首页 > 最新文献

Proceedings of the 3rd International Conference on Networking, Information Systems & Security最新文献

英文 中文
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud 通过在云中集成SSO和MFA (Multi-Factor Authentication)来加强SAML
Nickson M. Karie, V. Kebande, R. Ikuesan, Mehdi Sookhak, H. Venter
Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there has been major issues with regard to authenticating users' critical data. Single Sign on (SSO) is a user authentication technique through which a server authenticates and allows a user to use a single aspect of login credentials, for example, to access multiple services in the cloud. Even though SSO reduces the number of logins that are needed over heterogeneous environments, the risk that might be associated with the security of SSO might be detrimental if, for example, a Man-in-the Middle (MITM) attacker manages to gain control of the SSO credentials. It is also possible to get the identity of the users who have logged into Active Directory or intranet and this identity can easily be used to log into other web-based applications, and this requires the use of the Security Assertion Mark-up Language (SAML). SAML is basically a standard that allows users to be logged into applications as per their sessions. The problem that this paper addresses is the lack of a proactive technique of hardening cloud-based SAML while combining SSO with a Multi-Factor Authentication (MFA) at the time of writing this paper. The authors have, therefore, proposed an effective approach that unifies SSO with MFA in this context. Based on the base score index conducted over Common Vulnerability Scoring System (CVSS), the architecture proves to be reliable, feasible and with better performance.
尽管各种企业应用程序都采用了云范式及其相关服务,但在对用户的关键数据进行身份验证方面仍然存在一些主要问题。单点登录(SSO)是一种用户身份验证技术,服务器通过该技术对用户进行身份验证,并允许用户使用登录凭据的单个方面,例如,访问云中的多个服务。尽管SSO减少了在异构环境中所需的登录次数,但是如果中间人(MITM)攻击者设法获得对SSO凭证的控制,那么与SSO安全性相关的风险可能是有害的。还可以获得已登录到Active Directory或内部网的用户的身份,并且可以很容易地使用此身份登录到其他基于web的应用程序,这需要使用安全断言标记语言(SAML)。SAML基本上是一种允许用户根据会话登录到应用程序的标准。本文要解决的问题是,在撰写本文时,在将SSO与多因素身份验证(Multi-Factor Authentication, MFA)结合使用时,缺乏一种加强基于云的SAML的主动技术。因此,作者提出了一种有效的方法,在这种情况下将SSO与MFA结合起来。基于通用漏洞评分系统(Common Vulnerability Scoring System, CVSS)的基准评分指标,证明该体系结构可靠、可行,具有较好的性能。
{"title":"Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud","authors":"Nickson M. Karie, V. Kebande, R. Ikuesan, Mehdi Sookhak, H. Venter","doi":"10.1145/3386723.3387875","DOIUrl":"https://doi.org/10.1145/3386723.3387875","url":null,"abstract":"Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there has been major issues with regard to authenticating users' critical data. Single Sign on (SSO) is a user authentication technique through which a server authenticates and allows a user to use a single aspect of login credentials, for example, to access multiple services in the cloud. Even though SSO reduces the number of logins that are needed over heterogeneous environments, the risk that might be associated with the security of SSO might be detrimental if, for example, a Man-in-the Middle (MITM) attacker manages to gain control of the SSO credentials. It is also possible to get the identity of the users who have logged into Active Directory or intranet and this identity can easily be used to log into other web-based applications, and this requires the use of the Security Assertion Mark-up Language (SAML). SAML is basically a standard that allows users to be logged into applications as per their sessions. The problem that this paper addresses is the lack of a proactive technique of hardening cloud-based SAML while combining SSO with a Multi-Factor Authentication (MFA) at the time of writing this paper. The authors have, therefore, proposed an effective approach that unifies SSO with MFA in this context. Based on the base score index conducted over Common Vulnerability Scoring System (CVSS), the architecture proves to be reliable, feasible and with better performance.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131257449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptation of quality for video streaming in a Bittorrent P2P IMS network Bittorrent P2P IMS网络中视频流质量的自适应
A. Ghani, E. I. Elhaj, A. Hammouch, A. Chaoub
The internet multimedia subsystem (IMS) has been upgraded to support Peer-to-Peer (P2P) content distribution services. Bittorent can be used with IMS, it uses an scalable process of content distribution. BitTorrent is a P2P file-sharing application designed to distribute large files to a large user population efficiently. This is done by making use of the upload bandwidth of all nodes (called peers) downloading the file. The peer heterogeneity constraint imposes a challenge that is the guarantee of a certain level of Quality of Service (QoS) of the video for the different peers, and the transfer poses a challenge for maintaining quality of service (QoS) in IMS. In parallel of P2P development, recently, video coding standards have appeared, which are enabling the deployment of video content delivery over Internet in real-time with high QoS. In this article we have linked the Scalable Video Coding (SVC) quality adaptation model with the BitTorrent protocol and the IMS network, knowing that the file to be downloaded by the Bittorrent protocol is divided into several chunks, we exploited the chunks selection technique used by Bittorrent to link the SVC coding quality adaptation model with the bittorrent protocol and the P2P IMS network. We performed several simulations with the bittorent protocol to extract the following parameters(Start Time, first Chunk Time, last Chunk Time, Stop Time, dwonload Duration), we made a comparison between the P2P Bittorent protocol and the P2P Zeta protocol.
internet多媒体子系统(IMS)已经升级为支持点对点(P2P)内容分发服务。bittorrent可以与IMS一起使用,它使用可扩展的内容分发过程。BitTorrent是一个P2P文件共享应用程序,旨在有效地将大文件分发给大量用户。这是通过利用下载文件的所有节点(称为对等节点)的上传带宽来完成的。对等体异构约束对保证不同对等体的视频具有一定的服务质量(QoS)提出了挑战,而传输对IMS中保持服务质量(QoS)提出了挑战。在P2P发展的同时,近年来出现了视频编码标准,这些标准使视频内容在互联网上实时、高QoS的传输成为可能。本文将可扩展视频编码(Scalable Video Coding, SVC)质量自适应模型与BitTorrent协议和IMS网络相连接,了解到BitTorrent协议要下载的文件被分成几个块,我们利用BitTorrent使用的块选择技术将SVC编码质量自适应模型与BitTorrent协议和P2P IMS网络相连接。我们对bittorent协议进行了多次模拟,提取了以下参数(Start Time, first Chunk Time, last Chunk Time, Stop Time, download Duration),并对P2P bittorent协议和P2P Zeta协议进行了比较。
{"title":"Adaptation of quality for video streaming in a Bittorrent P2P IMS network","authors":"A. Ghani, E. I. Elhaj, A. Hammouch, A. Chaoub","doi":"10.1145/3386723.3387824","DOIUrl":"https://doi.org/10.1145/3386723.3387824","url":null,"abstract":"The internet multimedia subsystem (IMS) has been upgraded to support Peer-to-Peer (P2P) content distribution services. Bittorent can be used with IMS, it uses an scalable process of content distribution. BitTorrent is a P2P file-sharing application designed to distribute large files to a large user population efficiently. This is done by making use of the upload bandwidth of all nodes (called peers) downloading the file. The peer heterogeneity constraint imposes a challenge that is the guarantee of a certain level of Quality of Service (QoS) of the video for the different peers, and the transfer poses a challenge for maintaining quality of service (QoS) in IMS. In parallel of P2P development, recently, video coding standards have appeared, which are enabling the deployment of video content delivery over Internet in real-time with high QoS. In this article we have linked the Scalable Video Coding (SVC) quality adaptation model with the BitTorrent protocol and the IMS network, knowing that the file to be downloaded by the Bittorrent protocol is divided into several chunks, we exploited the chunks selection technique used by Bittorrent to link the SVC coding quality adaptation model with the bittorrent protocol and the P2P IMS network. We performed several simulations with the bittorent protocol to extract the following parameters(Start Time, first Chunk Time, last Chunk Time, Stop Time, dwonload Duration), we made a comparison between the P2P Bittorent protocol and the P2P Zeta protocol.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124458045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new Framework to improve Change Mining in Configurable Process 改进可配置过程中变化挖掘的新框架
A. Hmami, Hanae Sbaï, M. Fredj
The configurable process model is an important approach to reduce the redundancy involved in modeling, reengineering, and adapting a business process with its environment. While process mining approaches aim to discover and, verify conformance and enhance a process, connecting configurable processes and process mining shows considerable improvements, especially in terms of time and cost. However, the configurable process has rarely been applied in change mining. Our goal in this paper is to highlight the importance of using variability to improve change mining from a collection of event logs. We propose a framework that can detect and recommend changes, by mining changes from a collection of event logs. The main purpose is to allow engineers and business process designers to easily adjust business process with the environment changes.
可配置流程模型是一种重要的方法,可以减少建模、再工程和使业务流程与其环境相适应所涉及的冗余。虽然流程挖掘方法旨在发现和验证一致性并增强流程,但连接可配置流程和流程挖掘显示出相当大的改进,特别是在时间和成本方面。然而,可配置过程在变化挖掘中很少得到应用。我们在本文中的目标是强调使用可变性来改进从事件日志集合中挖掘变化的重要性。我们提出了一个可以通过从事件日志集合中挖掘更改来检测和推荐更改的框架。其主要目的是允许工程师和业务流程设计人员根据环境变化轻松调整业务流程。
{"title":"A new Framework to improve Change Mining in Configurable Process","authors":"A. Hmami, Hanae Sbaï, M. Fredj","doi":"10.1145/3386723.3387853","DOIUrl":"https://doi.org/10.1145/3386723.3387853","url":null,"abstract":"The configurable process model is an important approach to reduce the redundancy involved in modeling, reengineering, and adapting a business process with its environment. While process mining approaches aim to discover and, verify conformance and enhance a process, connecting configurable processes and process mining shows considerable improvements, especially in terms of time and cost. However, the configurable process has rarely been applied in change mining. Our goal in this paper is to highlight the importance of using variability to improve change mining from a collection of event logs. We propose a framework that can detect and recommend changes, by mining changes from a collection of event logs. The main purpose is to allow engineers and business process designers to easily adjust business process with the environment changes.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125019435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Survey on QoS-based communication protocols for IoT systems 物联网系统基于qos的通信协议研究进展
Nogaye Lo, I. Niang
Internet of Things (IoT) contributes to development of world through its technological contributions and its daily applications. Several technologies and protocols are used for the implementation of new applications allowing physical objects to connect with each other in support of smart decision-making. To provide efficient and reliable services to its end-users, it guarantees the quality of its pragmatic use by referring to QoS criteria.This implies efficient management of the quality of service in IoT systems in order to meet requirements of their applications. In this paper, we offer an analysis of quality of service mechanisms of communication protocols in IoT environment. This study opens a new perspective of dynamic QoS management.
物联网(IoT)通过其技术贡献和日常应用为世界的发展做出贡献。一些技术和协议用于实现新的应用程序,这些应用程序允许物理对象相互连接,以支持智能决策。为了向终端用户提供高效可靠的服务,它参考QoS标准来保证其实际使用的质量。这意味着要对物联网系统中的服务质量进行有效管理,以满足其应用的需求。本文分析了物联网环境下通信协议的服务质量机制。本研究为动态QoS管理开辟了一个新的视角。
{"title":"A Survey on QoS-based communication protocols for IoT systems","authors":"Nogaye Lo, I. Niang","doi":"10.1145/3386723.3387834","DOIUrl":"https://doi.org/10.1145/3386723.3387834","url":null,"abstract":"Internet of Things (IoT) contributes to development of world through its technological contributions and its daily applications. Several technologies and protocols are used for the implementation of new applications allowing physical objects to connect with each other in support of smart decision-making. To provide efficient and reliable services to its end-users, it guarantees the quality of its pragmatic use by referring to QoS criteria.This implies efficient management of the quality of service in IoT systems in order to meet requirements of their applications. In this paper, we offer an analysis of quality of service mechanisms of communication protocols in IoT environment. This study opens a new perspective of dynamic QoS management.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123895887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Real-time Prediction of Accident using Big Data System 基于大数据系统的事故实时预测
Mouad Tantaoui, M. Laanaoui, M. Kabil
In this paper, we propose a new prediction system in real time using Big Data to improve the VANET network. Firstly, The Traffic density and average speed are calculated in each section of road, and then the risk of vehicle accident is predicted in instantaneous manner with parallel data processing, which makes execution faster.
本文提出了一种利用大数据对VANET网络进行实时预测的新系统。首先计算各路段的交通密度和平均速度,然后采用并行数据处理的方式进行车辆事故风险的瞬时预测,提高了执行速度。
{"title":"Real-time Prediction of Accident using Big Data System","authors":"Mouad Tantaoui, M. Laanaoui, M. Kabil","doi":"10.1145/3386723.3387886","DOIUrl":"https://doi.org/10.1145/3386723.3387886","url":null,"abstract":"In this paper, we propose a new prediction system in real time using Big Data to improve the VANET network. Firstly, The Traffic density and average speed are calculated in each section of road, and then the risk of vehicle accident is predicted in instantaneous manner with parallel data processing, which makes execution faster.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122822447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smartphone learning for Kids edutainment 儿童智能手机学习寓教于乐
E. Zigh, Ayoub Elhoucine, Abderrahmane Mallek, M. Kadiri, Kouninef Belkacem, T. Ensari
Learning should be the preparation of young students (kids) for new ways of thinking: ways that involve creativity, critical analysis, problem solving and decision-making. We propose in this article, a smartphone learning approach using a designed robot car for children. It is a package that could been introduced for kids edutainment in Algeria. In order to be exploited outside Algeria, a software part could been modified according to the educational need of other kids around the world. A designed package includes an android application and a robot car. This last is remotes controlled via a smartphone application. This software part consists into three edutainment games quiz related to three levels respectively. Therefore, the further kid moves into the game, the more control he has over the robot car. A child is enjoying his educational toy and learning in attractive context at the same time. The remote control results are validated, using hardware prototype.
学习应该是为年轻学生(孩子)准备新的思维方式:包括创造力、批判性分析、解决问题和决策的方式。在这篇文章中,我们提出了一种智能手机学习方法,使用设计的儿童机器人汽车。这是一个可以引入阿尔及利亚儿童教育娱乐的一揽子计划。为了在阿尔及利亚以外的地区使用,软件部分可以根据世界各地其他孩子的教育需求进行修改。设计的软件包包括一个安卓应用程序和一辆机器人汽车。最后一个是通过智能手机应用程序远程控制。本软件部分由三个寓教于乐的游戏组成,分别涉及三个层次。因此,孩子越深入游戏,他对机器人汽车的控制权就越大。孩子在享受他的教育玩具的同时,也在有吸引力的环境中学习。利用硬件样机对远程控制结果进行了验证。
{"title":"Smartphone learning for Kids edutainment","authors":"E. Zigh, Ayoub Elhoucine, Abderrahmane Mallek, M. Kadiri, Kouninef Belkacem, T. Ensari","doi":"10.1145/3386723.3387862","DOIUrl":"https://doi.org/10.1145/3386723.3387862","url":null,"abstract":"Learning should be the preparation of young students (kids) for new ways of thinking: ways that involve creativity, critical analysis, problem solving and decision-making. We propose in this article, a smartphone learning approach using a designed robot car for children. It is a package that could been introduced for kids edutainment in Algeria. In order to be exploited outside Algeria, a software part could been modified according to the educational need of other kids around the world. A designed package includes an android application and a robot car. This last is remotes controlled via a smartphone application. This software part consists into three edutainment games quiz related to three levels respectively. Therefore, the further kid moves into the game, the more control he has over the robot car. A child is enjoying his educational toy and learning in attractive context at the same time. The remote control results are validated, using hardware prototype.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125052090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Definition and Implementation of an Elliptic Curve Cryptosystem using a New Message Mapping Scheme 使用新消息映射方案的椭圆曲线密码系统的定义与实现
Lahraoui Younes, Amal Youssef, S. Lazaar
Elliptic curve cryptography (ECC) is strongly requested for encryption and decryption processes since its guarantees high level of data security, insured by small key sizes that usually lead to fast algorithms. Such processes can only deal with points on elliptic curves on which the message has to be mapped. In this paper, we define a new message mapping algorithm coupled with Elgamal encryption based on an elliptic curve defined over a finite prime field. The established algorithm will be implemented and discussed for a chosen plaintext corresponding to an integer message. Our numerical tests demonstrate that the execution time of the message mapping, encryption, reverse message mapping and decryption, increase linearly versus data sizes. These results are promising for the design of fast and secure cryptosystems desirable for implementations on constrained environments.
椭圆曲线密码学(ECC)在加密和解密过程中受到强烈的要求,因为它保证了高水平的数据安全性,并且通过通常导致快速算法的小密钥大小来保证数据安全性。这样的处理只能处理消息必须映射到的椭圆曲线上的点。本文基于有限素数域上的椭圆曲线,定义了一种新的消息映射算法,并结合了Elgamal加密。建立的算法将实现和讨论一个选择的明文对应于一个整数消息。我们的数值测试表明,消息映射、加密、反向消息映射和解密的执行时间随数据大小呈线性增长。这些结果为在受限环境中实现所需的快速安全密码系统的设计提供了希望。
{"title":"Definition and Implementation of an Elliptic Curve Cryptosystem using a New Message Mapping Scheme","authors":"Lahraoui Younes, Amal Youssef, S. Lazaar","doi":"10.1145/3386723.3387893","DOIUrl":"https://doi.org/10.1145/3386723.3387893","url":null,"abstract":"Elliptic curve cryptography (ECC) is strongly requested for encryption and decryption processes since its guarantees high level of data security, insured by small key sizes that usually lead to fast algorithms. Such processes can only deal with points on elliptic curves on which the message has to be mapped. In this paper, we define a new message mapping algorithm coupled with Elgamal encryption based on an elliptic curve defined over a finite prime field. The established algorithm will be implemented and discussed for a chosen plaintext corresponding to an integer message. Our numerical tests demonstrate that the execution time of the message mapping, encryption, reverse message mapping and decryption, increase linearly versus data sizes. These results are promising for the design of fast and secure cryptosystems desirable for implementations on constrained environments.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"23 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123732089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Recidivism forecasting: A study on process of feature selection 累犯预测:特征选择过程的研究
A. Azeroual, Youssef Taher, B. Nsiri
Across the world, there are several factors attributed to high crime rates. The prevention of and the fight against crimes is a major concern of all countries. In the era of globalization and new information and communication technologies, reducing these crimes rate by using conventional methods (law enforcement, social interventions...) are not enough. In fact, they have many limits. Today, by analyzing a large volume of crimes data with machine learning algorithms, researchers can take important advantage of these technologies, especially in the context of the world's famous problem of recidivism. By using these recent innovations, security departments can predict how, when, and where reoffending will happen before it actually happens. However, the efficiency, the quality, and the accuracy of these forcasting models and software depend on several factors. The process of feature selection is one of these key factors. By improving the quality of this process, we can reduce over fitting and eliminating redundant data as well as training time. In this context, this investigation paid particular attention to the process of recidivism features selection (first phase of our future recidivism forcasting framework). Based on detailed study of recidivism theoretical factors, previous and recent methods used in recidivism features selection, we present a comparative study on all key elements used in this phase (features, categories of features and methods of features selection). Our main objective is to prepare an important knowledge database for recidivism features. This database will take into account different sets of recidivism features obtained by all previous and recent projects. It will also be used in our recidivism forcasting framework.
在世界范围内,有几个因素归因于高犯罪率。预防和打击犯罪是各国共同关注的重大问题。在全球化和新的信息和通信技术的时代,通过传统的方法(执法,社会干预……)来减少这些犯罪率是不够的。事实上,它们有很多限制。今天,通过使用机器学习算法分析大量犯罪数据,研究人员可以利用这些技术的重要优势,特别是在世界著名的累犯问题的背景下。通过使用这些最新的创新,安全部门可以在再次犯罪发生之前预测其发生的方式、时间和地点。然而,这些预测模型和软件的效率、质量和准确性取决于几个因素。特征选择过程是其中一个关键因素。通过提高这一过程的质量,我们可以减少过度拟合,消除冗余数据,减少训练时间。在此背景下,本研究特别关注累犯特征选择的过程(我们未来累犯预测框架的第一阶段)。本文在详细研究累犯理论因素、累犯特征选择方法的基础上,对累犯特征选择的关键要素(特征、特征分类、特征选择方法)进行了比较研究。我们的主要目标是准备一个重要的累犯特征知识库。这个数据库将考虑到所有以前和最近的项目获得的不同组的累犯特征。它也将用于我们的累犯预测框架。
{"title":"Recidivism forecasting: A study on process of feature selection","authors":"A. Azeroual, Youssef Taher, B. Nsiri","doi":"10.1145/3386723.3387848","DOIUrl":"https://doi.org/10.1145/3386723.3387848","url":null,"abstract":"Across the world, there are several factors attributed to high crime rates. The prevention of and the fight against crimes is a major concern of all countries. In the era of globalization and new information and communication technologies, reducing these crimes rate by using conventional methods (law enforcement, social interventions...) are not enough. In fact, they have many limits. Today, by analyzing a large volume of crimes data with machine learning algorithms, researchers can take important advantage of these technologies, especially in the context of the world's famous problem of recidivism. By using these recent innovations, security departments can predict how, when, and where reoffending will happen before it actually happens. However, the efficiency, the quality, and the accuracy of these forcasting models and software depend on several factors. The process of feature selection is one of these key factors. By improving the quality of this process, we can reduce over fitting and eliminating redundant data as well as training time. In this context, this investigation paid particular attention to the process of recidivism features selection (first phase of our future recidivism forcasting framework). Based on detailed study of recidivism theoretical factors, previous and recent methods used in recidivism features selection, we present a comparative study on all key elements used in this phase (features, categories of features and methods of features selection). Our main objective is to prepare an important knowledge database for recidivism features. This database will take into account different sets of recidivism features obtained by all previous and recent projects. It will also be used in our recidivism forcasting framework.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129520106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using machine learning to deal with Phishing and Spam Detection: An overview 使用机器学习处理网络钓鱼和垃圾邮件检测:概述
Oumaima El Kouari, H. Benaboud, S. Lazaar
Cybersecurity is a growing field that requires a lot of attention due to the remarkable progress made in social networks, cloud and web technologies, online banking, mobile environment, smart networks, etc. Various approaches have been developed to solve many computer security problems, including those based on machine learning. This paper examines and highlights the various works using machine learning in network security. Two types of detection are discussed. Phishing detection and Spam detection. For each type, related work is presented and some proposed methods in the literature are compared taking into account their accuracy and other characteristics.
由于社交网络、云和web技术、网上银行、移动环境、智能网络等方面的显著进步,网络安全是一个需要高度关注的新兴领域。已经开发了各种方法来解决许多计算机安全问题,包括基于机器学习的方法。本文研究并强调了在网络安全中使用机器学习的各种工作。讨论了两种类型的检测。网络钓鱼检测和垃圾邮件检测。针对每种类型,介绍了相关工作,并比较了文献中提出的一些方法,考虑了它们的准确性和其他特点。
{"title":"Using machine learning to deal with Phishing and Spam Detection: An overview","authors":"Oumaima El Kouari, H. Benaboud, S. Lazaar","doi":"10.1145/3386723.3387891","DOIUrl":"https://doi.org/10.1145/3386723.3387891","url":null,"abstract":"Cybersecurity is a growing field that requires a lot of attention due to the remarkable progress made in social networks, cloud and web technologies, online banking, mobile environment, smart networks, etc. Various approaches have been developed to solve many computer security problems, including those based on machine learning. This paper examines and highlights the various works using machine learning in network security. Two types of detection are discussed. Phishing detection and Spam detection. For each type, related work is presented and some proposed methods in the literature are compared taking into account their accuracy and other characteristics.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133726997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fireworks Algorithm for Frequency Assignment Problem 频率分配问题的Fireworks算法
El Bouti Mohamed, El Ghazi Raouan, Benameur Lamia, A. Jihane
In this paper, a new approach to resolve the problem of frequency assignment problem is proposed. (FAP) is well known in the NP-complete problems and can be modeled as an optimization problem, which the objective is to minimize the costs due to interference generated by a solution. The fireworks algorithm (FWA) is proposed for solving FAP. FWA is a recently developed swarm intelligence algorithm. FWA is a meta-heuristic method and has a good convergence property and can always find the global optimal solutions.
本文提出了一种解决频率分配问题的新方法。(FAP)在np完全问题中是众所周知的,它可以被建模为一个优化问题,其目标是最小化由于解决方案产生的干扰而导致的成本。提出了求解FAP的烟花算法(fireworks algorithm, FWA)。FWA是近年来发展起来的一种群体智能算法。FWA是一种元启发式方法,具有良好的收敛性,总能找到全局最优解。
{"title":"Fireworks Algorithm for Frequency Assignment Problem","authors":"El Bouti Mohamed, El Ghazi Raouan, Benameur Lamia, A. Jihane","doi":"10.1145/3386723.3387823","DOIUrl":"https://doi.org/10.1145/3386723.3387823","url":null,"abstract":"In this paper, a new approach to resolve the problem of frequency assignment problem is proposed. (FAP) is well known in the NP-complete problems and can be modeled as an optimization problem, which the objective is to minimize the costs due to interference generated by a solution. The fireworks algorithm (FWA) is proposed for solving FAP. FWA is a recently developed swarm intelligence algorithm. FWA is a meta-heuristic method and has a good convergence property and can always find the global optimal solutions.","PeriodicalId":139072,"journal":{"name":"Proceedings of the 3rd International Conference on Networking, Information Systems & Security","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130003406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 3rd International Conference on Networking, Information Systems & Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1