首页 > 最新文献

2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Traffic Flow Classification and Visualization for Network Forensic Analysis 网络取证分析的流量分类和可视化
Nuttachot Promrit, A. Mingkhwan
This paper presents an iterative visualization technique including the timeline and parallel coordinates to illustrate network communication for forensic analysis. In primarily analysis process, the timeline of events is reconstructed from traffic logs. An analyst can track the related anomaly event on-demand. In addition the details of abnormal and normal activities are shown in multiple dimensions of parallel coordinates. The novelty of this research is not a presentation of the timeline and parallel coordinates technique, but iterative visualization framework to illustrate both anomaly traffic and application traffic pattern. We applied frequent item-set mining to search dominant traffic flow and classify them by traffic flow shape and entropy. Although some studies have been applied frequent item-set mining with traffic dataset, but as we have known, this is the first research to 1) take advantages of the frequent item-set mining and parallel coordinates, which allow us to find both the anomaly traffic and application traffic and it can easily understand the patterns of traffic flow with the multi-dimensional visualization, and 2) classify the application traffic from the entropy values of traffic flow discovered by frequent item-set mining. This method is able to classify the encrypted traffic data and it does not violate a user privacy. The results of this research and development of a visual network communication tool can: 1) show abnormalities and normal communication activities, 2) have application traffic classification 92% accurate, 3) be a visual network communication prototype which helps an analyst to find the cause of the network malfunction.
本文提出了一种包括时间线和平行坐标在内的迭代可视化技术来说明法医分析中的网络通信。在主要的分析过程中,从流量日志中重构事件的时间线。分析人员可以按需跟踪相关的异常事件。此外,异常和正常活动的细节以平行坐标的多维度显示。本研究的新颖之处不在于给出时间轴和平行坐标技术,而是采用迭代的可视化框架来描述异常流量和应用流量模式。利用频繁项集挖掘技术搜索优势交通流,并根据交通流形状和熵对优势交通流进行分类。虽然已经有一些研究将频繁项集挖掘应用于交通数据集,但正如我们所知,这是第一次利用频繁项集挖掘和并行坐标的优势,使我们能够同时发现异常流量和应用流量,并且可以通过多维可视化轻松地理解交通流的模式;2)从频繁项集挖掘发现的流量熵值中对应用流量进行分类。该方法能够对加密的流量数据进行分类,并且不侵犯用户隐私。本研究开发的可视化网络通信工具的结果可以:1)显示异常和正常的通信活动,2)具有92%的应用流量分类准确率,3)是一个可视化网络通信原型,可以帮助分析人员找到网络故障的原因。
{"title":"Traffic Flow Classification and Visualization for Network Forensic Analysis","authors":"Nuttachot Promrit, A. Mingkhwan","doi":"10.1109/AINA.2015.207","DOIUrl":"https://doi.org/10.1109/AINA.2015.207","url":null,"abstract":"This paper presents an iterative visualization technique including the timeline and parallel coordinates to illustrate network communication for forensic analysis. In primarily analysis process, the timeline of events is reconstructed from traffic logs. An analyst can track the related anomaly event on-demand. In addition the details of abnormal and normal activities are shown in multiple dimensions of parallel coordinates. The novelty of this research is not a presentation of the timeline and parallel coordinates technique, but iterative visualization framework to illustrate both anomaly traffic and application traffic pattern. We applied frequent item-set mining to search dominant traffic flow and classify them by traffic flow shape and entropy. Although some studies have been applied frequent item-set mining with traffic dataset, but as we have known, this is the first research to 1) take advantages of the frequent item-set mining and parallel coordinates, which allow us to find both the anomaly traffic and application traffic and it can easily understand the patterns of traffic flow with the multi-dimensional visualization, and 2) classify the application traffic from the entropy values of traffic flow discovered by frequent item-set mining. This method is able to classify the encrypted traffic data and it does not violate a user privacy. The results of this research and development of a visual network communication tool can: 1) show abnormalities and normal communication activities, 2) have application traffic classification 92% accurate, 3) be a visual network communication prototype which helps an analyst to find the cause of the network malfunction.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"28 1","pages":"358-364"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84114532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Why Internet Protocols Need Incentives 为什么互联网协议需要激励
David Murray
Internet routers are a commons. While modest regulatory measures have generally been successful for Information Communication Technologies (ICT), this paper argues that the lack of regulation has hindered the technological evolution of the Internet in some areas. This issue is examined through five Internet problems, and the technological solutions adopted. The key contribution of this paper is the explanation of these issues and the identification of areas where misaligned incentives promote inadequate solutions or inaction. The paper reviews the available measures to encourage the adoption of globally beneficial Internet technologies.
互联网路由器是公共的。虽然适度的监管措施通常对信息通信技术(ICT)是成功的,但本文认为,缺乏监管阻碍了互联网在某些领域的技术发展。这个问题是通过五个互联网问题,并采用技术解决方案进行审查。本文的关键贡献在于解释了这些问题,并确定了不一致的激励导致解决方案不充分或不作为的领域。本文回顾了鼓励采用对全球有利的互联网技术的现有措施。
{"title":"Why Internet Protocols Need Incentives","authors":"David Murray","doi":"10.1109/WAINA.2015.48","DOIUrl":"https://doi.org/10.1109/WAINA.2015.48","url":null,"abstract":"Internet routers are a commons. While modest regulatory measures have generally been successful for Information Communication Technologies (ICT), this paper argues that the lack of regulation has hindered the technological evolution of the Internet in some areas. This issue is examined through five Internet problems, and the technological solutions adopted. The key contribution of this paper is the explanation of these issues and the identification of areas where misaligned incentives promote inadequate solutions or inaction. The paper reviews the available measures to encourage the adoption of globally beneficial Internet technologies.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"104 1","pages":"261-266"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86944110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Protocol for End-to-End Key Establishment During Route Discovery in MANETs 一种基于路由发现的端到端密钥建立协议
Shrikant H. Talawar, R. Hansdah
An end-to-end shared secret key between two distant nodes in a mobile ad hoc network (MANET) is essential for providing secure communication between them. However, to provide effective security in a MANET, end-to-end key establishment should be secure against both internal as well as external malicious nodes. An external malicious node in a MANET does not possess any valid security credential related to the MANET, whereas an internal malicious node would possess some valid security credentials related to the MANET. Most of the protocols for end-to-end key establishment in MANETs either make an unrealistic assumption that an end-to-end secure channel exists between source and destination or use bandwidth consuming multi-path schemes. In this paper, we propose a simple and efficient protocol for end-to-end key establishment during route discovery (E2-KDR) in MANETs. Unlike many other existing schemes, the protocol establishes end-to-end key using trust among the nodes which, during initial stage, is established using public key certificate issued by an off-line membership granting authority. However, the use of public key in the proposed protocol is minimal to make it efficient. Since the key is established during route discovery phase, it reduces the key establishment time. The proposed protocol exploits mobility to establish end-to-end key, and provides comprehensive solution by making use of symmetric keys for protecting routing control messages and end-to-end communication. Moreover, as the end-to-end keys are established during route discovery phase, the protocol is on-demand and only necessary keys are established, which makes the protocol storage scalable. The protocol is shown to be secure using security analysis, and its efficiency is confirmed by the results obtained from simulation experiments.
移动自组织网络(MANET)中两个远程节点之间的端到端共享密钥对于提供它们之间的安全通信至关重要。然而,为了在MANET中提供有效的安全性,端到端密钥建立应该对内部和外部恶意节点都是安全的。MANET中的外部恶意节点不拥有与MANET相关的任何有效安全凭证,而内部恶意节点将拥有与MANET相关的一些有效安全凭证。大多数用于manet端到端密钥建立的协议要么不切实际地假设源端和目的端之间存在端到端安全通道,要么使用消耗带宽的多路径方案。在本文中,我们提出了一种简单有效的路由发现过程中端到端密钥建立协议(E2-KDR)。与许多其他现有方案不同,该协议使用节点之间的信任建立端到端密钥,在初始阶段,使用由离线成员资格授予机构颁发的公钥证书建立信任。然而,在提议的协议中,公钥的使用是最小的,以使其高效。由于密钥是在路由发现阶段建立的,因此缩短了密钥建立的时间。该协议利用移动性建立端到端密钥,并利用对称密钥对路由控制消息和端到端通信进行保护,提供了全面的解决方案。此外,由于端到端密钥是在路由发现阶段建立的,因此协议是按需的,只建立必要的密钥,这使得协议存储具有可扩展性。通过安全性分析验证了协议的安全性,仿真实验结果验证了协议的有效性。
{"title":"A Protocol for End-to-End Key Establishment During Route Discovery in MANETs","authors":"Shrikant H. Talawar, R. Hansdah","doi":"10.1109/AINA.2015.183","DOIUrl":"https://doi.org/10.1109/AINA.2015.183","url":null,"abstract":"An end-to-end shared secret key between two distant nodes in a mobile ad hoc network (MANET) is essential for providing secure communication between them. However, to provide effective security in a MANET, end-to-end key establishment should be secure against both internal as well as external malicious nodes. An external malicious node in a MANET does not possess any valid security credential related to the MANET, whereas an internal malicious node would possess some valid security credentials related to the MANET. Most of the protocols for end-to-end key establishment in MANETs either make an unrealistic assumption that an end-to-end secure channel exists between source and destination or use bandwidth consuming multi-path schemes. In this paper, we propose a simple and efficient protocol for end-to-end key establishment during route discovery (E2-KDR) in MANETs. Unlike many other existing schemes, the protocol establishes end-to-end key using trust among the nodes which, during initial stage, is established using public key certificate issued by an off-line membership granting authority. However, the use of public key in the proposed protocol is minimal to make it efficient. Since the key is established during route discovery phase, it reduces the key establishment time. The proposed protocol exploits mobility to establish end-to-end key, and provides comprehensive solution by making use of symmetric keys for protecting routing control messages and end-to-end communication. Moreover, as the end-to-end keys are established during route discovery phase, the protocol is on-demand and only necessary keys are established, which makes the protocol storage scalable. The protocol is shown to be secure using security analysis, and its efficiency is confirmed by the results obtained from simulation experiments.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"25 1","pages":"176-184"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78453064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Transmitting Scalable Video Streaming over Wireless Ad Hoc Networks 通过无线自组织网络传输可扩展的视频流
Walayat Hussain, F. Hussain, O. Hussain
Due to the rapid increase in the use of social networking websites and applications, the need to stream video over wireless networks has increased. There are a number of considerations when transmitting streaming video between the nodes connected through wireless networks, such as throughput, the size of the multimedia file, response time, delay, scalability and loss of data. The scalability of ad-hoc networks needs to be analyzed by considering various aspects, such as self-organization, security, routing flexibility, availability of bandwidth, data distribution, Quality of Service, throughput, response time and efficiency. In this paper, we discuss the existing approaches to multimedia routing and transmission over wireless ad-hoc networks by considering scalability. The study draws several conclusions and makes recommendations for future directions.
由于社交网站和应用程序的使用迅速增加,通过无线网络传输视频的需求也在增加。在通过无线网络连接的节点之间传输流视频时,有许多考虑因素,例如吞吐量、多媒体文件的大小、响应时间、延迟、可伸缩性和数据丢失。需要通过考虑自组织、安全性、路由灵活性、带宽可用性、数据分布、服务质量、吞吐量、响应时间和效率等各个方面来分析ad-hoc网络的可伸缩性。本文从可扩展性的角度讨论了现有的无线自组织网络中多媒体路由和传输的方法。该研究得出了几个结论,并对未来的发展方向提出了建议。
{"title":"Transmitting Scalable Video Streaming over Wireless Ad Hoc Networks","authors":"Walayat Hussain, F. Hussain, O. Hussain","doi":"10.1109/AINA.2015.186","DOIUrl":"https://doi.org/10.1109/AINA.2015.186","url":null,"abstract":"Due to the rapid increase in the use of social networking websites and applications, the need to stream video over wireless networks has increased. There are a number of considerations when transmitting streaming video between the nodes connected through wireless networks, such as throughput, the size of the multimedia file, response time, delay, scalability and loss of data. The scalability of ad-hoc networks needs to be analyzed by considering various aspects, such as self-organization, security, routing flexibility, availability of bandwidth, data distribution, Quality of Service, throughput, response time and efficiency. In this paper, we discuss the existing approaches to multimedia routing and transmission over wireless ad-hoc networks by considering scalability. The study draws several conclusions and makes recommendations for future directions.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"35 1","pages":"201-206"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89450986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Location Search Based on Subarea Fingerprinting and Surface Fitting for Indoor Positioning System 基于分区指纹和曲面拟合的室内定位系统位置搜索
Bang Wang, Shengliang Zhou
The fingerprinting technique based on received signal strength (RSS) has been intensively researched for indoor localization in the last decade. Instead of using discrete reference points to build a fingerprint database, this paper applies the surface fitting technique to construct RSS spatial distribution functions and proposes two location search methods to find the target location. We also propose to use subarea division and determination to improve the fitting accuracy and search efficiency. In the offline phase, we divide the whole indoor environment into several subareas, construct a fingerprint for each subarea, and build a RSS fitting function for each access point in each subarea. In the online phase, we first determine to which subarea a target belongs, and then search its location according to the proposed exhaustive location search or gradient descent based search algorithm. We conduct both simulations and field experiments to verify the proposed scheme. The experiment results show that for the same reference point granularity, the proposed scheme can achieve on average 10% to 22% localization accuracy improvements, compared with the classical nearest neighbor-based fingerprinting method.
近十年来,基于接收信号强度(RSS)的指纹识别技术在室内定位方面得到了广泛的研究。本文采用曲面拟合技术构建RSS空间分布函数,取代了以往使用离散参考点构建指纹数据库的方法,并提出了两种定位搜索方法来寻找目标位置。为了提高拟合精度和搜索效率,我们还提出了分区和确定的方法。在离线阶段,我们将整个室内环境划分为几个子区域,为每个子区域构建指纹,并为每个子区域中的每个接入点构建RSS拟合函数。在在线阶段,我们首先确定目标属于哪个子区域,然后根据提出的穷举位置搜索或基于梯度下降的搜索算法搜索目标的位置。我们进行了模拟和现场实验来验证所提出的方案。实验结果表明,在相同参考点粒度的情况下,与传统的基于最近邻的指纹识别方法相比,该方法的定位精度平均可提高10% ~ 22%。
{"title":"Location Search Based on Subarea Fingerprinting and Surface Fitting for Indoor Positioning System","authors":"Bang Wang, Shengliang Zhou","doi":"10.1109/AINA.2015.199","DOIUrl":"https://doi.org/10.1109/AINA.2015.199","url":null,"abstract":"The fingerprinting technique based on received signal strength (RSS) has been intensively researched for indoor localization in the last decade. Instead of using discrete reference points to build a fingerprint database, this paper applies the surface fitting technique to construct RSS spatial distribution functions and proposes two location search methods to find the target location. We also propose to use subarea division and determination to improve the fitting accuracy and search efficiency. In the offline phase, we divide the whole indoor environment into several subareas, construct a fingerprint for each subarea, and build a RSS fitting function for each access point in each subarea. In the online phase, we first determine to which subarea a target belongs, and then search its location according to the proposed exhaustive location search or gradient descent based search algorithm. We conduct both simulations and field experiments to verify the proposed scheme. The experiment results show that for the same reference point granularity, the proposed scheme can achieve on average 10% to 22% localization accuracy improvements, compared with the classical nearest neighbor-based fingerprinting method.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"31 1","pages":"302-309"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75802638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of the Smart Chair System for Multi-functional Unconstrained Healthcare Monitoring 多功能无约束医疗监测智能座椅系统的实现
Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong
User's varying posture incurs undesired measurement error on conventional BCG or non-restrictive ECG measurement system during real time measurement. In this paper, we present a novel UBPchair that embed BCG, nonrestrictive ECG, and the posture detection system within a single chair to overcome such problem. Through our evaluation result, we prove that our UBPchair is a fully functional system which is work well for continuous bio signals and posture detection. It is simple and comfortable.
常规BCG或非限制性心电测量系统在实时测量时,由于使用者姿势的变化,会产生不期望的测量误差。在本文中,我们提出了一种新型的UBPchair,它将BCG、非限制性ECG和姿势检测系统嵌入到一把椅子中,以克服这一问题。通过我们的评估结果,我们证明了我们的UBPchair是一个功能齐全的系统,可以很好地用于连续生物信号和姿势检测。它既简单又舒适。
{"title":"Implementation of the Smart Chair System for Multi-functional Unconstrained Healthcare Monitoring","authors":"Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong","doi":"10.1109/AINA.2015.220","DOIUrl":"https://doi.org/10.1109/AINA.2015.220","url":null,"abstract":"User's varying posture incurs undesired measurement error on conventional BCG or non-restrictive ECG measurement system during real time measurement. In this paper, we present a novel UBPchair that embed BCG, nonrestrictive ECG, and the posture detection system within a single chair to overcome such problem. Through our evaluation result, we prove that our UBPchair is a fully functional system which is work well for continuous bio signals and posture detection. It is simple and comfortable.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"59 1","pages":"448-452"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88510439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Multipath Transmission Model and Its Route Selection Policy Considering Packet Re-sequencing Buffers Availability 考虑数据包重排序缓冲区可用性的多路径传输模型及其路由选择策略
Y. Yoshinaga, M. Shimamura, K. Iida
Multipath transmission in intermediate nodes is a promising approach to support high bandwidth applications. To prevent out-of-order packet deliveries, packet re-sequencing nodes must be deployed. In this paper, we propose a multipath transmission model that incorporates packet re-sequencing buffers and the Random with Availability Check policy. After mathematically analyzing the model, we show numerical comparisons between the Random with Availability Check and Random policies.
中间节点的多径传输是支持高带宽应用的一种很有前途的方法。为了防止乱序的数据包传递,必须部署数据包重新排序节点。在本文中,我们提出了一个多路径传输模型,该模型结合了数据包重排序缓冲和随机可用性检查策略。在对模型进行数学分析后,我们给出了带有可用性检查的随机策略和随机策略之间的数值比较。
{"title":"Multipath Transmission Model and Its Route Selection Policy Considering Packet Re-sequencing Buffers Availability","authors":"Y. Yoshinaga, M. Shimamura, K. Iida","doi":"10.1109/WAINA.2015.88","DOIUrl":"https://doi.org/10.1109/WAINA.2015.88","url":null,"abstract":"Multipath transmission in intermediate nodes is a promising approach to support high bandwidth applications. To prevent out-of-order packet deliveries, packet re-sequencing nodes must be deployed. In this paper, we propose a multipath transmission model that incorporates packet re-sequencing buffers and the Random with Availability Check policy. After mathematically analyzing the model, we show numerical comparisons between the Random with Availability Check and Random policies.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"715-720"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88587988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Application of Neural Networks for Intrusion Detection in Tor Networks 神经网络在Tor网络入侵检测中的应用
Taro Ishitaki, Donald Elmazi, Yi Liu, Tetsuya Oda, L. Barolli, K. Uchida
Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect the intrusion in Tor networks. In this paper, we present the application of Neural Networks (NNs) for intrusion detection in Tor networks. We used the Back propagation NN and constructed a Tor server and a Deep Web browser (client). Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then use the Back propagation NN to make the approximation. The simulation results show that our simulation system has a good approximation and can be used for intrusion detection in To networks.
由于Tor基础设施为用户提供的匿名性,Tor已成为恶意用户的有用工具。使用Tor,用户可以违背计算机安全的不可否认原则。此外,潜在的黑客可能会在Tor背后发起DDoS或身份盗窃等攻击。因此,需要新的系统和模型来检测Tor网络中的入侵。本文介绍了神经网络在Tor网络入侵检测中的应用。我们使用了反向传播神经网络,并构建了一个Tor服务器和一个深度网络浏览器(客户端)。然后,客户端通过Tor网络将数据浏览发送给Tor服务器。我们使用Wireshark网络分析器获取数据,然后使用反向传播神经网络进行近似。仿真结果表明,该仿真系统具有良好的逼近性,可用于网络中的入侵检测。
{"title":"Application of Neural Networks for Intrusion Detection in Tor Networks","authors":"Taro Ishitaki, Donald Elmazi, Yi Liu, Tetsuya Oda, L. Barolli, K. Uchida","doi":"10.1109/WAINA.2015.136","DOIUrl":"https://doi.org/10.1109/WAINA.2015.136","url":null,"abstract":"Due to the amount of anonymity afforded to users of the Tor infrastructure, Tor has become a useful tool for malicious users. With Tor, the users are able to compromise the non-repudiation principle of computer security. Also, the potentially hackers may launch attacks such as DDoS or identity theft behind Tor. For this reason, there are needed new systems and models to detect the intrusion in Tor networks. In this paper, we present the application of Neural Networks (NNs) for intrusion detection in Tor networks. We used the Back propagation NN and constructed a Tor server and a Deep Web browser (client). Then, the client sends the data browsing to the Tor server using the Tor network. We used Wireshark Network Analyzer to get the data and then use the Back propagation NN to make the approximation. The simulation results show that our simulation system has a good approximation and can be used for intrusion detection in To networks.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"138 1","pages":"67-72"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86694216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
The Research of Security of P2P Network File Sharing System P2P网络文件共享系统的安全性研究
Shaojing Li, Wanli Su, Haoling Li
Peer to peer network is highly huge, open and dynamic. The nodes in the network with autonomy, anonymity, can freely join in or leave the network, and they do not need to be responsible for their own behavior, which reduces the P2P file sharing system's transaction success rate and brings a lot of serious hidden security danger. Some security issues in the P2P network file share system were studied in this paper. The reputation incentive mechanism is established to encourage nodes to contribute own resources positively, increase network resources and promote the healthy development of network, which can improve the resources localization rate and transaction success rate to enhance the network's security.
点对点网络是高度庞大、开放和动态的。网络中的节点具有自主性、匿名性,可以自由地加入或离开网络,不需要对自己的行为负责,这降低了P2P文件共享系统的交易成功率,带来了很多严重的安全隐患。本文对P2P网络文件共享系统中的一些安全问题进行了研究。建立声誉激励机制,鼓励节点积极贡献自身资源,增加网络资源,促进网络健康发展,提高资源定位率和交易成功率,增强网络的安全性。
{"title":"The Research of Security of P2P Network File Sharing System","authors":"Shaojing Li, Wanli Su, Haoling Li","doi":"10.1109/WAINA.2015.57","DOIUrl":"https://doi.org/10.1109/WAINA.2015.57","url":null,"abstract":"Peer to peer network is highly huge, open and dynamic. The nodes in the network with autonomy, anonymity, can freely join in or leave the network, and they do not need to be responsible for their own behavior, which reduces the P2P file sharing system's transaction success rate and brings a lot of serious hidden security danger. Some security issues in the P2P network file share system were studied in this paper. The reputation incentive mechanism is established to encourage nodes to contribute own resources positively, increase network resources and promote the healthy development of network, which can improve the resources localization rate and transaction success rate to enhance the network's security.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"13 1","pages":"250-254"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89085151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Apparecium: Revealing Data Flows in Android Applications Apparecium:揭示Android应用程序中的数据流
Dennis Titze, J. Schütte
With Android applications processing not only personal but also business-critical data, efficient and precise data flow analysis has become a major technique to detect apps handling critical data in unwanted ways. Although data flow analysis in general is a thoroughly researched topic, the event-driven lifecycle model of Android has its own challenges and practical application requires for reliable and efficient analysis techniques. In this paper we present Apparecium, a tool to reveal data flows in Android applications. Apparecium has conceptual differences to other techniques, and can be used to find arbitrary data flows inside Android applications. Details about the used techniques and the differences to existing data flow analysis tools are presented, as well as an evaluation against the data flow analysis framework Flow Droid.
由于Android应用程序不仅处理个人数据,还处理关键业务数据,高效和精确的数据流分析已成为检测应用程序以不希望的方式处理关键数据的主要技术。虽然数据流分析总体上是一个被深入研究的课题,但Android的事件驱动生命周期模型有其自身的挑战,实际应用需要可靠、高效的分析技术。在本文中,我们介绍了Apparecium,一个揭示Android应用程序中的数据流的工具。Apparecium与其他技术在概念上有所不同,可用于在Android应用程序中查找任意数据流。详细介绍了所使用的技术以及与现有数据流分析工具的区别,并对数据流分析框架flow Droid进行了评估。
{"title":"Apparecium: Revealing Data Flows in Android Applications","authors":"Dennis Titze, J. Schütte","doi":"10.1109/AINA.2015.239","DOIUrl":"https://doi.org/10.1109/AINA.2015.239","url":null,"abstract":"With Android applications processing not only personal but also business-critical data, efficient and precise data flow analysis has become a major technique to detect apps handling critical data in unwanted ways. Although data flow analysis in general is a thoroughly researched topic, the event-driven lifecycle model of Android has its own challenges and practical application requires for reliable and efficient analysis techniques. In this paper we present Apparecium, a tool to reveal data flows in Android applications. Apparecium has conceptual differences to other techniques, and can be used to find arbitrary data flows inside Android applications. Details about the used techniques and the differences to existing data flow analysis tools are presented, as well as an evaluation against the data flow analysis framework Flow Droid.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"36 1","pages":"579-586"},"PeriodicalIF":0.0,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88519673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1