首页 > 最新文献

2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)最新文献

英文 中文
Impact of Web 2.0 Technology on Students with Learning Difficulties: A State-of-the-Art and Future Challenges Web 2.0技术对学习困难学生的影响:现状和未来的挑战
Mohammad Alhabashneh, Bilal Abu-Salih, S. Knight
Learning difficulties are one of the significant barriers to the children's educational process. Learning difficulties include several aspects of life, not just learning at school and can affect how basic skills such as reading, writing and math are learned. Further, this problem affects how to learn high-level skills such as organization, time planning, abstract thinking, and long or short-term memory development. Hence, there is an imperative need to address this problem and to provide theoretical and practical solutions to untangle it. This paper proposes a methodology toward helping children to encounter learning difficulties through incorporating Web 2.0 technology. Through six designed phases, the proposed methodology is promising to enhance the learning quality of students with learning difficulties, and aims to improve their personal, mental and social development skills.
学习困难是影响儿童教育进程的重要障碍之一。学习困难包括生活的几个方面,而不仅仅是在学校学习,它会影响阅读、写作和数学等基本技能的学习。此外,这个问题影响到如何学习高级技能,如组织、时间规划、抽象思维和长期或短期记忆的发展。因此,迫切需要解决这个问题,并提供理论和实践的解决方案来解开它。本文提出了一种方法,通过结合Web 2.0技术来帮助遇到学习困难的儿童。通过六个设计阶段,建议的方法有望提高有学习困难的学生的学习质量,并旨在提高他们的个人、心理和社会发展技能。
{"title":"Impact of Web 2.0 Technology on Students with Learning Difficulties: A State-of-the-Art and Future Challenges","authors":"Mohammad Alhabashneh, Bilal Abu-Salih, S. Knight","doi":"10.1109/WAINA.2018.00169","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00169","url":null,"abstract":"Learning difficulties are one of the significant barriers to the children's educational process. Learning difficulties include several aspects of life, not just learning at school and can affect how basic skills such as reading, writing and math are learned. Further, this problem affects how to learn high-level skills such as organization, time planning, abstract thinking, and long or short-term memory development. Hence, there is an imperative need to address this problem and to provide theoretical and practical solutions to untangle it. This paper proposes a methodology toward helping children to encounter learning difficulties through incorporating Web 2.0 technology. Through six designed phases, the proposed methodology is promising to enhance the learning quality of students with learning difficulties, and aims to improve their personal, mental and social development skills.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing QoE Based on Machine Learning and DASH in SDN Networks SDN网络中基于机器学习和DASH的QoE增强
T. Abar, Asma BEN LETAIFA, S. E. Asmi
In recent years, networks have become an important channel for the distribution of multimedia data, mainly via the HTTP protocol. Several intelligent streaming protocols have been based on the HTTP protocol to achieve smooth, high-quality streaming and a better Quality of Experience (QoE). Among these protocols, there is the latest and the newest international standard MPEG DASH. This technique introduces an additional level of complexity for measuring perceived video quality, as it varies the video bit rate. This work adopts an SDN-based architecture framework that aims to optimize the QoE for video streaming in SDN networks using DASH protocol whilst also taking into account the variety of devices, video parameters and the network requirements. We try to model the optimization problem of QoE based on several parameters that effect the user perception such as stall number, bitrates ... Our module is composed of two phases: estimation phase of available resources based on Machine Learning, adaptation and selection phase based on the results of the first one.
近年来,网络已成为多媒体数据分发的重要渠道,主要通过HTTP协议。一些基于HTTP协议的智能流协议已经实现了流畅、高质量的流和更好的体验质量(QoE)。在这些协议中,有最新的和最新的国际标准MPEG DASH。这种技术为测量感知视频质量带来了额外的复杂性,因为它改变了视频比特率。本工作采用基于SDN的架构框架,旨在利用DASH协议优化SDN网络中视频流的QoE,同时考虑各种设备、视频参数和网络需求。我们尝试基于影响用户感知的几个参数(如失速数、比特率……)来建模QoE的优化问题。我们的模块由两个阶段组成:基于机器学习的可用资源估计阶段,基于第一个结果的适应和选择阶段。
{"title":"Enhancing QoE Based on Machine Learning and DASH in SDN Networks","authors":"T. Abar, Asma BEN LETAIFA, S. E. Asmi","doi":"10.1109/WAINA.2018.00095","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00095","url":null,"abstract":"In recent years, networks have become an important channel for the distribution of multimedia data, mainly via the HTTP protocol. Several intelligent streaming protocols have been based on the HTTP protocol to achieve smooth, high-quality streaming and a better Quality of Experience (QoE). Among these protocols, there is the latest and the newest international standard MPEG DASH. This technique introduces an additional level of complexity for measuring perceived video quality, as it varies the video bit rate. This work adopts an SDN-based architecture framework that aims to optimize the QoE for video streaming in SDN networks using DASH protocol whilst also taking into account the variety of devices, video parameters and the network requirements. We try to model the optimization problem of QoE based on several parameters that effect the user perception such as stall number, bitrates ... Our module is composed of two phases: estimation phase of available resources based on Machine Learning, adaptation and selection phase based on the results of the first one.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114335139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Recovery Method for Reducing Storage Usage Considering Number of Neighboring Nodes in VANETs 一种考虑vanet中相邻节点数量的减少存储使用的恢复方法
Shogo Nakasaki, Y. Yoshino, Makoto Ikeda, L. Barolli
In Vehicular Ad-hoc NETworks (VANETs), end-to-end communication becomes difficult because of dynamic change of network topology caused by high mobility of vehicles in the network. In order to deal with this problem, Delay/Disconnection/Disruption Tolerant Networking (DTN) can be a good approach. However, consumption of network resources and storage usage of each vehicle is a critical problem in VANETs. In this paper, we propose a recovery method for reducing storage usage of each vehicle for VANETs without additional message exchanges. We evaluate the proposed method by simulations. In this paper, we found that the proposed recovery method can manage the storage efficiently for a limited density of vehicles.
在车载自组织网络(VANETs)中,由于网络中车辆的高度移动性导致网络拓扑结构的动态变化,使得端到端通信变得困难。为了解决这个问题,延迟/断开/中断容忍网络(DTN)可能是一个很好的方法。然而,每辆车的网络资源消耗和存储使用是VANETs的关键问题。在本文中,我们提出了一种恢复方法,可以在不增加消息交换的情况下减少VANETs的每辆车的存储使用量。我们通过仿真对所提出的方法进行了评估。在本文中,我们发现所提出的回收方法可以有效地管理车辆密度有限的存储。
{"title":"A Recovery Method for Reducing Storage Usage Considering Number of Neighboring Nodes in VANETs","authors":"Shogo Nakasaki, Y. Yoshino, Makoto Ikeda, L. Barolli","doi":"10.1109/WAINA.2018.00075","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00075","url":null,"abstract":"In Vehicular Ad-hoc NETworks (VANETs), end-to-end communication becomes difficult because of dynamic change of network topology caused by high mobility of vehicles in the network. In order to deal with this problem, Delay/Disconnection/Disruption Tolerant Networking (DTN) can be a good approach. However, consumption of network resources and storage usage of each vehicle is a critical problem in VANETs. In this paper, we propose a recovery method for reducing storage usage of each vehicle for VANETs without additional message exchanges. We evaluate the proposed method by simulations. In this paper, we found that the proposed recovery method can manage the storage efficiently for a limited density of vehicles.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How Cloud Computing, IoT and Multicore Systems Affect Software Engineering Principles 云计算、物联网和多核系统如何影响软件工程原理
Lutz Schubert, Athanasios Tsitsipas, K. Jeffery
The world has moved from a single core, local application execution to distributed, parallel, social, heterogeneous etc. Standard ways of programming thus do not hold anymore and all software engineers struggle with the growing complexity that equally affects performance, maintainability and, worst of all, cost. The paper presents a concept arising from the EC Cloud Computing expert group between 2012 and 2016 as a means to move away from the hazards of traditional, Turing based computing concepts to an abstract and more natural way of programming. The concept builds up on three major building blocks, namely "Information", "Intention" and "Incentive" to define the behaviour of an application in a fashion that can abstract away from the actual way of executing an algorithm, thus allowing for a larger degree of adaptation, distribution and scale.
世界已经从单一核心、本地应用程序执行转向分布式、并行、社交、异构等。因此,标准的编程方式不再适用,所有软件工程师都在与日益增长的复杂性作斗争,这同样影响了性能、可维护性,最糟糕的是,成本。本文提出了2012年至2016年间由EC云计算专家组提出的一个概念,作为一种摆脱传统的、基于图灵的计算概念的危害的手段,以一种抽象的、更自然的编程方式。这个概念建立在三个主要的构建块上,即“信息”、“意图”和“激励”,以一种可以从执行算法的实际方式中抽象出来的方式来定义应用程序的行为,从而允许更大程度的适应、分布和规模。
{"title":"How Cloud Computing, IoT and Multicore Systems Affect Software Engineering Principles","authors":"Lutz Schubert, Athanasios Tsitsipas, K. Jeffery","doi":"10.1109/WAINA.2018.00108","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00108","url":null,"abstract":"The world has moved from a single core, local application execution to distributed, parallel, social, heterogeneous etc. Standard ways of programming thus do not hold anymore and all software engineers struggle with the growing complexity that equally affects performance, maintainability and, worst of all, cost. The paper presents a concept arising from the EC Cloud Computing expert group between 2012 and 2016 as a means to move away from the hazards of traditional, Turing based computing concepts to an abstract and more natural way of programming. The concept builds up on three major building blocks, namely \"Information\", \"Intention\" and \"Incentive\" to define the behaviour of an application in a fashion that can abstract away from the actual way of executing an algorithm, thus allowing for a larger degree of adaptation, distribution and scale.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130850990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Study of Characterizing Frequent Itemsets Using Representation Learning 用表征学习表征频繁项集的实验研究
S. Kawanobe, Tomonobu Ozaki
Frequent itemset mining is the most fundamental problem in data mining. In this task, a set of items is adopted as a pattern, and all patterns frequently appearing in a database must be enumerated. While extensive research has been conducted over a long period, including proposals of sophisticated patterns for capturing interesting and meaningful information as well as developments of fast and scalable algorithms, low comprehensibility of obtained patterns is widely recognized as an unsolved essential drawback in frequent itemset mining. In this paper, to cope with this drawback, we propose to use representation learning to characterize each frequent pattern from various perspectives. Concretely speaking, we perform cluster analysis in the obtained vector space to identify representative and outlier patterns because we believe that these representatives and outliers must play important roles to understand the whole patterns. Furthermore, in order to obtain significant patterns having various roles to understand the pattern sets, we utilize the degree of centrality in a pattern network built by drawing edges among similar patterns. Experiments are conducted using a real dataset in Japanese video-sharing site Nicovideo (nicovideo.jp). The results show the effectiveness of the proposed framework for identifying characteristic patterns having various roles.
频繁项集挖掘是数据挖掘中最基本的问题。在此任务中,采用一组项作为模式,并且必须枚举数据库中经常出现的所有模式。虽然在很长一段时间内进行了广泛的研究,包括用于捕获有趣和有意义的信息的复杂模式的建议,以及快速和可扩展算法的开发,但获得的模式的低可理解性被广泛认为是频繁项集挖掘中未解决的基本缺点。在本文中,为了解决这一缺陷,我们建议使用表征学习从不同的角度来表征每个频繁模式。具体来说,我们在获得的向量空间中进行聚类分析,以识别代表性和异常值模式,因为我们认为这些代表性和异常值对于理解整个模式必须发挥重要作用。此外,为了获得具有不同角色的重要模式来理解模式集,我们利用在相似模式之间绘制边缘构建的模式网络中的中心性程度。实验使用日本视频分享网站Nicovideo (Nicovideo .jp)的真实数据集进行。结果表明,该框架能够有效识别具有不同作用的特征模式。
{"title":"Experimental Study of Characterizing Frequent Itemsets Using Representation Learning","authors":"S. Kawanobe, Tomonobu Ozaki","doi":"10.1109/WAINA.2018.00082","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00082","url":null,"abstract":"Frequent itemset mining is the most fundamental problem in data mining. In this task, a set of items is adopted as a pattern, and all patterns frequently appearing in a database must be enumerated. While extensive research has been conducted over a long period, including proposals of sophisticated patterns for capturing interesting and meaningful information as well as developments of fast and scalable algorithms, low comprehensibility of obtained patterns is widely recognized as an unsolved essential drawback in frequent itemset mining. In this paper, to cope with this drawback, we propose to use representation learning to characterize each frequent pattern from various perspectives. Concretely speaking, we perform cluster analysis in the obtained vector space to identify representative and outlier patterns because we believe that these representatives and outliers must play important roles to understand the whole patterns. Furthermore, in order to obtain significant patterns having various roles to understand the pattern sets, we utilize the degree of centrality in a pattern network built by drawing edges among similar patterns. Experiments are conducted using a real dataset in Japanese video-sharing site Nicovideo (nicovideo.jp). The results show the effectiveness of the proposed framework for identifying characteristic patterns having various roles.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130982199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ameliorating the Web QoE Using SPA 利用SPA改进Web QoE
Nawres Abdelwahed, Asma BEN LETAIFA, S. E. Asmi
Web Quality of Experience QoE is a measure of whether or not the customer's experience is satisfied with a service. QoE is interested in the whole service experience. QoE is a concept that resembles the user experience but in the telecommunications field. For a long time web QoE was mesured only in an objective way. Nowadays, subjective metrics are perceived as the best way to evaluate the QoE because humans have changing moods according to many parameters that we can't take them all into consideration, that's why we recure to subjective metrics. Mesuring the web QoE helps us ameliorate it. For that there are different ways of ameliorating the web QoE (network, content...). In this work we focus on ameliorating the web QoE through Software-Defined Networking (SDN) by displaying the appropriate web page quality to the user according to his wishes and the availability of the bandwidth in that specific moment and this among the different web pages of different qualities implemented at the SDN RYU Controller.
Web体验质量QoE是衡量客户体验是否对服务满意的一种方法。QoE关注的是整个服务体验。QoE是一个类似于用户体验的概念,但在电信领域。在很长一段时间里,网络质量评价只是以一种客观的方式来衡量的。如今,主观指标被认为是评估QoE的最佳方式,因为人类的情绪会根据许多参数而变化,我们无法将其全部考虑在内,这就是我们回归主观指标的原因。测量web QoE可以帮助我们改进它。因此,改善web QoE(网络、内容……)有不同的方法。在这项工作中,我们专注于通过软件定义网络(SDN)改善web QoE,根据用户的愿望和特定时刻带宽的可用性向用户显示适当的网页质量,并在SDN RYU控制器上实现不同质量的不同网页之间实现这一点。
{"title":"Ameliorating the Web QoE Using SPA","authors":"Nawres Abdelwahed, Asma BEN LETAIFA, S. E. Asmi","doi":"10.1109/WAINA.2018.00081","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00081","url":null,"abstract":"Web Quality of Experience QoE is a measure of whether or not the customer's experience is satisfied with a service. QoE is interested in the whole service experience. QoE is a concept that resembles the user experience but in the telecommunications field. For a long time web QoE was mesured only in an objective way. Nowadays, subjective metrics are perceived as the best way to evaluate the QoE because humans have changing moods according to many parameters that we can't take them all into consideration, that's why we recure to subjective metrics. Mesuring the web QoE helps us ameliorate it. For that there are different ways of ameliorating the web QoE (network, content...). In this work we focus on ameliorating the web QoE through Software-Defined Networking (SDN) by displaying the appropriate web page quality to the user according to his wishes and the availability of the bandwidth in that specific moment and this among the different web pages of different qualities implemented at the SDN RYU Controller.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132107679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Integrated Message Suppression Controller with Epidemic and MaxProp Protocols: Performance Evaluation for VDTNs 带有Epidemic和MaxProp协议的集成消息抑制控制器:VDTNs的性能评估
Y. Yoshino, Shogo Nakasaki, Makoto Ikeda, L. Barolli
Delay/Disruption/Disconnection Tolerant Networking (DTN) has the potential to interconnect vehicles for inter-vehicle communications. In our previous work, we evaluated the performance of our proposed message suppression controller considering priority for inter-vehicle communications. In this paper, we integrate the Enhanced Message Suppression Controller (EMSC) with Epidemic and MaxProp protocols and present the performance evaluation for Vehicular DTN (VDTN). We develop a simulation platform based on Scenargie network simulator considering IEEE 802.11p. From the simulation results, we found that our integrated EMSCs decreases the storage usages.
延迟/中断/断开容忍网络(DTN)具有将车辆互连以实现车辆间通信的潜力。在我们之前的工作中,我们考虑了车辆间通信的优先级,评估了我们提出的消息抑制控制器的性能。本文将增强型消息抑制控制器(EMSC)与Epidemic和MaxProp协议相结合,给出了车载DTN (VDTN)的性能评价。基于IEEE 802.11p标准,开发了基于Scenargie网络模拟器的仿真平台。从仿真结果来看,我们发现我们集成的EMSCs降低了存储使用量。
{"title":"An Integrated Message Suppression Controller with Epidemic and MaxProp Protocols: Performance Evaluation for VDTNs","authors":"Y. Yoshino, Shogo Nakasaki, Makoto Ikeda, L. Barolli","doi":"10.1109/WAINA.2018.00080","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00080","url":null,"abstract":"Delay/Disruption/Disconnection Tolerant Networking (DTN) has the potential to interconnect vehicles for inter-vehicle communications. In our previous work, we evaluated the performance of our proposed message suppression controller considering priority for inter-vehicle communications. In this paper, we integrate the Enhanced Message Suppression Controller (EMSC) with Epidemic and MaxProp protocols and present the performance evaluation for Vehicular DTN (VDTN). We develop a simulation platform based on Scenargie network simulator considering IEEE 802.11p. From the simulation results, we found that our integrated EMSCs decreases the storage usages.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123978874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud Services Categories Identification from Requirements Specifications 从需求规范中识别云服务类别
B. D. Martino, Jessica Pascarella, Stefania Nacchia, Salvatore Augusto Maisto, P. Iannucci, Fabio Cerri
In the Cloud Computing field, with the increasing number of Cloud Services available thanks to several cloud providers, looking for a particular service has become very difficult, especially with the evolution of the stakeholders' needs. At the same time requirements specifications have become more and more complex to define in a formal representation and to analyse, since the stakeholders' goals are typically high-level, abstract, and hard-to-measure. For these reasons it would be useful to automate, as much as possible, requirements analysis. In this work we propose an automatic classification and modelling of requirements that are expressed in a natural language form, and an automatic identification of cloud services categories from requirements in order to support the development of a cloud application. Automated requirements analysis is not an easy subject, due to the natural languages variability and ambiguity, that's why different machine/deep learning and natural language processing approaches are used and compared. The target data set is provided by the Open-Security tera-PROMISE repository.
在云计算领域,由于几个云提供商提供了越来越多的可用云服务,寻找特定的服务变得非常困难,特别是随着涉众需求的演变。同时,由于涉众的目标通常是高层的、抽象的,并且难以度量,需求规格说明变得越来越复杂,难以用正式的表示来定义和分析。由于这些原因,尽可能地自动化需求分析是有用的。在这项工作中,我们提出了以自然语言形式表达的需求的自动分类和建模,以及从需求中自动识别云服务类别,以支持云应用程序的开发。由于自然语言的可变性和模糊性,自动化需求分析并不是一件容易的事情,这就是为什么使用和比较不同的机器/深度学习和自然语言处理方法的原因。目标数据集由Open-Security tera-PROMISE存储库提供。
{"title":"Cloud Services Categories Identification from Requirements Specifications","authors":"B. D. Martino, Jessica Pascarella, Stefania Nacchia, Salvatore Augusto Maisto, P. Iannucci, Fabio Cerri","doi":"10.1109/WAINA.2018.00125","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00125","url":null,"abstract":"In the Cloud Computing field, with the increasing number of Cloud Services available thanks to several cloud providers, looking for a particular service has become very difficult, especially with the evolution of the stakeholders' needs. At the same time requirements specifications have become more and more complex to define in a formal representation and to analyse, since the stakeholders' goals are typically high-level, abstract, and hard-to-measure. For these reasons it would be useful to automate, as much as possible, requirements analysis. In this work we propose an automatic classification and modelling of requirements that are expressed in a natural language form, and an automatic identification of cloud services categories from requirements in order to support the development of a cloud application. Automated requirements analysis is not an easy subject, due to the natural languages variability and ambiguity, that's why different machine/deep learning and natural language processing approaches are used and compared. The target data set is provided by the Open-Security tera-PROMISE repository.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129685101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Early Detection of Network Incident Using Open Security Information 利用开放的安全信息早期检测网络事件
Hiroki Kuzuno, S. Otsuka
Network security incident (network incident) is an important topic in the around world. Network operators and security vendors tackle these network incidents consist of many cyber crimes. The types of threats are DDoS, phishing, malware, vulnerability attacks to take control a device, and extortion case. Network operators consider protecting their environment from threats. They have to observe a trend of threat, then could trace suspicious network traffic flows on what network. Some organization and individual persons publish open security information related to past a network incident. In order to identify which network covers on suspicious activity, we collect open security information as the dataset to analyze these for providing a summary of network operators' IP addresses lead to network incident. The result is not only useful information to get a trend of threat pattern, but also we quickly handle a countermeasure to it when real network incident has happened in their environment. In the evaluation, we verify the result of proposed framework could handle the trend of network incident cases. We determine the result whether provides security threat or not based on security vendors reports. The evaluation result shows the proposed framework could identify the SSH brute force attack and other attacks before the security vendor discloses it. It is useful for supporting of network operators and community to observe the latest network incident when it occurs in their environment.
网络安全事件(Network incident)是当今世界关注的一个重要话题。网络运营商和安全供应商应对这些网络事件包括许多网络犯罪。威胁类型包括DDoS、网络钓鱼、恶意软件、控制设备的漏洞攻击和敲诈勒索。网络运营商考虑保护他们的环境免受威胁。他们必须观察到威胁的趋势,然后才能追踪到可疑的网络流量在哪个网络上。一些组织和个人公开发布与过去网络事件有关的安全信息。为了确定哪些网络覆盖了可疑活动,我们收集了公开的安全信息作为数据集来分析这些信息,以提供网络运营商的IP地址导致网络事件的摘要。结果不仅可以提供有用的信息来了解威胁模式的趋势,而且可以在实际网络事件发生时快速处理应对措施。在评估中,我们验证了所提出的框架能够处理网络事件案例的趋势。我们根据安全厂商的报告来判断是否提供安全威胁。评估结果表明,该框架能够在安全厂商披露之前识别SSH暴力破解和其他攻击。这有助于支持网络运营商和社区在其环境中观察最新的网络事件。
{"title":"Early Detection of Network Incident Using Open Security Information","authors":"Hiroki Kuzuno, S. Otsuka","doi":"10.1109/WAINA.2018.00057","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00057","url":null,"abstract":"Network security incident (network incident) is an important topic in the around world. Network operators and security vendors tackle these network incidents consist of many cyber crimes. The types of threats are DDoS, phishing, malware, vulnerability attacks to take control a device, and extortion case. Network operators consider protecting their environment from threats. They have to observe a trend of threat, then could trace suspicious network traffic flows on what network. Some organization and individual persons publish open security information related to past a network incident. In order to identify which network covers on suspicious activity, we collect open security information as the dataset to analyze these for providing a summary of network operators' IP addresses lead to network incident. The result is not only useful information to get a trend of threat pattern, but also we quickly handle a countermeasure to it when real network incident has happened in their environment. In the evaluation, we verify the result of proposed framework could handle the trend of network incident cases. We determine the result whether provides security threat or not based on security vendors reports. The evaluation result shows the proposed framework could identify the SSH brute force attack and other attacks before the security vendor discloses it. It is useful for supporting of network operators and community to observe the latest network incident when it occurs in their environment.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129343340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of Open Source Network Access Control in Virtual Networks 虚拟网络中开源网络访问控制的安全性分析
Mohammed Suhel Inamdar, Ali Tekeoglu
Enterprise networks depend on Network Access Control software to restrict access to valuable resources. Significant number of attacks come from internal threats, such as disgruntled employees and infected personal devices brought into the company network. Network Access Control software plays an important role in detecting and protecting against these kind of threats. Most companies maintain huge and complex internal networks that form the backbone of their business and the safe harbor for their intellectual property. Thus, its essential to make sure each machine and user has only the right amount of access to the corporate network. With the widespread use of mobile and IoT devices integrating dynamically to corporate networks, this task gets even more complicated. Virtual Local Area Networks (VLANs) are heavily employed to securely partition the intranet because of the suitability for a corporate setting. In this paper, we have evaluated the security of PacketFence Network Access Control server, installed within GNS3 network emulator. Using an open-source tool named Yersinia to carry out experiments, we proved that attacks are viable and realistic. We showed different possible ways to attack the PacketFence network along with how to prevent.
企业网络依靠网络访问控制软件来限制对有价值资源的访问。大量的攻击来自内部威胁,例如心怀不满的员工和被感染的个人设备带入公司网络。网络访问控制软件在检测和防范此类威胁方面发挥着重要作用。大多数公司都拥有庞大而复杂的内部网络,这些网络构成了他们业务的支柱和知识产权的安全港。因此,必须确保每台机器和用户只有适当数量的访问公司网络的权限。随着移动和物联网设备的广泛使用,动态集成到企业网络中,这项任务变得更加复杂。虚拟局域网(Virtual Local Area network, vlan)被大量用于对企业内网进行安全分区,因为它适合于企业环境。本文对安装在GNS3网络模拟器中的PacketFence网络访问控制服务器的安全性进行了评估。使用一个名为耶尔森尼亚的开源工具进行实验,我们证明了攻击是可行的和现实的。我们展示了攻击PacketFence网络的不同可能方法以及如何预防。
{"title":"Security Analysis of Open Source Network Access Control in Virtual Networks","authors":"Mohammed Suhel Inamdar, Ali Tekeoglu","doi":"10.1109/WAINA.2018.00131","DOIUrl":"https://doi.org/10.1109/WAINA.2018.00131","url":null,"abstract":"Enterprise networks depend on Network Access Control software to restrict access to valuable resources. Significant number of attacks come from internal threats, such as disgruntled employees and infected personal devices brought into the company network. Network Access Control software plays an important role in detecting and protecting against these kind of threats. Most companies maintain huge and complex internal networks that form the backbone of their business and the safe harbor for their intellectual property. Thus, its essential to make sure each machine and user has only the right amount of access to the corporate network. With the widespread use of mobile and IoT devices integrating dynamically to corporate networks, this task gets even more complicated. Virtual Local Area Networks (VLANs) are heavily employed to securely partition the intranet because of the suitability for a corporate setting. In this paper, we have evaluated the security of PacketFence Network Access Control server, installed within GNS3 network emulator. Using an open-source tool named Yersinia to carry out experiments, we proved that attacks are viable and realistic. We showed different possible ways to attack the PacketFence network along with how to prevent.","PeriodicalId":296466,"journal":{"name":"2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128907707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1