首页 > 最新文献

2018 International Symposium on Networks, Computers and Communications (ISNCC)最新文献

英文 中文
A Fault Tolerant Approach for Malicious URL Filtering 一种恶意URL过滤的容错方法
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530984
Mansoor Ahmed, Abid Khan, Osama Saleem, Muhammad Haris
Existing URL filtering mechanisms lacks support for real-time fault tolerance and scalability. In this paper these issues are addressed by developing a scalable model which is real time and fault tolerant to classify streams of URL traffic. The key feature of our model is that it saves computation time, resources usage and bandwidth. This model is implemented in Apache Spark which runs APIs for machine learning and streaming. The dataset consists of 2.4 million URLs which were taken from both clean and malicious classes. In training set, clean URLs are labeled as 1 and malicious are labeled as 0. For this proposed model, distributed in-memory computation is provided by Apache Spark's resilient distributed datasets (RDD) in fault tolerant manner. By increasing number of nodes in the cluster we achieved linear scalability. Our model attained an accuracy of 96% on logistic regression classifier and scaled up well with the Apache Spark's cluster. In 55 second using logistic regression classifier from Spark ML1ib, 2 million URLs can be filtered. The model achieved fl-score values of 0.92, 0.95 and 0.93 along with precision and the results are evaluated using cross-validation schemes.
现有的URL过滤机制缺乏对实时容错和可伸缩性的支持。本文通过开发一种实时、容错的可扩展URL流分类模型来解决这些问题。该模型的主要特点是节省了计算时间、资源使用和带宽。该模型是在Apache Spark中实现的,它运行用于机器学习和流媒体的api。该数据集由240万个url组成,这些url来自干净类和恶意类。在训练集中,干净url被标记为1,恶意url被标记为0。在这个模型中,分布式内存计算由Apache Spark的弹性分布式数据集(RDD)以容错的方式提供。通过增加集群中的节点数量,我们实现了线性可扩展性。我们的模型在逻辑回归分类器上达到了96%的准确率,并且在Apache Spark的集群上进行了很好的扩展。使用Spark ML1ib的逻辑回归分类器,在55秒内可以过滤200万个url。模型的f -score值分别为0.92、0.95和0.93,精度较高,并采用交叉验证方案对结果进行评估。
{"title":"A Fault Tolerant Approach for Malicious URL Filtering","authors":"Mansoor Ahmed, Abid Khan, Osama Saleem, Muhammad Haris","doi":"10.1109/ISNCC.2018.8530984","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530984","url":null,"abstract":"Existing URL filtering mechanisms lacks support for real-time fault tolerance and scalability. In this paper these issues are addressed by developing a scalable model which is real time and fault tolerant to classify streams of URL traffic. The key feature of our model is that it saves computation time, resources usage and bandwidth. This model is implemented in Apache Spark which runs APIs for machine learning and streaming. The dataset consists of 2.4 million URLs which were taken from both clean and malicious classes. In training set, clean URLs are labeled as 1 and malicious are labeled as 0. For this proposed model, distributed in-memory computation is provided by Apache Spark's resilient distributed datasets (RDD) in fault tolerant manner. By increasing number of nodes in the cluster we achieved linear scalability. Our model attained an accuracy of 96% on logistic regression classifier and scaled up well with the Apache Spark's cluster. In 55 second using logistic regression classifier from Spark ML1ib, 2 million URLs can be filtered. The model achieved fl-score values of 0.92, 0.95 and 0.93 along with precision and the results are evaluated using cross-validation schemes.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123230876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Suboptimal Routing Algorithm for Massive LEO Satellite Networks 大规模LEO卫星网络的次优路由算法
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530894
Yilun Liu, Lidong Zhu
In a massive Low Earth Orbit(LEO) satellite network without inter-satellite links(ISLs), connection between source node and destination node can be established through satellite-ground links. Utilizing satellite network topology in time virtualization algorithm and assuming that the current traffic of satellite-ground links which is used as the value of the topology correlation matrix can be perceived, the network uses the Dijkstra algorithm to obtain the shortest path of the current total network traffic and thus implements load balancing of the constellation system. Due to the large number of satellites, the network topology is complex and time varying, it is difficult to find the optimal path in a short time, so a suboptimal routing algorithm based on network topology is proposed in this paper. The local network topology is obtained by using the positions of the source and destination gateway, and the number of satellites and gateways used to establish the correlation matrix of the Dijkstra algorithm is reduced. Through the simulation analysis, the average computational complexity of this algorithm is much lower than that of the global optimal routing algorithm, and the average propagation delay of routing is almost the same. When the network load is normal, the system performance is almost the same with the global optimal routing algorithm.
在没有星间链路的大型近地轨道卫星网络中,源节点与目的节点之间可以通过星地链路建立连接。利用时间虚拟化算法中的卫星网络拓扑,假设可以感知星地链路的当前流量作为拓扑相关矩阵的值,利用Dijkstra算法获得当前网络总流量的最短路径,从而实现星座系统的负载均衡。由于卫星数量多,网络拓扑复杂且时变,很难在短时间内找到最优路径,因此本文提出了一种基于网络拓扑的次优路由算法。利用源网关和目的网关的位置得到本地网络拓扑,减少了建立Dijkstra算法相关矩阵所用的卫星和网关数量。通过仿真分析,该算法的平均计算复杂度远低于全局最优路由算法,且路由的平均传播延迟几乎相同。当网络负载正常时,系统性能与全局最优路由算法基本一致。
{"title":"A Suboptimal Routing Algorithm for Massive LEO Satellite Networks","authors":"Yilun Liu, Lidong Zhu","doi":"10.1109/ISNCC.2018.8530894","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530894","url":null,"abstract":"In a massive Low Earth Orbit(LEO) satellite network without inter-satellite links(ISLs), connection between source node and destination node can be established through satellite-ground links. Utilizing satellite network topology in time virtualization algorithm and assuming that the current traffic of satellite-ground links which is used as the value of the topology correlation matrix can be perceived, the network uses the Dijkstra algorithm to obtain the shortest path of the current total network traffic and thus implements load balancing of the constellation system. Due to the large number of satellites, the network topology is complex and time varying, it is difficult to find the optimal path in a short time, so a suboptimal routing algorithm based on network topology is proposed in this paper. The local network topology is obtained by using the positions of the source and destination gateway, and the number of satellites and gateways used to establish the correlation matrix of the Dijkstra algorithm is reduced. Through the simulation analysis, the average computational complexity of this algorithm is much lower than that of the global optimal routing algorithm, and the average propagation delay of routing is almost the same. When the network load is normal, the system performance is almost the same with the global optimal routing algorithm.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Cluster-Based Mobile Data-Gathering Scheme for Underwater Sensor Networks 一种基于集群的水下传感器网络移动数据采集方案
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531067
S. Ghoreyshi, A. Shahrabi, T. Boutaleb
In this paper, a new distributed Cluster-based Mobile Data-Gathering scheme (CMDG) for large-scale Underwater Sensor Networks (UWSNs) is proposed to improve the system performance in terms of routing scalability, energy saving, and data gathering latency. In this scheme, a subset of underwater sensors is selected as cluster heads to collect data from affiliated sensors and transmit the data to an Autonomous Underwater Vehicle (AUV). Then, the AUV tour is planned such that all cluster heads are visited while shortening the tour length of the AUV. Using extensive simulation study, we analyse the performance of CMDG and show that it can effectively reduce the tour length while prolonging the network lifetime compared to another existing mobile data-gathering approach.
针对大规模水下传感器网络(UWSNs),提出了一种基于分布式集群的移动数据采集方案(CMDG),从路由可扩展性、节能性和数据采集延迟等方面提高了系统性能。在该方案中,选择一组水下传感器作为簇头,从附属传感器收集数据并将数据传输给自主水下航行器(AUV)。然后,计划AUV的行程,使所有簇头都被访问,同时缩短AUV的行程长度。通过大量的仿真研究,我们分析了CMDG的性能,并表明与另一种现有的移动数据收集方法相比,它可以有效地缩短行程长度,延长网络寿命。
{"title":"A Cluster-Based Mobile Data-Gathering Scheme for Underwater Sensor Networks","authors":"S. Ghoreyshi, A. Shahrabi, T. Boutaleb","doi":"10.1109/ISNCC.2018.8531067","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531067","url":null,"abstract":"In this paper, a new distributed Cluster-based Mobile Data-Gathering scheme (CMDG) for large-scale Underwater Sensor Networks (UWSNs) is proposed to improve the system performance in terms of routing scalability, energy saving, and data gathering latency. In this scheme, a subset of underwater sensors is selected as cluster heads to collect data from affiliated sensors and transmit the data to an Autonomous Underwater Vehicle (AUV). Then, the AUV tour is planned such that all cluster heads are visited while shortening the tour length of the AUV. Using extensive simulation study, we analyse the performance of CMDG and show that it can effectively reduce the tour length while prolonging the network lifetime compared to another existing mobile data-gathering approach.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125767660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance Evaluation of a Virtualized 5G Core Network in Indoor Environments 室内环境下虚拟化5G核心网性能评估
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530923
Bong-Hwan Oh, S. Vural, Yogaratnam Rahulan, Ning Wang, R. Tafazolli
Network function virtualization (NFV) is one of key features envisioned for the upcoming 5G core networks in order to support high flexibility in network deployment and management. However, potential performance degradations that could be caused by virtualization of network functions is still a controversial issue, especially in regards to virtualization of core network components. In this paper, we evaluate the effect of NFV on an end-to-end mobile network testbed, which is deployed in the 5G Innovation Centre (5GIC) in University of Surrey. The testbed consists of indoor and outdoor LTE Radio Access Networks (RAN) equipment, as well as an enhanced Evolved Packet Core (EPC) following LTE Release 14 specifications, such as control and user plane separation (CUPS). The paper compares the performance of the softwarised core network and that of its virtualized counterpart. Measurement results show that the virtualized core network has adequately similar network performance in terms of throughput and latency, compared with the non-virtual core.
网络功能虚拟化(NFV)是即将到来的5G核心网的关键特性之一,以支持网络部署和管理的高度灵活性。然而,网络功能虚拟化可能导致的潜在性能下降仍然是一个有争议的问题,特别是在核心网络组件虚拟化方面。在本文中,我们评估了NFV对端到端移动网络测试平台的影响,该测试平台部署在萨里大学的5G创新中心(5GIC)。该测试平台包括室内和室外LTE无线接入网络(RAN)设备,以及遵循LTE Release 14规范的增强型演进分组核心(EPC),例如控制和用户平面分离(CUPS)。本文比较了软件核心网和虚拟化核心网的性能。测试结果表明,与非虚拟核心网络相比,虚拟化核心网络在吞吐量和延迟方面具有足够相似的网络性能。
{"title":"Performance Evaluation of a Virtualized 5G Core Network in Indoor Environments","authors":"Bong-Hwan Oh, S. Vural, Yogaratnam Rahulan, Ning Wang, R. Tafazolli","doi":"10.1109/ISNCC.2018.8530923","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530923","url":null,"abstract":"Network function virtualization (NFV) is one of key features envisioned for the upcoming 5G core networks in order to support high flexibility in network deployment and management. However, potential performance degradations that could be caused by virtualization of network functions is still a controversial issue, especially in regards to virtualization of core network components. In this paper, we evaluate the effect of NFV on an end-to-end mobile network testbed, which is deployed in the 5G Innovation Centre (5GIC) in University of Surrey. The testbed consists of indoor and outdoor LTE Radio Access Networks (RAN) equipment, as well as an enhanced Evolved Packet Core (EPC) following LTE Release 14 specifications, such as control and user plane separation (CUPS). The paper compares the performance of the softwarised core network and that of its virtualized counterpart. Measurement results show that the virtualized core network has adequately similar network performance in terms of throughput and latency, compared with the non-virtual core.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing 802.11ac Dynamic Access method for Increasing the Throughput of Low Priority Access Categories BK and BE 改进802.11ac动态接入方法,提高低优先级接入类别BK和BE的吞吐量
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530896
Souhila Mammeri, M. Yazid, L. Bouallouche-Medjkoune, Thanina Belkhir
Wireless Local Area Networks (WLANs) are becoming an essential form of communication in our life, and they have known a strong history of development. The current IEEE 802.11ac technology aims at achieving a Very High Throughput (VHT), by utilizing wider channels 80 and 160 MHz. The wide channels are obtained by bonding adjacent 20 MHz sub-channels. This is why, Static and Dynamic Multichannel Access (SMA and DMA) methods are proposed for controlling such multichannel transmissions. SMA and DMA guarantee the requirements of Quality of Service (QoS) for VHT WLANs, by following the existing 802.11e Enhanced Distributed Channel Access (EDCA). However, EDCA still suffers from the starvation among low priority ACs. Although several enhancements have been proposed since the emergence of the starvation issue, none of the proposed research works have addressed the critical state of low priority ACs BestEffort (BE) and BacKground (BK) under wide channels. In this paper, we propose to enhance the DMA method, in order to improve the multichannel access efficience and hence increase the throughputs of BK and BE. The obtained simulation results demonstrate the contribution of the Starvation resolution within the DMA method (SDMA) for increasing the throughputs of low priority ACs while maintaining the throughputs of high priority ACs.
无线局域网(wlan)正在成为我们生活中必不可少的通信形式,并且有着悠久的发展历史。目前的IEEE 802.11ac技术旨在通过利用更宽的80和160 MHz信道实现极高吞吐量(VHT)。宽信道是通过绑定相邻的20 MHz子信道获得的。这就是为什么提出静态和动态多通道接入(SMA和DMA)方法来控制这种多通道传输。SMA和DMA通过遵循现有的802.11e增强型分布式信道接入(EDCA),保证了VHT wlan的服务质量(QoS)要求。然而,EDCA仍然存在低优先级ac的饥饿问题。尽管自饥饿问题出现以来已经提出了一些改进措施,但所提出的研究工作都没有解决宽通道下低优先级ACs的最佳努力(BE)和背景(BK)的临界状态。在本文中,我们提出了改进DMA方法,以提高多通道接入效率,从而提高BK和BE的吞吐量。仿真结果证明了DMA方法(SDMA)中的饥饿分辨率对提高低优先级ac的吞吐量而保持高优先级ac的吞吐量的贡献。
{"title":"Enhancing 802.11ac Dynamic Access method for Increasing the Throughput of Low Priority Access Categories BK and BE","authors":"Souhila Mammeri, M. Yazid, L. Bouallouche-Medjkoune, Thanina Belkhir","doi":"10.1109/ISNCC.2018.8530896","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530896","url":null,"abstract":"Wireless Local Area Networks (WLANs) are becoming an essential form of communication in our life, and they have known a strong history of development. The current IEEE 802.11ac technology aims at achieving a Very High Throughput (VHT), by utilizing wider channels 80 and 160 MHz. The wide channels are obtained by bonding adjacent 20 MHz sub-channels. This is why, Static and Dynamic Multichannel Access (SMA and DMA) methods are proposed for controlling such multichannel transmissions. SMA and DMA guarantee the requirements of Quality of Service (QoS) for VHT WLANs, by following the existing 802.11e Enhanced Distributed Channel Access (EDCA). However, EDCA still suffers from the starvation among low priority ACs. Although several enhancements have been proposed since the emergence of the starvation issue, none of the proposed research works have addressed the critical state of low priority ACs BestEffort (BE) and BacKground (BK) under wide channels. In this paper, we propose to enhance the DMA method, in order to improve the multichannel access efficience and hence increase the throughputs of BK and BE. The obtained simulation results demonstrate the contribution of the Starvation resolution within the DMA method (SDMA) for increasing the throughputs of low priority ACs while maintaining the throughputs of high priority ACs.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124122631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Small Size, High Power Density, Solid State Amplifiers for Space Application 小尺寸,高功率密度,固态放大器的空间应用
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531030
D. Passi, A. Leggieri, Alessio Mattioni, F. Paolo, M. D'Antoni, M. Bartocci, E. Ciacia, A. Tafuto
In this article the new frontier in Spatial Power Amplifiers is shown, with particular attention to the their Space Applications. These amplifiers have in fact the characteristic of High RF Power, Solid State Technology and High Power Density due to the small sizes that can be reached. We will show the performances of three amplifiers employing the spatial combining technique, two prototypes in the X-Band and one in the Ka-Band, with a brief description of the design approach. These amplifiers belong to the Single Waveguide group of the SPC family, thus a WR90 and a WR28 waveguides are employed. Very good performances are obtained from these prototypes, with a very high power density due their small sizes.
本文介绍了空间功率放大器的最新研究进展,并重点介绍了空间功率放大器的应用。这些放大器实际上具有高射频功率,固态技术和高功率密度的特点,因为可以达到小尺寸。我们将展示采用空间组合技术的三个放大器的性能,两个原型在x波段和一个在ka波段,并简要描述设计方法。这些放大器属于SPC家族的单波导组,因此采用WR90和WR28波导。这些原型获得了非常好的性能,由于它们的小尺寸,具有非常高的功率密度。
{"title":"Small Size, High Power Density, Solid State Amplifiers for Space Application","authors":"D. Passi, A. Leggieri, Alessio Mattioni, F. Paolo, M. D'Antoni, M. Bartocci, E. Ciacia, A. Tafuto","doi":"10.1109/ISNCC.2018.8531030","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531030","url":null,"abstract":"In this article the new frontier in Spatial Power Amplifiers is shown, with particular attention to the their Space Applications. These amplifiers have in fact the characteristic of High RF Power, Solid State Technology and High Power Density due to the small sizes that can be reached. We will show the performances of three amplifiers employing the spatial combining technique, two prototypes in the X-Band and one in the Ka-Band, with a brief description of the design approach. These amplifiers belong to the Single Waveguide group of the SPC family, thus a WR90 and a WR28 waveguides are employed. Very good performances are obtained from these prototypes, with a very high power density due their small sizes.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132819534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Building a Traffic Policer for DDoS Mitigation on Top of Commodity Hardware 在商品硬件之上构建DDoS缓解流量策略
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531043
Erkin Kirdan, Daniel Raumer, Paul Emmerich, G. Carle
Traffic policing is the process of ensuring that network traffic complies with its policies with methods like traffic shaping. As the distribution of sources involved in a DDoS attack differs significantly from the typical distribution of customers for web services, traffic shapers and policers can be used in DDoS mitigation. In the past, software-based middleboxes, like traffic shapers, easily became overloaded and therefore a vulnerability for DDoS attacks. Although recent advances in network stack design on commodity hardware increased the performance, the software on top of the network stack also needs to provide adequate throughput and scalability regarding the number of limited subnets. Therefore, we build a high-performance and scalable traffic policer called MoonPol and evaluated it in a DDoS mitigation scenario. MoonPol runs on any commodity hardware, takes advantage of the underlying framework, DPDK, and combines it with appropriate algorithms and data structures. Data structures for efficient lookups are implemented together with the token bucket algorithm to police a traffic of fine-grained IP address ranges. Benchmarking results show that the single core throughput of the policer running on a 3.2 GHz CPU, is 6.5 Mpps with limiting 1 Million subnets, i.e., 492 CPU cycles per packet. With 250K subnets of all countries in the world, the throughput is 6.66 Mpps.
流量监管是通过流量整形等方法确保网络流量符合其策略的过程。由于DDoS攻击中涉及的源的分布与web服务的典型客户分布有很大不同,因此可以在DDoS缓解中使用流量塑造器和策略。在过去,基于软件的中间件,比如流量整形器,很容易过载,因此成为DDoS攻击的一个漏洞。尽管商用硬件上网络堆栈设计的最新进展提高了性能,但网络堆栈之上的软件还需要提供足够的吞吐量和可伸缩性,以应对有限子网的数量。因此,我们构建了一个名为MoonPol的高性能可扩展流量管理器,并在DDoS缓解场景中对其进行了评估。MoonPol可以在任何商用硬件上运行,利用底层框架DPDK,并将其与适当的算法和数据结构相结合。有效查找的数据结构与令牌桶算法一起实现,以监督细粒度IP地址范围的流量。基准测试结果显示,在3.2 GHz CPU上运行的策略的单核吞吐量为6.5 Mpps,限制了100万个子网,即每个数据包492个CPU周期。25k子网覆盖全球所有国家,吞吐量为6.66 Mpps。
{"title":"Building a Traffic Policer for DDoS Mitigation on Top of Commodity Hardware","authors":"Erkin Kirdan, Daniel Raumer, Paul Emmerich, G. Carle","doi":"10.1109/ISNCC.2018.8531043","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531043","url":null,"abstract":"Traffic policing is the process of ensuring that network traffic complies with its policies with methods like traffic shaping. As the distribution of sources involved in a DDoS attack differs significantly from the typical distribution of customers for web services, traffic shapers and policers can be used in DDoS mitigation. In the past, software-based middleboxes, like traffic shapers, easily became overloaded and therefore a vulnerability for DDoS attacks. Although recent advances in network stack design on commodity hardware increased the performance, the software on top of the network stack also needs to provide adequate throughput and scalability regarding the number of limited subnets. Therefore, we build a high-performance and scalable traffic policer called MoonPol and evaluated it in a DDoS mitigation scenario. MoonPol runs on any commodity hardware, takes advantage of the underlying framework, DPDK, and combines it with appropriate algorithms and data structures. Data structures for efficient lookups are implemented together with the token bucket algorithm to police a traffic of fine-grained IP address ranges. Benchmarking results show that the single core throughput of the policer running on a 3.2 GHz CPU, is 6.5 Mpps with limiting 1 Million subnets, i.e., 492 CPU cycles per packet. With 250K subnets of all countries in the world, the throughput is 6.66 Mpps.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123270151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber-physical Threats and Vulnerabilities Analysis for Train Control and Monitoring Systems 列车控制与监控系统的网络物理威胁与漏洞分析
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531005
M. Rekik, C. Gransart, M. Berbineau
Cyber-physical security is a major concern for the new generation of trains. In fact, trains are increasingly relying on automation, control and communication technologies in order to improve the efficiency and safety of their services as well as the comfort of passengers. This dependency introduces certainly new vulnerabilities and entry points to the system which exposes the system to new threat scenarios. This paper deals with cyber-physical security aspects of Train Control and Monitoring Systems (TCMSs). We analyse vulnerabilities and characteristics of railway threat landscape including potential threats, threats agents and motivations. We discuss, also, direct impacts and cascading consequences on the whole system as well as the risk generated.
网络物理安全是新一代列车的主要关注点。事实上,火车越来越依赖于自动化、控制和通信技术,以提高服务的效率和安全性,以及乘客的舒适度。这种依赖必然会给系统引入新的漏洞和入口点,从而使系统暴露在新的威胁场景中。本文讨论了列车控制与监控系统(tcms)的网络物理安全问题。我们分析了铁路威胁的脆弱性和特征,包括潜在威胁、威胁代理和动机。我们还讨论了对整个系统的直接影响和级联后果以及产生的风险。
{"title":"Cyber-physical Threats and Vulnerabilities Analysis for Train Control and Monitoring Systems","authors":"M. Rekik, C. Gransart, M. Berbineau","doi":"10.1109/ISNCC.2018.8531005","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531005","url":null,"abstract":"Cyber-physical security is a major concern for the new generation of trains. In fact, trains are increasingly relying on automation, control and communication technologies in order to improve the efficiency and safety of their services as well as the comfort of passengers. This dependency introduces certainly new vulnerabilities and entry points to the system which exposes the system to new threat scenarios. This paper deals with cyber-physical security aspects of Train Control and Monitoring Systems (TCMSs). We analyse vulnerabilities and characteristics of railway threat landscape including potential threats, threats agents and motivations. We discuss, also, direct impacts and cascading consequences on the whole system as well as the risk generated.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115761747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security for Internet of Things: The SerIoT Project 物联网安全:SerIoT项目
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8531004
E. Gelenbe, J. Domańska, T. Czachórski, A. Drosou, D. Tzovaras
Attacks on the content and quality of service of IoT platforms have economic and physical consequences well beyond the Internet's lack of security. This paper describes a new research project on “Secure and Safe Internet of Things” (SerIoT) to improve both the information and physical security of IoT applications platforms in a holistic and cross-layered manner. The purpose is to be able to create secure operational IoT platfnrms for diverse applieations.
对物联网平台的内容和服务质量的攻击所造成的经济和物理后果远远超出了互联网缺乏安全性的范畴。本文介绍了一个新的研究项目“安全与安全的物联网”(SerIoT),以整体和跨层的方式提高物联网应用平台的信息和物理安全。其目的是能够为各种应用创建安全的可操作物联网平台。
{"title":"Security for Internet of Things: The SerIoT Project","authors":"E. Gelenbe, J. Domańska, T. Czachórski, A. Drosou, D. Tzovaras","doi":"10.1109/ISNCC.2018.8531004","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8531004","url":null,"abstract":"Attacks on the content and quality of service of IoT platforms have economic and physical consequences well beyond the Internet's lack of security. This paper describes a new research project on “Secure and Safe Internet of Things” (SerIoT) to improve both the information and physical security of IoT applications platforms in a holistic and cross-layered manner. The purpose is to be able to create secure operational IoT platfnrms for diverse applieations.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Discovering True Kids Mobile Behavior 发现孩子真正的手机行为
Pub Date : 2018-06-01 DOI: 10.1109/ISNCC.2018.8530884
Massimo Marchiori
The mobile world has freed individuals from many physical constraint, but has also added degrees of freedom that might amplify privacy and security problems, especially for a critical part of the population: underage children. How much of this freedom is a risk for our kids? The problem is that we do not really know yet the answer to this question. Knowing what kids really do with their smartphone is not an easy task: we can try to get a grasp of their actions using questionnaires, but this introduces bias when trying to measure inappropriate behavior, even more in the kids world due to additional factors like shame. In this paper we report on an attempt to shed light on this problem, and to delve deep into the true world of kids. We first state what the problems are when trying to analyze their mobile behavior, identify the critical technical challenges, and show that there is also a number of non-technical challenges making up for a significant barrier. We then design and implement a system able to overcome a good number of these challenges, and effectively study the unfiltered behavior of kids in the mobile world, and so to check the potential risks for privacy and security during their mobile interactions. A large pool of kids is then studied, shading new light on the potentially dangerous zones that underage kids cross every day, and showing how truly dangerous the mobile environment, in its present technological and social shape, is for our children.
移动世界使个人摆脱了许多身体上的限制,但也增加了一定程度的自由,这可能会放大隐私和安全问题,尤其是对人口的关键部分:未成年儿童。这种自由对我们的孩子有多大风险?问题是我们还不知道这个问题的答案。了解孩子们用智能手机做了什么并不是一件容易的事:我们可以尝试通过问卷来掌握他们的行为,但这在试图衡量不当行为时引入了偏见,在孩子们的世界里,由于羞耻等其他因素,这种偏见甚至更多。在这篇文章中,我们试图揭示这个问题,并深入研究孩子们的真实世界。我们首先陈述了在尝试分析他们的移动行为时存在的问题,确定了关键的技术挑战,并表明还有许多非技术挑战构成了一个重大障碍。然后,我们设计并实现了一个能够克服这些挑战的系统,并有效地研究儿童在移动世界中未经过滤的行为,从而检查他们在移动交互过程中对隐私和安全的潜在风险。然后对一大群孩子进行了研究,为未成年孩子每天穿越的潜在危险区域提供了新的线索,并展示了在目前的技术和社会形态下,移动环境对我们的孩子来说是多么危险。
{"title":"Discovering True Kids Mobile Behavior","authors":"Massimo Marchiori","doi":"10.1109/ISNCC.2018.8530884","DOIUrl":"https://doi.org/10.1109/ISNCC.2018.8530884","url":null,"abstract":"The mobile world has freed individuals from many physical constraint, but has also added degrees of freedom that might amplify privacy and security problems, especially for a critical part of the population: underage children. How much of this freedom is a risk for our kids? The problem is that we do not really know yet the answer to this question. Knowing what kids really do with their smartphone is not an easy task: we can try to get a grasp of their actions using questionnaires, but this introduces bias when trying to measure inappropriate behavior, even more in the kids world due to additional factors like shame. In this paper we report on an attempt to shed light on this problem, and to delve deep into the true world of kids. We first state what the problems are when trying to analyze their mobile behavior, identify the critical technical challenges, and show that there is also a number of non-technical challenges making up for a significant barrier. We then design and implement a system able to overcome a good number of these challenges, and effectively study the unfiltered behavior of kids in the mobile world, and so to check the potential risks for privacy and security during their mobile interactions. A large pool of kids is then studied, shading new light on the potentially dangerous zones that underage kids cross every day, and showing how truly dangerous the mobile environment, in its present technological and social shape, is for our children.","PeriodicalId":313846,"journal":{"name":"2018 International Symposium on Networks, Computers and Communications (ISNCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125130076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 International Symposium on Networks, Computers and Communications (ISNCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1