detect RoQ attacks, with high accuracy and high efficiency.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125548106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Characterizing the utility of smartphone background traffic 表征智能手机后台流量的效用
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911870
L. Meng, Shu Liu, A. Striegel
{"title":"Characterizing the utility of smartphone background traffic","authors":"L. Meng, Shu Liu, A. Striegel","doi":"10.1109/ICCCN.2014.6911870","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911870","url":null,"abstract":"The incredible rise in popularity of mobile smart devices has placed tremendous pressure on wireless service providers. While much of the pressure arises from increasingly rich multimedia and social offerings, a sizable portion of the traffic originates when the user is not actively interacting with the device. The focus of this paper is to explore the prevalence and utility of smartphone background traffic through a pool of over one hundred campus smartphone users over a seven-week period from the Spring of 2013. Notably, our work shows that background traffic constitutes a non-trivial portion of wireless traffic ranging between one-third to two-fifths of traffic across the wireless interfaces. Our work breaks down background traffic with respect to diurnal behavior, wireless interface, mobile application, and latency until screen activation to further characterize the data.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128393313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
ZET: Zone and energy threshold based clustering routing protocol for Wireless Sensor Networks 基于区域和能量阈值的无线传感器网络聚类路由协议
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911866
Zain ul Abidin Jaffri, Yueping Cai
{"title":"ZET: Zone and energy threshold based clustering routing protocol for Wireless Sensor Networks","authors":"Zain ul Abidin Jaffri, Yueping Cai","doi":"10.1109/ICCCN.2014.6911866","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911866","url":null,"abstract":"Wireless Sensor Networks (WSNs) have an extensive range of applications but they have many challenging problems to be addressed. The energy consumption of nodes and the extension of network lifetime are among the core challenges. Energy aware routing is one of the methods to solve the energy problem of WSNs. To achieve the desired network operations the clustering (Hierarchical) routing protocols showed remarkable and outstanding improvement in prolonging the lifetime of WSNs. More significantly, heterogeneity-aware and threshold-based (application-aware) clustering routing protocols deal with more practical and realistic scenarios. In this paper, we propose a new clustering routing protocol, ZET (Zone and Energy Threshold based Clustering Routing Protocol) that is application-aware and heterogeneity-aware. In the execution environment, ZET distributed algorithm divides the whole network area into multiple zones. After dividing the nodes into multiple zones, ZET will select a cluster-head node with the highest energy-efficiency in each zone. We initially design the ZET for homogeneous network in which initial energy is same for all nodes. Then we introduce the heterogeneity in its execution network. We evaluate the performance of ZET using MATLAB simulations. The results show that ZET has better network life time, stability and throughput compared with existing routing protocols.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122391432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Software cybernetics to manage adaptation behavior of complex network systems 管理复杂网络系统自适应行为的软件控制论
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911727
K. Ravindran
{"title":"Software cybernetics to manage adaptation behavior of complex network systems","authors":"K. Ravindran","doi":"10.1109/ICCCN.2014.6911727","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911727","url":null,"abstract":"We employ model-based software (MBS) techniques to assess the quality of adaptation in a network system S in the presence of uncontrollable external environment conditions. The lack of complete knowledge about the I/O behavior of S arises due to large dimensionality of the input parameter space and their interactions with the various components in S. The MBS techniques adapt the operations of S over multiple “observe-adapt” rounds and steer S towards a reference input specs. How close is the actual behavior to the reference input depicts the quality of adaptation by S. The paper provides a cyber-physical systems (CPS) based software structure to evaluate the non-functional attributes of the output behavior of S, and autonomically adjust the network and algorithm parameters therein for effective control of S. The paper corroborates our CPS-based approach with a case study of QoE-aware video rate adaptation over a bandwidth-limited network path.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126656751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
CDRDN: Content Driven Routing in Datacenter Network CDRDN:数据中心网络中的内容驱动路由
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911754
Ming Zhu, Dan Li, Y. Liu, Jianping Wu
{"title":"CDRDN: Content Driven Routing in Datacenter Network","authors":"Ming Zhu, Dan Li, Y. Liu, Jianping Wu","doi":"10.1109/ICCCN.2014.6911754","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911754","url":null,"abstract":"A major challenge in data center networks is to provide enough network capacity to meet the ever increasing demand of large-scale distributed computing. While existing proposals focus on adding more switches and links, which cost extra hardware and energy, we explore another dimension in which spare disk space at servers is used for caching data, so as to increase network throughput without additional hardware. Leveraging the Named Data Networking (NDN) architecture and unique characteristics of data centers, we design a novel Content Driven Routing in Datacenter Network (CDRDN) that enables universal caching in data center networks in an efficient and scalable way. First, rather than using switches for “on-path” caching like in native NDN, CDRDN uses the large storage space at servers to do “off-path” caching. Second, by taking advantage of data center's regular and hierarchical network topology, CDRDN switches are able to direct requests to nearby server caches even under high dynamics of caches. Third, given the vast amount of data in data centers, the full name-based routing table would be difficult to fit in switch's limited fast memory. CDRDN adopts a compound content and location routing to ensure packet delivery while benefiting from name-based routing as much as the switches can afford. CDRDN extends NDN's adaptive forwarding mechanism to deal with cache misses, link failures, and congestion without running routing protocols or cache exchange protocols. Our packet-level simulations show that CDRDN can almost double the network throughput compared with shortest-path routing under the same setting, and CDRDN can effectively deal with link failures using adaptive forwarding.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A lifetime model of online video popularity 在线视频人气的终身典范
2014 23rd International Conference on Computer Communication and Networks (ICCCN) Pub Date : 2014-09-29 DOI: 10.1109/ICCCN.2014.6911774
Liang Chen, Yipeng Zhou, D. Chiu
{"title":"A lifetime model of online video popularity","authors":"Liang Chen, Yipeng Zhou, D. Chiu","doi":"10.1109/ICCCN.2014.6911774","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911774","url":null,"abstract":"Popular online Video-on-Demand (VoD) services all maintain a large catalog of videos for their users to access. The number of servers assigned to serve each video is directly related to the relative popularity of the video. The distribution of popularity at a given time is quite well understood. We study how the video popularity changes over its lifetime, for different types of videos. Our study is based on analyzing the video access levels over time, based on data provided by a large video service provider. Our main finding is, while there are variations, the glory days of a video typically pass by quickly and probability of replaying a video by the same user is low. The reason appears to be due to fairly regular number of users and view time per day for each user, and continuous arrival of new videos. We then discuss the implication of our findings for video replication and recommendation.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133999653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信