{"title":"Simulation and Evaluation OF A New Algorithm of Worm Detection and Containment","authors":"Xiong Yang, Jing Lu, Yuguang Zhu, Ping Wang","doi":"10.1109/PDCAT.2006.103","DOIUrl":"https://doi.org/10.1109/PDCAT.2006.103","url":null,"abstract":"Internet worm attacks have become increasingly more frequent and have caused enormous damage to the Internet community during the past years. A new security service that monitors the ongoing worm activities on the Internet and restricts the worm spreading rate automatically will greatly contribute to the security management of modern enterprise networks. Based on the comparison and analysis of many worm detection and containment strategies, a new and effective algorithm of detecting and containing network worms is proposed in this paper. The principle of this effective algorithm is an improved two rotation process to detect and contain worms. The simulation result of the algorithm is demonstrated so effectively to detect and slow down the rapid scanning worm and \"stealthy\" worm whose propagation rate is slower than the former. In order to reduce the number of false positives, the impact of normal network activities is also concerned. Finally, the simulation also analyzes the performance of detecting worms of the algorithm under normal and congestive network background","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127414303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Functional and Neural Signatures of Body-ownership","authors":"M. Tsakiris","doi":"10.1109/PCTHEALTH.2006.361669","DOIUrl":"https://doi.org/10.1109/PCTHEALTH.2006.361669","url":null,"abstract":"As agents, we act upon the world with our body, and we experience ourselves, and the world through the same body. This fact implies that the sense of self is crucially dependent on motor-efferent and sensory-afferent signals. The exact nature of sensory-motor interactions that generate a sense of self is still unknown. This research aims to empirically identify the basic neuro-cognitive principles governing an embodied sense of self","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116394059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Zhang, Mingsen Xu, Rikun Liao, Hydeya Yoshiuchi, Yuefeng Ji, G. Saren
{"title":"A Service-Classified and QoS-Guaranteed Triple Play Mode in FTTH Network","authors":"N. Zhang, Mingsen Xu, Rikun Liao, Hydeya Yoshiuchi, Yuefeng Ji, G. Saren","doi":"10.1109/CHINACOM.2006.344663","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344663","url":null,"abstract":"Passive optical network (PON) is thought to be the best candidate for fiber to the home (FTTH) to solve the access network bandwidth problem. We set up Ethernet PON (EPON) system model and analyze voice and video performance through the EPON simulation model. A service-classified and QoS-guaranteed triple play mode is tested in proposed EPON system model. We present results of the detailed experiments and propose the differentiated service with different QoS level.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115428338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On almost perfect punctured binary sequence pair","authors":"Fei Mao, Luyong Zhang, Zheng Zhou, Wei-xia Zou","doi":"10.1109/CHINACOM.2006.344721","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344721","url":null,"abstract":"This paper proposes a completely new periodic correlation signal-almost perfect punctured binary sequence pair (APPBSP). We present the definitions of APPBSP and its transformation properties. To reduce the searching range and improve the searching efficiency of APPBSP, limited conditions of APPBSP are discussed to decide the punctured locations within the sequence pair. Searching results of APPBSP with length no more than 20 show that high energy efficiency can be achieved at APPBSP length 5, 9, 10, 11, 12, 13 and 16, Such high energy efficiency APPBSP is feasible for engineering applications as synchronization codes and multi-user codes.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117166232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sequences with Three no Hit Zones and their Applications in Time-Frequency Hopping Systems","authors":"Xianyang Jiang, Chao Zhang, Jianhua Lu","doi":"10.1109/CHINACOM.2006.344711","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344711","url":null,"abstract":"Based on the idea of no hit zone (NHZ) in frequency hopping (FH) system, new sequences with three no hit zones (T-NHZ) in time-frequency hopping (TFH) systems are presented. With the correlation functions of the T-NHZ in the time-frequency (TF), the proposed T-NHZ sequences can be directly employed in time-frequency hopping code division multiple access (TFH-CDMA) communication systems to reduce or eliminate multipath interference.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"74 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120823905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Multicast Strategy for the Networks with Ring Topologies","authors":"Kai Cai, Pingyi Fan","doi":"10.1109/CHINACOM.2006.344686","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344686","url":null,"abstract":"Communication networks with ring topologies are widely used in practice, especially in all-optical wavelength-division multiplexing (WDM) systems. Many efforts have been taken to wavelength assignment problem of the all-optical WDM ring networks in order to maximize the network capacity. Unlike the previous studies, we investigate the capacity of the general ring networks in the viewpoint of information flow and propose new multicast transmission strategy for three different cases, namely, the one source case, the multiple equivalent source case and the multiple link case. Theoretic analysis shows that the strategies we proposed can reach the corresponding maximum capacities of the ring networks.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127254698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Partial Pre-Deflection Scheme with Least Hop First Routing for Optical Burst Switching Networks under Self-Similar Traffic","authors":"L. Shan, Linzhen Xie, Zhang Li, A. Xu","doi":"10.1109/CHINACOM.2006.344699","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344699","url":null,"abstract":"A new scheme for optical burst switching (OBS) networks under self-similar traffic is proposed in this paper. Self-similar traffic is classified into two types of payload by partial pre-deflection edge node router, and the two types of payload are transferred using different routing algorithms - least hop first routing and shortest path first routing respectively, in order to properly utilize network resources and avoid burst contention at the core node switch. Simulation results indicate that the new scheme performs better than fixed routing and alternative routing for OBS networks under self-similar traffic. Furthermore, the implement of this scheme is feasible and easy, which makes OBS technology more applicable in network engineering (NE).","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125869438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure E-Voting System Based on List Signature for Large Scale","authors":"Guohua Cui, Li Su, Muxiang Yang, Yang Wang","doi":"10.1109/CHINACOM.2006.344734","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344734","url":null,"abstract":"Electronic voting costs less and can solve the problem of participation rate that occurs in traditional elections. Traditional E-voting schemes are designed using blind signature or anonymous communication channel; it is hard for them to solve the new problems like vacant ballot, cheating, vote collision and so on. List signature is the expansion of group signature, in which adds public detection. We proposed an E-voting scheme based on it, the proposed scheme can satisfy the properties of E-voting and can solve the new problems conveniently. Compared with the traditional schemes, it is more convenient to detect the members who issue more than one ballots in the proposed scheme. Security and performance analysis shows that the proposed scheme is secure and efficient.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115057975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of TCP over Routing protocols for Mobile Ad Hoc Networks","authors":"Abdullah-Al-Mamun, M.M. Rahman, H. Tan","doi":"10.1109/CHINACOM.2006.344668","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344668","url":null,"abstract":"In this paper, we investigate the performance of TCP of various (single-hop and multi-hop) routing protocols for mobile ad hoc networks. Using ns-2, we evaluate the TCP window size, throughput and packet delay over a single TCP connection. Our results suggest that these metrics are tightly related, and that TCP performance is tightly coupled with the stability and length of the routing path of each routing protocol.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115189842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spatial Modulation - A New Low Complexity Spectral Efficiency Enhancing Technique","authors":"R. Mesleh, H. Haas, Chang Wook Ahn, Sangboh Yun","doi":"10.1109/CHINACOM.2006.344658","DOIUrl":"https://doi.org/10.1109/CHINACOM.2006.344658","url":null,"abstract":"The multiplexing gain of multiple antenna transmission strongly depends on transmit and receive antenna spacing, transmit antenna synchronization, and the algorithm used to eliminate interchannel interference (ICI) at the receiver. In this paper, a new transmission approach, called spatial modulation, that entirely avoids ICI and requires no synchronization between the transmitting antennas while maintaining high spectral efficiency is presented. A block of information bits is mapped into a constellation point in the signal and the spatial domain, i.e. into the location of a particular antenna. The receiver estimates the transmitted signal and the transmit antenna number and uses the two information to de-map the block of information bits. For this purpose, a novel transmit antenna number detection algorithm called iterative-maximum ratio combining (i-MRC) is presented. Spatial modulation is used to transmit different number of information bits and i-MRC is used to estimate both the transmitted signal and the transmit antenna number. The results are compared to ideal V-BLAST (vertical-Bell Lab layered space-time) and to MRC. Spatial modulation outperforms MRC. The (bit-error-ratio) BER performance and the achieved spectral efficiency is comparable to V-BLAST. However, spatial modulation results in a vast reduction in receiver complexity.","PeriodicalId":408368,"journal":{"name":"2006 First International Conference on Communications and Networking in China","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123038526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}