首页 > 最新文献

2015 IEEE 35th International Conference on Distributed Computing Systems最新文献

英文 中文
Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs 远程调节:利用路径编码和机会转发实现无线传感器网络的远程控制
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.78
Daibo Liu, Zhichao Cao, Xiaopei Wu, Yuan He, Xiaoyu Ji, Mengshu Hou
On-air access of individual sensor node (called remote control) is an indispensable function in operational wireless sensor networks, for purposes like network management and real-time information delivery. To realize reliable and efficient remote control in a wireless sensor network (WSN), however, is extremely challenging, due to the stringent resource constraints and intrinsically unrealizable wireless communication. In this paper, we propose TeleAdjusting, a ready-to-use protocol to remotely control any individual node in a WSN. We develop a coding scheme for addressing on the cost-optimal reverse routing tree. In the address of each node, all its upstream relaying nodes are implicitly encoded. Then through a distributed prefix matching process between the local address and the destination address, a packet used for remote control is forwarded along a cost-optimal path. Moreover, TeleAdjusting incorporates opportunistic forwarding into the addressing process, so as to improve the network performance in terms of reliability and energy efficiency. We implement TeleAdjusting with TinyOS and evaluate its performance through extensive simulations and experiments. The results demonstrate that compared to the existing protocols, TeleAdjusting can provide high performance of remote control, which is as reliable as network-wide flooding and much more efficient than remote control through a pre-determined path.
单个传感器节点的空中访问(称为远程控制)是可操作无线传感器网络中不可缺少的功能,用于网络管理和实时信息传递。然而,由于无线传感器网络资源的严格限制和无线通信本身的不可实现性,在无线传感器网络中实现可靠、高效的远程控制是极具挑战性的。在本文中,我们提出了teleadjustment,这是一种随时可用的协议,可以远程控制WSN中的任何单个节点。我们开发了一种在成本最优的反向路由树上寻址的编码方案。在每个节点的地址中,它的所有上游中继节点都被隐式编码。然后,通过本地地址和目的地址之间的分布式前缀匹配过程,使用于远程控制的数据包沿着成本最优的路径转发。此外,teleadjustting在寻址过程中加入了机会转发,从而在可靠性和能效方面提高了网络性能。我们利用TinyOS实现了teleadjustment,并通过大量的仿真和实验对其性能进行了评估。结果表明,与现有协议相比,tele调整可以提供高性能的远程控制,其可靠性与全网泛洪一样高,并且比通过预先确定的路径进行远程控制要高效得多。
{"title":"Tele Adjusting: Using Path Coding and Opportunistic Forwarding for Remote Control in WSNs","authors":"Daibo Liu, Zhichao Cao, Xiaopei Wu, Yuan He, Xiaoyu Ji, Mengshu Hou","doi":"10.1109/ICDCS.2015.78","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.78","url":null,"abstract":"On-air access of individual sensor node (called remote control) is an indispensable function in operational wireless sensor networks, for purposes like network management and real-time information delivery. To realize reliable and efficient remote control in a wireless sensor network (WSN), however, is extremely challenging, due to the stringent resource constraints and intrinsically unrealizable wireless communication. In this paper, we propose TeleAdjusting, a ready-to-use protocol to remotely control any individual node in a WSN. We develop a coding scheme for addressing on the cost-optimal reverse routing tree. In the address of each node, all its upstream relaying nodes are implicitly encoded. Then through a distributed prefix matching process between the local address and the destination address, a packet used for remote control is forwarded along a cost-optimal path. Moreover, TeleAdjusting incorporates opportunistic forwarding into the addressing process, so as to improve the network performance in terms of reliability and energy efficiency. We implement TeleAdjusting with TinyOS and evaluate its performance through extensive simulations and experiments. The results demonstrate that compared to the existing protocols, TeleAdjusting can provide high performance of remote control, which is as reliable as network-wide flooding and much more efficient than remote control through a pre-determined path.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
RahasNym: Protecting against Linkability in the Digital Identity Ecosystem RahasNym:防止数字身份生态系统中的可链接性
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.102
Hasini Gunasinghe, E. Bertino
Unlink ability and accountability are conflicting yet critical requirements for on-line transactions that need to be addressed in order to preserve users' privacy as well as to protect service providers in today identity ecosystems. In this poster paper we introduce a pseudonymous identity management system in which users can carry out unlink able on-line transactions without having to disclose their actual identity to the service providers. At the same time, the service providers have strong assurance about the authenticity of the identity and credentials. In our approach, users' identity is cryptographically encoded in pseudonymous identity tokens issued by trusted identity providers. Our system includes a lightweight policy language which enables users and service providers to express their requirements pertaining to pseudonymous identity verification and a suite of protocols based on zero-knowledge-proofs which enables the fulfillment of these requirements.
断开链接的能力和问责制是相互冲突的,但在线交易的关键要求需要解决,以保护用户的隐私,并在当今的身份生态系统中保护服务提供商。在这张海报中,我们介绍了一个假名身份管理系统,在这个系统中,用户可以进行不可链接的在线交易,而不必向服务提供商披露他们的实际身份。同时,服务提供者对身份和凭证的真实性有很强的保证。在我们的方法中,用户的身份被加密编码在由可信身份提供者颁发的假名身份令牌中。我们的系统包括一种轻量级的策略语言,使用户和服务提供商能够表达他们对假名身份验证的需求,以及一套基于零知识证明的协议,使这些需求能够实现。
{"title":"RahasNym: Protecting against Linkability in the Digital Identity Ecosystem","authors":"Hasini Gunasinghe, E. Bertino","doi":"10.1109/ICDCS.2015.102","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.102","url":null,"abstract":"Unlink ability and accountability are conflicting yet critical requirements for on-line transactions that need to be addressed in order to preserve users' privacy as well as to protect service providers in today identity ecosystems. In this poster paper we introduce a pseudonymous identity management system in which users can carry out unlink able on-line transactions without having to disclose their actual identity to the service providers. At the same time, the service providers have strong assurance about the authenticity of the identity and credentials. In our approach, users' identity is cryptographically encoded in pseudonymous identity tokens issued by trusted identity providers. Our system includes a lightweight policy language which enables users and service providers to express their requirements pertaining to pseudonymous identity verification and a suite of protocols based on zero-knowledge-proofs which enables the fulfillment of these requirements.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124799229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
mQual: A Mobile Peer-to-Peer Network Framework Supporting Quality of Service 一种支持服务质量的移动对等网络框架
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.93
Hongxu Zhang, Yufeng Wang, C. C. Tan, Yifan Zhang
Mobile peer-to-peer applications require devices to network themselves on-the-fly to communicate directly with each another. This paper presents mQual, a framework to help create such networks that meet different application requirements, and is able to adjust the network to ensure that these requirements are met in dynamic environments. Our prototype mQual extends the current WiFi-Direct in Android, and the experimental results suggests that mobile apps built using mQual outperform those built using WiFi-Direct.
移动点对点应用程序要求设备在运行中建立自己的网络,以便彼此直接通信。本文提出了一个框架mQual,它可以帮助创建满足不同应用需求的网络,并能够调整网络以确保在动态环境中满足这些需求。我们的原型mQual扩展了当前Android中的WiFi-Direct,实验结果表明,使用mQual构建的移动应用程序优于使用WiFi-Direct构建的移动应用程序。
{"title":"mQual: A Mobile Peer-to-Peer Network Framework Supporting Quality of Service","authors":"Hongxu Zhang, Yufeng Wang, C. C. Tan, Yifan Zhang","doi":"10.1109/ICDCS.2015.93","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.93","url":null,"abstract":"Mobile peer-to-peer applications require devices to network themselves on-the-fly to communicate directly with each another. This paper presents mQual, a framework to help create such networks that meet different application requirements, and is able to adjust the network to ensure that these requirements are met in dynamic environments. Our prototype mQual extends the current WiFi-Direct in Android, and the experimental results suggests that mobile apps built using mQual outperform those built using WiFi-Direct.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125911079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Policy-Aware Virtual Machine Management in Data Center Networks 数据中心网络中策略感知的虚拟机管理
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.81
Lin Cui, Fung Po Tso, D. Pezaros, Weijia Jia, Wei Zhao
Policies play an important role in network configuration and, therefore, in offering secure and high performance services, especially over multi-tenant Cloud Data Center (DC) environments. At the same time, elastic resource provisioning through virtualization often disregards policy requirements, assuming that the policy implementation is handled by the underlying network infrastructure. In this paper, we define PLAN, a Policy-Aware virtual machine management scheme to jointly consider DC communication cost reduction through Virtual Machine (VM) migration while meeting network policy requirements.
策略在网络配置中扮演着重要的角色,因此在提供安全和高性能服务时,尤其是在多租户云数据中心(DC)环境中。同时,通过虚拟化提供弹性资源通常忽略策略需求,假设策略实现是由底层网络基础设施处理的。本文定义了一种策略感知的虚拟机管理方案PLAN,在满足网络策略要求的同时,通过虚拟机迁移来降低数据中心通信成本。
{"title":"Policy-Aware Virtual Machine Management in Data Center Networks","authors":"Lin Cui, Fung Po Tso, D. Pezaros, Weijia Jia, Wei Zhao","doi":"10.1109/ICDCS.2015.81","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.81","url":null,"abstract":"Policies play an important role in network configuration and, therefore, in offering secure and high performance services, especially over multi-tenant Cloud Data Center (DC) environments. At the same time, elastic resource provisioning through virtualization often disregards policy requirements, assuming that the policy implementation is handled by the underlying network infrastructure. In this paper, we define PLAN, a Policy-Aware virtual machine management scheme to jointly consider DC communication cost reduction through Virtual Machine (VM) migration while meeting network policy requirements.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126347737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Operational Transformation for Real-Time Synchronization of Cloud Storage 云存储实时同步的操作转换
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.90
Agustina, Chengzheng Sun
This paper presents an Operational Transformation (OT) technique, named CSOT (Cloud Storage OT), that supports real-time file synchronization in cloud storage and achieve well-defined consistent combined-effects of concurrent file manipulation operations. We have developed and used a comprehensive suite of concurrency testing cases to derive and compare the results produced by CSOT and three industrial cloud storage systems and made interesting discoveries.
本文提出了一种名为CSOT(云存储OT)的操作转换(OT)技术,该技术支持云存储中的实时文件同步,并实现定义良好的并发文件操作的一致组合效果。我们开发并使用了一套全面的并发测试用例来推导和比较CSOT和三个工业云存储系统产生的结果,并有了有趣的发现。
{"title":"Operational Transformation for Real-Time Synchronization of Cloud Storage","authors":"Agustina, Chengzheng Sun","doi":"10.1109/ICDCS.2015.90","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.90","url":null,"abstract":"This paper presents an Operational Transformation (OT) technique, named CSOT (Cloud Storage OT), that supports real-time file synchronization in cloud storage and achieve well-defined consistent combined-effects of concurrent file manipulation operations. We have developed and used a comprehensive suite of concurrency testing cases to derive and compare the results produced by CSOT and three industrial cloud storage systems and made interesting discoveries.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-path Based Avoidance Routing in Wireless Networks 无线网络中基于多路径的回避路由
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.77
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu, T. Lai
The speedy advancement in computer hardware has caused data encryption to no longer be a 100% safe solution for secure communications. To battle with adversaries, a countermeasure is to avoid message routing through certain insecure areas, e.g., Malicious countries and nodes. To this end, avoidance routing has been proposed over the past few years. However, the existing avoidance protocols are single-path-based, which means that there must be a safe path such that no adversary is in the proximity of the whole path. This condition is difficult to satisfy. As a result, routing opportunities based on the existing avoidance schemes are limited. To tackle this issue, we propose an avoidance routing framework, namely Multi-Path Avoidance Routing (MPAR). In our approach, a source node first encodes a message into k different pieces, and each piece is sent via k different paths. The destination can assemble the original message easily, while an adversary cannot recover the original message unless she obtains all the pieces. We prove that the coding scheme achieves perfect secrecy against eavesdropping under the condition that an adversary has incomplete information regarding the message. The simulation results validate that the proposed MPAR protocol achieves its design goals.
计算机硬件的快速发展导致数据加密不再是安全通信的100%安全解决方案。为了对抗对手,对策是避免消息路由通过某些不安全的区域,例如,恶意国家和节点。为此,在过去的几年里,人们提出了回避路由。然而,现有的回避协议是基于单路径的,这意味着必须有一个安全的路径,使得没有对手在整个路径附近。这个条件很难满足。因此,基于现有规避方案的路由机会有限。为了解决这个问题,我们提出了一个回避路由框架,即多路径回避路由(MPAR)。在我们的方法中,源节点首先将消息编码为k个不同的部分,每个部分通过k个不同的路径发送。目标方可以很容易地组装原始信息,而攻击方除非获得所有的碎片,否则无法恢复原始信息。我们证明了该编码方案在对手不完全掌握消息信息的情况下实现了对窃听的完全保密。仿真结果验证了所提出的MPAR协议达到了设计目标。
{"title":"Multi-path Based Avoidance Routing in Wireless Networks","authors":"Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku, Jie Wu, T. Lai","doi":"10.1109/ICDCS.2015.77","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.77","url":null,"abstract":"The speedy advancement in computer hardware has caused data encryption to no longer be a 100% safe solution for secure communications. To battle with adversaries, a countermeasure is to avoid message routing through certain insecure areas, e.g., Malicious countries and nodes. To this end, avoidance routing has been proposed over the past few years. However, the existing avoidance protocols are single-path-based, which means that there must be a safe path such that no adversary is in the proximity of the whole path. This condition is difficult to satisfy. As a result, routing opportunities based on the existing avoidance schemes are limited. To tackle this issue, we propose an avoidance routing framework, namely Multi-Path Avoidance Routing (MPAR). In our approach, a source node first encodes a message into k different pieces, and each piece is sent via k different paths. The destination can assemble the original message easily, while an adversary cannot recover the original message unless she obtains all the pieces. We prove that the coding scheme achieves perfect secrecy against eavesdropping under the condition that an adversary has incomplete information regarding the message. The simulation results validate that the proposed MPAR protocol achieves its design goals.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130146609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Replica Placement for Availability in the Worst Case 最坏情况下可用性的副本放置
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.67
Peng Li, Debin Gao, M. Reiter
We explore the problem of placing object replicas on nodes in a distributed system to maximize the number of objects that remain available when node failures occur. In our model, failing (the nodes hosting) a given threshold of replicas is sufficient to disable each object, and the adversary selects which nodes to fail to minimize the number of objects that remain available. We specifically explore placement strategies based on combinatorial structures called t-packings, provide a lower bound for the object availability they offer, show that these placements offer availability that is c-competitive with optimal, propose an efficient algorithm for computing combinations of t-packings that maximize their availability lower bound, and provide parameter selection strategies to concretely instantiate our schemes for different system sizes. We compare the availability offered by our approach to that of random replica placement, owing to the popularity of the latter approach in previous work. After quantifying the availability offered by random replica placement in our model, we show that our combinatorial strategy yields placements with better availability than random replica placement for many realistic parameter values.
我们探讨了在分布式系统的节点上放置对象副本的问题,以便在节点发生故障时最大限度地保留可用的对象数量。在我们的模型中,失败(节点托管)给定的副本阈值足以禁用每个对象,攻击者选择失败哪些节点以最小化仍然可用的对象数量。我们特别探讨了基于组合结构的放置策略,称为t-packings,提供了它们提供的对象可用性的下界,表明这些放置提供了与最优的c竞争的可用性,提出了一种有效的算法来计算t-packings的组合,使其可用性下界最大化,并提供参数选择策略来具体实例化我们针对不同系统大小的方案。由于后一种方法在以前的工作中很受欢迎,我们比较了我们的方法与随机副本放置的可用性。在我们的模型中量化了随机副本放置提供的可用性后,我们表明,对于许多实际参数值,我们的组合策略产生的放置比随机副本放置具有更好的可用性。
{"title":"Replica Placement for Availability in the Worst Case","authors":"Peng Li, Debin Gao, M. Reiter","doi":"10.1109/ICDCS.2015.67","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.67","url":null,"abstract":"We explore the problem of placing object replicas on nodes in a distributed system to maximize the number of objects that remain available when node failures occur. In our model, failing (the nodes hosting) a given threshold of replicas is sufficient to disable each object, and the adversary selects which nodes to fail to minimize the number of objects that remain available. We specifically explore placement strategies based on combinatorial structures called t-packings, provide a lower bound for the object availability they offer, show that these placements offer availability that is c-competitive with optimal, propose an efficient algorithm for computing combinations of t-packings that maximize their availability lower bound, and provide parameter selection strategies to concretely instantiate our schemes for different system sizes. We compare the availability offered by our approach to that of random replica placement, owing to the popularity of the latter approach in previous work. After quantifying the availability offered by random replica placement in our model, we show that our combinatorial strategy yields placements with better availability than random replica placement for many realistic parameter values.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134348764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Systematic Mining of Associated Server Herds for Malware Campaign Discovery 针对恶意软件活动发现的关联服务器群的系统挖掘
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.70
Jialong Zhang, Sabyasachi Saha, G. Gu, Sung-Ju Lee, M. Mellia
HTTP is a popular channel for malware to communicate with malicious servers (e.g., Command & Control, drive-by download, drop-zone), as well as to attack benign servers. By utilizing HTTP requests, malware easily disguises itself under a large amount of benign HTTP traffic. Thus, identifying malicious HTTP activities is challenging. We leverage an insight that cyber criminals are increasingly using dynamic malicious infrastructures with multiple servers to be efficient and anonymous in (i) malware distribution (using redirectors and exploit servers), (ii) control (using C&C servers) and (iii) monetization (using payment servers), and (iv) being robust against server takedowns (using multiple backups for each type of servers). Instead of focusing on detecting individual malicious domains, we propose a complementary approach to identify a group of closely related servers that are potentially involved in the same malware campaign, which we term as Associated Server Herd (ASH). Our solution, SMASH (Systematic Mining of Associated Server Herds), utilizes an unsupervised framework to infer malware ASHs by systematically mining the relations among all servers from multiple dimensions. We build a prototype system of SMASH and evaluate it with traces from a large ISP. The result shows that SMASH successfully infers a large number of previously undetected malicious servers and possible zero-day attacks, with low false positives. We believe the inferred ASHs provide a better global view of the attack campaign that may not be easily captured by detecting only individual servers.
HTTP是恶意软件与恶意服务器(例如,Command & Control, drive-by - download, drop-zone)通信以及攻击良性服务器的流行通道。通过利用HTTP请求,恶意软件很容易将自己伪装成大量良性HTTP流量。因此,识别恶意HTTP活动具有挑战性。我们发现,网络犯罪分子越来越多地使用带有多个服务器的动态恶意基础设施,以便在以下方面实现高效和匿名:(i)恶意软件分发(使用重定向器和漏洞服务器),(ii)控制(使用C&C服务器)和(iii)货币化(使用支付服务器),以及(iv)强健地抵御服务器关闭(为每种类型的服务器使用多个备份)。我们不是专注于检测单个恶意域,而是提出一种补充方法来识别一组密切相关的服务器,这些服务器可能涉及相同的恶意软件活动,我们称之为关联服务器群(ASH)。我们的解决方案SMASH(关联服务器群的系统挖掘)利用无监督框架,通过从多个维度系统地挖掘所有服务器之间的关系来推断恶意软件的ash。我们建立了SMASH的原型系统,并利用大型ISP的痕迹对其进行了评估。结果表明,SMASH成功推断出大量以前未被检测到的恶意服务器和可能的零日攻击,误报率很低。我们认为,推断出的ash提供了更好的攻击活动全局视图,仅通过检测单个服务器可能不容易捕获。
{"title":"Systematic Mining of Associated Server Herds for Malware Campaign Discovery","authors":"Jialong Zhang, Sabyasachi Saha, G. Gu, Sung-Ju Lee, M. Mellia","doi":"10.1109/ICDCS.2015.70","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.70","url":null,"abstract":"HTTP is a popular channel for malware to communicate with malicious servers (e.g., Command & Control, drive-by download, drop-zone), as well as to attack benign servers. By utilizing HTTP requests, malware easily disguises itself under a large amount of benign HTTP traffic. Thus, identifying malicious HTTP activities is challenging. We leverage an insight that cyber criminals are increasingly using dynamic malicious infrastructures with multiple servers to be efficient and anonymous in (i) malware distribution (using redirectors and exploit servers), (ii) control (using C&C servers) and (iii) monetization (using payment servers), and (iv) being robust against server takedowns (using multiple backups for each type of servers). Instead of focusing on detecting individual malicious domains, we propose a complementary approach to identify a group of closely related servers that are potentially involved in the same malware campaign, which we term as Associated Server Herd (ASH). Our solution, SMASH (Systematic Mining of Associated Server Herds), utilizes an unsupervised framework to infer malware ASHs by systematically mining the relations among all servers from multiple dimensions. We build a prototype system of SMASH and evaluate it with traces from a large ISP. The result shows that SMASH successfully infers a large number of previously undetected malicious servers and possible zero-day attacks, with low false positives. We believe the inferred ASHs provide a better global view of the attack campaign that may not be easily captured by detecting only individual servers.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Interference-Aware Component Scheduling for Reducing Tail Latency in Cloud Interactive Services 减少云交互服务中尾部延迟的干扰感知组件调度
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.88
Rui Han, Junwei Wang, Siguang Huang, Chenrong Shao, Shulin Zhan, Jianfeng Zhan, J. L. Vázquez-Poletti
Large-scale interactive services usually divide requests into multiple sub-requests and distribute them to a large number of server components for parallel execution. Hence the tail latency (i.e. The slowest component's latency) of these components determines the overall service latency. On a cloud platform, each component shares and competes node resources such as caches and I/O bandwidths with its co-located jobs, hence inevitably suffering from their performance interference. In this paper, we study the short-running jobs in a 12k-node Google cluster to illustrate the dynamic resource demands of these jobs, resulting in both individual components' latency variability over time and across different nodes and hence posing a major challenge to maintain low tail latency. Given this motivation, this paper introduces a dynamic and interference-aware scheduler for large-scale, parallel cloud services. At each scheduling interval, it collects workload and resource contention information of a running service, and predicts both the component latency on different nodes and the overall service performance. Based on the predicted performance, the scheduler identifies straggling components and conducts near-optimal component-node allocations to adapt to the changing workloads and performance interferences. We demonstrate that, using realistic workloads, the proposed approach achieves significant reductions in tail latency compared to the basic approach without scheduling.
大规模交互服务通常将请求划分为多个子请求,并将其分发给大量服务器组件并行执行。因此,这些组件的尾部延迟(即最慢组件的延迟)决定了整体服务延迟。在云平台上,每个组件与其位于同一位置的作业共享和竞争节点资源(如缓存和I/O带宽),因此不可避免地受到性能干扰。在本文中,我们研究了12k节点Google集群中的短期运行作业,以说明这些作业的动态资源需求,这导致单个组件的延迟随时间和不同节点的变化,因此对保持低尾部延迟提出了重大挑战。考虑到这一动机,本文介绍了一种用于大规模并行云服务的动态和干扰感知调度器。在每个调度间隔内,收集正在运行的服务的工作负载和资源争用信息,并预测组件在不同节点上的延迟和整体服务性能。根据预测的性能,调度器识别分散的组件,并进行近乎最优的组件节点分配,以适应不断变化的工作负载和性能干扰。我们证明,使用实际的工作负载,与没有调度的基本方法相比,所提出的方法显著减少了尾部延迟。
{"title":"Interference-Aware Component Scheduling for Reducing Tail Latency in Cloud Interactive Services","authors":"Rui Han, Junwei Wang, Siguang Huang, Chenrong Shao, Shulin Zhan, Jianfeng Zhan, J. L. Vázquez-Poletti","doi":"10.1109/ICDCS.2015.88","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.88","url":null,"abstract":"Large-scale interactive services usually divide requests into multiple sub-requests and distribute them to a large number of server components for parallel execution. Hence the tail latency (i.e. The slowest component's latency) of these components determines the overall service latency. On a cloud platform, each component shares and competes node resources such as caches and I/O bandwidths with its co-located jobs, hence inevitably suffering from their performance interference. In this paper, we study the short-running jobs in a 12k-node Google cluster to illustrate the dynamic resource demands of these jobs, resulting in both individual components' latency variability over time and across different nodes and hence posing a major challenge to maintain low tail latency. Given this motivation, this paper introduces a dynamic and interference-aware scheduler for large-scale, parallel cloud services. At each scheduling interval, it collects workload and resource contention information of a running service, and predicts both the component latency on different nodes and the overall service performance. Based on the predicted performance, the scheduler identifies straggling components and conducts near-optimal component-node allocations to adapt to the changing workloads and performance interferences. We demonstrate that, using realistic workloads, the proposed approach achieves significant reductions in tail latency compared to the basic approach without scheduling.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117304233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos 人群地图:从众包传感器视频中精确重建室内平面图
Pub Date : 2015-07-23 DOI: 10.1109/ICDCS.2015.9
Si Chen, M. Li, K. Ren, C. Qiao
Lack of an accurate and low-cost method to reconstruct indoor maps is the main reason behind the current sporadic availability of digital building floor plans. The conventional approach using professional equipment is very costly and only available in the most popular areas. In this paper, we propose and demonstrate CrowdMap, a crowd sourcing system utilizing sensor-rich video data from mobile users for indoor floor plan reconstruction with low-cost. The key idea of CrowdMap is to first jointly leverage crowd sourced sensory and video data to track user movements, then use the inferred user motion traces and context of the image to produce an accurate floor plan. In particular, we exploit the sequential relationship between each consecutive frame abstracted from the video to improve system performance. Our experiments in three college buildings show that CrowdMap achieves a precision of hallway shape around 88%, a recall around 93% and a F-measure around 90%. In addition, we achieve on average 9.8% room area error and on average 6.5% room aspect ratio error. The evaluation result demonstrates a significant improvement of accuracy compared with other crowd sourcing floor plan reconstruction systems.
缺乏一种精确和低成本的方法来重建室内地图是目前数字建筑平面图零星可用的主要原因。使用专业设备的传统方法非常昂贵,而且只能在最受欢迎的地区使用。在本文中,我们提出并演示了CrowdMap,这是一个利用来自移动用户的丰富传感器视频数据进行低成本室内平面图重建的众包系统。CrowdMap的关键思想是首先联合利用众包的感官和视频数据来跟踪用户的运动,然后使用推断的用户运动轨迹和图像的背景来生成准确的平面图。特别是,我们利用从视频中提取的每个连续帧之间的顺序关系来提高系统性能。我们在三座大学建筑中进行的实验表明,CrowdMap在走廊形状上的准确率约为88%,召回率约为93%,F-measure约为90%。此外,我们实现了平均9.8%的房间面积误差和平均6.5%的房间宽高比误差。评价结果表明,与其他众包平面图重建系统相比,准确率有了显著提高。
{"title":"Crowd Map: Accurate Reconstruction of Indoor Floor Plans from Crowdsourced Sensor-Rich Videos","authors":"Si Chen, M. Li, K. Ren, C. Qiao","doi":"10.1109/ICDCS.2015.9","DOIUrl":"https://doi.org/10.1109/ICDCS.2015.9","url":null,"abstract":"Lack of an accurate and low-cost method to reconstruct indoor maps is the main reason behind the current sporadic availability of digital building floor plans. The conventional approach using professional equipment is very costly and only available in the most popular areas. In this paper, we propose and demonstrate CrowdMap, a crowd sourcing system utilizing sensor-rich video data from mobile users for indoor floor plan reconstruction with low-cost. The key idea of CrowdMap is to first jointly leverage crowd sourced sensory and video data to track user movements, then use the inferred user motion traces and context of the image to produce an accurate floor plan. In particular, we exploit the sequential relationship between each consecutive frame abstracted from the video to improve system performance. Our experiments in three college buildings show that CrowdMap achieves a precision of hallway shape around 88%, a recall around 93% and a F-measure around 90%. In addition, we achieve on average 9.8% room area error and on average 6.5% room aspect ratio error. The evaluation result demonstrates a significant improvement of accuracy compared with other crowd sourcing floor plan reconstruction systems.","PeriodicalId":129182,"journal":{"name":"2015 IEEE 35th International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129962114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 82
期刊
2015 IEEE 35th International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1