Pub Date : 2018-05-01DOI: 10.1109/WAINA.2018.00169
Mohammad Alhabashneh, Bilal Abu-Salih, S. Knight
Learning difficulties are one of the significant barriers to the children's educational process. Learning difficulties include several aspects of life, not just learning at school and can affect how basic skills such as reading, writing and math are learned. Further, this problem affects how to learn high-level skills such as organization, time planning, abstract thinking, and long or short-term memory development. Hence, there is an imperative need to address this problem and to provide theoretical and practical solutions to untangle it. This paper proposes a methodology toward helping children to encounter learning difficulties through incorporating Web 2.0 technology. Through six designed phases, the proposed methodology is promising to enhance the learning quality of students with learning difficulties, and aims to improve their personal, mental and social development skills.
{"title":"Impact of Web 2.0 Technology on Students with Learning Difficulties: A State-of-the-Art and Future Challenges","authors":"Mohammad Alhabashneh, Bilal Abu-Salih, S. Knight","doi":"10.1109/WAINA.2018.00169","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00169","url":null,"abstract":"Learning difficulties are one of the significant barriers to the children's educational process. Learning difficulties include several aspects of life, not just learning at school and can affect how basic skills such as reading, writing and math are learned. Further, this problem affects how to learn high-level skills such as organization, time planning, abstract thinking, and long or short-term memory development. Hence, there is an imperative need to address this problem and to provide theoretical and practical solutions to untangle it. This paper proposes a methodology toward helping children to encounter learning difficulties through incorporating Web 2.0 technology. Through six designed phases, the proposed methodology is promising to enhance the learning quality of students with learning difficulties, and aims to improve their personal, mental and social development skills.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/WAINA.2018.00095
T. Abar, Asma BEN LETAIFA, S. E. Asmi
In recent years, networks have become an important channel for the distribution of multimedia data, mainly via the HTTP protocol. Several intelligent streaming protocols have been based on the HTTP protocol to achieve smooth, high-quality streaming and a better Quality of Experience (QoE). Among these protocols, there is the latest and the newest international standard MPEG DASH. This technique introduces an additional level of complexity for measuring perceived video quality, as it varies the video bit rate. This work adopts an SDN-based architecture framework that aims to optimize the QoE for video streaming in SDN networks using DASH protocol whilst also taking into account the variety of devices, video parameters and the network requirements. We try to model the optimization problem of QoE based on several parameters that effect the user perception such as stall number, bitrates ... Our module is composed of two phases: estimation phase of available resources based on Machine Learning, adaptation and selection phase based on the results of the first one.
{"title":"Enhancing QoE Based on Machine Learning and DASH in SDN Networks","authors":"T. Abar, Asma BEN LETAIFA, S. E. Asmi","doi":"10.1109/WAINA.2018.00095","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00095","url":null,"abstract":"In recent years, networks have become an important channel for the distribution of multimedia data, mainly via the HTTP protocol. Several intelligent streaming protocols have been based on the HTTP protocol to achieve smooth, high-quality streaming and a better Quality of Experience (QoE). Among these protocols, there is the latest and the newest international standard MPEG DASH. This technique introduces an additional level of complexity for measuring perceived video quality, as it varies the video bit rate. This work adopts an SDN-based architecture framework that aims to optimize the QoE for video streaming in SDN networks using DASH protocol whilst also taking into account the variety of devices, video parameters and the network requirements. We try to model the optimization problem of QoE based on several parameters that effect the user perception such as stall number, bitrates ... Our module is composed of two phases: estimation phase of available resources based on Machine Learning, adaptation and selection phase based on the results of the first one.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114335139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/WAINA.2018.00075
Shogo Nakasaki, Y. Yoshino, Makoto Ikeda, L. Barolli
In Vehicular Ad-hoc NETworks (VANETs), end-to-end communication becomes difficult because of dynamic change of network topology caused by high mobility of vehicles in the network. In order to deal with this problem, Delay/Disconnection/Disruption Tolerant Networking (DTN) can be a good approach. However, consumption of network resources and storage usage of each vehicle is a critical problem in VANETs. In this paper, we propose a recovery method for reducing storage usage of each vehicle for VANETs without additional message exchanges. We evaluate the proposed method by simulations. In this paper, we found that the proposed recovery method can manage the storage efficiently for a limited density of vehicles.
{"title":"A Recovery Method for Reducing Storage Usage Considering Number of Neighboring Nodes in VANETs","authors":"Shogo Nakasaki, Y. Yoshino, Makoto Ikeda, L. Barolli","doi":"10.1109/WAINA.2018.00075","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00075","url":null,"abstract":"In Vehicular Ad-hoc NETworks (VANETs), end-to-end communication becomes difficult because of dynamic change of network topology caused by high mobility of vehicles in the network. In order to deal with this problem, Delay/Disconnection/Disruption Tolerant Networking (DTN) can be a good approach. However, consumption of network resources and storage usage of each vehicle is a critical problem in VANETs. In this paper, we propose a recovery method for reducing storage usage of each vehicle for VANETs without additional message exchanges. We evaluate the proposed method by simulations. In this paper, we found that the proposed recovery method can manage the storage efficiently for a limited density of vehicles.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/WAINA.2018.00108
Lutz Schubert, Athanasios Tsitsipas, K. Jeffery
The world has moved from a single core, local application execution to distributed, parallel, social, heterogeneous etc. Standard ways of programming thus do not hold anymore and all software engineers struggle with the growing complexity that equally affects performance, maintainability and, worst of all, cost. The paper presents a concept arising from the EC Cloud Computing expert group between 2012 and 2016 as a means to move away from the hazards of traditional, Turing based computing concepts to an abstract and more natural way of programming. The concept builds up on three major building blocks, namely "Information", "Intention" and "Incentive" to define the behaviour of an application in a fashion that can abstract away from the actual way of executing an algorithm, thus allowing for a larger degree of adaptation, distribution and scale.
{"title":"How Cloud Computing, IoT and Multicore Systems Affect Software Engineering Principles","authors":"Lutz Schubert, Athanasios Tsitsipas, K. Jeffery","doi":"10.1109/WAINA.2018.00108","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00108","url":null,"abstract":"The world has moved from a single core, local application execution to distributed, parallel, social, heterogeneous etc. Standard ways of programming thus do not hold anymore and all software engineers struggle with the growing complexity that equally affects performance, maintainability and, worst of all, cost. The paper presents a concept arising from the EC Cloud Computing expert group between 2012 and 2016 as a means to move away from the hazards of traditional, Turing based computing concepts to an abstract and more natural way of programming. The concept builds up on three major building blocks, namely \"Information\", \"Intention\" and \"Incentive\" to define the behaviour of an application in a fashion that can abstract away from the actual way of executing an algorithm, thus allowing for a larger degree of adaptation, distribution and scale.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130850990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/WAINA.2018.00082
S. Kawanobe, Tomonobu Ozaki
Frequent itemset mining is the most fundamental problem in data mining. In this task, a set of items is adopted as a pattern, and all patterns frequently appearing in a database must be enumerated. While extensive research has been conducted over a long period, including proposals of sophisticated patterns for capturing interesting and meaningful information as well as developments of fast and scalable algorithms, low comprehensibility of obtained patterns is widely recognized as an unsolved essential drawback in frequent itemset mining. In this paper, to cope with this drawback, we propose to use representation learning to characterize each frequent pattern from various perspectives. Concretely speaking, we perform cluster analysis in the obtained vector space to identify representative and outlier patterns because we believe that these representatives and outliers must play important roles to understand the whole patterns. Furthermore, in order to obtain significant patterns having various roles to understand the pattern sets, we utilize the degree of centrality in a pattern network built by drawing edges among similar patterns. Experiments are conducted using a real dataset in Japanese video-sharing site Nicovideo (nicovideo.jp). The results show the effectiveness of the proposed framework for identifying characteristic patterns having various roles.
{"title":"Experimental Study of Characterizing Frequent Itemsets Using Representation Learning","authors":"S. Kawanobe, Tomonobu Ozaki","doi":"10.1109/WAINA.2018.00082","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00082","url":null,"abstract":"Frequent itemset mining is the most fundamental problem in data mining. In this task, a set of items is adopted as a pattern, and all patterns frequently appearing in a database must be enumerated. While extensive research has been conducted over a long period, including proposals of sophisticated patterns for capturing interesting and meaningful information as well as developments of fast and scalable algorithms, low comprehensibility of obtained patterns is widely recognized as an unsolved essential drawback in frequent itemset mining. In this paper, to cope with this drawback, we propose to use representation learning to characterize each frequent pattern from various perspectives. Concretely speaking, we perform cluster analysis in the obtained vector space to identify representative and outlier patterns because we believe that these representatives and outliers must play important roles to understand the whole patterns. Furthermore, in order to obtain significant patterns having various roles to understand the pattern sets, we utilize the degree of centrality in a pattern network built by drawing edges among similar patterns. Experiments are conducted using a real dataset in Japanese video-sharing site Nicovideo (nicovideo.jp). The results show the effectiveness of the proposed framework for identifying characteristic patterns having various roles.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130982199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/WAINA.2018.00081
Nawres Abdelwahed, Asma BEN LETAIFA, S. E. Asmi
Web Quality of Experience QoE is a measure of whether or not the customer's experience is satisfied with a service. QoE is interested in the whole service experience. QoE is a concept that resembles the user experience but in the telecommunications field. For a long time web QoE was mesured only in an objective way. Nowadays, subjective metrics are perceived as the best way to evaluate the QoE because humans have changing moods according to many parameters that we can't take them all into consideration, that's why we recure to subjective metrics. Mesuring the web QoE helps us ameliorate it. For that there are different ways of ameliorating the web QoE (network, content...). In this work we focus on ameliorating the web QoE through Software-Defined Networking (SDN) by displaying the appropriate web page quality to the user according to his wishes and the availability of the bandwidth in that specific moment and this among the different web pages of different qualities implemented at the SDN RYU Controller.
{"title":"Ameliorating the Web QoE Using SPA","authors":"Nawres Abdelwahed, Asma BEN LETAIFA, S. E. Asmi","doi":"10.1109/WAINA.2018.00081","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00081","url":null,"abstract":"Web Quality of Experience QoE is a measure of whether or not the customer's experience is satisfied with a service. QoE is interested in the whole service experience. QoE is a concept that resembles the user experience but in the telecommunications field. For a long time web QoE was mesured only in an objective way. Nowadays, subjective metrics are perceived as the best way to evaluate the QoE because humans have changing moods according to many parameters that we can't take them all into consideration, that's why we recure to subjective metrics. Mesuring the web QoE helps us ameliorate it. For that there are different ways of ameliorating the web QoE (network, content...). In this work we focus on ameliorating the web QoE through Software-Defined Networking (SDN) by displaying the appropriate web page quality to the user according to his wishes and the availability of the bandwidth in that specific moment and this among the different web pages of different qualities implemented at the SDN RYU Controller.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132107679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/WAINA.2018.00080
Y. Yoshino, Shogo Nakasaki, Makoto Ikeda, L. Barolli
Delay/Disruption/Disconnection Tolerant Networking (DTN) has the potential to interconnect vehicles for inter-vehicle communications. In our previous work, we evaluated the performance of our proposed message suppression controller considering priority for inter-vehicle communications. In this paper, we integrate the Enhanced Message Suppression Controller (EMSC) with Epidemic and MaxProp protocols and present the performance evaluation for Vehicular DTN (VDTN). We develop a simulation platform based on Scenargie network simulator considering IEEE 802.11p. From the simulation results, we found that our integrated EMSCs decreases the storage usages.
{"title":"An Integrated Message Suppression Controller with Epidemic and MaxProp Protocols: Performance Evaluation for VDTNs","authors":"Y. Yoshino, Shogo Nakasaki, Makoto Ikeda, L. Barolli","doi":"10.1109/WAINA.2018.00080","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00080","url":null,"abstract":"Delay/Disruption/Disconnection Tolerant Networking (DTN) has the potential to interconnect vehicles for inter-vehicle communications. In our previous work, we evaluated the performance of our proposed message suppression controller considering priority for inter-vehicle communications. In this paper, we integrate the Enhanced Message Suppression Controller (EMSC) with Epidemic and MaxProp protocols and present the performance evaluation for Vehicular DTN (VDTN). We develop a simulation platform based on Scenargie network simulator considering IEEE 802.11p. From the simulation results, we found that our integrated EMSCs decreases the storage usages.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123978874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/WAINA.2018.00125
B. D. Martino, Jessica Pascarella, Stefania Nacchia, Salvatore Augusto Maisto, P. Iannucci, Fabio Cerri
In the Cloud Computing field, with the increasing number of Cloud Services available thanks to several cloud providers, looking for a particular service has become very difficult, especially with the evolution of the stakeholders' needs. At the same time requirements specifications have become more and more complex to define in a formal representation and to analyse, since the stakeholders' goals are typically high-level, abstract, and hard-to-measure. For these reasons it would be useful to automate, as much as possible, requirements analysis. In this work we propose an automatic classification and modelling of requirements that are expressed in a natural language form, and an automatic identification of cloud services categories from requirements in order to support the development of a cloud application. Automated requirements analysis is not an easy subject, due to the natural languages variability and ambiguity, that's why different machine/deep learning and natural language processing approaches are used and compared. The target data set is provided by the Open-Security tera-PROMISE repository.
{"title":"Cloud Services Categories Identification from Requirements Specifications","authors":"B. D. Martino, Jessica Pascarella, Stefania Nacchia, Salvatore Augusto Maisto, P. Iannucci, Fabio Cerri","doi":"10.1109/WAINA.2018.00125","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00125","url":null,"abstract":"In the Cloud Computing field, with the increasing number of Cloud Services available thanks to several cloud providers, looking for a particular service has become very difficult, especially with the evolution of the stakeholders' needs. At the same time requirements specifications have become more and more complex to define in a formal representation and to analyse, since the stakeholders' goals are typically high-level, abstract, and hard-to-measure. For these reasons it would be useful to automate, as much as possible, requirements analysis. In this work we propose an automatic classification and modelling of requirements that are expressed in a natural language form, and an automatic identification of cloud services categories from requirements in order to support the development of a cloud application. Automated requirements analysis is not an easy subject, due to the natural languages variability and ambiguity, that's why different machine/deep learning and natural language processing approaches are used and compared. The target data set is provided by the Open-Security tera-PROMISE repository.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129685101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/WAINA.2018.00057
Hiroki Kuzuno, S. Otsuka
Network security incident (network incident) is an important topic in the around world. Network operators and security vendors tackle these network incidents consist of many cyber crimes. The types of threats are DDoS, phishing, malware, vulnerability attacks to take control a device, and extortion case. Network operators consider protecting their environment from threats. They have to observe a trend of threat, then could trace suspicious network traffic flows on what network. Some organization and individual persons publish open security information related to past a network incident. In order to identify which network covers on suspicious activity, we collect open security information as the dataset to analyze these for providing a summary of network operators' IP addresses lead to network incident. The result is not only useful information to get a trend of threat pattern, but also we quickly handle a countermeasure to it when real network incident has happened in their environment. In the evaluation, we verify the result of proposed framework could handle the trend of network incident cases. We determine the result whether provides security threat or not based on security vendors reports. The evaluation result shows the proposed framework could identify the SSH brute force attack and other attacks before the security vendor discloses it. It is useful for supporting of network operators and community to observe the latest network incident when it occurs in their environment.
{"title":"Early Detection of Network Incident Using Open Security Information","authors":"Hiroki Kuzuno, S. Otsuka","doi":"10.1109/WAINA.2018.00057","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00057","url":null,"abstract":"Network security incident (network incident) is an important topic in the around world. Network operators and security vendors tackle these network incidents consist of many cyber crimes. The types of threats are DDoS, phishing, malware, vulnerability attacks to take control a device, and extortion case. Network operators consider protecting their environment from threats. They have to observe a trend of threat, then could trace suspicious network traffic flows on what network. Some organization and individual persons publish open security information related to past a network incident. In order to identify which network covers on suspicious activity, we collect open security information as the dataset to analyze these for providing a summary of network operators' IP addresses lead to network incident. The result is not only useful information to get a trend of threat pattern, but also we quickly handle a countermeasure to it when real network incident has happened in their environment. In the evaluation, we verify the result of proposed framework could handle the trend of network incident cases. We determine the result whether provides security threat or not based on security vendors reports. The evaluation result shows the proposed framework could identify the SSH brute force attack and other attacks before the security vendor discloses it. It is useful for supporting of network operators and community to observe the latest network incident when it occurs in their environment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/WAINA.2018.00131
Mohammed Suhel Inamdar, Ali Tekeoglu
Enterprise networks depend on Network Access Control software to restrict access to valuable resources. Significant number of attacks come from internal threats, such as disgruntled employees and infected personal devices brought into the company network. Network Access Control software plays an important role in detecting and protecting against these kind of threats. Most companies maintain huge and complex internal networks that form the backbone of their business and the safe harbor for their intellectual property. Thus, its essential to make sure each machine and user has only the right amount of access to the corporate network. With the widespread use of mobile and IoT devices integrating dynamically to corporate networks, this task gets even more complicated. Virtual Local Area Networks (VLANs) are heavily employed to securely partition the intranet because of the suitability for a corporate setting. In this paper, we have evaluated the security of PacketFence Network Access Control server, installed within GNS3 network emulator. Using an open-source tool named Yersinia to carry out experiments, we proved that attacks are viable and realistic. We showed different possible ways to attack the PacketFence network along with how to prevent.
企业网络依靠网络访问控制软件来限制对有价值资源的访问。大量的攻击来自内部威胁,例如心怀不满的员工和被感染的个人设备带入公司网络。网络访问控制软件在检测和防范此类威胁方面发挥着重要作用。大多数公司都拥有庞大而复杂的内部网络,这些网络构成了他们业务的支柱和知识产权的安全港。因此,必须确保每台机器和用户只有适当数量的访问公司网络的权限。随着移动和物联网设备的广泛使用,动态集成到企业网络中,这项任务变得更加复杂。虚拟局域网(Virtual Local Area network, vlan)被大量用于对企业内网进行安全分区,因为它适合于企业环境。本文对安装在GNS3网络模拟器中的PacketFence网络访问控制服务器的安全性进行了评估。使用一个名为耶尔森尼亚的开源工具进行实验,我们证明了攻击是可行的和现实的。我们展示了攻击PacketFence网络的不同可能方法以及如何预防。
{"title":"Security Analysis of Open Source Network Access Control in Virtual Networks","authors":"Mohammed Suhel Inamdar, Ali Tekeoglu","doi":"10.1109/WAINA.2018.00131","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00131","url":null,"abstract":"Enterprise networks depend on Network Access Control software to restrict access to valuable resources. Significant number of attacks come from internal threats, such as disgruntled employees and infected personal devices brought into the company network. Network Access Control software plays an important role in detecting and protecting against these kind of threats. Most companies maintain huge and complex internal networks that form the backbone of their business and the safe harbor for their intellectual property. Thus, its essential to make sure each machine and user has only the right amount of access to the corporate network. With the widespread use of mobile and IoT devices integrating dynamically to corporate networks, this task gets even more complicated. Virtual Local Area Networks (VLANs) are heavily employed to securely partition the intranet because of the suitability for a corporate setting. In this paper, we have evaluated the security of PacketFence Network Access Control server, installed within GNS3 network emulator. Using an open-source tool named Yersinia to carry out experiments, we proved that attacks are viable and realistic. We showed different possible ways to attack the PacketFence network along with how to prevent.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128907707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}