首页 > 最新文献

2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)最新文献

英文 中文
TIDS: Trust Value-Based IDS Framework for Wireless Body Area Network 基于信任值的无线体域网络IDS框架
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998329
Mohammad Yaghoubi, K. Ahmed, Yuan Miao
This study aims to develop a Trust Value Based Intrusion Detection System (TIDS) to identify and prevent Denial of Sleep attacks (DoSL) in Wireless Body Sensor Networks (WBAN). To detect and deter DoSL attacks, this IDS employs pre-distributed random keys, random passwords, the trust value of each node, node energy consumption, and an agent database. Since sending and receiving information packets within the network consumes the energy of the sensors, adopting an appropriate and optimal method to reduce energy consumption and efficient routing selection is necessary. The proposed framework uses Genetic Algorithm (GA) to select the optimal Cluster Head (CH) and the Ad-hoc On-demand Distance Vector (AODV) routing protocol for intra-cluster routing. This work simulates two attack scenarios: one in the presence of IDS and one in its absence, to understand the efficiency and effectiveness of IDS. In both scenarios, we measure and compare various network parameters such as throughput, network lifetime, Packet Delivery Rate (PDR), and node residual energy. We also benchmark TIDS against one of the recent highly cited works, “Secure and energy-efficient framework using Internet of Medical Things (IoMT) for e-healthcare (SEF-IoMT)”, against all network parameters listed above. The simulation results and their comparison with the benchmark study show that the proposed method could significantly improve the network parameters in deterring DoSL attacks. This study uses NS2 for running all tests and experiments.
本研究旨在开发一种基于信任值的入侵检测系统(TIDS),以识别和防止无线身体传感器网络(WBAN)中的拒绝睡眠攻击(DoSL)。为了检测和阻止DoSL攻击,该IDS使用了预分布的随机密钥、随机密码、每个节点的信任值、节点能耗和代理数据库。由于在网络中发送和接收信息包会消耗传感器的能量,因此有必要采用适当的优化方法来降低能量消耗并高效地选择路由。该框架使用遗传算法(GA)选择最优簇头(CH),并使用Ad-hoc按需距离矢量(AODV)路由协议进行簇内路由。这项工作模拟了两种攻击场景:一种是在存在IDS的情况下,另一种是在没有IDS的情况下,以了解IDS的效率和有效性。在这两种情况下,我们测量和比较各种网络参数,如吞吐量、网络生命周期、数据包传递速率(PDR)和节点剩余能量。我们还将TIDS与最近被高度引用的一篇论文“将医疗物联网(IoMT)用于电子医疗(self -IoMT)的安全节能框架”进行对比,并将TIDS与上述所有网络参数进行对比。仿真结果以及与基准测试的对比表明,该方法能够显著提高网络参数对DoSL攻击的抑制能力。本研究使用NS2进行所有测试和实验。
{"title":"TIDS: Trust Value-Based IDS Framework for Wireless Body Area Network","authors":"Mohammad Yaghoubi, K. Ahmed, Yuan Miao","doi":"10.1109/ITNAC55475.2022.9998329","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998329","url":null,"abstract":"This study aims to develop a Trust Value Based Intrusion Detection System (TIDS) to identify and prevent Denial of Sleep attacks (DoSL) in Wireless Body Sensor Networks (WBAN). To detect and deter DoSL attacks, this IDS employs pre-distributed random keys, random passwords, the trust value of each node, node energy consumption, and an agent database. Since sending and receiving information packets within the network consumes the energy of the sensors, adopting an appropriate and optimal method to reduce energy consumption and efficient routing selection is necessary. The proposed framework uses Genetic Algorithm (GA) to select the optimal Cluster Head (CH) and the Ad-hoc On-demand Distance Vector (AODV) routing protocol for intra-cluster routing. This work simulates two attack scenarios: one in the presence of IDS and one in its absence, to understand the efficiency and effectiveness of IDS. In both scenarios, we measure and compare various network parameters such as throughput, network lifetime, Packet Delivery Rate (PDR), and node residual energy. We also benchmark TIDS against one of the recent highly cited works, “Secure and energy-efficient framework using Internet of Medical Things (IoMT) for e-healthcare (SEF-IoMT)”, against all network parameters listed above. The simulation results and their comparison with the benchmark study show that the proposed method could significantly improve the network parameters in deterring DoSL attacks. This study uses NS2 for running all tests and experiments.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126187987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Managing MPTCP Fairness via SDN versus Existing Congestion Control Techniques 通过SDN与现有拥塞控制技术对MPTCP公平性管理的评估
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998393
Farinaz Jowkarishasaltaneh, J. But, A. Cricenti
The MPTCP Transport Layer protocol allows applications to make use of multiple network interfaces simultaneously, allowing for improved throughput and resilience. MPTCP deploys a number of coupled congestion control algorithms that couple congestion window growth across multiple subflows. This restricts window growth to allow competing TCP flows to attain a fair bandwidth share. We examine the performance of existing algorithms across both shared and disjoint paths, finding that these function reasonably only when the bottleneck is shared and the paths exhibit a low bandwidth-delay product. We then propose using uncoupled congestion control within MPTCP, instead managing fairness within the network using SDN. Experimental validation shows that this approach results in fair sharing across shared and disjoint paths, including those with higher bandwidth-delay products.
MPTCP传输层协议允许应用程序同时使用多个网络接口,从而提高吞吐量和弹性。MPTCP部署了许多耦合拥塞控制算法,这些算法将多个子流之间的拥塞窗口增长耦合在一起。这限制了窗口的增长,以允许竞争的TCP流获得公平的带宽共享。我们检查了现有算法在共享和不相交路径上的性能,发现只有当瓶颈是共享的并且路径表现出低带宽延迟积时,这些算法才能合理地起作用。然后,我们建议在MPTCP中使用非耦合拥塞控制,而不是使用SDN在网络中管理公平性。实验验证表明,该方法可以实现共享路径和不相交路径的公平共享,包括具有较高带宽延迟积的路径。
{"title":"Evaluation of Managing MPTCP Fairness via SDN versus Existing Congestion Control Techniques","authors":"Farinaz Jowkarishasaltaneh, J. But, A. Cricenti","doi":"10.1109/ITNAC55475.2022.9998393","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998393","url":null,"abstract":"The MPTCP Transport Layer protocol allows applications to make use of multiple network interfaces simultaneously, allowing for improved throughput and resilience. MPTCP deploys a number of coupled congestion control algorithms that couple congestion window growth across multiple subflows. This restricts window growth to allow competing TCP flows to attain a fair bandwidth share. We examine the performance of existing algorithms across both shared and disjoint paths, finding that these function reasonably only when the bottleneck is shared and the paths exhibit a low bandwidth-delay product. We then propose using uncoupled congestion control within MPTCP, instead managing fairness within the network using SDN. Experimental validation shows that this approach results in fair sharing across shared and disjoint paths, including those with higher bandwidth-delay products.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain enhanced BGP4 Security for an SDN based Federation 区块链为基于SDN的联盟增强了BGP4安全性
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998378
Mohammad Hassan, M. Gregory, Shuo Li
The Software Defined Networking (SDN) paradigm has the potential to improve the operation and efficiency of the global Internet. In recent times, SDN has been extensively adopted in data centres and business networks. Recently, more research is being carried out to find solutions to the problems caused by the continually increasing complexities of the SDN. Issues regarding the lack of transparency between SDN domains impact security, so peer authentication is required. Peer authentication remains a critical issue. SDN domains are linked by the routing protocol Border Gateway Protocol Version 4 (BGP4). To improve the transparency of BGP4 transactions, this paper proposed a Blockchain-based BGP4 Orchestration (BBO) framework that utilises an Internet number resource authority and trustworthy management entity. BBO provides an origin advertisement source and has been found to outperform Resource Public Key Infrastructure (RPKI) in terms of securing origin advertisement and establishing a required setting for the resource repository. This research work ensures sufficient deployment incentives for SDN based federations.
软件定义网络(SDN)范式具有改善全球互联网运行和效率的潜力。近年来,SDN已被广泛应用于数据中心和业务网络中。近年来,人们正在进行更多的研究,以寻找解决SDN不断增加的复杂性所带来的问题。关于SDN域之间缺乏透明度的问题会影响安全性,因此需要对等身份验证。对等身份验证仍然是一个关键问题。SDN域之间通过路由协议BGP4 (Border Gateway protocol Version 4)连接。为了提高BGP4交易的透明度,本文提出了一种基于区块链的BGP4编排(BBO)框架,该框架利用互联网号码资源权威和可信赖的管理实体。BBO提供了一个源发布源,并且在保护源发布和为资源存储库建立所需设置方面优于资源公钥基础设施(Resource Public Key Infrastructure, RPKI)。这项研究工作确保了对基于SDN的联盟有足够的部署激励。
{"title":"Blockchain enhanced BGP4 Security for an SDN based Federation","authors":"Mohammad Hassan, M. Gregory, Shuo Li","doi":"10.1109/ITNAC55475.2022.9998378","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998378","url":null,"abstract":"The Software Defined Networking (SDN) paradigm has the potential to improve the operation and efficiency of the global Internet. In recent times, SDN has been extensively adopted in data centres and business networks. Recently, more research is being carried out to find solutions to the problems caused by the continually increasing complexities of the SDN. Issues regarding the lack of transparency between SDN domains impact security, so peer authentication is required. Peer authentication remains a critical issue. SDN domains are linked by the routing protocol Border Gateway Protocol Version 4 (BGP4). To improve the transparency of BGP4 transactions, this paper proposed a Blockchain-based BGP4 Orchestration (BBO) framework that utilises an Internet number resource authority and trustworthy management entity. BBO provides an origin advertisement source and has been found to outperform Resource Public Key Infrastructure (RPKI) in terms of securing origin advertisement and establishing a required setting for the resource repository. This research work ensures sufficient deployment incentives for SDN based federations.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131314599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Sequential Dispatching Policies 论顺序调度策略
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998339
Esa Hyytiä, Rhonda Righter
Job dispatching appears in many communication and computer systems. In this paper, we present a classification of dispatching policies according to their scalability, and introduce the class of sequential dispatching policies. These, highly scalable policies are a special case of index policies. By means of numerical examples, we show that efficient, practically optimal, dispatching may be achieved by a sequential policy, or a simple dynamic variant of such a policy, under heavy load. These numerical examples suggests that efficient and scalable load balancing can often be realized by simple primitive dispatching elements amenable also for machine learning based approaches.
作业调度出现在许多通信和计算机系统中。本文根据调度策略的可扩展性对调度策略进行了分类,并引入了顺序调度策略的分类。这些高度可伸缩的策略是索引策略的一种特殊情况。通过数值实例,我们证明了在高负荷下,有效的、实际上最优的调度可以通过顺序策略或这种策略的简单动态变体来实现。这些数值例子表明,高效和可扩展的负载平衡通常可以通过简单的原始调度元素来实现,也适用于基于机器学习的方法。
{"title":"On Sequential Dispatching Policies","authors":"Esa Hyytiä, Rhonda Righter","doi":"10.1109/ITNAC55475.2022.9998339","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998339","url":null,"abstract":"Job dispatching appears in many communication and computer systems. In this paper, we present a classification of dispatching policies according to their scalability, and introduce the class of sequential dispatching policies. These, highly scalable policies are a special case of index policies. By means of numerical examples, we show that efficient, practically optimal, dispatching may be achieved by a sequential policy, or a simple dynamic variant of such a policy, under heavy load. These numerical examples suggests that efficient and scalable load balancing can often be realized by simple primitive dispatching elements amenable also for machine learning based approaches.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123415858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A convolutional neural network based Android malware detection method with dynamic fine-tuning 基于卷积神经网络的Android恶意软件动态微调检测方法
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998375
Z. Liu, Ruoyu Wang, Bitao Peng, Qingqing Gan
Android malware detection is an important foundation for guaranteeing the security of Android ecosystem. Convolutional neural network has been applied in Android malware detection. It usually requires a large amount of training samples for building an efficient model. However, the malware data collection costs much time and resources. The lack of training samples may lead to overfitting problem. In addition, the model may become ineffective when the data distribution is significantly changed. To handle these problems, this paper proposes a new malware detection method. It firstly trains a model on an initial training set using convolutional neural network. With the upcoming of more samples, the model is updated by fine-tuning the pre-trained model on the newly labeled data. So that the pre-trained model could be dynamically updated. The experiments on the real datasets show that our method can further improve the accuracy and gmean about 1.3% and 2.4% respectively on average.
Android恶意软件检测是保证Android生态系统安全的重要基础。卷积神经网络已应用于Android恶意软件检测中。为了建立一个有效的模型,通常需要大量的训练样本。然而,恶意软件的数据收集需要花费大量的时间和资源。训练样本的缺乏可能导致过拟合问题。此外,当数据分布发生显著变化时,模型可能会失效。针对这些问题,本文提出了一种新的恶意软件检测方法。首先利用卷积神经网络在初始训练集上训练模型;随着更多样本的到来,通过对新标记数据的预训练模型进行微调来更新模型。使预训练模型能够动态更新。在真实数据集上的实验表明,我们的方法可以进一步提高准确率和g均值,平均分别提高1.3%和2.4%。
{"title":"A convolutional neural network based Android malware detection method with dynamic fine-tuning","authors":"Z. Liu, Ruoyu Wang, Bitao Peng, Qingqing Gan","doi":"10.1109/ITNAC55475.2022.9998375","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998375","url":null,"abstract":"Android malware detection is an important foundation for guaranteeing the security of Android ecosystem. Convolutional neural network has been applied in Android malware detection. It usually requires a large amount of training samples for building an efficient model. However, the malware data collection costs much time and resources. The lack of training samples may lead to overfitting problem. In addition, the model may become ineffective when the data distribution is significantly changed. To handle these problems, this paper proposes a new malware detection method. It firstly trains a model on an initial training set using convolutional neural network. With the upcoming of more samples, the model is updated by fine-tuning the pre-trained model on the newly labeled data. So that the pre-trained model could be dynamically updated. The experiments on the real datasets show that our method can further improve the accuracy and gmean about 1.3% and 2.4% respectively on average.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116396626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dispersion Compensating using Chirped Fiber Bragg Grating for Multiple Optical Bands 基于啁啾光纤光栅的多波段色散补偿
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998350
Muhammad Towfiqur Rahman, Tasnim Sabiha
Applications of fiber bragg gratings (FBG) in optical communication are a growing area. Recently, there has been a lot of interest in the creation and use of chirped FBGs, which are distinguished by a non-uniform modulation of the refractive index within an optical fiber core. Chromatic dispersion (CD) in pulse broadening and inter symbol interference (ISI) at the light detector significantly affect high-speed optical networks. The wavelength range where optical fibers have a low transmission loss is where fiber-optic communication is mostly carried out. Five wavelength bands make up this low-loss wavelength zone, which has a range of 1260 to 1625 nm. In this study we compared three different optical bands with different chirped FBG lengths to tackle the chromatic dispersion compensation containing 10 Gbps data speed. The single-mode fiber length and quality factor (Q) are minimally improved by the combination of four UFBG and CFBG design technique. By implementing quality factor (Q) of the available SMF are improved by using the combination. The best results have been seen for correcting chromatic dispersion by implementing quality factor (Q) of the available SMF are improved by using the combination. We consider Q-factor, eye diagram, and BER as a performance indicator of the system.
光纤bragg光栅在光通信中的应用是一个新兴的领域。最近,人们对啁啾光纤光栅的创建和使用产生了很大的兴趣,这种光纤光栅的特点是光纤芯内折射率的非均匀调制。脉冲展宽中的色散和光探测器的码间干扰对高速光网络有重要影响。光纤传输损耗低的波长范围是光纤通信主要进行的波长范围。五个波段组成了这个低损耗波长区,其范围为1260至1625纳米。在本研究中,我们比较了三种不同啁啾光纤光栅长度的不同光学波段,以解决包含10 Gbps数据速度的色散补偿问题。采用四种UFBG和CFBG相结合的设计技术,对单模光纤长度和品质因子(Q)的改善最小。通过实现质量因子(Q)的有效SMF使用组合提高。通过对可用SMF的质量因子Q进行校正,获得了较好的色散校正效果。我们考虑了q因子、眼图和误码率作为系统的性能指标。
{"title":"Dispersion Compensating using Chirped Fiber Bragg Grating for Multiple Optical Bands","authors":"Muhammad Towfiqur Rahman, Tasnim Sabiha","doi":"10.1109/ITNAC55475.2022.9998350","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998350","url":null,"abstract":"Applications of fiber bragg gratings (FBG) in optical communication are a growing area. Recently, there has been a lot of interest in the creation and use of chirped FBGs, which are distinguished by a non-uniform modulation of the refractive index within an optical fiber core. Chromatic dispersion (CD) in pulse broadening and inter symbol interference (ISI) at the light detector significantly affect high-speed optical networks. The wavelength range where optical fibers have a low transmission loss is where fiber-optic communication is mostly carried out. Five wavelength bands make up this low-loss wavelength zone, which has a range of 1260 to 1625 nm. In this study we compared three different optical bands with different chirped FBG lengths to tackle the chromatic dispersion compensation containing 10 Gbps data speed. The single-mode fiber length and quality factor (Q) are minimally improved by the combination of four UFBG and CFBG design technique. By implementing quality factor (Q) of the available SMF are improved by using the combination. The best results have been seen for correcting chromatic dispersion by implementing quality factor (Q) of the available SMF are improved by using the combination. We consider Q-factor, eye diagram, and BER as a performance indicator of the system.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125882684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial Frequency Detection of Optical Signals Embedded in the Environment 环境中嵌入光信号的空间频率检测
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998410
Don Barber, V. Kanth, Zachary White, J. McEachen
Preventing the exfiltration of critical data via out-of-band channels is one of the most difficult challenges in cybersecurity. This challenge notably includes commu-nications utilizing optical channels. Numerous papers have suggested the modulation of indicator lights to transmit information out of otherwise secure networks. These means of optically embedding data are both challenging to detect and a threat to the security of confidential data. This paper presents a scalable, near-real-time process to detect and localize data hidden in optical channels amid other optical modulation, including electric network frequencies. Assumptions on the detectability of hidden optical channels are reviewed and a method of detecting and localizing transmissions based on spectral artifacts of embedded data is developed. Proof-of-concept experiments demonstrate the successful detection of potential optical data leaks in an office environment. This capability can allow for low cost optical bug sweeping devices, arming information security teams with a tool to detect and mitigate the insidious threat of optical out-of-band channels.
防止关键数据通过带外通道泄露是网络安全中最困难的挑战之一。这一挑战主要包括利用光信道的通信。许多论文都建议通过调制指示灯将信息从安全的网络中传输出去。这些光嵌入数据的方法既难以检测,又对机密数据的安全构成威胁。本文提出了一种可扩展的、近实时的过程来检测和定位隐藏在其他光调制(包括电网频率)中的光通道中的数据。回顾了隐藏光通道可探测性的假设,提出了一种基于嵌入数据的光谱伪影的传输检测和定位方法。概念验证实验证明了在办公环境中成功检测潜在的光学数据泄漏。这种能力允许使用低成本的光学漏洞清除设备,为信息安全团队提供一种工具,以检测和减轻光学带外通道的潜在威胁。
{"title":"Spatial Frequency Detection of Optical Signals Embedded in the Environment","authors":"Don Barber, V. Kanth, Zachary White, J. McEachen","doi":"10.1109/ITNAC55475.2022.9998410","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998410","url":null,"abstract":"Preventing the exfiltration of critical data via out-of-band channels is one of the most difficult challenges in cybersecurity. This challenge notably includes commu-nications utilizing optical channels. Numerous papers have suggested the modulation of indicator lights to transmit information out of otherwise secure networks. These means of optically embedding data are both challenging to detect and a threat to the security of confidential data. This paper presents a scalable, near-real-time process to detect and localize data hidden in optical channels amid other optical modulation, including electric network frequencies. Assumptions on the detectability of hidden optical channels are reviewed and a method of detecting and localizing transmissions based on spectral artifacts of embedded data is developed. Proof-of-concept experiments demonstrate the successful detection of potential optical data leaks in an office environment. This capability can allow for low cost optical bug sweeping devices, arming information security teams with a tool to detect and mitigate the insidious threat of optical out-of-band channels.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"429 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126088961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN-Based Service Function Chaining Framework for Kubernetes Cluster Using OvS 基于sdn的OvS Kubernetes集群业务功能链接框架
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998380
A.H. Ghorab, M. St-Hilaire
The ongoing demand for deploying Virtual Network Functions (VNFs) in cloud environments is driving the motivation to also deploy and enable Service Function Chaining (SFC). However, deploying SFC in a cloud environment includes multiple subproblems such as implementing an SFC-compatible infrastructure, routing design, placement, and scaling. We believe the deployment of SFC-compatible infrastructures and the routing design issues need further attention as they are fundamental constituents of SFC-enabled cloud environments. In this paper, we present a new flexible SFC framework using a multi-nodes Kubernetes cluster, a Software-Defined Networking (SDN) controller, and an OpenFlow-enabled virtual switch known as Open vSwitch (OvS) to deploy and steer the user traffic to a distributed SFC. We demonstrate the correctness of the proposed SFC framework by monitoring the OvS flow table on Kubernetes worker nodes.
在云环境中部署虚拟网络功能(VNFs)的持续需求也推动了部署和启用业务功能链(SFC)的动力。然而,在云环境中部署SFC包括多个子问题,如实现SFC兼容的基础设施、路由设计、布局和扩展。我们认为,sfc兼容基础设施的部署和路由设计问题需要进一步关注,因为它们是支持sfc的云环境的基本组成部分。在本文中,我们提出了一个新的灵活的SFC框架,使用多节点Kubernetes集群,一个软件定义网络(SDN)控制器和一个支持openflow的虚拟交换机Open vSwitch (OvS)来部署和引导用户流量到分布式SFC。我们通过监控Kubernetes工作节点上的OvS流表来证明所提出的SFC框架的正确性。
{"title":"SDN-Based Service Function Chaining Framework for Kubernetes Cluster Using OvS","authors":"A.H. Ghorab, M. St-Hilaire","doi":"10.1109/ITNAC55475.2022.9998380","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998380","url":null,"abstract":"The ongoing demand for deploying Virtual Network Functions (VNFs) in cloud environments is driving the motivation to also deploy and enable Service Function Chaining (SFC). However, deploying SFC in a cloud environment includes multiple subproblems such as implementing an SFC-compatible infrastructure, routing design, placement, and scaling. We believe the deployment of SFC-compatible infrastructures and the routing design issues need further attention as they are fundamental constituents of SFC-enabled cloud environments. In this paper, we present a new flexible SFC framework using a multi-nodes Kubernetes cluster, a Software-Defined Networking (SDN) controller, and an OpenFlow-enabled virtual switch known as Open vSwitch (OvS) to deploy and steer the user traffic to a distributed SFC. We demonstrate the correctness of the proposed SFC framework by monitoring the OvS flow table on Kubernetes worker nodes.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123427692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Impact of ICN/CCN Cache Decision Policies on Video and Audio Transmission QoE ICN/CCN缓存决策策略对视频和音频传输QoE的影响
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998387
Keisuke Kobayashi, Toshiro Nunome
This paper considers video and audio transmission in ICN (Information-Centric Networking) CCN (Content- Centric Networking), in which each intermediate node can cache content. LCE (Leave Copy Everywhere) has been known as a generic cache decision policy. However, because LCE caches at all the intermediate nodes, the cache of intermediate nodes can be duplicated. Therefore, various cache decision policies that eliminate redundancy have been proposed. In this paper, we evaluate the effect of the cache decision policies on QoE of video and audio transmission in ICN/CCN. We assess application-level QoS using a computer simulation with a tree network and QoE by means of subjective experiment.
本文研究了ICN (Information-Centric Networking)和CCN (Content- Centric Networking)中的视频和音频传输,其中每个中间节点都可以缓存内容。LCE (Leave Copy Everywhere)被称为通用缓存决策策略。但是,由于LCE在所有中间节点上进行缓存,因此中间节点的缓存可以被复制。因此,人们提出了各种消除冗余的缓存决策策略。本文评估了ICN/CCN中缓存决策策略对视频和音频传输QoE的影响。我们使用树形网络的计算机模拟和主观实验的QoE来评估应用级QoS。
{"title":"The Impact of ICN/CCN Cache Decision Policies on Video and Audio Transmission QoE","authors":"Keisuke Kobayashi, Toshiro Nunome","doi":"10.1109/ITNAC55475.2022.9998387","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998387","url":null,"abstract":"This paper considers video and audio transmission in ICN (Information-Centric Networking) CCN (Content- Centric Networking), in which each intermediate node can cache content. LCE (Leave Copy Everywhere) has been known as a generic cache decision policy. However, because LCE caches at all the intermediate nodes, the cache of intermediate nodes can be duplicated. Therefore, various cache decision policies that eliminate redundancy have been proposed. In this paper, we evaluate the effect of the cache decision policies on QoE of video and audio transmission in ICN/CCN. We assess application-level QoS using a computer simulation with a tree network and QoE by means of subjective experiment.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125703635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Channel Sounding Measurements for 5G Campus Networks in Industrial Environments 工业环境下5G校园网信道探测测量
Pub Date : 2022-11-30 DOI: 10.1109/ITNAC55475.2022.9998355
M. Knitter, R. Kays
To allow 5G deployments in challenging environments and for special use cases like 5G radio positioning, authorities reserve a part of the radio spectrum for privately owned campus networks. Such deployments require a characterization of the communication channel in the specific environment to fit to application requirements. This paper presents results on a channel sounding measurement series in an industrial environment. The sounding approach, based on 5G wideband downlink test signal channel estimation, only uses widely available equipment and may serve as a template for easy but efficient channel sounding in such environments. The arriving measurement results give some insights on special challenges regarding network coverage and radio positioning in industrial environments.
为了允许5G在具有挑战性的环境中部署,以及5G无线电定位等特殊用例,当局为私有校园网保留了一部分无线电频谱。这样的部署需要对特定环境中的通信通道进行表征,以适应应用程序需求。本文介绍了在工业环境下通道测深系列测量的结果。基于5G宽带下行测试信号信道估计的探测方法只使用广泛可用的设备,可以作为在这种环境下简单而高效的信道探测模板。到达的测量结果对工业环境中网络覆盖和无线电定位的特殊挑战提供了一些见解。
{"title":"Channel Sounding Measurements for 5G Campus Networks in Industrial Environments","authors":"M. Knitter, R. Kays","doi":"10.1109/ITNAC55475.2022.9998355","DOIUrl":"https://doi.org/10.1109/ITNAC55475.2022.9998355","url":null,"abstract":"To allow 5G deployments in challenging environments and for special use cases like 5G radio positioning, authorities reserve a part of the radio spectrum for privately owned campus networks. Such deployments require a characterization of the communication channel in the specific environment to fit to application requirements. This paper presents results on a channel sounding measurement series in an industrial environment. The sounding approach, based on 5G wideband downlink test signal channel estimation, only uses widely available equipment and may serve as a template for easy but efficient channel sounding in such environments. The arriving measurement results give some insights on special challenges regarding network coverage and radio positioning in industrial environments.","PeriodicalId":205731,"journal":{"name":"2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)","volume":"30 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113936829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 32nd International Telecommunication Networks and Applications Conference (ITNAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1