Author Search Result

[Author] Jun BI(4hit)

1-4hit
  • A Trust Ranking Method to Prevent IM Spam

    Jun BI  

     
    PAPER-Internet Security

      Vol:
    E92-D No:5
      Page(s):
    937-944

    The problem of IM (Instant Messaging) SPAM, also known as SPIM, has become a challenge in recent years. The current anti-SPAM methods are not quite suitable for SPIM because of the differences in system infrastructures and characteristics between IM and email service. In order to effectively eliminate SPIM, we propose a trust ranking method in this paper. The mechanism to build up reputation network, global reputation and local trust ranking algorithms, reputation management, and SPIM filtering methods are presented. The experiments under five treat modes and algorithms enhancement are also introduced. The experiment shows that the proposed method is resilient to deal with SPIM attacks under several threat models.

  • CRRP: Cost-Based Replacement with Random Placement for En-Route Caching

    Sen WANG  Jun BI  Jianping WU  

     
    LETTER-Information Network

      Vol:
    E97-D No:7
      Page(s):
    1914-1917

    Caching is considered widely as an efficient way to reduce access latency and network bandwidth consumption. En-route caching, where caches are associated with routing nodes in the network, is proposed in the context of Web cache to exploit fully the potential of caching. To make sensible replacement and placement decision for en-route caching, traditional caching schemes either engage computation-intensive algorithm like dynamic programming or suffer from inferior performance in terms of average access latency. In this article, we propose a new caching scheme with cost-based replacement and random placement, which is named CRRP. The cost-based replacement of CRRP introduces probing request to timely perceive cost change and the random placement is independent of current caching state, of O(1) computational complexity of placement decision. Through extensive simulations, we show that CRRP outperforms a wide range of caching schemes and is very close to the traditional dynamic-programming-based algorithm, in terms of average access delay.

  • Modeling and Testing of Network Protocols with Parallel State Machines

    Xia YIN  Jiangyuan YAO  Zhiliang WANG  Xingang SHI  Jun BI  Jianping WU  

     
    PAPER-Network

      Pubricized:
    2015/09/15
      Vol:
    E98-D No:12
      Page(s):
    2091-2104

    The researches on model-based testing mainly focus on the models with single component, such as FSM and EFSM. For the network protocols which have multiple components communicating with messages, CFSM is a widely accepted solution. But in some network protocols, parallel and data-shared components maybe exist in the same network entity. It is infeasible to precisely specify such protocol by existing models. In this paper we present a new model, Parallel Parameterized Extended Finite State Machine (PaP-EFSM). A protocol system can be modeled with a group of PaP-EFSMs. The PaP-EFSMs work in parallel and they can read external variables form each other. We present a 2-stage test generation approach for our new models. Firstly, we generate test sequences for internal variables of each machine. They may be non-executable due to external variables. Secondly, we process the external variables. We make the sequences for internal variables executable and generate more test sequences for external variables. For validation, we apply this method to the conformance testing of real-life protocols. The devices from different vendors are tested and implementation faults are exposed.

  • Revisiting the Rich Club of the Internet AS-Level Topology

    Yangyang WANG  Jun BI  Jianping WU  

     
    LETTER-Network

      Vol:
    E96-B No:3
      Page(s):
    900-904

    We evaluate the rich-club property of the Internet topology at the autonomous system (AS) level by comparing the Internet AS graphs of traceroute and BGP, and the synthetic graphs of PFP model. The results indicate that, for rich-club coefficient, PFP model can exactly match traceroute AS graphs in the early years around 2002, but it has significantly deviated from the grown AS graphs since about 2010.

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.