Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412391
J. Valverde-Rebaza, A. Lopes
Currently, social networks and social media have attracted increasing research interest. In this context, link prediction is one of the most important tasks since it can predict the existence or missing of a future relation between user members in a social network. In this paper, we describe experiments to analyze the viability of applying the within and inter cluster (WIC) measure for predicting the existence of a future link on a large-scale online social network. Compared with undirected social networks, directed social networks have received less attention and still are not well understood, mainly due to the occurrence of asymmetric links. The WIC measure combines the local structural similarity information and community information to improve link prediction accuracy. We compare the WIC measure with classical measures based on local structural similarities, using real data from Twitter, a directed and asymmetric large-scale online social network. Our experiments show that the WIC measure can be used efficiently on directed and asymmetric large-scale networks. Moreover, it outperforms all compared measures employed for link prediction.
{"title":"Structural link prediction using community information on Twitter","authors":"J. Valverde-Rebaza, A. Lopes","doi":"10.1109/CASoN.2012.6412391","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412391","url":null,"abstract":"Currently, social networks and social media have attracted increasing research interest. In this context, link prediction is one of the most important tasks since it can predict the existence or missing of a future relation between user members in a social network. In this paper, we describe experiments to analyze the viability of applying the within and inter cluster (WIC) measure for predicting the existence of a future link on a large-scale online social network. Compared with undirected social networks, directed social networks have received less attention and still are not well understood, mainly due to the occurrence of asymmetric links. The WIC measure combines the local structural similarity information and community information to improve link prediction accuracy. We compare the WIC measure with classical measures based on local structural similarities, using real data from Twitter, a directed and asymmetric large-scale online social network. Our experiments show that the WIC measure can be used efficiently on directed and asymmetric large-scale networks. Moreover, it outperforms all compared measures employed for link prediction.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121155906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412405
Umesh Hodeghatta Rao Xavier, B. P. Pati
Recent news on financial losses due to lack of information security has created certain awareness of its importance among computer users. This paper presents the results arrived from an initial response of 340 questionnaires distributed to the home users, who are not computer savvy. The survey was conducted to assess the awareness of computer and internet security during their day-to-day usage of internet. Results show that a user's awareness of security plays a significant role. This paper also proposes developing a software solution to protect home users' computer system based on the internet usage and behavioral pattern.
{"title":"Study of internet security threats among home users","authors":"Umesh Hodeghatta Rao Xavier, B. P. Pati","doi":"10.1109/CASoN.2012.6412405","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412405","url":null,"abstract":"Recent news on financial losses due to lack of information security has created certain awareness of its importance among computer users. This paper presents the results arrived from an initial response of 340 questionnaires distributed to the home users, who are not computer savvy. The survey was conducted to assess the awareness of computer and internet security during their day-to-day usage of internet. Results show that a user's awareness of security plays a significant role. This paper also proposes developing a software solution to protect home users' computer system based on the internet usage and behavioral pattern.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126903725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412402
J. Gibson, Robin Rondeau, Darren Eveleigh, Qing Tan
Cloud computing can be defined as the use of new or existing computing hardware and virtualization technologies to form a shared infrastructure that enables web-based value added services. The three predominant service models are infrastructure, platform, and software-asa-service. Infrastructure-as-a-Service (IaaS) can be defined as the use of servers, storage, and virtualization to enable utility like services for users. Security is a big concern within IaaS, especially considering that the rest of the cloud service models run on top of the infrastructure and related layers. Platform-as-a-Service (PaaS) providers offer access to APIs, programming languages and development middleware which allows subscribers to develop custom applications without installing or configuring the development environment. Software-as-a-Service (SaaS) gives subscribed or pay-peruse users access to software or services which reside in the cloud and not on the user's device. Understanding the cloud service models is critical in determining if cloud services or hosting are an appropriate business solution, and if so, which model best balances the level of control required versus reduced hardware, configuration, and maintenance costs. Cloud computing offers many benefits to organizations; it has enabled collaboration amongst disparate communities and workgroups, and has overcome challenges that have plagued existing business solutions. However, the security, privacy, and integrity of the cloud are of prime importance and there are many challenges that exist. At the present time there seems to be a lot of momentum behind the adoption of cloud computing despite these. This may simply be a trend, an indication that society truly wants their data to be available whenever from anywhere, or a sign that few understand the associated risks.
{"title":"Benefits and challenges of three cloud computing service models","authors":"J. Gibson, Robin Rondeau, Darren Eveleigh, Qing Tan","doi":"10.1109/CASoN.2012.6412402","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412402","url":null,"abstract":"Cloud computing can be defined as the use of new or existing computing hardware and virtualization technologies to form a shared infrastructure that enables web-based value added services. The three predominant service models are infrastructure, platform, and software-asa-service. Infrastructure-as-a-Service (IaaS) can be defined as the use of servers, storage, and virtualization to enable utility like services for users. Security is a big concern within IaaS, especially considering that the rest of the cloud service models run on top of the infrastructure and related layers. Platform-as-a-Service (PaaS) providers offer access to APIs, programming languages and development middleware which allows subscribers to develop custom applications without installing or configuring the development environment. Software-as-a-Service (SaaS) gives subscribed or pay-peruse users access to software or services which reside in the cloud and not on the user's device. Understanding the cloud service models is critical in determining if cloud services or hosting are an appropriate business solution, and if so, which model best balances the level of control required versus reduced hardware, configuration, and maintenance costs. Cloud computing offers many benefits to organizations; it has enabled collaboration amongst disparate communities and workgroups, and has overcome challenges that have plagued existing business solutions. However, the security, privacy, and integrity of the cloud are of prime importance and there are many challenges that exist. At the present time there seems to be a lot of momentum behind the adoption of cloud computing despite these. This may simply be a trend, an indication that society truly wants their data to be available whenever from anywhere, or a sign that few understand the associated risks.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130004242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412426
Ulisses Cavalca, C. Mesquita, A. Pereira, E. G. Carrano
In recent years, computer networks have been characterized by heterogeneous traffic and dynamic management of different kinds of services. The network requirements have increased within time and, since bandwidth is limited, it becomes necessary to employ optimization procedures in order to make the network able to operate in its full capacity. Traffic shaping mechanisms implement Quality of Service (QoS) concepts to ensure acceptable service levels. This paper shows preliminary results of an empirical approach for traffic shaping optimization. It is proposed a methodology based on throughput and packet loss optimization through multiobjective genetic algorithms.
{"title":"A methodology for traffic shaping multiobjective optimization for next generation network","authors":"Ulisses Cavalca, C. Mesquita, A. Pereira, E. G. Carrano","doi":"10.1109/CASoN.2012.6412426","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412426","url":null,"abstract":"In recent years, computer networks have been characterized by heterogeneous traffic and dynamic management of different kinds of services. The network requirements have increased within time and, since bandwidth is limited, it becomes necessary to employ optimization procedures in order to make the network able to operate in its full capacity. Traffic shaping mechanisms implement Quality of Service (QoS) concepts to ensure acceptable service levels. This paper shows preliminary results of an empirical approach for traffic shaping optimization. It is proposed a methodology based on throughput and packet loss optimization through multiobjective genetic algorithms.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412414
M. Rassam, A. Zainal, M. A. Maarof
To ensure the quality of data collected by sensor networks, misbehavior in measurements should be detected efficiently and accurately in each sensor node before relying the data to the base station. In this paper, a novel anomaly detection model is proposed based on the lightweight One Class Principal Component Classifier for detecting anomalies in sensor measurements collected by each node locally. The efficiency and accuracy of the proposed model are demonstrated using two real life wireless sensor networks datasets namely; labeled dataset (LD) and Intel Berkeley Research Lab dataset (IBRL). The simulation results show that our model achieves higher detection accuracy with relatively lower false alarms. Furthermore, the proposed model incurs less energy consumption by reducing the computational complexity in each node.
{"title":"One-Class Principal Component Classifier for anomaly detection in wireless sensor network","authors":"M. Rassam, A. Zainal, M. A. Maarof","doi":"10.1109/CASoN.2012.6412414","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412414","url":null,"abstract":"To ensure the quality of data collected by sensor networks, misbehavior in measurements should be detected efficiently and accurately in each sensor node before relying the data to the base station. In this paper, a novel anomaly detection model is proposed based on the lightweight One Class Principal Component Classifier for detecting anomalies in sensor measurements collected by each node locally. The efficiency and accuracy of the proposed model are demonstrated using two real life wireless sensor networks datasets namely; labeled dataset (LD) and Intel Berkeley Research Lab dataset (IBRL). The simulation results show that our model achieves higher detection accuracy with relatively lower false alarms. Furthermore, the proposed model incurs less energy consumption by reducing the computational complexity in each node.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127111270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412376
Yoonjae Lee, Junseok Oh, B. Lee
The development of mobile devices and Social Network Service (SNS) has explosively increased unstructured data. The purpose of this study is to suggest the abstract push framework in the Social Big Data environment especially for real-time SNS. Through the analysis of previous push services, the study found limitations such as fixed payload size, duplicated development of each mobile OS, and messages lost in the air interface. The proposed framework added new functions that serve as the temporary storage in the push façade and the local storage in the client device. It is to solve the message lost problems and enables to use Offline SNS through pre-caching the contents operation of contents. The stakeholders of the push service - Service Providers (SP), Contents Providers (CP) - can refer to the framework and improve their services. The limitation of this study is that only the abstract version of the framework is suggested. Detailed simulation results and its performance compared to other frameworks will be conducted after development of the prototype in the future.
{"title":"Logical push framework for real-time SNS processing","authors":"Yoonjae Lee, Junseok Oh, B. Lee","doi":"10.1109/CASoN.2012.6412376","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412376","url":null,"abstract":"The development of mobile devices and Social Network Service (SNS) has explosively increased unstructured data. The purpose of this study is to suggest the abstract push framework in the Social Big Data environment especially for real-time SNS. Through the analysis of previous push services, the study found limitations such as fixed payload size, duplicated development of each mobile OS, and messages lost in the air interface. The proposed framework added new functions that serve as the temporary storage in the push façade and the local storage in the client device. It is to solve the message lost problems and enables to use Offline SNS through pre-caching the contents operation of contents. The stakeholders of the push service - Service Providers (SP), Contents Providers (CP) - can refer to the framework and improve their services. The limitation of this study is that only the abstract version of the framework is suggested. Detailed simulation results and its performance compared to other frameworks will be conducted after development of the prototype in the future.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126278144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412375
Bogdan Gliwa, Anna Zygmunt, A. Byrski
Identifying communities in social networks becomes an increasingly important research problem. Several methods for identifying such groups have been developed, however, qualitative analysis (taking into account the scale of the problem) still poses serious problems. This paper describes a tool for facilitating such an analysis, allowing to visualize the dynamics and supporting localization of different events (such as creation or merging of groups). In the final part of the paper, the experimental results performed using the benchmark data (Enron emails) provide an insight into usefulness of the proposed tool.
{"title":"Graphical analysis of social group dynamics","authors":"Bogdan Gliwa, Anna Zygmunt, A. Byrski","doi":"10.1109/CASoN.2012.6412375","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412375","url":null,"abstract":"Identifying communities in social networks becomes an increasingly important research problem. Several methods for identifying such groups have been developed, however, qualitative analysis (taking into account the scale of the problem) still poses serious problems. This paper describes a tool for facilitating such an analysis, allowing to visualize the dynamics and supporting localization of different events (such as creation or merging of groups). In the final part of the paper, the experimental results performed using the benchmark data (Enron emails) provide an insight into usefulness of the proposed tool.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125704312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412392
K. Wegrzyn-Wolska, L. Bougueroua
This paper describes a system which surveys the French Presidential Election trends from Twitter's discussions. This system carries out the automatic collection, evaluation and rating of tweets for evaluating the trends. The objective of this paper is to discuss the variety of issues and challenges surrounding the perspectives regarding the use of Social Network Analyses and Text Mining methods for applications in politics. The article will first present a review of the literature in Social Media and Text Mining analysis for political purposes and then describe the work done for our system for collecting and manipulating Twitter's data.
{"title":"Tweets mining for French Presidential Election","authors":"K. Wegrzyn-Wolska, L. Bougueroua","doi":"10.1109/CASoN.2012.6412392","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412392","url":null,"abstract":"This paper describes a system which surveys the French Presidential Election trends from Twitter's discussions. This system carries out the automatic collection, evaluation and rating of tweets for evaluating the trends. The objective of this paper is to discuss the variety of issues and challenges surrounding the perspectives regarding the use of Social Network Analyses and Text Mining methods for applications in politics. The article will first present a review of the literature in Social Media and Text Mining analysis for political purposes and then describe the work done for our system for collecting and manipulating Twitter's data.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130943195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412411
N. Nassar, G. Miller
The security of web applications is an ongoing dilemma. Hackers and bots are getting more and more innovative in bypassing the various defensive tools implemented to enforce security. e-Commerce Applications, such as those used for the transaction processes, could be in a placed in a position of not providing a fair chance to all consumers because because can interact more quickly. This is especially true when a commerce site offers hot inventory items where many traders are competing to get a limited supply item. The e-Commerce site's security is compromised when some traders utilize pre-formatted scripts or spiders to place orders, thus giving them an unfair advantage The problem is: how to eliminate scripts/spiders in a given web application flow by using a solution that is difficult to crack while requiring no additional actions taken by the end user. Our paper introduces an innovative multi-layer approach to honeypots where cashing or bypassing the honeypot is technically impractical.
{"title":"Method for a two dimensional honeypot to deter web bots in commerce systems","authors":"N. Nassar, G. Miller","doi":"10.1109/CASoN.2012.6412411","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412411","url":null,"abstract":"The security of web applications is an ongoing dilemma. Hackers and bots are getting more and more innovative in bypassing the various defensive tools implemented to enforce security. e-Commerce Applications, such as those used for the transaction processes, could be in a placed in a position of not providing a fair chance to all consumers because because can interact more quickly. This is especially true when a commerce site offers hot inventory items where many traders are competing to get a limited supply item. The e-Commerce site's security is compromised when some traders utilize pre-formatted scripts or spiders to place orders, thus giving them an unfair advantage The problem is: how to eliminate scripts/spiders in a given web application flow by using a solution that is difficult to crack while requiring no additional actions taken by the end user. Our paper introduces an innovative multi-layer approach to honeypots where cashing or bypassing the honeypot is technically impractical.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124224008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412397
O. Althobaiti, Mznah Al-Rodhaan, A. Al-Dhelaan
The most important requirements of Wireless Sensor Network (WSN) security are confidentiality, authentication and integrity. User authentication is necessary for legitimate access control in WSNs. These sensors have limited processing power, bandwidth, memory and limited communication abilities. Assume that WSN is deployed in a hospital, a university campus, or a smart home, to permit legal users to query and receive the particular response from any of this sensor node of WSN. Significantly, the system must produce authentication method for confirming if the user is legal or not. We present a solution based on biometric for this problem and also adapt it for WSN environment. The proposed protocol involves simple operations and light computations.
{"title":"Biometric access control for wireless nodes","authors":"O. Althobaiti, Mznah Al-Rodhaan, A. Al-Dhelaan","doi":"10.1109/CASoN.2012.6412397","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412397","url":null,"abstract":"The most important requirements of Wireless Sensor Network (WSN) security are confidentiality, authentication and integrity. User authentication is necessary for legitimate access control in WSNs. These sensors have limited processing power, bandwidth, memory and limited communication abilities. Assume that WSN is deployed in a hospital, a university campus, or a smart home, to permit legal users to query and receive the particular response from any of this sensor node of WSN. Significantly, the system must produce authentication method for confirming if the user is legal or not. We present a solution based on biometric for this problem and also adapt it for WSN environment. The proposed protocol involves simple operations and light computations.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122469828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}