In recent decades, wireless communication networks has fundamentally transformed our live. The technology itself is progressing and exploring new horizons. The delegates in ICCNS 2018 will discuss and present the latest advances in next generation networking with security aspects. A diverse range of topics from cellular technology, Internet of Things (IoT), as well as energy efficiency and green communication systems are featured in the conference. Network security is also an important issue with the development of new infrastructures and with the proliferation of different type of attacks.
Proceeding Downloads
Edmund: Entropy based attack Detection and Mitigation engine Using Netflow Data
Dozens of signature and anomaly based solutions have been proposed to detect malicious activities in computer networks. However, the number of successful attacks are increasing every day. In this paper, we developed a novel entropy based technique, ...
The Effectiveness Assessment for Network Based MTD Strategies
In this paper, the assessment of effectiveness for diverse proactive strategies in Network based Moving Target Defense (NMTD) is studied. To evaluate those Moving Target (MT) techniques, we classify those methods into four catalogs and abstract those ...
Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme
As a new concept proposed recently, partially blind proxy re-signature scheme (PBPRSS) holds the advantages of the partially blind signature and proxy re-signature. In PBPRSS, a semi-trust third party called the proxy can re-sign a message with a piece ...
A Model for Analyzing the Effectiveness of Moving Target Defense
Moving target defense(MTD) is a typical proactive cyber defense technology, which not only increases the difficulty of the attacker, but also reduces the damage caused by successful attacks. A number of studies have assessed the defensive effectiveness ...
A Study of Neighbor Users Selection in Email Networks for Spam Filtering
Due to the protection of data security and personal privacy in email networks, it is difficult to select the neighbor user using email user's personalized attributes and behavior data. In daily life, the more interactive the people are, the more similar ...
Attack Intent Analysis Method Based on Attack Path Graph
At present, with the increase of automated attack tools and the development of the underground industrial chain brought by network attack, even well-managed network is vulnerable to complex multi-step network attack, which combines multiple network ...
A method of cyber risk control node selection based on Game Theory
For the occurrence of network attacks, the most important thing for network security managers is how to conduct attack security defenses under low-risk control. And in the attack risk control, the first and most important step is to choose the defense ...
Research on Intrusion Detection Method Based on Improved Smote and XGBoost
In view of the unbalanced data set, the original intrusion detection method cannot accurately detect the network security intrusion behavior. An improved smote and XGBoost intrusion detection method is proposed. In terms of the diversity of security ...
Certification and remote attestation methods of the eTPM trusted cloud
Trust computing is widely used in various enterprise clouds now. While benefiting from the protections and services provided by the trusted cloud, internal departments of the enterprise are also faced with some security issues, as current trusted cloud ...
Progressive Two-bits Tweak for Linear Redundancy reduction from Finite Field S-Boxes
The Substitution Box (S-Box) is the most sensitive parameter of the modern block ciphers using only this technique to provide the necessary confusion effect against the linear and differential cryptanalysis. Among these block ciphers; several use the ...
Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers
With the rapid development of network and communication technologies, everything is able to be connected to the Internet. IoT devices, which include home routers, IP cameras, wireless printers and so on, are crucial parts facilitating to build pervasive ...
Case Study: Discovering Hardware Trojans Based on model checking
Hardware Trojan may cause changes in system functions, system information leakage, and system damage or system paralysis. According to the hardware Trojan classification method, this paper discusses the hardware Trojan that belongs to the design stage, ...
Android Malware Detection Based on Multi-Features
With the widespread use of the Android system, the number of malicious Android applications increases sharply. How to effectively identify malware and improve the successful detection of malicious code becomes increasingly important. Traditionally, the ...
Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning
Malware detection is getting more and more attention due to the rapid growth of new malware. As a result, machine learning (ML) has become a popular way to detect malware variants. However, machine learning models can also be cheated. Through ...
A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network
Identity authentication is an important line of defense for network security, and passwords are still the mainstream of identity authentication. Password attacking is an important means of password security research. Probabilistic context-free grammar (...
A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy
With the rapid development of big data technology, the issue of preserving personal privacy has attracted more and more attention. It has been shown that protecting the published graph with the differential privacy can ensure not only the quantitative ...
Weakness Identification and Flow Analysis Based on Tor Network
As the Internet technology develops rapidly, attacks against Tor networks becomes more and more frequent. So, it's more and more difficult for Tor network to meet people's demand to protect their private information. A method to improve the anonymity of ...
SD-WAN Source Route Based on Protocol-oblivious Forwarding
Larger companies need more sites in the wide area network (WAN). However, internet service providers cannot obtain sufficient capacity to handle peak traffic, causing a terrible delay. The software-defined network (SDN) allows to own more ...
Multiple Eavesdropper-Based Physical Layer Security in TAS/MRC System With Antenna Correlation
In this paper, we analyze the impact of the antenna correlation on the secrecy of multiple-input multiple-output (MIMO) wiretap channels with multiple eavesdroppers, where transmit antenna selection (TAS) and maximal-ratio combining (MRC) are employed ...
Identification Method of Power Spectral Signal Based on Fourier Series Fitting and Density Clustering
A method for obtaining the specific usage of spectrum in the power spectrum sequence is proposed in this paper. For the obtained power spectrum, baseline noise is fitted by the Fourier series and then subtracted from the original power spectrum signal ...
Constructing A Novel Spark-based Distributed Maximum Frequent Sequence Pattern Mining for IoT Log
Sequence pattern mining is a research hotspot in the cyber security field for Internet of Things (IoT). In general, while the data volume is large in a distributed IoT environment, the mining efficiency of the frequent sequence pattern is very low due ...
Fast Abnormal Identification for Large Scale Internet Traffic
Traffic classification and identification is the key part in network security industry. It can identify the types of the Internet traffic, and detect abnormal ones based on the features of network flows. Nowadays, due tothenon-transparency and ...
A Modified Source Number Estimation Method based on Wavelet Analysis and Singular Value Decomposition
In underdetermined blind source separation (BSS) algorithms, source number estimation is a precondition and a difficulty. An improved source number estimation method based on wavelet analysis and singular value decomposition is pro-posed. First, the ...
Multi-pattern Matching Algorithm based on Variable Step Size
By analyzing the existing pattern matching algorithms, we found AC_BM algorithm or AC_SUNDAY algorithm combine the advantages of AC algorithm and the single-pattern matching algorithms. When a mismatch occurs, the moving distance on matching trees ...
Research on Task Scheduling Model for Multi-core Processor
Multi-core processor task scheduling has been proved to be an NP-hard problem, and the existing solutions mostly use heuristic algorithms. Among these heuristic algorithms, the saving algorithm is an algorithm with higher scheduling success rate. ...
A Cloud Storage Resource Transaction Mechanism Based on Smart Contract
Since the security and fault tolerance is the two important metrics of the data storage, it brings both opportunities and challenges for distributed data storage and transaction. The traditional transaction system of storage resources, which generally ...
Parallel Machine Scheduling with Rejection under Special Conditions
We consider a version of parallel machine scheduling with rejection. There are m machines and n jobs, and each job is either accepted and then processed by one of the machines, or rejected and then a rejected fee is paid. The goal is to find a way of ...
Research on Kubernetes' Resource Scheduling Scheme
Currently, Google's open source container orchestration tool Kubernetes (K8s for short) has become the standard of fact for deploying containerized applications on a large scale in private, public, and hybrid cloud environments. By studying the ...
Mixing Matrix Estimation Method for UBSS based on Observed Data Segmentation
This paper presents a mixing matrix estimation method for underdetermined blind source separation (UBSS) when source signals are insufficiently sparse. Main ideas are as follows: Observed signals are segmented. Then mixing matrices for every segment of ...
Stability Analysis of Tail Water Slope out of the Underground Power Station in Hydropower Engineering
The slope stability situation surrounding the dam site area is very important to each correlative department during constructing hydroelectric power station. The slope stability is studied by numerical simulation under different conditions based on the ...