首页 > 最新文献

2022 IEEE 47th Conference on Local Computer Networks (LCN)最新文献

英文 中文
Unobtrusive Mechanism Interception 非突兀机制拦截
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843536
Patrick Lampe, Markus Sommer, Artur Sterz, Jonas Hochst, Christian Uhl, Bernd Freisleben
Networked systems and applications are often based on proprietary hardware/software components that manufacturers might not be willing to adapt or update if new requirements arise. We present mechanism interception, a novel approach to unobtrusively add or modify functionality to/of an existing networked system or application without touching any proprietary components. Behavioral changes are achieved by functionality-enhancing yet unobtrusive interceptors, i.e., components introduced between systems and their environments adding or updating mechanisms. We illustrate our approach by unobtrusively adding a vertical handover mechanism between Wi-Fi and LTE to a mobile end device without disconnecting TCP sessions. Our results indicate that mechanism interception is a compelling approach to achieve improved service quality and provide previously unavailable functionality.
网络系统和应用程序通常基于专有的硬件/软件组件,如果出现新的需求,制造商可能不愿意调整或更新这些组件。我们提出了机制拦截,这是一种新颖的方法,可以在不触及任何专有组件的情况下不显眼地向现有网络系统或应用程序添加或修改功能。行为改变是通过增强功能但不引人注目的拦截器实现的,例如,在系统及其环境之间引入的组件添加或更新机制。我们通过在移动终端设备上不引人注目地添加Wi-Fi和LTE之间的垂直切换机制来说明我们的方法,而不会断开TCP会话。我们的研究结果表明,机制拦截是一种引人注目的方法,可以提高服务质量并提供以前不可用的功能。
{"title":"Unobtrusive Mechanism Interception","authors":"Patrick Lampe, Markus Sommer, Artur Sterz, Jonas Hochst, Christian Uhl, Bernd Freisleben","doi":"10.1109/LCN53696.2022.9843536","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843536","url":null,"abstract":"Networked systems and applications are often based on proprietary hardware/software components that manufacturers might not be willing to adapt or update if new requirements arise. We present mechanism interception, a novel approach to unobtrusively add or modify functionality to/of an existing networked system or application without touching any proprietary components. Behavioral changes are achieved by functionality-enhancing yet unobtrusive interceptors, i.e., components introduced between systems and their environments adding or updating mechanisms. We illustrate our approach by unobtrusively adding a vertical handover mechanism between Wi-Fi and LTE to a mobile end device without disconnecting TCP sessions. Our results indicate that mechanism interception is a compelling approach to achieve improved service quality and provide previously unavailable functionality.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132900249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deficit Round-Robin: Network Calculus based Worst-Case Traversal Time Analysis Revisited 赤字轮循:基于网络演算的最坏情况遍历时间分析
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843526
Aakash Soni, Jean-Luc Scharbarg
Deficit Round-Robin (DRR) is a promising service discipline for real-time Ethernet without a global synchronisation. Two improved Network Calculus approaches have been proposed to provide the required bounds on end-to-end delays. The first one is fast but can be optimistic for cornet cases. The second one is safe but highly time consuming. In this paper, we remove the potential optimism of the first approach while keeping its low complexity.
赤字轮询(DRR)是一种很有前途的无全局同步的实时以太网服务规程。提出了两种改进的网络演算方法来提供端到端延迟所需的边界。第一种方法比较快,但对短号的情况可能比较乐观。第二种方法是安全的,但非常耗时。在本文中,我们消除了第一种方法的潜在乐观性,同时保持了其低复杂度。
{"title":"Deficit Round-Robin: Network Calculus based Worst-Case Traversal Time Analysis Revisited","authors":"Aakash Soni, Jean-Luc Scharbarg","doi":"10.1109/LCN53696.2022.9843526","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843526","url":null,"abstract":"Deficit Round-Robin (DRR) is a promising service discipline for real-time Ethernet without a global synchronisation. Two improved Network Calculus approaches have been proposed to provide the required bounds on end-to-end delays. The first one is fast but can be optimistic for cornet cases. The second one is safe but highly time consuming. In this paper, we remove the potential optimism of the first approach while keeping its low complexity.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124922687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Packet Classification with Field Missing 基于字段缺失的鲁棒分组分类
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843560
Jiayao Wang, Ziling Wei, Baosheng Wang, Bao-kang Zhao, Jincheng Zhong
Packet classification shows a key role in kinds of network functions, such as access control, routing, and quality of service (QoS). With the rapid growth of the network size, users have to ignore some fields in packet classification due to resource constraints. In addition, some fields may not always be available in some networks. However, traditional packet classification algorithms can hardly handle packet classification if some fields are missing. In this paper, we propose a novel model to build a robust classifier. In the classifier, we utilize the advantage of Recursive Flow Classification (RFC) in handling fields concurrently. Then, we design a new workflow to deal with field missing based on flows. In addition, two complementary bitmap models are designed to accelerate matching packets to flows, and a buffer mechanism is introduced to further improve the classification accuracy. Our experiments show that the proposed classifier can classify packets with an accuracy of 94%-99.5% when the field missing probability is lower than 0.3.
报文分类在访问控制、路由和服务质量(QoS)等网络功能中发挥着关键作用。随着网络规模的快速增长,由于资源的限制,用户不得不忽略包分类中的一些字段。此外,在某些网络中,有些字段可能并不总是可用的。然而,传统的包分类算法在缺少某些字段的情况下很难进行包分类。在本文中,我们提出了一个新的模型来建立一个鲁棒分类器。在分类器中,我们利用递归流分类(RFC)在并发处理字段方面的优势。然后,我们设计了一个新的基于流程的字段缺失处理流程。此外,设计了两个互补的位图模型来加速数据包与流的匹配,并引入了缓冲机制来进一步提高分类精度。实验表明,当字段缺失概率小于0.3时,本文提出的分类器对数据包的分类准确率为94%-99.5%。
{"title":"Robust Packet Classification with Field Missing","authors":"Jiayao Wang, Ziling Wei, Baosheng Wang, Bao-kang Zhao, Jincheng Zhong","doi":"10.1109/LCN53696.2022.9843560","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843560","url":null,"abstract":"Packet classification shows a key role in kinds of network functions, such as access control, routing, and quality of service (QoS). With the rapid growth of the network size, users have to ignore some fields in packet classification due to resource constraints. In addition, some fields may not always be available in some networks. However, traditional packet classification algorithms can hardly handle packet classification if some fields are missing. In this paper, we propose a novel model to build a robust classifier. In the classifier, we utilize the advantage of Recursive Flow Classification (RFC) in handling fields concurrently. Then, we design a new workflow to deal with field missing based on flows. In addition, two complementary bitmap models are designed to accelerate matching packets to flows, and a buffer mechanism is introduced to further improve the classification accuracy. Our experiments show that the proposed classifier can classify packets with an accuracy of 94%-99.5% when the field missing probability is lower than 0.3.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125096138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantifying the Quality Attenuation of WiFi 量化WiFi的质量衰减
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843690
Bjørn Ivar Teigen, N. Davies, K. Ellefsen, T. Skeie, J. Tørresen
WiFi is one of the most widely deployed networking technologies, and understanding WiFi performance is therefore of great importance. The WiFi MAC layer sometimes introduces significant and variable delays. No existing models of the WiFi protocol describe WiFi performance in terms of complete latency distributions. In this work, we present a novel model of WiFi performance. We explicitly define our model in terms of the latency introduced at each step in the protocol state machine, and the model produces complete latency distributions. We validate the model by comparing its outputs to previous modeling work and real-world measurements. Finally, we use our results to quantify the latency distribution of WiFi as a function of the duration of transmit opportunities and the number of stations competing for the channel. Quantifying this relation represents a significant improvement in our understanding of WiFi performance that would not be possible with existing models.
WiFi是最广泛部署的网络技术之一,因此了解WiFi性能非常重要。WiFi MAC层有时会引入显著的可变延迟。现有的WiFi协议模型都没有从完全延迟分布的角度来描述WiFi性能。在这项工作中,我们提出了一个新的WiFi性能模型。我们根据协议状态机中每一步引入的延迟显式地定义了我们的模型,并且该模型产生了完整的延迟分布。我们通过将其输出与之前的建模工作和实际测量结果进行比较来验证模型。最后,我们使用我们的结果来量化WiFi的延迟分布,作为传输机会持续时间和竞争信道的电台数量的函数。量化这种关系代表了我们对WiFi性能的理解的重大改进,这在现有模型中是不可能的。
{"title":"Quantifying the Quality Attenuation of WiFi","authors":"Bjørn Ivar Teigen, N. Davies, K. Ellefsen, T. Skeie, J. Tørresen","doi":"10.1109/LCN53696.2022.9843690","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843690","url":null,"abstract":"WiFi is one of the most widely deployed networking technologies, and understanding WiFi performance is therefore of great importance. The WiFi MAC layer sometimes introduces significant and variable delays. No existing models of the WiFi protocol describe WiFi performance in terms of complete latency distributions. In this work, we present a novel model of WiFi performance. We explicitly define our model in terms of the latency introduced at each step in the protocol state machine, and the model produces complete latency distributions. We validate the model by comparing its outputs to previous modeling work and real-world measurements. Finally, we use our results to quantify the latency distribution of WiFi as a function of the duration of transmit opportunities and the number of stations competing for the channel. Quantifying this relation represents a significant improvement in our understanding of WiFi performance that would not be possible with existing models.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Robust Monte-Carlo-Based Deep Learning Strategy for Virtual Network Embedding 一种鲁棒的蒙特卡罗深度学习虚拟网络嵌入策略
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843683
G. Dandachi, Anouar Rkhami, Y. H. Aoul, A. Outtagarts
Network slicing is one of the building blocks in Zero Touch Networks. It mainly consists in a dynamic deployment of services in a substrate network. However, the Virtual Network Embedding (VNE) algorithms used generally follow a static mechanism, which results in sub-optimal embedding strategies and less robust decisions. Some reinforcement learning algorithms have been conceived for a dynamic decision, while being time-costly. In this paper, we propose a combination of deep Q-Network and a Monte Carlo (MC) approach. The idea is to learn, using DQN, a distribution of the placement solution, on which a MC-based search technique is applied. This improves the solution space exploration, and achieves a faster convergence of the placement decision, and thus a safer learning. The obtained results show that DQN with only 8 MC iterations achieves up to 44% improvement compared with a baseline First-Fit strategy, and up to 15% compared to a MC strategy.
网络切片是零接触网络的基石之一。它主要包括在底层网络中动态部署业务。然而,所使用的虚拟网络嵌入(VNE)算法通常遵循静态机制,导致嵌入策略次优且决策鲁棒性较差。一些强化学习算法已经被设想为一个动态决策,而时间昂贵。在本文中,我们提出了一种深度q网络和蒙特卡罗(MC)方法的结合。这个想法是学习,使用DQN,一个分布的安置解决方案,在此基础上,一个基于mc的搜索技术应用。这改进了解空间探索,实现了更快的布局决策收敛,从而实现了更安全的学习。获得的结果表明,与基线First-Fit策略相比,只有8个MC迭代的DQN实现了高达44%的改进,与MC策略相比,高达15%的改进。
{"title":"A Robust Monte-Carlo-Based Deep Learning Strategy for Virtual Network Embedding","authors":"G. Dandachi, Anouar Rkhami, Y. H. Aoul, A. Outtagarts","doi":"10.1109/LCN53696.2022.9843683","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843683","url":null,"abstract":"Network slicing is one of the building blocks in Zero Touch Networks. It mainly consists in a dynamic deployment of services in a substrate network. However, the Virtual Network Embedding (VNE) algorithms used generally follow a static mechanism, which results in sub-optimal embedding strategies and less robust decisions. Some reinforcement learning algorithms have been conceived for a dynamic decision, while being time-costly. In this paper, we propose a combination of deep Q-Network and a Monte Carlo (MC) approach. The idea is to learn, using DQN, a distribution of the placement solution, on which a MC-based search technique is applied. This improves the solution space exploration, and achieves a faster convergence of the placement decision, and thus a safer learning. The obtained results show that DQN with only 8 MC iterations achieves up to 44% improvement compared with a baseline First-Fit strategy, and up to 15% compared to a MC strategy.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124313452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Incentive-based Resource Allocation for Mobile Edge Learning 基于激励的移动边缘学习资源分配
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843405
Mhd Saria Allahham, Amr Mohamed, H. Hassanein
Mobile Edge Learning (MEL) is a learning paradigm that facilitates training of Machine Learning (ML) models over resource-constrained edge devices. MEL consists of an orchestrator, which represents the model owner of the learning task, and learners, which own the data locally. Enabling the learning process requires the model owner to motivate learners to train the ML model on their local data and allocate sufficient resources. The time limitations and the possible existence of multiple orchestrators open the doors for the resource allocation problem. As such, we model the incentive mechanism and resource allocation as a multi-round Stackelberg game, and propose a Payment-based Time Allocation (PBTA) algorithm to solve the game. In PBTA, orchestrators first determine the pricing, then the learners allocate each orchestrator a timeslot and determine the amount of data and resources for each orchestrator. Finally, we evaluate the PBTA performance and compare it against a recent state-of-the-art approach.
移动边缘学习(MEL)是一种学习范式,有助于在资源受限的边缘设备上训练机器学习(ML)模型。MEL由协调器和学习者组成,前者代表学习任务的模型所有者,后者在本地拥有数据。实现学习过程需要模型所有者激励学习者在其本地数据上训练ML模型并分配足够的资源。时间限制和可能存在的多个协调器为资源分配问题打开了大门。因此,我们将激励机制和资源分配建模为多轮Stackelberg博弈,并提出了一种基于支付的时间分配(PBTA)算法来求解该博弈。在PBTA中,编排者首先确定定价,然后学习者为每个编排者分配一个时间段,并为每个编排者确定数据和资源的数量。最后,我们评估了PBTA的性能,并将其与最近最先进的方法进行了比较。
{"title":"Incentive-based Resource Allocation for Mobile Edge Learning","authors":"Mhd Saria Allahham, Amr Mohamed, H. Hassanein","doi":"10.1109/LCN53696.2022.9843405","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843405","url":null,"abstract":"Mobile Edge Learning (MEL) is a learning paradigm that facilitates training of Machine Learning (ML) models over resource-constrained edge devices. MEL consists of an orchestrator, which represents the model owner of the learning task, and learners, which own the data locally. Enabling the learning process requires the model owner to motivate learners to train the ML model on their local data and allocate sufficient resources. The time limitations and the possible existence of multiple orchestrators open the doors for the resource allocation problem. As such, we model the incentive mechanism and resource allocation as a multi-round Stackelberg game, and propose a Payment-based Time Allocation (PBTA) algorithm to solve the game. In PBTA, orchestrators first determine the pricing, then the learners allocate each orchestrator a timeslot and determine the amount of data and resources for each orchestrator. Finally, we evaluate the PBTA performance and compare it against a recent state-of-the-art approach.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130314043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing MPTCP Connections: A Solution for Distributed NIDS Environments 保护MPTCP连接:分布式NIDS环境的解决方案
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843271
João Pedro Meira, Rui Pedro C. Monteiro, J. M. Silva
With continuous technological advancement, multihomed devices are becoming common. They can connect simultaneously to multiple networks through different interfaces. However, since TCP sessions are bound to one interface per device, it hampers applications from taking advantage of all the available connected networks. This has been solved by MPTCP, introduced as a seamless extension to TCP, allowing more reliable sessions and enhanced throughput. However, MPTCP comes with an inherent risk, as it becomes easier to fragment attacks towards evading NIDS. This paper presents a study of how MPTCP can be used to evade NIDS through simple cross-path attacks. It also introduces tools to facilitate assessing MPTCP-based services in diverse network topologies using an emulation environment. Finally, a new solution is proposed to prevent cross-path attacks through uncoordinated networks. This solution consists of a host-level plugin that allows MPTCP sessions only through trusted networks, even in the presence of a NAT.
随着技术的不断进步,多主设备变得越来越普遍。它们可以通过不同的接口同时连接到多个网络。然而,由于TCP会话绑定到每个设备的一个接口,它阻碍了应用程序利用所有可用的连接网络。MPTCP解决了这个问题,它作为TCP的无缝扩展引入,允许更可靠的会话和增强的吞吐量。然而,MPTCP带有固有的风险,因为它变得更容易将攻击碎片化以逃避NIDS。本文介绍了如何使用MPTCP通过简单的跨路径攻击来逃避NIDS的研究。本文还介绍了一些工具,以便使用仿真环境在不同的网络拓扑中评估基于mptcp的服务。最后,提出了一种防止非协调网络跨路径攻击的新方案。该解决方案由一个主机级插件组成,该插件只允许MPTCP会话通过可信网络,即使在存在NAT的情况下也是如此。
{"title":"Securing MPTCP Connections: A Solution for Distributed NIDS Environments","authors":"João Pedro Meira, Rui Pedro C. Monteiro, J. M. Silva","doi":"10.1109/LCN53696.2022.9843271","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843271","url":null,"abstract":"With continuous technological advancement, multihomed devices are becoming common. They can connect simultaneously to multiple networks through different interfaces. However, since TCP sessions are bound to one interface per device, it hampers applications from taking advantage of all the available connected networks. This has been solved by MPTCP, introduced as a seamless extension to TCP, allowing more reliable sessions and enhanced throughput. However, MPTCP comes with an inherent risk, as it becomes easier to fragment attacks towards evading NIDS. This paper presents a study of how MPTCP can be used to evade NIDS through simple cross-path attacks. It also introduces tools to facilitate assessing MPTCP-based services in diverse network topologies using an emulation environment. Finally, a new solution is proposed to prevent cross-path attacks through uncoordinated networks. This solution consists of a host-level plugin that allows MPTCP sessions only through trusted networks, even in the presence of a NAT.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115961764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encrypted Traffic Detection: Beyond the Port Number Era 加密流量检测:超越端口号时代
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843432
Hossein Doroud, Ahmad Alaswad, F. Dressler
Internet service providers (ISP) rely on network traffic classifiers to provide secure and reliable connectivity for their users. Encrypted traffic introduces a challenge as attacks are no longer viable using classic Deep Packet Inspection (DPI) techniques. Distinguishing encrypted from non-encrypted traffic is the first step in addressing this challenge. Several attempts have been conducted to identify encrypted traffic. In this work, we compare the detection performance of DPI, traffic pattern, and randomness tests to identify encrypted traffic in different levels of granularity. In an experimental study, we evaluate these candidates and show that a traffic pattern-based classifier outperforms others for encryption detection.
互联网服务提供商(ISP)依靠网络流量分类器为其用户提供安全可靠的连接。加密流量带来了挑战,因为使用经典的深度数据包检测(DPI)技术攻击不再可行。区分加密流量和非加密流量是解决这一挑战的第一步。已经进行了几次尝试来识别加密的流量。在这项工作中,我们比较了DPI、流量模式和随机性测试的检测性能,以识别不同粒度级别的加密流量。在一项实验研究中,我们评估了这些候选分类器,并表明基于流量模式的分类器在加密检测方面优于其他分类器。
{"title":"Encrypted Traffic Detection: Beyond the Port Number Era","authors":"Hossein Doroud, Ahmad Alaswad, F. Dressler","doi":"10.1109/LCN53696.2022.9843432","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843432","url":null,"abstract":"Internet service providers (ISP) rely on network traffic classifiers to provide secure and reliable connectivity for their users. Encrypted traffic introduces a challenge as attacks are no longer viable using classic Deep Packet Inspection (DPI) techniques. Distinguishing encrypted from non-encrypted traffic is the first step in addressing this challenge. Several attempts have been conducted to identify encrypted traffic. In this work, we compare the detection performance of DPI, traffic pattern, and randomness tests to identify encrypted traffic in different levels of granularity. In an experimental study, we evaluate these candidates and show that a traffic pattern-based classifier outperforms others for encryption detection.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121866232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Flexible ILDA Digital Network (IDN) Audio Streaming 一个灵活的ILDA数字网络(IDN)音频流的框架
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843411
M. Frank
This demo paper presents an update on ILDA (International Laser Display Association) audio stream specification in the context of the ILDA Digital Network (IDN). A framework of software elements is introduced to interface with audio hardware on a computer and other software that is able to handle multi-channel audio data. The demo will showcase the new elements in action and also will point out the interoperability to existing IDN elements.
本演示论文介绍了在ILDA数字网络(IDN)背景下ILDA(国际激光显示协会)音频流规范的更新。介绍了一种软件元素框架,用于与计算机上的音频硬件和其他能够处理多通道音频数据的软件进行接口。该演示将展示正在运行的新元素,并指出与现有IDN元素的互操作性。
{"title":"A Framework for Flexible ILDA Digital Network (IDN) Audio Streaming","authors":"M. Frank","doi":"10.1109/LCN53696.2022.9843411","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843411","url":null,"abstract":"This demo paper presents an update on ILDA (International Laser Display Association) audio stream specification in the context of the ILDA Digital Network (IDN). A framework of software elements is introduced to interface with audio hardware on a computer and other software that is able to handle multi-channel audio data. The demo will showcase the new elements in action and also will point out the interoperability to existing IDN elements.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125554370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable Water-Air Direct Wireless Communication: Kalman Filter-Assisted Deep Reinforcement Learning Approach 可靠的水气直接无线通信:卡尔曼滤波辅助深度强化学习方法
Pub Date : 2022-09-26 DOI: 10.1109/LCN53696.2022.9843503
Jinglong Wang, Hanjiang Luo, Rukhsana Ruby, Jiangang Liu, Kai Guo, Kaishun Wu
Optical wireless communication (OWC) is an emerging technology for direct communication through the water-air interface. However, due to the high directionality of optical beams and the harsh oceanic environment, it faces significant challenges to achieve the alignment and preserve the link availability, as the waves cause beam deflection and the mobility of the transceivers makes the link worse. To tackle these challenges and achieve reliable optical communication between autonomous underwater vehicles and unmanned aerial vehicles, we propose a deep reinforcement learning algorithm assisted by an extended Kalman filter to solve the alignment issue. To improve the reliability of communication, we present an algorithm to obtain the optimal beam divergence angle to maximize the link availability. The numerical simulations demonstrate that the proposed scheme achieves better performance in terms of energy consumption and alignment accuracy, and the link availability is increased by 25% compared to that without adjustment.
光无线通信(OWC)是一种通过水-空气接口直接通信的新兴技术。然而,由于光束的高方向性和恶劣的海洋环境,由于波浪引起光束偏转和收发器的移动性使链路恶化,因此实现对准和保持链路可用性面临着重大挑战。为了解决这些挑战并实现自主水下航行器和无人机之间可靠的光通信,我们提出了一种扩展卡尔曼滤波器辅助的深度强化学习算法来解决对准问题。为了提高通信的可靠性,提出了一种获取最佳波束发散角的算法,使链路可用性最大化。数值仿真结果表明,该方案在能量消耗和对准精度方面取得了更好的性能,链路可用性比未调整时提高了25%。
{"title":"Reliable Water-Air Direct Wireless Communication: Kalman Filter-Assisted Deep Reinforcement Learning Approach","authors":"Jinglong Wang, Hanjiang Luo, Rukhsana Ruby, Jiangang Liu, Kai Guo, Kaishun Wu","doi":"10.1109/LCN53696.2022.9843503","DOIUrl":"https://doi.org/10.1109/LCN53696.2022.9843503","url":null,"abstract":"Optical wireless communication (OWC) is an emerging technology for direct communication through the water-air interface. However, due to the high directionality of optical beams and the harsh oceanic environment, it faces significant challenges to achieve the alignment and preserve the link availability, as the waves cause beam deflection and the mobility of the transceivers makes the link worse. To tackle these challenges and achieve reliable optical communication between autonomous underwater vehicles and unmanned aerial vehicles, we propose a deep reinforcement learning algorithm assisted by an extended Kalman filter to solve the alignment issue. To improve the reliability of communication, we present an algorithm to obtain the optimal beam divergence angle to maximize the link availability. The numerical simulations demonstrate that the proposed scheme achieves better performance in terms of energy consumption and alignment accuracy, and the link availability is increased by 25% compared to that without adjustment.","PeriodicalId":303965,"journal":{"name":"2022 IEEE 47th Conference on Local Computer Networks (LCN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115668330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE 47th Conference on Local Computer Networks (LCN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1