Co-Chairs:
Bulent Yener, Renselear Polytechnic Inst, USA
Refik Molva, Institut EURECOM, France
Carlos Becker WestphalI, Federal University of Santa Catarina, Brasil
Sponsoring ComSoc Technical Committees:
Computer Communications
Information Infrastructure
Committee on Network Operations and Management
|
Sessions:
|
Monday, 12 June 2006
10:30–12:00
NS-01: Worm Detection
NS01.1.
|
AntiWorm NPU-based Parallel Bloom filters in Giga-Ethernet LAN
Zhen Chen (Tsinghua University, P.R. China)
|
NS01.2.
|
FDF: Frequency Detection-Based Filtering of Scanning Worms
Byung Seung Kim (Seoul National University, Korea); Saewoong Bahk (Seoul National University, Korea); Hyogon Kim (Korea University, Korea)
|
NS01.3.
|
Traffic Classification-Based Spam Filter
Zhang Ni (Chinese Academy of Sciences, P.R. China)
|
NS01.4. |
Design and Implementation of a Multi-gigabit Intrusion and Virus/Worm Detection System
Seok Min Kang (Chungnam National University, Korea); Il Seop Song (Chungnam National University, Korea); Youngseok Lee (Chungnam National University, Korea); Taeck-Geun Kwon (Chungnam National University, Korea) |
NS01.5. |
Effectiveness of Quarantine in Worm Epidemics
Thomas Chen (Southern Methodist University, USA); Nasir Jamil (Southern Methodist University, USA) |
|
CLOSE
|
|
14:00–15:30
NS-02: Denial of Service Attacks
NS02.1.
|
A User Habit Based Approach to Detect and Quarantine Worms
Wang Ping (Harbin Institute of Technology, P.R. China); Binxing Fang (Harbin Institute of Technology, P.R. China); Xiaochun Yun (Harbin Institute of Technology, P.R. China)
|
NS02.2.
|
Do Low Rate DoS Attacks Affect QoS Sensitive VoIP Traffic?
Amey Shevtekar (New Jersey Institute of Technology, USA); Nirwan Ansari (New Jersey Institute of Technology, USA)
|
NS02.3.
|
An Efficient Defense against Distributed Denial-of-Service Attacks Using Congestion Path Marking
Yoohwan Kim (University of Nevada, Las Vegas, USA); Ahmed Abd El Al (University of Nevada, Las Vegas, USA); Ju-Yeon Jo (California State University, Sacramento, USA); Mei Yang (University of Nevada, Las Vegas, USA); Yingtao Jiang (University of Nevada, Las Vegas, USA)
|
NS02.4.
|
A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks
Ho Yu Lam (Hong Kong University of Science and Technology, Hong Kong); Chi Pan Li (Hong Kong University of Science and Technology, Hong Kong); Samuel T. Chanson (The Hong Kong University of Science and Technology, Hong Kong); Dit Yan Yeung (Hong Kong University of Science and Technology, Hong Kong)
|
NS02.5.
|
PISA*: A System for Control of DDoS Attacks
Parminder Chhabra (Boston University, USA); Sajal Das (UniversityTexas at Arlington, USA); Ajita John (Avaya Labs, USA); Wei Zhang (University of Texas, Arlington, USA)
|
|
CLOSE
|
|
14:00–17:30
NS-09(P): Topics in Network Security and Information Assurance
NS09.1.
|
An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks
Kumar Simkhada (Tohoku University, Japan); Tarik Taleb (Tohoku University, Japan); Yuji Waizumi (Tohoku University, Japan); Abbas Jamalipour (University of Sydney, Australia); Nei Kato (Tohoku University, Japan); Yoshiaki Nemoto (Tohoku University, Japan)
|
NS09.2.
|
A Scalable Architecture for High Available Security Switch
Nen-Fu Huang (National Tsing Hua University, Taiwan); Chih-Hao Chen (National Tsing Hua University, Taiwan); Yuan-Fang Huang (University of Tsing Hua, Taiwan); Yi-Hsuan Feng (National Tsing Hua University, Taiwan); Chia-Nan Kao (National Tsing Hua University, Taiwan)
|
NS09.3.
|
Policy-Based Service Provisioning and Dynamic Trust Management in Identity Federations
Wolfgang Hommel (Leibniz Supercomputing Center, Germany); Latifa Boursas (Technical University of Munich, Germany)
|
NS09.4.
|
Efficient Key Management and Distribution for MANET
Jayanta Biswas (Indian Institute of Science, India)
|
NS09.5.
|
Performance of an Efficient Performing Authentication to Obtain Access to Public Wireless LAN with a Cache Table
Hyun-Woo Lee (ETRI, Korea); Won Ryu (ETRI, Korea); Byung Sun Lee (ETRI, Korea)
|
NS09.6. |
Energy-Efficient Pipelined Bloom Filters for Network Intrusion Detection
Ilhan Kaya (University of Central Florida, USA); Taskin Kocak (University of Central Florida, USA) |
NS09.7. |
Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection
Jiong Zhang (Queen's University, Canada); Mohammad Zulkernine (Queen’s University, Canada) |
NS09.8. |
Detecting and Reacting Against Distributed Denial of Service Attacks
Yacine Bouzida (ENST Bretagne, France); Frederic Cuppens (ENST Bretagne, France); Sylvain Gombault (ENST Bretagne, France) |
|
CLOSE
|
|
16:00 – 17:30
NS-03: Intrusion Detection
NS03.1.
|
A Double-Filter Structure Based Scheme for Scalable Port Scan Detection
Shijin Kong (Tsinghua University, P.R. China); Tao He (CERNET, Tsinghua University, P.R. China); Xiaoxin Shao (Tsinghua University, P.R. China); Xing Li (Tsinghua University, P.R. China)
|
NS03.2.
|
Improving NIDS Performance Through Hardware-Based Connection Filtering
Vikas Garg (University of Wisconsin-Madison, USA); Vinod Yegneswaran (University of Wisconsin-Madison, USA); Paul Barford (University of Wisconsin-Madison, USA)
|
NS03.3.
|
A Game Theoretic Model to Handle Network Intrusions over Multiple Packets
Mona Mehrandish (Concordia University, Canada); Chadi Assi (Concordia University, Canada); Mourad Debbabi (Concordia University, Canada)
|
NS03.4.
|
A New Approach for IDS Composition
José Eduardo Brandão (Universidade Federal de Santa Catarina, Brazil); Joni Da Silva Fraga (Universidade Federal de Santa Catarina, Brazil); Paulo Mafra (Universidade Federal de Santa Catarina, Brazil)
|
NS03.5.
|
A Game Theoretic Approach to Efficient Mixed Strategies for Intrusion Detection
Yu Liu (Stevens Institute of Technology, USA); Hong Man (Stevens Institute of Technology, USA); Cristina Comaniciu (Stevens Institute of Technology, USA)
|
|
CLOSE
|
|
|
Tuesday, 13 June 2006
8:30–10:00
NS-04: Authentication and Firewalls
NS04.1.
|
Fast Authentication in a Collaborative Wireless Access Network
Jahan Hassan (University of Sydney, Australia); Bjorn Landfeldt (The University of Sydney, Australia)
|
NS04.2.
|
A Function-Parallel Architecture for High-Speed Firewalls
Errin Fulp (Wake Forest University, USA); Ryan Farely (Wake Forest University, USA)
|
NS04.3.
|
Wireless LAN-3G Integration: Unified Mechanisms for Secure Authentication based on SIP
Luca Veltri (University of Parma, Italy); Stefano Salsano (University of Rome “Tor Vergata”, Italy); Gianluca Martiniello (University of Rome “Tor Vergata”, Italy)
|
NS04.4.
|
Traffic-Aware Firewall Optimization Strategies
Subrata Acharya, Taieb Znati (University of Pittsburgh, USA); Jia Wang, Zihui Ge and Albert Greenberg ( AT&T Labs Research, Florham
Park, NJ)
|
NS04.5.
|
An Efficient Broadcast Authentication Scheme for Ad Hoc Routing Protocols
Mahalingam Ramkumar (Mississippi State University, USA)
|
|
CLOSE
|
|
10:30–12:00
NS-05: Key Management
NS05.1.
|
Simulation Based Performance Evaluation of a User-Centric Group Rekeying Protocol
Melek Önen (Institut EURECOM, France); Jussi Kyrohonka (Institut Eurecom, France)
|
NS05.2.
|
The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks
Yong Wang (University of Nebraska-Lincoln, USA); Byrav Ramamurthy (University of Nebraska-Lincoln, USA); Xukai Zou (Purdue University-Indianapolis, USA)
|
NS05.3.
|
A Robust, Distributed TGDH-based Scheme for Secure Group Communications in MANETs
Maria Striki (University of Maryland, USA); Kyriakos Manousakis (Telcordia Technologies, USA); John S. Baras (University of Maryland, USA)
|
NS05.4.
|
Communication-Efficient Key Establishment in Wireless Sensor Networks
Patrick Tague (University of Washington, USA); Radha Poovendran (University of Washington, USA) |
NS05.5.
|
Expander Graph Based Key Distribution Mechanisms in Wireless Sensor Networks
Ahmet Camtepe (Rensselaer Polytechnic Institute, USA); Bulent Yener (Rensselaer Polytechnic Institute, USA); Moti Yung (CertCo Inc, USA)
|
|
CLOSE
|
|
14:00–15:30
NS-06: Information Assurance/Trust Management
NS06.1.
|
Preventing Secret Leakage from fork(): Securing Privilege-Separated Applications
Umesh Shankar (University of California, Berkeley, USA); David Wagner (University of California, Berkeley, USA)
|
NS06.2.
|
Dynamic Merkle Trees for Verifying Privileges in Sensor Networks
Li Zhou (University of California, Riverside, USA); Chinya Ravishankar (University of California, Riverside, USA)
|
NS06.3.
|
Network Security in Enterprise Services Architectures
Matthias Anlauff (Kestrel Institute, USA); Asuman Suenbuel (SAP Research Labs, USA)
|
NS06.4.
|
Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks
Einar Mykletun (University of California, Irvine, USA); Joao Girao (NEC Europe Ltd., Germany); Dirk Westhoff (NEC Europe Ltd., Germany)
|
NS06.5.
|
Detecting Masquerading Users in a Document Management System
Vidyaraman Sankaranarayanan (University at Buffalo, USA); Suranjan Pramanik (University at Buffalo, USA); Shambhu Upadhyaya (University at Buffalo, USA)
|
|
CLOSE
|
|
16:00–17:30
NS-07: Network Routing, Traffic Flow and Security
NS07.1.
|
A Generic Anonymization Framework for Network Traffic
Dimitris Koukis (ICS/FORTH, Greece); Spiros Antonatos (ICS/FORTH, Greece); Demetres Anoniades (ICS/FORTH, Greece); Panos Trimintzios (ICS/FORTH, Greece); Evangelos Markatos (ICS/FORTH, Greece)
|
NS07.2.
|
A New Cryptographic Scheme for Securing Dynamic Conferences in Data Networks
Sarang Deshpande (University of Nebraska-Lincoln, USA); Ajay Todimala (University of Nebraska, USA); Ravi Balachandran (University of Nebraska-Lincoln, USA); Byrav Ramamurthy (University of Nebraska-Lincoln, USA); Xukai Zou (Purdue University-Indianapolis, USA); Vinodchandran Variyam (University of Nebraska-Lincoln, USA)
|
NS07.3.
|
On the Impact of Low-Rate Attacks
Mina Guirguis (Boston University, USA); Azer Bestavros (Boston University, USA); Ibrahim Matta (Boston University, USA)
|
NS07.4.
|
Data Security in MANETs Using Multipath Routing and Directional Transmission
Vladimir Berman (University of California, Davis, USA); Biswanath Mukherjee (University of California, Davis, USA)
|
NS07.5.
|
A Passive Approach to Wireless NIC Identification
Cherita Corbett (Georgia Institute of Technology, USA); Raheem Beyah (Georgia State University, USA); John Copeland (Georgia Institute of Technology, USA)
|
|
CLOSE
|
|
|
Wednesday, 14 June 2006
8:30–10:00
NS-08: Architectures, Applications and Security
NS08.1.
|
Applications of Pairings in GRID Security
Amitabh Saxena (La Trobe University, Australia)
|
NS08.2.
|
Break and Improve the New Proxy Blind Signature Scheme Using Verifiable Self-Certified Public Key
Zhian Cheng (Beijing Jiaotong University,P.R. China)
|
NS08.3.
|
DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning Attacks
Lihua Yuan (University of California, Davis, USA); Krishna Kant (Intel Corporation, USA); Prasant Mohapatra (University of California, Davis, USA); Chen-Nee Chuah (University of California, Davis, USA)
|
NS08.4.
|
A Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions
Jiejun Kong (University of California at Los Angeles, USA); Ling-Jyh Chen (Academia Sinica, Taiwan); Markus Jakobsson (Indiana University, USA); Stanley Moyer (Telcordia Technologies, USA); Dave Marples (Telcordia Technologies, USA); Mario Gerla (University of California at Los Angeles, USA)
|
NS08.5.
|
A Scalable and Intrusion-Tolerant Digital Time-Stamping System
Daniela Tulone (University of Pisa, Italy)
|
|
CLOSE
|
|
|
|
|