首页 > 最新文献

2015 International Conference on Emerging Information Technology and Engineering Solutions最新文献

英文 中文
Scalable Honeypot Architecture for Identifying Malicious Network Activities 用于识别恶意网络活动的可扩展蜜罐体系结构
Gokul Kannan Sadasivam, C. Hota
Server honey pots are computer systems that hide in a network capturing attack packets. As the name goes, server honey pots are installed in server machines running a set of services. Enterprises and government organisations deploy these honey pots to know the extent of attacks on their network. Since, most of the recent attacks are advanced persistent attacks there is much research work going on in building better peripheral security measures. In this paper, the authors have deployed several honey pots in a virtualized environment to gather traces of malicious activities. The network infrastructure is resilient and provides much information about hacker's activities. It is cost-effective and can be easily deployed in any organisation without specialized hardware.
服务器蜜罐是隐藏在网络中捕获攻击数据包的计算机系统。顾名思义,服务器蜜罐安装在运行一组服务的服务器机器上。企业和政府机构部署这些蜜罐,以了解其网络受到攻击的程度。由于最近的攻击大多是高级持续性攻击,因此在构建更好的外围安全措施方面进行了大量的研究工作。在本文中,作者在虚拟化环境中部署了几个蜜罐来收集恶意活动的痕迹。网络基础设施具有弹性,并提供了有关黑客活动的大量信息。它具有成本效益,可以在任何组织中轻松部署,而无需专门的硬件。
{"title":"Scalable Honeypot Architecture for Identifying Malicious Network Activities","authors":"Gokul Kannan Sadasivam, C. Hota","doi":"10.1109/EITES.2015.15","DOIUrl":"https://doi.org/10.1109/EITES.2015.15","url":null,"abstract":"Server honey pots are computer systems that hide in a network capturing attack packets. As the name goes, server honey pots are installed in server machines running a set of services. Enterprises and government organisations deploy these honey pots to know the extent of attacks on their network. Since, most of the recent attacks are advanced persistent attacks there is much research work going on in building better peripheral security measures. In this paper, the authors have deployed several honey pots in a virtualized environment to gather traces of malicious activities. The network infrastructure is resilient and provides much information about hacker's activities. It is cost-effective and can be easily deployed in any organisation without specialized hardware.","PeriodicalId":170773,"journal":{"name":"2015 International Conference on Emerging Information Technology and Engineering Solutions","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Bounded-SVD: A Matrix Factorization Method with Bound Constraints for Recommender Systems 有界svd:推荐系统的有界约束矩阵分解方法
B. Le, Kazuki Mori, R. Thawonmas
In this paper, we present a new matrix factorization method for recommender system problems, named bounded-SVD, which utilizes the constraint that all the ratings in the rating matrix are bounded within a pre-determined range. In our proposed method, the bound constraints are included in the objective function so that both the task of minimizing errors and the constraints are taken into account during the optimization process. For evaluation, we compare the performance of bounded-SVD with an existing method, called Bounded Matrix Factorization (BMF), which also uses the bound constraints on the ratings. The results on major real-world recommender system datasets show that our method outperforms BMF in almost cases and it is also faster and more simple to implement than BMF. Moreover, the way the bound constraints are integrated in bounded-SVD can also be applied to other optimization problems with bound constraints as well.
本文提出了一种新的推荐系统问题的矩阵分解方法,称为有界svd,该方法利用了评级矩阵中所有评级在预定范围内有界的约束。该方法在目标函数中加入了约束约束,从而在优化过程中兼顾了约束约束和误差最小化的任务。为了评估,我们将有界奇异值分解的性能与现有的一种称为有界矩阵分解(BMF)的方法进行了比较,BMF也对评级使用了有界约束。在主要的现实世界推荐系统数据集上的结果表明,我们的方法在大多数情况下都优于BMF,并且比BMF更快,更容易实现。此外,将有界约束集成到有界奇异值分解中的方法也可以应用于其他有界约束的优化问题。
{"title":"Bounded-SVD: A Matrix Factorization Method with Bound Constraints for Recommender Systems","authors":"B. Le, Kazuki Mori, R. Thawonmas","doi":"10.2197/ipsjjip.24.314","DOIUrl":"https://doi.org/10.2197/ipsjjip.24.314","url":null,"abstract":"In this paper, we present a new matrix factorization method for recommender system problems, named bounded-SVD, which utilizes the constraint that all the ratings in the rating matrix are bounded within a pre-determined range. In our proposed method, the bound constraints are included in the objective function so that both the task of minimizing errors and the constraints are taken into account during the optimization process. For evaluation, we compare the performance of bounded-SVD with an existing method, called Bounded Matrix Factorization (BMF), which also uses the bound constraints on the ratings. The results on major real-world recommender system datasets show that our method outperforms BMF in almost cases and it is also faster and more simple to implement than BMF. Moreover, the way the bound constraints are integrated in bounded-SVD can also be applied to other optimization problems with bound constraints as well.","PeriodicalId":170773,"journal":{"name":"2015 International Conference on Emerging Information Technology and Engineering Solutions","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114612158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Efficient LALRED for Congestion Avoidance Using Automata-Like Solution 利用类自动机解决方案的高效LALRED避免拥塞
S. Mahajan
For ELALRED algorithm the concept of a Learning Automata-Like (LAL) mechanism devised for congestion avoidance in wired networks. The algorithm, named as Efficient LAL Random Early Detection (ELALRED), is founded on the principles of the operations of existing RED congestion-avoidance mechanisms, augmented with an LAL philosophy. The primary objective of ELALRED is to optimize the value of the average size of the queue used for congestion avoidance and to consequently reduce the total loss of packets at the queue. We attempt to achieve this by stationing a LAL algorithm at the gateways and by discretizing the probabilities of the corresponding actions of the congestion-avoidance algorithm. At every time instant, the LAL scheme, in turn, chooses the action that possesses the maximal ratio between the number of times the chosen action is rewarded and the number of times that it has been chosen. In ELALRED, we simultaneously increase the likelihood of the scheme converging to the action, which minimizes the number of packet drops at the gateway. ELALRED approach helps to improve the performance of congestion avoidance by adaptively minimizing the queue-loss rate and the average queue size. Simulation results obtained using NS2 establish the improved performance of ELALRED over the LALRED and traditional RED methods which were chosen as the benchmarks for performance comparison purposes.
对于ELALRED算法,设计了一种类似学习自动机(LAL)机制的概念,以避免有线网络中的拥塞。该算法被命名为高效LAL随机早期检测(ELALRED),它建立在现有RED拥堵避免机制的操作原理基础上,并辅以LAL哲学。ELALRED的主要目标是优化用于避免拥塞的队列的平均大小的值,从而减少队列中数据包的总损失。我们试图通过在网关部署LAL算法和离散拥塞避免算法的相应动作的概率来实现这一点。在每个时间瞬间,LAL方案依次选择所选行动获得奖励的次数与所选行动被选择的次数之比最大的行动。在ELALRED中,我们同时增加了方案收敛到动作的可能性,从而最大限度地减少了网关处的数据包丢弃数量。ELALRED方法通过自适应地最小化队列损失率和平均队列大小来提高拥塞避免的性能。使用NS2获得的仿真结果表明,ELALRED的性能优于LALRED和传统RED方法,并将其作为性能比较的基准。
{"title":"Efficient LALRED for Congestion Avoidance Using Automata-Like Solution","authors":"S. Mahajan","doi":"10.1109/EITES.2015.11","DOIUrl":"https://doi.org/10.1109/EITES.2015.11","url":null,"abstract":"For ELALRED algorithm the concept of a Learning Automata-Like (LAL) mechanism devised for congestion avoidance in wired networks. The algorithm, named as Efficient LAL Random Early Detection (ELALRED), is founded on the principles of the operations of existing RED congestion-avoidance mechanisms, augmented with an LAL philosophy. The primary objective of ELALRED is to optimize the value of the average size of the queue used for congestion avoidance and to consequently reduce the total loss of packets at the queue. We attempt to achieve this by stationing a LAL algorithm at the gateways and by discretizing the probabilities of the corresponding actions of the congestion-avoidance algorithm. At every time instant, the LAL scheme, in turn, chooses the action that possesses the maximal ratio between the number of times the chosen action is rewarded and the number of times that it has been chosen. In ELALRED, we simultaneously increase the likelihood of the scheme converging to the action, which minimizes the number of packet drops at the gateway. ELALRED approach helps to improve the performance of congestion avoidance by adaptively minimizing the queue-loss rate and the average queue size. Simulation results obtained using NS2 establish the improved performance of ELALRED over the LALRED and traditional RED methods which were chosen as the benchmarks for performance comparison purposes.","PeriodicalId":170773,"journal":{"name":"2015 International Conference on Emerging Information Technology and Engineering Solutions","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130164675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimized Technique for Capacitated Minimum Forest Problem In Wireless Sensor Networks 无线传感器网络中有能力最小森林问题的优化技术
Shwetal R. Jaiswal
Recent advances in low power radios and sensor technology have enabled the pervasive deployment of sensor networks consisting of sensor nodes that are very small in size and relatively inexpensive. Wireless Sensor Networks (WSNs) have been seen more as a solution to large scale tracking and monitoring applications, because their low data rate, low energy consumption and short range communication presents the great opportunity to instrument and monitor the physical world at unprecedented scale. However realization of WSNs needs to satisfy constraints introduced by factors such as limited power, limited communication bandwidth, limited processing capacity, and small storage capacity. Therefore, the design of efficient technique for optimizing the capabilities of networks is becoming an increasingly critical aspect in networking. This paper addresses constrained optimization problems namely the Capacitated Minimum Forest (CMF) problem. To utilize the critical WSNs resources precisely, the development of algorithms with quality guaranteed solutions in WSNs is needed. We proposed that optimal approximation algorithms achieve highest optimization goal which minimize Cost of network resource consumption.
低功率无线电和传感器技术的最新进展使得由尺寸非常小且相对便宜的传感器节点组成的传感器网络得以普遍部署。无线传感器网络(WSNs)已被视为大规模跟踪和监控应用的解决方案,因为其低数据速率,低能耗和短距离通信为前所未有的规模测量和监控物理世界提供了巨大的机会。然而,无线传感器网络的实现需要满足有限的功率、有限的通信带宽、有限的处理能力和较小的存储容量等因素的约束。因此,设计有效的技术来优化网络的功能已成为网络的一个日益重要的方面。本文研究约束优化问题,即容量最小森林(CMF)问题。为了准确地利用关键的无线传感器网络资源,需要开发具有质量保证解的无线传感器网络算法。提出了以网络资源消耗代价最小为最高优化目标的最优逼近算法。
{"title":"Optimized Technique for Capacitated Minimum Forest Problem In Wireless Sensor Networks","authors":"Shwetal R. Jaiswal","doi":"10.1109/EITES.2015.12","DOIUrl":"https://doi.org/10.1109/EITES.2015.12","url":null,"abstract":"Recent advances in low power radios and sensor technology have enabled the pervasive deployment of sensor networks consisting of sensor nodes that are very small in size and relatively inexpensive. Wireless Sensor Networks (WSNs) have been seen more as a solution to large scale tracking and monitoring applications, because their low data rate, low energy consumption and short range communication presents the great opportunity to instrument and monitor the physical world at unprecedented scale. However realization of WSNs needs to satisfy constraints introduced by factors such as limited power, limited communication bandwidth, limited processing capacity, and small storage capacity. Therefore, the design of efficient technique for optimizing the capabilities of networks is becoming an increasingly critical aspect in networking. This paper addresses constrained optimization problems namely the Capacitated Minimum Forest (CMF) problem. To utilize the critical WSNs resources precisely, the development of algorithms with quality guaranteed solutions in WSNs is needed. We proposed that optimal approximation algorithms achieve highest optimization goal which minimize Cost of network resource consumption.","PeriodicalId":170773,"journal":{"name":"2015 International Conference on Emerging Information Technology and Engineering Solutions","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129524281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced K Strange Points Clustering Algorithm 改进的K奇异点聚类算法
Terence Johnson, S. Singh
The algorithm proposed in this paper enhances the K Strange points clustering algorithm by selecting the first of unchanging K strange points as the minimum of the dataset and then finds the next strange point as the point which is farthest from the minimum and continues this process till it finds the K points which are farthest and almost equally spaced from each other. It then assigns the remaining points in the dataset into clusters formed by these K farthest or Strange points. The algorithm presented in this paper successfully addresses the issues related to longer execution time and formation of inaccurate clusters seen in the K Strange points clustering algorithm.
本文提出的算法对K个奇异点聚类算法进行了改进,选取不变的K个奇异点中的第一个作为数据集的最小值,然后寻找下一个奇异点作为距离最小值最远的点,并继续这一过程,直到找到距离最远且几乎相等的K个点。然后,它将数据集中剩余的点分配到由这K个最远点或奇异点组成的簇中。本文提出的算法成功地解决了K奇异点聚类算法中出现的执行时间较长和形成不准确聚类的问题。
{"title":"Enhanced K Strange Points Clustering Algorithm","authors":"Terence Johnson, S. Singh","doi":"10.1109/EITES.2015.14","DOIUrl":"https://doi.org/10.1109/EITES.2015.14","url":null,"abstract":"The algorithm proposed in this paper enhances the K Strange points clustering algorithm by selecting the first of unchanging K strange points as the minimum of the dataset and then finds the next strange point as the point which is farthest from the minimum and continues this process till it finds the K points which are farthest and almost equally spaced from each other. It then assigns the remaining points in the dataset into clusters formed by these K farthest or Strange points. The algorithm presented in this paper successfully addresses the issues related to longer execution time and formation of inaccurate clusters seen in the K Strange points clustering algorithm.","PeriodicalId":170773,"journal":{"name":"2015 International Conference on Emerging Information Technology and Engineering Solutions","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124771366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Experiments in Encrypted and Searchable Network Audit Logs 加密和可搜索网络审计日志的实验
Bhanu Prakash Gopularam, Sashank Dara, N. Nalini
We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.
我们考虑这样一种场景:消费者可以安全地将其网络遥测数据外包给云服务提供商,并允许第三方审核此类遥测数据以进行任何安全取证。我们特别考虑了网络日志审计中隐私保护搜索的用例。在本文中,我们尝试了基于身份的加密和基于属性的加密方案的进展,用于审计网络日志。
{"title":"Experiments in Encrypted and Searchable Network Audit Logs","authors":"Bhanu Prakash Gopularam, Sashank Dara, N. Nalini","doi":"10.1109/EITES.2015.13","DOIUrl":"https://doi.org/10.1109/EITES.2015.13","url":null,"abstract":"We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.","PeriodicalId":170773,"journal":{"name":"2015 International Conference on Emerging Information Technology and Engineering Solutions","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125773509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Non-exclusive Clustering: A Partitioning Approach 非排他性集群:一种分区方法
N. Agarwal, H. A. Ahmed, D. Bhattacharyya
Non-exclusive clustering is a partitioning based clustering scheme wherein the data points are clustered such that they belong to one or more clusters. Usually in real world applications, the datasets that we work with are not entirely exclusive in nature. In applications such as gene expression data analysis and satellite image processing, non-exclusive algorithms need to be employed for better and more accurate cluster analysis. Therefore, we intend to tackle such problems with a non-exclusive clustering algorithm, closely determined by a nonexclusivity score (NES). The NES is based on a feature class correlation measure, which helps to determine the significant overlap between the data points in the dataset and aids us in comprehending the clusters to which they belong to.
非排他性聚类是一种基于分区的聚类方案,其中数据点被聚类,使它们属于一个或多个聚类。通常在现实世界的应用程序中,我们使用的数据集在本质上并不完全是排他性的。在基因表达数据分析和卫星图像处理等应用中,需要采用非排他算法进行更好、更准确的聚类分析。因此,我们打算用非排他性聚类算法来解决这些问题,该算法与非排他性分数(NES)密切相关。NES基于特征类相关度量,这有助于确定数据集中数据点之间的重要重叠,并帮助我们理解它们所属的集群。
{"title":"Non-exclusive Clustering: A Partitioning Approach","authors":"N. Agarwal, H. A. Ahmed, D. Bhattacharyya","doi":"10.1109/EITES.2015.9","DOIUrl":"https://doi.org/10.1109/EITES.2015.9","url":null,"abstract":"Non-exclusive clustering is a partitioning based clustering scheme wherein the data points are clustered such that they belong to one or more clusters. Usually in real world applications, the datasets that we work with are not entirely exclusive in nature. In applications such as gene expression data analysis and satellite image processing, non-exclusive algorithms need to be employed for better and more accurate cluster analysis. Therefore, we intend to tackle such problems with a non-exclusive clustering algorithm, closely determined by a nonexclusivity score (NES). The NES is based on a feature class correlation measure, which helps to determine the significant overlap between the data points in the dataset and aids us in comprehending the clusters to which they belong to.","PeriodicalId":170773,"journal":{"name":"2015 International Conference on Emerging Information Technology and Engineering Solutions","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heuristic-Based Real-Time P2P Traffic Identification 基于启发式的P2P实时流量识别
Jagan Mohan Reddy, C. Hota
Peer-to-Peer (P2P) networks have seen a rapid growth, spanning diverse applications like online anonymity (Tor), online payment (Bit coin), file sharing (Bit Torrent), etc. However, the success of these applications has raised concerns among ISPs and Network administrators. These types of traffic worsen the congestion of the network, and create security vulnerabilities. Hence, P2P traffic identification has been researched actively in recent times. Early P2P traffic identification approaches were based on port-based inspection. Presently, Deep Packet Inspection (DPI) is a prominent technique used to identify P2P traffic. But it relies on payload signatures which are not resilient against port masquerading, traffic encryption and NATing. In this paper, we propose a novel P2P traffic identification mechanism based on the host behaviour from the transport layer headers. A set of heuristics was identified by analysing the off-line datasets collected in our test bed. This approach is privacy preserving as it does not examine the payload content. The usefulness of these heuristics is shown on real-time traffic traces received from our campus backbone, where in the best case only 0.20% of flows were unknown.
点对点(P2P)网络已经看到了快速增长,跨越各种应用,如在线匿名(Tor),在线支付(比特币),文件共享(比特Torrent)等。然而,这些应用程序的成功引起了isp和网络管理员的关注。这些类型的流量加剧了网络的拥塞,并产生了安全漏洞。因此,P2P流量识别在近年来得到了积极的研究。早期的P2P流量识别方法是基于端口的检测。目前,深度数据包检测(DPI)是P2P流量识别的重要技术之一。但它依赖于有效载荷签名,而有效载荷签名无法抵御端口伪装、流量加密和nat。在本文中,我们提出了一种基于传输层报头的主机行为的P2P流量识别机制。通过分析在我们的测试台上收集的离线数据集,确定了一组启发式。这种方法保护了隐私,因为它不检查有效负载内容。这些启发式的有用性体现在从我们的校园主干接收到的实时流量轨迹上,在最好的情况下,只有0.20%的流量是未知的。
{"title":"Heuristic-Based Real-Time P2P Traffic Identification","authors":"Jagan Mohan Reddy, C. Hota","doi":"10.1109/EITES.2015.16","DOIUrl":"https://doi.org/10.1109/EITES.2015.16","url":null,"abstract":"Peer-to-Peer (P2P) networks have seen a rapid growth, spanning diverse applications like online anonymity (Tor), online payment (Bit coin), file sharing (Bit Torrent), etc. However, the success of these applications has raised concerns among ISPs and Network administrators. These types of traffic worsen the congestion of the network, and create security vulnerabilities. Hence, P2P traffic identification has been researched actively in recent times. Early P2P traffic identification approaches were based on port-based inspection. Presently, Deep Packet Inspection (DPI) is a prominent technique used to identify P2P traffic. But it relies on payload signatures which are not resilient against port masquerading, traffic encryption and NATing. In this paper, we propose a novel P2P traffic identification mechanism based on the host behaviour from the transport layer headers. A set of heuristics was identified by analysing the off-line datasets collected in our test bed. This approach is privacy preserving as it does not examine the payload content. The usefulness of these heuristics is shown on real-time traffic traces received from our campus backbone, where in the best case only 0.20% of flows were unknown.","PeriodicalId":170773,"journal":{"name":"2015 International Conference on Emerging Information Technology and Engineering Solutions","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133470748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2015 International Conference on Emerging Information Technology and Engineering Solutions
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1