首页 > 最新文献

2011 19th IEEE International Conference on Network Protocols最新文献

英文 中文
REPICK: Random access MAC with reversed contention and Piggy-backed ACK REPICK:随机访问MAC,反向竞争和反向反向
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089033
Xiaojun Feng, Jin Zhang, Qian Zhang, Bo Li
The promise of high speed (over 1Gbps) wireless transmission rate at the physical layer can be significantly compromised with the current design in 802.11 DCF. There are three overheads in the 802.11 MAC that contribute to the performance degradation: DIFS, random backoff and ACK. Motivated by the current progress in OFDM and self-interference cancellation technologies, in this poster, we propose a novel MAC design called REPICK (REversed contention and PIggy-backed ACK) to collectively address these problems. The key idea in our proposal is to take advantage of OFDM subcarriers in the frequency domain to enhance the MAC efficiency. Specifically, in REPICK, we propose a novel reverse contention algorithm which enables receivers to contend for channel access with subcarriers in the frequency domain (reversed contention). We also design a mechanism which allows ACKs from receivers to be piggy-backed through subcarriers together with the contention information (piggy-backed ACK). We demonstrate REPICK's efficiency through both analysis and simulations.
由于802.11 DCF的当前设计,物理层高速(超过1Gbps)无线传输速率的承诺可能会受到严重损害。802.11 MAC中有三种开销会导致性能下降:DIFS、随机回退和ACK。受OFDM和自干扰消除技术当前进展的激励,在这张海报中,我们提出了一种新的MAC设计,称为REPICK(反向争用和反向反向ACK),以共同解决这些问题。该方案的核心思想是利用频域OFDM子载波来提高MAC效率。具体来说,在REPICK中,我们提出了一种新的反向竞争算法,该算法使接收器能够在频域与子载波竞争信道访问(反向竞争)。我们还设计了一种机制,允许来自接收器的ACK与争用信息一起通过子载波(pigky - backack)。我们通过分析和仿真验证了REPICK的有效性。
{"title":"REPICK: Random access MAC with reversed contention and Piggy-backed ACK","authors":"Xiaojun Feng, Jin Zhang, Qian Zhang, Bo Li","doi":"10.1109/ICNP.2011.6089033","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089033","url":null,"abstract":"The promise of high speed (over 1Gbps) wireless transmission rate at the physical layer can be significantly compromised with the current design in 802.11 DCF. There are three overheads in the 802.11 MAC that contribute to the performance degradation: DIFS, random backoff and ACK. Motivated by the current progress in OFDM and self-interference cancellation technologies, in this poster, we propose a novel MAC design called REPICK (REversed contention and PIggy-backed ACK) to collectively address these problems. The key idea in our proposal is to take advantage of OFDM subcarriers in the frequency domain to enhance the MAC efficiency. Specifically, in REPICK, we propose a novel reverse contention algorithm which enables receivers to contend for channel access with subcarriers in the frequency domain (reversed contention). We also design a mechanism which allows ACKs from receivers to be piggy-backed through subcarriers together with the contention information (piggy-backed ACK). We demonstrate REPICK's efficiency through both analysis and simulations.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124421789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Subcarrier Nulling: Enabling partial spectrum sharing in wireless LANs 自适应子载波Nulling:在无线局域网中实现部分频谱共享
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089069
Xinyu Zhang, K. Shin
Emerging WLAN standards have been incorporating a variety of channel widths ranging from 5MHz to 160MHz, in order to match the diverse traffic demands on different networks. Unfortunately, the current 802.11 MAC/PHY is not designed for the coexistence of variable-width channels. Overlapping narrowband channels may block an entire wide-band channel, resulting in severe spectrum underutilization and even starvation of WLANs on the wide-band. A similar peril exists when a WLAN partially overlaps its channel with multiple orthogonal WLANs. In this paper, we propose to solve the problem of partial spectrum sharing using Adaptive Subcarrier Nulling (ASN). ASN builds on the 802.11 OFDM PHY, but allows the radios to sense, transmit, detect, and decode packets through spectrum fragments, or subbands. An ASN transmitter can adapt its spectrum usage on a per-packet basis, by nulling the subbands used by neighboring WLANs, and sending packets through the remaining idle subbands. ASN preserves the 802.11 CSMA/CA primitives while allowing users to contend for access to each subband, and can opportunistically exploit the merits of wide-band channels via spectrum aggregation. We have implemented and evaluated ASN on the GNURadio/USRP platform. Our experimental results have shown ASN to achieve detection and decoding performance comparable to the legacy 802.11. Our detailed simulation in ns-2 further shows that ASN substantially improves the efficiency and fairness of spectrum sharing for multi-cell WLANs.
新兴的WLAN标准已经纳入了从5MHz到160MHz的各种信道宽度,以匹配不同网络上不同的流量需求。不幸的是,当前的802.11 MAC/PHY并不是为可变宽度信道共存而设计的。重叠的窄带信道可能会阻塞整个宽带信道,导致频谱利用率严重不足,甚至导致宽带wlan的饥饿。当WLAN与多个正交WLAN部分重叠其信道时,也存在类似的危险。本文提出利用自适应子载波零化(ASN)来解决部分频谱共享问题。ASN建立在802.11 OFDM PHY的基础上,但允许无线电通过频谱片段或子带来感知、传输、检测和解码数据包。ASN发送器可以根据每个数据包调整其频谱使用,方法是去除邻近wlan使用的子频段,并通过剩余的空闲子频段发送数据包。ASN保留了802.11 CSMA/CA原语,同时允许用户争夺对每个子带的访问,并且可以通过频谱聚合机会地利用宽带信道的优点。我们已经在gnurradio /USRP平台上实施和评估了ASN。我们的实验结果表明,ASN可以实现与传统802.11相当的检测和解码性能。我们在ns-2中的详细仿真进一步表明,ASN极大地提高了多小区wlan频谱共享的效率和公平性。
{"title":"Adaptive Subcarrier Nulling: Enabling partial spectrum sharing in wireless LANs","authors":"Xinyu Zhang, K. Shin","doi":"10.1109/ICNP.2011.6089069","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089069","url":null,"abstract":"Emerging WLAN standards have been incorporating a variety of channel widths ranging from 5MHz to 160MHz, in order to match the diverse traffic demands on different networks. Unfortunately, the current 802.11 MAC/PHY is not designed for the coexistence of variable-width channels. Overlapping narrowband channels may block an entire wide-band channel, resulting in severe spectrum underutilization and even starvation of WLANs on the wide-band. A similar peril exists when a WLAN partially overlaps its channel with multiple orthogonal WLANs. In this paper, we propose to solve the problem of partial spectrum sharing using Adaptive Subcarrier Nulling (ASN). ASN builds on the 802.11 OFDM PHY, but allows the radios to sense, transmit, detect, and decode packets through spectrum fragments, or subbands. An ASN transmitter can adapt its spectrum usage on a per-packet basis, by nulling the subbands used by neighboring WLANs, and sending packets through the remaining idle subbands. ASN preserves the 802.11 CSMA/CA primitives while allowing users to contend for access to each subband, and can opportunistically exploit the merits of wide-band channels via spectrum aggregation. We have implemented and evaluated ASN on the GNURadio/USRP platform. Our experimental results have shown ASN to achieve detection and decoding performance comparable to the legacy 802.11. Our detailed simulation in ns-2 further shows that ASN substantially improves the efficiency and fairness of spectrum sharing for multi-cell WLANs.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Network-level characteristics of spamming: An empirical analysis 垃圾邮件的网络级特征:实证分析
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089060
Marios Kokkodis, M. Faloutsos, A. Markopoulou
Has the behavior of spammers changed over the last few years? To answer this question, we conduct a study from three recent data sources. Specifically, we focus on the following broad questions: (a) how are email addresses harvested, (b) where is spam coming from, and (c) how does spam evolve over time. First, we discuss whether spammers still use email harvesting: 34% of the honeypot accounts we publicised received spam after 72 days on average. Interestingly, we find that simple email address obfuscation is quite effective against harvesting. Second, we identify significant skew in the spatial distribution of the origin of spam in both the IP-level and AS-level of granularity. We find that 20% of the active IPs are responsible for 80% of the total volume of spam and that 10% of the spamming ASes are responsible for the 90% of the volume. Finally, we study the temporal characteristics of the spamming IPs and find that spam activity has spread to new /8 subnetworks since 2006. Considering these spatio-temporal trends, the future of anti-spam is mixed: the current skewed spatial distribution of spam sources could be helpful in filtering spam, but the fact that spam sources are spreading in the IP space is a worrisome sign.
垃圾邮件发送者的行为在过去几年中有改变吗?为了回答这个问题,我们从三个最近的数据来源进行了一项研究。具体来说,我们关注以下广泛的问题:(a)如何收集电子邮件地址,(b)垃圾邮件来自哪里,以及(c)垃圾邮件如何随着时间的推移而演变。首先,我们讨论了垃圾邮件发送者是否仍然使用电子邮件收集:我们公布的蜜罐账户中有34%在平均72天后收到垃圾邮件。有趣的是,我们发现简单的电子邮件地址混淆对收集非常有效。其次,我们在ip级和as级粒度中都发现了垃圾邮件起源空间分布的显著偏差。我们发现20%的活跃ip负责垃圾邮件总量的80%,10%的垃圾邮件ase负责垃圾邮件总量的90%。最后,我们研究了垃圾邮件ip的时间特征,发现自2006年以来,垃圾邮件活动已经扩散到新的/8子网。考虑到这些时空趋势,反垃圾邮件的未来是喜忧参半的:当前垃圾邮件源的倾斜空间分布可能有助于过滤垃圾邮件,但垃圾邮件源在IP空间中蔓延的事实是一个令人担忧的迹象。
{"title":"Network-level characteristics of spamming: An empirical analysis","authors":"Marios Kokkodis, M. Faloutsos, A. Markopoulou","doi":"10.1109/ICNP.2011.6089060","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089060","url":null,"abstract":"Has the behavior of spammers changed over the last few years? To answer this question, we conduct a study from three recent data sources. Specifically, we focus on the following broad questions: (a) how are email addresses harvested, (b) where is spam coming from, and (c) how does spam evolve over time. First, we discuss whether spammers still use email harvesting: 34% of the honeypot accounts we publicised received spam after 72 days on average. Interestingly, we find that simple email address obfuscation is quite effective against harvesting. Second, we identify significant skew in the spatial distribution of the origin of spam in both the IP-level and AS-level of granularity. We find that 20% of the active IPs are responsible for 80% of the total volume of spam and that 10% of the spamming ASes are responsible for the 90% of the volume. Finally, we study the temporal characteristics of the spamming IPs and find that spam activity has spread to new /8 subnetworks since 2006. Considering these spatio-temporal trends, the future of anti-spam is mixed: the current skewed spatial distribution of spam sources could be helpful in filtering spam, but the fact that spam sources are spreading in the IP space is a worrisome sign.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Global optimization of file availability through replication for efficient file sharing in MANETs 通过复制实现文件可用性的全局优化,实现MANETs中有效的文件共享
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089056
Kang-Peng Chen, Haiying Shen
File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The efficiency of file querying suffers from the distinctive properties of MANETs including node mobility and limited communication range and resource. An intuitive method to alleviate this problem is to create file replicas in the network. However, despite the efforts on file replication, no research has focused on the global optimal replica sharing with minimum average querying delay. Specifically, current file replication protocols in MANETs have two shortcomings. First, they lack a rule to allocate limited resource to different files in order to minimize the average querying delay. Second, they simply consider storage as resource for replicas, but neglect the fact that the file holders' frequency of meeting other nodes also plays an important role in determining file availability. A node having a higher meeting frequency with others provides higher availability to its files. In this paper, we introduce a new concept of resource for file replication, which considers both node storage and meeting frequency. We theoretically study the influence of resource allocation on the average querying delay and derive a resource allocation rule to minimize the average querying delay. We further propose a distributed file replication protocol that follows the rule. The trace-driven experiments on both the real-world GENI testbed and NS-2 show that our protocol can achieve shorter average querying delay at lower cost than current replication protocols, which justifies the correctness of our theoretical analysis and the effectiveness of the proposed protocol.
近年来,文件共享在移动自组网(manet)中的应用越来越受到人们的关注。manet具有节点可移动性和有限的通信范围和资源等特点,影响了文件查询的效率。缓解此问题的一种直观方法是在网络中创建文件副本。然而,尽管在文件复制方面做了很多努力,但没有研究关注最小化平均查询延迟的全局最优副本共享。具体来说,当前的文件复制协议在manet中有两个缺点。首先,它们缺乏将有限的资源分配给不同文件以最小化平均查询延迟的规则。其次,它们简单地将存储视为副本的资源,但忽略了这样一个事实,即文件持有者与其他节点相遇的频率在确定文件可用性方面也起着重要作用。节点与其他节点的会议频率越高,其文件的可用性就越高。本文引入了一种新的文件复制资源概念,该概念同时考虑了节点存储和会议频率。从理论上研究了资源分配对平均查询延迟的影响,导出了最小化平均查询延迟的资源分配规则。我们进一步提出了一个遵循该规则的分布式文件复制协议。在真实GENI试验台和NS-2上的跟踪驱动实验表明,与现有复制协议相比,我们的协议可以以更低的成本实现更短的平均查询延迟,验证了理论分析的正确性和协议的有效性。
{"title":"Global optimization of file availability through replication for efficient file sharing in MANETs","authors":"Kang-Peng Chen, Haiying Shen","doi":"10.1109/ICNP.2011.6089056","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089056","url":null,"abstract":"File sharing applications in mobile ad hoc networks (MANETs) have attracted more and more attention in recent years. The efficiency of file querying suffers from the distinctive properties of MANETs including node mobility and limited communication range and resource. An intuitive method to alleviate this problem is to create file replicas in the network. However, despite the efforts on file replication, no research has focused on the global optimal replica sharing with minimum average querying delay. Specifically, current file replication protocols in MANETs have two shortcomings. First, they lack a rule to allocate limited resource to different files in order to minimize the average querying delay. Second, they simply consider storage as resource for replicas, but neglect the fact that the file holders' frequency of meeting other nodes also plays an important role in determining file availability. A node having a higher meeting frequency with others provides higher availability to its files. In this paper, we introduce a new concept of resource for file replication, which considers both node storage and meeting frequency. We theoretically study the influence of resource allocation on the average querying delay and derive a resource allocation rule to minimize the average querying delay. We further propose a distributed file replication protocol that follows the rule. The trace-driven experiments on both the real-world GENI testbed and NS-2 show that our protocol can achieve shorter average querying delay at lower cost than current replication protocols, which justifies the correctness of our theoretical analysis and the effectiveness of the proposed protocol.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121561799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
OpenRouter: OpenFlow extension and implementation based on a commercial router OpenRouter:基于商用路由器的OpenFlow扩展和实现
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089045
Tao Feng, J. Bi, Hongyu Hu
By analyzing challenges of current OpenFlow in production network, we propose three extensions of OpenFlow about FlowTable, control mode and OpenFlow protocol. Based on these extensions, a commercial OpenFlow-enabled router, named OpenRouter, is designed and implemented using only available and existing hardware in a commercial router. OpenRouter brings the abilities of control openness, integration of inside/outside protocols, and flexibility of OpenFlow message structure, low-cost implementation and deployment. We expect OpenRouter may accelerate the large-scale application and deployment of OpenFlow in production network.
通过分析目前OpenFlow在生产网络中面临的挑战,提出了OpenFlow在FlowTable、控制模式和OpenFlow协议三个方面的扩展。基于这些扩展,一个商用openflow路由器,命名为OpenRouter,被设计和实现,只使用商用路由器中可用的和现有的硬件。OpenRouter带来了控制的开放性、内外协议的集成、OpenFlow消息结构的灵活性、低成本的实现和部署能力。我们期待OpenRouter能够加速OpenFlow在生产网络中的大规模应用和部署。
{"title":"OpenRouter: OpenFlow extension and implementation based on a commercial router","authors":"Tao Feng, J. Bi, Hongyu Hu","doi":"10.1109/ICNP.2011.6089045","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089045","url":null,"abstract":"By analyzing challenges of current OpenFlow in production network, we propose three extensions of OpenFlow about FlowTable, control mode and OpenFlow protocol. Based on these extensions, a commercial OpenFlow-enabled router, named OpenRouter, is designed and implemented using only available and existing hardware in a commercial router. OpenRouter brings the abilities of control openness, integration of inside/outside protocols, and flexibility of OpenFlow message structure, low-cost implementation and deployment. We expect OpenRouter may accelerate the large-scale application and deployment of OpenFlow in production network.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128008251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A case for coalitions in data swarming systems 数据集群系统中的联盟案例
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089058
Honggang Zhang, Sudarshan Vasudevan, Ran Li, D. Towsley
We present an argument in favor of forming coalitions of peers in a data swarming system consisting of peers with different upload capacities. A coalition is a set of peers with the same upload capacity that explicitly cooperate with other peers inside the coalition via choking and capacity allocation strategies. Further, each peer interacts with other peers outside its coalition via potentially distinct choking and capacity allocation strategies. This paper focuses on the efficiency of different choking strategies, assuming that peers do not share data with other peers outside their coalitions. We first develop an analytical model that accurately predicts the performance of a coalition of peers adopting BitTorrent's Tit-for-Tat choking strategy. Our model highlights a number of inefficiencies of Tit-for-Tat strategy. Accordingly, we propose a random choking strategy, and show that it can help a coalition achieve near-optimal performance and it significantly outperforms not only Tit-for-Tat strategy but also unchoke-all strategy. Using cooperative game theory, we prove the existence of stable coalitions, and demonstrate the convergence of the dynamic coalition formation process when peers use our cooperation-aware better response strategy. Using extensive simulations, we demonstrate significant performance benefits due to coalition formation.
我们提出了一个论点,赞成在由具有不同上传能力的对等组成的数据集群系统中形成对等联盟。联盟是一组具有相同上传能力的节点,它们通过阻塞和容量分配策略显式地与联盟内的其他节点合作。此外,每个节点通过可能不同的阻塞和容量分配策略与其联盟之外的其他节点进行交互。本文重点研究了不同阻塞策略的效率,假设节点不与其联盟外的其他节点共享数据。我们首先开发了一个分析模型,准确地预测了采用BitTorrent针锋相对的窒息策略的同行联盟的性能。我们的模型突出了以牙还牙策略的一些低效之处。因此,我们提出了一种随机窒息策略,并证明了它可以帮助联盟获得接近最优的性能,并且明显优于以牙还牙策略和通通窒息策略。利用合作博弈论证明了稳定联盟的存在性,并证明了当同伴采用我们的合作意识更好的响应策略时,动态联盟形成过程的收敛性。通过广泛的模拟,我们证明了联盟形成带来的显著性能优势。
{"title":"A case for coalitions in data swarming systems","authors":"Honggang Zhang, Sudarshan Vasudevan, Ran Li, D. Towsley","doi":"10.1109/ICNP.2011.6089058","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089058","url":null,"abstract":"We present an argument in favor of forming coalitions of peers in a data swarming system consisting of peers with different upload capacities. A coalition is a set of peers with the same upload capacity that explicitly cooperate with other peers inside the coalition via choking and capacity allocation strategies. Further, each peer interacts with other peers outside its coalition via potentially distinct choking and capacity allocation strategies. This paper focuses on the efficiency of different choking strategies, assuming that peers do not share data with other peers outside their coalitions. We first develop an analytical model that accurately predicts the performance of a coalition of peers adopting BitTorrent's Tit-for-Tat choking strategy. Our model highlights a number of inefficiencies of Tit-for-Tat strategy. Accordingly, we propose a random choking strategy, and show that it can help a coalition achieve near-optimal performance and it significantly outperforms not only Tit-for-Tat strategy but also unchoke-all strategy. Using cooperative game theory, we prove the existence of stable coalitions, and demonstrate the convergence of the dynamic coalition formation process when peers use our cooperation-aware better response strategy. Using extensive simulations, we demonstrate significant performance benefits due to coalition formation.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124079981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Shield: DoS filtering using traffic deflecting 屏蔽:使用流量偏转对拒绝服务进行过滤
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089077
Erik Kline, A. Afanasyev, P. Reiher
Denial-of-service (DoS) attacks continue to be a major problem on the Internet. While many defense mechanisms have been created, they all have significant deployment issues. This paper introduces a novel method that overcomes these issues, allowing a small number of deployed DoS defenses to act as secure on-demand shields for any node on the Internet. The proposed method is based on rerouting any packet addressed to a protected autonomous system (AS) through an intermediate filtering node — a shield. In this way, all potentially harmful traffic could be discarded before reaching the destination. The mechanisms for packet rerouting use existing routing techniques and do not require any kind of modification to the deployed protocols or routers. To make the proposed system feasible, from both deployment and usage points of view, traffic rerouting and outsourced filtering could be provided as an insurance-style on-demand service.
拒绝服务(DoS)攻击仍然是互联网上的一个主要问题。虽然已经创建了许多防御机制,但它们都存在重大的部署问题。本文介绍了一种克服这些问题的新方法,允许少量部署的DoS防御作为互联网上任何节点的安全按需防护。所提出的方法是基于通过中间过滤节点(屏蔽)将任何数据包重路由到受保护的自治系统(AS)。这样,所有潜在的有害交通都可以在到达目的地之前被丢弃。分组重路由的机制使用现有的路由技术,不需要对已部署的协议或路由器进行任何类型的修改。为了使所建议的系统可行,从部署和使用的角度来看,流量重路由和外包过滤可以作为保险式的按需服务提供。
{"title":"Shield: DoS filtering using traffic deflecting","authors":"Erik Kline, A. Afanasyev, P. Reiher","doi":"10.1109/ICNP.2011.6089077","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089077","url":null,"abstract":"Denial-of-service (DoS) attacks continue to be a major problem on the Internet. While many defense mechanisms have been created, they all have significant deployment issues. This paper introduces a novel method that overcomes these issues, allowing a small number of deployed DoS defenses to act as secure on-demand shields for any node on the Internet. The proposed method is based on rerouting any packet addressed to a protected autonomous system (AS) through an intermediate filtering node — a shield. In this way, all potentially harmful traffic could be discarded before reaching the destination. The mechanisms for packet rerouting use existing routing techniques and do not require any kind of modification to the deployed protocols or routers. To make the proposed system feasible, from both deployment and usage points of view, traffic rerouting and outsourced filtering could be provided as an insurance-style on-demand service.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Real-time Netshuffle: Graph distortion for on-line anonymization 实时网洗牌:在线匿名化的图形失真
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089040
R. Paul, Victor C. Valgenti, Min Sik Kim
Due the significant need for real-time anonymization we propose Real-time Netshuffle [1]; a complete graph distortion technique designed to mitigate risk to inference attacks in traffic anonymization. Real-time Netshuffle provides an additional layer of security, in concert with other on-line traffic anonymization techniques, while imposing only minimal damage to the empirical value of the data.
由于实时匿名化的巨大需求,我们提出实时网络洗牌[1];一种完全的图形失真技术,旨在降低流量匿名化中推理攻击的风险。实时Netshuffle与其他在线流量匿名化技术一起提供了额外的安全层,同时只对数据的经验价值造成最小的损害。
{"title":"Real-time Netshuffle: Graph distortion for on-line anonymization","authors":"R. Paul, Victor C. Valgenti, Min Sik Kim","doi":"10.1109/ICNP.2011.6089040","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089040","url":null,"abstract":"Due the significant need for real-time anonymization we propose Real-time Netshuffle [1]; a complete graph distortion technique designed to mitigate risk to inference attacks in traffic anonymization. Real-time Netshuffle provides an additional layer of security, in concert with other on-line traffic anonymization techniques, while imposing only minimal damage to the empirical value of the data.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129967296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
AIDR: Aggregation of BGP routing table with AS path stretch AIDR:带AS路径伸缩的BGP路由表聚合
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089042
Yangyang Wang, J. Bi, Jianping Wu
As Internet growth, more and more prefix fragments are announced into the global routing system due to operational reasons of inconsecutive address allocation, multihoming, and traffic engineering. The BGP routing table size in Default Free Zone (DFZ) fast growth will consume more memory space and computational capacity. It has been known that Internet will face with routing scalability issue, especially in the large address space (e.g., IPv6) deployment. In this paper, we propose an innovation to BGP, named Aggregation-aware Inter-Domain Routing (AIDR). It will take the prefix aggregation into account to make tradeoff in the best route selection. We evaluate the effect of AIDR on global routing system using the BGP traces from RouteViews and RIPE. It shows that, averagely, AIDR-based aggregation can reduce to roughly 15%∼35% of original routing table size under the 2.0 AS path stretch constraint, and to 25%∼40% with no AS path stretch.
随着互联网的发展,由于地址分配不连续、多宿主和流量工程等操作原因,越来越多的前缀片段被宣布到全球路由系统中。在DFZ (Default Free Zone)内,BGP路由表的大小快速增长会消耗更多的内存空间和计算能力。众所周知,Internet将面临路由可伸缩性问题,特别是在大地址空间(例如,IPv6)部署中。本文提出了对BGP的一种创新,即AIDR (Aggregation-aware Inter-Domain Routing)。该算法将前缀聚合考虑在内,在最佳路由选择中进行权衡。我们使用RouteViews和RIPE的BGP跟踪来评估AIDR对全局路由系统的影响。结果表明,平均而言,在2.0 AS路径拉伸约束下,基于aidr的聚合可以减少到原始路由表大小的大约15% ~ 35%,在没有AS路径拉伸的情况下,可以减少到25% ~ 40%。
{"title":"AIDR: Aggregation of BGP routing table with AS path stretch","authors":"Yangyang Wang, J. Bi, Jianping Wu","doi":"10.1109/ICNP.2011.6089042","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089042","url":null,"abstract":"As Internet growth, more and more prefix fragments are announced into the global routing system due to operational reasons of inconsecutive address allocation, multihoming, and traffic engineering. The BGP routing table size in Default Free Zone (DFZ) fast growth will consume more memory space and computational capacity. It has been known that Internet will face with routing scalability issue, especially in the large address space (e.g., IPv6) deployment. In this paper, we propose an innovation to BGP, named Aggregation-aware Inter-Domain Routing (AIDR). It will take the prefix aggregation into account to make tradeoff in the best route selection. We evaluate the effect of AIDR on global routing system using the BGP traces from RouteViews and RIPE. It shows that, averagely, AIDR-based aggregation can reduce to roughly 15%∼35% of original routing table size under the 2.0 AS path stretch constraint, and to 25%∼40% with no AS path stretch.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116141421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards name-based trust and security for content-centric network 面向以内容为中心的网络,实现基于名称的信任和安全
Pub Date : 2011-10-17 DOI: 10.1109/ICNP.2011.6089053
Xinwen Zhang, Katharine Chang, Huijun Xiong, Yonggang Wen, G. Shi, Guoqiang Wang
Trust and security have been considered as built-in properties for future Internet architecture. Leveraging the concept of named content in recently proposed information centric network, we propose a name-based trust and security protection mechanism. Our scheme is built with identity-based cryptography (IBC), where the identity of a user or device can act as a public key string. Uniquely, in named content network such as content-centric network (CCN), a content name or its prefixes can be used as public identities, with which content integrity and authenticity can be achieved with IBC algorithms. The trust of a content is seamlessly integrated with the verification of the content's integrity and authenticity with its name or prefix, instead of the public key certificate of its publisher. In addition, flexible confidentiality protection is enabled between content publishers and consumers. For scalable deployment purpose, we further propose to use a hybrid scheme combined with traditional public-key infrastructure (PKI) and IBC. We have implemented this scheme with CCNx open source project on Android.
信任和安全性被认为是未来互联网架构的内置属性。利用最近提出的信息中心网络中命名内容的概念,提出了一种基于名称的信任和安全保护机制。我们的方案是使用基于身份的加密(IBC)构建的,其中用户或设备的身份可以充当公钥字符串。唯一的是,在命名内容网络中,如内容中心网络(content-centric network, CCN),可以使用内容名称或其前缀作为公共身份,通过IBC算法实现内容的完整性和真实性。内容的信任与使用其名称或前缀(而不是其发布者的公钥证书)验证内容的完整性和真实性无缝集成。此外,还在内容发布者和使用者之间启用了灵活的机密性保护。为了实现可扩展的部署目的,我们进一步建议使用传统公钥基础设施(PKI)和IBC相结合的混合方案。我们在Android平台上使用CCNx开源项目实现了该方案。
{"title":"Towards name-based trust and security for content-centric network","authors":"Xinwen Zhang, Katharine Chang, Huijun Xiong, Yonggang Wen, G. Shi, Guoqiang Wang","doi":"10.1109/ICNP.2011.6089053","DOIUrl":"https://doi.org/10.1109/ICNP.2011.6089053","url":null,"abstract":"Trust and security have been considered as built-in properties for future Internet architecture. Leveraging the concept of named content in recently proposed information centric network, we propose a name-based trust and security protection mechanism. Our scheme is built with identity-based cryptography (IBC), where the identity of a user or device can act as a public key string. Uniquely, in named content network such as content-centric network (CCN), a content name or its prefixes can be used as public identities, with which content integrity and authenticity can be achieved with IBC algorithms. The trust of a content is seamlessly integrated with the verification of the content's integrity and authenticity with its name or prefix, instead of the public key certificate of its publisher. In addition, flexible confidentiality protection is enabled between content publishers and consumers. For scalable deployment purpose, we further propose to use a hybrid scheme combined with traditional public-key infrastructure (PKI) and IBC. We have implemented this scheme with CCNx open source project on Android.","PeriodicalId":202059,"journal":{"name":"2011 19th IEEE International Conference on Network Protocols","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132735566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
期刊
2011 19th IEEE International Conference on Network Protocols
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1