首页 > 最新文献

2016 IEEE International Conference on Communications (ICC)最新文献

英文 中文
SAMER+: Balancing short term throughput and long term stability in cognitive radio mesh networks SAMER+:在认知无线电网状网络中平衡短期吞吐量和长期稳定性
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7510897
Li Sun, Selvaganesh Dharmeswaran, Aswin Gokulachandran, Ashish Kumar, Dimitrios Koutsonikolas
A large number of routing protocols for Cognitive radio networks (CRNs) have been proposed recently, each based on different design goals, and evaluated in different scenarios, under different assumptions. In our previous work, we conducted the first extensive empirical performance study of routing protocols for CRNs-Coolest Path, SAMER, and CRP - under the same realistic set of assumptions. Our study revealed that SAMER significantly outperforms the other protocols under low primary user activity but its performance degrades under high PU activity. In this work, we introduce an enhanced version of SAMER (SAMER+) that performs consistently well in both low and high PU activity scenarios. The core of SAMER+ is a new path metric that balances short term throughput and long term path stability. We evaluate SAMER+ using extensive simulations and compare it against SAMER and Coolest Path. Our results show that SAMER+ significantly outperforms both protocols in a variety of scenarios.
最近,针对认知无线网络(crn)提出了大量的路由协议,每个协议都基于不同的设计目标,并在不同的场景和假设下进行了评估。在我们之前的工作中,我们在相同的现实假设下对crn的路由协议-最酷路径,SAMER和CRP进行了第一次广泛的实证性能研究。我们的研究表明,SAMER在低主用户活动下显著优于其他协议,但在高PU活动下其性能下降。在这项工作中,我们介绍了SAMER的增强版本(SAMER+),它在低和高PU活性情况下都表现良好。SAMER+的核心是平衡短期吞吐量和长期路径稳定性的新路径度量。我们使用广泛的模拟来评估SAMER+,并将其与SAMER和Coolest Path进行比较。我们的结果表明,SAMER+在各种情况下明显优于这两种协议。
{"title":"SAMER+: Balancing short term throughput and long term stability in cognitive radio mesh networks","authors":"Li Sun, Selvaganesh Dharmeswaran, Aswin Gokulachandran, Ashish Kumar, Dimitrios Koutsonikolas","doi":"10.1109/ICC.2016.7510897","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510897","url":null,"abstract":"A large number of routing protocols for Cognitive radio networks (CRNs) have been proposed recently, each based on different design goals, and evaluated in different scenarios, under different assumptions. In our previous work, we conducted the first extensive empirical performance study of routing protocols for CRNs-Coolest Path, SAMER, and CRP - under the same realistic set of assumptions. Our study revealed that SAMER significantly outperforms the other protocols under low primary user activity but its performance degrades under high PU activity. In this work, we introduce an enhanced version of SAMER (SAMER+) that performs consistently well in both low and high PU activity scenarios. The core of SAMER+ is a new path metric that balances short term throughput and long term path stability. We evaluate SAMER+ using extensive simulations and compare it against SAMER and Coolest Path. Our results show that SAMER+ significantly outperforms both protocols in a variety of scenarios.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127290621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beyond fixed neighborhood search in the likelihood ascent algorithm for MIMO systems MIMO系统似然上升算法中的超定邻域搜索
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511055
A. Sah, A. Chaturvedi
Neighborhood search algorithms have been proposed for detection in large/massive multiple-input multiple-output (MIMO) systems. They iteratively search for the best vector in a fixed neighborhood. However, the ML solution may not lie in the searched space or the search may take a large number of intermediate vectors to converge. Instead of searching in a fixed neighborhood, a better way will be to look for an update which is not restricted to be in a fixed neighborhood. Motivated by this, we formulate an optimization problem to maximize the reduction in ML cost and use it to derive an expression for updating the solution. We use a metric based on the channel matrix and the error vector to determine the likelihood of a symbol being in error. Using this likelihood and the update, we propose a likelihood ascent search (LAS) algorithm to find an update which is not restricted to be in a fixed neighborhood and seeks to provide maximum reduction in ML cost. This process continues till there is a reduction in the ML cost. Compared to existing LAS based algorithms, it is found to provide better error performance, that too at a lower complexity.
邻域搜索算法已被提出用于大型/大规模多输入多输出(MIMO)系统的检测。它们在一个固定的邻域内迭代地搜索最佳向量。然而,机器学习解决方案可能不在搜索空间中,或者搜索可能需要大量的中间向量来收敛。而不是在一个固定的邻域中搜索,一个更好的方法是寻找一个不局限于固定邻域的更新。基于此,我们提出了一个优化问题,以最大限度地降低机器学习成本,并利用它推导出更新解的表达式。我们使用基于信道矩阵和误差向量的度量来确定符号出错的可能性。利用这种可能性和更新,我们提出了一种可能性上升搜索(LAS)算法来寻找不局限于固定邻域的更新,并寻求最大限度地降低机器学习成本。这个过程一直持续到机器学习成本降低为止。与现有的基于LAS的算法相比,在较低的复杂度下提供了更好的误差性能。
{"title":"Beyond fixed neighborhood search in the likelihood ascent algorithm for MIMO systems","authors":"A. Sah, A. Chaturvedi","doi":"10.1109/ICC.2016.7511055","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511055","url":null,"abstract":"Neighborhood search algorithms have been proposed for detection in large/massive multiple-input multiple-output (MIMO) systems. They iteratively search for the best vector in a fixed neighborhood. However, the ML solution may not lie in the searched space or the search may take a large number of intermediate vectors to converge. Instead of searching in a fixed neighborhood, a better way will be to look for an update which is not restricted to be in a fixed neighborhood. Motivated by this, we formulate an optimization problem to maximize the reduction in ML cost and use it to derive an expression for updating the solution. We use a metric based on the channel matrix and the error vector to determine the likelihood of a symbol being in error. Using this likelihood and the update, we propose a likelihood ascent search (LAS) algorithm to find an update which is not restricted to be in a fixed neighborhood and seeks to provide maximum reduction in ML cost. This process continues till there is a reduction in the ML cost. Compared to existing LAS based algorithms, it is found to provide better error performance, that too at a lower complexity.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127496687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EQ-AODV: Energy and QoS supported AODV for better performance in WMSNs EQ-AODV:能量和QoS支持AODV,在wmsn中获得更好的性能
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7510730
Sofiane Hamrioui, P. Lorenz
Our contribution in this paper is to propose a new solution called EQ-AODV (Energy and QoS supported AODV) for better performance in WMSNs (Wireless Multimedia Sensor Networks). EQ-AODV aims to improve AODV protocol and make it effective for multimedia data in WMSNs. This improvement is based on the adaptation of the routing process of AODV according to two parameters. The first one is the energy of sensors belonging to the routing roads and the second parameter is the nature of the packets received by these sensors. The considered data are text data, audio and video streaming data. After the evaluation of the performance and based on the obtained results, EQ-AODV showed a better performance compared to AODV. EQ-AODV improves important QoS parameters namely the network load and the end to end delay. Important improvement in terms of the life time of sensors and the consumed energy is recorded too.
我们在本文中的贡献是提出了一种新的解决方案,称为EQ-AODV(能量和QoS支持的AODV),以提高wmsn(无线多媒体传感器网络)的性能。EQ-AODV旨在改进AODV协议,使其对wmsn中的多媒体数据更加有效。这种改进是基于AODV路由过程根据两个参数进行自适应。第一个参数是属于路由道路的传感器的能量,第二个参数是这些传感器接收到的数据包的性质。考虑的数据包括文本数据、音频和视频流数据。经过性能评价,根据所得结果,EQ-AODV表现出比AODV更好的性能。EQ-AODV改进了重要的QoS参数,即网络负载和端到端延迟。在传感器寿命和消耗能量方面的重要改进也被记录下来。
{"title":"EQ-AODV: Energy and QoS supported AODV for better performance in WMSNs","authors":"Sofiane Hamrioui, P. Lorenz","doi":"10.1109/ICC.2016.7510730","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510730","url":null,"abstract":"Our contribution in this paper is to propose a new solution called EQ-AODV (Energy and QoS supported AODV) for better performance in WMSNs (Wireless Multimedia Sensor Networks). EQ-AODV aims to improve AODV protocol and make it effective for multimedia data in WMSNs. This improvement is based on the adaptation of the routing process of AODV according to two parameters. The first one is the energy of sensors belonging to the routing roads and the second parameter is the nature of the packets received by these sensors. The considered data are text data, audio and video streaming data. After the evaluation of the performance and based on the obtained results, EQ-AODV showed a better performance compared to AODV. EQ-AODV improves important QoS parameters namely the network load and the end to end delay. Important improvement in terms of the life time of sensors and the consumed energy is recorded too.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125190143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Energy-transferring approach to power allocation with energy harvesting constraints 能量收集约束下的能量分配方法
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511173
Fan Wu, S. Leng, Xiaoyan Huang, Qin Yu, Kun Yang
This paper studies the problem of optimal power allocation towards maximizing the throughput of point-to-point wireless communication systems with energy harvesting. A novel energy-transferring approach is proposed to analyze the throughput maximization problem with causality constraints, in which we study the transfer energy rather than the water level widely used in the existing literature. The proposed approach simplifies the power allocation as a linear function with respect to only two transfer energy variables, i.e., the energy transferred from the previous epoch and the energy transferred to the next epoch. Moreover, we prove that all the positive transfer energy variables can be determined by solving a set of linear equations with a special coefficient matrix derived from the KKT conditions for the dual problem. Based on the energy-transferring approach, we propose an iterative algorithm to obtain the optimal solution with a much lower complexity compared to those existing algorithms based on the directional water-filling structure results. Numerical studies verify the analytical results as well as the effectiveness of the proposed algorithm.
研究了带能量收集的点对点无线通信系统的最优功率分配问题。提出了一种新的能量传递方法来分析具有因果约束的吞吐量最大化问题,该方法研究了传递能量而不是现有文献中广泛使用的水位。该方法将功率分配简化为仅涉及两个传递能量变量的线性函数,即从前一个历元传递的能量和传递到下一个历元的能量。此外,我们还证明了所有正的传递能量变量都可以通过求解一组线性方程来确定,这些方程具有由对偶问题的KKT条件导出的特殊系数矩阵。本文提出了一种基于能量传递方法的迭代算法,与现有的基于定向充水结构结果的算法相比,该算法具有较低的复杂度。数值研究验证了分析结果和算法的有效性。
{"title":"Energy-transferring approach to power allocation with energy harvesting constraints","authors":"Fan Wu, S. Leng, Xiaoyan Huang, Qin Yu, Kun Yang","doi":"10.1109/ICC.2016.7511173","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511173","url":null,"abstract":"This paper studies the problem of optimal power allocation towards maximizing the throughput of point-to-point wireless communication systems with energy harvesting. A novel energy-transferring approach is proposed to analyze the throughput maximization problem with causality constraints, in which we study the transfer energy rather than the water level widely used in the existing literature. The proposed approach simplifies the power allocation as a linear function with respect to only two transfer energy variables, i.e., the energy transferred from the previous epoch and the energy transferred to the next epoch. Moreover, we prove that all the positive transfer energy variables can be determined by solving a set of linear equations with a special coefficient matrix derived from the KKT conditions for the dual problem. Based on the energy-transferring approach, we propose an iterative algorithm to obtain the optimal solution with a much lower complexity compared to those existing algorithms based on the directional water-filling structure results. Numerical studies verify the analytical results as well as the effectiveness of the proposed algorithm.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123463727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coded slotted ALOHA schemes for erasure channels 用于擦除信道的编码开槽ALOHA方案
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7510794
Zhuo Sun, Yixuan Xie, Jinhong Yuan, Tao Yang
In this paper we investigate the coded slotted ALOHA (CSA) schemes with repetition codes and maximum distance separable (MDS) codes over erasure channels. We derive the extrinsic information transfer (EXIT) functions of the CSA schemes over erasure channels, which allow an asymptotic analysis of the packet recovering process. Moreover, we define a traffic load threshold provided that the recovered probability is more than a given recovery ratio. The optimal distribution of the codes chosen by users in the CSA schemes is then designed to maximize the peak throughput and traffic load threshold. By performing the asymptotic analysis, we show that our optimal distributions improve the traffic load threshold by 60% for ε = 0.1 and 86% for ε = 0.135 compared to the optimal distribution for collision channels. Using repetition codes as an example, simulation results show that the obtained distributions enhance the peak throughput for erasure channels when both packet erasure channels and slot erasure channels are considered.
本文研究了在擦除信道上具有重复码和最大距离可分离码的编码开槽ALOHA (CSA)方案。我们导出了CSA方案在擦除信道上的外部信息传输(EXIT)函数,它允许对包恢复过程进行渐近分析。此外,我们定义了一个流量负载阈值,假设恢复概率大于给定的恢复比率。然后设计用户在CSA方案中选择的代码的最优分配,以最大限度地提高峰值吞吐量和流量负载阈值。通过执行渐近分析,我们表明,与碰撞通道的最优分布相比,当ε = 0.1时,我们的最优分布提高了60%的流量负载阈值,当ε = 0.135时,我们的最优分布提高了86%。以重复码为例,仿真结果表明,当同时考虑包擦除信道和槽擦除信道时,所得到的分布提高了擦除信道的峰值吞吐量。
{"title":"Coded slotted ALOHA schemes for erasure channels","authors":"Zhuo Sun, Yixuan Xie, Jinhong Yuan, Tao Yang","doi":"10.1109/ICC.2016.7510794","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510794","url":null,"abstract":"In this paper we investigate the coded slotted ALOHA (CSA) schemes with repetition codes and maximum distance separable (MDS) codes over erasure channels. We derive the extrinsic information transfer (EXIT) functions of the CSA schemes over erasure channels, which allow an asymptotic analysis of the packet recovering process. Moreover, we define a traffic load threshold provided that the recovered probability is more than a given recovery ratio. The optimal distribution of the codes chosen by users in the CSA schemes is then designed to maximize the peak throughput and traffic load threshold. By performing the asymptotic analysis, we show that our optimal distributions improve the traffic load threshold by 60% for ε = 0.1 and 86% for ε = 0.135 compared to the optimal distribution for collision channels. Using repetition codes as an example, simulation results show that the obtained distributions enhance the peak throughput for erasure channels when both packet erasure channels and slot erasure channels are considered.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123545207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Quantifying and evaluating the technical debt on mobile cloud-based service level 对移动云服务水平的技术债务进行量化评估
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7510995
Georgios Skourletopoulos, C. Mavromoustakis, J. M. Batalla, G. Mastorakis, E. Pallis, G. Kormentzas
As network bandwidth and coverage continue to increase, the adoption rates of mobile devices are growing over time and the mobile technology is becoming increasingly industrialized. In mobile cloud marketplaces, the cloud-supported mobile services can be leased off. However, the mobile service selection may introduce technical debt (TD), which is essential to be predicted and quantified. In this context, this paper examines the incurrence of technical debt in the future when leasing cloud-based mobile services by proposing a novel quantitative model, which adopts a linear and symmetric approach as a linear growth in the number of users is predicted. The formulation of the problem is based on a cost-benefit analysis, elaborating on the potential profit that could be obtained if the number of users would be equal to the maximum value. The probability of overutilization of the selected service in the long run is also researched. Finally, a quantification tool has been developed as a proof of concept (PoC), which initiates the technical debt analysis and optimization on mobile cloud-based service level and aims to provide insights into the overutilization or underutilization of a web service when a linear increase in the number of users occurs.
随着网络带宽和覆盖范围的不断增加,移动设备的采用率随着时间的推移而增长,移动技术也越来越工业化。在移动云市场中,云支持的移动服务可以出租。然而,移动服务选择可能会引入技术债务(TD),这是至关重要的预测和量化。在此背景下,本文通过提出一种新颖的定量模型来研究未来租赁基于云的移动服务时技术债务的发生,该模型采用线性和对称的方法,因为预测了用户数量的线性增长。这个问题的提法是基于成本效益分析,详细说明如果用户数量等于最大价值,可以获得的潜在利润。研究了所选服务在长期运行中被过度使用的概率。最后,开发了一个量化工具作为概念验证(PoC),它启动了基于移动云的服务水平的技术债务分析和优化,旨在提供对用户数量线性增长时web服务过度使用或未充分利用的见解。
{"title":"Quantifying and evaluating the technical debt on mobile cloud-based service level","authors":"Georgios Skourletopoulos, C. Mavromoustakis, J. M. Batalla, G. Mastorakis, E. Pallis, G. Kormentzas","doi":"10.1109/ICC.2016.7510995","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510995","url":null,"abstract":"As network bandwidth and coverage continue to increase, the adoption rates of mobile devices are growing over time and the mobile technology is becoming increasingly industrialized. In mobile cloud marketplaces, the cloud-supported mobile services can be leased off. However, the mobile service selection may introduce technical debt (TD), which is essential to be predicted and quantified. In this context, this paper examines the incurrence of technical debt in the future when leasing cloud-based mobile services by proposing a novel quantitative model, which adopts a linear and symmetric approach as a linear growth in the number of users is predicted. The formulation of the problem is based on a cost-benefit analysis, elaborating on the potential profit that could be obtained if the number of users would be equal to the maximum value. The probability of overutilization of the selected service in the long run is also researched. Finally, a quantification tool has been developed as a proof of concept (PoC), which initiates the technical debt analysis and optimization on mobile cloud-based service level and aims to provide insights into the overutilization or underutilization of a web service when a linear increase in the number of users occurs.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123744715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets 诡雷:P2P僵尸网络中爬虫的自主检测与表征
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7510885
Shankar Karuppayah, Emmanouil Vasilomanolakis, Steffen Haas, M. Mühlhäuser, Mathias Fischer
The ever-growing number of cyber attacks from botnets has made them one of the biggest threats on the Internet. Thus, it is crucial to study and analyze botnets, to take them down. For this, an extensive monitoring is a pre-requisite for preparing a botnet takedown, e.g., via a sinkholing attack. However, every new monitoring mechanism developed for botnets is usually tackled by the botmasters by introducing novel antimonitoring countermeasures. In this paper, we anticipate these countermeasures by proposing a set of lightweight techniques for detecting the presence of crawlers in P2P botnets, called BoobyTrap. For that, we exploit botnet-specific protocol and design constraints. We evaluate the performance of our BoobyTrap mechanism on two real-world botnets: Sality and ZeroAccess. Our results indicate that we can distinguish many crawlers from benign bots. In fact, we discovered close to 10 crawler nodes within our observation period in the Sality botnet and around 120 in the ZeroAccess botnet. In addition, we also describe the observable characteristics of the detected crawlers and suggest crawler improvements for enabling monitoring in the presence of the BoobyTrap mechanism.
僵尸网络不断增加的网络攻击使其成为互联网上最大的威胁之一。因此,研究和分析僵尸网络并将其消灭是至关重要的。为此,广泛的监控是准备僵尸网络拆除的先决条件,例如,通过下沉攻击。然而,针对僵尸网络开发的每一种新的监控机制通常都会被僵尸管理员引入新的反监控对策来解决。在本文中,我们通过提出一套用于检测P2P僵尸网络中爬虫存在的轻量级技术(称为BoobyTrap)来预测这些对策。为此,我们利用了僵尸网络特定的协议和设计约束。我们在两个真实世界的僵尸网络:salality和ZeroAccess上评估了我们的诡雷机制的性能。我们的结果表明,我们可以区分许多爬虫和良性机器人。事实上,在我们的观察期内,我们在Sality僵尸网络中发现了近10个爬虫节点,在ZeroAccess僵尸网络中发现了大约120个。此外,我们还描述了检测到的爬虫的可观察特征,并建议对爬虫进行改进,以便在存在BoobyTrap机制的情况下进行监控。
{"title":"BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets","authors":"Shankar Karuppayah, Emmanouil Vasilomanolakis, Steffen Haas, M. Mühlhäuser, Mathias Fischer","doi":"10.1109/ICC.2016.7510885","DOIUrl":"https://doi.org/10.1109/ICC.2016.7510885","url":null,"abstract":"The ever-growing number of cyber attacks from botnets has made them one of the biggest threats on the Internet. Thus, it is crucial to study and analyze botnets, to take them down. For this, an extensive monitoring is a pre-requisite for preparing a botnet takedown, e.g., via a sinkholing attack. However, every new monitoring mechanism developed for botnets is usually tackled by the botmasters by introducing novel antimonitoring countermeasures. In this paper, we anticipate these countermeasures by proposing a set of lightweight techniques for detecting the presence of crawlers in P2P botnets, called BoobyTrap. For that, we exploit botnet-specific protocol and design constraints. We evaluate the performance of our BoobyTrap mechanism on two real-world botnets: Sality and ZeroAccess. Our results indicate that we can distinguish many crawlers from benign bots. In fact, we discovered close to 10 crawler nodes within our observation period in the Sality botnet and around 120 in the ZeroAccess botnet. In addition, we also describe the observable characteristics of the detected crawlers and suggest crawler improvements for enabling monitoring in the presence of the BoobyTrap mechanism.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123791688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Behavioral malware detection approaches for Android Android的行为恶意软件检测方法
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511573
M. R. Amin, Mehedee Zaman, Md. Shohrab Hossain, Mohammed Atiquzzaman
Android, the fastest growing mobile operating system released in November 2007, boasts of a staggering 1.4 billion active users. Android users are susceptible to malicious applications that can hack into their personal data due to the lack of careful monitoring of their in-device security. There have been numerous works on devising malware detection methods. However, none of earlier works are conclusive enough for direct application and lack experimental validation. In this paper, we have investigated the natures and identities of malicious applications and devised two novel detection approaches for detection: network-based detection and system call based detection approaches. To evaluate our proposed approaches, we performed experiments on a subset of 1260 malwares, acquired from Android Malware Genome Project, a malware database created by Y. Zhou et al. [1] and 227 non-malware (benign) applications. Results show that our system call based approach is able to detect malwares with an accuracy of 87% which is quite significant in general malware detection context. Our proposed detection approaches along with the experimental results will provide security professionals with more precise and quantitative approaches in their investigations of mobile malwares on Android systems.
2007年11月发布的Android是增长最快的移动操作系统,拥有14亿活跃用户。Android用户很容易受到恶意应用程序的影响,这些恶意应用程序可以入侵他们的个人数据,因为他们缺乏对设备内部安全的仔细监控。在设计恶意软件检测方法方面已经有很多工作。然而,早期的研究都没有足够的结论可以直接应用,也缺乏实验验证。在本文中,我们研究了恶意应用程序的性质和身份,并设计了两种新的检测方法:基于网络的检测和基于系统调用的检测方法。为了评估我们提出的方法,我们对1260个恶意软件的子集进行了实验,这些恶意软件是从Android恶意软件基因组计划(由Y. Zhou等人[1]创建的恶意软件数据库)和227个非恶意软件(良性)应用程序中获得的。结果表明,我们基于系统调用的方法能够以87%的准确率检测恶意软件,这在一般的恶意软件检测环境中是相当重要的。我们提出的检测方法以及实验结果将为安全专业人员提供更精确和定量的方法来调查Android系统上的移动恶意软件。
{"title":"Behavioral malware detection approaches for Android","authors":"M. R. Amin, Mehedee Zaman, Md. Shohrab Hossain, Mohammed Atiquzzaman","doi":"10.1109/ICC.2016.7511573","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511573","url":null,"abstract":"Android, the fastest growing mobile operating system released in November 2007, boasts of a staggering 1.4 billion active users. Android users are susceptible to malicious applications that can hack into their personal data due to the lack of careful monitoring of their in-device security. There have been numerous works on devising malware detection methods. However, none of earlier works are conclusive enough for direct application and lack experimental validation. In this paper, we have investigated the natures and identities of malicious applications and devised two novel detection approaches for detection: network-based detection and system call based detection approaches. To evaluate our proposed approaches, we performed experiments on a subset of 1260 malwares, acquired from Android Malware Genome Project, a malware database created by Y. Zhou et al. [1] and 227 non-malware (benign) applications. Results show that our system call based approach is able to detect malwares with an accuracy of 87% which is quite significant in general malware detection context. Our proposed detection approaches along with the experimental results will provide security professionals with more precise and quantitative approaches in their investigations of mobile malwares on Android systems.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125324091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Downlink multiuser massive MIMO in Rician channels under pilot contamination 导频污染下的下行多用户大规模MIMO
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511515
Lou Zhao, Tao Yang, Giovanni Geraci, Jinhong Yuan
In this paper, we investigate uplink channel estimation and multiuser downlink transmission of a massive MIMO time-division duplex system in the presence of pilot contamination, where the base station (BS) with M antennas communicates with N single-antenna users in a cell. We assume that all channels are affected by Rician fading. We also assume that angles of arrival from users to the BS are different. We first analyze the impact of pilot contamination on the channel estimation, based on which we derive a tight sum-rate approximation. We also obtain the asymptotic sum-rate for large Rician K-factor in the large signal to noise ratio regime. Furthermore, we examine the impact of the Rician K-factor on the sum-rate of the system, showing that the sum-rate increases as K-factor increases.
在本文中,我们研究了存在导频污染的大规模MIMO时分双工系统的上行信道估计和多用户下行传输,其中具有M个天线的基站(BS)与小区内的N个单天线用户通信。我们假设所有的信道都受到时域衰落的影响。我们还假设用户到达BS的角度是不同的。我们首先分析导频污染对信道估计的影响,并在此基础上推导出严密的和速率近似。我们还得到了在大信噪比条件下,大r k因子的渐近和率。此外,我们还研究了k因子对系统和速率的影响,表明和速率随着k因子的增加而增加。
{"title":"Downlink multiuser massive MIMO in Rician channels under pilot contamination","authors":"Lou Zhao, Tao Yang, Giovanni Geraci, Jinhong Yuan","doi":"10.1109/ICC.2016.7511515","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511515","url":null,"abstract":"In this paper, we investigate uplink channel estimation and multiuser downlink transmission of a massive MIMO time-division duplex system in the presence of pilot contamination, where the base station (BS) with M antennas communicates with N single-antenna users in a cell. We assume that all channels are affected by Rician fading. We also assume that angles of arrival from users to the BS are different. We first analyze the impact of pilot contamination on the channel estimation, based on which we derive a tight sum-rate approximation. We also obtain the asymptotic sum-rate for large Rician K-factor in the large signal to noise ratio regime. Furthermore, we examine the impact of the Rician K-factor on the sum-rate of the system, showing that the sum-rate increases as K-factor increases.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115088083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
QoS-aware and energy-aware adaptive power allocations for coherent optical wireless communications 相干光无线通信的qos感知和能量感知自适应功率分配
Pub Date : 2016-05-22 DOI: 10.1109/ICC.2016.7511142
Md. Zoheb Hassan, Victor C. M. Leung, Md. Jahangir Hossain, Julian Cheng
We investigate a quality-of-service-aware and energy-aware adaptive power allocation scheme for a point-to-point and line-of-sight optical wireless communication system employing the coherent detection and polarization multiplexing. The proposed power allocation scheme minimizes the average transmit power and provides the delay aware quality-of-service guarantee through maintaining a required effective capacity over the fading channels. The power allocation scheme is formulated as a convex optimization problem, and using the sub-gradient method, a fast convergent algorithm for the optimal power allocation is proposed. Numerical results demonstrate the advantages of the proposed power allocation algorithm in terms of the energy saving for the case of having strict statistical delay constraints.
本文研究了一种基于相干检测和极化复用的点对点和视距光通信系统的服务质量感知和能量感知自适应功率分配方案。所提出的功率分配方案使平均发射功率最小化,并通过在衰落信道上保持所需的有效容量来提供延迟感知的服务质量保证。将电力分配方案表述为一个凸优化问题,利用次梯度法,提出了一种快速收敛的电力最优分配算法。数值结果表明,在具有严格统计延迟约束的情况下,所提出的功率分配算法在节能方面具有优势。
{"title":"QoS-aware and energy-aware adaptive power allocations for coherent optical wireless communications","authors":"Md. Zoheb Hassan, Victor C. M. Leung, Md. Jahangir Hossain, Julian Cheng","doi":"10.1109/ICC.2016.7511142","DOIUrl":"https://doi.org/10.1109/ICC.2016.7511142","url":null,"abstract":"We investigate a quality-of-service-aware and energy-aware adaptive power allocation scheme for a point-to-point and line-of-sight optical wireless communication system employing the coherent detection and polarization multiplexing. The proposed power allocation scheme minimizes the average transmit power and provides the delay aware quality-of-service guarantee through maintaining a required effective capacity over the fading channels. The power allocation scheme is formulated as a convex optimization problem, and using the sub-gradient method, a fast convergent algorithm for the optimal power allocation is proposed. Numerical results demonstrate the advantages of the proposed power allocation algorithm in terms of the energy saving for the case of having strict statistical delay constraints.","PeriodicalId":168709,"journal":{"name":"2016 IEEE International Conference on Communications (ICC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115098924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2016 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1