2016 IEEE 41st Conference on Local Computer Networks (LCN)

7-10 Nov. 2016

Filter Results

Displaying Results 1 - 25 of 133
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - xiv
    Request permission for reuse | PDF file iconPDF (171 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2016, Page(s):xv - xvi
    Request permission for reuse | PDF file iconPDF (126 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2016, Page(s): xvii
    Request permission for reuse | PDF file iconPDF (93 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Demonstrations Chair

    Publication Year: 2016, Page(s): xviii
    Request permission for reuse | PDF file iconPDF (113 KB) | HTML iconHTML
    Freely Available from IEEE
  • LCN Organizing Committee

    Publication Year: 2016, Page(s): xix
    Request permission for reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • LCN Program Committee, Demo Board and Additional Reviewers

    Publication Year: 2016, Page(s):xx - xxvii
    Request permission for reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • LCN Steering Committee

    Publication Year: 2016, Page(s): xxviii
    Request permission for reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • List of Accepted Demonstrations

    Publication Year: 2016, Page(s): xxix
    Request permission for reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • LCN 2016 Sponsors and Supporters

    Publication Year: 2016, Page(s): xxx
    Request permission for reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • LCN Best Paper Awards for Prior IEEE Local Computer Networks Conferences

    Publication Year: 2016, Page(s):xxxi - xxxii
    Request permission for reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Keynote - Intelligent Adaptive Management in Local Wireless Networking

    Publication Year: 2016, Page(s): xxxiii
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (114 KB) | HTML iconHTML

    Summary form only given: Wireless technologies play a constantly increasing role also in the local connectivity. They differ from their wired counterparts by far not only in less reliable (and variable) medium and, thus, MAC protocols. Due to limitations in frequency availability, the need for coexistence of different networks (both different technologies and different instances of the same techno... View full abstract»

    Freely Available from IEEE
  • Keynote - 30 years of Internet Security and the winner is ...

    Publication Year: 2016, Page(s): xxxiv
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (105 KB) | HTML iconHTML

    Thirty years ago, Brian Reid published an article in the Software Engineering journal entitled “Lessons from the Unix Break-ins at Stanford” [1]. Two years later, we experienced the first major outbreak of the Internet with the so-called Morris worm that was using vulnerabilities that had been publicly reported but not fixed. These were the early days. Such errors were understandable. But have thi... View full abstract»

    Freely Available from IEEE
  • Confidentiality and Authenticity for Distributed Version Control Systems - A Mercurial Extension

    Publication Year: 2016, Page(s):1 - 9
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    Version Control Systems (VCS) are a valuable tool for software development and document management. Both client/server and distributed (Peer-to-Peer) models exist, with the latter (e.g., Git and Mercurial) becoming increasingly popular. Their distributed nature introduces complications, especially concerning security: it is hard to control the dissemination of contents stored in distributed VCS as... View full abstract»

    Freely Available from IEEE
  • Even Lower Latency, Even Better Fairness: Logistic Growth Congestion Control in Datacenters

    Publication Year: 2016, Page(s):10 - 18
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (2480 KB) | HTML iconHTML

    Datacenter transport has attracted much recent interest, however, most proposed improvements require changing the datacenter fabric, which hinders their applicability and deployability over commodity hardware. In this paper, we present a novel congestion controller, Logistic Growth Control (LGC), for datacenters which does not require changes to the datacenter fabric. LGC uses a similar ECN markin... View full abstract»

    Freely Available from IEEE
  • A Measurement Study on the Distribution Disparity of BGP Instabilities

    Publication Year: 2016, Page(s):19 - 27
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (25746 KB) | HTML iconHTML

    BGP measurement is important for monitoring and understanding the Internet anomalies. Most of the previous works on BGP measurement rely on aggregated statistics from BGP monitors, e.g., total updates. However, BGP events may have quite limited visibility. Therefore, merely investigating aggregated data may lead to misunderstanding Internet instability, e.g., overestimating the impact of monitor-l... View full abstract»

    Freely Available from IEEE
  • Third-Party Tracking on the Web: A Swedish Perspective

    Publication Year: 2016, Page(s):28 - 34
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (828 KB) | HTML iconHTML

    Today, third-party tracking services and passive traffic monitoring are extensively used to gather knowledge about users' internet activities and interests. Such tracking has significant privacy implications for the end users. This paper presents an overview of the third-party tracking usage. Using measurements, we highlight the current state of the third-party tracking landscape and differences o... View full abstract»

    Freely Available from IEEE
  • On Assisted Packet Filter Conflicts Resolution: An Iterative Relaxed Approach

    Publication Year: 2016, Page(s):35 - 42
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    With the dramatic growth of network attacks, a new set of challenges has raised in the field of electronic security. Undoubtedly, firewalls are core elements in the network security architecture. However, firewalls may include policy anomalies resulting in critical network vulnerabilities. A substantial step towards ensuring network security is resolving packet filter conflicts. Numerous studies h... View full abstract»

    Freely Available from IEEE
  • The Small, the Fast, and the Lazy (SFL): A General Approach for Fast and Flexible Packet Classification

    Publication Year: 2016, Page(s):43 - 51
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (531 KB) | HTML iconHTML

    Packet classification-the matching of packet headers against a predefined rule set-is a crucial functionality of firewalls, intrusion detection systems, and SDN switches. Most existing classification algorithms trade setup time for classification speed-that is, the packet classification is fast, but the transformation of rules set into the corresponding search data structure takes a considerable a... View full abstract»

    Freely Available from IEEE
  • Convex Hull Watchdog: Mitigation of Malicious Nodes in Tree-Based P2P Monitoring Systems

    Publication Year: 2016, Page(s):52 - 60
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Monitoring the global state in peer-to-peer networks through decentralized mechanisms allows targeted optimization and improvement of the peer-to-peer network. However, malicious nodes could aim to distort the process of gathering the global state through monitoring. In this paper we propose DOMiNo, a security solution for tree-based peer-to-peer monitoring mechanisms. It passively listens to inco... View full abstract»

    Freely Available from IEEE
  • The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks

    Publication Year: 2016, Page(s):61 - 68
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Botnet threats include a plethora of possible attacks ranging from distributed denial of service (DDoS), to drive-by-download malware distribution and spam. While for over two decades, techniques have been proposed for either improving accuracy or speeding up the detection of attacks, much of the damage is done by the time attacks are contained. In this work we take a new direction which aims to p... View full abstract»

    Freely Available from IEEE
  • An Efficient MAC Layer Packet Fragmentation Scheme with Priority Queuing for Real-Time Video Streaming

    Publication Year: 2016, Page(s):69 - 77
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    This paper proposes a novel priority-aware packet fragmentation extension to high throughput WLANs such as IEEE 802.11n for streaming of H264/AVC encoded videos. Unlike existing fragmentation schemes, the proposed scheme fragments IP packets based on the priority of video packets and the characteristics of MPEG-2 TS, where the original IP packet is fragmented into smaller IP packets containing few... View full abstract»

    Freely Available from IEEE
  • Improving the Fairness of Alternative Backoff with ECN (ABE)

    Publication Year: 2016, Page(s):78 - 86
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Explicit Congestion Notification (ECN) lets a bottleneck's Active Queue Management (AQM) mechanism inform an endpoint about congestion without having to drop a packet. A recently proposed sender-side modification called Alternative Backoff with ECN (ABE) enables reduced latency while maintaining good utilization with ECN. However, under certain circumstances ABE can produce a degree of unfair beha... View full abstract»

    Freely Available from IEEE