首页 > 最新文献

5th International Conference on Computer Science, Information Technology (CSITEC 2019)最新文献

英文 中文
Multi-Variable Linear Regression-Based Prediction of A Computationally-Heavy Link Stability Metric for Mobile Sensor Networks 基于多变量线性回归的移动传感器网络计算量大的链路稳定性指标预测
N. Meghanathan
Until now, we were determining stable data gathering (DG) trees for mobile sensor networks (MSNs) using a link stability metric (computationally-light or computationally-heavy) that is directly computed on the egocentric edge network. Among such DG trees, the BPI' (complement of bipartivity index)-based DG trees were observed to be the most stable, but the BPI' metric is also computationally-heavy. Hence, we seek to build a multi-variable linear regression model to predict the BPI' values for the egocentric networks of edges using three computationally-light metrics (neighborhood overlap: NOVER, one-hop two-hop neighborhood: OTH, and normalized neighbor degree: NND) that are also computed on the egocentric edge networks. The training and testing are conducted as part of a single simulation run (i.e., in-situ). The training dataset comprises of the BPI', NOVER, OTH and NND values of randomly sampled egocentric edge networks during the first phase of the simulation (1/5th of the total simulation time). We observe the R-square values for the prediction to be above 0.85 for both low density and high density networks. We also observe the lifetimes of the predicted BPI'-based DG trees to be 87-92% and 55-75% of the actual BPI'-based DG trees for low-moderate and moderate-high density networks respectively.
到目前为止,我们一直在使用直接在自我中心边缘网络上计算的链路稳定性度量(计算量轻或计算量重)来确定移动传感器网络(msn)的稳定数据收集(DG)树。在这些DG树中,基于BPI的DG树被观察到是最稳定的,但BPI的度量也计算量很大。因此,我们试图建立一个多变量线性回归模型,使用三个计算轻的度量(邻域重叠:NOVER,一跳两跳邻域:OTH和归一化邻居度:NND)来预测自中心边缘网络的BPI值,这些度量也是在自中心边缘网络上计算的。培训和测试是作为单一模拟运行的一部分进行的(即,现场)。训练数据集包括模拟第一阶段(总模拟时间的1/5)随机采样的自中心边缘网络的BPI', NOVER, OTH和NND值。我们观察到,对于低密度和高密度网络,预测的r平方值都在0.85以上。我们还观察到,在低-中等密度和中-高密度网络中,预测的基于BPI'的DG树的寿命分别为实际基于BPI'的DG树的87-92%和55-75%。
{"title":"Multi-Variable Linear Regression-Based Prediction of A Computationally-Heavy Link Stability Metric for Mobile Sensor Networks","authors":"N. Meghanathan","doi":"10.5121/csit.2019.91103","DOIUrl":"https://doi.org/10.5121/csit.2019.91103","url":null,"abstract":"Until now, we were determining stable data gathering (DG) trees for mobile sensor networks (MSNs) using a link stability metric (computationally-light or computationally-heavy) that is directly computed on the egocentric edge network. Among such DG trees, the BPI' (complement of bipartivity index)-based DG trees were observed to be the most stable, but the BPI' metric is also computationally-heavy. Hence, we seek to build a multi-variable linear regression model to predict the BPI' values for the egocentric networks of edges using three computationally-light metrics (neighborhood overlap: NOVER, one-hop two-hop neighborhood: OTH, and normalized neighbor degree: NND) that are also computed on the egocentric edge networks. The training and testing are conducted as part of a single simulation run (i.e., in-situ). The training dataset comprises of the BPI', NOVER, OTH and NND values of randomly sampled egocentric edge networks during the first phase of the simulation (1/5th of the total simulation time). We observe the R-square values for the prediction to be above 0.85 for both low density and high density networks. We also observe the lifetimes of the predicted BPI'-based DG trees to be 87-92% and 55-75% of the actual BPI'-based DG trees for low-moderate and moderate-high density networks respectively.","PeriodicalId":285934,"journal":{"name":"5th International Conference on Computer Science, Information Technology (CSITEC 2019)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116322507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Feasibility of Using Behavioural Profiling Technique for Mitigating Insider Threats: Review 使用行为分析技术减轻内部威胁的可行性:综述
Gaseb Alotibi, N. Clarke, Fudong Li, S. Furnell
Insider threat has become a serious issue to the many organizations. Various companies are increasingly deploying many information technologies to prevent unauthorized access to getting inside their system. Biometrics approaches have some techniques that contribute towards controlling the point of entry. However, these methods mainly are not able to continuously validate the users reliability. In contrast behavioral profiling is one of the biometrics technologies but it focusing on the activities of the users during using the system and comparing that with a previous history. This paper presents a comprehensive analysis, literature review and limitations on behavioral profiling approach and to what extent that can be used for mitigating insider misuse.
内部威胁已经成为许多组织面临的严重问题。各种公司越来越多地部署许多信息技术,以防止未经授权的访问进入他们的系统。生物识别方法有一些有助于控制入境点的技术。然而,这些方法主要不能持续验证用户的可靠性。相比之下,行为分析是一种生物识别技术,但它关注的是用户在使用系统期间的活动,并将其与以前的历史进行比较。本文提出了一个全面的分析,文献综述和行为分析方法的局限性,以及在多大程度上可以用于减轻内部滥用。
{"title":"The Feasibility of Using Behavioural Profiling Technique for Mitigating Insider Threats: Review","authors":"Gaseb Alotibi, N. Clarke, Fudong Li, S. Furnell","doi":"10.5121/csit.2019.91106","DOIUrl":"https://doi.org/10.5121/csit.2019.91106","url":null,"abstract":"Insider threat has become a serious issue to the many organizations. Various companies are increasingly deploying many information technologies to prevent unauthorized access to getting inside their system. Biometrics approaches have some techniques that contribute towards controlling the point of entry. However, these methods mainly are not able to continuously validate the users reliability. In contrast behavioral profiling is one of the biometrics technologies but it focusing on the activities of the users during using the system and comparing that with a previous history. This paper presents a comprehensive analysis, literature review and limitations on behavioral profiling approach and to what extent that can be used for mitigating insider misuse.","PeriodicalId":285934,"journal":{"name":"5th International Conference on Computer Science, Information Technology (CSITEC 2019)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133301685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matbase – A Tool for Transparent Programming While Modelling Data at Conceptual Levels 一个透明编程的工具,同时在概念层面对数据建模
Christian Mancas
MatBase is a prototype intelligent data and knowledge base management system based on the Relational, Entity-Relationship, and (Elementary) Mathematical Data Models, having two current versions (MS SQL Server and C#, MS Access and VBA). Users may work with it only at one or any combination of these conceptual levels, without any programming knowledge (be it SQL, C#, VBA, etc.), to create, populate, update, and delete databases and corresponding management software applications. The paper introduces the MatBase architecture and the principles used to transparently program while modelling data at these three conceptual levels with this tool. A real-life example illustrates them.
MatBase是一个基于关系、实体-关系和(初级)数学数据模型的智能数据和知识库管理系统的原型,目前有两个版本(MS SQL Server和c#, MS Access和VBA)。用户可以只在这些概念级别的一个或任何组合上使用它,而不需要任何编程知识(无论是SQL, c#, VBA等)来创建,填充,更新和删除数据库和相应的管理软件应用程序。本文介绍了MatBase的体系结构以及使用该工具在这三个概念层对数据建模时透明编程的原则。一个现实生活中的例子说明了这一点。
{"title":"Matbase – A Tool for Transparent Programming While Modelling Data at Conceptual Levels","authors":"Christian Mancas","doi":"10.5121/csit.2019.91102","DOIUrl":"https://doi.org/10.5121/csit.2019.91102","url":null,"abstract":"MatBase is a prototype intelligent data and knowledge base management system based on the Relational, Entity-Relationship, and (Elementary) Mathematical Data Models, having two current versions (MS SQL Server and C#, MS Access and VBA). Users may work with it only at one or any combination of these conceptual levels, without any programming knowledge (be it SQL, C#, VBA, etc.), to create, populate, update, and delete databases and corresponding management software applications. The paper introduces the MatBase architecture and the principles used to transparently program while modelling data at these three conceptual levels with this tool. A real-life example illustrates them.","PeriodicalId":285934,"journal":{"name":"5th International Conference on Computer Science, Information Technology (CSITEC 2019)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124292515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Information –Symmetry and Feynman-Diagrams Applied to Computing Models 信息对称和费曼图在计算模型中的应用
Carlos Martinez, A. González, Ewa Nieminsky
The evolving complexity of modern technologies brings new concepts, solutions, tools, but also new needs and problems. We review a computing and communication model inspired in physics, to examine complex systems under a perspective of physics-inspired principles like symmetry and conservation-laws. Aiming to help design, build, and control systems, we apply concepts like Information-Symmetry, propagation of information, or inertia to model communications. Modelling computing under physics reactions and conservation laws gives tools to automatically audit each process and create side effects on deviations, bringing advantages in verification, security, and to gain reliability. We review the Feynman-diagrams in computing, rotating diagrams to obtain reversible operations from one formula, and using the diagrams to verify consistency against a unique computing expression. Applications include dealing with data uncertainty, we show advantages to control fuzzy systems and reduce dataset needing further screening. Model and diagrams are proposed as tools to help automate and refine designs, and to gain in reliability.
现代技术不断发展的复杂性带来了新的概念、解决方案和工具,但也带来了新的需求和问题。我们回顾了一个受物理学启发的计算和通信模型,从对称和守恒定律等物理学启发的原理的角度来研究复杂的系统。为了帮助设计、构建和控制系统,我们应用信息对称、信息传播或惯性等概念来建模通信。根据物理反应和守恒定律对计算进行建模,提供了自动审核每个过程并对偏差产生副作用的工具,在验证、安全性和获得可靠性方面具有优势。我们回顾了计算中的费曼图,旋转图从一个公式中获得可逆操作,并使用图来验证对唯一计算表达式的一致性。应用包括处理数据不确定性,我们展示了控制模糊系统和减少需要进一步筛选的数据集的优势。模型和图表被建议作为工具来帮助自动化和改进设计,并获得可靠性。
{"title":"Information –Symmetry and Feynman-Diagrams Applied to Computing Models","authors":"Carlos Martinez, A. González, Ewa Nieminsky","doi":"10.5121/csit.2019.91108","DOIUrl":"https://doi.org/10.5121/csit.2019.91108","url":null,"abstract":"The evolving complexity of modern technologies brings new concepts, solutions, tools, but also new needs and problems. We review a computing and communication model inspired in physics, to examine complex systems under a perspective of physics-inspired principles like symmetry and conservation-laws. Aiming to help design, build, and control systems, we apply concepts like Information-Symmetry, propagation of information, or inertia to model communications. Modelling computing under physics reactions and conservation laws gives tools to automatically audit each process and create side effects on deviations, bringing advantages in verification, security, and to gain reliability. We review the Feynman-diagrams in computing, rotating diagrams to obtain reversible operations from one formula, and using the diagrams to verify consistency against a unique computing expression. Applications include dealing with data uncertainty, we show advantages to control fuzzy systems and reduce dataset needing further screening. Model and diagrams are proposed as tools to help automate and refine designs, and to gain in reliability.","PeriodicalId":285934,"journal":{"name":"5th International Conference on Computer Science, Information Technology (CSITEC 2019)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130784020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Augmented Intelligence Model to Extract Pragmatic Markers 一种增强智能模型提取语用标记
V. Perincherry, David White, Staci Warden
This paper presents a novel methodology for automatically extracting pragmatic markers from large streams of texts and repositories of documents. Pragmatic markers typically are implications, innuendos, suggestions, contradictions, sarcasms or references that are difficult to define objectively, but that are subjectively evident. Our methodology uses a two-stage augmented learning model applied to a specific use case, extracting from a repository of over 1500 Article IV country reports prepared for government officials by International Monetary Fund (IMF) staff. The model uses principles of evidence theory to train a machine to decipher the textual patterns of suggested actions for government officials and to extract those suggestions from the country reports at scale. We demonstrate the effectiveness of the model with impressive precision and recall metrics that over time outperform even the human trainers.
本文提出了一种从大量文本流和文档库中自动提取语用标记的新方法。语用标记通常是暗示、含沙射影、暗示、矛盾、讽刺或参考,难以客观定义,但主观上是明显的。我们的方法采用了一种适用于特定用例的两阶段增强学习模型,从国际货币基金组织(IMF)工作人员为政府官员准备的1500多份第四条国家报告的存储库中提取。该模型使用证据理论的原理来训练一台机器,以破译政府官员建议行动的文本模式,并从国家报告中大规模提取这些建议。我们以令人印象深刻的精度和召回指标证明了该模型的有效性,随着时间的推移,它的表现甚至超过了人类训练师。
{"title":"An Augmented Intelligence Model to Extract Pragmatic Markers","authors":"V. Perincherry, David White, Staci Warden","doi":"10.5121/csit.2019.91110","DOIUrl":"https://doi.org/10.5121/csit.2019.91110","url":null,"abstract":"This paper presents a novel methodology for automatically extracting pragmatic markers from large streams of texts and repositories of documents. Pragmatic markers typically are implications, innuendos, suggestions, contradictions, sarcasms or references that are difficult to define objectively, but that are subjectively evident. Our methodology uses a two-stage augmented learning model applied to a specific use case, extracting from a repository of over 1500 Article IV country reports prepared for government officials by International Monetary Fund (IMF) staff. The model uses principles of evidence theory to train a machine to decipher the textual patterns of suggested actions for government officials and to extract those suggestions from the country reports at scale. We demonstrate the effectiveness of the model with impressive precision and recall metrics that over time outperform even the human trainers.","PeriodicalId":285934,"journal":{"name":"5th International Conference on Computer Science, Information Technology (CSITEC 2019)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inspection of Methods of Empirical Mode Decomposition 经验模态分解方法检验
Roberto Hern'andez Santander, E. Casallas
Empirical Mode Decomposition is an adaptive and local tool that extracts underlying analytical components of a non-linear and non-stationary process, in turn, is the basis of Hilbert Huang transform, however, there are problems such as interfering modes or ensuring the orthogonality of decomposition. Three variants of the algorithm are evaluated, with different experimental parameters and on a set of 10 time series obtained from surface electromyography. Experimental results show that obtaining low error in reconstruction with the analytical signals obtained from a process is not a valid characteristic to ensure that the purpose of decomposition has been fulfilled (physical significance and no interference between modes), in addition, freedom must be generated in the iterative processes of decomposition so that it has consistency and does not generate biased information. This project was developed within the framework of the research group DIGITI of the Universidad Distrital Francisco Jose de Caldas.
经验模态分解是一种自适应和局部的工具,它提取非线性和非平稳过程的潜在分析成分,反过来,是Hilbert Huang变换的基础,然而,存在诸如干扰模式或确保分解的正交性等问题。用不同的实验参数和从表面肌电图获得的一组10个时间序列对算法的三种变体进行了评估。实验结果表明,对一个过程得到的解析信号进行重构时获得低误差并不是保证分解目的(物理意义和模间无干扰)得以实现的有效特征,而且在分解的迭代过程中必须产生自由度,使其具有一致性,不产生偏倚信息。该项目是在弗朗西斯科·何塞·德·卡尔达斯大学DIGITI研究小组的框架内开发的。
{"title":"Inspection of Methods of Empirical Mode Decomposition","authors":"Roberto Hern'andez Santander, E. Casallas","doi":"10.5121/csit.2019.91104","DOIUrl":"https://doi.org/10.5121/csit.2019.91104","url":null,"abstract":"Empirical Mode Decomposition is an adaptive and local tool that extracts underlying analytical components of a non-linear and non-stationary process, in turn, is the basis of Hilbert Huang transform, however, there are problems such as interfering modes or ensuring the orthogonality of decomposition. Three variants of the algorithm are evaluated, with different experimental parameters and on a set of 10 time series obtained from surface electromyography. Experimental results show that obtaining low error in reconstruction with the analytical signals obtained from a process is not a valid characteristic to ensure that the purpose of decomposition has been fulfilled (physical significance and no interference between modes), in addition, freedom must be generated in the iterative processes of decomposition so that it has consistency and does not generate biased information. This project was developed within the framework of the research group DIGITI of the Universidad Distrital Francisco Jose de Caldas.","PeriodicalId":285934,"journal":{"name":"5th International Conference on Computer Science, Information Technology (CSITEC 2019)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126583439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative Study Between Decision Trees and Neural Networks to Predictfatal Road Accidents in Lebanon 决策树与神经网络在黎巴嫩致命交通事故预测中的比较研究
Z. Farhat, Ali Karouni, B. Daya, P. Chauvet
Nowadays, road traffic accidents are one of the leading causes of deaths in this world. It is a complex phenomenon leaving a significant negative impact on human’s life and properties. Classification techniques of data mining are found efficient to deal with such phenomena. After collecting data from Lebanese Internal Security Forces, data are split into training and testing sets using 10-fold cross validation. This paper aims to apply two different algorithms of Decision Trees C4.5 and CART, and various Artificial Neural Networks (MLP) in order to predict the fatality of road accidents in Lebanon. Afterwards, a comparative study is made to find the best performing algorithm. The results have shown that MLP with 2 hidden layers and 42 neurons in each layer is the best algorithm with accuracy rate of prediction (94.6%) and area under curve (AUC 95.71%).
如今,道路交通事故是世界上导致死亡的主要原因之一。它是一种复杂的现象,对人类的生命和财产造成了重大的负面影响。数据挖掘的分类技术可以有效地处理这种现象。在从黎巴嫩内部安全部队收集数据后,使用10倍交叉验证将数据分为训练集和测试集。本文旨在应用决策树C4.5和CART两种不同的算法,以及各种人工神经网络(MLP)来预测黎巴嫩道路交通事故的死亡人数。然后进行比较研究,找出性能最好的算法。结果表明,2个隐藏层,每层42个神经元的MLP是预测准确率(94.6%)和曲线下面积(AUC)为95.71%的最佳算法。
{"title":"Comparative Study Between Decision Trees and Neural Networks to Predictfatal Road Accidents in Lebanon","authors":"Z. Farhat, Ali Karouni, B. Daya, P. Chauvet","doi":"10.5121/csit.2019.91101","DOIUrl":"https://doi.org/10.5121/csit.2019.91101","url":null,"abstract":"Nowadays, road traffic accidents are one of the leading causes of deaths in this world. It is a complex phenomenon leaving a significant negative impact on human’s life and properties. Classification techniques of data mining are found efficient to deal with such phenomena. After collecting data from Lebanese Internal Security Forces, data are split into training and testing sets using 10-fold cross validation. This paper aims to apply two different algorithms of Decision Trees C4.5 and CART, and various Artificial Neural Networks (MLP) in order to predict the fatality of road accidents in Lebanon. Afterwards, a comparative study is made to find the best performing algorithm. The results have shown that MLP with 2 hidden layers and 42 neurons in each layer is the best algorithm with accuracy rate of prediction (94.6%) and area under curve (AUC 95.71%).","PeriodicalId":285934,"journal":{"name":"5th International Conference on Computer Science, Information Technology (CSITEC 2019)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mitigate Content Poisoning Attack in NDN by Namespace Authorization 利用命名空间授权缓解NDN中的内容投毒攻击
Pengfei Yue, Bin Pang
The Named Data Networking (NDN) immunes to most of the attacks which exist in today’s Internet. However, this newborn network architecture may still subject to Distributed Denial of Service (DDOS) attacks if less evaluation is paid. In this paper, we firstly give a survey of the state of art works on the mitigations of the Content Poisoning Attack (CPA) in NDN and discuss their limitations as well. After this, we give out our mitigation and the results from simulations show that with the implementation of our mitigation, the Interest Satisfaction Rate (ISR) of all Consumers maintains a highly acceptable rate even when network is under CPA.
命名数据网络(NDN)对当今互联网中存在的大多数攻击免疫。然而,这种新生的网络架构仍然可能受到分布式拒绝服务(DDOS)攻击,如果支付较少的评估。本文首先对NDN中内容投毒攻击(CPA)的缓解工作现状进行了综述,并讨论了它们的局限性。在此之后,我们给出了我们的缓解措施,仿真结果表明,通过实施我们的缓解措施,即使网络处于CPA下,所有消费者的利率满意度(ISR)也保持在一个高度可接受的水平。
{"title":"Mitigate Content Poisoning Attack in NDN by Namespace Authorization","authors":"Pengfei Yue, Bin Pang","doi":"10.5121/csit.2019.91109","DOIUrl":"https://doi.org/10.5121/csit.2019.91109","url":null,"abstract":"The Named Data Networking (NDN) immunes to most of the attacks which exist in today’s Internet. However, this newborn network architecture may still subject to Distributed Denial of Service (DDOS) attacks if less evaluation is paid. In this paper, we firstly give a survey of the state of art works on the mitigations of the Content Poisoning Attack (CPA) in NDN and discuss their limitations as well. After this, we give out our mitigation and the results from simulations show that with the implementation of our mitigation, the Interest Satisfaction Rate (ISR) of all Consumers maintains a highly acceptable rate even when network is under CPA.","PeriodicalId":285934,"journal":{"name":"5th International Conference on Computer Science, Information Technology (CSITEC 2019)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122372496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
5th International Conference on Computer Science, Information Technology (CSITEC 2019)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1