{"title":"Proposal of a Method Detecting Malicious Processes","authors":"Takumi Yamamoto, Kiyoto Kawauchi, Shoji Sakurai","doi":"10.1109/WAINA.2014.164","DOIUrl":"https://doi.org/10.1109/WAINA.2014.164","url":null,"abstract":"Malwares' communication detection methods based on communication characteristics have been proposed. However as malwares are getting more sophisticated and legitimate softwares' communication is getting diverse, it becomes harder to correctly tell malwares' communication and legitimate softwares' communication apart. Therefore we propose a method to check whether a process generating suspicious communication is malicious or not. This method focuses on malwares which impersonate a legitimate process by injecting malicious codes into the process. This method extracts two process images. One is obtained from a process to be checked (target process) generating suspicious communication. The other is obtained by executing the same executable as the target process in a clean Virtual Machine. Then the two process images are compared to extract injected codes. Finally the codes are verified whether the codes are malicious or not.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116157063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liyi Zheng, Tian Nie, Ichiro Moriya, Yusuke Inoue, Takakazu Imada, T. Utsuro, Yasuhide Kawada, N. Kando
{"title":"Comparative Topic Analysis of Japanese and Chinese Bloggers","authors":"Liyi Zheng, Tian Nie, Ichiro Moriya, Yusuke Inoue, Takakazu Imada, T. Utsuro, Yasuhide Kawada, N. Kando","doi":"10.1109/WAINA.2014.107","DOIUrl":"https://doi.org/10.1109/WAINA.2014.107","url":null,"abstract":"This paper first studies how to apply a topic model to Chinese and Japanese blog posts collected from a few hundred Chinese and Japanese bloggers and then to classify bloggers into topics. The estimated topics are exploited in the task of over viewing the Chinese and Japanese bloggers' concerns, opinions, and cultures. Those topics are also quite helpful when comparing them between Chinese and Japanese in order to discover differences in the concerns, opinions, and cultures of the two languages. In the evaluation, we collect a few hundred bloggers from a well-known Sina blog host bloggers categories in China, and an also well-known blogger community service Nihon Blog Mura in Japan. As case studies, we focus on the \"health\", \"military\", and \"nursing care\" categories in the services of both languages, and generate topics based on a topic model, and then overview and compare them between Chinese and Japanese. We actually discover certain differences in bloggers' topics between Chinese and Japanese.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129899934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving and Optimizing the Operation Layer Algorithm of NETCONF Protocol","authors":"Yangmin Lee, Jaekee Lee","doi":"10.1109/WAINA.2014.79","DOIUrl":"https://doi.org/10.1109/WAINA.2014.79","url":null,"abstract":"For proper administration of networks with complex heterogeneous structures, NETCONF protocol has been proposed. It still, however, has a few unresolved issues with each layer of the protocol. This paper suggests a technique which can efficiently update the configuration data of network equipment when multiple administrators are present. Specifically, for efficient updates of the network equipment configuration, we propose to add a pre-examination of the data dependent to algorithm in operation layer and modify the data structure for managing XML documents for changing the configurations of network equipment.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128422188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks","authors":"S. K. Dhurandher, I. Woungang, I. Traoré","doi":"10.1109/WAINA.2014.85","DOIUrl":"https://doi.org/10.1109/WAINA.2014.85","url":null,"abstract":"This paper continues the investigation of our recently proposed protocol (called E2-SCAN) designed for protecting against network layer attacks in mobile ad hoc networks. The enhancements of the E2-SCAN protocol are twofold: (1) a modified credit strategy for tokens renewal is introduced, and (2) a novel strategy for selecting the routing path, resulting to our so-called Conditional SCAN (CSCAN). Simulation experiments are conducted, establishing the superiority of C-SCAN over E2-SCAN in terms of energy efficiency, where the energy efficiency of a node is defined as the ratio of the amount of energy consumed by the node to the total energy consumed by the network.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129513362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sok Chhorn, Si-o Seo, M. H. Mohsini, Hyong-Woo Lee, Choong-Ho Cho, Se-Jin Kim, Seungwan Ryu
{"title":"Co-channel Interference Mitigation Based on Location Information in LTE Femtocell Systems","authors":"Sok Chhorn, Si-o Seo, M. H. Mohsini, Hyong-Woo Lee, Choong-Ho Cho, Se-Jin Kim, Seungwan Ryu","doi":"10.1109/WAINA.2014.156","DOIUrl":"https://doi.org/10.1109/WAINA.2014.156","url":null,"abstract":"Macrocell base stations are mainly aiming to serve outdoor mobile users thus indoor mobile users may suffer from weak signals because of the outdoor-to-indoor wall penetration loss and indoor obstacles. Recently, in order to improve indoor performance, femtocell networks have been receiving a great deal of attention. However, since the femtocell and macrocell share the same frequency band, co-channel interference (CCI) between them is one of serious problems in femtocell networks. In order to reduce co-channel interference, this paper proposes a novel CCI avoidance scheme using the control channel information based on location information for the downlink of Long Term Evolution (LTE) femtocell networks. Simulation results show that the proposed scheme outperforms other schemes in terms of the outage probability and system throughput.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127428776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Adrada, Esteban Salazar, Julian Rojas, J. Corrales
{"title":"Automatic Code Instrumentation for Converged Service Monitoring and Fault Detection","authors":"Diego Adrada, Esteban Salazar, Julian Rojas, J. Corrales","doi":"10.1109/WAINA.2014.115","DOIUrl":"https://doi.org/10.1109/WAINA.2014.115","url":null,"abstract":"The notion of converged services is based on the integration of traditional telecommunications features and Web 2.0 services. Today this concept is given special attention by the telecommunications service providers as a mechanism that allows them to expand their service portfolio and have greater market dynamism. However, these services present new challenges from its management point of view, making necessary runtime monitoring mechanisms that permit adequate fault detection and thus ensure proper operation. In this paper, we present a runtime monitoring scheme that uses automatic code instrumentation techniques to provide converged services with functionalities that facilitate its fault-handling and operational management. We also provide an implementation of the monitoring scheme through a sample converged service which demonstrates its performance and applicability to this type of services.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Object-Oriented Context Modeling: Object-Oriented Relational Database Data Storage","authors":"Jagdev Bhogal, P. Moore","doi":"10.1109/WAINA.2014.89","DOIUrl":"https://doi.org/10.1109/WAINA.2014.89","url":null,"abstract":"The literature identifies ontology-based context modeling (OBCM) as the optimal approach to context modeling. Context modeling (CM) requires the storage of contextual information in persistent and in-memory formats with the capability to implement dynamic accessing and updating of the literal values. As discussed in this paper many benefits are realized by the use of ontologies however there are also issues. A context is made up of context properties and their literal values, these can be viewed in terms of objects which combine to create a context which defines and describes an entity's current prevailing state. Therefore, the overall context can be viewed as an object. This paper considers the use of object relational database management systems (ORDBMS) to model context and identifies the benefits and negative aspects of such an approach. The paper concludes that the use of ORDBMS to implement CM offers benefits over OBCM however there are significant open research questions that require resolution.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122295746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ronan D. Mendonça, T. R. Silva, Fabrício A. Silva, L. B. Ruiz, A. Loureiro
{"title":"Dynamic Bandwidth Distribution for Entertainment Vehicular Networks Applications","authors":"Ronan D. Mendonça, T. R. Silva, Fabrício A. Silva, L. B. Ruiz, A. Loureiro","doi":"10.1109/WAINA.2014.130","DOIUrl":"https://doi.org/10.1109/WAINA.2014.130","url":null,"abstract":"Vehicular networks will play an important role in future smart cities. Connected vehicles will be able to provide entertainment content to their users in order to make traffic situations more enjoyable. However, the amount of bandwidth available to the vehicles may not be enough to satisfy all of them. In this case, we can say that a conflict of interest occurred and then must the solved as fair as possible. In this work, we propose a solution to solve this kind of collective conflict. Our solution balances users' satisfaction with resources consumption as it is capable of choosing the most adequate resolution algorithm based on the current application's situation. The results showed that with our solution it was possible to achieve adequate satisfaction levels, with low response time and controlled network usage.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114140147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Omnidirectional Video and Sensor Data Collection and Distribution System on Challenged Communication Environment","authors":"Kenta Ito, Go Hirakawa, Y. Shibata","doi":"10.1109/WAINA.2014.103","DOIUrl":"https://doi.org/10.1109/WAINA.2014.103","url":null,"abstract":"Japan is prone to natural disasters occurring including earthquakes, tsunami, typhoon, heavy rain and snow. A wide range and quick information gathering systems are needed after a disaster has occurred. In addition, wireless networks are very useful at a disaster has occurred. By using wireless networks, we can build a network quickly using moving vehicles. But there is a challenging communication environment in hilly and mountainous areas and after a disaster has occurred where communication is completely disabled. In this paper, we introduce SODiCS (Spatial and Temporal Omni directional Video Distribution and Collection System) for challenged communication environment. Data gathered using Omni directional camera and sensor is transmitted to all of the users through a web application. The user can see the data gathered on GIS map as a web service. We equipped the system with two modes of video distribution functions, Live View mode and Storage View mode. The system configuration and architecture are explained and a prototype system is constructed to evaluate the performance of our system.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123782847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defining Computational Resources Prices Based on the Expectations Equilibrium of Consumers and Providers from a Desktop Grid","authors":"L. Góis, G. Casella, E. C. Ishikawa","doi":"10.1109/WAINA.2014.76","DOIUrl":"https://doi.org/10.1109/WAINA.2014.76","url":null,"abstract":"This paper proposes a dynamic approach for price adjustment of computational resources ruled by a Desktop Grid. The adopted strategies are based on the supply and demand law commonly applied in economical markets. Thus, allows one to dynamically set the prices according to the previous requested consumer's services and supplier's submitted resources. The testing analysis results show how the equilibrium expectation from the consumer and service providers are preponderant in the processes of obtaining fairer values in their negotiations. The reached individual satisfactions established by the well succeed sharing are appraised, in order to endure it or not in the grid market based on its influences.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124948993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}