{"title":"MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph","authors":"Wenjun Hu, Jing Tao, Xiaobo Ma, Wenyu Zhou, Shuang Zhao, Ting Han","doi":"10.1109/ICCCN.2014.6911805","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911805","url":null,"abstract":"With the increasing popularity of Android platform, Android malware, especially APP-Repackaging malware wherein the malicious code is injected into legitimate Android applications, is spreading rapidly. This paper proposes a new system named MIGDroid, which leverages method invocation graph based static analysis to detect APP-Repackaging Android malware. The method invocation graph reflects the “interaction” connections between different methods. Such graph can be naturally exploited to detect APP-Repackaging malware because the connections between injected malicious code and legitimate applications are expected to be weak. Specifically, MIGDroid first constructs method invocation graph on the smali code level, and then divides the method invocation graph into weakly connected sub-graphs. To determine which sub-graph corresponds to the injected malicious code, the threat score is calculated for each sub-graph based on the invoked sensitive APIs, and the subgraphs with higher scores will be more likely to be malicious. Experiment results based on 1,260 Android malware samples in the real world demonstrate the specialty of our system in detecting APP-Repackaging Android malware, thereby well complementing existing static analysis systems (e.g., Androguard) that do not focus on APP-Repackaging Android malware.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An unknown tag identification protocol based on coded filtering vector in large scale RFID systems","authors":"Xin Xie, Keqiu Li, Xiulong Liu","doi":"10.1109/ICCCN.2014.6911798","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911798","url":null,"abstract":"RFID is an emerging technology that provides timely and high-value information to inventory management and object tracking, in which areas that identifying unknown tags completely is crucial. From prior researches in this area, one of the pending problem involves processing redundant time frames due to unknown tag collisions. In this paper, we propose a time-efficient unknown tag identification protocol based on coded filtering vector technique. This vector is able to efficiently separate unknown tags from known tags. It reduces the unknown-known tag collisions as well as the required time frame length. The proposed protocol can achieve the minimal execution time theoretically. And further simulations demonstrate that it performs much better than existing work by decreasing 30% of the total execution time on average.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127297244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hippo: An enhancement of pipeline-aware in-memory caching for HDFS","authors":"Lan Wei, W. Lian, Kuien Liu, Yongji Wang","doi":"10.1109/ICCCN.2014.6911847","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911847","url":null,"abstract":"In the age of big data, distributed computing frameworks tend to coexist and collaborate in pipeline using one scheduler. While a variety of techniques for reducing I/O latency have been proposed, these are rarely specific for the whole pipeline performance. This paper proposes memory management logic called “Hippo” which targets distributed systems and in particular “pipelined” applications that might span differing big data frameworks. Though individual frameworks may have internal memory management primitives, Hippo proposes to make a generic framework that works agnostic of these highlevel operations. To increase the hit ratio of in-memory cache, this paper discusses the granularity of caching and how Hippo leverages the job dependency graph to make memory retention and pre-fetching decisions. Our evaluations demonstrate that job dependency is essential to improve the cache performance and a global cache policy maker, in most cases, significantly outperforms explicit caching by users.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129081245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal physical carrier sensing to defend against exposed terminal problem in wireless ad hoc networks","authors":"Xinming Zhang, Haitao Zhu, Guoqing Qiu","doi":"10.1109/ICCCN.2014.6911878","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911878","url":null,"abstract":"Physical carrier sensing (PCS) is an effective mechanism to reduce the collision and interference caused by hidden terminals in wireless ad hoc networks, which allows nodes to be separated by a silent margin. However, potential simultaneous transmissions may be suppressed in this silent margin due to exposed terminal problem. As a consequence, PCS mechanism affects the network performance in two opposite ways. In this paper, we present an analytical model for deriving the optimal carrier sensing threshold to make a tradeoff between hidden terminal and exposed terminal problems for given network topology. Our model takes into account the potential throughput loss of exposed terminals, which previous studies have ignored. Based on the model, an adaptive and iterative algorithm is proposed to obtain the optimal sensing threshold and dynamically adjust the physical carrier sensing threshold through periodic estimation of channel condition. Simulation results demonstrate that the proposed scheme outperforms IEEE 802.11 protocol in terms of average network throughput.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114643215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semi-controlled authorized information dissemination in content-based social networks","authors":"C. Kong, Xiaojun Cao","doi":"10.1109/ICCCN.2014.6911759","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911759","url":null,"abstract":"Social networks are widely used for information dissemination. In this work, for the first time, we investigate the Semi-controlled Authorized Information Dissemination (SAID) problem in content-based social networks. Within SAID, one challenge is how the authorized content providers effectively disseminate limited authorized content copies to proper interested users. We model this problem as a new Maximum Weighted Connected subgraph with node Quota (MWCQ) problem. To solve the MWCQ problem, we then propose a Dynamic Programming based SAID (DP-SAID) algorithm for the MWCQ problem. Our study shows that DP-SAID can achieve an approximation factor of O(R/2R-2) when comparing to the optimal solution.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimation of the cost of VM migration","authors":"W. Dargie","doi":"10.1109/ICCCN.2014.6911756","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911756","url":null,"abstract":"One of the mechanisms to achieve energy efficiency in virtualized/cloud environments is consolidation of workloads on an optimal number of servers and switching-off of idle or underutilized servers. Central to this approach is the migration of virtual machines at runtime. In this paper we investigate the cost (migration time) of virtual machines migration. We shall show that migration time exponentially increases as the available network bandwidth decreases; migration time linearly increases as the RAM size of a virtual machine increases. Furthermore, the power consumption of both the destination and the source servers remain by and large the same for a fixed network bandwidth, regardless of the VM size. Interestingly, for the same combination of virtual machines, different orders of migrations resulted in different migration time. We observed that migrating resource intensive virtual machines first yields the shortest migration time. In general, the migration time should be modeled as a random variable since the factors that affect it cannot be known except in a probabilistic sense. Therefore, we propose a probabilistic approach to quantify the cost of virtual machines migration.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localization algorithms based on a mobile anchor in wireless sensor networks","authors":"Xinming Zhang, Zhigang Duan, Lei Tao, D. Sung","doi":"10.1109/ICCCN.2014.6911877","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911877","url":null,"abstract":"Localization of nodes is a very crucial issue in many wireless sensor network (WSN) applications. In this paper, we consider a WSN initially consisting of a single location-aware mobile anchor nodes and a number of location-unaware, stationary nodes, and propose two algorithms to localize the unknown nodes using the mobile anchor nodes. We can obtain the location information of the unknown nodes through the transmitted location information of the mobile anchor node, even in the presence of obstacles. Received Signal Strength (RSS) is elaborately used in both the two algorithms. The first algorithm controls the trajectory of the mobile anchor node and uses a geometric property to simplify the estimation of the location of the unknown nodes; the second algorithm exploits to use directional information. The proposed algorithms outperform the conventional algorithm based on RSS in terms of localization accuracy. Simulation results show the effectiveness of the proposed algorithms.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scaling a broadcast domain of Ethernet: Extensible transparent filter using SDN","authors":"Kotaro Kataoka, Nitin Agarwal, Aditya V. Kamath","doi":"10.1109/ICCCN.2014.6911780","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911780","url":null,"abstract":"Scalability of Ethernet is a known issue where communication is disturbed by broadcast traffic caused by a large number of nodes in a single broadcast domain. This paper proposes Extensible Transparent Filter (ETF) for Ethernet using SDN, that suppresses broadcast traffic in a broadcast domain by selecting an appropriate outgoing port of the switch through which the target host of broadcast packet is reachable. ETF maintains both consistent functionality and backward compatibility of the existing networking protocols such as Address Resolution Protocol, Dynamic Host Configuration Protocol, and other possible protocols that work with the broadcast of a packet. ETF was developed using Trema and Floodlight, which are open source SDN controller supporting OpenFlow. The number of flooding was significantly reduced in a broadcast domain where user clients connecting to the same VLAN across multiple production SDN switches successfully performed DHCP and ARP respectively. This paper also discusses the practical deployment and operation of SDN and ETF as a part of campus network in Indian Institute of Technology Hyderabad. The proposed approach improves scalability of a broadcast domain of Ethernet as an enhancement to the existing enterprise networks using SDN.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116951063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the controller capacity in software defined networking","authors":"Long Yao, P. Hong, Wei Zhou","doi":"10.1109/ICCCN.2014.6911857","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911857","url":null,"abstract":"The flow-based OpenFlow architecture decouples the control plane and data plane, and it has involved great evolution towards traditional networks. A particular important issue in OpenFlow architecture is controller capacity, which can be defined as the number of switches a controller can manage. In this paper, we model the flow set-up requests from switches to controller as a batch arrival process Mk/M /1. Further, we analyze the controller performance with queuing theory, and derive the expression of average flow service time. Under the circumstance of a limited flow set-up time, the number of switches is determined, this provides a method to evaluate the controller capacity. Moreover, we extend the scene of a single controller to multiple controllers. All of these results are meaningful to large scale OpenFlow network deployment in the future.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Masaki Tagawa, Yutaro Wada, Yuzo Taenaka, K. Tsukamoto
{"title":"Network capacity expansion methods based on efficient channel utilization for multi-channel wireless backbone network","authors":"Masaki Tagawa, Yutaro Wada, Yuzo Taenaka, K. Tsukamoto","doi":"10.1109/ICCCN.2014.6911862","DOIUrl":"https://doi.org/10.1109/ICCCN.2014.6911862","url":null,"abstract":"This study presents new channel utilization methods for a multi-channel wireless backbone network (WBN). To flexibly and efficiently use multiple channels, we exploit OpenFlow as a baseline function. In this paper, we propose a new framework to build an OpenFlow-based multi-channel WBN and then implement two new channel utilization methods: (i) a flow direction aware channel assignment method (DCA) and (ii) a flow balance aware channel assignment method (BCA). BCA is classified into two simple multi-hop transmission procedures: (ii-1) each flow is transmitted on a persistent channel (BCA-PC), while (ii-2) being transmitted on a different channel for each hop (BCA-DC). Finally, we evaluate the proposed channel utilization methods in a real testbed. As a result, our methods can obtain approximately three times as much network capacity as the conventional WBN. In addition, BCA-DC can avoid the radio interference with neighbor hops effectively, thereby not only achieving efficient channel utilization but also expanding network capacity significantly.","PeriodicalId":404048,"journal":{"name":"2014 23rd International Conference on Computer Communication and Networks (ICCCN)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125860679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}