首页 > 最新文献

Proceedings of the 16th International Conference on Distributed Computing and Networking最新文献

英文 中文
Optimally Resilient Asynchronous MPC with Linear Communication Complexity 具有线性通信复杂度的最佳弹性异步MPC
Ashish Choudhury, A. Patra
We present a secure asynchronous multiparty computation (AMPC) protocol with optimal resilience, involving n = 3t + 1 parties and tolerating a computationally bounded static adversary, capable of corrupting upto t parties. For a security parameter k and for circuits of sufficiently large size, our protocol has an amortized communication complexity of O(cMnk) bits, where cM denotes the number of multiplication gates in the arithmetic circuit, representing the function to be computed. Prior to our work, the most efficient optimally resilient, computationally secure AMPC protocol was due to Hirt et al. (ICALP 2008). The protocol offers an amortized communication complexity of O(cMn2k) bits. Our protocol follows the standard offline-online paradigm. In the offline phase, the parties produce encryptions of random multiplication triples. These are used to securely evaluate the multiplication gates in the online phase, using Beaver's circuit-randomization technique (CRYPTO 1991). The offline protocol of earlier works deploy linearly homomorphic encryption schemes. Our offline phase is much simpler and more efficient than the existing protocols and uses linearly homomorphic encryption scheme with support for one homomorphic multiplication.
我们提出了一种具有最佳弹性的安全异步多方计算(AMPC)协议,涉及n = 3t + 1方,并允许计算有限的静态对手,能够破坏多达t方。对于安全参数k和足够大的电路,我们的协议具有O(cMnk)位的平摊通信复杂度,其中cM表示算术电路中的乘法门的数量,表示要计算的函数。在我们的工作之前,最有效的最佳弹性,计算安全的AMPC协议是由于Hirt等人(ICALP 2008)。该协议的平摊通信复杂度为0 (cMn2k)位。我们的协议遵循标准的离线-在线模式。在脱机阶段,双方生成随机乘法三元组的加密。这些用于在线阶段安全地评估乘法门,使用Beaver的电路随机化技术(CRYPTO 1991)。早期工作的离线协议采用线性同态加密方案。我们的离线阶段比现有协议更简单、更高效,并使用支持一次同态乘法的线性同态加密方案。
{"title":"Optimally Resilient Asynchronous MPC with Linear Communication Complexity","authors":"Ashish Choudhury, A. Patra","doi":"10.1145/2684464.2684470","DOIUrl":"https://doi.org/10.1145/2684464.2684470","url":null,"abstract":"We present a secure asynchronous multiparty computation (AMPC) protocol with optimal resilience, involving n = 3t + 1 parties and tolerating a computationally bounded static adversary, capable of corrupting upto t parties. For a security parameter k and for circuits of sufficiently large size, our protocol has an amortized communication complexity of O(cMnk) bits, where cM denotes the number of multiplication gates in the arithmetic circuit, representing the function to be computed. Prior to our work, the most efficient optimally resilient, computationally secure AMPC protocol was due to Hirt et al. (ICALP 2008). The protocol offers an amortized communication complexity of O(cMn2k) bits. Our protocol follows the standard offline-online paradigm. In the offline phase, the parties produce encryptions of random multiplication triples. These are used to securely evaluate the multiplication gates in the online phase, using Beaver's circuit-randomization technique (CRYPTO 1991). The offline protocol of earlier works deploy linearly homomorphic encryption schemes. Our offline phase is much simpler and more efficient than the existing protocols and uses linearly homomorphic encryption scheme with support for one homomorphic multiplication.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115599337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Distributed and Predictive-Preventive Defense Against DDoS Attacks 分布式预防DDoS攻击防御
Manjiri Jog, M. Natu, S. Shelke
Distributed Denial of Service (DDoS) attacks are a perpetual threat to today's business. Existing strategies against DDoS are implemented as single-point solutions, or reactive solutions, or focus on differentiating traffic and localizing attackers. Our understanding is that no single network location can cater to the needs of a full-proof defense solution. In this paper we propose a solution based on two principles -- 'distributed defense for distributed attack' and 'need for a preventive solution over a reactive solution'. We present a system architecture for distributed and predictive-preventive defense mechanism. We also propose two algorithms for systematic placement of the defense nodes in the victim's upstream router network. We compare the performance and efficiency of the proposed algorithms through simulation results. We also present an algorithmic approach for prediction of attack to determine the potential attackers as well as the time-to-saturation of victim. We present experimental evaluation to show the effectiveness of the proposed approach.
分布式拒绝服务(DDoS)攻击是当今企业面临的一个永久威胁。现有的DDoS防御策略主要是单点解决方案、响应式解决方案,或者侧重于区分流量和攻击者的本地化。我们的理解是,没有一个单一的网络位置可以满足全面防御解决方案的需求。在本文中,我们提出了一个基于两个原则的解决方案——“分布式防御分布式攻击”和“需要预防性解决方案而不是反应性解决方案”。提出了一种分布式预测预防防御机制的体系结构。我们还提出了两种算法,用于在受害者的上游路由器网络中系统地放置防御节点。通过仿真结果比较了所提算法的性能和效率。我们还提出了一种预测攻击的算法方法,以确定潜在的攻击者以及受害者的饱和时间。我们提出了实验评估来证明所提出方法的有效性。
{"title":"Distributed and Predictive-Preventive Defense Against DDoS Attacks","authors":"Manjiri Jog, M. Natu, S. Shelke","doi":"10.1145/2684464.2684503","DOIUrl":"https://doi.org/10.1145/2684464.2684503","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are a perpetual threat to today's business. Existing strategies against DDoS are implemented as single-point solutions, or reactive solutions, or focus on differentiating traffic and localizing attackers. Our understanding is that no single network location can cater to the needs of a full-proof defense solution. In this paper we propose a solution based on two principles -- 'distributed defense for distributed attack' and 'need for a preventive solution over a reactive solution'. We present a system architecture for distributed and predictive-preventive defense mechanism. We also propose two algorithms for systematic placement of the defense nodes in the victim's upstream router network. We compare the performance and efficiency of the proposed algorithms through simulation results. We also present an algorithmic approach for prediction of attack to determine the potential attackers as well as the time-to-saturation of victim. We present experimental evaluation to show the effectiveness of the proposed approach.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124952270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Polyhedral Approach for Lifetime Maximization of Target Coverage Problem 目标覆盖问题寿命最大化的多面体方法
A. K. Pujari, S. Mini, Trideba Padhi, Prabhanjan Sahoo
MLTCP (Maximum Lifetime Target Coverage Problem) aims at providing required coverage to a set of targets maximizing the lifetime of wireless sensor network. The problem is known to be computationally hard and it is shown recently that MLTCP exhibits phase-transition phenomenon. The region of occurrences of hard instances is identified in terms of an interval of values of sensing-range. Most of the earlier heuristics report their empirical analyses on instances that are outside this region. There has not been any algorithm proposed so far to handle particularly hard instances. In the present work, we provide a new insight to MLTCP by studying the structure of polyhedral feasible set and propose a heuristic that distinguishes hard instances from solvable cases. The proposed method yields best-ever near-optimal solution and indicates situations when the given problem instance is hard. Considering the linear programming formulation of MLTCP, the algorithm can be viewed as traversal from one BFS (Basic Feasible Solution) to another nonadjacent BFS with non-decreasing value of the objective function. It is shown that high degree of degeneracy of BFS and cycling make the problem hard. When the algorithm encounters a non-trivial cycle, our method uses a novel way of generating an improved feasible solution (not a BFS) by moving away from BFS search. Experimental results confirm that the proposed method achieves the optimal solution for easy instances and gives best-ever near-optimal solution for hard instances.
MLTCP (Maximum Lifetime Target Coverage Problem)是指在无线传感器网络中,为一组目标提供所需的覆盖范围,从而使无线传感器网络的生命周期最大化。这个问题在计算上是困难的,最近的研究表明MLTCP表现出相变现象。硬实例的发生区域是根据传感范围值的间隔来确定的。大多数早期的启发式报告了他们对该区域以外实例的经验分析。到目前为止,还没有提出任何算法来处理特别困难的实例。本文通过对多面体可行集结构的研究,为MLTCP问题提供了新的认识,并提出了一种区分难解实例和可解实例的启发式方法。所提出的方法产生有史以来最好的接近最优解,并指出给定问题实例困难的情况。考虑到MLTCP的线性规划形式,该算法可以看作是从一个基本可行解(BFS)遍历到另一个目标函数值非递减的非相邻BFS。结果表明,BFS的高度简并和循环使问题变得困难。当算法遇到非平凡循环时,我们的方法使用一种新颖的方法,通过远离BFS搜索来生成改进的可行解(不是BFS)。实验结果表明,该方法在简单实例中得到了最优解,在困难实例中给出了最好的近似最优解。
{"title":"Polyhedral Approach for Lifetime Maximization of Target Coverage Problem","authors":"A. K. Pujari, S. Mini, Trideba Padhi, Prabhanjan Sahoo","doi":"10.1145/2684464.2684495","DOIUrl":"https://doi.org/10.1145/2684464.2684495","url":null,"abstract":"MLTCP (Maximum Lifetime Target Coverage Problem) aims at providing required coverage to a set of targets maximizing the lifetime of wireless sensor network. The problem is known to be computationally hard and it is shown recently that MLTCP exhibits phase-transition phenomenon. The region of occurrences of hard instances is identified in terms of an interval of values of sensing-range. Most of the earlier heuristics report their empirical analyses on instances that are outside this region. There has not been any algorithm proposed so far to handle particularly hard instances. In the present work, we provide a new insight to MLTCP by studying the structure of polyhedral feasible set and propose a heuristic that distinguishes hard instances from solvable cases. The proposed method yields best-ever near-optimal solution and indicates situations when the given problem instance is hard. Considering the linear programming formulation of MLTCP, the algorithm can be viewed as traversal from one BFS (Basic Feasible Solution) to another nonadjacent BFS with non-decreasing value of the objective function. It is shown that high degree of degeneracy of BFS and cycling make the problem hard. When the algorithm encounters a non-trivial cycle, our method uses a novel way of generating an improved feasible solution (not a BFS) by moving away from BFS search. Experimental results confirm that the proposed method achieves the optimal solution for easy instances and gives best-ever near-optimal solution for hard instances.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122913737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
OPCAM: Optimal Algorithms Implementing Causal Memories in Shared Memory Systems OPCAM:在共享内存系统中实现因果记忆的最优算法
Min Shen, A. Kshemkalyani, T. Hsu
Data replication is commonly used for fault tolerance in reliable distributed systems. In this paper, we propose three optimal protocols for causal consistency in distributed shared memory systems. Our proposed optimal protocols are designed for partial replication across the distributed shared memory. Complete replication is a special case of our protocols and we also give the optimal implementation of causal consistency for the complete replication case. Algorithm Full-Track is optimal in the sense that it can update the local copy as soon as possible while respecting causal consistency. Algorithm Opt-Track is further optimal in the sense that the size of the local logs maintained and the amount of control information piggybacked on the update messages is minimal. Algorithm Opt-Track-CRP is a special case of algorithm Opt-Track for the full replication case. It is highly scalable, and significantly more efficient than the Baldoni et al. protocol for the complete replication case.
数据复制通常用于可靠的分布式系统中的容错。本文提出了分布式共享内存系统中三种最优的因果一致性协议。我们提出的最优协议是为跨分布式共享内存的部分复制而设计的。完全复制是我们协议的一种特殊情况,我们也给出了完全复制情况下因果一致性的最佳实现。Full-Track算法在尊重因果一致性的前提下能够尽快更新本地副本,是最优算法。Algorithm Opt-Track在维护的本地日志的大小和承载在更新消息上的控制信息的数量最小的意义上是进一步优化的。Opt-Track- crp算法是Opt-Track算法在完全复制情况下的特殊情况。它具有高度可扩展性,并且在完整复制情况下比Baldoni等人的协议更有效。
{"title":"OPCAM: Optimal Algorithms Implementing Causal Memories in Shared Memory Systems","authors":"Min Shen, A. Kshemkalyani, T. Hsu","doi":"10.1145/2684464.2684483","DOIUrl":"https://doi.org/10.1145/2684464.2684483","url":null,"abstract":"Data replication is commonly used for fault tolerance in reliable distributed systems. In this paper, we propose three optimal protocols for causal consistency in distributed shared memory systems. Our proposed optimal protocols are designed for partial replication across the distributed shared memory. Complete replication is a special case of our protocols and we also give the optimal implementation of causal consistency for the complete replication case. Algorithm Full-Track is optimal in the sense that it can update the local copy as soon as possible while respecting causal consistency. Algorithm Opt-Track is further optimal in the sense that the size of the local logs maintained and the amount of control information piggybacked on the update messages is minimal. Algorithm Opt-Track-CRP is a special case of algorithm Opt-Track for the full replication case. It is highly scalable, and significantly more efficient than the Baldoni et al. protocol for the complete replication case.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116598051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An integrated routing and offset-time adaptation scheme for OBS network 一种OBS网络的综合路由和偏移时间自适应方案
S. Choudhury, Vivek Nair, Jaydeep Howlader, B. Choudhury, A. K. Mal
Optical burst switching (OBS) is considered as one of the most potential technology for implementation of transparent optical Internet in near future. In this paper we propose an integrated scheme for loss reduction and efficient resource utilization in OBS. We develop a framework for computation of estimated space-time loss surface in space-time plane for a burst over the network and utilise it to determine the most appropriate route and corresponding offset-time for the burst. The integrated routing and offset-time adaptation scheme proposed here, can simultaneously offer significantly lower burst loss rate and higher network-wide resource utilisation.
光突发交换(OBS)被认为是在不久的将来实现透明光互联网最有潜力的技术之一。在本文中,我们提出了一种减少损耗和有效利用OBS资源的综合方案。我们开发了一个计算网络突发时空平面上估计时空损失面的框架,并利用它来确定突发最合适的路由和相应的偏移时间。本文提出的综合路由和偏移时间自适应方案可以显著降低突发损失率和提高全网资源利用率。
{"title":"An integrated routing and offset-time adaptation scheme for OBS network","authors":"S. Choudhury, Vivek Nair, Jaydeep Howlader, B. Choudhury, A. K. Mal","doi":"10.1145/2684464.2684488","DOIUrl":"https://doi.org/10.1145/2684464.2684488","url":null,"abstract":"Optical burst switching (OBS) is considered as one of the most potential technology for implementation of transparent optical Internet in near future. In this paper we propose an integrated scheme for loss reduction and efficient resource utilization in OBS. We develop a framework for computation of estimated space-time loss surface in space-time plane for a burst over the network and utilise it to determine the most appropriate route and corresponding offset-time for the burst. The integrated routing and offset-time adaptation scheme proposed here, can simultaneously offer significantly lower burst loss rate and higher network-wide resource utilisation.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129028805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reducing Aborts in Distributed Transactional Systems through Dependency Detection 通过依赖检测减少分布式事务系统中的中断
Bo Zhang, B. Ravindran, R. Palmieri
Existing distributed transactional system execution model based on globally-consistent contention management policies may abort many transactions that could potentially commit without violating correctness. To reduce unnecessary aborts and increase concurrency, we propose the distributed dependency-aware (DDA) model, which adopts different conflicting resolution strategies for different transactions. In the DDA model, the concurrency of transactions is enhanced by ensuring that read-only and write-only transactions never abort, through established precedence relations with other transactions. Non-write-only update transactions are handled through a contention management policy. We identify the inherent limitations in establishing precedence relations in distributed transactional systems and propose their solutions. We present a set of algorithms to support the DDA model, then we prove the correctness and permissiveness of the DDA model and show that it supports invisible reads and efficiently garbage collects useless object versions.
现有的基于全局一致争用管理策略的分布式事务系统执行模型可能会中止许多可能在不违反正确性的情况下提交的事务。为了减少不必要的中断和提高并发性,我们提出了分布式依赖感知(DDA)模型,该模型对不同的事务采用不同的冲突解决策略。在DDA模型中,通过与其他事务建立优先关系,确保只读和只写事务永远不会中止,从而增强了事务的并发性。非只写更新事务通过争用管理策略处理。我们确定了在分布式事务系统中建立优先关系的固有限制,并提出了解决方案。提出了一套支持DDA模型的算法,证明了DDA模型的正确性和容忍度,并证明了该模型支持不可见读取和有效的垃圾收集无用的对象版本。
{"title":"Reducing Aborts in Distributed Transactional Systems through Dependency Detection","authors":"Bo Zhang, B. Ravindran, R. Palmieri","doi":"10.1145/2684464.2684475","DOIUrl":"https://doi.org/10.1145/2684464.2684475","url":null,"abstract":"Existing distributed transactional system execution model based on globally-consistent contention management policies may abort many transactions that could potentially commit without violating correctness. To reduce unnecessary aborts and increase concurrency, we propose the distributed dependency-aware (DDA) model, which adopts different conflicting resolution strategies for different transactions. In the DDA model, the concurrency of transactions is enhanced by ensuring that read-only and write-only transactions never abort, through established precedence relations with other transactions. Non-write-only update transactions are handled through a contention management policy. We identify the inherent limitations in establishing precedence relations in distributed transactional systems and propose their solutions. We present a set of algorithms to support the DDA model, then we prove the correctness and permissiveness of the DDA model and show that it supports invisible reads and efficiently garbage collects useless object versions.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125252346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks NetSecuritas:面向企业网络的集成攻击图安全评估工具
Nirnay Ghosh, Ishan Chokshi, Mithun Sarkar, S. Ghosh, A. K. Kaushik, Sajal K. Das
Sophisticated cyber-attacks have become prominent with the growth of the Internet and web technology. Such attacks are multi-stage ones, and correlate vulnerabilities on intermediate hosts to compromise an otherwise well-protected critical resource. Conventional security assessment approaches can leave out some complex scenarios generated by these attacks. In the literature, these correlated attacks have been modeled using attack graphs. Although a few attack graph-based network security assessment tools are available, they are either commercial products or developed using proprietary databases. In this paper, we develop a customized tool, NetSecuritas, which implements a novel heuristic-based attack graph generation algorithm and integrates different phases of network security assessment. NetSecuritas leverages open-source libraries, tools and publicly available databases. A cost-driven mitigation strategy has also been proposed to generate network security recommendations. Experimental results establish the efficacy of both attack graph generation and mitigation approach.
随着互联网和网络技术的发展,复杂的网络攻击变得越来越突出。这种攻击是多阶段的,并将中间主机上的漏洞关联起来,从而危及原本受到良好保护的关键资源。传统的安全评估方法可能会忽略这些攻击产生的一些复杂场景。在文献中,这些相关的攻击已经使用攻击图建模。虽然有一些基于攻击图的网络安全评估工具可用,但它们要么是商业产品,要么是使用专有数据库开发的。在本文中,我们开发了一个定制工具NetSecuritas,它实现了一种新颖的基于启发式的攻击图生成算法,并集成了网络安全评估的不同阶段。NetSecuritas利用开源库、工具和公开可用的数据库。还提出了一项成本驱动的缓解战略,以产生网络安全建议。实验结果验证了攻击图生成和缓解方法的有效性。
{"title":"NetSecuritas: An Integrated Attack Graph-based Security Assessment Tool for Enterprise Networks","authors":"Nirnay Ghosh, Ishan Chokshi, Mithun Sarkar, S. Ghosh, A. K. Kaushik, Sajal K. Das","doi":"10.1145/2684464.2684494","DOIUrl":"https://doi.org/10.1145/2684464.2684494","url":null,"abstract":"Sophisticated cyber-attacks have become prominent with the growth of the Internet and web technology. Such attacks are multi-stage ones, and correlate vulnerabilities on intermediate hosts to compromise an otherwise well-protected critical resource. Conventional security assessment approaches can leave out some complex scenarios generated by these attacks. In the literature, these correlated attacks have been modeled using attack graphs. Although a few attack graph-based network security assessment tools are available, they are either commercial products or developed using proprietary databases. In this paper, we develop a customized tool, NetSecuritas, which implements a novel heuristic-based attack graph generation algorithm and integrates different phases of network security assessment. NetSecuritas leverages open-source libraries, tools and publicly available databases. A cost-driven mitigation strategy has also been proposed to generate network security recommendations. Experimental results establish the efficacy of both attack graph generation and mitigation approach.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125623180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Supporting Multiple Data Replication Models in Distributed Transactional Memory 支持分布式事务性内存中的多个数据复制模型
J. Silva, Tiago M. Vale, Ricardo J. Dias, Hervé Paulino, João M. Lourenço
Distributed transactional memory (DTM) presents itself as a highly expressive and programmer friendly model for concurrency control in distributed programming. Current DTM systems make use of both data distribution and replication as a way of providing scalability and fault tolerance, but both techniques have advantages and drawbacks. As such, each one is suitable for different target applications, and deployment environments. In this paper we address the support of different data replication models in DTM. To that end we propose ReDstm, a modular and non-intrusive framework for DTM, that supports multiple data replication models in a general purpose programming language (Java). We show its application in the implementation of distributed software transactional memories with different replication models, and evaluate the framework via a set of well-known benchmarks, analysing the impact of the different replication models on memory usage and transaction throughput.
分布式事务内存(Distributed transactional memory, DTM)是分布式编程中用于并发控制的一种表达能力强且程序员友好的模型。当前的DTM系统使用数据分发和复制作为提供可伸缩性和容错性的一种方式,但是这两种技术各有优缺点。因此,每一个都适用于不同的目标应用程序和部署环境。在本文中,我们讨论了DTM中对不同数据复制模型的支持。为此,我们提出了ReDstm,这是一个用于DTM的模块化和非侵入性框架,它支持使用通用编程语言(Java)的多个数据复制模型。我们展示了它在具有不同复制模型的分布式软件事务性内存实现中的应用,并通过一组众所周知的基准测试来评估该框架,分析了不同复制模型对内存使用和事务吞吐量的影响。
{"title":"Supporting Multiple Data Replication Models in Distributed Transactional Memory","authors":"J. Silva, Tiago M. Vale, Ricardo J. Dias, Hervé Paulino, João M. Lourenço","doi":"10.1145/2684464.2684481","DOIUrl":"https://doi.org/10.1145/2684464.2684481","url":null,"abstract":"Distributed transactional memory (DTM) presents itself as a highly expressive and programmer friendly model for concurrency control in distributed programming. Current DTM systems make use of both data distribution and replication as a way of providing scalability and fault tolerance, but both techniques have advantages and drawbacks. As such, each one is suitable for different target applications, and deployment environments. In this paper we address the support of different data replication models in DTM. To that end we propose ReDstm, a modular and non-intrusive framework for DTM, that supports multiple data replication models in a general purpose programming language (Java). We show its application in the implementation of distributed software transactional memories with different replication models, and evaluate the framework via a set of well-known benchmarks, analysing the impact of the different replication models on memory usage and transaction throughput.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134310283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Delay-aware TDMA Scheduling for Multi-Hop Wireless Networks 多跳无线网络延迟感知TDMA调度
Shanti Chilukuri, A. Sahoo
Time Division Multiple Access (TDMA)-based medium access control (MAC) protocols can be used to provide guaranteed quality of service (QoS). Since nodes follow a fixed schedule to transmit data, the schedule plays a major role in determining QoS in terms of delay, throughput etc. In this study, we focus on end-to-end delay and bandwidth utilization as the QoS parameters. We present a TDMA scheduling scheme that minimizes the end-to-end delay of data, while reusing time slots where possible. This is done by ordering the transmissions along a path such that the scheduling delay at intermediate nodes is minimized. The scheme results in end-to-end delay spanning multiple frames. However, because the TDMA frame length is minimized, the end-to-end delay is minimized while increasing the throughput. The proposed scheme uses a heuristic which has a complexity of O(n2), making it suitable for networks with a large number of nodes. We also present a simple distributed version of our heuristic. Simulation results show that our scheme performs better than previous work in literature in terms of end-to-end delay and slot reuse.
基于时分多址(TDMA)的介质访问控制(MAC)协议可以提供有保证的服务质量(QoS)。由于节点遵循固定的时间表来传输数据,因此该时间表在确定延迟、吞吐量等方面的QoS方面起着主要作用。在本研究中,我们将端到端延迟和带宽利用率作为QoS参数。我们提出了一种TDMA调度方案,该方案最小化了数据的端到端延迟,同时在可能的情况下重用时隙。这是通过沿着一条路径排序传输来实现的,这样中间节点的调度延迟就最小化了。该方案产生跨多帧的端到端延迟。然而,由于TDMA帧长度被最小化,端到端延迟被最小化,同时增加了吞吐量。该方案采用了复杂度为O(n2)的启发式算法,适用于节点数量较多的网络。我们还提供了一个简单的分布式启发式版本。仿真结果表明,该方案在端到端时延和时隙复用方面优于已有文献。
{"title":"Delay-aware TDMA Scheduling for Multi-Hop Wireless Networks","authors":"Shanti Chilukuri, A. Sahoo","doi":"10.1145/2684464.2684493","DOIUrl":"https://doi.org/10.1145/2684464.2684493","url":null,"abstract":"Time Division Multiple Access (TDMA)-based medium access control (MAC) protocols can be used to provide guaranteed quality of service (QoS). Since nodes follow a fixed schedule to transmit data, the schedule plays a major role in determining QoS in terms of delay, throughput etc. In this study, we focus on end-to-end delay and bandwidth utilization as the QoS parameters. We present a TDMA scheduling scheme that minimizes the end-to-end delay of data, while reusing time slots where possible. This is done by ordering the transmissions along a path such that the scheduling delay at intermediate nodes is minimized. The scheme results in end-to-end delay spanning multiple frames. However, because the TDMA frame length is minimized, the end-to-end delay is minimized while increasing the throughput. The proposed scheme uses a heuristic which has a complexity of O(n2), making it suitable for networks with a large number of nodes. We also present a simple distributed version of our heuristic. Simulation results show that our scheme performs better than previous work in literature in terms of end-to-end delay and slot reuse.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Yesquel: Scalable SQL storage for Web applications Yesquel:用于Web应用程序的可伸缩SQL存储
M. Aguilera, Joshua B. Leners, R. Kotla, Michael Walfish
Based on a brief history of the storage systems for Web applications, we motivate the need for a new storage system. We then describe the architecture of such a system, called Yesquel. Yesquel supports the sql query language and offers performance similar to nosql storage systems.
基于Web应用程序存储系统的简要历史,我们激发了对新存储系统的需求。然后,我们描述了这样一个系统的架构,称为Yesquel。Yesquel支持sql查询语言,提供类似于nosql存储系统的性能。
{"title":"Yesquel: Scalable SQL storage for Web applications","authors":"M. Aguilera, Joshua B. Leners, R. Kotla, Michael Walfish","doi":"10.1145/2684464.2684504","DOIUrl":"https://doi.org/10.1145/2684464.2684504","url":null,"abstract":"Based on a brief history of the storage systems for Web applications, we motivate the need for a new storage system. We then describe the architecture of such a system, called Yesquel. Yesquel supports the sql query language and offers performance similar to nosql storage systems.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Proceedings of the 16th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1