skip to main content
10.1145/3290480acmotherconferencesBook PagePublication PagesiccnsConference Proceedingsconference-collections
ICCNS '18: Proceedings of the 8th International Conference on Communication and Network Security
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICCNS 2018: 2018 the 8th International Conference on Communication and Network Security Qingdao China November 2 - 4, 2018
ISBN:
978-1-4503-6567-3
Published:
02 November 2018

Bibliometrics
Skip Abstract Section
Abstract

In recent decades, wireless communication networks has fundamentally transformed our live. The technology itself is progressing and exploring new horizons. The delegates in ICCNS 2018 will discuss and present the latest advances in next generation networking with security aspects. A diverse range of topics from cellular technology, Internet of Things (IoT), as well as energy efficiency and green communication systems are featured in the conference. Network security is also an important issue with the development of new infrastructures and with the proliferation of different type of attacks.

Skip Table Of Content Section
SESSION: Cyber attack and defense strategy
research-article
Edmund: Entropy based attack Detection and Mitigation engine Using Netflow Data

Dozens of signature and anomaly based solutions have been proposed to detect malicious activities in computer networks. However, the number of successful attacks are increasing every day. In this paper, we developed a novel entropy based technique, ...

research-article
The Effectiveness Assessment for Network Based MTD Strategies

In this paper, the assessment of effectiveness for diverse proactive strategies in Network based Moving Target Defense (NMTD) is studied. To evaluate those Moving Target (MT) techniques, we classify those methods into four catalogs and abstract those ...

research-article
Security Analysis and Improvement of Partially Blind Proxy Re-signature Scheme

As a new concept proposed recently, partially blind proxy re-signature scheme (PBPRSS) holds the advantages of the partially blind signature and proxy re-signature. In PBPRSS, a semi-trust third party called the proxy can re-sign a message with a piece ...

research-article
A Model for Analyzing the Effectiveness of Moving Target Defense

Moving target defense(MTD) is a typical proactive cyber defense technology, which not only increases the difficulty of the attacker, but also reduces the damage caused by successful attacks. A number of studies have assessed the defensive effectiveness ...

research-article
A Study of Neighbor Users Selection in Email Networks for Spam Filtering

Due to the protection of data security and personal privacy in email networks, it is difficult to select the neighbor user using email user's personalized attributes and behavior data. In daily life, the more interactive the people are, the more similar ...

research-article
Attack Intent Analysis Method Based on Attack Path Graph

At present, with the increase of automated attack tools and the development of the underground industrial chain brought by network attack, even well-managed network is vulnerable to complex multi-step network attack, which combines multiple network ...

research-article
A method of cyber risk control node selection based on Game Theory

For the occurrence of network attacks, the most important thing for network security managers is how to conduct attack security defenses under low-risk control. And in the attack risk control, the first and most important step is to choose the defense ...

research-article
Research on Intrusion Detection Method Based on Improved Smote and XGBoost

In view of the unbalanced data set, the original intrusion detection method cannot accurately detect the network security intrusion behavior. An improved smote and XGBoost intrusion detection method is proposed. In terms of the diversity of security ...

SESSION: Network and data security
research-article
Certification and remote attestation methods of the eTPM trusted cloud

Trust computing is widely used in various enterprise clouds now. While benefiting from the protections and services provided by the trusted cloud, internal departments of the enterprise are also faced with some security issues, as current trusted cloud ...

research-article
Progressive Two-bits Tweak for Linear Redundancy reduction from Finite Field S-Boxes

The Substitution Box (S-Box) is the most sensitive parameter of the modern block ciphers using only this technique to provide the necessary confusion effect against the linear and differential cryptanalysis. Among these block ciphers; several use the ...

research-article
Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers

With the rapid development of network and communication technologies, everything is able to be connected to the Internet. IoT devices, which include home routers, IP cameras, wireless printers and so on, are crucial parts facilitating to build pervasive ...

research-article
Case Study: Discovering Hardware Trojans Based on model checking

Hardware Trojan may cause changes in system functions, system information leakage, and system damage or system paralysis. According to the hardware Trojan classification method, this paper discusses the hardware Trojan that belongs to the design stage, ...

research-article
Android Malware Detection Based on Multi-Features

With the widespread use of the Android system, the number of malicious Android applications increases sharply. How to effectively identify malware and improve the successful detection of malicious code becomes increasingly important. Traditionally, the ...

research-article
Enhancing Machine Learning Based Malware Detection Model by Reinforcement Learning

Malware detection is getting more and more attention due to the rapid growth of new malware. As a result, machine learning (ML) has become a popular way to detect malware variants. However, machine learning models can also be cheated. Through ...

research-article
A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network

Identity authentication is an important line of defense for network security, and passwords are still the mainstream of identity authentication. Password attacking is an important means of password security research. Probabilistic context-free grammar (...

research-article
A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy

With the rapid development of big data technology, the issue of preserving personal privacy has attracted more and more attention. It has been shown that protecting the published graph with the differential privacy can ensure not only the quantitative ...

SESSION: Communication network and signal processing
research-article
Weakness Identification and Flow Analysis Based on Tor Network

As the Internet technology develops rapidly, attacks against Tor networks becomes more and more frequent. So, it's more and more difficult for Tor network to meet people's demand to protect their private information. A method to improve the anonymity of ...

research-article
SD-WAN Source Route Based on Protocol-oblivious Forwarding

Larger companies need more sites in the wide area network (WAN). However, internet service providers cannot obtain sufficient capacity to handle peak traffic, causing a terrible delay. The software-defined network (SDN) allows to own more ...

research-article
Multiple Eavesdropper-Based Physical Layer Security in TAS/MRC System With Antenna Correlation

In this paper, we analyze the impact of the antenna correlation on the secrecy of multiple-input multiple-output (MIMO) wiretap channels with multiple eavesdroppers, where transmit antenna selection (TAS) and maximal-ratio combining (MRC) are employed ...

research-article
Identification Method of Power Spectral Signal Based on Fourier Series Fitting and Density Clustering

A method for obtaining the specific usage of spectrum in the power spectrum sequence is proposed in this paper. For the obtained power spectrum, baseline noise is fitted by the Fourier series and then subtracted from the original power spectrum signal ...

research-article
Constructing A Novel Spark-based Distributed Maximum Frequent Sequence Pattern Mining for IoT Log

Sequence pattern mining is a research hotspot in the cyber security field for Internet of Things (IoT). In general, while the data volume is large in a distributed IoT environment, the mining efficiency of the frequent sequence pattern is very low due ...

research-article
Fast Abnormal Identification for Large Scale Internet Traffic

Traffic classification and identification is the key part in network security industry. It can identify the types of the Internet traffic, and detect abnormal ones based on the features of network flows. Nowadays, due tothenon-transparency and ...

research-article
A Modified Source Number Estimation Method based on Wavelet Analysis and Singular Value Decomposition

In underdetermined blind source separation (BSS) algorithms, source number estimation is a precondition and a difficulty. An improved source number estimation method based on wavelet analysis and singular value decomposition is pro-posed. First, the ...

SESSION: Computer theory and calculation
research-article
Multi-pattern Matching Algorithm based on Variable Step Size

By analyzing the existing pattern matching algorithms, we found AC_BM algorithm or AC_SUNDAY algorithm combine the advantages of AC algorithm and the single-pattern matching algorithms. When a mismatch occurs, the moving distance on matching trees ...

research-article
Research on Task Scheduling Model for Multi-core Processor

Multi-core processor task scheduling has been proved to be an NP-hard problem, and the existing solutions mostly use heuristic algorithms. Among these heuristic algorithms, the saving algorithm is an algorithm with higher scheduling success rate. ...

research-article
A Cloud Storage Resource Transaction Mechanism Based on Smart Contract

Since the security and fault tolerance is the two important metrics of the data storage, it brings both opportunities and challenges for distributed data storage and transaction. The traditional transaction system of storage resources, which generally ...

research-article
Parallel Machine Scheduling with Rejection under Special Conditions

We consider a version of parallel machine scheduling with rejection. There are m machines and n jobs, and each job is either accepted and then processed by one of the machines, or rejected and then a rejected fee is paid. The goal is to find a way of ...

research-article
Research on Kubernetes' Resource Scheduling Scheme

Currently, Google's open source container orchestration tool Kubernetes (K8s for short) has become the standard of fact for deploying containerized applications on a large scale in private, public, and hybrid cloud environments. By studying the ...

research-article
Mixing Matrix Estimation Method for UBSS based on Observed Data Segmentation

This paper presents a mixing matrix estimation method for underdetermined blind source separation (UBSS) when source signals are insufficiently sparse. Main ideas are as follows: Observed signals are segmented. Then mixing matrices for every segment of ...

research-article
Stability Analysis of Tail Water Slope out of the Underground Power Station in Hydropower Engineering

The slope stability situation surrounding the dam site area is very important to each correlative department during constructing hydroelectric power station. The slope stability is studied by numerical simulation under different conditions based on the ...

Recommendations