Co-Chairs:
Bulent Yener, Renselear Polytechnic Inst,
USA
Refik Molva, Institut EURECOM, France
Carlos Becker WestphalI, Federal University
of Santa Catarina, Brasil
Sponsoring ComSoc Technical Committees:
Computer Communications
Information Infrastructure
Committee on Network Operations and
Management
|
Sessions: |
Monday, 12 June
2006
10:30–12:00
NS-01: Worm Detection
NS01.1. |
AntiWorm NPU-based Parallel
Bloom filters in Giga-Ethernet LAN
Zhen Chen (Tsinghua University, P.R.
China) |
NS01.2. |
FDF: Frequency Detection-Based
Filtering of Scanning Worms
Byung Seung Kim (Seoul National
University, Korea); Saewoong Bahk
(Seoul National University, Korea);
Hyogon Kim (Korea University,
Korea) |
NS01.3. |
Traffic Classification-Based
Spam Filter
Zhang Ni (Chinese Academy of
Sciences, P.R. China) |
NS01.4. |
Design and Implementation of a
Multi-gigabit Intrusion and
Virus/Worm Detection System
Seok Min Kang (Chungnam National
University, Korea); Il Seop Song (Chungnam
National University, Korea);
Youngseok Lee (Chungnam National
University, Korea); Taeck-Geun Kwon
(Chungnam National University,
Korea) |
NS01.5. |
Effectiveness of Quarantine in
Worm Epidemics
Thomas Chen (Southern Methodist
University, USA); Nasir Jamil
(Southern Methodist University,
USA) |
|
CLOSE
|
|
14:00–15:30
NS-02: Denial of Service Attacks
NS02.1. |
A User Habit Based Approach to
Detect and Quarantine Worms
Wang Ping (Harbin Institute of
Technology, P.R. China); Binxing
Fang (Harbin Institute of
Technology, P.R. China); Xiaochun
Yun (Harbin Institute of
Technology, P.R. China) |
NS02.2. |
Do Low Rate DoS Attacks Affect
QoS Sensitive VoIP Traffic?
Amey Shevtekar (New Jersey
Institute of Technology, USA);
Nirwan Ansari (New Jersey Institute
of Technology, USA) |
NS02.3. |
An Efficient Defense against
Distributed Denial-of-Service
Attacks Using Congestion Path
Marking
Yoohwan Kim (University of Nevada,
Las Vegas, USA); Ahmed Abd El Al
(University of Nevada, Las Vegas,
USA); Ju-Yeon Jo (California State
University, Sacramento, USA); Mei
Yang (University of Nevada, Las
Vegas, USA); Yingtao Jiang
(University of Nevada, Las Vegas,
USA)
|
NS02.4. |
A Coordinated Detection and
Response Scheme for Distributed
Denial-of-Service Attacks
Ho Yu Lam (Hong Kong University of
Science and Technology, Hong Kong);
Chi Pan Li (Hong Kong University of
Science and Technology, Hong Kong);
Samuel T. Chanson (The Hong Kong
University of Science and
Technology, Hong Kong); Dit Yan
Yeung (Hong Kong University of
Science and Technology, Hong Kong) |
NS02.5. |
PISA*: A System for Control of
DDoS Attacks
Parminder Chhabra (Boston
University, USA); Sajal Das (UniversityTexas
at Arlington, USA); Ajita John (Avaya
Labs, USA); Wei Zhang (University
of Texas, Arlington, USA) |
|
CLOSE
|
|
14:00–17:30
NS-09(P): Topics in Network Security and Information Assurance
NS09.1. |
An Efficient Signature-Based
Approach for Automatic Detection of
Internet Worms over Large-Scale
Networks
Kumar Simkhada (Tohoku University,
Japan); Tarik Taleb (Tohoku
University, Japan); Yuji Waizumi
(Tohoku University, Japan); Abbas
Jamalipour (University of Sydney,
Australia); Nei Kato (Tohoku
University, Japan); Yoshiaki Nemoto
(Tohoku University, Japan) |
NS09.2. |
A Scalable Architecture for High
Available Security Switch
Nen-Fu Huang (National Tsing Hua
University, Taiwan); Chih-Hao Chen
(National Tsing Hua University,
Taiwan); Yuan-Fang Huang
(University of Tsing Hua, Taiwan);
Yi-Hsuan Feng (National Tsing Hua
University, Taiwan); Chia-Nan Kao
(National Tsing Hua University,
Taiwan) |
NS09.3. |
Policy-Based Service
Provisioning and Dynamic Trust
Management in Identity Federations
Wolfgang Hommel (Leibniz
Supercomputing Center, Germany);
Latifa Boursas (Technical
University of Munich, Germany) |
NS09.4. |
Efficient Key Management and
Distribution for MANET
Jayanta Biswas (Indian Institute of
Science, India) |
NS09.5. |
Performance of an Efficient
Performing Authentication to Obtain
Access to Public Wireless LAN with
a Cache Table
Hyun-Woo Lee (ETRI, Korea); Won Ryu
(ETRI, Korea); Byung Sun Lee (ETRI,
Korea) |
NS09.6. |
Energy-Efficient Pipelined Bloom
Filters for Network Intrusion
Detection
Ilhan Kaya (University of Central
Florida, USA); Taskin Kocak
(University of Central Florida,
USA) |
NS09.7. |
Anomaly Based Network Intrusion
Detection with Unsupervised Outlier
Detection
Jiong Zhang (Queen's University,
Canada); Mohammad Zulkernine
(Queen’s University, Canada) |
NS09.8. |
Detecting and Reacting Against
Distributed Denial of Service
Attacks
Yacine Bouzida (ENST Bretagne,
France); Frederic Cuppens (ENST
Bretagne, France); Sylvain
Gombault (ENST Bretagne, France) |
|
CLOSE
|
|
16:00
– 17:30
NS-03: Intrusion Detection
NS03.1. |
A Double-Filter Structure Based
Scheme for Scalable Port Scan
Detection
Shijin Kong (Tsinghua University,
P.R. China); Tao He (CERNET,
Tsinghua University, P.R. China);
Xiaoxin Shao (Tsinghua University,
P.R. China); Xing Li (Tsinghua
University, P.R. China) |
NS03.2. |
Improving NIDS Performance
Through Hardware-Based Connection
Filtering
Vikas Garg (University of
Wisconsin-Madison, USA); Vinod
Yegneswaran (University of
Wisconsin-Madison, USA); Paul
Barford (University of
Wisconsin-Madison, USA) |
NS03.3. |
A Game Theoretic Model to Handle
Network Intrusions over Multiple
Packets
Mona Mehrandish (Concordia
University, Canada); Chadi Assi
(Concordia University, Canada);
Mourad Debbabi (Concordia
University, Canada) |
NS03.4. |
A New Approach for IDS
Composition
José Eduardo Brandão (Universidade
Federal de Santa Catarina, Brazil);
Joni Da Silva Fraga (Universidade
Federal de Santa Catarina, Brazil);
Paulo Mafra (Universidade Federal
de Santa Catarina, Brazil) |
NS03.5. |
A Game Theoretic Approach to
Efficient Mixed Strategies for
Intrusion Detection
Yu Liu (Stevens Institute of
Technology, USA); Hong Man (Stevens
Institute of Technology, USA);
Cristina Comaniciu (Stevens
Institute of Technology, USA) |
|
CLOSE
|
|
|
Tuesday, 13 June
2006
8:30–10:00
NS-04: Authentication and Firewalls
NS04.1. |
Fast Authentication in a
Collaborative Wireless Access
Network
Jahan Hassan (University of Sydney,
Australia); Bjorn Landfeldt (The
University of Sydney, Australia) |
NS04.2. |
A Function-Parallel Architecture
for High-Speed Firewalls
Errin Fulp (Wake Forest University,
USA); Ryan Farely (Wake Forest
University, USA) |
NS04.3. |
Wireless LAN-3G Integration:
Unified Mechanisms for Secure
Authentication based on SIP
Luca Veltri (University of Parma,
Italy); Stefano Salsano (University
of Rome “Tor Vergata”, Italy);
Gianluca Martiniello (University of
Rome “Tor Vergata”, Italy) |
NS04.4. |
Traffic-Aware Firewall
Optimization Strategies
Subrata Acharya, Taieb Znati
(University of Pittsburgh, USA);
Jia Wang, Zihui Ge and
Albert Greenberg ( AT&T Labs
Research, Florham
Park, NJ) |
NS04.5. |
An Efficient Broadcast
Authentication Scheme for Ad Hoc
Routing Protocols
Mahalingam Ramkumar (Mississippi
State University, USA) |
|
CLOSE
|
|
10:30–12:00
NS-05: Key Management
NS05.1. |
Simulation Based Performance
Evaluation of a User-Centric Group
Rekeying Protocol
Melek Önen (Institut EURECOM,
France); Jussi Kyrohonka (Institut
Eurecom, France) |
NS05.2. |
The Performance of Elliptic
Curve Based Group Diffie-Hellman
Protocols for Secure Group
Communication over Ad Hoc Networks
Yong Wang (University of
Nebraska-Lincoln, USA); Byrav
Ramamurthy (University of
Nebraska-Lincoln, USA); Xukai Zou
(Purdue University-Indianapolis,
USA) |
NS05.3. |
A Robust, Distributed TGDH-based
Scheme for Secure Group
Communications in MANETs
Maria Striki (University of
Maryland, USA); Kyriakos Manousakis
(Telcordia Technologies, USA); John
S. Baras (University of Maryland,
USA) |
NS05.4. |
Communication-Efficient Key
Establishment in Wireless Sensor
Networks
Patrick Tague (University of
Washington, USA); Radha Poovendran
(University of Washington, USA) |
NS05.5. |
Expander Graph Based Key
Distribution Mechanisms in Wireless
Sensor Networks
Ahmet Camtepe (Rensselaer
Polytechnic Institute, USA); Bulent
Yener (Rensselaer Polytechnic
Institute, USA); Moti Yung (CertCo
Inc, USA) |
|
CLOSE
|
|
14:00–15:30
NS-06: Information Assurance/Trust Management
NS06.1. |
Preventing Secret Leakage from
fork(): Securing
Privilege-Separated Applications
Umesh Shankar (University of
California, Berkeley, USA); David
Wagner (University of California,
Berkeley, USA) |
NS06.2. |
Dynamic Merkle Trees for
Verifying Privileges in Sensor
Networks
Li Zhou (University of California,
Riverside, USA); Chinya Ravishankar
(University of California,
Riverside, USA) |
NS06.3. |
Network Security in Enterprise
Services Architectures
Matthias Anlauff (Kestrel
Institute, USA); Asuman Suenbuel
(SAP Research Labs, USA) |
NS06.4. |
Public Key Based Cryptoschemes
for Data Concealment in Wireless
Sensor Networks
Einar Mykletun (University of
California, Irvine, USA); Joao
Girao (NEC Europe Ltd., Germany);
Dirk Westhoff (NEC Europe Ltd.,
Germany) |
NS06.5. |
Detecting Masquerading Users in
a Document Management System
Vidyaraman Sankaranarayanan
(University at Buffalo, USA);
Suranjan Pramanik (University at
Buffalo, USA); Shambhu Upadhyaya
(University at Buffalo, USA) |
|
CLOSE
|
|
16:00–17:30
NS-07: Network Routing, Traffic Flow and Security
NS07.1. |
A Generic Anonymization
Framework for Network Traffic
Dimitris Koukis (ICS/FORTH,
Greece); Spiros Antonatos
(ICS/FORTH, Greece); Demetres
Anoniades (ICS/FORTH, Greece);
Panos Trimintzios (ICS/FORTH,
Greece); Evangelos Markatos
(ICS/FORTH, Greece) |
NS07.2. |
A New Cryptographic Scheme for
Securing Dynamic Conferences in
Data Networks
Sarang Deshpande (University of
Nebraska-Lincoln, USA); Ajay
Todimala (University of Nebraska,
USA); Ravi Balachandran (University
of Nebraska-Lincoln, USA); Byrav
Ramamurthy (University of
Nebraska-Lincoln, USA); Xukai Zou
(Purdue University-Indianapolis,
USA); Vinodchandran Variyam
(University of Nebraska-Lincoln,
USA)
|
NS07.3. |
On the Impact of Low-Rate
Attacks
Mina Guirguis (Boston University,
USA); Azer Bestavros (Boston
University, USA); Ibrahim Matta
(Boston University, USA) |
NS07.4. |
Data Security in MANETs Using
Multipath Routing and Directional
Transmission
Vladimir Berman (University of
California, Davis, USA); Biswanath
Mukherjee (University of
California, Davis, USA) |
NS07.5. |
A Passive Approach to Wireless
NIC Identification
Cherita Corbett (Georgia Institute
of Technology, USA); Raheem Beyah
(Georgia State University, USA);
John Copeland (Georgia Institute of
Technology, USA) |
|
CLOSE
|
|
|
Wednesday, 14
June 2006
8:30–10:00
NS-08: Architectures, Applications and Security
NS08.1. |
Applications of Pairings in GRID
Security
Amitabh Saxena (La Trobe
University, Australia) |
NS08.2. |
Break and Improve the New Proxy
Blind Signature Scheme Using
Verifiable Self-Certified Public
Key
Zhian Cheng (Beijing Jiaotong
University,P.R. China) |
NS08.3. |
DoX: A Peer-to-Peer Antidote for
DNS Cache Poisoning Attacks
Lihua Yuan (University of
California, Davis, USA); Krishna
Kant (Intel Corporation, USA);
Prasant Mohapatra (University of
California, Davis, USA); Chen-Nee
Chuah (University of California,
Davis, USA) |
NS08.4. |
A Digital Content Mediator (DCM)
Approach to Implementing Legitimate
and Secure P2P Online Transactions
Jiejun Kong (University of
California at Los Angeles, USA);
Ling-Jyh Chen (Academia Sinica,
Taiwan); Markus Jakobsson (Indiana
University, USA); Stanley Moyer (Telcordia
Technologies, USA); Dave Marples (Telcordia
Technologies, USA); Mario Gerla
(University of California at Los
Angeles, USA) |
NS08.5. |
A Scalable and
Intrusion-Tolerant Digital
Time-Stamping System
Daniela Tulone (University of Pisa,
Italy) |
|
CLOSE
|
|
|
|
|