submit CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Software Networking

Kuinam J. Kim, Kyonggi University, South Korea

ISSN: 2445-9739 (Online Version)
Vol: 2016   Issue: 1

Published In:   January 2016

Publication Frequency: Continuous Article Publication

Search Available Volume and Issue for Software Networking

Synflood Spoof Source DDOS Attack Defence Based on Packet ID Anomaly Detection – PIDAD

doi: 10.13052/jsn2445-9739.2016.012
Tran Manh Thang and Van K. Nguyen

Dept of Software Engineering, School of Information Technology and Communication, Hanoi University of Science and Technology, No. 1 Dai Co Viet, Hai Ba Trung, Hanoi, Vietnam

Abstract: [+]    |    Download File [ 1984KB ]   |    Read Article Online

Abstract: Adistributed denial-of-service (DDoS) attack characterized by flooding SYN packets is one of the network attacks to make the information system unavailable. This kind of attack becomes dangerous and more difficult to prevent and defense when attackers try to send flood SYN packets with spoof source, especially, there packets have information fields as the normal SYN packets. In this study, we propose a method called Packet Identification Anomaly Detection – PIDAD used to defense type of DDoS attack mentioned above. This method based on abnormal information of identification field in IPHeader when observing the set of packets received in the victim system.

Keywords: DDoS attacks, DBSCAN, PIDAD.

Improving Intrusion Detection on Snort Rules for Botnet Detection

doi: 10.13052/jsn2445-9739.2016.011
Saiyan Saiyod1, Youksamay Chanthakoummane1, Nunnapus Benjamas2, Nattawat Khamphakdee2 and Jirayus Chaichawananit1

1Hardware-Human Interface and Communications (H2I-Comm) Laboratory, Department of Computer Science, Faculty of Science, Khon Kaen University, Muang, Khon Kaen, Thailand
2Advanced Smart Computing (ASC) Laboratory, Department of Computer Science, Faculty of Science, Khon Kaen University, Muang, Khon Kaen, Thailand

Abstract: [+]    |    Download File [ 1754KB ]   |    Read Article Online

Abstract: The Botnets has become a serious problem in network security. An organization should find the solutions to protect the data and network system to reduce the risk of the Botnets. The Snort Intrusion Detection System (Snort-IDS) is the popular usage software protection of the network security in the world. The Snort-IDS utilizes the rules to match the data packets traffic. There are some existing rules which can detect Botnets. This paper, improve the Snort-IDS rules for Botnets detection and we analyze Botnets behaviors in three rules packet such as Botnets attack 1.rules, Botnets attack 2.rules, and Botnets attack 3.rules. Moreover, we utilize the MCFP dataset, which includes five files such as CTU-Malware-Capture-Botnet-42, CTU-Malware-Capture-Botnet-43, CTUMalware- Capture-Botnet-47, CTU-Malware-Capture-Botnet-49, and CTUMalware- Capture-Botnet-50 with three rule files of the Snort-IDS rules. The paper has particularly focused on three rule files for performance evaluation of efficiency of detection and the performance evaluation of fallibility for Botnets Detection. The performance of each rule is evaluated by detecting each packet. The experimental results shown that, the case of Botnets attack 1.rules file can maximally detect Botnets detection for 809075 alerts, the efficiency of detection and fallibility for Botnets detection are 94.81% and 5.17%, respectively. Moreover, in the case of Botnets attack 2.rules file, it can detect Botnets up to 836191 alerts, having efficiency of detection and fallibility for Botnets detection are 97.81% and 2.90%, respectively. The last case Botnets attack 3.rules file can detect Botnets 822711 alerts, it can 93.72% of efficiency of detection and the value of fallibility is 6.27%. The Botnets attack 2.rules file is most proficient rule for Botnets detection, because it has a high efficiency of detection for detection and a less of fallibility.

Keywords: Botnets detection, intrusion detection system, MCFP datasets, Snort-IDS.

A Feature Selection Approach Based on Simulated Annealing for Detecting Various Denial of Service Attacks

doi: 10.13052/jsn2445-9739.2016.010
In-Seon Jeong1, Hong-Ki Kim2, Tae-Hee Kim2, Dong Hwi Lee2, Kuinam J. Kim3 and Seung-Ho Kang4

1School of Electronics & Computer Engineering, Chonnam National University, 77 Yongbong-ro, Buk-gu, Gwangju, Republic of Korea 61186
2Department of Information Security, Dongshin University, 185 Geonjae-ro, Naju, Jeonnam 58245, Republic of Korea
3Department of Convergence Security, Kyonggi University, 94-6 Yiui-dong, Yeongtong-gu, Suwon-si, Gyeonggi-do 16227, Republic of Korea
4Department of Information Security, Dongshin University, 185 Geonjae-ro, Naju, Jeonnam 58245, Republic of Korea

Abstract: [+]    |    Download File [ 473KB ]   |    Read Article Online

Abstract: Feature combinations affect network intrusion detection/prevention systems based on machine learning methods such as multi-layer perceptron (MLP) in terms of accuracy and efficiency. However, selecting the optimal feature subset from the list of possible feature sets to detect network intrusions requires extensive computing resources. In this paper, we propose an optimal feature selection algorithm based on the simulated annealing algorithm to determine six denial of service attacks (neptune, teardrop, smurf, pod, back, land). In order to evaluate the performance of our proposed algorithm, three well-known machine learning methods (multi-layer perceptron., Bayes classifier, and support vector machine) are used against the NSL-KDD data set.


Implementing a Stereo Image Correction Method for 3D Surgery Microscopes

doi: 10.13052/jsn2445-9739.2016.009
Jiyoung Yoon1, Nakhoon Baek2, Cheolhwan Kim3 and Hwanyong Lee4

1Institute of Advanced Convergence Technology, Kyungpook National University, South Korea
2School of Computer Science and Engineering, Kyungpook National University, South Korea
3School of Electronic Engineering, Kyungpook National University, South Korea
4Ajou University, South Korea

Abstract: [+]    |    Download File [ 3630KB ]   |    Read Article Online

Abstract: Recently 3D scenes are used in various industrial fields such as medical applications, computer games, surface examinations, biology and others. 3D optical microscopes can show extremely precise details in 3D. To reconstruct the 3D images of an optical microscope, two cameras are mounted on the optical microscope. Incoming images through an object lens of an optical microscope are projected on sensors of mounted cameras by using refraction mirrors. Two cameras capture the left and right images to reconstruct the final 3D images. In this paper, we correct the 3D reconstruction errors with the SURF algorithm. We also design a hardware system to correct wrong mirror positions using servo motors. In addition, we propose the surgical system with HMD and wireless communications. This system would be helpful for doctors due to make doctors comfortable and it can be used to educate surgery procedures.

Keywords: Stereo Image, Optical Microscope, Computer Vison, SURF, Medical Device.

Cluster Head Energy Optimization in Wireless Sensor Networks

doi: 10.13052/jsn2445-9739.2016.008
Shahab Tayeb, Miresmaeil Mirnabibaboli and Shahram Latifi

Department of Electrical & Computer Engineering, University of Nevada, Las Vegas, NV, United States

Abstract: [+]    |    Download File [ 4563KB ]   |    Read Article Online

Abstract: Wireless Sensor Networks (WSNs) consist of many sensor nodes which are vital to various applications in our daily lives. Optimizing energy usage is a key challenge for WSNs. Improving energy utilization can help with controlling traffic, saving energy and eventually, resulting in a better lifetime. In this paper, a modification of the Energy Efficient Credit-Based routing algorithm is proposed, which selects the most optimal Cluster Head based on the priority of relay nodes. Simulation results demonstrate that the proposed algorithm achieves a more efficient load-balancing, a better lifetime, and lower energy consumption, at the expense of slightly higher packet loss and lower data delivery rate. The results are compared with the commonly used Low-Energy Adaptive Clustering Hierarchy algorithm.

Keywords: Clustering, Energy Efficient Routing, Load-balancing.

Implementation of Noise Reduction Methods for Rear-View Monitoring Wearable Devices

doi: 10.13052/jsn2445-9739.2016.007
Huy Toan Nguyen1, Seung You Na1, Jin Young Kim1 and Gwon Seok Sun2

1School of Electronics and Computer Engineering, Chonnam National University, Gwangju, Republic of Korea
2Korea Polytechnics College, Gwangju, Republic of Korea

Abstract: [+]    |    Download File [ 2493KB ]   |    Read Article Online

Abstract: This study suggests effective noise reduction methods for wearable neckband devices, which are able to monitor users’ rear-view areas. The wearable neckband device helps the user to monitor rear-view areas in which he/she is unable to see in normal ways (without turning back). Unlike general computers or supercomputer systems, the neckband devices have some particular constraints such as small size, lightweight and low power consumption. In a general vision system, there are many kinds of noises, which significantly decrease system quality such as impulse noise, random noise, motion noise, etc. These noises also affect wearable devices, which use cameras as the system input. Moreover, when the user walks or runs, the neckband device moves accordingly. The changing position of the neckband device causes many other noises such as camera motion (ego-motion) noises. Furthermore, when the user walks from indoors to outdoors or vice versa, the illumination dramatically changes, which also affects the device performance. Effective noise reduction methods to deal with these noises are proposed in this study. Random noise and other small noises are removed by using a Gaussian filter and adaptive color threshold techniques.We propose to use feature detection and the homography matrix estimation method to reduce ego-motion noise. Remaining noises are cancelled out by a morphology technique. Finally, we apply Local Binary Patterns (LBP) descriptor and Adaboost classifier to classify whether there are people or not in the moving foreground object regions. The experiments demonstrate that our proposed noise reduction methods have achieved successful results in the different environments and users’ walking speeds.

Keywords: Noise reduction, Rear-view monitoring,Wearable device.

Modeling Voice over LTE

doi: 10.13052/jsn2445-9739.2016.006
Ahmed Amou El Arby and Ousmane Thiare

University Gaston Berger, Saint Louis, Senegal

Abstract: [+]    |    Download File [ 2136KB ]   |    Read Article Online

Abstract: The 4G technology, known as Long Term Evolution (LTE), has dominated the telecommunication market the last few years due to its high data rate (up to 100 Mbps) that will perfectly satisfy the users multimedia applications needs in term of bandwidth and that rely on IP domain network. However, LTE lack in offering services for applications that rely on Circuit Switched (CS) domain particularly the voice CS service. This paper studies the latest up to date solutions for the voice over LTE problem such as Single Radio Voice Call Continuity, Circuit Switched Fall Back and Voice over LTE via Generic Access. The paper analyzes the pros and cons for these solutions and concludes with a suggestion of the best suitable solution for the operators to provide a seamless voice over LTE based on their infrastructure. Also, this paper models the long term solution and proposes an analytical model for simulating the performance of Voice over LTE (VoLTE) that can be used to simulate the behavior of such solution.

Keywords: LTE, SRVCC, VoLGA, CSFB.

Edge Resource Utilization Using OS-Level Virtualization on Smart Devices

doi: 10.13052/jsn2445-9739.2016.005
Thomas Renner, Marius Meldau and Andreas Kliem

Technische Universität Berlin (TU Berlin), Complex and Distributed IT Systems (CIT), 10587 Berlin, Germany

Abstract: [+]    |    Download File [ 1969KB ]   |    Read Article Online

Abstract: Following the Internet of Things (IoT) paradigm, more and more connected and embedded devices like sensors, smart phones, or entertainment devices are becoming available surrounding us. This increasing number of IoT devices leads to an increasing amount of resources made available to the users. For instance, if devices like smart phones or smart TVs are considered, this includes computing and storage resources. In this paper we propose a container-based resource allocation scheme to increase the utilization of these IoT resources and made them shareable between different users due to cloud-centric IoT deployments. The approach allows various applications and users to dynamically allocate resources offered by edge devices and process IoT data close to the source. The approach is evaluated regarding its feasibility in terms of performance on a exemplary resource constrained IoT device.

Keywords: Internet of Things, Edge Computing, OS-level Virtualization, Resource Management, Resource Sharing.

Analysis of Dyscalculia Evidences through Artificial Intelligence Systems

doi: 10.13052/jsn2445-9739.2016.004
F. Ferraz1, H. Vicente2,3, A. Costa2 and J. Neves2

1Departamento de Informática, Universidade do Minho, Braga, Portugal
2Centro Algoritmi, Universidade do Minho, Braga, Portugal
3Departamento de Química, Escola de Ciências e Tecnologia, Universidade de Évora, Évora, Portugal

Abstract: [+]    |    Download File [ 3579KB ]   |    Read Article Online

Abstract: Dyscalculia is usually perceived of as a specific learning difficulty for mathematics or, more appropriately, arithmetic. Because definitions and diagnoses of dyscalculia are in their infancy and sometimes are contradictory. However, mathematical learning difficulties are certainly not in their infancy and are very prevalent and often devastating in their impact. Co-occurrence of learning disorders appears to be the rule rather than the exception. Co-occurrence is generally assumed to be a consequence of risk factors that are shared between disorders, for example, working memory. However, it should not be assumed that all dyslexics have problems with mathematics, although the percentage may be very high, or that all dyscalculics have problems with reading and writing. Because mathematics is very developmental, any insecurity or uncertainty in early topics will impact on later topics, hence to need to take intervention back to basics. However, it may be worked out in order to decrease its degree of severity. For example, disMAT, an app developed for android may help children to apply mathematical concepts, without much effort, that is turning in itself, a promising tool to dyscalculia treatment. Thus, this work will focus on the development of a Decision Support System to estimate children evidences of dyscalculia, based on data obtained on-the-fly with disMAT. The computational framework is built on top of a Logic Programming approach to Knowledge Representation and Reasoning, grounded on a Case-based approach to computing, that allows for the handling of incomplete, unknown, or even self-contradictory information

Keywords: Dyscalculia, Logic Programming, Knowledge Representation and Reasoning, Case-based Computing, Decision Support Systems.

A Study on the IoT Instance Hosting in Edge Cloud and NFV

doi: 10.13052/jsn2445-9739.20161.003
Jinhong Yang1, Hyojin Park1, SungKwan Jung1 and Hyuncheol Kim2

1Dept. of Information and Communications, Korea Advanced Institute of Science and Technology, South Korea
2Dept. of Computer Science, Namseoul University, South Korea

Abstract: [+]    |    Download File [ 2513KB ]   |    Read Article Online

Abstract: Recently, as the number of IoT devices generate tremendous volume and variability of data. By the time data makes its way to the cloud for processing the chance to act on it might be disappeared. This paper presents a novel idea, proposes methods for virtualizing Internet of Things devices and hosting them on the home access point instead of relying on a cloud. For this, we design profile of the IoT gadgets and virtualize into JavaScript-based objects. Then, to execute and control the instances of the virtualized IoT objects on the wireless AP, a novel instance management method and their interfaces are designed. The implementation and performance test demonstrates the proposed system’s stability and operability in the real wirelessAPrunning environment.Adopting this platform feature over SDN/NFV infrastructure might be beneficial in to the IoT mashup service quality and its network efficiency.

Keywords: Internet of Things,Virtual Object, Instance Hosting, Edge Cloud.

A Study on the Network Resource Openness with Software Networking toward the Development of theWeb Technology

doi: 10.13052/jsn2445-9739.20161.002
Jinhong Yang1, Hyojin Park2 and Jun Kyun Choi2

1Information and Communications Department, Korea Advanced Institute of Science and Technology, 291, Daehak-ro, Yuseong-gu, Daejeon 34141
2School of Electrical Engineering, KAIST, Republic of Korea

Abstract: [+]    |    Download File [ 2789KB ]   |    Read Article Online

Abstract: The continuous development of the network and the growth of the Internet and the Web are festinating. The improvement in network softwarization technologies represented by the SDN and NFV made the dedicated legacy network resources into more elastic to be utilized. These progresses realize the accessibility on the customized network resource utilization for web services, overcoming traditional best effort network environment. HTTP based application services are extended from multimedia to IoT with fast evolution ofWeb technology. In this study, network resource open trends are explored in softwarization networking technology perspective, and describe what will be the future of network environment, step-by-step. Especially, the process of change is focused from previous individual communication service environment such as voice, data to unified communication environment.

Keywords: Network resource, Software Defined Network, Service Openness, Web Technology,WebRTC.

A Study on Trustworthy Cyber-Physical ID/Location Mapping on IoT and NFV

doi: 10.13052/jsn2445-9739.20161.001
Hyeontaek Oh1, Sanghong Ahn1, Jinhong Yang2 and Jun Kyun Choi1

1School of Electrical Engineering, KAIST, Republic of Korea
2Information and Communications Department, Korea Advanced Institute of Science and Technology, 291, Daehak-ro, Yuseong-gu, Daejeon 34141

Abstract: [+]    |    Download File [ 677KB ]   |    Read Article Online

Abstract: Information and Communication Technology (ICT) based industries, which are growing with advance of ICT technologies, are operated under trustworthiness of its ICTinfrastructure. The identity trust targets the whole entities within the Internet of Things (IoT) and Network Functions Virtualization (NFV) environment that can be the creator, broker, modifier, and the end user of the data. Considering the dramatic growth of IoT service industry, its scalability, robustness, and efficient management are worth to be studied. Originally, conventional IDs for cyberspace are designed to consider having a relationship with physical address information. However, because of the wide-expansion of cyberspace, they are now very loosely-coupled. In this paper, the necessity of trustworthy cyber-physical mapping and its architecture would be discussed. The usage and demand of Cyber-Physical ID/Location mapping (CPID) will be discussed based on two use cases of real service environment. Furthermore, the requirements of CPID are introduced. A new CPID is needed to ensure trust location and trust identification, which includes location information explicitly for public goods in IoT and NFV environment, to make it easy to be recognized and used. Currently, related issues are under discussion in various standard organizations. To develop standards for trusted ICT infrastructure, it is needed to develop global CPID system by discussing ID/Location issues in global cyber identification or geolocation standardization groups.

Keywords: trustworthy, cyber-physical, identity, locator.

River Publishers: Software Networking