2014 28th International Conference on Advanced Information Networking and Applications Workshops最新文献

筛选
英文 中文
Performance Evaluation of LTE Network via Using Fixed/Mobile Femtocells 基于固定/移动Femtocells的LTE网络性能评估
R. Raheem, A. Lasebae, J. Loo
{"title":"Performance Evaluation of LTE Network via Using Fixed/Mobile Femtocells","authors":"R. Raheem, A. Lasebae, J. Loo","doi":"10.1109/WAINA.2014.51","DOIUrl":"https://doi.org/10.1109/WAINA.2014.51","url":null,"abstract":"This paper examines the concept of Mobile Femtocells to be the revolution of the next generation cellular networks. Mobile Femtocells can be deployed in public transportation vehicles such as trains, buses or private cars that form its own cell inside vehicles to serve vehicular and mobile User Equipments. The purpose of this study is to help cell-edge users to have better signal strength. Therefore, an investigation into Long Term Evolution cell-edge users' performance is being conducted by investigating the deployment of Mobile Femtocells in LTE system. The throughput for cell edge users can be improved by deploying Fixed/Mobile Femtocells. In this paper, two scenarios have been considered in the case of Fixed/Mobile Femtocells. The handover of Mobile Femtocell has been expressed in three more scenarios. The achieved results via Matlab simulation showed that Mobile Femtocells' users have enjoyed better Quality of Services than Fixed Femtocells' users. The improved performance has been noticed through the improvement of the Mobile Femtocells UEs' spectral efficiency, throughput and SINR over the Fixed Femtocells' users. The system behavior has been investigated under low, medium and high load traffic before and after adding the Mobile Femtocells. The results showed that adding the Mobile Femtocells in the high loaded traffic areas has the biggest affect on improving the UE's throughput.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115671887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A First Look at Caching during TIP-Tree Navigation for Location Based Services 在基于位置的服务的TIP-Tree导航期间的缓存初探
W. Osborn
{"title":"A First Look at Caching during TIP-Tree Navigation for Location Based Services","authors":"W. Osborn","doi":"10.1109/WAINA.2014.37","DOIUrl":"https://doi.org/10.1109/WAINA.2014.37","url":null,"abstract":"This paper explores the issue of caching during TIP-tree navigation for location-based services. The TIP-tree is a recently proposed spatial access method for supporting continuous point queries in a tourist information system. In addition, its navigation strategy avoids repeating searching, thus providing efficient processing of user trajectories that are not known in advance. This paper proposes a caching strategy that further improves upon the efficiency of the TIP-tree navigation algorithm. A performance evaluation shows that significant improvement is possible when navigation and caching are applied together.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116970940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of PC Router Based Cognitive Wireless Network for Disaster-Resilient WANs 基于PC路由器的认知无线网络容灾广域网性能评估
Goshi Sato, Noriki Uchida, Y. Shibata
{"title":"Performance Evaluation of PC Router Based Cognitive Wireless Network for Disaster-Resilient WANs","authors":"Goshi Sato, Noriki Uchida, Y. Shibata","doi":"10.1109/WAINA.2014.100","DOIUrl":"https://doi.org/10.1109/WAINA.2014.100","url":null,"abstract":"In order to temporally recover the information network infrastructure in disaster areas on the East Japan Great Earthquake on March 11, 2011, various wireless network technologies such as satellite IP network, 3G, Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed, but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, eventually the total network could not effectively function. In this paper, by integrating those wireless networks into a cognitive wireless network, user can use this cognitive network as an access network to Internet by selecting the best network even though the serious disaster occurred. We introduce an OpenFlow based access network to automatically select the best network link and route among the possible access networks to Internet by periodically monitoring their network states and evaluate the those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114549885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics 基于行为特征区分Web攻击和漏洞扫描
K. Goseva-Popstojanova, Ana Dimitrijevikj
{"title":"Distinguishing between Web Attacks and Vulnerability Scans Based on Behavioral Characteristics","authors":"K. Goseva-Popstojanova, Ana Dimitrijevikj","doi":"10.1109/WAINA.2014.15","DOIUrl":"https://doi.org/10.1109/WAINA.2014.15","url":null,"abstract":"The number of vulnerabilities and reported attacks on Web systems are showing increasing trends, which clearly illustrate the need for better understanding of malicious cyber activities. In this paper we use clustering to classify attacker activities aimed at Web systems. The empirical analysis is based on four datasets, each in duration of several months, collected by high-interaction honey pots. The results show that behavioral clustering analysis can be used to distinguish between attack sessions and vulnerability scan sessions. However, the performance heavily depends on the dataset. Furthermore, the results show that attacks differ from vulnerability scans in a small number of features (i.e., session characteristics). Specifically, for each dataset, the best feature selection method (in terms of the high probability of detection and low probability of false alarm) selects only three features and results into three to four clusters, significantly improving the performance of clustering compared to the case when all features are used. The best subset of features and the extent of the improvement, however, also depend on the dataset.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128259782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Remote Control Method for Mobile Robots Using Game Engines 基于游戏引擎的移动机器人远程控制方法
Osamu Ohashi, Eiji Ochiai, Y. Kato
{"title":"A Remote Control Method for Mobile Robots Using Game Engines","authors":"Osamu Ohashi, Eiji Ochiai, Y. Kato","doi":"10.1109/WAINA.2014.23","DOIUrl":"https://doi.org/10.1109/WAINA.2014.23","url":null,"abstract":"This paper proposes a mapping method with the virtual world and the real world for robot remote controlling via the internet. Server isolates a user operation side in the virtual world and a robot working side in the real world. We use a Game Engine for creating the virtual world. The Game Engine handles user operation and user side view. This view is used for the reference for comparing matching level with the real world view which is taken by robots in the real world and current intensity level comparing with measured intensity concurrently. These comparing processes are done on the server. We validate efficiency of the method for applying to campus guidance service.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure Live Virtual Machines Migration: Issues and Solutions 安全的实时虚拟机迁移:问题和解决方案
Mahdi Aiash, G. Mapp, O. Gemikonakli
{"title":"Secure Live Virtual Machines Migration: Issues and Solutions","authors":"Mahdi Aiash, G. Mapp, O. Gemikonakli","doi":"10.1109/WAINA.2014.35","DOIUrl":"https://doi.org/10.1109/WAINA.2014.35","url":null,"abstract":"In recent years, there has been a huge trend towards running network intensive applications, such as Internet servers and Cloud-based service in virtual environment, where multiple virtual machines (VMs) running on the same machine share the machine's physical and network resources. In such environment, the virtual machine monitor (VMM) virtualizes the machine's resources in terms of CPU, memory, storage, network and I/O devices to allow multiple operating systems running in different VMs to operate and access the network concurrently. A key feature of virtualization is live migration (LM) that allows transfer of virtual machine from one physical server to another without interrupting the services running in virtual machine. Live migration facilitates workload balancing, fault tolerance, online system maintenance, consolidation of virtual machines etc. However, live migration is still in an early stage of implementation and its security is yet to be evaluated. The security concern of live migration is a major factor for its adoption by the IT industry. Therefore, this paper uses the X.805 security standard to investigate attacks on live virtual machine migration. The analysis highlights the main source of threats and suggests approaches to tackle them. The paper also surveys and compares different proposals in the literature to secure the live migration.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126561521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers 使用IP流的僵尸网络行为分析:使用分类器的HTTP过滤器
Fariba Haddadi, Jillian Morgan, Eduardo Gomes Filho, A. N. Zincir-Heywood
{"title":"Botnet Behaviour Analysis Using IP Flows: With HTTP Filters Using Classifiers","authors":"Fariba Haddadi, Jillian Morgan, Eduardo Gomes Filho, A. N. Zincir-Heywood","doi":"10.1109/WAINA.2014.19","DOIUrl":"https://doi.org/10.1109/WAINA.2014.19","url":null,"abstract":"Botnets are one of the most destructive threats against the cyber security. Recently, HTTP protocol is frequently utilized by botnets as the Command and Communication (C&C) protocol. In this work, we aim to detect HTTP based botnet activity based on botnet behaviour analysis via machine learning approach. To achieve this, we employ flow-based network traffic utilizing NetFlow (via Softflowd). The proposed botnet analysis system is implemented by employing two different machine learning algorithms, C4.5 and Naive Bayes. Our results show that C4.5 learning algorithm based classifier obtained very promising performance on detecting HTTP based botnet activity.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131010695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
An Approach for Performance Modelling and Analysis of Multi-tiers Autonomic Systems 多层自治系统的性能建模与分析方法
Mehdi Sliem, Nabila Salmi, M. Ioualalen
{"title":"An Approach for Performance Modelling and Analysis of Multi-tiers Autonomic Systems","authors":"Mehdi Sliem, Nabila Salmi, M. Ioualalen","doi":"10.1109/WAINA.2014.63","DOIUrl":"https://doi.org/10.1109/WAINA.2014.63","url":null,"abstract":"The need of a modern system to be more autonomous with regard to its environment make autonomic systems very attractive, providing them with self-management capabilities. Usually, an autonomic system reconfigures itself to overcome some problem or optimize itself. However, these reconfigurations may result in a loss of performance or even a service degradation. To avoid such situations, this paper proposes a performance prediction approach for autonomic systems, based on formal modelling. Our goal is to forecast the most appropriate configuration for an autonomic system, particularly, a multi-tier system, in order to get an efficient use of resources. The main idea is to model resource allocation triggered by the autonomic loop for achieving the best configuration. Then, we show how to analyse the whole system and evaluate the autonomic loop impact on system performances. The method is based on Stochastic Petri Nets (SPN) modelling. The resource availability, the workload intensity and the autonomic features are targeted. A typical example of a multiers system with one server is presented, analysed with the GreatSPN tool, to show the effectiveness of the proposed approach.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
REST API Design Patterns for SDN Northbound API SDN北向API的REST API设计模式
Wei Zhou, Li Li, Min Luo, W. Chou
{"title":"REST API Design Patterns for SDN Northbound API","authors":"Wei Zhou, Li Li, Min Luo, W. Chou","doi":"10.1109/WAINA.2014.153","DOIUrl":"https://doi.org/10.1109/WAINA.2014.153","url":null,"abstract":"REST architectural style gains increasing popularity in the networking protocol design, and it has become a prevalent choice for northbound API of Software-Defined Networking (SDN). This paper addresses many critical issues in RESTful networking protocol design, and presents a framework on how a networking protocol can be designed in a truly RESTful manner, making it towards a service oriented data networking. In particular, we introduce the HTTP content negotiation mechanism which allows clients to select different representation formats from the same resource URI. Most importantly, we present a hypertext-driven approach, so that hypertext links are defined between REST resources for the networking protocol to guide clients to identify the right resources rather than relying on fixed resource URIs. The advantages of our approach are verified in two folds. First, we show how to apply our approach to fix REST design problems in some existing northbound networking APIs, and then we show how to design a RESTful northbound API of SDN in the context of OpenStack. We implemented our proposed approach in the northbound REST API of SOX, a generalized SDN controller, and the benefits of the proposed approach are experimentally verified.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131404701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 110
Internet Traffic Engineering: Understanding the Specialist Decision-Making Process for Traffic Management in South America 互联网流量工程:了解南美流量管理的专家决策过程
M. Deus, P. Carvalho, J. P. Leite
{"title":"Internet Traffic Engineering: Understanding the Specialist Decision-Making Process for Traffic Management in South America","authors":"M. Deus, P. Carvalho, J. P. Leite","doi":"10.1109/WAINA.2014.155","DOIUrl":"https://doi.org/10.1109/WAINA.2014.155","url":null,"abstract":"The importance of the traffic control is a huge paradigm on the Internet. The AS (Autonomous Systems) by definition assumes no external control as priority; this could be an enormous problem when the traffic is asymmetric and the inbound is the higher portion. The problem is very often in networks hosted in South America countries; making the unbalancing inbound and outbound in a rate of more than 5:1 in some situations. In this article some Real South America networks will be analyzed, characterized including the specialist (e.g. Network Engineer) decision-making.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115916057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信