首页 > 最新文献

2014 International Conference on Recent Trends in Information Technology最新文献

英文 中文
Smart cloud robot using raspberry Pi 使用树莓派的智能云机器人
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996193
S. Prabha, A. Antony, M. Meena, S. Pandian
Cloud robotics is an emerging field that is centered on the benefits of converged infrastructure and shared services of a cloud computing environment. In this paper, a system is designed with an autonomous robot to sense environmental data such as temperature, humidity, and air quality, along with GPS coordinates and store them on the cloud. The mobile robot is controlled using an Arduino microcontroller and communicates with the cloud via a Raspberry Pi. A private cloud is set up using OpenStack that provides Infrastructure as a Service. The collected data are stored in a cloud server which could be viewed through a web browser and can be used to create awareness about the environmental changes of the location under study. A proof-of-concept prototype has been developed to illustrate the effectiveness of the proposed system.
云机器人是一个新兴领域,它以云计算环境的融合基础设施和共享服务的优势为中心。在本文中,设计了一个由自主机器人组成的系统,用于感知环境数据,如温度、湿度和空气质量,以及GPS坐标,并将它们存储在云端。移动机器人使用Arduino微控制器进行控制,并通过树莓派与云通信。私有云是通过提供基础设施即服务的OpenStack搭建的。收集到的数据存储在云服务器中,可以通过网络浏览器查看,并可以用来了解所研究地点的环境变化。已经开发了一个概念验证原型来说明所提出系统的有效性。
{"title":"Smart cloud robot using raspberry Pi","authors":"S. Prabha, A. Antony, M. Meena, S. Pandian","doi":"10.1109/ICRTIT.2014.6996193","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996193","url":null,"abstract":"Cloud robotics is an emerging field that is centered on the benefits of converged infrastructure and shared services of a cloud computing environment. In this paper, a system is designed with an autonomous robot to sense environmental data such as temperature, humidity, and air quality, along with GPS coordinates and store them on the cloud. The mobile robot is controlled using an Arduino microcontroller and communicates with the cloud via a Raspberry Pi. A private cloud is set up using OpenStack that provides Infrastructure as a Service. The collected data are stored in a cloud server which could be viewed through a web browser and can be used to create awareness about the environmental changes of the location under study. A proof-of-concept prototype has been developed to illustrate the effectiveness of the proposed system.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Securing online reputation systems through temporal, trust and user correlation analysis 通过时间、信任和用户相关性分析来保护在线声誉系统
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996203
M. Divya, P. Kumudha, N. Anithadevi
Online reputation systems play a significant role in decision support during internet mediated service provision. With the fast development of online reputation systems in various social networks, operations against such systems are growing rapidly. It has been considered as an important but most difficult problem. In this paper, we propose a defense solution TTAUCA [Temporal, Trust And User Correlation Analysis], which secure the reputation systems from a novel angle, that is used to integrate time domain anomaly detection, Dempster-Shafer Theory based trust computation and user correlation analysis. Real user attack data collected from a cyber competition is used to construct the testing data set. Compared with previous scheme TATA [Temporal And Trust Analysis], TTAUCA achieves a better performance in terms of detecting products under attacks, identifying malicious users who insert illegitimate ratings, and recovering reputation scores of victim products.
网络声誉系统在网络中介服务提供过程中的决策支持中发挥着重要作用。随着各种社交网络中在线声誉系统的快速发展,针对此类系统的操作也在迅速增长。它一直被认为是一个重要但最难的问题。本文提出了一种新的防御方案TTAUCA (Temporal, Trust And User Correlation Analysis),将时域异常检测、基于Dempster-Shafer理论的信任计算和用户相关性分析相结合,从一个新的角度对信誉系统进行了保护。使用从网络竞赛中收集的真实用户攻击数据来构建测试数据集。与之前的方案TATA [Temporal And Trust Analysis]相比,TTAUCA在检测受到攻击的产品、识别插入非法评级的恶意用户、恢复受害产品的信誉分数等方面取得了更好的性能。
{"title":"Securing online reputation systems through temporal, trust and user correlation analysis","authors":"M. Divya, P. Kumudha, N. Anithadevi","doi":"10.1109/ICRTIT.2014.6996203","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996203","url":null,"abstract":"Online reputation systems play a significant role in decision support during internet mediated service provision. With the fast development of online reputation systems in various social networks, operations against such systems are growing rapidly. It has been considered as an important but most difficult problem. In this paper, we propose a defense solution TTAUCA [Temporal, Trust And User Correlation Analysis], which secure the reputation systems from a novel angle, that is used to integrate time domain anomaly detection, Dempster-Shafer Theory based trust computation and user correlation analysis. Real user attack data collected from a cyber competition is used to construct the testing data set. Compared with previous scheme TATA [Temporal And Trust Analysis], TTAUCA achieves a better performance in terms of detecting products under attacks, identifying malicious users who insert illegitimate ratings, and recovering reputation scores of victim products.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122716916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Opportunistic routing to mitigate attacks in MANET 机会路由以减轻MANET中的攻击
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996116
M. Elakkiya, S. Kaushik, Elizabeth. N Edna
Adhoc Networks (MANETs) are an emerging area of mobile computing. There are various challenges that are faced in adhoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. Adhoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc operations. The wireless nature of communication and lack of any security infrastructure raise several security problems. Commonly defined as the infrastructure less independent networks are prone to much vulnerability. These decentralized networks when employ conventional routing algorithms to forward data do not effectively transfer the packet to the right destination, as all these algorithms require a contemporary routing path between a source and destination node. Such prolonged link is not possible in a highly mobile network. The link between the nodes is only temporary and these links break down as the nodes move away from the direct communication range. Focusing on the secure routing against various attacks and the high probability of data delivery in an optimum manner, a Trust based opportunistic routing algorithm which is able to reliably route data despite highly unstable links is proposed in this paper. The trust model framed is incorporated in the basic routing algorithm, AODV. An attempt to explain various attack mitigation by the proposed trust model is also made.
自组网(manet)是移动计算的一个新兴领域。在特殊的环境中面临着各种各样的挑战。这主要是由于这些网络资源贫乏。它们通常是在紧急情况下设立的,用于临时行动,或者仅仅是在没有资源建立复杂网络的情况下。因此,自组织网络在网络的各个领域都提出了新的要求和问题。传统网络的解决方案通常不足以提供有效的Ad-hoc操作。通信的无线特性和安全基础设施的缺乏引发了几个安全问题。通常定义为基础设施不太独立的网络容易受到很多攻击。当使用传统路由算法来转发数据时,这些分散的网络不能有效地将数据包传输到正确的目的地,因为所有这些算法都需要在源节点和目标节点之间使用现代路由路径。如此长的连接在高度移动的网络中是不可能的。节点之间的链接只是暂时的,当节点离开直接通信范围时,这些链接就会中断。针对针对各种攻击的安全路由和数据以最优方式传输的高概率问题,提出了一种基于信任的机会路由算法,该算法能够在链路高度不稳定的情况下可靠地路由数据。该信任模型被纳入到基本路由算法AODV中。本文还尝试用所提出的信任模型来解释各种攻击缓解。
{"title":"Opportunistic routing to mitigate attacks in MANET","authors":"M. Elakkiya, S. Kaushik, Elizabeth. N Edna","doi":"10.1109/ICRTIT.2014.6996116","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996116","url":null,"abstract":"Adhoc Networks (MANETs) are an emerging area of mobile computing. There are various challenges that are faced in adhoc environment. These are mostly due to the resource poorness of these networks. They are usually set up in situations of emergency, for temporary operations or simply if there are no resources to set up elaborate networks. Adhoc networks therefore throw up new requirements and problems in all areas of networking. The solutions for conventional networks are usually not sufficient to provide efficient Ad-hoc operations. The wireless nature of communication and lack of any security infrastructure raise several security problems. Commonly defined as the infrastructure less independent networks are prone to much vulnerability. These decentralized networks when employ conventional routing algorithms to forward data do not effectively transfer the packet to the right destination, as all these algorithms require a contemporary routing path between a source and destination node. Such prolonged link is not possible in a highly mobile network. The link between the nodes is only temporary and these links break down as the nodes move away from the direct communication range. Focusing on the secure routing against various attacks and the high probability of data delivery in an optimum manner, a Trust based opportunistic routing algorithm which is able to reliably route data despite highly unstable links is proposed in this paper. The trust model framed is incorporated in the basic routing algorithm, AODV. An attempt to explain various attack mitigation by the proposed trust model is also made.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115199240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient method for crowd event recognition based on motion patterns 一种基于运动模式的人群事件识别方法
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996124
C. Sindhuja, K. .. Srinivasagan, S. Kalaiselvi
An automated visual monitoring process expands from low level analysis of object detection and tracking to the interpretation of their behaviors. Analyzing human crowd is an emerging trend in intelligent video surveillance for the purpose of detecting abnormalities. Tracking every human being in a crowd and analyzing their behavior is a challenging task due to occlusions. Hence, the crowd can be handled as a group entity instead of tracking the individual in the crowd. The behavior of the crowd can be distinguished with motion patterns due to prominent spatio-temporal characteristics. The proposed system involves a systematic approach to recognize the global events in human crowd through observing motion patterns such as flow, speed and direction. Initially as a preprocessing step, background subtraction is performed to extract the foreground blobs and optical flow is estimated to obtain the velocity and direction of motion. The human crowds are then clustered based on similar direction and proximity using Adjacency Matrix based Clustering (AMC). After clustering, the centroid and orientation of the cluster are extracted inorder to represent the behavior of crowd. Finally the multiclass Support Vector Machine (SVM) is trained to correctly recognize the behavior of crowd.
一个自动化的视觉监控过程从对目标检测和跟踪的低级分析扩展到对其行为的解释。分析人群是智能视频监控的一个新兴趋势,目的是检测异常情况。由于闭塞,跟踪人群中的每个人并分析他们的行为是一项具有挑战性的任务。因此,可以将人群作为一个群体实体来处理,而不是跟踪人群中的个人。人群的行为具有明显的时空特征,可以用运动模式来区分。该系统通过观察人群的流动、速度和方向等运动模式,系统地识别人群中的全局事件。首先,作为预处理步骤,进行背景相减以提取前景斑点,并估计光流以获得运动速度和方向。然后使用基于邻接矩阵的聚类(AMC)基于相似方向和接近度对人群进行聚类。聚类后,提取聚类的质心和方向来表示群体的行为。最后训练多类支持向量机(SVM)正确识别人群的行为。
{"title":"An efficient method for crowd event recognition based on motion patterns","authors":"C. Sindhuja, K. .. Srinivasagan, S. Kalaiselvi","doi":"10.1109/ICRTIT.2014.6996124","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996124","url":null,"abstract":"An automated visual monitoring process expands from low level analysis of object detection and tracking to the interpretation of their behaviors. Analyzing human crowd is an emerging trend in intelligent video surveillance for the purpose of detecting abnormalities. Tracking every human being in a crowd and analyzing their behavior is a challenging task due to occlusions. Hence, the crowd can be handled as a group entity instead of tracking the individual in the crowd. The behavior of the crowd can be distinguished with motion patterns due to prominent spatio-temporal characteristics. The proposed system involves a systematic approach to recognize the global events in human crowd through observing motion patterns such as flow, speed and direction. Initially as a preprocessing step, background subtraction is performed to extract the foreground blobs and optical flow is estimated to obtain the velocity and direction of motion. The human crowds are then clustered based on similar direction and proximity using Adjacency Matrix based Clustering (AMC). After clustering, the centroid and orientation of the cluster are extracted inorder to represent the behavior of crowd. Finally the multiclass Support Vector Machine (SVM) is trained to correctly recognize the behavior of crowd.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115916550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A combined random noise perturbation approach for multi level privacy preservation in data mining 数据挖掘中多级隐私保护的组合随机噪声摄动方法
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996194
S. Chidambaram, K. .. Srinivasagan
Now a Days huge volume of personal and sensitive data is collected and retrieved by various enterprises like social networking system, health networks, financial organizations and retailers. There are three main entities such as data owner; the database service provider and the client are mainly involved in this type of outsourced based data model. So that is more essential for the privacy preservation of the owner. Privacy preservation is a main challenging area in data mining. In that, Data based privacy perturbation technique is the standard model which performs the data transformation process before publishing the data. This paper proposes Additive Multiplicative Perturbation Privacy Preserving Data Mining (AM-PPDM) which is suitable for multiple trust level. In that, the random noise perturbation is applied to individual values before the data are published. This hybrid approach improves the privacy guarantee value during the reconstruction process. In AM-PPDM, the generated random Gaussian noise multiplied with the original data to produce different perturbed copies at various trust levels. By implementing this approach, the diversity attack is completely avoided during the reconstruction process.
如今,社交网络系统、医疗网络、金融机构和零售商等各种企业正在收集和检索大量的个人和敏感数据。有三个主要实体,如数据所有者;数据库服务提供者和客户端主要参与这种基于外包的数据模型。因此,这对于保护所有者的隐私更为重要。隐私保护是数据挖掘中一个具有挑战性的领域。其中,基于数据的隐私扰动技术是在数据发布前进行数据转换的标准模型。提出了适用于多信任级别的加性乘性摄动隐私保护数据挖掘方法(AM-PPDM)。在这种情况下,在数据公布之前,随机噪声扰动被应用于单个值。这种混合方法提高了重构过程中的隐私保证值。在AM-PPDM中,生成的随机高斯噪声与原始数据相乘,在不同的信任级别上产生不同的扰动副本。通过实现这种方法,完全避免了重构过程中的分集攻击。
{"title":"A combined random noise perturbation approach for multi level privacy preservation in data mining","authors":"S. Chidambaram, K. .. Srinivasagan","doi":"10.1109/ICRTIT.2014.6996194","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996194","url":null,"abstract":"Now a Days huge volume of personal and sensitive data is collected and retrieved by various enterprises like social networking system, health networks, financial organizations and retailers. There are three main entities such as data owner; the database service provider and the client are mainly involved in this type of outsourced based data model. So that is more essential for the privacy preservation of the owner. Privacy preservation is a main challenging area in data mining. In that, Data based privacy perturbation technique is the standard model which performs the data transformation process before publishing the data. This paper proposes Additive Multiplicative Perturbation Privacy Preserving Data Mining (AM-PPDM) which is suitable for multiple trust level. In that, the random noise perturbation is applied to individual values before the data are published. This hybrid approach improves the privacy guarantee value during the reconstruction process. In AM-PPDM, the generated random Gaussian noise multiplied with the original data to produce different perturbed copies at various trust levels. By implementing this approach, the diversity attack is completely avoided during the reconstruction process.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123661881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Weighted Category Matching Algorithm in Sensor Cloud for rapid retrieval 基于传感器云的快速检索加权分类匹配算法
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996148
S. Ramachandran, S. Grace, S. S. Beevi
Sensor-cloud is a relatively new interdisciplinary domain that combines the fields of Wireless Sensor Networks (WSN) and Cloud Computing. The major issue needs to be addressed in Sensor-Cloud is storage and retrieval of data. Data security is preserved by encrypting the sensor data before storing it into the cloud. On analysis of existing methods, there are two different issues, First issue; Encrypted Document matching is performed based on their plaintext keywords which is not suitable for sensor data and Second issue, subscribers are categorized based on their predicates. So, the storage space required is more. To overcome these issues, the paper proposes a new indexing structure which is suitable for sensor data and a new algorithm called Weighted Category Matching Algorithm (WCMA) for quick retrieval. On comparing with existing methods, the proposed WCMA algorithm achieves a better document retrieval and results are discussed in implementation details.
传感器云是无线传感器网络(WSN)与云计算相结合的一个相对较新的跨学科领域。在Sensor-Cloud中需要解决的主要问题是数据的存储和检索。在将传感器数据存储到云中之前,通过加密数据来保护数据的安全性。对现有方法进行分析,存在两个不同的问题,一是问题;加密文档匹配基于其明文关键字,这是不适合传感器数据;第二,订阅者分类基于他们的谓词。因此,所需的存储空间更多。为了克服这些问题,本文提出了一种新的适合传感器数据的索引结构和一种新的快速检索算法加权分类匹配算法(WCMA)。通过与现有方法的比较,本文提出的WCMA算法取得了更好的文档检索效果,并对实现结果进行了详细讨论。
{"title":"Weighted Category Matching Algorithm in Sensor Cloud for rapid retrieval","authors":"S. Ramachandran, S. Grace, S. S. Beevi","doi":"10.1109/ICRTIT.2014.6996148","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996148","url":null,"abstract":"Sensor-cloud is a relatively new interdisciplinary domain that combines the fields of Wireless Sensor Networks (WSN) and Cloud Computing. The major issue needs to be addressed in Sensor-Cloud is storage and retrieval of data. Data security is preserved by encrypting the sensor data before storing it into the cloud. On analysis of existing methods, there are two different issues, First issue; Encrypted Document matching is performed based on their plaintext keywords which is not suitable for sensor data and Second issue, subscribers are categorized based on their predicates. So, the storage space required is more. To overcome these issues, the paper proposes a new indexing structure which is suitable for sensor data and a new algorithm called Weighted Category Matching Algorithm (WCMA) for quick retrieval. On comparing with existing methods, the proposed WCMA algorithm achieves a better document retrieval and results are discussed in implementation details.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123681213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and implementation of non-volatile memory express 非易失性存储器express的设计与实现
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996190
Sivashankar, S. Ramasamy
Flash-memory-based solid-state disks (SSDs) provide faster random access and data transfer rates than electromechanical drives and today it can often serve as rotating-disk replacements, but the host interface to SSDs remains a performance bottleneck and also I/O subsystem causes unnecessary latencies, translations in the Read/Write commands. In order to completely utilize the performance of SSDs a Non Volatile Memory Subsystem was designed based on the NVM Express Specification. The communication to this I/O subsystem is through PCI Express interface and the command set is based on NVMe 1.0c Specification. The designed sub-system typically consists of PCIe Core, PCIe controller, NVMe controller, NAND Flash Controller and several NAND Chips. The present paper deals with the design and implementation of PCIe controller and the NVMe controller. The PCIe controller was designed as a generic bridge between any PCIe device and the PCIe Core. The NVMe controller was designed as a PCIe device which implements the NVMe Specification.
基于闪存的固态磁盘(ssd)提供比机电驱动器更快的随机访问和数据传输速率,今天它通常可以作为旋转磁盘的替代品,但是到ssd的主机接口仍然是性能瓶颈,而且I/O子系统导致不必要的延迟,读/写命令的转换。为了充分利用固态硬盘的性能,设计了基于NVM Express规范的非易失性存储器子系统。与该I/O子系统的通信采用PCI Express接口,命令集基于NVMe 1.0c规范。设计的子系统通常由PCIe核心、PCIe控制器、NVMe控制器、NAND闪存控制器和多个NAND芯片组成。本文讨论了PCIe控制器和NVMe控制器的设计与实现。PCIe控制器被设计为任何PCIe设备和PCIe核心之间的通用桥梁。NVMe控制器被设计为实现NVMe规范的PCIe器件。
{"title":"Design and implementation of non-volatile memory express","authors":"Sivashankar, S. Ramasamy","doi":"10.1109/ICRTIT.2014.6996190","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996190","url":null,"abstract":"Flash-memory-based solid-state disks (SSDs) provide faster random access and data transfer rates than electromechanical drives and today it can often serve as rotating-disk replacements, but the host interface to SSDs remains a performance bottleneck and also I/O subsystem causes unnecessary latencies, translations in the Read/Write commands. In order to completely utilize the performance of SSDs a Non Volatile Memory Subsystem was designed based on the NVM Express Specification. The communication to this I/O subsystem is through PCI Express interface and the command set is based on NVMe 1.0c Specification. The designed sub-system typically consists of PCIe Core, PCIe controller, NVMe controller, NAND Flash Controller and several NAND Chips. The present paper deals with the design and implementation of PCIe controller and the NVMe controller. The PCIe controller was designed as a generic bridge between any PCIe device and the PCIe Core. The NVMe controller was designed as a PCIe device which implements the NVMe Specification.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114839474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Trustworthy mechanisms for selecting cloud service providers 选择云服务提供商的可靠机制
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996182
B. L. Elizabeth, K. Ramya, A. Prakash, V. R. Uthariaraj
Cloud computing has changed the nature of IT and business. However the adoption issues for the cloud is mainly due to the lack of transparency and control. Also, there are too many cloud service providers in the marketplace offering similar functionalities. In order to support the consumers in identifying trustful cloud providers, Trustworthy mechanisms for selecting cloud service providers is proposed in this paper. The proposed system is implemented using feedbacks and credential attributes (QoS) of providers. A modified Identity model is proposed to identify malicious feedbacks and provides improvements in the trust computation. Results show that the trust computation using the proposed architecture is more efficient in terms of finding accurate trust based providers.
云计算已经改变了IT和商业的本质。然而,云的采用问题主要是由于缺乏透明度和控制。此外,市场上有太多的云服务提供商提供类似的功能。为了支持消费者识别可信任的云服务提供商,本文提出了可信任的云服务提供商选择机制。该系统利用提供者的反馈和证书属性(QoS)来实现。提出了一种改进的身份模型来识别恶意反馈,并改进了信任计算。结果表明,使用该体系结构的信任计算在寻找精确的基于信任的提供者方面效率更高。
{"title":"Trustworthy mechanisms for selecting cloud service providers","authors":"B. L. Elizabeth, K. Ramya, A. Prakash, V. R. Uthariaraj","doi":"10.1109/ICRTIT.2014.6996182","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996182","url":null,"abstract":"Cloud computing has changed the nature of IT and business. However the adoption issues for the cloud is mainly due to the lack of transparency and control. Also, there are too many cloud service providers in the marketplace offering similar functionalities. In order to support the consumers in identifying trustful cloud providers, Trustworthy mechanisms for selecting cloud service providers is proposed in this paper. The proposed system is implemented using feedbacks and credential attributes (QoS) of providers. A modified Identity model is proposed to identify malicious feedbacks and provides improvements in the trust computation. Results show that the trust computation using the proposed architecture is more efficient in terms of finding accurate trust based providers.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115242649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable graph based routing in VANET environment VANET环境下基于图的可靠路由
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996153
R. Kirtiga, O. S. GnanaPrakasi, D. Kavipriya, R. Anita, P. Varalakshmi
Vehicular ad hoc networks are a subclass of wireless networks in which vehicles on the road act as nodes, exchanging traffic and road safety information. The traditional MANET specific routing protocols is not as effective in VANET environment. The occurrence of link breakage is very frequent in VANET when compared to MANET due to the swift movement of the vehicles. Hence, this highly dynamic behaviour of VANETs demands a reliable routing strategy. As of now, not much attention is laid on routing reliability of VANETs in highway environment. Our objective is to propose a reliable routing protocol that minimizes link breakage and thereby increasing the throughput in VANET- variable velocity environment. The mechanism is based on the mathematical model of normal (Gaussian) distribution, which is a continuous probability distribution function. This function is used to estimate the link reliability between the vehicular nodes in the road. Based on the computed link reliability values between the nodes, the system constructs an evolving graph in a dynamic fashion and the route reliability value is estimated from the graph. This route forms the Most Reliable Journey for the data transmission.
车辆自组织网络是无线网络的一个子类,其中道路上的车辆充当节点,交换交通和道路安全信息。传统的MANET专用路由协议在VANET环境下不太有效。与MANET相比,由于车辆的快速移动,VANET中链路断裂的发生非常频繁。因此,vanet的这种高度动态行为需要可靠的路由策略。目前,对高速公路环境下VANETs路由可靠性的研究还不够深入。我们的目标是提出一种可靠的路由协议,以减少链路中断,从而提高VANET可变速度环境下的吞吐量。其机理基于正态(高斯)分布的数学模型,这是一个连续的概率分布函数。该函数用于估计道路中车辆节点之间的链路可靠性。系统根据计算得到的节点间链路可靠性值,动态构造演化图,并从演化图中估计路由可靠性值。这条路由构成了数据传输的最可靠旅程。
{"title":"Reliable graph based routing in VANET environment","authors":"R. Kirtiga, O. S. GnanaPrakasi, D. Kavipriya, R. Anita, P. Varalakshmi","doi":"10.1109/ICRTIT.2014.6996153","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996153","url":null,"abstract":"Vehicular ad hoc networks are a subclass of wireless networks in which vehicles on the road act as nodes, exchanging traffic and road safety information. The traditional MANET specific routing protocols is not as effective in VANET environment. The occurrence of link breakage is very frequent in VANET when compared to MANET due to the swift movement of the vehicles. Hence, this highly dynamic behaviour of VANETs demands a reliable routing strategy. As of now, not much attention is laid on routing reliability of VANETs in highway environment. Our objective is to propose a reliable routing protocol that minimizes link breakage and thereby increasing the throughput in VANET- variable velocity environment. The mechanism is based on the mathematical model of normal (Gaussian) distribution, which is a continuous probability distribution function. This function is used to estimate the link reliability between the vehicular nodes in the road. Based on the computed link reliability values between the nodes, the system constructs an evolving graph in a dynamic fashion and the route reliability value is estimated from the graph. This route forms the Most Reliable Journey for the data transmission.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123599335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Protocol Independent Detection and Classification (PIDC) system for DRDoS attack 针对ddos攻击的协议独立检测与分类(PIDC)系统
Pub Date : 2014-04-10 DOI: 10.1109/ICRTIT.2014.6996154
P. Mohana Priya, V. Akilandeswari, S. Shalinie, V. Lavanya, M. Shanmuga Priya
High-rate flooding attack detection and classification has become a necessary component for network administrators due to their attack range that affects the Data Center servers. The main objective of this paper is to propose the Protocol Independent Detection and Classification (PIDC) system in order to prevent the web servers from devastating attacks such as Distributed Reflection Denial of Service (DRDoS) attacks. The DRDoS flooding attack exploits fixed IP spoofing to defeat the Distributed Denial of Service (DDoS) attack prevention measures. This is the first paper to detect and classify the types of reflected attacks using SNMP MIB variables. The proposed PIDC system uses the data mining and machine learning techniques to detect all types of reflected flooding attacks. The rank correlation based detection algorithm retrieves the incoming traffic in the form of Simple Network Management Protocol -Management Information Base (SNMP-MIB) variables and finds the relationship between the MIB variables to detect the attacks from the normal traffic. Then, C4.5 classification algorithm extracts and frames association rule based on protocol information from reflected DDoS flooding attacks. Finally, the CPU, memory and disk resource distribution to legitimate requests are also increased. This method achieves 99% of true positive rates and less false positive rate of (1%) when compared to existing reflected attack detection methods. Moreover, these attacks are classified by types such as TCP reflection attacks and DNS reflection attacks with the highest probability of attack traffic.
由于高速泛洪攻击的攻击范围广泛,影响到整个数据中心服务器,成为网络管理员必备的检测与分类组件。本文的主要目的是提出一种协议独立检测与分类(PIDC)系统,以防止web服务器遭受分布式反射拒绝服务(DRDoS)攻击等破坏性攻击。DDoS (Distributed Denial of Service)攻击是一种利用固定IP欺骗来攻击DDoS (Distributed Denial of Service)防御措施的攻击方式。这是第一篇使用SNMP MIB变量检测和分类反射攻击类型的论文。所提出的PIDC系统使用数据挖掘和机器学习技术来检测所有类型的反射洪水攻击。基于等级关联的检测算法以SNMP-MIB (Simple Network Management Protocol -Management Information Base)变量的形式检索进入的流量,通过查找MIB变量之间的关系,对正常流量进行攻击检测。然后,C4.5分类算法根据反射式DDoS洪水攻击的协议信息提取关联规则并将其帧化。最后,分配给合法请求的CPU、内存和磁盘资源也增加了。与现有的反射攻击检测方法相比,该方法实现了99%的真阳性率和更低的假阳性率(1%)。此外,这些攻击还根据攻击流量概率最高的类型进行分类,如TCP反射攻击和DNS反射攻击。
{"title":"The Protocol Independent Detection and Classification (PIDC) system for DRDoS attack","authors":"P. Mohana Priya, V. Akilandeswari, S. Shalinie, V. Lavanya, M. Shanmuga Priya","doi":"10.1109/ICRTIT.2014.6996154","DOIUrl":"https://doi.org/10.1109/ICRTIT.2014.6996154","url":null,"abstract":"High-rate flooding attack detection and classification has become a necessary component for network administrators due to their attack range that affects the Data Center servers. The main objective of this paper is to propose the Protocol Independent Detection and Classification (PIDC) system in order to prevent the web servers from devastating attacks such as Distributed Reflection Denial of Service (DRDoS) attacks. The DRDoS flooding attack exploits fixed IP spoofing to defeat the Distributed Denial of Service (DDoS) attack prevention measures. This is the first paper to detect and classify the types of reflected attacks using SNMP MIB variables. The proposed PIDC system uses the data mining and machine learning techniques to detect all types of reflected flooding attacks. The rank correlation based detection algorithm retrieves the incoming traffic in the form of Simple Network Management Protocol -Management Information Base (SNMP-MIB) variables and finds the relationship between the MIB variables to detect the attacks from the normal traffic. Then, C4.5 classification algorithm extracts and frames association rule based on protocol information from reflected DDoS flooding attacks. Finally, the CPU, memory and disk resource distribution to legitimate requests are also increased. This method achieves 99% of true positive rates and less false positive rate of (1%) when compared to existing reflected attack detection methods. Moreover, these attacks are classified by types such as TCP reflection attacks and DNS reflection attacks with the highest probability of attack traffic.","PeriodicalId":422275,"journal":{"name":"2014 International Conference on Recent Trends in Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2014 International Conference on Recent Trends in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1