首页 > 最新文献

Proceedings of the 3rd International Conference on Networking, Information Systems & Security最新文献

英文 中文
Big Data Solutions Proposed for Cluster Computing Systems Challenges: A survey 针对集群计算系统挑战提出的大数据解决方案:调查
Fatima Es-Sabery, Abdellatif Hair
CCS (Cluster Computing System) is coming to solve the problems of standard technology. Whose, objective is to improve the performance/power efficiency of a single processor for storing and mining the large data sets, using the parallel programming to read and process the massive data sets on multiple disks and CPUs. The thing which makes these systems somewhat performant than the standard technology is the physical organization of computing nodes in the cluster. Currently, this kind of cluster does not entirely solve the problem because it comes with its challenges, which are Node failures, Computations, Network Bottleneck, and Distributed programming. All these problems are coming when we are mining and storing the massive volume of data using cluster computing. To solve these challenges, Google invented a new Big Data framework of data processing called MapReduce, to manage large scale data processing across large clusters of commodity servers. The paper outlines the running of CCS and presents its challenges in this era of Big Data. Moreover, it introduces the most popular Big Data solutions proposed to overcome the CCS challenges. Also, it shows how Big Data technologies solve CCS issues. Generally, the main goal of this work is to provide a better understanding of the challenges of CCS and identify the essential big data solutions in this increasingly important area.
集群计算系统(CCS)的出现是为了解决标准技术的问题。其目标是提高单个处理器存储和挖掘大型数据集的性能/功率效率,使用并行编程在多个磁盘和cpu上读取和处理大量数据集。使这些系统比标准技术性能更好的是集群中计算节点的物理组织。目前,这种类型的集群并不能完全解决这个问题,因为它带来了一些挑战,包括节点故障、计算、网络瓶颈和分布式编程。当我们使用集群计算挖掘和存储海量数据时,所有这些问题都会出现。为了解决这些挑战,谷歌发明了一种新的数据处理大数据框架MapReduce,用于管理大型商品服务器集群的大规模数据处理。本文概述了CCS的运行,并提出了其在大数据时代面临的挑战。此外,它还介绍了为克服CCS挑战而提出的最流行的大数据解决方案。此外,它还展示了大数据技术如何解决CCS问题。总的来说,这项工作的主要目标是更好地理解CCS的挑战,并在这个日益重要的领域确定基本的大数据解决方案。
{"title":"Big Data Solutions Proposed for Cluster Computing Systems Challenges: A survey","authors":"Fatima Es-Sabery, Abdellatif Hair","doi":"10.1145/3386723.3387826","DOIUrl":"https://doi.org/10.1145/3386723.3387826","url":null,"abstract":"CCS (Cluster Computing System) is coming to solve the problems of standard technology. Whose, objective is to improve the performance/power efficiency of a single processor for storing and mining the large data sets, using the parallel programming to read and process the massive data sets on multiple disks and CPUs. The thing which makes these systems somewhat performant than the standard technology is the physical organization of computing nodes in the cluster. Currently, this kind of cluster does not entirely solve the problem because it comes with its challenges, which are Node failures, Computations, Network Bottleneck, and Distributed programming. All these problems are coming when we are mining and storing the massive volume of data using cluster computing. To solve these challenges, Google invented a new Big Data framework of data processing called MapReduce, to manage large scale data processing across large clusters of commodity servers. The paper outlines the running of CCS and presents its challenges in this era of Big Data. Moreover, it introduces the most popular Big Data solutions proposed to overcome the CCS challenges. Also, it shows how Big Data technologies solve CCS issues. Generally, the main goal of this work is to provide a better understanding of the challenges of CCS and identify the essential big data solutions in this increasingly important area.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127412068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular Cylinders 自然对流在不同的加热腔与加热和冷却圆柱
L. E. Moutaouakil, M. Boukendil, Z. Zrikem, A. Abdelbaki
In this paper, the LBM method is used to simulate the natural convective flow and thermal behaviors of air inside a differentially heated cavity containing two inner circular cylinders maintained at different temperatures. Several configurations namely Bh -- TC, BB -- Th, Mh -- MC and MC -- Mh corresponding to different possible arrangements of the two cylinders inside the cavity were analyzed. The results are presented in the form of streamlines and isotherms for a selected range of the Rayleigh number Ra (103-106). The obtained results show that the arrangement of the cylinders inside the cavity considerably affects the flow structure in the cavity.
本文采用LBM方法模拟了两个内圆柱体保持不同温度的差热腔内空气的自然对流流动和热行为。分析了两圆柱体在腔内不同排列方式的几种构型,即Bh—TC、BB—Th、Mh—MC和MC—Mh。结果以流线和等温线的形式呈现在瑞利数Ra(103-106)的选定范围内。研究结果表明,腔内圆柱的布置对腔内流动结构有较大影响。
{"title":"Natural Convection in a Differentially Heated Cavity with a Heated and Cooled Circular Cylinders","authors":"L. E. Moutaouakil, M. Boukendil, Z. Zrikem, A. Abdelbaki","doi":"10.1145/3386723.3387885","DOIUrl":"https://doi.org/10.1145/3386723.3387885","url":null,"abstract":"In this paper, the LBM method is used to simulate the natural convective flow and thermal behaviors of air inside a differentially heated cavity containing two inner circular cylinders maintained at different temperatures. Several configurations namely Bh -- TC, BB -- Th, Mh -- MC and MC -- Mh corresponding to different possible arrangements of the two cylinders inside the cavity were analyzed. The results are presented in the form of streamlines and isotherms for a selected range of the Rayleigh number Ra (103-106). The obtained results show that the arrangement of the cylinders inside the cavity considerably affects the flow structure in the cavity.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Information Retrieval Approach for Copyright Protection 版权保护的分布式信息检索方法
Sonia Benbelgacem, L. Guezouli, Rachid Seghir
Developments in telecommunications technology has opened up the possibility of circumventing intellectual property in the digital world, outside the legal and technical methods proposed for copyright protection, the information retrieval is considered as a computer field helping to protect these rights by proposing methods of search, analysis and comparison for protected documents. This article proposes an approach based on the distributed information retrieval allowing the detection of any unlawful manipulation for copyrighted works. In particular, we propose an architecture of a distributed information retrieval system on a peer-to-peer network as well as the specific architecture of its nodes, in addition, a double indexation (local & distributed) was proposed.
电讯技术的发展为在数字世界中规避知识产权提供了可能性。除了为保护版权而提出的法律和技术方法外,信息检索被认为是一个计算机领域,通过提出对受保护文件进行搜索、分析和比较的方法来帮助保护这些权利。本文提出了一种基于分布式信息检索的方法,允许对版权作品的非法操作进行检测。特别地,我们提出了一种基于点对点网络的分布式信息检索系统的体系结构及其节点的具体体系结构,并提出了双索引(本地和分布式)。
{"title":"A Distributed Information Retrieval Approach for Copyright Protection","authors":"Sonia Benbelgacem, L. Guezouli, Rachid Seghir","doi":"10.1145/3386723.3387882","DOIUrl":"https://doi.org/10.1145/3386723.3387882","url":null,"abstract":"Developments in telecommunications technology has opened up the possibility of circumventing intellectual property in the digital world, outside the legal and technical methods proposed for copyright protection, the information retrieval is considered as a computer field helping to protect these rights by proposing methods of search, analysis and comparison for protected documents. This article proposes an approach based on the distributed information retrieval allowing the detection of any unlawful manipulation for copyrighted works. In particular, we propose an architecture of a distributed information retrieval system on a peer-to-peer network as well as the specific architecture of its nodes, in addition, a double indexation (local & distributed) was proposed.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131060648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ankle gait-pattern generators 脚踝步态模式生成器
Mohamed Amine Mamou, N. Saadia
Different lower limbs robotic rehabilitation devices are under study to help patients to recover gestures altered, affected or lost after traffic accident injury, illness or disability. Especially ankle because is a complex part of the human skeleton. In this paper we present our contribution to the ankle foot robotic device. We will present our strategy to generate the setpoint trajectory for ankle devices that is based on neural networks. The latter will generate the trajectory of the ankle from the angular position sensors of the hip joint and the knee joint. This gave good results, but we noticed during the tests that the ankle trajectory contained sporadic peaks. This was the case of the right and left ankle. An optimization algorithm is developed to eliminate this phenomenon; it will be presented soon.
不同的下肢机器人康复设备正在研究中,以帮助患者恢复因交通事故受伤、疾病或残疾而改变、影响或失去的手势。尤其是脚踝,因为它是人体骨骼的一个复杂部分。在本文中,我们介绍了我们对踝关节足机器人装置的贡献。我们将介绍基于神经网络的策略来生成脚踝装置的设定点轨迹。后者将从髋关节和膝关节的角度位置传感器生成踝关节的运动轨迹。这是一个很好的结果,但是我们注意到在测试中脚踝的轨迹有零星的峰值。这是左右脚踝的情况。为了消除这种现象,提出了一种优化算法;它将很快呈现。
{"title":"Ankle gait-pattern generators","authors":"Mohamed Amine Mamou, N. Saadia","doi":"10.1145/3386723.3387833","DOIUrl":"https://doi.org/10.1145/3386723.3387833","url":null,"abstract":"Different lower limbs robotic rehabilitation devices are under study to help patients to recover gestures altered, affected or lost after traffic accident injury, illness or disability. Especially ankle because is a complex part of the human skeleton. In this paper we present our contribution to the ankle foot robotic device. We will present our strategy to generate the setpoint trajectory for ankle devices that is based on neural networks. The latter will generate the trajectory of the ankle from the angular position sensors of the hip joint and the knee joint. This gave good results, but we noticed during the tests that the ankle trajectory contained sporadic peaks. This was the case of the right and left ankle. An optimization algorithm is developed to eliminate this phenomenon; it will be presented soon.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review 推荐系统在医学领域应用的最新趋势:系统综述
O. Stitini, S. Kaloun, O. Bencharef
Recommender systems use algorithms to provide users with product or service recommendations. In recent times, these systems have been using Artificial Intelligence algorithms. However, choosing a suitable AI algorithm for a recommender system is difficult because of the number of algorithms described in the literature. Researchers and practitioners developing recommender systems are left with little information about the current approaches in algorithm usage. Moreover, the development of recommender systems using AI algorithms often faces problems and raises questions that must be resolved. In this context developing recommender system in the medical domain are presented as complementary tools in decision-making processes in healthcare services, it allows to increase the usability of technologies and reduce information overload in processes. This paper presents a systematic review of the literature that analyze the use of AI algorithms in recommender system and identify new research opportunities. The goals of this study are to (i) identify latest trends in the use or research of AI algorithms in recommender system applied in the medical domain;(ii)identify open questions in the use or research of AI algorithms, and (iii)assist new researchers to position new research activity in this domain appropriately.
推荐系统使用算法向用户提供产品或服务推荐。最近,这些系统一直在使用人工智能算法。然而,由于文献中描述的算法数量众多,为推荐系统选择合适的AI算法是困难的。开发推荐系统的研究人员和实践者对算法使用的当前方法知之甚少。此外,使用人工智能算法开发推荐系统经常会遇到问题,并提出必须解决的问题。在这种情况下,在医疗领域开发推荐系统作为辅助工具,在医疗保健服务的决策过程中,它允许增加技术的可用性,并减少过程中的信息过载。本文对文献进行了系统回顾,分析了人工智能算法在推荐系统中的使用,并确定了新的研究机会。本研究的目标是(i)确定AI算法在医疗领域推荐系统中使用或研究的最新趋势;(ii)确定AI算法使用或研究中的开放性问题;(iii)协助新研究人员在该领域适当定位新的研究活动。
{"title":"Latest Trends in Recommender Systems applied in the medical domain: A Systematic Review","authors":"O. Stitini, S. Kaloun, O. Bencharef","doi":"10.1145/3386723.3387860","DOIUrl":"https://doi.org/10.1145/3386723.3387860","url":null,"abstract":"Recommender systems use algorithms to provide users with product or service recommendations. In recent times, these systems have been using Artificial Intelligence algorithms. However, choosing a suitable AI algorithm for a recommender system is difficult because of the number of algorithms described in the literature. Researchers and practitioners developing recommender systems are left with little information about the current approaches in algorithm usage. Moreover, the development of recommender systems using AI algorithms often faces problems and raises questions that must be resolved. In this context developing recommender system in the medical domain are presented as complementary tools in decision-making processes in healthcare services, it allows to increase the usability of technologies and reduce information overload in processes. This paper presents a systematic review of the literature that analyze the use of AI algorithms in recommender system and identify new research opportunities. The goals of this study are to (i) identify latest trends in the use or research of AI algorithms in recommender system applied in the medical domain;(ii)identify open questions in the use or research of AI algorithms, and (iii)assist new researchers to position new research activity in this domain appropriately.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"19 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120813752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sampling techniques for Arabic Sentiment Classification: A Comparative Study 阿拉伯语情感分类的抽样技术:比较研究
H. A. Addi, R. Ezzahir
Over the last decade, the web 2.0 has been shifting the web to turn it into an opinion platform. This results in a large amount of raw data that overwhelms human capacity to extract valuable knowledge without assistance of machines. In real world applications, sentiment analysis faces imbalanced data problem. To tackle this problem, sampling techniques have been proposed. In this paper, we focus on studying the performance of these techniques on Imbalanced Data of Arabic Sentiment. We then conduct a comparative evaluation using Support Vector Machine (SVM), Naive Bayes (NB), and Random Forest (RF) as classification algorithms.
在过去的十年里,web2.0已经把网络变成了一个意见平台。这导致了大量的原始数据,超出了人类在没有机器帮助的情况下提取有价值知识的能力。在实际应用中,情感分析面临着数据不平衡的问题。为了解决这个问题,人们提出了采样技术。在本文中,我们重点研究了这些技术在阿拉伯语情绪不平衡数据上的表现。然后,我们使用支持向量机(SVM)、朴素贝叶斯(NB)和随机森林(RF)作为分类算法进行比较评估。
{"title":"Sampling techniques for Arabic Sentiment Classification: A Comparative Study","authors":"H. A. Addi, R. Ezzahir","doi":"10.1145/3386723.3387899","DOIUrl":"https://doi.org/10.1145/3386723.3387899","url":null,"abstract":"Over the last decade, the web 2.0 has been shifting the web to turn it into an opinion platform. This results in a large amount of raw data that overwhelms human capacity to extract valuable knowledge without assistance of machines. In real world applications, sentiment analysis faces imbalanced data problem. To tackle this problem, sampling techniques have been proposed. In this paper, we focus on studying the performance of these techniques on Imbalanced Data of Arabic Sentiment. We then conduct a comparative evaluation using Support Vector Machine (SVM), Naive Bayes (NB), and Random Forest (RF) as classification algorithms.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116145267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Approach of Constructing an Islamic Pattern Respecting the "HASBA" Method 尊重“HASBA”方法构建伊斯兰模式的途径
Ait Lahcen Yassine, Jali Abdelaziz, El Oirrak Ahmed
In this article, we put forth an approach to build a geometric Islamic pattern, according to a method called Hasba. This kind of geometric pattern is generally found in Moroccan geometric art, adopted by artisans; it is rather suitable for sculpture and painting on wood. It is based on geometric rules and the concept of symmetry. Here we describe step by step the basic approach to create a new model respecting certain rules of the "Hasba" method.
在本文中,我们提出了一种建立几何伊斯兰图案的方法,这种方法被称为Hasba。这种几何图案一般见于摩洛哥几何艺术中,为工匠所采用;它非常适合在木头上雕刻和绘画。它是基于几何规则和对称的概念。在这里,我们一步一步地描述创建一个尊重“Hasba”方法的某些规则的新模型的基本方法。
{"title":"Approach of Constructing an Islamic Pattern Respecting the \"HASBA\" Method","authors":"Ait Lahcen Yassine, Jali Abdelaziz, El Oirrak Ahmed","doi":"10.1145/3386723.3387872","DOIUrl":"https://doi.org/10.1145/3386723.3387872","url":null,"abstract":"In this article, we put forth an approach to build a geometric Islamic pattern, according to a method called Hasba. This kind of geometric pattern is generally found in Moroccan geometric art, adopted by artisans; it is rather suitable for sculpture and painting on wood. It is based on geometric rules and the concept of symmetry. Here we describe step by step the basic approach to create a new model respecting certain rules of the \"Hasba\" method.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126483886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity 用于智能医疗数据分析的雾计算:迫切需要
Hayat Khaloufi, Karim Abouelmehdi, A. B. Hssane
The advent of Internet of Things (IoT) technologies in the 21st century has led to exciting achievements. IoT smart medical devices along with wearables are generating and communicating high volume and high-velocity of heterogeneous data. Consequently, services provided by traditional methods such as cloud computing to manage these data become insufficient. Fog computing is seen as being the most effective solution for IoT-based healthcare. The stringy demand of this model was principally driven by a growing need for real-time analysis and low latency. It is apparently envisioned that the medicine field expects to draw enormous interest in combining IoT and fog computing. This in turn, improved the patient treatment, staff satisfaction, and operational efficiency and showed positive influence on all aspects of healthcare. This paper has reviewed fog computing in the context of medical IoT while comparing it with cloud computing and has attempted to present the three-layer architecture of fog-based healthcare system containing: edge, fog and cloud. It has also highlighted challenges facing IoT-driven healthcare in an ever-changing world.
21世纪物联网(IoT)技术的出现带来了令人兴奋的成就。物联网智能医疗设备和可穿戴设备正在产生和传输大量、高速的异构数据。因此,通过云计算等传统方法提供的管理这些数据的服务变得不足。雾计算被认为是基于物联网的医疗保健最有效的解决方案。该模型的需求主要是由对实时分析和低延迟的日益增长的需求所驱动的。显然,预计医疗领域将对物联网和雾计算的结合产生巨大的兴趣。这反过来又改善了患者治疗、员工满意度和运营效率,并对医疗保健的各个方面产生了积极影响。本文回顾了医疗物联网背景下的雾计算,并将其与云计算进行了比较,尝试提出了基于雾的医疗保健系统的三层架构:边缘、雾和云。它还强调了在不断变化的世界中物联网驱动的医疗保健面临的挑战。
{"title":"Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity","authors":"Hayat Khaloufi, Karim Abouelmehdi, A. B. Hssane","doi":"10.1145/3386723.3387861","DOIUrl":"https://doi.org/10.1145/3386723.3387861","url":null,"abstract":"The advent of Internet of Things (IoT) technologies in the 21st century has led to exciting achievements. IoT smart medical devices along with wearables are generating and communicating high volume and high-velocity of heterogeneous data. Consequently, services provided by traditional methods such as cloud computing to manage these data become insufficient. Fog computing is seen as being the most effective solution for IoT-based healthcare. The stringy demand of this model was principally driven by a growing need for real-time analysis and low latency. It is apparently envisioned that the medicine field expects to draw enormous interest in combining IoT and fog computing. This in turn, improved the patient treatment, staff satisfaction, and operational efficiency and showed positive influence on all aspects of healthcare. This paper has reviewed fog computing in the context of medical IoT while comparing it with cloud computing and has attempted to present the three-layer architecture of fog-based healthcare system containing: edge, fog and cloud. It has also highlighted challenges facing IoT-driven healthcare in an ever-changing world.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud 通过在云中集成SSO和MFA (Multi-Factor Authentication)来加强SAML
Nickson M. Karie, V. Kebande, R. Ikuesan, Mehdi Sookhak, H. Venter
Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there has been major issues with regard to authenticating users' critical data. Single Sign on (SSO) is a user authentication technique through which a server authenticates and allows a user to use a single aspect of login credentials, for example, to access multiple services in the cloud. Even though SSO reduces the number of logins that are needed over heterogeneous environments, the risk that might be associated with the security of SSO might be detrimental if, for example, a Man-in-the Middle (MITM) attacker manages to gain control of the SSO credentials. It is also possible to get the identity of the users who have logged into Active Directory or intranet and this identity can easily be used to log into other web-based applications, and this requires the use of the Security Assertion Mark-up Language (SAML). SAML is basically a standard that allows users to be logged into applications as per their sessions. The problem that this paper addresses is the lack of a proactive technique of hardening cloud-based SAML while combining SSO with a Multi-Factor Authentication (MFA) at the time of writing this paper. The authors have, therefore, proposed an effective approach that unifies SSO with MFA in this context. Based on the base score index conducted over Common Vulnerability Scoring System (CVSS), the architecture proves to be reliable, feasible and with better performance.
尽管各种企业应用程序都采用了云范式及其相关服务,但在对用户的关键数据进行身份验证方面仍然存在一些主要问题。单点登录(SSO)是一种用户身份验证技术,服务器通过该技术对用户进行身份验证,并允许用户使用登录凭据的单个方面,例如,访问云中的多个服务。尽管SSO减少了在异构环境中所需的登录次数,但是如果中间人(MITM)攻击者设法获得对SSO凭证的控制,那么与SSO安全性相关的风险可能是有害的。还可以获得已登录到Active Directory或内部网的用户的身份,并且可以很容易地使用此身份登录到其他基于web的应用程序,这需要使用安全断言标记语言(SAML)。SAML基本上是一种允许用户根据会话登录到应用程序的标准。本文要解决的问题是,在撰写本文时,在将SSO与多因素身份验证(Multi-Factor Authentication, MFA)结合使用时,缺乏一种加强基于云的SAML的主动技术。因此,作者提出了一种有效的方法,在这种情况下将SSO与MFA结合起来。基于通用漏洞评分系统(Common Vulnerability Scoring System, CVSS)的基准评分指标,证明该体系结构可靠、可行,具有较好的性能。
{"title":"Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud","authors":"Nickson M. Karie, V. Kebande, R. Ikuesan, Mehdi Sookhak, H. Venter","doi":"10.1145/3386723.3387875","DOIUrl":"https://doi.org/10.1145/3386723.3387875","url":null,"abstract":"Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there has been major issues with regard to authenticating users' critical data. Single Sign on (SSO) is a user authentication technique through which a server authenticates and allows a user to use a single aspect of login credentials, for example, to access multiple services in the cloud. Even though SSO reduces the number of logins that are needed over heterogeneous environments, the risk that might be associated with the security of SSO might be detrimental if, for example, a Man-in-the Middle (MITM) attacker manages to gain control of the SSO credentials. It is also possible to get the identity of the users who have logged into Active Directory or intranet and this identity can easily be used to log into other web-based applications, and this requires the use of the Security Assertion Mark-up Language (SAML). SAML is basically a standard that allows users to be logged into applications as per their sessions. The problem that this paper addresses is the lack of a proactive technique of hardening cloud-based SAML while combining SSO with a Multi-Factor Authentication (MFA) at the time of writing this paper. The authors have, therefore, proposed an effective approach that unifies SSO with MFA in this context. Based on the base score index conducted over Common Vulnerability Scoring System (CVSS), the architecture proves to be reliable, feasible and with better performance.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131257449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide 快速和有效的恶意图像分类器使用减少GIST特征为新的防御指南
B. Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, B. Mohammed
Malwares attacks are becoming increasingly destructive. Hackers target all types of devices from big to the most little ones. Researcher's communities in cybersecurity field are working hard to defend malwares attacks as well as any other malicious activity. In fact, the primary goal is to defend cyberattacks as fast as possible to avoid catastrophic damages. In this paper, we proposed new cybersecurity architecture specialized in malwares attacks defense. This proposal puts together four layers based on malwares behaviors. In addition, we perform malware classifier using malware visualization technique, GIST descriptor features and K-Nearest Neighbor algorithm. The classifier is able to put each input malware image into its corresponding family. Families distribution is been divided by malwares behaviors. For the purpose of attaining speedy malwares classifier, we use Univariate Feature Selection technique to reduce GIST feature. So we succeeded in getting from 320 to only 50 features in less timing with very close accuracy of 97,67%.
恶意软件攻击的破坏性越来越大。黑客的目标是所有类型的设备,从大型设备到最小的设备。网络安全领域的研究人员社区正在努力防御恶意软件攻击以及任何其他恶意活动。事实上,首要目标是尽快防御网络攻击,以避免灾难性的损失。在本文中,我们提出了一种新的网络安全架构,专门用于防御恶意软件攻击。该建议基于恶意软件行为将四个层放在一起。此外,我们还利用恶意软件可视化技术、GIST描述符特征和k -最近邻算法进行恶意软件分类。分类器能够将每个输入的恶意软件图像放入相应的族中。家庭分布按恶意行为划分。为了获得快速的恶意分类器,我们使用单变量特征选择技术来减少GIST特征。所以我们成功地从320到50个特征在更短的时间内准确度接近97,67%。
{"title":"Speedy and efficient malwares images classifier using reduced GIST features for a new defense guide","authors":"B. Ikram, Lotfi El Aachak, Boudhir Anouar Abdelhakim, B. Mohammed","doi":"10.1145/3386723.3387839","DOIUrl":"https://doi.org/10.1145/3386723.3387839","url":null,"abstract":"Malwares attacks are becoming increasingly destructive. Hackers target all types of devices from big to the most little ones. Researcher's communities in cybersecurity field are working hard to defend malwares attacks as well as any other malicious activity. In fact, the primary goal is to defend cyberattacks as fast as possible to avoid catastrophic damages. In this paper, we proposed new cybersecurity architecture specialized in malwares attacks defense. This proposal puts together four layers based on malwares behaviors. In addition, we perform malware classifier using malware visualization technique, GIST descriptor features and K-Nearest Neighbor algorithm. The classifier is able to put each input malware image into its corresponding family. Families distribution is been divided by malwares behaviors. For the purpose of attaining speedy malwares classifier, we use Univariate Feature Selection technique to reduce GIST feature. So we succeeded in getting from 320 to only 50 features in less timing with very close accuracy of 97,67%.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 3rd International Conference on Networking, Information Systems & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1