首页 > 最新文献

Proceedings of the 9th International Conference on Networking, Systems and Security最新文献

英文 中文
Asynchronous Line Formation in Presence of Faulty Robots 存在故障机器人的异步队形
Subhajit Pramanick, Gurram Joseph Spourgeon, K. Raj, P. Mandal
In this paper, we study the line formation problem using n oblivious point mobile robots located on distinct positions on the Euclidean plane. We assume that the robots agree on one coordinate axis. Robots operate in Look-Compute-Move (LCM) cycles and any two robots can see each other only if there is no robot present on the line segment joining them. Our aim is to solve the line formation problem even if some robots become faulty before achieving the goal. The robots cannot move anymore once they become faulty. We present a fault-tolerant distributed algorithm for line formation under y-axis agreement which runs in O(n) epochs in semi-synchronous setting. The same algorithm runs in D/ymin epochs in asynchronous setting, where D is the vertical distance between the farthest robots along the y-axis and ymin is the minimum non-zero vertical distance traveled by a robot in each LCM cycle.
本文研究了位于欧几里德平面上不同位置的n个遗忘点移动机器人的线形问题。我们假设机器人在一个坐标轴上一致。机器人以“看-算-动”(LCM)循环运行,任何两个机器人只有在连接它们的线段上没有机器人时才能看到对方。我们的目标是即使一些机器人在达到目标之前出现故障,也能解决成线问题。机器人一旦出现故障就不能再移动了。提出了一种在半同步条件下,以0 (n)个epoch为周期运行的y轴一致性下的容错分布式成线算法。在异步设置下,同样的算法在D/ymin epoch中运行,其中D为最远机器人沿y轴的垂直距离,ymin为机器人在每个LCM周期内行走的最小非零垂直距离。
{"title":"Asynchronous Line Formation in Presence of Faulty Robots","authors":"Subhajit Pramanick, Gurram Joseph Spourgeon, K. Raj, P. Mandal","doi":"10.1145/3569551.3569553","DOIUrl":"https://doi.org/10.1145/3569551.3569553","url":null,"abstract":"In this paper, we study the line formation problem using n oblivious point mobile robots located on distinct positions on the Euclidean plane. We assume that the robots agree on one coordinate axis. Robots operate in Look-Compute-Move (LCM) cycles and any two robots can see each other only if there is no robot present on the line segment joining them. Our aim is to solve the line formation problem even if some robots become faulty before achieving the goal. The robots cannot move anymore once they become faulty. We present a fault-tolerant distributed algorithm for line formation under y-axis agreement which runs in O(n) epochs in semi-synchronous setting. The same algorithm runs in D/ymin epochs in asynchronous setting, where D is the vertical distance between the farthest robots along the y-axis and ymin is the minimum non-zero vertical distance traveled by a robot in each LCM cycle.","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115605914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sound-Based Fault Detection For Textile Machinery 基于声音的纺织机械故障检测
Md. Harunur Rashid Bhuiyan, Muhammad Tafsirul Islam, Nazmul Islam, Mynul Islam, Anupom Mondol, Tarik Reza Toha, Shaikh Mohammad Mominul Alam
The textile sector is one of the vital driving forces in the economy of south Asian countries like Bangladesh, India, Pakistan, etc. However, most of the textile industries suffer from frequent machinery faults everyday which reduces their productivity, which in terms reduces their profit. Existing systems for detecting the faults in textile machinery fails to find a remedy to this problem due to several limitations. Among them, sound based and vibration based fault detection systems are based on prototype machinery and has smaller data set to detect machinery fault properly. The fabric defect based, machine learning based approaches only detect machinery fault after fabric has become already defected. To remedy these limitations, in this paper, we propose a sound based fault detection system consisting of trained machine learning model from large data set that can detect machinery fault in textile industry. We use a sound sensor to measure the sound signal of the machine. We artificially create three real faults in the experimented machine and measure the sound signal during the faults. Next, we conduct Fast Fourier Analysis derive sound frequency and statistical analysis to derive different statistical features from the prepared data set. From these two analysis, we determine if the sound frequency and amplitude changes during the fault. After that, we feed the data set to ten machine learning algorithms. Finally, we evaluate our trained machine leaning models through ten fold cross validation to determine the precision, recall, and F1 score. We find the highest F1 of 57.7% in Nearest Centroid Algorithm.
纺织业是孟加拉国、印度、巴基斯坦等南亚国家经济的重要推动力之一。然而,大多数纺织工业每天都遭受频繁的机械故障,这降低了他们的生产率,从而减少了他们的利润。现有的纺织机械故障检测系统由于自身的局限性,无法有效地解决这一问题。其中基于声音的故障检测系统和基于振动的故障检测系统是基于原型机械,具有较小的数据集来正确检测机械故障。基于织物缺陷和机器学习的方法只能在织物已经出现缺陷后检测机械故障。为了弥补这些局限性,本文提出了一种基于声音的故障检测系统,该系统由来自大数据集的训练有素的机器学习模型组成,可以检测纺织工业中的机械故障。我们用一个声音传感器来测量机器的声音信号。我们在实验机上人为制造了三个真实的故障,并测量了故障期间的声音信号。接下来,我们进行快速傅立叶分析,得出声音频率和统计分析,从准备好的数据集中得出不同的统计特征。通过这两种分析,我们可以确定在故障过程中声音的频率和振幅是否发生变化。之后,我们将数据集提供给10个机器学习算法。最后,我们通过十倍交叉验证来评估我们训练好的机器学习模型,以确定精度、召回率和F1分数。我们发现最接近质心算法的最高F1为57.7%。
{"title":"Sound-Based Fault Detection For Textile Machinery","authors":"Md. Harunur Rashid Bhuiyan, Muhammad Tafsirul Islam, Nazmul Islam, Mynul Islam, Anupom Mondol, Tarik Reza Toha, Shaikh Mohammad Mominul Alam","doi":"10.1145/3569551.3569557","DOIUrl":"https://doi.org/10.1145/3569551.3569557","url":null,"abstract":"The textile sector is one of the vital driving forces in the economy of south Asian countries like Bangladesh, India, Pakistan, etc. However, most of the textile industries suffer from frequent machinery faults everyday which reduces their productivity, which in terms reduces their profit. Existing systems for detecting the faults in textile machinery fails to find a remedy to this problem due to several limitations. Among them, sound based and vibration based fault detection systems are based on prototype machinery and has smaller data set to detect machinery fault properly. The fabric defect based, machine learning based approaches only detect machinery fault after fabric has become already defected. To remedy these limitations, in this paper, we propose a sound based fault detection system consisting of trained machine learning model from large data set that can detect machinery fault in textile industry. We use a sound sensor to measure the sound signal of the machine. We artificially create three real faults in the experimented machine and measure the sound signal during the faults. Next, we conduct Fast Fourier Analysis derive sound frequency and statistical analysis to derive different statistical features from the prepared data set. From these two analysis, we determine if the sound frequency and amplitude changes during the fault. After that, we feed the data set to ten machine learning algorithms. Finally, we evaluate our trained machine leaning models through ten fold cross validation to determine the precision, recall, and F1 score. We find the highest F1 of 57.7% in Nearest Centroid Algorithm.","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126288788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Wireless IoT Device for Women’s Safety 女性安全无线物联网设备的设计与实现
Mohammad Shihab Mustafa, Jannatul Ferdaus Khan Lisa, J. Mukta
Abstract—Nowadays, women face imminent risk of sexual harassment, rape and molestation in the streets as male predators roam around in search of their potential targets. In this precarious scenario, women needs to be protected in the street for their safety. To address these challenges, in this paper, we propose a wearable device that will protect and enhance the safety of women. This goal is achieved by analyzing the user’s pulse rate and oxygen measurements and updating them on the Blynk IoT web server. The user’s pulse-rate and blood oxygen saturation is determined by acquiring raw heart-rate and oxygen values from a pulse oximeter and oxygen sensor installed at the heart of the device. Real-time monitoring of user data is achieved by transferring sensor data to the Blynk IoT web server. This wireless device is specifically programmed to continuously monitor the user’s pulse-rate and oxygen values and react in case of a danger situation. It does so by detecting the abnormal pulse-rate and oxygen values, after which it sends the alert text message along with the location and live video streaming to the guardian’s mobile device via the Tasker app. Meanwhile, the alarm starts ringing. Besides, we validate our system architecture using different real time test cases. Moreover, we present a comparison of our proposed architecture with existing literature’s.
摘要:如今,女性在街头面临着性骚扰、强奸和骚扰的危险,因为男性捕食者四处游荡,寻找他们的潜在目标。在这种危险的情况下,妇女在街上需要得到保护,以确保她们的安全。为了应对这些挑战,在本文中,我们提出了一种可穿戴设备,将保护和提高妇女的安全。这一目标是通过分析用户的脉搏率和氧气测量并在Blynk物联网web服务器上更新它们来实现的。用户的脉搏率和血氧饱和度是通过从安装在设备中心的脉搏血氧仪和氧传感器获取原始心率和氧值来确定的。通过将传感器数据传输到Blynk物联网web服务器,可以实现对用户数据的实时监控。这种无线设备经过专门编程,可以持续监测用户的脉搏率和氧值,并在危险情况下做出反应。它通过检测异常的脉搏率和氧值,然后通过Tasker应用程序向监护人的移动设备发送警报短信、位置和实时视频。与此同时,警报开始响起。此外,我们使用不同的实时测试用例验证我们的系统架构。此外,我们还将我们提出的架构与现有文献进行了比较。
{"title":"Design and Implementation of Wireless IoT Device for Women’s Safety","authors":"Mohammad Shihab Mustafa, Jannatul Ferdaus Khan Lisa, J. Mukta","doi":"10.1145/3569551.3569559","DOIUrl":"https://doi.org/10.1145/3569551.3569559","url":null,"abstract":"Abstract—Nowadays, women face imminent risk of sexual harassment, rape and molestation in the streets as male predators roam around in search of their potential targets. In this precarious scenario, women needs to be protected in the street for their safety. To address these challenges, in this paper, we propose a wearable device that will protect and enhance the safety of women. This goal is achieved by analyzing the user’s pulse rate and oxygen measurements and updating them on the Blynk IoT web server. The user’s pulse-rate and blood oxygen saturation is determined by acquiring raw heart-rate and oxygen values from a pulse oximeter and oxygen sensor installed at the heart of the device. Real-time monitoring of user data is achieved by transferring sensor data to the Blynk IoT web server. This wireless device is specifically programmed to continuously monitor the user’s pulse-rate and oxygen values and react in case of a danger situation. It does so by detecting the abnormal pulse-rate and oxygen values, after which it sends the alert text message along with the location and live video streaming to the guardian’s mobile device via the Tasker app. Meanwhile, the alarm starts ringing. Besides, we validate our system architecture using different real time test cases. Moreover, we present a comparison of our proposed architecture with existing literature’s.","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125659430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Watermarking Approach to Communicate Patient Data Securely from Distributed Sources 一种从分布式来源安全地传输患者数据的水印方法
Subrata Kumar Das, Mohammad Zahidur Rahman
Hospitals or Health organizations collect data from patients and store it in databases. The data are scattered in different locations and significant to share from remote places for serving quality treatment and urgent decisions. Any data alternation while transmitting through the transmission channel may cause security issues like data integrity. Data integrity is essential because any alteration of data can hamper medical diagnoses by losing sensitive data. Watermarking could be a practical approach for ensuring such data security with a lower computational cost. Various strategies of watermarking were used to secure health data, especially images. However, watermarking for patient text data has been difficult due to the availability of the right techniques. Therefore, this paper introduces a new watermarking strategy to share patient text from distributed databases. We use the prescription data for testing the proposed system. The experimental results indicate that the method outperforms the existing method against intended attacks.
医院或卫生组织从患者那里收集数据并将其存储在数据库中。这些数据分散在不同的地点,从偏远地区共享对于提供高质量治疗和紧急决策非常重要。通过传输通道传输时的任何数据更改都可能导致数据完整性等安全问题。数据完整性至关重要,因为数据的任何更改都可能因丢失敏感数据而妨碍医疗诊断。水印可能是一种实用的方法,以较低的计算成本来确保此类数据的安全性。各种水印策略被用来保护健康数据,特别是图像。然而,由于正确技术的可用性,对患者文本数据进行水印一直很困难。为此,本文引入了一种新的水印策略来实现分布式数据库中患者文本的共享。我们使用处方数据来测试所提出的系统。实验结果表明,该方法在抵御恶意攻击方面的性能优于现有方法。
{"title":"A Watermarking Approach to Communicate Patient Data Securely from Distributed Sources","authors":"Subrata Kumar Das, Mohammad Zahidur Rahman","doi":"10.1145/3569551.3569552","DOIUrl":"https://doi.org/10.1145/3569551.3569552","url":null,"abstract":"Hospitals or Health organizations collect data from patients and store it in databases. The data are scattered in different locations and significant to share from remote places for serving quality treatment and urgent decisions. Any data alternation while transmitting through the transmission channel may cause security issues like data integrity. Data integrity is essential because any alteration of data can hamper medical diagnoses by losing sensitive data. Watermarking could be a practical approach for ensuring such data security with a lower computational cost. Various strategies of watermarking were used to secure health data, especially images. However, watermarking for patient text data has been difficult due to the availability of the right techniques. Therefore, this paper introduces a new watermarking strategy to share patient text from distributed databases. We use the prescription data for testing the proposed system. The experimental results indicate that the method outperforms the existing method against intended attacks.","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123163113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Do Firebase Developers Discuss About? An Empirical Study on Stack Overflow Posts Firebase开发者讨论什么?堆栈溢出桩的实证研究
Md. Sohel Aman Khan, Ahmad Rahman Farabi, Anindya Iqbal
Firebase is the leading Platform-as-a-Service (PaaS) solution in the application development industry. It is globally used by millions of mobile applications and websites. Being a very popular and robust development platform, Firebase has introduced and developed many features and components over the years. Various services and modules are being added to the platform. So, the developers who use Firebase in their applications, need to have versatile knowledge of the platform. It is difficult to acquire an overview of the trends and discussions of any vast and dynamic platform such as Firebase. Therefore, learners, enthusiasts, and often developers have to put in a lot of effort to figure out topics they should explore and focus on. As a large number of application developers frequently use it and engage in various discussions about it in popular community discussion forums for developers, it has become a very promising source for identifying the topics and trends related to Firebase. Stack Overflow is the most popular community for developers’ discussions. It has grown to be a vast ocean of knowledge to explore. In this study, a systematic approach is followed to explore, extract, and analyze Stack Overflow discussions on Firebase to present an overview of the platform. Natural language processing and machine learning methods were used for extracting information from Stack Overflow data. Information collected was reviewed, analyzed, and compiled into this paper by the research group who have practical experiences in the Firebase platform and other relevant software engineering fields.
Firebase是应用程序开发行业领先的平台即服务(PaaS)解决方案。它被全球数以百万计的移动应用程序和网站所使用。作为一个非常流行和健壮的开发平台,Firebase多年来引入并开发了许多特性和组件。各种服务和模块正在被添加到平台中。因此,在应用程序中使用Firebase的开发人员需要对该平台有全面的了解。想要全面了解像Firebase这样的大型动态平台的趋势和讨论是很困难的。因此,学习者、爱好者和开发人员通常必须投入大量精力来找出他们应该探索和关注的主题。由于大量应用程序开发人员经常使用它,并在流行的开发人员社区讨论论坛中参与有关它的各种讨论,因此它已成为确定与Firebase相关的主题和趋势的非常有前途的来源。Stack Overflow是最受欢迎的开发人员讨论社区。它已经成长为一个广阔的知识海洋。在本研究中,采用了一种系统的方法来探索、提取和分析Firebase上的Stack Overflow讨论,以呈现该平台的概述。使用自然语言处理和机器学习方法从Stack Overflow数据中提取信息。在Firebase平台和其他相关软件工程领域具有实践经验的研究小组对收集到的信息进行了审查、分析并汇编成本文。
{"title":"What Do Firebase Developers Discuss About? An Empirical Study on Stack Overflow Posts","authors":"Md. Sohel Aman Khan, Ahmad Rahman Farabi, Anindya Iqbal","doi":"10.1145/3569551.3569558","DOIUrl":"https://doi.org/10.1145/3569551.3569558","url":null,"abstract":"Firebase is the leading Platform-as-a-Service (PaaS) solution in the application development industry. It is globally used by millions of mobile applications and websites. Being a very popular and robust development platform, Firebase has introduced and developed many features and components over the years. Various services and modules are being added to the platform. So, the developers who use Firebase in their applications, need to have versatile knowledge of the platform. It is difficult to acquire an overview of the trends and discussions of any vast and dynamic platform such as Firebase. Therefore, learners, enthusiasts, and often developers have to put in a lot of effort to figure out topics they should explore and focus on. As a large number of application developers frequently use it and engage in various discussions about it in popular community discussion forums for developers, it has become a very promising source for identifying the topics and trends related to Firebase. Stack Overflow is the most popular community for developers’ discussions. It has grown to be a vast ocean of knowledge to explore. In this study, a systematic approach is followed to explore, extract, and analyze Stack Overflow discussions on Firebase to present an overview of the platform. Natural language processing and machine learning methods were used for extracting information from Stack Overflow data. Information collected was reviewed, analyzed, and compiled into this paper by the research group who have practical experiences in the Firebase platform and other relevant software engineering fields.","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117175546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Fake Co-visitation Injection Attack in Graph-based Recommendation Systems 基于图的推荐系统中伪共同访问注入攻击检测
Tropa Mahmood, Muhammad Abdullah Adnan
Recommendation systems are vulnerable to injection attacks by malicious users due to their fundamental openness. One of the vulnerabilities is the fake co-visitation injection attack, which significantly impacts recommendation systems since it modifies the system according to the attacker’s wishes. To date, the detection of co-visitation injection attacks is challenging as: (1) the choice of attribute representation of nodes is hard, (2) practical evidence for analyzing and detecting anomalies in real-world data is insufficient, (3) it is challenging to filter between the original and injected co-visitation data in terms of node behaviors. This paper investigates a unified detection framework that combines attribute and network structure information synergistically to detect outlier nodes based on CUR decomposition and residual analysis. At first, co-visitation graphs are constructed using association rules, and attribute representations of their nodes are developed. Then, both attributes and network structure information are blended in order to identify suspicious nodes. Extensive experiments on both synthetic and real-world dataset exhibit the efficacy of the proposed detection approach compared to other state-of-the-art approaches. The experimental results show that the detection performance can improve by up to 50% for co-visitation injection attacks over the baselines in terms of false alarm rate (FAR) while keeping the highest detection rate (DR).
推荐系统由于其基本的开放性,容易受到恶意用户的注入攻击。其中一个漏洞是虚假共同访问注入攻击,它会根据攻击者的意愿修改系统,从而严重影响推荐系统。迄今为止,共访问注入攻击的检测面临着以下挑战:(1)节点属性表示的选择困难;(2)分析和检测真实数据异常的实际证据不足;(3)在原始和注入的共访问数据之间进行节点行为的过滤具有挑战性。本文基于CUR分解和残差分析,研究了一种将属性信息和网络结构信息协同结合的离群节点统一检测框架。首先,利用关联规则构造共同访问图,并给出其节点的属性表示。然后,混合属性信息和网络结构信息,以识别可疑节点。与其他最先进的方法相比,在合成和现实数据集上进行的大量实验显示了所提出的检测方法的有效性。实验结果表明,该方法对共访问注入攻击的检测性能在虚警率(FAR)方面比基线提高了50%,同时保持了最高的检测率(DR)。
{"title":"Detecting Fake Co-visitation Injection Attack in Graph-based Recommendation Systems","authors":"Tropa Mahmood, Muhammad Abdullah Adnan","doi":"10.1145/3569551.3569556","DOIUrl":"https://doi.org/10.1145/3569551.3569556","url":null,"abstract":"Recommendation systems are vulnerable to injection attacks by malicious users due to their fundamental openness. One of the vulnerabilities is the fake co-visitation injection attack, which significantly impacts recommendation systems since it modifies the system according to the attacker’s wishes. To date, the detection of co-visitation injection attacks is challenging as: (1) the choice of attribute representation of nodes is hard, (2) practical evidence for analyzing and detecting anomalies in real-world data is insufficient, (3) it is challenging to filter between the original and injected co-visitation data in terms of node behaviors. This paper investigates a unified detection framework that combines attribute and network structure information synergistically to detect outlier nodes based on CUR decomposition and residual analysis. At first, co-visitation graphs are constructed using association rules, and attribute representations of their nodes are developed. Then, both attributes and network structure information are blended in order to identify suspicious nodes. Extensive experiments on both synthetic and real-world dataset exhibit the efficacy of the proposed detection approach compared to other state-of-the-art approaches. The experimental results show that the detection performance can improve by up to 50% for co-visitation injection attacks over the baselines in terms of false alarm rate (FAR) while keeping the highest detection rate (DR).","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"28 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating DDoS Attacks Using a Resource Sharing Network 通过资源共享网络减少DDoS攻击
Farabi Fardin Khan, Nafis Mohaimin Hossain, Md. Nazrul Huda Shanto, Sad Bin Anwar, Jannatun Noor
Cloud computing has gained noticeable popularity due to its ability to radically improve computing power through the application of virtual machines. In this era of the internet, however, security threats are increasing and it is costing many businesses. The seemingly legitimate traffic of these application-level attacks renders the previous detection and mitigation methods ineffective. These cyber-attacks have grown ever so sophisticated and the detection and mitigation of these attacks has become one of the major concerns of security researchers and cloud service providers all around the globe. In this paper, we propose a resource sharing method to create a universal solution to mitigate DDoS attacks. We use an existing filtering method to track the IP addresses of attackers, then send them to the proxy server and delete unwanted IP packet requests by memory management system. Later, we emulate the blockchain network using 50 Nginx VM servers as a start to show the potential of our proposal. We show that our method can mitigate 66% of attacks with only 50VMs. To maximize the capability of mitigating DDoS attacks of our network, we need to increase the number of VM’s and it may take at least a few dozen developers working years on end to develop. Therefore, the goal of this paper is to lay the foundation on which one day the universal solution will be created.
由于云计算能够通过虚拟机的应用程序从根本上提高计算能力,因此它已经获得了显著的普及。然而,在这个互联网时代,安全威胁正在增加,这让许多企业付出了代价。这些应用层攻击看似合法的流量使得之前的检测和缓解方法失效。这些网络攻击变得越来越复杂,检测和缓解这些攻击已成为全球安全研究人员和云服务提供商的主要关注点之一。在本文中,我们提出了一种资源共享的方法来创建一个通用的解决方案,以减轻DDoS攻击。我们利用现有的过滤方法跟踪攻击者的IP地址,然后将其发送到代理服务器,并通过内存管理系统删除不需要的IP包请求。随后,我们使用50个Nginx虚拟机服务器模拟区块链网络,以此作为开始,展示我们提议的潜力。我们表明,我们的方法可以仅用50vm减轻66%的攻击。为了最大限度地减轻网络DDoS攻击的能力,我们需要增加虚拟机的数量,这可能需要至少几十个开发人员连续工作数年才能完成。因此,本文的目标是为有朝一日创建通用解决方案奠定基础。
{"title":"Mitigating DDoS Attacks Using a Resource Sharing Network","authors":"Farabi Fardin Khan, Nafis Mohaimin Hossain, Md. Nazrul Huda Shanto, Sad Bin Anwar, Jannatun Noor","doi":"10.1145/3569551.3569560","DOIUrl":"https://doi.org/10.1145/3569551.3569560","url":null,"abstract":"Cloud computing has gained noticeable popularity due to its ability to radically improve computing power through the application of virtual machines. In this era of the internet, however, security threats are increasing and it is costing many businesses. The seemingly legitimate traffic of these application-level attacks renders the previous detection and mitigation methods ineffective. These cyber-attacks have grown ever so sophisticated and the detection and mitigation of these attacks has become one of the major concerns of security researchers and cloud service providers all around the globe. In this paper, we propose a resource sharing method to create a universal solution to mitigate DDoS attacks. We use an existing filtering method to track the IP addresses of attackers, then send them to the proxy server and delete unwanted IP packet requests by memory management system. Later, we emulate the blockchain network using 50 Nginx VM servers as a start to show the potential of our proposal. We show that our method can mitigate 66% of attacks with only 50VMs. To maximize the capability of mitigating DDoS attacks of our network, we need to increase the number of VM’s and it may take at least a few dozen developers working years on end to develop. Therefore, the goal of this paper is to lay the foundation on which one day the universal solution will be created.","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115766963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Citadel: An Automated Abuse Detection System to Detect And Prevent Abusive Behaviors over Emails 城堡:一个自动滥用检测系统,以检测和防止滥用行为的电子邮件
Ishita Haque, Rudaiba Adnin, Sadia Afroz, Faria Huq, Sazan Mahbub, S. Azam, A. A. Islam
Even though emails are identified as a prominent source of exchanging abusive behaviors, very little work has explored abuse over emails. In our accepted paper in NSysS 2021, we explore perceptions of users on types of abuse detection systems for emails, revealing privacy concerns and lack of control in human-moderator-based systems and a noteworthy demand for an automated system. Motivated by the findings, we iteratively develop an automated abuse detection system "Citadel" for emails in two sequential phases and evaluate in both phases - first over 39 participants through in-person demonstrations, and second over 21 participants through a 3-day field study and over 63 participants through a video demonstration. Evaluation results portray efficacy, efficiency, and user acceptance of "Citadel" in detecting and preventing abusive emails.
尽管电子邮件被认为是交换虐待行为的主要来源,但很少有研究通过电子邮件进行虐待。在我们在NSysS 2021上接受的论文中,我们探讨了用户对电子邮件滥用检测系统类型的看法,揭示了基于人为版主的系统中的隐私问题和缺乏控制,以及对自动化系统的值得注意的需求。受调查结果的启发,我们分两个阶段迭代开发了一个自动滥用检测系统“Citadel”,用于电子邮件,并在两个阶段进行评估——第一阶段通过现场演示对39名参与者进行评估,第二阶段通过为期3天的实地研究对21名参与者进行评估,并通过视频演示对63名参与者进行评估。评估结果描述了“Citadel”在检测和防止滥用电子邮件方面的功效、效率和用户接受度。
{"title":"Citadel: An Automated Abuse Detection System to Detect And Prevent Abusive Behaviors over Emails","authors":"Ishita Haque, Rudaiba Adnin, Sadia Afroz, Faria Huq, Sazan Mahbub, S. Azam, A. A. Islam","doi":"10.1145/3569551.3569555","DOIUrl":"https://doi.org/10.1145/3569551.3569555","url":null,"abstract":"Even though emails are identified as a prominent source of exchanging abusive behaviors, very little work has explored abuse over emails. In our accepted paper in NSysS 2021, we explore perceptions of users on types of abuse detection systems for emails, revealing privacy concerns and lack of control in human-moderator-based systems and a noteworthy demand for an automated system. Motivated by the findings, we iteratively develop an automated abuse detection system \"Citadel\" for emails in two sequential phases and evaluate in both phases - first over 39 participants through in-person demonstrations, and second over 21 participants through a 3-day field study and over 63 participants through a video demonstration. Evaluation results portray efficacy, efficiency, and user acceptance of \"Citadel\" in detecting and preventing abusive emails.","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128796135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cri-Astrologer: Predicting Demography of Involved Criminals based on Historical Data 占星家:基于历史数据预测犯罪人口
Md.Atiqur Rahman, A. A. Islam
Because of the rapid advancement in computer technology, police enforcement agencies are now able to keep enormous databases that contain specific information about crimes. These databases can be utilized to analyze crime patterns, criminal characteristics, and the demographics of both criminals and victims. Through the application of various machine learning algorithms to these datasets, it is possible to generate decision-aid systems that can assist in the conduct of police investigations. When there is a large amount of data accessible, several data-driven deep learning approaches can also be utilized. Within the scope of this investigation, our primary objective is to create a tool that may be utilized during the standard investigative process. To forecast criminal demographic profiles using crime evidence data and victim demographics, we present a deep factorization machine-based DNN architecture. We evaluate the performance of our architecture in comparison to that of traditional machine learning algorithms and deep learning algorithms, and we provide our findings in a comparative study.
由于计算机技术的迅速发展,警察执法机构现在能够保存包含有关犯罪的具体信息的庞大数据库。这些数据库可以用来分析犯罪模式、犯罪特征以及罪犯和受害者的人口统计数据。通过将各种机器学习算法应用于这些数据集,可以生成可以协助警方进行调查的决策辅助系统。当有大量的数据可访问时,也可以使用几种数据驱动的深度学习方法。在本次调查的范围内,我们的主要目标是创建一个可以在标准调查过程中使用的工具。为了利用犯罪证据数据和受害者人口统计数据预测犯罪人口统计特征,我们提出了一种基于深度分解机器的深度神经网络架构。我们评估了我们的架构与传统机器学习算法和深度学习算法的性能,并在比较研究中提供了我们的发现。
{"title":"Cri-Astrologer: Predicting Demography of Involved Criminals based on Historical Data","authors":"Md.Atiqur Rahman, A. A. Islam","doi":"10.1145/3569551.3569561","DOIUrl":"https://doi.org/10.1145/3569551.3569561","url":null,"abstract":"Because of the rapid advancement in computer technology, police enforcement agencies are now able to keep enormous databases that contain specific information about crimes. These databases can be utilized to analyze crime patterns, criminal characteristics, and the demographics of both criminals and victims. Through the application of various machine learning algorithms to these datasets, it is possible to generate decision-aid systems that can assist in the conduct of police investigations. When there is a large amount of data accessible, several data-driven deep learning approaches can also be utilized. Within the scope of this investigation, our primary objective is to create a tool that may be utilized during the standard investigative process. To forecast criminal demographic profiles using crime evidence data and victim demographics, we present a deep factorization machine-based DNN architecture. We evaluate the performance of our architecture in comparison to that of traditional machine learning algorithms and deep learning algorithms, and we provide our findings in a comparative study.","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129641704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MTUL: A Novel Approach for Multi-Trajectory User Linking MTUL:一种新的多轨迹用户链接方法
Fariha Tabassum Islam, Md. Tareq Mahmood, Mahmuda Naznin
Trajectory User Linking (TUL) is the problem of identifying the user (i.e., his identity) from the trajectories generated by him. Existing works on TUL leverage a single trajectory for identifying a user. We propose a novel problem called Multi-Trajectory User Linking (MTUL), which leverages all available trajectories generated by a particular user to identify him. Thus, MTUL is essentially the generalized TUL problem. This problem has significant applications in Location-Based Services (LBSs) such as personalized route planning and point-of-interests (POI) recommendation, movement anomaly detection, etc. We provide an end-to-end solution to the MTUL problem using sequence embedding and GRU and achieve reasonable accuracy by taking into account the POI type and region information. We consider this work to be an important addition to the TUL research.
轨迹用户链接(TUL)是从用户生成的轨迹中识别用户(即他的身份)的问题。TUL上的现有工作利用单一轨迹来识别用户。我们提出了一个新的问题,称为多轨迹用户链接(MTUL),它利用由特定用户生成的所有可用轨迹来识别他。因此,MTUL本质上是广义TUL问题。该问题在基于位置的服务(lbs)中具有重要的应用,如个性化路线规划和兴趣点(POI)推荐、运动异常检测等。我们利用序列嵌入和GRU为MTUL问题提供了端到端的解决方案,并考虑了POI类型和区域信息,实现了合理的精度。我们认为这项工作是对TUL研究的重要补充。
{"title":"MTUL: A Novel Approach for Multi-Trajectory User Linking","authors":"Fariha Tabassum Islam, Md. Tareq Mahmood, Mahmuda Naznin","doi":"10.1145/3569551.3569554","DOIUrl":"https://doi.org/10.1145/3569551.3569554","url":null,"abstract":"Trajectory User Linking (TUL) is the problem of identifying the user (i.e., his identity) from the trajectories generated by him. Existing works on TUL leverage a single trajectory for identifying a user. We propose a novel problem called Multi-Trajectory User Linking (MTUL), which leverages all available trajectories generated by a particular user to identify him. Thus, MTUL is essentially the generalized TUL problem. This problem has significant applications in Location-Based Services (LBSs) such as personalized route planning and point-of-interests (POI) recommendation, movement anomaly detection, etc. We provide an end-to-end solution to the MTUL problem using sequence embedding and GRU and achieve reasonable accuracy by taking into account the POI type and region information. We consider this work to be an important addition to the TUL research.","PeriodicalId":177068,"journal":{"name":"Proceedings of the 9th International Conference on Networking, Systems and Security","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124475190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 9th International Conference on Networking, Systems and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1