{"title":"Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning","authors":"Xue Jun Li, M. Ma, Yi Lin Yen","doi":"10.1109/ITNAC46935.2019.9077964","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077964","url":null,"abstract":"Cybersecurity becomes increasingly important as information and communications technology (ICT) is adopted throughout the world. Cyber attacks can happen both externally and internally. With majority of cyber attacks being executed by insiders, it is important to detect insider attacks and even prevent them. This paper studies how to apply machine learning in analyzing network traffic to detect insider attacks, particularly in the area of botnet detection. Different from existing work considered two types of Hyper Text Transfer Protocol (HTTP)-based botnets, we consider two types of popular Internet Relay Chat (IRC)-based botnets. With selected flow characteristics, experimental results show that the proposed detection model can achieve a true positive rate of over 96%, with a false positive rate of less than 5%.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"464 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133788915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Green Multi-Stage Upgrade for Bundled-Link SDNs with Budget Constraint","authors":"L. Hiryanto, S. Soh, Kwan-Wu Chin, M. Lazarescu","doi":"10.1109/ITNAC46935.2019.9077927","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077927","url":null,"abstract":"Upgrading a legacy network into a Software Defined Network (SDN) in stages, and minimizing the energy consumption of a network are now of great interests to operators. To this end, this paper addresses a novel problem: minimize the energy consumption of a network by upgrading switches over multiple stages subject to the available monetary budget at each stage. Our problem considers (i) bundled links that can be powered-off individually only if they are adjacent to a SDN switch, and (ii) decreasing upgrade cost and increasing traffic demands over multiple stages. We formulate the problem as an Integer Linear Program (ILP) and propose a greedy heuristic called Green Multi-stage Switch Upgrade (GMSU). Experiment results show that increasing budget as well as number of stages affect the total energy saved and number of upgraded switches. GMSU produces results that are up to 5.8% off the optimal result. Moreover, on large networks, in which ILP becomes computationally intractable, GMSU uses less than 0.1 second to compute a solution.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124433781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rasheed, Asim Anwar, Arun K. Kumar, P. Chong, Xue Jun Li
{"title":"Hierarchical Architecture for Computational Offloading in Autonomous Vehicle Environment","authors":"A. Rasheed, Asim Anwar, Arun K. Kumar, P. Chong, Xue Jun Li","doi":"10.1109/ITNAC46935.2019.9077995","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077995","url":null,"abstract":"Mobile Edge Computing (MEC) is a key enabler technology for fifth generation (5G) networks and has numerous use cases including, Device-to-Device (D2D) communications and computation offloading. In the near future, Internet of Vehicles (IoV) applications will require high data rate as well as extensive computational resources. In the connected vehicles, MEC has emerged as a strong candidate due to its proximity with the users, high throughput, better traffic monitoring & management, large coverage area, and context-awareness. For this purpose, a vehicular architecture requires to handle the computation under stringent latency conditions and meet high computational requirements. This paper proposes a hierarchical architecture for computation offloading for future vehicular network. The proposed architecture divides the computation offloading into multiple levels, resulting in efficient and cost-effective architecture. Furthermore, we propose to make decision for each task based on speed, computational requirement and latency. We assume that a controller as an application is installed within the MEC server to handle the computation handover efficiently without introducing complexity into the network.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaowen Huang, W. Zhang, Liwei Yang, C. Yeo, Shengyu Chen
{"title":"Two-Tier Spectrum Trading Strategy for Heterogeneous Cognitive Radio Networks","authors":"Xiaowen Huang, W. Zhang, Liwei Yang, C. Yeo, Shengyu Chen","doi":"10.1109/ITNAC46935.2019.9078006","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078006","url":null,"abstract":"The heterogeneous network structure is a promising paradigm to improve the quality of service across the entire network. Nevertheless, such structure is challenging due to the presence of multiple-tier secondary users (SUs). In this paper, we investigate the effect of spectrum allocation in a heterogeneous cognitive radio networks with a primary network and two-tier secondary networks, and propose a two-tier spectrum trading strategy which includes two trading processes. In Process One, we model the spectrum trading as a monopoly market, where the spectrum owner (PO) acts as the monopolist and the first-tier secondary users (FSUs) act as the buyers. We design an optimal quality-price contract with the objective of maximizing the utility of PO, and the FSUs will choose the spectrum with appropriate quality and price in order to enhance their satisfaction. In Process Two, the spectrum trading is modeled as a multi-seller, multi-buyer market. The dynamic behavior of second-tier secondary users (SSUs) is studied using evolution game, while the competition among FSUs is analyzed via noncooperative game where the Nash equilibrium is considered as the solution. The existences of the optimal contract and Nash equilibrium are demonstrated in the performance evaluation.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123682011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Entitlement-based Blockchain-enabled Security Architecture for IoT","authors":"F. Sabrina","doi":"10.1109/ITNAC46935.2019.9077971","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077971","url":null,"abstract":"There has been a massive growth of Internet of Things (IoT) applications recently for both personal and organization use cases. But an IoT network is vulnerable to many privacy and security concerns. While some researchers have tried to define different access control models for IoT and tried to use blockchain in some cases, the solutions presented to date lacks a flexible and robust access control model that can be used for complex organization and cross-organization resource access scenarios and lacks the scalability and performance needed for IoT. This paper introduces a novel entitlement-based access control model that provides an efficient and secure way to delegate resource access rights to any entity. The solution uses service-oriented approach and a combination of public blockchain (with smart contracts) and local off-chain data for entitlements management and control. To analyze the proposed architecture, a large-scale cross-organization IoT scenario is taken into consideration and some qualitative evaluations are presented while implementation with Ethereum blockchain and smart contracts are currently in progress.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128442027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nils Rodday, Raphael Labaca Castro, Klement Streit, G. Rodosek
{"title":"Evaluating TCP Connection Healthiness","authors":"Nils Rodday, Raphael Labaca Castro, Klement Streit, G. Rodosek","doi":"10.1109/ITNAC46935.2019.9078021","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078021","url":null,"abstract":"TCP/IP has been around for decades and even though it is a connection-oriented protocol, an important number of connections get interrupted or lost compromising the information been transferred. We propose an approach to measure the quality of the connection by using finite-state machines (FSMs) based on the protocol definition. Our method can parse any traffic-dump file and report a success ratio for both client and server by comparing the packets sent and received with transitions defined on the protocol FSM. This implementation can have multiple applications across different domains from quality assurance to Moving Target Defense. By understanding how good the performance of TCP/IP is for a given approach, we can create defense mechanisms that better protect the network without compromising its performance.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129658457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jing Zhao, Chenchen Liu, Zhengyu Zhang, Shibin Zhang, Ming Zhao
{"title":"Energy Efficiency Optimization in Energy Harvesting Two-Hop Half-duplex Relay Systems","authors":"Jing Zhao, Chenchen Liu, Zhengyu Zhang, Shibin Zhang, Ming Zhao","doi":"10.1109/ITNAC46935.2019.9077965","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077965","url":null,"abstract":"To prolong the lifetime of satellites when the energy stored in photovoltaic panels is used up, it may need deploy some energy harvesting (EH) relays in the future mobile satellite communication system. In this paper, considering an average throughput constraint within a given time, we investigate the energy efficiency (EE) optimization problem of the fuel-cell-powered satellite in collaboration with a decode-and-forward (DF) half-duplex EH relay. Paying regard to the non-ideal circuit power in the relay system and the randomness of energy arrivals, the sleep mode of both the satellite and the relay is joined into the power allocation strategy. Firstly, we solve this problem by the dynamic programming (DP) algorithm. Due to the high computational complexity, the DP algorithm is not feasible in real satellite systems. We then propose a heuristic algorithm to achieve the suboptimal solution. Numerical results show that the performance of the heuristic algorithm approaches that of the DP algorithm, which indicates the heuristic algorithm can be an good alternative in practice.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121323956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Orientation Aware Learning MAC for Multi-UAVs Networks","authors":"Saadullah Kalwar, Kwan-Wu Chin, Luyao Wang","doi":"10.1109/ITNAC46935.2019.9077959","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9077959","url":null,"abstract":"In this paper, we consider channel access in Unmanned Aerial Vehicles (UAVs) networks where a ground station is equipped with Successive Interference Cancellation (SIC) capability. The problem at hand is to derive a transmission schedule for UAVs to communicate with a ground station frequently, and with minimal collisions. We first formulate a stochastic optimization problem before introducing a novel distributed Learning Medium Access Control (MAC), aka L-MAC, protocol. A key novelty of L-MAC is that it allows UAVs to learn the best orientation that results in the highest decoding success. Our simulation results show that L-MAC achieves a throughput that is 68% higher than the well-known Aloha protocol without SIC, and 28% higher than Aloha with SIC.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122254781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Steganalysis of Storage-based Covert Channels Using Entropy","authors":"Jun O. Seo, S. Manoharan, U. Speidel","doi":"10.1109/ITNAC46935.2019.9078009","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078009","url":null,"abstract":"A covert channel is a means of transmitting information that is not normally allowed in a network protocol. For instance, unused or insignificant bits of a protocol could be used to transmit secret messages. We present a novel technique to uncover the existence of covert channels in networks. The technique uses entropy estimates, and can not only detect secret messages, but also estimate their size.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Firas Al-Ali, Thilina Doremure Gamage, Hewa Wts Nanayakkara, Farhad Mehdipour, S. K. Ray
{"title":"Supercomputer Networks in the Datacenter: Benchmarking the Evolution of Communication Granularity from Macroscale down to Nanoscale","authors":"Firas Al-Ali, Thilina Doremure Gamage, Hewa Wts Nanayakkara, Farhad Mehdipour, S. K. Ray","doi":"10.1109/ITNAC46935.2019.9078010","DOIUrl":"https://doi.org/10.1109/ITNAC46935.2019.9078010","url":null,"abstract":"In the Datacenter, a supercomputer network refers to the interconnections between the clustered processing nodes within a single supercomputer. In this paper, we primarily aim to describe how in supercomputers, as they evolve, the granularity of this inter-node communication continues to scale down, as a direct result of the processing nodes scaling down from full-sized clustered computers (and servers) to interconnected processor cores and even smaller reconfigurable logic cells. Hence, we start by first describing our exploration of the four generations of supercomputing and how they have evolved over the years from macroscale packet-switched coarse-grained cluster computing and grid computing, to conventional supercomputing, and then to fine-grained supercomputer Networks-on-Chip (NoC), and finally, to emerging fine-grained nanoscale NoC FPGA (Field Programmable Gate Arrays) supercomputer-on-chip as we see today. Apart from this, in this work, we also aim to demonstrate and analyze the results of benchmarking the Mandelbrot Set performance on a 3rd generation supercomputer, which is the Adapteva's 16-core Epiphany supercomputer NoC. On the basis of our study we can come to an inference that the next-generation supercomputing-on-chip will more likely depend on the fine-tuning between multi-core NoCs and high-end FPGA co-processors built into these NoCs.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"13 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120910929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}