skip to main content
10.1145/3371676acmotherconferencesBook PagePublication PagesiccnsConference Proceedingsconference-collections
ICCNS '19: Proceedings of the 2019 9th International Conference on Communication and Network Security
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security Chongqing China November 15 - 17, 2019
ISBN:
978-1-4503-7662-4
Published:
13 January 2020
In-Cooperation:
University of Tokyo, Chongqing University of Posts and Telecommunications

Bibliometrics
Skip Abstract Section
Abstract

2019 9th International Conference on Communication and Network Security (ICCNS2019) will be held in Chongqing, China during November 15-17, 2019. It's sponsored by Digital Communications and Networks, Chongqing University of Posts and Telecommunications, and Chongqing Institute of Electronics.

Skip Table Of Content Section
SESSION: Software Testing and Security
research-article
A Web Services Testing Approach based on Difference Measurement and Adaptive Random Testing

Nowadays, people's demand for Web services is increasing, but in the process of obtaining these services, there are some problems in the service, which have not been detected, resulting in a poor experience. Therefore, this paper proposes a difference ...

research-article
Android Malware Detection Combined with Static and Dynamic Analysis

Android System has attracted not only constantly increasing number of smart device users, but also the serious attacks from explosive malicious apps. Consequently, the need to effectively detect Android malware is becoming more and more urgent. In the ...

research-article
Semantic-based Malware Behavior Description: Past and Future

Traditional malware detection is faced with problems of low efficiency and high cost. In recent years, in order to improve the efficiency and accuracy of malware detection, a method based on semantic malware behavior description has been widely studied. ...

research-article
An Automatic Testing Platform for Object-oriented Software based on Code Coverage

The development of automatic object-oriented software testing tools is a challenging and realistic subject in the field of software engineering. A testing prototype system named ARTCovPS (Adaptive Random Testing Coverage-based testing Prototype System) ...

SESSION: Information Encryption and Protection
research-article
Secure Email Login Based on Lightweight Asymmetric Identities

In this paper, the authors analyze existing email login schemes, point out their flaws and shortcomings of, and give a secure login scheme based on a lightweight asymmetric identity. For the first time, the new scheme adopts a lightweight asymmetric ...

research-article
Location Privacy Protection Scheme Based on Location Services

Location-based services (LBS) in the mobile internet applications are very important and provide a great convenience. However, at the same time it brings the threat of privacy leak. For location services, a location privacy protection scheme is proposed,...

research-article
Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping

The mobile phone number of each mobile user corresponds to a call record of the communication system database. This paper analyzes the security risk of the mobile phone number and related material stored in the communication system database, that is, ...

research-article
SSL Malicious Traffic Detection Based On Multi-view Features

In recent years, as more and more softwares use SSL encryption protocol to improve the security and integrity of communications, the encrypted traffic is growing, which brings new challenges to cyber attack detection. Since most of the SSL traffic is ...

research-article
A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior Characteristics

Classification of network traffic using port-based or deep packet-based analysis is becoming increasingly difficult with many peer-to-peer(P2P) applications using dynamic port numbers, especially in massive data streams. In view of the problem that ...

research-article
An Efficient, Secure and Reliable Search Scheme for Dynamic Updates with Blockchain

Blockchain is a newly emerged technology to maintain data consistency through distributed network. Due to the nature of tamper-resistance, blockchain can well be used to achieve secure and reliable search without the participation of any third party. ...

research-article
Embedded Authentication and Blockchain in Micro-course

The decentralization and consensus of blockchain provide the network trust and data certification of a low cost. In addition to financial technology, it has also attracted widespread attention in many applications. In this paper, we discuss on the ...

research-article
Differentially Private Graph Clustering Algorithm Based on Structure Similarity

With the widespread use of new information systems such as social networks, recommendation systems as well as location-based services, graph data has become a very common and important data type. It has been shown that, from these collected graph data, ...

SESSION: Cyber Security
research-article
Abnormal Network Traffic Detection based on Leaf Node Density Ratio

As the network evolves, cyber-attacks become more and more diverse. In the process of detecting network traffic, the most complicated but also the most important task is to find unknown abnormal network traffic data in time. In the existing abnormal ...

research-article
Research on Automatically Switched Optical Network Security Based on Quantum Key Distribution

In recent years, many eavesdropping and interception incidents against optical networks have shaken people's understanding of optical network security. The security of optical networks is attracting more and more researchers' attention. Aiming at the ...

research-article
A Comprehensive Assessment Method of Asset Importance for Key Asset Protection

In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propose a comprehensive asset importance ...

research-article
A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series

Attacks on industrial control systems have different types and various intensities. Predicting the development trend of security state for updating defense strategy in time is important. Every single prediction model has its different emphases, and the ...

research-article
Effective Scrambling Scheme for Physical Layer Security

Scrambling is a practical scheme in the physical layer to increase the information security of wireless communication systems. However, the complexity of the conventional scrambling scheme O(n2)affects its practical application for long information size,...

research-article
Attack Intent Analysis Method Based on Attack Path Graph

With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack behaviors and timely identification ...

SESSION: System Security and Assessment
research-article
Deep Security Analysis of DCS for Ship's Nuclear Power System based on Improved DEMATEL

The deep security of DCS(Distributed Control System) is more serious than conventional hardware problems for ship's nuclear power system. It is great significance to study the DCS deep security for operation security of ship's nuclear power system. The ...

research-article
A Polynomial Time Algorithm for Scheduling on Processing Time Constraints

Given m parallel machines and n jobs with each job having a processing time, the classical scheduling, a famous NP-hard problem, wants to find a way to schedule all jobs on m machines such that the makespan is minimized. In this paper, we consider ...

research-article
Simulation Environment of Evaluation and Optimization for Moving Target Defense: A SimPy Approach

In this paper, a simulation environment for evaluating the effectiveness and performance cost of moving target defense (MTD) is presented. This simulation environment is based on SimPy, which is a process-based discrete-event simulation framework worked ...

research-article
A Note on Polynomial-time Solvability for Edge Packing on Graphs

In this paper, we consider a generalized matching problem, the so-called edge packing problem. Given a graph G such that each vertex v is associated with a positive integer w(v), an edge packing F with respect to these integers (abbreviated as edge ...

research-article
Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm

RSA cryptosystem is a widely-used public-key cryptographic algorithm in TLS/SSL and IPSec protocols. Fault-injection attack has a powerful threat on the CRT-based implementation of RSA cryptosystem. In 2016, Y. Choi et al. proposed a new right-to-left ...

SESSION: Information communication and network
research-article
Design and Implementation of Integrated Access VPN Gateway

With the popularization of e-government and mobile office applications, secure access of network terminal equipment has become a common concern. Virtual private network (VPN) has the advantages of economical, practical and flexible deployment while ...

research-article
Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural Network

With the development of digital wireless communication technol-ogy, the wireless signal identification has been suffering from increasingly complex electromagnetic environment and higher spectrum utilization. In this paper, we propose a wireless signal ...

research-article
Power Allocation Based on Geometric Programming for Non-orthogonal Multiple Access Heterogeneous Networks

In practical situations, the performance of some power allocation schemes degrades sufficiently with imperfect channel state information (CSI). To account for the problem, we propose a novel power allocation scheme in Non-orthogonal multiple access (...

research-article
Multi-source Landmark Fusion based on Machine Learning

Network entity landmark is the key foundation of IP geolocaiton which plays an important role in network security. Integrating multi-source landmarks to generate a landmark database with high IP coverage and high location accuracy is an important ...

research-article
Research on Improvement of Wireless Sensor Network Location Algorithm Based on DV-Hop

Aiming at the problem that the traditional DV-Hop localization algorithm has low positioning accuracy, an improved DV-Hop algorithm is proposed. The minimum mean square error is used to calculate the average hop distance of the anchor node, and the ...

research-article
Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN

Controller is a key component in the three layers of Software - Defined Networking (SDN), which is to process a huge number of flow requests from network devices. As a result, it puts a flow rule into flow table in switch according to every incoming ...

research-article
Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter Multi-qubit States via Three-qubit Entangled States

This paper offers a theoretical protocol for deterministic controlled remote state preparation of arbitrary real-parameter multi-qubit states, in which the maximally three-qubit entangled states are used as quantum channel. We elaborate the processes of ...

Recommendations