Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

External Link

Discipline
Keyword
Publication Year
Publication

Articles 1 - 14 of 14

Full-Text Articles in OS and Networks

Exposing Potential Privacy Issues With Ipv6 Address Construction, Clinton Carpene, Andrew Woodward Jan 2015

Exposing Potential Privacy Issues With Ipv6 Address Construction, Clinton Carpene, Andrew Woodward

Clinton Carpene

The usage of 128 bit addresses with hexadecimal representation in IPv6 poses significant potential privacy issues. This paper discusses the means of allocating IPv6 addresses, along with the implications each method may have upon privacy in different usage scenarios. The division of address space amongst the global registries in a hierarchal fashion can provide geographical information about the location of an address, and its originating device. Many IPv6 address configuration methods are available, including DHCPv6, SLAAC (with or without privacy extensions), and Manual assignment. These assignment techniques are dissected to expose the identifying characteristics of each technique. It is seen …


Simulation Of Circuit Creation In Tor: Preliminary Results, William Boyd, Norman Danner, Danny Krizanc Jul 2013

Simulation Of Circuit Creation In Tor: Preliminary Results, William Boyd, Norman Danner, Danny Krizanc

Norman Danner

We describe a methodology for simulating Tor relay up/down behavior over time and give some preliminary results.


Effectiveness And Detection Of Denial Of Service Attacks In Tor, Norman Danner, Samuel Defabbia-Kane, Danny Krizanc, Marc Liberatore Jul 2013

Effectiveness And Detection Of Denial Of Service Attacks In Tor, Norman Danner, Samuel Defabbia-Kane, Danny Krizanc, Marc Liberatore

Norman Danner

Tor is one of the more popular systems for anonymizing near-real-time communications on the Internet. Borisov et al. [2007] proposed a denial-of-service-based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this article, we analyze the effectiveness of the attack using both an analytic model and simulation. We also describe two algorithms for detecting such attacks, one deterministic and proved correct, the other probabilistic and verified in simulation.


Automatic Defect Categorization, Ferdian Thung, David Lo, Lingxiao Jiang Apr 2013

Automatic Defect Categorization, Ferdian Thung, David Lo, Lingxiao Jiang

David LO

Defects are prevalent in software systems. In order to understand defects better, industry practitioners often categorize bugs into various types. One common kind of categorization is the IBM’s Orthogonal Defect Classification (ODC). ODC proposes various orthogonal classification of defects based on much information about the defects, such as the symptoms and semantics of the defects, the root cause analysis of the defects, and many more. With these category labels, developers can better perform post-mortem analysis to find out what the common characteristics of the defects that plague a particular software project are. Albeit the benefits of having these categories, for …


Low Latency Fault Tolerance System, Wenbing Zhao Dec 2012

Low Latency Fault Tolerance System, Wenbing Zhao

Wenbing Zhao

The Low Latency Fault Tolerance (LLFT) system provides fault tolerance for distributed applications within a local-area network, using a leader-follower replication strategy. LLFT provides application-transparent replication, with strong replica consistency, for applications that involve multiple interacting processes or threads. Its novel system model enables LLFT to maintain a single consistent infinite computation, despite faults and asynchronous communication. The LLFT Messaging Protocol provides reliable, totally-ordered message delivery by employing a group multicast, where the message ordering is determined by the primary replica in the destination group. The Leader-Determined Membership Protocol provides reconfiguration and recovery when a replica becomes faulty and when …


The Graph Neural Network Model, Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, Gabriele Monfardini Dec 2012

The Graph Neural Network Model, Franco Scarselli, Marco Gori, Ah Chung Tsoi, Markus Hagenbuchner, Gabriele Monfardini

Dr Markus Hagenbuchner

Many underlying relationships among data in several areas of science and engineering, e.g. computer vision, molecular chemistry, molecular biology, pattern recognition, data mining, can be represented in terms of graphs. In this paper, we propose a new neural network model, called graph neural network (GNN) model, that extends existing neural network methods for processing the data represented in the graph domain. This GNN model, which can directly process most of the practically useful types of graphs, e.g. acyclic, cyclic, directed, un-directed, implements a transduction function $\tau(\BG,n)\in\R^m$ that maps a graph $\BG$ and one of its nodes $n$ into an m-dimensional …


Movement Detection For Power-Efficient Smartphone Wlan Localization, Mark Chang, Ilari Shafer Jul 2012

Movement Detection For Power-Efficient Smartphone Wlan Localization, Mark Chang, Ilari Shafer

Mark L. Chang

Mobile phone services based on the location of a user have increased in popularity and importance, particularly with the proliferation of feature-rich smartphones. One major obstacle to the widespread use of location-based services is the limited battery life of these mobile devices and the high power costs of many existing approaches. We demonstrate the effectiveness of a localization strategy that performs full localization only when it detects a user has finished moving. We characterize the power use of a smartphone, then verify our strategy using models of long-term walk behavior, recorded data, and device implementation. For the same sample period, …


Investigating Cognitive Task Difficulties And Expert Skills In E-Learning Storyboards Using A Cognitive Task Analysis Technique, Siti Salwah Salim Dec 2011

Investigating Cognitive Task Difficulties And Expert Skills In E-Learning Storyboards Using A Cognitive Task Analysis Technique, Siti Salwah Salim

Siti Salwah Salim Prof. Dr.

E-learning storyboards have been a useful approach in distance learning development to support interaction between instructional designers and subject-matter experts. Current works show that researchers are focusing on different approaches for use in storyboards, and there is less emphasis on the effect of design and process difficulties faced by instructional designers and subject-matter experts. This study explores problem aspects of the cognitive task and the skills required of subject-matter experts by applying a cognitive task analysis approach from the expert point of view. The result shows that subject-matter experts face difficulties in making decisions on three elements during e-learning course …


Structuring Persistent Chat Conversations: Experimental Results Of The Chatsistance Tool, Siti Salwah Salim Dec 2011

Structuring Persistent Chat Conversations: Experimental Results Of The Chatsistance Tool, Siti Salwah Salim

Siti Salwah Salim Prof. Dr.

Abstract This research targets persistency by introducing new features in ‘Chatsistance’, a persistent chat tool that employs speech act theory and an explicit referencing technique to structure the chat log, and by providing further options for retrieving information. Earlier theory is related to the linguistics and characteristics of user statements. The later technique shows the relation of artefacts in an interconnected context named ‘explicit referencing’. Although speech actswere previously used in the field of chat, it is the first time that this theory has been used for the purpose of enhancing persistency combined with an explicit referencing technique,which together provide …


Non-Redundant Sequential Rules,Theory And Algorithm, David Lo, Siau-Cheng Khoo, Limsoon Wong Nov 2011

Non-Redundant Sequential Rules,Theory And Algorithm, David Lo, Siau-Cheng Khoo, Limsoon Wong

David LO

A sequential rule expresses a relationship between two series of events happening one after another. Sequential rules are potentially useful for analyzing data in sequential format, ranging from purchase histories, network logs and program execution traces. In this work, we investigate and propose a syntactic characterization of a non-redundant set of sequential rules built upon past work on compact set of representative patterns. A rule is redundant if it can be inferred from another rule having the same support and confidence. When using the set of mined rules as a composite filter, replacing a full set of rules with a …


Properties For Component Model: The Definition Perspective, Siti Salwah Salim Dec 2010

Properties For Component Model: The Definition Perspective, Siti Salwah Salim

Siti Salwah Salim Prof. Dr.

The presence of a large number of component models to date should be able to offer software developers a wide variety of component models - which they can easily choose from - for their software development projects. However, the opposite situation is currently observed, where the presence of many component models has caused difficulties in making the selection. Lack of properties or characteristics that can be used as a basis to perform objective comparison between the existing models is believed to have caused the difficulties. In this paper, a list of component model properties is derived by thoroughly examining the …


Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski Jan 2010

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski

Sascha Vitzthum

Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …


Detecting Denial Of Service Attacks In Tor, Norman Danner, Danny Krizanc, Marc Liberatore Dec 2008

Detecting Denial Of Service Attacks In Tor, Norman Danner, Danny Krizanc, Marc Liberatore

Norman Danner

Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented …


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …