Pub Date : 2016-12-01DOI: 10.1109/ICITST.2016.7856752
Belghachi Mohamed, Feham Mohamed
RPL is a routing protocol for low power and lossy networks. It is an extensible proactive IPv6 distance vector protocol, which is a brand new proposed standard for including low power and lossy networks in the global realm of IPv6 networks. RPL has been implemented and tested in wireless sensor networks (WSNs) simulations with up to a thousand nodes. Recently, some of the research process has studied the operation of the protocol experimentally in small networks, which is not enough to illustrate the whole features of RPL. So, it is important to implement real large scenarios. In this paper, we present an experimental performance evaluation of RPL for different network settings to understand the impact of the protocol attributes on the network behavior, namely in terms of convergence time, energy, packet loss and packet delay.
{"title":"Experimental evaluation of RPL protocol","authors":"Belghachi Mohamed, Feham Mohamed","doi":"10.1109/ICITST.2016.7856752","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856752","url":null,"abstract":"RPL is a routing protocol for low power and lossy networks. It is an extensible proactive IPv6 distance vector protocol, which is a brand new proposed standard for including low power and lossy networks in the global realm of IPv6 networks. RPL has been implemented and tested in wireless sensor networks (WSNs) simulations with up to a thousand nodes. Recently, some of the research process has studied the operation of the protocol experimentally in small networks, which is not enough to illustrate the whole features of RPL. So, it is important to implement real large scenarios. In this paper, we present an experimental performance evaluation of RPL for different network settings to understand the impact of the protocol attributes on the network behavior, namely in terms of convergence time, energy, packet loss and packet delay.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131320843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICITST.2016.7856725
Sophia Moganedi, Njabulo Mkhonto, J. Mtsweni
Crowdsourcing platforms have changed the assignment and completion of tasks from a known crowd to the anonymous crowd, which is the public. These crowdsourcing platforms allow organizations to focus on other tasks that need to be completed by a large crowd instead of the employees. However, many crowdsourcing platforms have not addressed challenges related to target audience with regards to task assignment, whereby the tasks are assigned to relevant people with appropriate core skills and qualifications. Our proposed microtasking platform from previous research is meant to address some of these challenges. This microtasking platform allows a micro-employer to design a task and assign it to be completed by a specific crowd of a specific skill and qualification. The purpose of this paper is thus to explore the proposed microtasking platform implementation, evaluating its task assignment improvements and task quality, as it was designed to improve the task assigning model and ensure better utilization of the crowd while preserving anonymity. The results obtained from this paper indicate the implementation concept from the proposed approach and revealed other shortcomings.
{"title":"Evaluating the development and implementation of a profile-aware microtasking platform for crowdsourcing services","authors":"Sophia Moganedi, Njabulo Mkhonto, J. Mtsweni","doi":"10.1109/ICITST.2016.7856725","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856725","url":null,"abstract":"Crowdsourcing platforms have changed the assignment and completion of tasks from a known crowd to the anonymous crowd, which is the public. These crowdsourcing platforms allow organizations to focus on other tasks that need to be completed by a large crowd instead of the employees. However, many crowdsourcing platforms have not addressed challenges related to target audience with regards to task assignment, whereby the tasks are assigned to relevant people with appropriate core skills and qualifications. Our proposed microtasking platform from previous research is meant to address some of these challenges. This microtasking platform allows a micro-employer to design a task and assign it to be completed by a specific crowd of a specific skill and qualification. The purpose of this paper is thus to explore the proposed microtasking platform implementation, evaluating its task assignment improvements and task quality, as it was designed to improve the task assigning model and ensure better utilization of the crowd while preserving anonymity. The results obtained from this paper indicate the implementation concept from the proposed approach and revealed other shortcomings.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICITST.2016.7856661
G. Vidal, Rabei Bechikh, Rhouma Rhouma, S. Belghith
We present a commercial software based product that allows making audio and video conferences as well as sending encrypted instant messages that are based in a chaos stream cipher. This paper shows measurements on battery and bandwidth consumption and compares them with current state-of-the-art and widely used solutions. Results point that the chaos based system is more efficient than others. We also describe the lightweight encryption algorithm used in the application as well as some results concerning its security analysis. This system achieves savings of 95% on the CPU compared to AES-256-CBC.
{"title":"A commercial application of a chaos-based-stream cipher: Performance and Security analysis","authors":"G. Vidal, Rabei Bechikh, Rhouma Rhouma, S. Belghith","doi":"10.1109/ICITST.2016.7856661","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856661","url":null,"abstract":"We present a commercial software based product that allows making audio and video conferences as well as sending encrypted instant messages that are based in a chaos stream cipher. This paper shows measurements on battery and bandwidth consumption and compares them with current state-of-the-art and widely used solutions. Results point that the chaos based system is more efficient than others. We also describe the lightweight encryption algorithm used in the application as well as some results concerning its security analysis. This system achieves savings of 95% on the CPU compared to AES-256-CBC.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132172802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICITST.2016.7856687
F. Alotaibi, S. Furnell, I. Stengel, M. Papadaki
Rapid development has been observed in the deployment of communication technologies and the use of the Internet across the globe. Information exchange is the main aspect of use of such technologies in everyday life. Crimes associated with the misuse of information on the Internet are on the increase and are resulting in various losses. Saudi Arabia is one of the fastest developing countries in the Middle East, where the uptake of communication technologies such as the Internet and mobile technologies has risen sharply in recent years. These technologies are relatively new to the region when compared to developed countries. Therefore, the crimes associated with these technologies may be new to the people in the region. This paper investigates the cyber security awareness of the people in Saudi Arabia within different contexts. A quantitative online based survey was conducted to gather information related to cyber security awareness in Saudi Arabia. The study found that, although the participants had a good knowledge of IT, their awareness of the threats associated with cybercrime, cyber security practices, and the role of government and organisations in ensuring information safety across the Internet, is very limited. An application based model to create cyber security awareness in the region was preferred by the majority. The results indicated that, although cybercrime is on the rise, no specific approach is being followed to increase cyber security awareness in the region except for CERT regulations and online information on government websites. Additionally, Chi-Square test results (t(627)=3.85, p=0.013) indicated that Internet skills have an effect on cyber security practices from the users' end and there is an association between skill level and the security measures being implemented by organisations in the region. The study found that there is an immediate need to develop a model to create cyber security awareness in the region in order to combat cybercrime.
{"title":"A survey of cyber-security awareness in Saudi Arabia","authors":"F. Alotaibi, S. Furnell, I. Stengel, M. Papadaki","doi":"10.1109/ICITST.2016.7856687","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856687","url":null,"abstract":"Rapid development has been observed in the deployment of communication technologies and the use of the Internet across the globe. Information exchange is the main aspect of use of such technologies in everyday life. Crimes associated with the misuse of information on the Internet are on the increase and are resulting in various losses. Saudi Arabia is one of the fastest developing countries in the Middle East, where the uptake of communication technologies such as the Internet and mobile technologies has risen sharply in recent years. These technologies are relatively new to the region when compared to developed countries. Therefore, the crimes associated with these technologies may be new to the people in the region. This paper investigates the cyber security awareness of the people in Saudi Arabia within different contexts. A quantitative online based survey was conducted to gather information related to cyber security awareness in Saudi Arabia. The study found that, although the participants had a good knowledge of IT, their awareness of the threats associated with cybercrime, cyber security practices, and the role of government and organisations in ensuring information safety across the Internet, is very limited. An application based model to create cyber security awareness in the region was preferred by the majority. The results indicated that, although cybercrime is on the rise, no specific approach is being followed to increase cyber security awareness in the region except for CERT regulations and online information on government websites. Additionally, Chi-Square test results (t(627)=3.85, p=0.013) indicated that Internet skills have an effect on cyber security practices from the users' end and there is an association between skill level and the security measures being implemented by organisations in the region. The study found that there is an immediate need to develop a model to create cyber security awareness in the region in order to combat cybercrime.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128223479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICITST.2016.7856668
Mohamed A. Nassar, Layla A. A. El-Sayed, Y. Taha
Matrix factorization is an advanced and efficient technique for recommender systems. Recently, Stochastic Gradient Descent (SGD) method is considered to be one of the most popular techniques for matrix factorization. SGD is a sequential algorithm, which is difficult to be parallelized for large-scale problems. Nowadays, researches focus on efficiently parallelizing SGD. In this research, we propose an efficient parallel SGD method, ESGD, for GPU. ESGD is more efficient than recent parallel methods because it utilizes GPU, reducing non-coalesced access of global memory and achieving load balance of threads. In addition, ESGD does not require any sorting and/or data shuffling as preprocessing phase. Although platform used for ESGD implementation is old, ESGD demonstrates 12.5× speedup over state-of-the-art GPU method, BSGD.
{"title":"Efficient parallel Stochastic Gradient Descent for matrix factorization using GPU","authors":"Mohamed A. Nassar, Layla A. A. El-Sayed, Y. Taha","doi":"10.1109/ICITST.2016.7856668","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856668","url":null,"abstract":"Matrix factorization is an advanced and efficient technique for recommender systems. Recently, Stochastic Gradient Descent (SGD) method is considered to be one of the most popular techniques for matrix factorization. SGD is a sequential algorithm, which is difficult to be parallelized for large-scale problems. Nowadays, researches focus on efficiently parallelizing SGD. In this research, we propose an efficient parallel SGD method, ESGD, for GPU. ESGD is more efficient than recent parallel methods because it utilizes GPU, reducing non-coalesced access of global memory and achieving load balance of threads. In addition, ESGD does not require any sorting and/or data shuffling as preprocessing phase. Although platform used for ESGD implementation is old, ESGD demonstrates 12.5× speedup over state-of-the-art GPU method, BSGD.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133923762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICITST.2016.7856729
M. Alotaibi, S. Furnell, N. Clarke
Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one of the biggest potential threats to their cyber security. Employees are widely acknowledged to be responsible for security breaches in organisations, and it is important that these are given as much attention as are technical issues. A significant number of researchers have argued that non-compliance with information security policy is one of the major challenges facing organisations. This is primarily considered to be a human problem rather than a technical issue. Thus, it is not surprising that employees are one of the major underlying causes of breaches in information security. In this paper, academic literature and reports of information security institutes relating to policy compliance are reviewed. The objective is to provide an overview of the key challenges surrounding the successful implementation of information security policies. A further aim is to investigate the factors that may have an influence upon employees' behaviour in relation to information security policy. As a result, challenges to information security policy have been classified into four main groups: security policy promotion; noncompliance with security policy; security policy management and updating; and shadow security. Furthermore, the factors influencing behaviour have been divided into organisational and human factors. Ultimately, this paper concludes that continuously subjecting users to targeted awareness raising and dynamically monitoring their adherence to information security policy should increase the compliance level.
{"title":"Information security policies: A review of challenges and influencing factors","authors":"M. Alotaibi, S. Furnell, N. Clarke","doi":"10.1109/ICITST.2016.7856729","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856729","url":null,"abstract":"Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one of the biggest potential threats to their cyber security. Employees are widely acknowledged to be responsible for security breaches in organisations, and it is important that these are given as much attention as are technical issues. A significant number of researchers have argued that non-compliance with information security policy is one of the major challenges facing organisations. This is primarily considered to be a human problem rather than a technical issue. Thus, it is not surprising that employees are one of the major underlying causes of breaches in information security. In this paper, academic literature and reports of information security institutes relating to policy compliance are reviewed. The objective is to provide an overview of the key challenges surrounding the successful implementation of information security policies. A further aim is to investigate the factors that may have an influence upon employees' behaviour in relation to information security policy. As a result, challenges to information security policy have been classified into four main groups: security policy promotion; noncompliance with security policy; security policy management and updating; and shadow security. Furthermore, the factors influencing behaviour have been divided into organisational and human factors. Ultimately, this paper concludes that continuously subjecting users to targeted awareness raising and dynamically monitoring their adherence to information security policy should increase the compliance level.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"53 98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134269433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICITST.2016.7856735
Ilaria Torre, Frosina Koceva, Odnan Ref Sanchez, G. Adorni
IoT personal devices are having an undoubtedly explosive growth as many different products become available on the market such as smart watches, contact lenses, fitness bands, microchips under skin, among others. These devices and their related applications process the collected sensor data and use them to provide services to their users; in addition most of them require data from other applications in order to enhance their service. However, data sharing increases the risk for privacy protection since the aggregation of multiple data may favor the prediction of unrevealed private information. This paper presents a general framework for managing the issue of privacy protection from unwanted disclosure of personal data. The framework integrates two approaches in privacy protection: the use of personal data managers to control and manage user data sharing and the use of techniques for inference prevention. The contribution of the framework is to exploit the advantages of the two mentioned lines of research in a user-centric approach that empowers users with higher control of their data and makes them aware about data-sharing decisions.
{"title":"A framework for personal data protection in the IoT","authors":"Ilaria Torre, Frosina Koceva, Odnan Ref Sanchez, G. Adorni","doi":"10.1109/ICITST.2016.7856735","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856735","url":null,"abstract":"IoT personal devices are having an undoubtedly explosive growth as many different products become available on the market such as smart watches, contact lenses, fitness bands, microchips under skin, among others. These devices and their related applications process the collected sensor data and use them to provide services to their users; in addition most of them require data from other applications in order to enhance their service. However, data sharing increases the risk for privacy protection since the aggregation of multiple data may favor the prediction of unrevealed private information. This paper presents a general framework for managing the issue of privacy protection from unwanted disclosure of personal data. The framework integrates two approaches in privacy protection: the use of personal data managers to control and manage user data sharing and the use of techniques for inference prevention. The contribution of the framework is to exploit the advantages of the two mentioned lines of research in a user-centric approach that empowers users with higher control of their data and makes them aware about data-sharing decisions.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130541403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICITST.2016.7856706
M. Moyo, Marianne Loock
The research work in this paper focused on cloud security challenges that prevented South African small and medium-sized enterprises from adopting and using various cloud-based business intelligence systems. The study conducted a literature review on 39 publications which were meticulously extracted from various electronic databases. Only 7 publications (5 journal articles, 1 conference proceeding, and 1 report) focused on security as a challenge to adoption of cloud-based services and BI systems by small and medium-sized enterprises. The results of the literature review indicated that security threats and vulnerabilities in various cloud deployments and services, and mistrust of cloud service providers by small and medium-sized enterprises were the main security challenges to adoption of cloud-based BIs by small and medium-sized enterprises in South Africa. The study also established that standard tools used by large business enterprises were unavailable or inapplicable to small and medium-sized enterprises which intended to adopt and utilise cloud-based BI systems.
{"title":"South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review","authors":"M. Moyo, Marianne Loock","doi":"10.1109/ICITST.2016.7856706","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856706","url":null,"abstract":"The research work in this paper focused on cloud security challenges that prevented South African small and medium-sized enterprises from adopting and using various cloud-based business intelligence systems. The study conducted a literature review on 39 publications which were meticulously extracted from various electronic databases. Only 7 publications (5 journal articles, 1 conference proceeding, and 1 report) focused on security as a challenge to adoption of cloud-based services and BI systems by small and medium-sized enterprises. The results of the literature review indicated that security threats and vulnerabilities in various cloud deployments and services, and mistrust of cloud service providers by small and medium-sized enterprises were the main security challenges to adoption of cloud-based BIs by small and medium-sized enterprises in South Africa. The study also established that standard tools used by large business enterprises were unavailable or inapplicable to small and medium-sized enterprises which intended to adopt and utilise cloud-based BI systems.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICITST.2016.7856721
Tasneem Salah, M. Zemerly, C. Yeun, M. Al-Qutayri, Yousof Al-Hammadi
Applications developed to fulfil distributed systems needs have been growing rapidly. Major evolutions have happened beginning with basic architecture relying on initiated request by a client to a processing side referred to as the server. Such architectures were not enough to cope up with the fast ever-increasing number of requests and need to utilize network bandwidth. Mobile agents attempted to overcome such drawbacks but did cope up for so long with the growing technology platforms. Service Oriented Architecture (SOA) then evolved to be one of the most successful representations of the client-server architecture with an added business value that provides reusable and loosely coupled services. SOA did not meet customers and business expectations as it was still relying on monolithic systems. Resilience, scalability, fast software delivery and the use of fewer resources are highly desirable features. Microservices architecture came to fulfil those expectations of system development, yet it comes with many challenges. This paper illustrates how distributed systems evolved from the traditional client-server model to the recently proposed microservices architecture. All architectures are reviewed containing brief definitions, some related work and reasoning of why they had to evolve. A feature comparison of all architectures is also provided.
{"title":"The evolution of distributed systems towards microservices architecture","authors":"Tasneem Salah, M. Zemerly, C. Yeun, M. Al-Qutayri, Yousof Al-Hammadi","doi":"10.1109/ICITST.2016.7856721","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856721","url":null,"abstract":"Applications developed to fulfil distributed systems needs have been growing rapidly. Major evolutions have happened beginning with basic architecture relying on initiated request by a client to a processing side referred to as the server. Such architectures were not enough to cope up with the fast ever-increasing number of requests and need to utilize network bandwidth. Mobile agents attempted to overcome such drawbacks but did cope up for so long with the growing technology platforms. Service Oriented Architecture (SOA) then evolved to be one of the most successful representations of the client-server architecture with an added business value that provides reusable and loosely coupled services. SOA did not meet customers and business expectations as it was still relying on monolithic systems. Resilience, scalability, fast software delivery and the use of fewer resources are highly desirable features. Microservices architecture came to fulfil those expectations of system development, yet it comes with many challenges. This paper illustrates how distributed systems evolved from the traditional client-server model to the recently proposed microservices architecture. All architectures are reviewed containing brief definitions, some related work and reasoning of why they had to evolve. A feature comparison of all architectures is also provided.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-01DOI: 10.1109/ICITST.2016.7856730
Sean T. Miller, Curtis Busby-Earle
Over the past ten to fifteen years botnets have gained the attention of researchers worldwide. A great deal of effort has been given to developing systems that would efficiently and effectively detect the presence of a botnet. This unique problem saw researchers applying machine learning (ML) to solve this problem. In this paper we provide a brief overview the different machine learning (ML) methods and the part they play in botnet detection. The main aim of this paper is to clearly define the role different ML methods play in Botnet detection. A clear understanding of these roles are critical for developing effective and efficient real-time online detection approaches and more robust models.
{"title":"The role of machine learning in botnet detection","authors":"Sean T. Miller, Curtis Busby-Earle","doi":"10.1109/ICITST.2016.7856730","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856730","url":null,"abstract":"Over the past ten to fifteen years botnets have gained the attention of researchers worldwide. A great deal of effort has been given to developing systems that would efficiently and effectively detect the presence of a botnet. This unique problem saw researchers applying machine learning (ML) to solve this problem. In this paper we provide a brief overview the different machine learning (ML) methods and the part they play in botnet detection. The main aim of this paper is to clearly define the role different ML methods play in Botnet detection. A clear understanding of these roles are critical for developing effective and efficient real-time online detection approaches and more robust models.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121021247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}