A use case of Content Delivery Network raw logfile analysis
Authors:
Hoang-Loc La,
Anh-Tu Ngoc Tran,
Quang-Trai Le,
Masato Yoshimi,
Takuma Nakajima,
Nam Thoai
Abstract:
The growth of video streaming has stretched the Internet to its limitation. In other words, the Internet was originally devised to connect a limited number of computers so that they can share network resources, so the Internet cannot handle a large amount of traffic at a time, which leads to network congestion. To overcome this, CDNs are built on top of the Internet as an overlay to efficiently st…
▽ More
The growth of video streaming has stretched the Internet to its limitation. In other words, the Internet was originally devised to connect a limited number of computers so that they can share network resources, so the Internet cannot handle a large amount of traffic at a time, which leads to network congestion. To overcome this, CDNs are built on top of the Internet as an overlay to efficiently store and swiftly disseminate contents to users by placing many servers and data centers around the globe. The topic of CDNs has been extensively studied in the last several decades. However, there is still a certain gap between theories in academia and current technologies in industry. In this paper, we take a close look at the design, implementation, solution, and performance of a CDN system by analyzing its raw log files. Specifically, its infrastructure and system design are first presented, and then we conduct a trace-based study to understand user access patterns, the sources of requests, system performance, and how such information can be used to improve the whole CDN system.
△ Less
Submitted 17 June, 2021; v1 submitted 12 June, 2021;
originally announced June 2021.
Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems
Authors:
Hoon Wei Lim,
William G. Temple,
Bao Anh N. Tran,
Binbin Chen,
Zbigniew Kalbarczyk,
Jianying Zhou
Abstract:
Modern trains rely on balises (communication beacons) located on the track to provide location information as they traverse a rail network. Balises, such as those conforming to the Eurobalise standard, were not designed with security in mind and are thus vulnerable to cyber attacks targeting data availability, integrity, or authenticity. In this work, we discuss data integrity threats to balise tr…
▽ More
Modern trains rely on balises (communication beacons) located on the track to provide location information as they traverse a rail network. Balises, such as those conforming to the Eurobalise standard, were not designed with security in mind and are thus vulnerable to cyber attacks targeting data availability, integrity, or authenticity. In this work, we discuss data integrity threats to balise transmission modules and use high-fidelity simulation to study the risks posed by data integrity attacks. To mitigate such risk, we propose a practical two-layer solution: at the device level, we design a lightweight and low-cost cryptographic solution to protect the integrity of the location information; at the system layer, we devise a secure hybrid train speed controller to mitigate the impact under various attacks. Our simulation results demonstrate the effectiveness of our proposed solutions.
△ Less
Submitted 18 September, 2017;
originally announced September 2017.