Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Edmond W. W. Chan is active.

Publication


Featured researches published by Edmond W. W. Chan.


Proceedings of the 3rd Multimedia Systems Conference on | 2012

QDASH: a QoE-aware DASH system

Ricky K. P. Mok; Xiapu Luo; Edmond W. W. Chan; Rocky K. C. Chang

Dynamic Adaptation Streaming over HTTP (DASH) enhances the Quality of Experience (QoE) for users by automatically switching quality levels according to network conditions. Various adaptation schemes have been proposed to select the most suitable quality level during video playback. Adaptation schemes are currently based on the measured TCP throughput received by the video player. Although video buffer can mitigate throughput fluctuations, it does not take into account the effect of the transition of quality levels on the QoE. In this paper, we propose a QoE-aware DASH system (or QDASH) to improve the user-perceived quality of video watching. We integrate available bandwidth measurement into the video data probes with a measurement proxy architecture. We have found that our available bandwidth measurement method facilitates the selection of video quality levels. Moreover, we assess the QoE of the quality transitions by carrying out subjective experiments. Our results show that users prefer a gradual quality change between the best and worst quality levels, instead of an abrupt switching. Hence, we propose a QoE-aware quality adaptation algorithm for DASH based on our findings. Finally, we integrate both network measurement and the QoE-aware quality adaptation into a comprehensive DASH system.


acm special interest group on data communication | 2011

Inferring the QoE of HTTP video streaming from user-viewing activities

Ricky K. P. Mok; Edmond W. W. Chan; Xiapu Luo; Rocky K. C. Chang

HTTP video streaming, employed by most of the video-sharing websites, allows users to control the video playback using, for example, pausing and switching the bit rate. These user-viewing activities can be used to mitigate the temporal structure impairments of the video quality. On the other hand, other activities, such as mouse movement, do not help reduce the impairment level. In this paper, we have performed subjective experiments to analyze user-viewing activities and correlate them with network path performance and user quality of experience. The results show that network measurement alone may miss important information about user dissatisfaction with the video quality. Moreover, video impairments can trigger user-viewing activities, notably pausing and reducing the screen size. By including the pause events into the prediction model, we can increase its explanatory power.


dependable systems and networks | 2008

TCP covert timing channels: Design and detection

Xiapu Luo; Edmond W. W. Chan; Rocky K. C. Chang

Exploiting packetspsila timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them embed covert information in the inter-packet delay. These channels, however, can be detected based on the perturbed traffic pattern, and their decoding accuracy could be degraded by jitter, packet loss and packet reordering events. In this paper, we propose a novel TCP-based timing channel, named TCPScript to address these shortcomings. TCPScript embeds messages in ldquonormalrdquo TCP data bursts and exploits TCPpsilas feedback and reliability service to increase the decoding accuracy. Our theoretical capacity analysis and extensive experiments have shown that TCPScript offers much higher channel capacity and decoding accuracy than an IP timing channel and JitterBug. On the countermeasure, we have proposed three new metrics to detect aggressive TCPScript channels.


network operations and management symposium | 2006

Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks

Xiapu Luo; Edmond W. W. Chan; Rocky K. C. Chang

A few low-rate, TCP-targeted denial-of-service (DoS) attacks have been recently proposed, including the shrew attack, reduction of quality (RoQ) attack, and pulsing DoS (PDoS) attack. All of them use periodic attack pulses to throttle TCP flows. These attacks could potentially become major threats to the Internets stability and therefore they have motivated the development of a number of detection mechanisms for such attacks. However, those detection mechanisms are designed for specific attacks. Moreover, they assume that the period of the attack pulses is a nonzero constant. Unfortunately, these assumptions can be easily thwarted by more sophisticated attack strategies. In this paper, we propose a new detection system called Vanguard to identify a wide range of the aforementioned low-rate, DoS attacks, including the traditional flooding-based attacks as a special case. Vanguard can also detect attacks with randomized attack periods. We have validated Vanguards efficacy based on extensive test-bed experiments. We have also compared Vanguard with other recently proposed detection systems


european symposium on research in computer security | 2007

Cloak: a ten-fold way for reliable covert communications

Xiapu Luo; Edmond W. W. Chan; Rocky K. C. Chang

In this paper, we propose Cloak--a new class of reliable timing channels--which is fundamentally different from other timing channels in several aspects. First, Cloak encodes a message by a unique distribution of N packets over X TCP flows. The combinatorial nature of the encoding methods increases the channel capacity largely with (N,X). Second, Cloak offers ten different encoding and decoding methods, each of which has a unique tradeoff among several important considerations, such as channel capacity and the need for packet marking. Third, the packet transmissions modulated by Cloak could be carefully crafted to mimic the normal TCP flows in a typical TCP-based application session. Although Cloaks basic idea is simple, we show in this paper how we tackle a number of challenging issues systematically. Our experiment results collected from PlanetLab nodes and a test bed suggest that Cloak is feasible under various network conditions and different round-trip delays.


EURASIP Journal on Advances in Signal Processing | 2009

Detecting pulsing denial-of-service attacks with nondeterministic attack intervals

Xiapu Luo; Edmond W. W. Chan; Rocky K. C. Chang

This paper addresses the important problem of detecting pulsing denial of service (PDoS) attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval). Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation) and detection algorithms (e.g., dynamic time warping).


modeling, analysis, and simulation on computer and telecommunication systems | 2005

Performance analysis of TCP/AQM under denial-of-service attacks

Xiapu Luo; Rocky K. C. Chang; Edmond W. W. Chan

The interaction between TCP and various active queue management (AQM) algorithms has been extensively analyzed for the last few years. However, the analysis usually assumed that routers and TCP flows are not under any network attacks. In this paper, we investigate how the performance of TCP flows is affected by denial-of-service (DoS) attacks under the drop tail and various AQM schemes. In particular, we consider two types of DoS attacks-the traditional flooding-based DoS (FDDoS) attacks and the recently proposed pulsing DoS (PDoS) attacks. Both analytical and simulation results support that the PDoS attacks are more effective than the FDDoS attacks under the same average attack rate. Moreover, the drop tail surprisingly outperforms the RED-like AQMs when the router is under a PDoS attack, whereas the RED-like AQMs perform better under a severe FDDoS attack. On the other hand, the Adaptive Virtual Queue algorithm can retain a higher TCP throughput during PDoS attacks as compared with the RED-like AQMs.


IEEE Transactions on Dependable and Secure Computing | 2012

Robust Network Covert Communications Based on TCP and Enumerative Combinatorics

Xiapu Luo; Edmond W. W. Chan; Peng Zhou; Rocky K. C. Chang

The problem of communicating covertly over the Internet has recently received considerable attention from both industry and academic communities. However, the previously proposed network covert channels are plagued by their unreliability and very low data rate. In this paper, we show through a new class of timing channels coined as Cloak that it is possible to devise a 100 percent reliable covert channel and yet offer a much higher data rate (up to an order of magnitude) than the existing timing channels. Cloak is novel in several aspects. First, Cloak uses the different combinations of N packets sent over X flows in each round to represent a message. The combinatorial nature of the encoding methods increases the channel capacity largely with (N,X). Second, based on the well-known 12-fold Way, Cloak offers 10 different encoding and decoding methods, each of which has a unique tradeoff among several important considerations, such as channel capacity and camouflage capability. Third, the packet transmissions modulated by Cloak can be carefully crafted to mimic normal TCP flows for evading detection. We have implemented Cloak and evaluated it in the PlanetLab and a controlled testbed. The results show that it is not uncommon for Cloak to have an order of channel goodput improvement over the IP Timing channel and JitterBug. Moreover, Cloak does not suffer from any message loss under various loss and reordering scenarios.


international conference on communications | 2009

CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding

Xiapu Luo; Edmond W. W. Chan; Rocky K. C. Chang

The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security concern. A number of recent studies have indeed shown that setting up such covert channels is possible by exploiting the protocol fields in the IP, TCP, or application layer. However, the quality of these covert channels is susceptible to unpredictable network condition and active wardens. In this paper, we propose CLACK, a new covert channel which encodes covert messages into the TCP acknowledgments (ACKs). Since the message encoding is performed in a TCP data channel, CLACK is reliable and resilience to adverse network conditions. Moreover, CLACK is very difficult to detect in practice, because the TCK ACKs encoded by CLACK cannot be easily distinguished from the normal ACKs. We have implemented and tested CLACK in a test-bed to validate its correctness.


passive and active network measurement | 2011

Non-cooperative diagnosis of submarine cable faults

Edmond W. W. Chan; Xiapu Luo; Waiting W. T. Fok; Weichao Li; Rocky K. C. Chang

Submarine cable faults are not uncommon events in the Internet today. However, their impacts on end-to-end path quality have received almost no attention. In this paper, we report path-quality measurement results for a recent SEA-ME-WE 4 cable fault in 2010. Our measurement methodology captures the path-quality degradation due to the cable fault, in terms of delay, asymmetric packet losses, and correlation between loss and delay. We further leverage traceroute data to infer the root causes of the performance degradation.

Collaboration


Dive into the Edmond W. W. Chan's collaboration.

Top Co-Authors

Avatar

Xiapu Luo

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Rocky K. C. Chang

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Waiting W. T. Fok

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Weichao Li

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Lei Xue

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Ricky K. P. Mok

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Ang Chen

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Peng Zhou

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Wenke Lee

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Chenxiong Qian

Hong Kong Polytechnic University

View shared research outputs
Researchain Logo
Decentralizing Knowledge