Online social networks are reflection human interactions. User share their profile, communicate via messaging and share contents using these online social networks. There are millions of profile available online which contain information about user, their preferences, and their interaction. It posses security threats if it is used by an adversaries. In this paper the authors tried to detect those pattern of information about OSN users and discussed possible threats about their privacy. They have used facebook as a usecase and specifically focus on information from CMU campus. experiments, identification
Information revelation:
Facebook provides default privacy control interface where user could limit his/her personal details from disclosures. However user could control the granular details to establish different degrees of trust and intimacy with others. Some details of revelation of user information are given bellow:
1) Profile search-ability: Strangely enough, a small fraction (1.2%) of user uses privacy setting.
2) Profile visibility: restricting profile access or view to other - only 0.06% of CMU user restricted their profiles to CMU users.
3)Facebook data access: personal facial image and name (first name and last name) are available on facebook to all facebook users which could be used to make dossier about users. Political, sexual preferences, and user credential are available to large fraction of users which could enable some of them to gain control a user profile.
Privacy implications:
The rationale behind large number of user data and sparingly used of privacy preference is that users are unconcerned about their personal privacy. A possible consequence could be high risk to a user or/and his/her associates. These risks are:
1) Stalking:
* user residences and credentials are available online to majority of facebook users. A fraction of facebook user could access those information to actual person and his/her whereabouts. A major profile with AIM and twitter like services (which leads to cyber-stalking) that buddies are added without acknowledgement from them.
* Re-indentification
* Demographic re-identification
* Face re-identification
* Social security numbers and identity theft
* first four digits of SSN + birthday helps in locating the identifying the place where SSN was made.
* Building di
The blog facilitates to share research ideas, paper review, and comments among P2P researchers.
2010/12/21
2010/11/30
ns-3 naming conventions
Functions or methods names: verb or adjectives: GetX, DoDispose, ClearArray, etc.
Predicated name for methods/functions with single return value: use Is, Has, or bool e.g., IsBroadcast();
Indentation: two space (not tab)
After , , :, and ; - put one space
Method return type: in column one
Method name: in column one
Variable name: e.g., CamelBlack - camelBlack UserName - userName
Function, property, event, or class name: CamelBlack (try to use descriptive names for classes and functions)
global variables - prefixed with a g_
global member function - prefixed with a m_
enume variables - suffixed with _e
defined types - optionally end with _t
define constant (static const class members, or enume constants) - all upper case letters
// declaring my-class.h
typedef struct {
uint32_t m_magicNumber;
uint32_t m_versionMajor;
} PcapFileHeader_t; // the trailing _t is optional
const uint8_t PORT_NUMBER = 17;
class MyClass
{
void MyMethod (int aVar);
int m_aVar;
static int m_anotherVar;
};
// implementing the my-class.cc
typedef struct {
uint32_t m_magicNumber;
uint32_t m_versionMajor;
} PcapFileHeader_t; // the trailing _t is optional
const uint8_t PORT_NUMBER = 17;
class MyClass
{
void MyMethod (int aVar);
int m_aVar;
static int m_anotherVar;
};
Portable integer types - uint8_t, int32_t, etc., instead of unsigned int/long;
One could use nested namespaces instead of ns3 namespace:
namespace ns3 {
namespace olsr {
...
} // namespace olsr
} // namespace ns3
namespace ns3 and namespace std shouldn't be used in the source code inside src/. and could be used in examples/, samples/, test/
Predicated name for methods/functions with single return value: use Is, Has, or bool e.g., IsBroadcast();
Indentation: two space (not tab)
After , , :, and ; - put one space
Method return type: in column one
Method name: in column one
Variable name: e.g., CamelBlack - camelBlack UserName - userName
Function, property, event, or class name: CamelBlack (try to use descriptive names for classes and functions)
global variables - prefixed with a g_
global member function - prefixed with a m_
enume variables - suffixed with _e
defined types - optionally end with _t
define constant (static const class members, or enume constants) - all upper case letters
// declaring my-class.h
typedef struct {
uint32_t m_magicNumber;
uint32_t m_versionMajor;
} PcapFileHeader_t; // the trailing _t is optional
const uint8_t PORT_NUMBER = 17;
class MyClass
{
void MyMethod (int aVar);
int m_aVar;
static int m_anotherVar;
};
// implementing the my-class.cc
typedef struct {
uint32_t m_magicNumber;
uint32_t m_versionMajor;
} PcapFileHeader_t; // the trailing _t is optional
const uint8_t PORT_NUMBER = 17;
class MyClass
{
void MyMethod (int aVar);
int m_aVar;
static int m_anotherVar;
};
Portable integer types - uint8_t, int32_t, etc., instead of unsigned int/long;
One could use nested namespaces instead of ns3 namespace:
namespace ns3 {
namespace olsr {
...
} // namespace olsr
} // namespace ns3
namespace ns3 and namespace std shouldn't be used in the source code inside src/. and could be used in examples/, samples/, test/
2010/11/23
Socialnets and data mining
Interested workshop and CFP related to socialnets and data mining.
http://www.socialgamingplatform.com/msm09/
http://machine-learning.blogspot.com/2009/10/cfp-special-issue-of-international.html
http://www.socialgamingplatform.com/msm09/
http://machine-learning.blogspot.com/2009/10/cfp-special-issue-of-international.html
2010/11/14
2010/10/01
Analytical Modeling and Simulation of Computer Systems and Networks
The course introduces the art of computer systems and network analysis. It first introduces analytical models and then support models with simulations. Further details could be found on course website.
2010/09/30
Sybils attacks on OSN
OSN with distinctive community structure are more vulnerable to Sybil attacks. Sybils tend to effect their links in order to make their attacks more effective. [Link]
2010/08/02
How to run ns3 in Eclispe
My life became easy ever since I run NS3 from Eclipse. The procedure is easy counter the one described here. You need only two steps:
1) Open New External Configuration, add ${workspace_loc:/ns3dev/waf} (in my case waf is in ~/ns3dev/waf)
2) Specify working directory i.e., ${workspace_loc:/ns3dev/}
3) Open examples/tutorial/first.cc and press external configuration button. Input "first" to dialogue box.
Thats it, :).
1) Open New External Configuration, add ${workspace_loc:/ns3dev/waf} (in my case waf is in ~/ns3dev/waf)
2) Specify working directory i.e., ${workspace_loc:/ns3dev/}
3) Open examples/tutorial/first.cc and press external configuration button. Input "first" to dialogue box.
Thats it, :).
2010/07/16
The Ninja architecture for robust Internet-scale systems and services
This paper provide provide wide range of services and mechanism for access those mechanism via heterogeneous devices. The services set include: robustness, scalability, distributed Internet services. The architecture assumes the four basic components:
* powerful workstation cluster environments with a software platform that simplifies scalable service construction;
* units, which are the devices by which users access the services;
* active proxies, which are transformational elements that are used for unit- or service-speci®c adaptation;
* and paths, which are an abstraction through which units, services, and active proxies are composed.
* powerful workstation cluster environments with a software platform that simplifies scalable service construction;
* units, which are the devices by which users access the services;
* active proxies, which are transformational elements that are used for unit- or service-speci®c adaptation;
* and paths, which are an abstraction through which units, services, and active proxies are composed.
Resilient Workload Manager Framework
"In data centers hosting scaling Internet applications, operators face the tradeoff dilemma between resource efficiency and Quality of Service (QoS), and the root cause lies in workload dynamics. In this paper, we address the problem with the design of Resilient Workload Manager (ROM). ROM explicitly segregates base workload and trespassing workload, the two naturally different components in application workload, and manages them separately in two resource zones with specialized optimization techniques.
As a comprehensive workload management framework, ROM covers workload, data, resource, and Quality of Service of the target applications. It features a fast workload factoring algorithm for distributing incoming application requests, not only on volume but also on content, between the two resource zones; integrated two-dimensional workload shaping, resource planning, and request dispatching schemes for efficient utilization of base workload zone resource; and a simple and high-performance system architecture for dynamic provisioning in trespassing workload zone. Through extensive evaluation, we showed ROM can achieve resource efficiency (e.g., 54.9% server saving) guarantee QoS (based on client-side perceived service quality), reduce data access overhead in the trespassing workload zone during peak load (up to two orders of magnitude), and be adaptive at processing speed (running faster at peak load periods than at regular periods)."
As a comprehensive workload management framework, ROM covers workload, data, resource, and Quality of Service of the target applications. It features a fast workload factoring algorithm for distributing incoming application requests, not only on volume but also on content, between the two resource zones; integrated two-dimensional workload shaping, resource planning, and request dispatching schemes for efficient utilization of base workload zone resource; and a simple and high-performance system architecture for dynamic provisioning in trespassing workload zone. Through extensive evaluation, we showed ROM can achieve resource efficiency (e.g., 54.9% server saving) guarantee QoS (based on client-side perceived service quality), reduce data access overhead in the trespassing workload zone during peak load (up to two orders of magnitude), and be adaptive at processing speed (running faster at peak load periods than at regular periods)."
2010/07/13
Amazon distriburted services
Amazon is one of the largest e-commerce companies which provide different services for various website around the world using its distributed servers. These servers are proven to errors, faults, and failures which necessitates reliability, consistency and flexibility to reconfigure and keep persistent state for the data hosted by those servers. Dynamo, incrementally scalable depend upon the current workloads, provide reliability and availability for major Amazon services. Although versioning and conflict resolutions mechanism are used to provide consistency still it undermines it in some scenarios. From developer point of view, porting and new development a bit more complex because of Dynamo's consistency model and reconciliation logic. Also, it uses Full Membership model where each peers have knowledge of every other peer as for as stored component is concerned. This Full membership model limit scalability because the routing tables are developed by continue gossiping which produce overhead. The problem could be solved by extending it with Distributed DHTs or P2P Systems (which is under consideration of our research).
Location aware DHT
"Place Lab: Device Positioning Using Radio Beacons in the Wild" - is an application API which allows any wireless device to listen to fixed beacon provider for her position estimation. Leveraging this API with Peer could be helpful in making location aware DHTs. Prefix Hash Three (PHT) used Place lab in building location aware DHT. The case study from Sylvia decouples application developed from DHT. A good point to note for while most of applications demand refined and optimized overlay for its QoS and performance requirements.
2010/07/09
Information dessimnation in Social Nets
The Java applet shows the self-managed information dessimination in social net with monitoring metrics (at the right). This could be a good idea to implement a online-benchmarking application with user input to determine different quality and performance parameters. Since, information are disseminated in self-configured way, it could be used for monitoring resources, services including security, etc. The interesting question could be how the collect or disseminate information for productive activity.
PageRank, LinkRank, ComRank, WikiFactor, PageFactor, ComFact
PageRank: This is an algorithm which ranks a web-page among set of web-page on WWW by considering a large set of different variables.
LinkRank: is a method of quantifying the modularity of social links in directed network. The original paper assumes modularities in un-directed networks and optimizes it for directed networks.
WikiFactor: "A new metric is introduced, inspired by the Hirsch {\it h-index}, to measure the impact of a wiki site. A table of wikiFactors is presented for a number of wikis, in particular those oriented towards scientific topics. The wikiFactor is defined as the number of web pages, wF, that have had $\ge 1000$wF visits."
Referring to these links one reasonable question would be haw to rank communities, services, privacy settings in sub-graphs or along the whole graph. But what one could buy out of this? Well, considering services provisions and service management, one should provide provide load balancing, some what deterministically routing, or have surgically prune out bad guys (cheaters in MMOG, attackers, or selfish guys).
@ LinkRank: One can predict link, LinkPrdict, by predicting previously un-observed relationship and hence behavior. There are many exciting applications of this particular area of network science. Most research in the area of link prediction has been restricted to scoring based on a single measure within network topologies. While the research considers new measure and placing existing measures in the context of a machine learning task. "We are also casting the problem as a high class imbalance task."
LinkRank: is a method of quantifying the modularity of social links in directed network. The original paper assumes modularities in un-directed networks and optimizes it for directed networks.
WikiFactor: "A new metric is introduced, inspired by the Hirsch {\it h-index}, to measure the impact of a wiki site. A table of wikiFactors is presented for a number of wikis, in particular those oriented towards scientific topics. The wikiFactor is defined as the number of web pages, wF, that have had $\ge 1000$wF visits."
Referring to these links one reasonable question would be haw to rank communities, services, privacy settings in sub-graphs or along the whole graph. But what one could buy out of this? Well, considering services provisions and service management, one should provide provide load balancing, some what deterministically routing, or have surgically prune out bad guys (cheaters in MMOG, attackers, or selfish guys).
@ LinkRank: One can predict link, LinkPrdict, by predicting previously un-observed relationship and hence behavior. There are many exciting applications of this particular area of network science. Most research in the area of link prediction has been restricted to scoring based on a single measure within network topologies. While the research considers new measure and placing existing measures in the context of a machine learning task. "We are also casting the problem as a high class imbalance task."
CFP: Cloud Computing
Call for Papers
IEEE Network magazine - Special Issue on Cloud Computing
http://dl.comsoc.org/livepubs/ni/info/cfp/cfpnetwork711.htm
Background
Cloud Computing is a recent trend in information technology
and scientific computing that moves computing and data away
from desktop and portable PCs into large Data Centers.
Cloud computing is based on a model for enabling convenient,
on-demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned
and released with minimal management effort or service
provider interaction. Cloud Computing opens new perspectives
in internetworking technologies, raising new issues in the
architecture, design and implementation of existing networks
and data centers. The relevant research has just recently
gained momentum and the space of potential ideas
and solutions is still far from being widely explored.
Scope
This special issue of the IEEE Network Magazine will feature
articles that discuss networking aspects of cloud computing.
Specifically, it aims at delivering the state-of-the-art
research on current cloud computing networking topics, and
at promoting the networking discipline by bringing to the
attention of the community novel problems that must be
investigated.
Areas of interest include, but are not limited to:
Data center architecture
Server interconnection
Routers (switching technology) for data center deployment
Centralization of network administration/routing
Energy-efficient cloud networking
Low energy routing
Green data centers
Measurement-based network management
Traffic engineering
Network anomaly detection
Usage-based pricing
Security issues in clouds
Secure routing
Security threats and countermeasures
Virtual network security
Virtual Networking
Virtualized network resource management
Virtual cloud storage
Futuristic topics
Interclouds
Cloud computing support for mobile users
Manuscript Submission
Authors should submit their manuscript electronically in PDF
format by email to all the guest editors according to the
timetable. Authors are encouraged to register their papers by
submitting the paper abstract, the paper title, authors and
keywords by the corresponding deadline. Prospective authors
must prepare their original submissions in accordance with
the IEEE Network guidelines to authors,
http://dl.comsoc.org/livepubs/ni/info/authors.html. Articles
should not exceed 4500 words, be tutorial in nature, and
should be written in a style comprehensible to readers
outside the specialty of the article. The title page should
include the paper title, authors and keywords. Figures
and tables should be limited to a combined total of six.
All submissions will be reviewed based on
technical merit and relevance.
Schedule
Abstract submission: January 9, 2011
Deadline for paper submission: January 15, 2011
First round of reviews: February 28, 2011
Revisions due: March 15, 2011
Author notification: March 26, 2011
Publication materials due: May 1, 2011
Publication date: July, 2011
Guest Editors
Swami Sivasubramanian
Amazon, USA
swami@amazon.com
Dimitrios Katsaros
University of Thessaly, Greece
dkatsar@inf.uth.gr
George Pallis
University of Cyprus, Cyprus
gpallis@cs.ucy.ac.cy
Athena Vakali
Aristotle University of Thessaloniki, Greece
avakali@csd.auth.gr
IEEE Network magazine - Special Issue on Cloud Computing
http://dl.comsoc.org/livepubs/ni/info/cfp/cfpnetwork711.htm
Background
Cloud Computing is a recent trend in information technology
and scientific computing that moves computing and data away
from desktop and portable PCs into large Data Centers.
Cloud computing is based on a model for enabling convenient,
on-demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly provisioned
and released with minimal management effort or service
provider interaction. Cloud Computing opens new perspectives
in internetworking technologies, raising new issues in the
architecture, design and implementation of existing networks
and data centers. The relevant research has just recently
gained momentum and the space of potential ideas
and solutions is still far from being widely explored.
Scope
This special issue of the IEEE Network Magazine will feature
articles that discuss networking aspects of cloud computing.
Specifically, it aims at delivering the state-of-the-art
research on current cloud computing networking topics, and
at promoting the networking discipline by bringing to the
attention of the community novel problems that must be
investigated.
Areas of interest include, but are not limited to:
Data center architecture
Server interconnection
Routers (switching technology) for data center deployment
Centralization of network administration/routing
Energy-efficient cloud networking
Low energy routing
Green data centers
Measurement-based network management
Traffic engineering
Network anomaly detection
Usage-based pricing
Security issues in clouds
Secure routing
Security threats and countermeasures
Virtual network security
Virtual Networking
Virtualized network resource management
Virtual cloud storage
Futuristic topics
Interclouds
Cloud computing support for mobile users
Manuscript Submission
Authors should submit their manuscript electronically in PDF
format by email to all the guest editors according to the
timetable. Authors are encouraged to register their papers by
submitting the paper abstract, the paper title, authors and
keywords by the corresponding deadline. Prospective authors
must prepare their original submissions in accordance with
the IEEE Network guidelines to authors,
http://dl.comsoc.org/livepubs/ni/info/authors.html. Articles
should not exceed 4500 words, be tutorial in nature, and
should be written in a style comprehensible to readers
outside the specialty of the article. The title page should
include the paper title, authors and keywords. Figures
and tables should be limited to a combined total of six.
All submissions will be reviewed based on
technical merit and relevance.
Schedule
Abstract submission: January 9, 2011
Deadline for paper submission: January 15, 2011
First round of reviews: February 28, 2011
Revisions due: March 15, 2011
Author notification: March 26, 2011
Publication materials due: May 1, 2011
Publication date: July, 2011
Guest Editors
Swami Sivasubramanian
Amazon, USA
swami@amazon.com
Dimitrios Katsaros
University of Thessaly, Greece
dkatsar@inf.uth.gr
George Pallis
University of Cyprus, Cyprus
gpallis@cs.ucy.ac.cy
Athena Vakali
Aristotle University of Thessaloniki, Greece
avakali@csd.auth.gr
2010/07/08
Freenet Installation Error
Freenet source code can be build with '> ant -f freenet_ext/build.xml' or 'sudo ant -f freenet_ext/build.xml'.
P2P and applications
Some applications of interest and could be tested for P2P application and service layer:
Open source code available in Ubuntu - resource monitoring, etc
> Ping6
> V4Ping
> RadvD - Router advertisement daemon and could be configured for new peer advertisements, etc
> UdpEchoClient/Server - Echo protocol (see http://en.wikipedia.org/wiki/Echo_protocol
for a brief overview
> UdpClient/Server
> UdpTraceClient - ns3 OnOffApplication which implements UDP based application, :)
> OnOffApplication
Open source code available in Ubuntu - resource monitoring, etc
> Ping6
> V4Ping
> RadvD - Router advertisement daemon and could be configured for new peer advertisements, etc
> UdpEchoClient/Server - Echo protocol (see http://en.wikipedia.org/wiki/Echo_protocol
for a brief overview
> UdpClient/Server
> UdpTraceClient - ns3 OnOffApplication which implements UDP based application, :)
> OnOffApplication
2010/07/07
Parallelizing overlay-routing or parallelizing unicast messages for improving FreeNet performance?
How to reduce messages and improve performance? Is it possible to improve by parallelizing a variety of overlay routing? What could be the gain (for MMOG and FreeNet, for instance) over parallel multicast messages?
"that parallelizing a variety of overlay routing algorithms using multi-destination multicasting instead of parallel unicast messages results in significantly reduced message traffic on both edge and internal links. In structured overlays, this message reduction occurs for a variety of operations such as joins, routing table maintenance, and application lookups. In general, latency behavior and operational semantics are retained." Further information about the study could be found at this link.
"that parallelizing a variety of overlay routing algorithms using multi-destination multicasting instead of parallel unicast messages results in significantly reduced message traffic on both edge and internal links. In structured overlays, this message reduction occurs for a variety of operations such as joins, routing table maintenance, and application lookups. In general, latency behavior and operational semantics are retained." Further information about the study could be found at this link.
GC10 NGN and Services
[GC10 - CSSMA] CFP - IEEE Globecom 2010 - Communications Software, Services and Multimedia
IEEE Globecom 2010 - Communications Software, Services and Multimedia Applications Symposium
Dec 6 - 10, 2010
Miami, FL USA
http://www.ieee-globecom.org/2010
The Communications Software, Services and Multimedia Applications
Symposium covers challenges and advances for service delivery and
management in fixed and mobile communication networks. These topics
are particularly relevant for researchers, developers and industries
in the areas of networking and services covered by many Technical
Committees. The symposium will follow GC2010 instructions for
paper submission, review, and session construction. Papers offering
novel research contributions in any aspect of Communications Software
and Services are solicited for submission to the symposium.
Topics of Interest
* Next Generation Services and Service Platforms
o Mobile Services and Service Platforms including IMS
o Home Network Service Platform
o VoP2P and P2P-SIP Services
o Converged Application/Communication Servers and Services
o Location-based Services
o Social Networking Communication Services
o Advanced Communication Services and Feature Interaction
* Multimedia applications and services including VoIP, IPTV, Gaming
o Multimedia delivery over wired and wireless networks
o Cross-layer optimization for multimedia service support
o Multicast, Broadcast and IPTV
o Media streaming
o Peer-to-Peer services
* Software and Protocol Technologies for advanced service support
o Web Services and distributed SW technology
o Distributed systems and applications, including Grid Services
o Peer-to-Peer technologies for communication services
o Service overlay networks
o Context Awareness and Personalization
* Network and Service Management and Provisioning
o Multimedia QoS provisioning
o Quality of Experience for End-to-End Communications
o End-to-End Quality of Service Routing algorithms
o Service Creation, Delivery, Management
o Network Management
o Virtual Home Environment
o Charging, Pricing, Business Models
o Triple Play Services
o Security and Privacy in Network and Service Management
o Service Overlay Networks
o Cooperative Networking for Streaming Media Content
Submission deadline: March 15, 2010
Notifications due: July 1, 2010
Final version due: Aug 1, 2010
For more information about IEEE Globecom 2010, please see
http://www.ieee-globecom.org/2010
Symposium Co-Chairs
John Buford, Avaya Labs Research, USA (buford at avaya.com)
Mohammad S. Obaidat, Monmouth university, USA (obaidat at monmouth.edu)
Joel Rodrigues, University of Beira Interior, Portugal (joelr at
ieee.org)
Bin Wei, AT&T Research, USA (bw at research.att.com)
IEEE Globecom 2010 - Communications Software, Services and Multimedia Applications Symposium
Dec 6 - 10, 2010
Miami, FL USA
http://www.ieee-globecom.org/2010
The Communications Software, Services and Multimedia Applications
Symposium covers challenges and advances for service delivery and
management in fixed and mobile communication networks. These topics
are particularly relevant for researchers, developers and industries
in the areas of networking and services covered by many Technical
Committees. The symposium will follow GC2010 instructions for
paper submission, review, and session construction. Papers offering
novel research contributions in any aspect of Communications Software
and Services are solicited for submission to the symposium.
Topics of Interest
* Next Generation Services and Service Platforms
o Mobile Services and Service Platforms including IMS
o Home Network Service Platform
o VoP2P and P2P-SIP Services
o Converged Application/Communication Servers and Services
o Location-based Services
o Social Networking Communication Services
o Advanced Communication Services and Feature Interaction
* Multimedia applications and services including VoIP, IPTV, Gaming
o Multimedia delivery over wired and wireless networks
o Cross-layer optimization for multimedia service support
o Multicast, Broadcast and IPTV
o Media streaming
o Peer-to-Peer services
* Software and Protocol Technologies for advanced service support
o Web Services and distributed SW technology
o Distributed systems and applications, including Grid Services
o Peer-to-Peer technologies for communication services
o Service overlay networks
o Context Awareness and Personalization
* Network and Service Management and Provisioning
o Multimedia QoS provisioning
o Quality of Experience for End-to-End Communications
o End-to-End Quality of Service Routing algorithms
o Service Creation, Delivery, Management
o Network Management
o Virtual Home Environment
o Charging, Pricing, Business Models
o Triple Play Services
o Security and Privacy in Network and Service Management
o Service Overlay Networks
o Cooperative Networking for Streaming Media Content
Submission deadline: March 15, 2010
Notifications due: July 1, 2010
Final version due: Aug 1, 2010
For more information about IEEE Globecom 2010, please see
http://www.ieee-globecom.org/2010
Symposium Co-Chairs
John Buford, Avaya Labs Research, USA (buford at avaya.com)
Mohammad S. Obaidat, Monmouth university, USA (obaidat at monmouth.edu)
Joel Rodrigues, University of Beira Interior, Portugal (joelr at
ieee.org)
Bin Wei, AT&T Research, USA (bw at research.att.com)
Darwin: Resource Management for Application-Aware Networks
"Sophisticated multi-party applications will use many traffic streams with very different characteristics and will be network-aware so they can perform well on a variety of networks. At the same time, we see the emergence of an electronic service industry that is eager to deliver a wide variety of services to end-users. Services will range from low-level "bearer" services that transport bit streams over the network infrastructure to value-added services such as video conferencing, computing services, and data mining. Complex applications will support cooperation among multiple parties by combining video conferencing with access to large amounts of archived data, real time data streams, and distributed computing tasks. Supporting this service model and this emerging class of complex services requires innovation in a number of areas, including support for application-specific handling of traffic, sharing of resources between cooperating traffic streams, adapting quickly to changes in the network conditions and application requirements, systematic methods for balancing the constraints and priorities of services competing for network resources, and reliability and security. The CMU application-aware networking project will develop a comprehensive suite of resource management mechanisms in support of such "application-aware" networks. The project is headed by Peter Steenkiste, Allan Fisher, and Hui Zhang."
2010/06/10
How to steal a Botnet and what happen you do so?
Turpig, botnet, Command and Controller uses Mebroot HTTP phishing for injection and control (encrypted HTTP). It could intervene to 29 different applications for launching different kind of security, privacy attacks as well as data and credential thefts on victims. Researchers from UCSB managed to control this unbriddled and sophisticated systems for ten days and gathered data for about 69 GB data, containing 168,000 infections, and 8.7GB Apache log. Here are some interesting facts :-).
Video: http://www.youtube.com/watch?v=2GdqoQJa6r4
PDF: www.cs.ucsb.edu/~kemm/courses/cs177/torpig.pdf
Video: http://www.youtube.com/watch?v=2GdqoQJa6r4
PDF: www.cs.ucsb.edu/~kemm/courses/cs177/torpig.pdf
2010/06/03
Social Barometers and other interesting applications to come
Social Signal Processing is a relatively new field with some interesting points of contact on Mobile (PDAs and smart devices) Social Networking. New mobile (PDA and smart devices) devices are equiped with interesting sensors that allow them to record together with the corresponding heuristics social relationships in everyday situations. For this example, gyroscopes, accelerometers, compasses, temperature sensors, etc. Interesting questions like how to use these devices to build social barometers and services that could influence social life more ubiquitely. For further investigations here are two interesting papers.
* Alessandro Vinciarelli, Maja Pantic, Herve Bourlard "Social Signal Processing: Survey of an Emerging Domain" http://www.idiap.ch/~vincia/papers/sspsurvey.pdf
* Alex Pentland et al.: MIT Media-Lab: Reality Mining Project, 2009 Publications, http://reality.media.mit.edu/publications.php
* Alessandro Vinciarelli, Maja Pantic, Herve Bourlard "Social Signal Processing: Survey of an Emerging Domain" http://www.idiap.ch/~vincia/papers/sspsurvey.pdf
* Alex Pentland et al.: MIT Media-Lab: Reality Mining Project, 2009 Publications, http://reality.media.mit.edu/publications.php
2010/05/06
Microsoft P2P networking
Microsoft Peer to Peer networking provides scalable simulation framework and DRT SDK to simulate various P2P networking scenario (static cloud and dynamic cloud, etc). Useful information about DRT SDK and Microsoft P2P networking could be refered at the link.
Spontaneous Virtual Networks (SpoVNet)
Spontaneous Virtual Networks provide development of new services with transparent support for mobility, multi-homing, and heterogeneous environments. SpoVNets are underlay aware adaptation of overlays - using cross layer information and provide useful scenarios like group communication and event services. For detail please follow the link.
Network Coding Simulator
NECO is network coding simulator, written in python and extensible to new modules, simulate networking coding protocols by facilitating developer to generate graphs for topologies, modular implementation network coding protocol, and visualisation of network operations. More information about NECO could be found at the link.
AT&T Security Services
Networks security using P2P Networks provide sophisticated prevention from DDoS attacks and security management. Informative podcasts and vedios about AT&T security services could be found at this link.
Subscribe to:
Comments (Atom)