首页 > 最新文献

Second International Conference on the Innovative Computing Technology (INTECH 2012)最新文献

英文 中文
Optimized strategy of deployment firewall policies 优化防火墙策略部署策略
Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457775
F. Bezzazi, A. Kartit, M. E. Marraki, D. Aboutajdine
Modern networks are becoming larger and more complex. This requires administrators and management tools to update their security policies and improve the deployment of their firewall. This latter represents a challenging and error-prone task, which aims to pass from one policy to another one while respecting the conditions of safety and security. Several studies have focused on the conception, optimization of security policy and conflict detection but rare are the researchers who tried to improve the firewall policy deployment. In this paper, we investigated the algorithm of type II policy and showed its vulnerability in some cases. As alternative, we provide a new algorithm for publishing political class type II. Further to its safety, our algorithm can be used even for the deployment of important size policies.
现代网络正变得越来越大,越来越复杂。这就要求管理员和管理工具更新其安全策略并改进防火墙的部署。后者是一项具有挑战性且容易出错的任务,其目的是在尊重安全和保障条件的情况下从一项政策过渡到另一项政策。在安全策略的构思、优化和冲突检测等方面的研究较多,但对防火墙策略部署进行改进的研究较少。本文研究了II类策略的算法,并指出了II类策略在某些情况下的脆弱性。作为替代方案,我们提供了一种新的算法来发布政治类类型II。为了提高安全性,我们的算法甚至可以用于部署重要的大小策略。
{"title":"Optimized strategy of deployment firewall policies","authors":"F. Bezzazi, A. Kartit, M. E. Marraki, D. Aboutajdine","doi":"10.1109/INTECH.2012.6457775","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457775","url":null,"abstract":"Modern networks are becoming larger and more complex. This requires administrators and management tools to update their security policies and improve the deployment of their firewall. This latter represents a challenging and error-prone task, which aims to pass from one policy to another one while respecting the conditions of safety and security. Several studies have focused on the conception, optimization of security policy and conflict detection but rare are the researchers who tried to improve the firewall policy deployment. In this paper, we investigated the algorithm of type II policy and showed its vulnerability in some cases. As alternative, we provide a new algorithm for publishing political class type II. Further to its safety, our algorithm can be used even for the deployment of important size policies.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126115352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Unequal error protection coded Interleave Division Multiple Access 不相等错误保护编码交错除法多址
Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457764
M. Fathy, E. Hagras, M. S. E. Mahallawy, M. A. Dahab
The performance of Interleave Division Multiple Access (IDMA) with a new set of low rate convolution codes is evaluated on Additive White Gaussian Noise (AWGN) channel. Despite the excessive multiuser interference, very good performance close to theoretical limit is demonstrated. The effect of varying number of users, code rate and channel characteristics on the performance is investigated. The proposed scheme offers significant complexity reduction when compared to the ones available in literature. In this work, we propose an unequal error protection code for IDMA (UEP-CIDMA) and compare its performance with the coded and uncoded IDMA system under various data bit streams. It was shown by simulations that the proposed code provides a tradeoff between cost and complexity compared with coded IDMA being the upper and lower bounds respectively, in addition to simulation for various data bit stream of convolutional encoder with different rates are 1/2 and 2/3.
在加性高斯白噪声(AWGN)信道上,对一组新的低速率卷积码的交错分多址(IDMA)性能进行了评价。尽管有过多的多用户干扰,但性能非常好,接近理论极限。研究了不同用户数量、码率和信道特性对性能的影响。与文献中可用的方案相比,所提出的方案提供了显着的复杂性降低。本文提出了一种IDMA的不等错保护码(UEP-CIDMA),并将其与不同数据流下的编码和未编码IDMA系统的性能进行了比较。仿真结果表明,与以编码IDMA为上界和下界相比,所提出的编码在成本和复杂度之间取得了平衡,并对不同速率为1/2和2/3的卷积编码器的各种数据比特流进行了仿真。
{"title":"Unequal error protection coded Interleave Division Multiple Access","authors":"M. Fathy, E. Hagras, M. S. E. Mahallawy, M. A. Dahab","doi":"10.1109/INTECH.2012.6457764","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457764","url":null,"abstract":"The performance of Interleave Division Multiple Access (IDMA) with a new set of low rate convolution codes is evaluated on Additive White Gaussian Noise (AWGN) channel. Despite the excessive multiuser interference, very good performance close to theoretical limit is demonstrated. The effect of varying number of users, code rate and channel characteristics on the performance is investigated. The proposed scheme offers significant complexity reduction when compared to the ones available in literature. In this work, we propose an unequal error protection code for IDMA (UEP-CIDMA) and compare its performance with the coded and uncoded IDMA system under various data bit streams. It was shown by simulations that the proposed code provides a tradeoff between cost and complexity compared with coded IDMA being the upper and lower bounds respectively, in addition to simulation for various data bit stream of convolutional encoder with different rates are 1/2 and 2/3.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128070136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recommendation based on co-similarity and spanning tree with minimum weight 基于共相似度和最小权值生成树的推荐
Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457807
O. Baida, N. Hamzaoui, A. Sedqui, A. Lyhyaoui
Recommender system is a system that helps users find interesting items. Actually, collaborative filtering technology is one of the most successful techniques in recommender system. In this article we propose a new approach based on the rating of the users that is similar to the active one. In the literature, we find a lot of approaches able to recommend items to the user. Aiming to offer a list of interesting items, we use a hybrid approach of collaborative filtering that performs better than others. Our collaborative filtering approach is based on the graph theory, so we use the dissimilarity matrix as a spanning tree with minimum weight based on Kruskal algorithm. We define a group of criteria that help to determine the best items to recommend without computing the rating prediction.
推荐系统是一个帮助用户找到感兴趣的项目的系统。实际上,协同过滤技术是推荐系统中最成功的技术之一。在本文中,我们提出了一种基于与活跃用户相似的用户评级的新方法。在文献中,我们发现了很多能够向用户推荐商品的方法。为了提供一个有趣的项目列表,我们使用了一种混合的协同过滤方法,它的性能比其他方法要好。我们的协同过滤方法是基于图论的,因此我们使用基于Kruskal算法的不相似矩阵作为最小权值的生成树。我们定义了一组标准来帮助确定推荐的最佳项目,而不需要计算评级预测。
{"title":"Recommendation based on co-similarity and spanning tree with minimum weight","authors":"O. Baida, N. Hamzaoui, A. Sedqui, A. Lyhyaoui","doi":"10.1109/INTECH.2012.6457807","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457807","url":null,"abstract":"Recommender system is a system that helps users find interesting items. Actually, collaborative filtering technology is one of the most successful techniques in recommender system. In this article we propose a new approach based on the rating of the users that is similar to the active one. In the literature, we find a lot of approaches able to recommend items to the user. Aiming to offer a list of interesting items, we use a hybrid approach of collaborative filtering that performs better than others. Our collaborative filtering approach is based on the graph theory, so we use the dissimilarity matrix as a spanning tree with minimum weight based on Kruskal algorithm. We define a group of criteria that help to determine the best items to recommend without computing the rating prediction.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New decision function for support vector data description 新的支持向量数据描述决策函数
Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457768
M. El Boujnouni, M. Jedra, N. Zahid
In conventional support vector data description (SVDD), for each class we look for the smallest sphere that encloses its data. in the decision phase a sample is classified into class i only when the value of the ith decision function is positive. following this architecture, an unclassifiable region (s) can be appeared if the values of more than one decision function are positives. To overcome this problem, we propose a new simple and powerful decision function, which is used only in the overlappeds regions, this membership function can be calculated in the feature space and can be represented by kernels functions. This method gives good performance on reducing the effects of overlap and significantly improves the classification. We demonstrate the performance of our decision function using six benchmark datasets.
在传统的支持向量数据描述(SVDD)中,对于每个类,我们寻找包含其数据的最小球体。在决策阶段,只有当第I个决策函数的值为正时,样本才被归为第I类。按照这个体系结构,如果一个以上的决策函数的值是正的,就会出现一个不可分类的区域。为了克服这一问题,我们提出了一种新的简单而强大的决策函数,该决策函数仅用于重叠区域,该隶属度函数可以在特征空间中计算并可以用核函数表示。该方法在减少重叠影响方面有很好的效果,显著提高了分类效率。我们使用六个基准数据集来演示决策函数的性能。
{"title":"New decision function for support vector data description","authors":"M. El Boujnouni, M. Jedra, N. Zahid","doi":"10.1109/INTECH.2012.6457768","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457768","url":null,"abstract":"In conventional support vector data description (SVDD), for each class we look for the smallest sphere that encloses its data. in the decision phase a sample is classified into class i only when the value of the ith decision function is positive. following this architecture, an unclassifiable region (s) can be appeared if the values of more than one decision function are positives. To overcome this problem, we propose a new simple and powerful decision function, which is used only in the overlappeds regions, this membership function can be calculated in the feature space and can be represented by kernels functions. This method gives good performance on reducing the effects of overlap and significantly improves the classification. We demonstrate the performance of our decision function using six benchmark datasets.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127246090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance analysis framework to optimize storage infrastructure for Cloud Computing 用于优化云计算存储基础设施的性能分析框架
Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457766
M. F. Ali, A. Barnawi, A. Bashar
This paper presents a novel evaluation study of the Cloud Computing technology, with a focused emphasis on the Cloud Storage mechanisms and the way they are affecting the progress of the present Cloud Services. Considering the exponential growth of the user data and its impact on the Cloud Storage infrastructure, this work provides two major contributions through comprehensive performance evaluations. Firstly, it proposes a unique 10-point performance evaluation framework for existing Cloud Storage infrastructure and applies it for evaluating six major Cloud Storage Service Providers currently in the market. Secondly, it presents a detailed insightful assessment of eighteen most popular Cloud Storage Hardware vendors with respect to the storage technologies being implemented by them. In conclusion, it takes stock of the current trends on optimizing storage infrastructure for Cloud Computing and predicting future research possibilities in this rapidly growing technology.
本文提出了一种新的云计算技术评估研究,重点关注云存储机制及其影响当前云服务进展的方式。考虑到用户数据的指数级增长及其对云存储基础设施的影响,本工作通过全面的性能评估提供了两个主要贡献。首先,针对现有的云存储基础设施提出了一个独特的10点性能评估框架,并将其应用于目前市场上的六大云存储服务提供商。其次,它对18个最流行的云存储硬件供应商进行了详细而深刻的评估,包括他们正在实施的存储技术。总之,它评估了优化云计算存储基础设施的当前趋势,并预测了这一快速发展的技术的未来研究可能性。
{"title":"Performance analysis framework to optimize storage infrastructure for Cloud Computing","authors":"M. F. Ali, A. Barnawi, A. Bashar","doi":"10.1109/INTECH.2012.6457766","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457766","url":null,"abstract":"This paper presents a novel evaluation study of the Cloud Computing technology, with a focused emphasis on the Cloud Storage mechanisms and the way they are affecting the progress of the present Cloud Services. Considering the exponential growth of the user data and its impact on the Cloud Storage infrastructure, this work provides two major contributions through comprehensive performance evaluations. Firstly, it proposes a unique 10-point performance evaluation framework for existing Cloud Storage infrastructure and applies it for evaluating six major Cloud Storage Service Providers currently in the market. Secondly, it presents a detailed insightful assessment of eighteen most popular Cloud Storage Hardware vendors with respect to the storage technologies being implemented by them. In conclusion, it takes stock of the current trends on optimizing storage infrastructure for Cloud Computing and predicting future research possibilities in this rapidly growing technology.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"2020 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114040478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A word-image's system searching: Case of printed Arabic word 一个词-图像的系统检索:以印刷阿拉伯词为例
Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457770
A. Smaili, A. Lasfar, M. Sbihi
During the last decade, the technique of optical character recognition has a particular research interest that laboratories continue to improve and develop. This technique is a good alternative to entering text, the availability of various tools involved in the singularity of this service. Undoubtedly, the development of such tools will provide a considerable gain in time and costs. The basis of the Arabic language, prompted us to work hard for a successful control of its optical character recognition, otherwise it is necessary to develop another approaches, therefore an approach based on finding a word-image in a text-image. Finally, the objective of this work is to conduct research in a word-image-text image of the Moroccan official bulletin. Finally, the objective of this work is to conduct research a wordimage in text image of the Moroccan official bulletin.
在过去的十年中,光学字符识别技术成为实验室不断改进和发展的研究热点。这种技术是一种很好的替代输入文本的方法,各种工具的可用性涉及到这种服务的独特性。毫无疑问,这些工具的开发将在时间和成本上带来可观的收益。阿拉伯语的基础,促使我们努力工作,以成功地控制其光学字符识别,否则就有必要开发另一种方法,因此是一种基于在文本图像中寻找单词图像的方法。最后,这项工作的目的是在摩洛哥官方公报的文字图像文本图像进行研究。最后,这项工作的目的是进行研究摩洛哥官方公报的文字图像。
{"title":"A word-image's system searching: Case of printed Arabic word","authors":"A. Smaili, A. Lasfar, M. Sbihi","doi":"10.1109/INTECH.2012.6457770","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457770","url":null,"abstract":"During the last decade, the technique of optical character recognition has a particular research interest that laboratories continue to improve and develop. This technique is a good alternative to entering text, the availability of various tools involved in the singularity of this service. Undoubtedly, the development of such tools will provide a considerable gain in time and costs. The basis of the Arabic language, prompted us to work hard for a successful control of its optical character recognition, otherwise it is necessary to develop another approaches, therefore an approach based on finding a word-image in a text-image. Finally, the objective of this work is to conduct research in a word-image-text image of the Moroccan official bulletin. Finally, the objective of this work is to conduct research a wordimage in text image of the Moroccan official bulletin.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"336 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116261447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A detection system of infant cry using fuzzy classification including dialing alarm calls function 一种基于模糊分类的婴儿哭声检测系统,包括拨号报警功能
Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457776
Mohammad Kia, Shabnam Kia, Neda Davoudi, Ramyar Biniazan
It is inconvenient for housekeeper parents to constantly watch over their newborn baby while doing their work or chores. This paper proposes a simple voice recognition system which can be applied practically for designing a device with capability to detect a baby's cry and informing the parents automatically. There are a lot of similar projects and experiments which have been performed recently, but most of them are about recognizing and classifying different types of crying (like for hunger, etc.) and have used complex methods of implementation such as neural network. But in this paper our aim is to merely detect infant's crying and our solution is to use a fuzzy classifier which is easy to implement. The overall algorithm is to evaluate the resemblance of the infant's voice signal with the data stored in a database, which is already prepared by recording some cry and laughter samples, using an automatic fuzzy classifier system which can lead to detection of cry or laughter. This algorithm can serve as a reliable foundation on which the future creation of a portable real-time, automatic voice detection system device can be based. It is a pretty formidable task to implement complex algorithms, such as neural networks, on common available microcontrollers, however we proposed much simpler procedure which enables us to develop a low cost device. To achieve our aim, we have created a database of sample cry and laughter signals and written a sample Matlab program for carrying out the real-time frequency-domain calculations and a sample visual program in Labview programming environment for interfacing with user.
管家父母在工作或做家务的同时,不断地照看新生儿是不方便的。本文提出了一种简单的语音识别系统,可用于设计一种能够检测婴儿哭声并自动通知父母的设备。最近已经进行了很多类似的项目和实验,但大多数是关于识别和分类不同类型的哭泣(如饥饿等),并且使用了复杂的实现方法,如神经网络。但在本文中,我们的目标仅仅是检测婴儿的哭声,我们的解决方案是使用易于实现的模糊分类器。整个算法是评估婴儿的声音信号与存储在数据库中的数据的相似性,该数据库已经通过记录一些哭泣和笑声样本而准备好,使用自动模糊分类器系统可以检测到哭泣或笑声。该算法为今后开发便携式实时自动语音检测系统设备奠定了坚实的基础。在常用的微控制器上实现复杂的算法(如神经网络)是一项相当艰巨的任务,但是我们提出了更简单的程序,使我们能够开发出低成本的设备。为了实现这一目标,我们建立了一个样本哭笑信号数据库,编写了一个样本Matlab程序来进行实时频域计算,并在Labview编程环境中编写了一个样本可视化程序来与用户交互。
{"title":"A detection system of infant cry using fuzzy classification including dialing alarm calls function","authors":"Mohammad Kia, Shabnam Kia, Neda Davoudi, Ramyar Biniazan","doi":"10.1109/INTECH.2012.6457776","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457776","url":null,"abstract":"It is inconvenient for housekeeper parents to constantly watch over their newborn baby while doing their work or chores. This paper proposes a simple voice recognition system which can be applied practically for designing a device with capability to detect a baby's cry and informing the parents automatically. There are a lot of similar projects and experiments which have been performed recently, but most of them are about recognizing and classifying different types of crying (like for hunger, etc.) and have used complex methods of implementation such as neural network. But in this paper our aim is to merely detect infant's crying and our solution is to use a fuzzy classifier which is easy to implement. The overall algorithm is to evaluate the resemblance of the infant's voice signal with the data stored in a database, which is already prepared by recording some cry and laughter samples, using an automatic fuzzy classifier system which can lead to detection of cry or laughter. This algorithm can serve as a reliable foundation on which the future creation of a portable real-time, automatic voice detection system device can be based. It is a pretty formidable task to implement complex algorithms, such as neural networks, on common available microcontrollers, however we proposed much simpler procedure which enables us to develop a low cost device. To achieve our aim, we have created a database of sample cry and laughter signals and written a sample Matlab program for carrying out the real-time frequency-domain calculations and a sample visual program in Labview programming environment for interfacing with user.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114623284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cyber-attack for BGP systems using CoPNet model 基于CoPNet模型的BGP系统网络攻击
Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457810
A. E. Bouchti, A. Haqiq
With the rise of cyber-attack activities in the recent years, research in this area has gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose Colored Petri Net (CoPNet) modeling approach by extending the attack trees with new modeling constructs and analysis approaches. CoPNet based attack model is flexible enough to model Internet intrusion, including the static and dynamic features of the intrusion. The process and rules of building CoPNet based attack model from AT are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CoPNet based attack modeling. We show how attack trees can be converted and analyzed in CoPNets. Finally, we provide a case study that illustrates the CoPNet approach.
随着近年来网络攻击活动的兴起,这一领域的研究得到了极大的重视。其中一项研究就是对网络攻击进行建模。在这种情况下,已经开发了几种建模方法,例如基于攻击树(AT)的方法。在本文中,我们提出了彩色Petri网(CoPNet)建模方法,通过使用新的建模构造和分析方法扩展攻击树。基于CoPNet的攻击模型具有足够的灵活性,可以对Internet入侵进行建模,包括入侵的静态和动态特征。给出了利用AT建立基于CoPNet的攻击模型的过程和规则。为了评估入侵风险,在基于CoPNet的攻击建模中加入了成本元素。我们展示了如何在CoPNets中转换和分析攻击树。最后,我们提供了一个案例研究来说明CoPNet方法。
{"title":"Cyber-attack for BGP systems using CoPNet model","authors":"A. E. Bouchti, A. Haqiq","doi":"10.1109/INTECH.2012.6457810","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457810","url":null,"abstract":"With the rise of cyber-attack activities in the recent years, research in this area has gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose Colored Petri Net (CoPNet) modeling approach by extending the attack trees with new modeling constructs and analysis approaches. CoPNet based attack model is flexible enough to model Internet intrusion, including the static and dynamic features of the intrusion. The process and rules of building CoPNet based attack model from AT are also presented. In order to evaluate the risk of intrusion, some cost elements are added to CoPNet based attack modeling. We show how attack trees can be converted and analyzed in CoPNets. Finally, we provide a case study that illustrates the CoPNet approach.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimum power allocation for Amplify-and-Forward cooperation strategy in WSN 无线传感器网络放大转发合作策略的最优功率分配
Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457761
S. Abdellaoui, Y. Fakhri, D. Aboutajdine
Energy is an extremely limited resource in wireless sensor networks (WSNs). Thereby, various power management strategies have been proposed to reduce the quantity of consumed energy. In this article, the aim of our approach is to provide the optimal transmission power in order to maximize the network lifetime using the orthogonal channels and taking into account a Symbol Error Rate (SER) constraint at the Fusion Center (FC). In order to analyze our approach, we will first study the case where the information passes by a single relay to reach the destination creating several boughs. We call this case “virtual mimo with a single relay”. Second, we will consider a specific case with a single bough and several relays and then generalize a global case with several relays and several boughs. In addition, we suppose that a Maximum Ratio Combining (MRC) is used by the receiver as a detector, and Amplify and Forward (AF) is used as a relaying strategy where the channel gain coefficients are known. Simulation results show the viability of our approach.
在无线传感器网络中,能量是一种极其有限的资源。因此,各种电源管理策略已被提出,以减少消耗的能量。在本文中,我们的方法的目的是提供最佳的传输功率,以便使用正交信道最大化网络寿命,并考虑到融合中心(FC)的符号错误率(SER)约束。为了分析我们的方法,我们将首先研究信息通过单个中继到达创建多个分支的目的地的情况。我们称这种情况为“单继电器虚拟mimo”。其次,我们将考虑具有单个分支和多个继电器的特定情况,然后推广具有多个继电器和多个分支的全局情况。此外,我们假设接收器使用最大比组合(MRC)作为检测器,放大和前向(AF)用作信道增益系数已知的中继策略。仿真结果表明了该方法的可行性。
{"title":"Optimum power allocation for Amplify-and-Forward cooperation strategy in WSN","authors":"S. Abdellaoui, Y. Fakhri, D. Aboutajdine","doi":"10.1109/INTECH.2012.6457761","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457761","url":null,"abstract":"Energy is an extremely limited resource in wireless sensor networks (WSNs). Thereby, various power management strategies have been proposed to reduce the quantity of consumed energy. In this article, the aim of our approach is to provide the optimal transmission power in order to maximize the network lifetime using the orthogonal channels and taking into account a Symbol Error Rate (SER) constraint at the Fusion Center (FC). In order to analyze our approach, we will first study the case where the information passes by a single relay to reach the destination creating several boughs. We call this case “virtual mimo with a single relay”. Second, we will consider a specific case with a single bough and several relays and then generalize a global case with several relays and several boughs. In addition, we suppose that a Maximum Ratio Combining (MRC) is used by the receiver as a detector, and Amplify and Forward (AF) is used as a relaying strategy where the channel gain coefficients are known. Simulation results show the viability of our approach.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132708142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intrusion Detection based Sample Selection for imbalanced data distribution 基于入侵检测的非平衡数据分布样本选择
Pub Date : 2012-09-01 DOI: 10.1109/INTECH.2012.6457778
Ikram Chairi, Souad Alaoui, A. Lyhyaoui
The majority of learning systems usually assume that training sets are balanced, however, in real world data this hypothesis is not always true. The problem of between-class imbalance is a challenge that has attracted growing attention from both academia and industry, because of its critical influence on the performance of learning systems. Many solutions were proposed to resolve this problem: Generally, the common practice for dealing with imbalanced data sets is to rebalance them artificially by using sampling methods. In this paper, we propose a method based on Sample Selection (SS), to deal with the problem of between class imbalance. We consider that creating balance between classes by paying more attention to those examples located near the border line improves the performance of the classifier. To reduce the computational cost of selecting samples, we propose a clustering method as a first step in order to determine the critical centers, and then we select samples from those critical clusters. Experimental results with Multi-Layer Perceptron (MLP) architecture, on well known Intrusion Detection data set, support the usefulness of our approach.
大多数学习系统通常假设训练集是平衡的,然而,在现实世界的数据中,这个假设并不总是正确的。由于班级间不平衡问题对学习系统的性能有着重要的影响,因此越来越受到学术界和工业界的关注。为了解决这个问题,提出了许多解决方案:通常,处理不平衡数据集的常见做法是通过使用抽样方法人为地重新平衡它们。在本文中,我们提出了一种基于样本选择(SS)的方法来处理类间不平衡问题。我们认为通过更多地关注那些位于边界线附近的示例来创建类之间的平衡可以提高分类器的性能。为了减少选择样本的计算成本,我们提出了一种聚类方法作为确定关键中心的第一步,然后从这些关键聚类中选择样本。在入侵检测数据集上使用多层感知器(MLP)架构的实验结果支持了该方法的有效性。
{"title":"Intrusion Detection based Sample Selection for imbalanced data distribution","authors":"Ikram Chairi, Souad Alaoui, A. Lyhyaoui","doi":"10.1109/INTECH.2012.6457778","DOIUrl":"https://doi.org/10.1109/INTECH.2012.6457778","url":null,"abstract":"The majority of learning systems usually assume that training sets are balanced, however, in real world data this hypothesis is not always true. The problem of between-class imbalance is a challenge that has attracted growing attention from both academia and industry, because of its critical influence on the performance of learning systems. Many solutions were proposed to resolve this problem: Generally, the common practice for dealing with imbalanced data sets is to rebalance them artificially by using sampling methods. In this paper, we propose a method based on Sample Selection (SS), to deal with the problem of between class imbalance. We consider that creating balance between classes by paying more attention to those examples located near the border line improves the performance of the classifier. To reduce the computational cost of selecting samples, we propose a clustering method as a first step in order to determine the critical centers, and then we select samples from those critical clusters. Experimental results with Multi-Layer Perceptron (MLP) architecture, on well known Intrusion Detection data set, support the usefulness of our approach.","PeriodicalId":369113,"journal":{"name":"Second International Conference on the Innovative Computing Technology (INTECH 2012)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134344399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Second International Conference on the Innovative Computing Technology (INTECH 2012)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1