首页 > 最新文献

2010 Fifth International Conference on Internet Monitoring and Protection最新文献

英文 中文
Risk Management for Web and Distributed Software Development Projects 网络和分布式软件开发项目的风险管理
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.12
A. A. Keshlaf, S. Riddle
The level of complexity and risks associated with software have been increasing in line with the growth of the software industry. Modern software development, with an emphasis on web and distributed development, presents specific challenges and risk areas to the software industry which need to be considered and managed. In this paper we survey a number of software risk management approaches and identify weaknesses such as the treatment of culture issues, geographical location, and process and product perspectives. These weaknesses must be tackled in order to accommodate the continuously evolving challenges to web and distributed software development and to cover some perspectives of the software industry which have not been well covered up to now. This work is a part of PhD research at Newcastle University (UK) to develop an improved approach to measure and control web and distributed development risks.
随着软件行业的发展,与软件相关的复杂性和风险水平一直在增加。现代软件开发,强调网络和分布式开发,为软件行业提出了需要考虑和管理的具体挑战和风险领域。在本文中,我们调查了许多软件风险管理方法,并确定了弱点,例如对文化问题的处理,地理位置,以及过程和产品的观点。为了适应web和分布式软件开发不断发展的挑战,以及涵盖迄今为止尚未很好地涵盖的软件行业的一些观点,必须解决这些弱点。这项工作是纽卡斯尔大学(英国)博士研究的一部分,旨在开发一种改进的方法来测量和控制网络和分布式开发风险。
{"title":"Risk Management for Web and Distributed Software Development Projects","authors":"A. A. Keshlaf, S. Riddle","doi":"10.1109/ICIMP.2010.12","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.12","url":null,"abstract":"The level of complexity and risks associated with software have been increasing in line with the growth of the software industry. Modern software development, with an emphasis on web and distributed development, presents specific challenges and risk areas to the software industry which need to be considered and managed. In this paper we survey a number of software risk management approaches and identify weaknesses such as the treatment of culture issues, geographical location, and process and product perspectives. These weaknesses must be tackled in order to accommodate the continuously evolving challenges to web and distributed software development and to cover some perspectives of the software industry which have not been well covered up to now. This work is a part of PhD research at Newcastle University (UK) to develop an improved approach to measure and control web and distributed development risks.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126012727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
GoldPhish: Using Images for Content-Based Phishing Analysis GoldPhish:使用图像进行基于内容的网络钓鱼分析
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.24
M. Dunlop, S. Groat, David Shelly
Phishing attacks continue to plague users as attackers develop new ways to fool users into submitting personal information to fraudulent sites. Many schemes claim to protect against phishing sites. Unfortunately, most do not protect against zero-day phishing sites. Those schemes that do allege to provide zero-day protection, often incorrectly label both phishing and legitimate sites. We propose a scheme that protects against zero-day phishing attacks with high accuracy. Our approach captures an image of a page, uses optical character recognition to convert the image to text, then leverages the Google PageRank algorithm to help render a decision on the validity of the site. After testing our tool on 100 legitimate sites and 100 phishing sites, we accurately reported 100% of legitimate sites and 98% of phishing sites.
网络钓鱼攻击继续困扰着用户,因为攻击者开发了新的方法来欺骗用户向欺诈网站提交个人信息。许多方案声称可以防止网络钓鱼网站。不幸的是,大多数都没有针对零日钓鱼网站提供保护。那些声称提供零日保护的方案,往往错误地将网络钓鱼和合法网站都贴上了标签。我们提出了一种防止零日网络钓鱼攻击的方案,具有很高的准确性。我们的方法捕获页面的图像,使用光学字符识别将图像转换为文本,然后利用谷歌PageRank算法来帮助对站点的有效性做出决定。在对100个合法网站和100个网络钓鱼网站进行测试后,我们准确地报告了100%的合法网站和98%的网络钓鱼网站。
{"title":"GoldPhish: Using Images for Content-Based Phishing Analysis","authors":"M. Dunlop, S. Groat, David Shelly","doi":"10.1109/ICIMP.2010.24","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.24","url":null,"abstract":"Phishing attacks continue to plague users as attackers develop new ways to fool users into submitting personal information to fraudulent sites. Many schemes claim to protect against phishing sites. Unfortunately, most do not protect against zero-day phishing sites. Those schemes that do allege to provide zero-day protection, often incorrectly label both phishing and legitimate sites. We propose a scheme that protects against zero-day phishing attacks with high accuracy. Our approach captures an image of a page, uses optical character recognition to convert the image to text, then leverages the Google PageRank algorithm to help render a decision on the validity of the site. After testing our tool on 100 legitimate sites and 100 phishing sites, we accurately reported 100% of legitimate sites and 98% of phishing sites.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 156
Observations of UDP to TCP Ratio and Port Numbers 观察UDP到TCP的比率和端口号
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.20
DongJin Lee, B. Carpenter, N. Brownlee
Widely used protocols (UDP and TCP) are observed for variations of the UDP to TCP ratio and of port number distribution, both over time and between different networks. The purpose of the study was to understand the impact of application trends, especially the growth in media streaming, on traffic characteristics. The results showed substantial variability but little sign of a systematic trend over time, and only wide spreads of port number usage.
广泛使用的协议(UDP和TCP)可以观察到UDP与TCP比率和端口号分布的变化,无论是随着时间的推移还是不同网络之间的变化。这项研究的目的是了解应用趋势,特别是流媒体的增长对流量特征的影响。结果显示了大量的可变性,但随着时间的推移,几乎没有系统趋势的迹象,只有端口号使用的广泛传播。
{"title":"Observations of UDP to TCP Ratio and Port Numbers","authors":"DongJin Lee, B. Carpenter, N. Brownlee","doi":"10.1109/ICIMP.2010.20","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.20","url":null,"abstract":"Widely used protocols (UDP and TCP) are observed for variations of the UDP to TCP ratio and of port number distribution, both over time and between different networks. The purpose of the study was to understand the impact of application trends, especially the growth in media streaming, on traffic characteristics. The results showed substantial variability but little sign of a systematic trend over time, and only wide spreads of port number usage.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
A Novel Method for Supporting Fairness in Digital License Reselling 一种支持数字许可转售公平性的新方法
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.19
T. Gaber, Ning Zhang
Current Digital Rights Management (DRM) systems permit a consumer to buy a digital license to access the corresponding content on his device. Under these current systems, however, the consumer is unable to resell the license.To allow the consumer to resell the license, all entities involved in the reselling process must be treated fairly. Fairness means that a reseller should obtain payment if and only if a buyer obtains the expected license and vice-versa. This paper presents a novel method to support fairness in reselling a digital license for DRM protected content. This method enables a reseller to fairly and securely exchange his/her license for payment from a buyer. In addition, it enables the reseller to maximize his profit and the buyer to minimize his cost in the same process.The method is designed such that the buyer can not cheat and the reseller has no incentive to do so. A practical mechanism is proposed to handle any misbehavior by the reseller. In comparison with related works, the method does not make use of any additional trusted hardware device, thus more cost-effective, while satisfying the interests of all the entities involved. The method also prevents reselling a non-resalable license and multiple reselling of the same license.
当前的数字版权管理(DRM)系统允许消费者购买数字许可证来访问其设备上相应的内容。然而,在目前的系统下,消费者无法转售许可证。为了允许消费者转售许可证,必须公平对待参与转售过程的所有实体。公平意味着当且仅当买方获得预期的许可时,经销商应获得付款,反之亦然。本文提出了一种支持数字版权管理(DRM)保护内容的数字许可转卖公平的新方法。这种方法使经销商能够公平和安全地交换他/她的许可证从买方付款。此外,在同一过程中,它使经销商的利润最大化,买方的成本最小化。该方法的设计使得买方不能欺骗,经销商也没有动机这样做。提出了一种处理经销商不当行为的实用机制。与相关工作相比,该方法不需要使用任何额外的可信硬件设备,因此更具成本效益,同时满足了所有相关实体的利益。该方法还可以防止转售一个不可转售的许可证和多个转售相同的许可证。
{"title":"A Novel Method for Supporting Fairness in Digital License Reselling","authors":"T. Gaber, Ning Zhang","doi":"10.1109/ICIMP.2010.19","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.19","url":null,"abstract":"Current Digital Rights Management (DRM) systems permit a consumer to buy a digital license to access the corresponding content on his device. Under these current systems, however, the consumer is unable to resell the license.To allow the consumer to resell the license, all entities involved in the reselling process must be treated fairly. Fairness means that a reseller should obtain payment if and only if a buyer obtains the expected license and vice-versa. This paper presents a novel method to support fairness in reselling a digital license for DRM protected content. This method enables a reseller to fairly and securely exchange his/her license for payment from a buyer. In addition, it enables the reseller to maximize his profit and the buyer to minimize his cost in the same process.The method is designed such that the buyer can not cheat and the reseller has no incentive to do so. A practical mechanism is proposed to handle any misbehavior by the reseller. In comparison with related works, the method does not make use of any additional trusted hardware device, thus more cost-effective, while satisfying the interests of all the entities involved. The method also prevents reselling a non-resalable license and multiple reselling of the same license.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126326898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Authentication of Biometric Features Using Texture Coding for ID Cards 基于纹理编码的身份证生物特征认证
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.29
J. Blackledge, E. Coyle
The use of image based information exchange has grown rapidly over the years in terms of both electronic-to-electronic image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed documents, withstand abuse and degradation before and during scanning. In this paper we consider the background to a novel approach to solving this problem that has been developed into practically realisable system.
多年来,在电子对电子图像存储和传输以及以电子形式保存纸质文件方面,基于图像的信息交换的使用迅速增长。此外,随着COTS(商用现货)印刷和扫描设备质量的显著提高,伪造电子和印刷文件的能力已成为一个普遍存在的问题。因此,人们越来越需要开发数字水印技术,这种技术可以应用于电子和印刷图像(和文件),这些图像(和文件)可以被认证,防止未经授权的复制其内容,并且在印刷文件的情况下,在扫描之前和扫描期间承受滥用和退化。本文讨论了解决这一问题的新方法的背景,该方法已发展成为可实际实现的系统。
{"title":"Authentication of Biometric Features Using Texture Coding for ID Cards","authors":"J. Blackledge, E. Coyle","doi":"10.1109/ICIMP.2010.29","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.29","url":null,"abstract":"The use of image based information exchange has grown rapidly over the years in terms of both electronic-to-electronic image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed documents, withstand abuse and degradation before and during scanning. In this paper we consider the background to a novel approach to solving this problem that has been developed into practically realisable system.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
BotDigger: A Fuzzy Inference System for Botnet Detection BotDigger:一个用于僵尸网络检测的模糊推理系统
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.11
Basheer Al-Duwairi, L. Al-Ebbini
This paper proposes BotDigger, a fuzzy logic-based botnet detection system. In this system, we derive a set of logical rules based on a well known botnet characteristics. Utilizing these rules, an adaptive logic algorithm will be applied on network traffic traces searching for botnet footprints and associating a trust level for each host present in the sampled data. Future work will focus on evaluating the proposed approach using real traffic traces.
提出了一种基于模糊逻辑的僵尸网络检测系统BotDigger。在这个系统中,我们基于一个众所周知的僵尸网络特征推导出一组逻辑规则。利用这些规则,自适应逻辑算法将应用于网络流量跟踪,搜索僵尸网络足迹,并为采样数据中存在的每个主机关联信任级别。未来的工作将侧重于使用真实的交通轨迹来评估所提出的方法。
{"title":"BotDigger: A Fuzzy Inference System for Botnet Detection","authors":"Basheer Al-Duwairi, L. Al-Ebbini","doi":"10.1109/ICIMP.2010.11","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.11","url":null,"abstract":"This paper proposes BotDigger, a fuzzy logic-based botnet detection system. In this system, we derive a set of logical rules based on a well known botnet characteristics. Utilizing these rules, an adaptive logic algorithm will be applied on network traffic traces searching for botnet footprints and associating a trust level for each host present in the sampled data. Future work will focus on evaluating the proposed approach using real traffic traces.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"124 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
IDSAI: A Distributed System for Intrusion Detection Based on Intelligent Agents 基于智能代理的分布式入侵检测系统
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.8
M. A. Sanz-Bobi, M. Castro, Javier Santos
This paper describes an intelligent system for automatic detection of intrusions in computer networks. Its architecture is based on a multi-agent system in which several types of agents cooperate together to perform a fast and reliable detection of intrusions. Some agents are in charge of monitoring the traffic of the communication network using as core the well-known SNORT system fitted with different parameters for each monitoring agent. Other agents are responsible for the intelligent processing and interpretation of the information collected using knowledge rules. Finally, another type of agents is in charge of the compilation and integration of diagnoses issued by other agents and solving possible conflicts. The cooperation of all these agents will configure a more reliable and robust detection system than similar existing systems not using this type of architecture. This paper describes the IDSAI architecture, the agent roles and the main features of the application developed for network traffic surveillance.
介绍了一种用于计算机网络入侵自动检测的智能系统。它的体系结构基于多智能体系统,在该系统中,多种类型的智能体相互协作,以执行快速可靠的入侵检测。一些代理负责监控通信网络的流量,这些代理以众所周知的SNORT系统为核心,为每个监控代理配备不同的参数。其他代理负责使用知识规则对收集到的信息进行智能处理和解释。最后,另一类agent负责编译和整合其他agent发出的诊断,并解决可能出现的冲突。所有这些代理的合作将配置一个比不使用这种架构的类似现有系统更可靠和健壮的检测系统。本文介绍了IDSAI的体系结构、代理角色以及为网络流量监控开发的应用程序的主要特点。
{"title":"IDSAI: A Distributed System for Intrusion Detection Based on Intelligent Agents","authors":"M. A. Sanz-Bobi, M. Castro, Javier Santos","doi":"10.1109/ICIMP.2010.8","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.8","url":null,"abstract":"This paper describes an intelligent system for automatic detection of intrusions in computer networks. Its architecture is based on a multi-agent system in which several types of agents cooperate together to perform a fast and reliable detection of intrusions. Some agents are in charge of monitoring the traffic of the communication network using as core the well-known SNORT system fitted with different parameters for each monitoring agent. Other agents are responsible for the intelligent processing and interpretation of the information collected using knowledge rules. Finally, another type of agents is in charge of the compilation and integration of diagnoses issued by other agents and solving possible conflicts. The cooperation of all these agents will configure a more reliable and robust detection system than similar existing systems not using this type of architecture. This paper describes the IDSAI architecture, the agent roles and the main features of the application developed for network traffic surveillance.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128166523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Proposal of a Communication-Broadcasting Integrated System to Support Communication and Navigation during Disasters 一种支持灾害期间通信和导航的通信广播集成系统的方案
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.22
Yasuhiko Hiehata, H. Koto, Hajime Nakamura
Often, when a base transceiver station malfunctions, the users in its area cannot communicate. In this paper, we propose a communication support system that will guide users to available base transceiver stations in disasters such as earthquakes, reporting the status of available base transceiver stations as a data stream on digital TV. In addition, we propose a user navigation algorithm to deal with network congestion at the available base transceiver stations, and evaluate its validity with numerical simulation. Finally, we show an example of its implementation.
通常,当基站发生故障时,该区域的用户无法通信。在本文中,我们提出了一种通信支持系统,该系统将引导用户在地震等灾害中找到可用的基站收发站,并将可用基站收发站的状态作为数据流报告到数字电视上。此外,我们提出了一种用户导航算法来处理可用收发基站的网络拥塞问题,并通过数值仿真对其有效性进行了评估。最后,我们展示了其实现的一个示例。
{"title":"A Proposal of a Communication-Broadcasting Integrated System to Support Communication and Navigation during Disasters","authors":"Yasuhiko Hiehata, H. Koto, Hajime Nakamura","doi":"10.1109/ICIMP.2010.22","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.22","url":null,"abstract":"Often, when a base transceiver station malfunctions, the users in its area cannot communicate. In this paper, we propose a communication support system that will guide users to available base transceiver stations in disasters such as earthquakes, reporting the status of available base transceiver stations as a data stream on digital TV. In addition, we propose a user navigation algorithm to deal with network congestion at the available base transceiver stations, and evaluate its validity with numerical simulation. Finally, we show an example of its implementation.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117263272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluation of P4P Based on Real Traffic Measurement 基于真实流量测量的P4P评价
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.25
Y. Carlinet, L. Mé, Y. Gourhant, Hervé Debar
Peer-To-Peer (P2P) traffic represents a significant proportion of the traffic today. However, currently widespread P2P systems take no account of the underlying network infrastructure. But by doing so, they would be able to perform a much more efficient peer selection. The P4P approach aims at allowing ISPs to cooperate with peers in order to improve their peer selection in the overlay. The objectives of this paper are to assess the benefits of P4P, both for the P2P system and the ISP, thanks to an experiment of a scale never achieved before, there by complementing the results obtained in previous work. The results show that P2P applications need more information than just the Internet domain, in order to improve their performance, and that the inter-domain P2P traffic can be reduced by at least 72%.
点对点(P2P)流量在当今的流量中占很大比例。然而,目前广泛使用的P2P系统并没有考虑到底层的网络基础设施。但通过这样做,他们将能够进行更有效的同伴选择。P4P方法旨在允许isp与对等体合作,以改善其在覆盖中的对等体选择。本文的目的是评估P4P的好处,无论是对P2P系统和ISP,感谢一个规模从未实现的实验,在那里通过补充在以前的工作中获得的结果。结果表明,P2P应用程序需要更多的信息,而不仅仅是互联网域,以提高其性能,并且域间P2P流量可以减少至少72%。
{"title":"Evaluation of P4P Based on Real Traffic Measurement","authors":"Y. Carlinet, L. Mé, Y. Gourhant, Hervé Debar","doi":"10.1109/ICIMP.2010.25","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.25","url":null,"abstract":"Peer-To-Peer (P2P) traffic represents a significant proportion of the traffic today. However, currently widespread P2P systems take no account of the underlying network infrastructure. But by doing so, they would be able to perform a much more efficient peer selection. The P4P approach aims at allowing ISPs to cooperate with peers in order to improve their peer selection in the overlay. The objectives of this paper are to assess the benefits of P4P, both for the P2P system and the ISP, thanks to an experiment of a scale never achieved before, there by complementing the results obtained in previous work. The results show that P2P applications need more information than just the Internet domain, in order to improve their performance, and that the inter-domain P2P traffic can be reduced by at least 72%.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126642190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Risk-Aware Usage Decision Making in Highly Dynamic Systems 高动态系统中风险意识的使用决策
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.13
Leanid Krautsevich, A. Lazouski, F. Martinelli, A. Yautsiukhin
Usage control model (UCON) is based on the idea that attributes required for decision-making can be changed over a period of usage. Since it is not always possible to get a fresh and trustworthy value of attributes, a decision has to be done with some uncertainties in mind. Moreover, modern systems become more distributed and dynamic and this evolution aggravates the problem. Such trend demands for the solutions capable of working with imprecise values. Our study concerns analysis of risks to make access decision of usage control more credible. We consider the risks associated with imperfect mechanisms collecting information about an authorization context. To cope with these risks we introduce our approach based on Markov chains, which aims to help in making a decision to allow further access or to deny it. The proposed approach could be useful for designers of the policy enforcement engines based on the UCON model.
使用控制模型(UCON)基于这样一种思想,即决策所需的属性可以在使用期间改变。由于不可能总是得到一个新的、可信的属性值,因此必须考虑到一些不确定性来做决策。此外,现代系统变得更加分散和动态,这种演变加剧了问题。这种趋势要求解决方案能够处理不精确的值。我们的研究涉及风险分析,以使使用控制的访问决策更可信。我们考虑与收集关于授权上下文的信息的不完善机制相关的风险。为了应对这些风险,我们引入了基于马尔可夫链的方法,旨在帮助做出允许进一步访问或拒绝访问的决定。所提出的方法对于基于UCON模型的策略实施引擎的设计者可能很有用。
{"title":"Risk-Aware Usage Decision Making in Highly Dynamic Systems","authors":"Leanid Krautsevich, A. Lazouski, F. Martinelli, A. Yautsiukhin","doi":"10.1109/ICIMP.2010.13","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.13","url":null,"abstract":"Usage control model (UCON) is based on the idea that attributes required for decision-making can be changed over a period of usage. Since it is not always possible to get a fresh and trustworthy value of attributes, a decision has to be done with some uncertainties in mind. Moreover, modern systems become more distributed and dynamic and this evolution aggravates the problem. Such trend demands for the solutions capable of working with imprecise values. Our study concerns analysis of risks to make access decision of usage control more credible. We consider the risks associated with imperfect mechanisms collecting information about an authorization context. To cope with these risks we introduce our approach based on Markov chains, which aims to help in making a decision to allow further access or to deny it. The proposed approach could be useful for designers of the policy enforcement engines based on the UCON model.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127334014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
2010 Fifth International Conference on Internet Monitoring and Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1