首页 > 最新文献

2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)最新文献

英文 中文
Defining Human Behaviors Using Big Data Analytics in Social Internet of Things 在社交物联网中使用大数据分析定义人类行为
Awais Ahmad, M. Rathore, Anand Paul, Su-Ryun Rho
As we delve into the Internet of Things (IoT), we are witnessing the intensive interaction and heterogeneous communication among different devices over the Internet. Consequently, these devices generate a massive volume of Big Data. The potential of these data has been analyzed by the complex network theory, describing a specialized branch, known as 'Human Dynamics.' The potential of these data has been analyzed by the complex network theory, describing a specialized branch, known as 'Human Dynamics.' In this extension, the goal is to describe human behavior in the social area at real-time. These objectives are starting to be practicable through the quantity of data provided by smartphones, social network, and smart cities. These make the environment more intelligent and offer an intelligent space to sense our activities or actions, and the evolution of the ecosystem. To address the aforementioned needs, this paper presents the concept of 'defining human behavior' using Big Data in SIoT by proposing system architecture that processes and analyzes big data in real-time. The proposed architecture consists of three operational domains, i.e., object, SIoT server, application domain. Data from object domain is aggregated at SIoT server domain, where the data is efficiently store and process and intelligently respond to the outer stimuli. The proposed system architecture focuses on the analysis the ecosystem provided by Smart Cities, wearable devices (e.g., body area network) and Big Data to determine the human behaviors as well as human dynamics. Furthermore, the feasibility and efficiency of the proposed system are implemented on Hadoop single node setup on UBUNTU 14.04 LTS coreTMi5 machine with 3.2 GHz processor and 4 GB memory.
随着我们对物联网(IoT)的深入研究,我们见证了互联网上不同设备之间的密集交互和异构通信。因此,这些设备产生了大量的大数据。这些数据的潜力已经通过复杂网络理论进行了分析,描述了一个专门的分支,称为“人类动力学”。这些数据的潜力已经通过复杂网络理论进行了分析,描述了一个专门的分支,称为“人类动力学”。在这个扩展中,目标是实时描述社会领域中的人类行为。通过智能手机、社交网络和智能城市提供的大量数据,这些目标开始变得可行。这些使环境更加智能,并提供一个智能空间来感知我们的活动或行动,以及生态系统的进化。为了满足上述需求,本文通过提出实时处理和分析大数据的系统架构,提出了在SIoT中使用大数据“定义人类行为”的概念。提出的体系结构由三个操作域组成,即对象、SIoT服务器、应用程序域。来自对象域的数据在SIoT服务器域进行聚合,在SIoT服务器域对数据进行高效存储和处理,并对外界刺激做出智能响应。提出的系统架构侧重于分析智慧城市、可穿戴设备(如体域网络)和大数据提供的生态系统,以确定人类行为和人类动态。最后,在3.2 GHz处理器和4gb内存的UBUNTU 14.04 LTS coreTMi5机器上,在Hadoop单节点环境下实现了该系统的可行性和效率。
{"title":"Defining Human Behaviors Using Big Data Analytics in Social Internet of Things","authors":"Awais Ahmad, M. Rathore, Anand Paul, Su-Ryun Rho","doi":"10.1109/AINA.2016.104","DOIUrl":"https://doi.org/10.1109/AINA.2016.104","url":null,"abstract":"As we delve into the Internet of Things (IoT), we are witnessing the intensive interaction and heterogeneous communication among different devices over the Internet. Consequently, these devices generate a massive volume of Big Data. The potential of these data has been analyzed by the complex network theory, describing a specialized branch, known as 'Human Dynamics.' The potential of these data has been analyzed by the complex network theory, describing a specialized branch, known as 'Human Dynamics.' In this extension, the goal is to describe human behavior in the social area at real-time. These objectives are starting to be practicable through the quantity of data provided by smartphones, social network, and smart cities. These make the environment more intelligent and offer an intelligent space to sense our activities or actions, and the evolution of the ecosystem. To address the aforementioned needs, this paper presents the concept of 'defining human behavior' using Big Data in SIoT by proposing system architecture that processes and analyzes big data in real-time. The proposed architecture consists of three operational domains, i.e., object, SIoT server, application domain. Data from object domain is aggregated at SIoT server domain, where the data is efficiently store and process and intelligently respond to the outer stimuli. The proposed system architecture focuses on the analysis the ecosystem provided by Smart Cities, wearable devices (e.g., body area network) and Big Data to determine the human behaviors as well as human dynamics. Furthermore, the feasibility and efficiency of the proposed system are implemented on Hadoop single node setup on UBUNTU 14.04 LTS coreTMi5 machine with 3.2 GHz processor and 4 GB memory.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Method for Recognizing Driver's Location Context with a Vehicle Information Device 一种基于车辆信息设备的驾驶员位置上下文识别方法
Seiji Matsuyama, Takatomo Yamabe, Yuki Nakayama, Yukari Okuwaki, R. Kiyohara
Recently, smartphones have become widely used as vehicle information devices. As a result, several advantages have appeared. First, a smartphone can log driving data such as location, vehicle status information, and so on. The logs do not depend on the car, but on the smartphone user. Second, a smartphone can gather driving-related information via the Internet. We believe that the advantages enable us to recognize several contexts. Therefore, we proposed a system that supports the user in changing provided services based on the context. We have discussed context recognition in order to create the system. One of the discussion outcomes is that the location context holds a very important role in guessing which function is required by a driver. However, it is difficult to recognize the location context using only latitude-longitude logs. In this paper, we propose a method for recognizing location context. The method is separated into three steps. First, values are recorded in a travel history such as a meshed map. The values represent driving experience points in a travelling area. Second, the method searches the travel history for a given driving area. Then, the value of the searched area is compared with a specified threshold. As a result, the location context is recognized. We implemented a prototype system and evaluated the proposed method. The results of the evaluation confirm the effectiveness of both the proposed method and expected future work.
最近,智能手机作为车载信息设备被广泛使用。因此,出现了一些优势。首先,智能手机可以记录驾驶数据,如位置、车辆状态信息等。日志并不取决于汽车,而是取决于智能手机用户。其次,智能手机可以通过互联网收集与驾驶相关的信息。我们认为,这些优势使我们能够识别几种情况。因此,我们提出了一个支持用户根据上下文更改所提供服务的系统。为了创建这个系统,我们讨论了上下文识别。讨论的结果之一是,位置上下文在猜测驱动程序需要哪个功能方面起着非常重要的作用。但是,仅使用经纬度日志很难识别位置上下文。本文提出了一种位置上下文识别方法。该方法分为三个步骤。首先,数值被记录在旅行历史中,比如网格地图。这些值代表一个旅行区域内的驾驶经验点。其次,该方法搜索给定驾驶区域的旅行历史。然后,将搜索区域的值与指定的阈值进行比较。因此,位置上下文被识别出来。我们实现了一个原型系统,并对所提出的方法进行了评估。评估结果证实了所提出的方法和预期的未来工作的有效性。
{"title":"A Method for Recognizing Driver's Location Context with a Vehicle Information Device","authors":"Seiji Matsuyama, Takatomo Yamabe, Yuki Nakayama, Yukari Okuwaki, R. Kiyohara","doi":"10.1109/AINA.2016.16","DOIUrl":"https://doi.org/10.1109/AINA.2016.16","url":null,"abstract":"Recently, smartphones have become widely used as vehicle information devices. As a result, several advantages have appeared. First, a smartphone can log driving data such as location, vehicle status information, and so on. The logs do not depend on the car, but on the smartphone user. Second, a smartphone can gather driving-related information via the Internet. We believe that the advantages enable us to recognize several contexts. Therefore, we proposed a system that supports the user in changing provided services based on the context. We have discussed context recognition in order to create the system. One of the discussion outcomes is that the location context holds a very important role in guessing which function is required by a driver. However, it is difficult to recognize the location context using only latitude-longitude logs. In this paper, we propose a method for recognizing location context. The method is separated into three steps. First, values are recorded in a travel history such as a meshed map. The values represent driving experience points in a travelling area. Second, the method searches the travel history for a given driving area. Then, the value of the searched area is compared with a specified threshold. As a result, the location context is recognized. We implemented a prototype system and evaluated the proposed method. The results of the evaluation confirm the effectiveness of both the proposed method and expected future work.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126617117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs 基于模糊的自利节点检测信任模型
Z. Ullah, Muhammad Saleem Khan, Idrees Ahmed, N. Javaid, M. Khan
Cooperation among nodes is mandatory for smooth operation of Mobile Ad Hoc Networks (MANETs) in terms of data routing. A participating node may refuse to deplete its resources for the benefit of others because of not getting any direct advantage for its service. Nodes showing such behavior are called selfish or non-cooperative nodes. Non-cooperative nodes can severely affect the performance of MANETs. Non-cooperative behavior of nodes in the MANETs may lead to network partitioning. In this paper, we address the issue of non-cooperative behavior by incorporating the concept of fuzzy logic closely coupled with the concept of trust. Fuzzy-based analyzer is used to distinguish between the non-cooperative behavior nodes and trustworthy nodes. We propose a fuzzy-based scheme to detect and isolate non-cooperative nodes in MANETs. In the proposed scheme, every node in the network constantly monitors its one-hop neighbors for their actions. Every node computes the trust of the observed neighbors. These trust values are passed on to a fuzzy function which is mapped into different classes. The resulting classes show the trust levels of the observed nodes. On the basis of the calculated trust value, the non-cooperative nodes are detected and isolated from the active routes of the MANET. Proposed fuzzy-based scheme is robust enough in terms of detecting packet drop attack in the network. Results show that proposed scheme detects non-cooperative nodes effectively with low false positives rate. Moreover, proposed scheme increases the packet delivery ratio and throughput in the presence of non-cooperative nodes in the network.
在数据路由方面,节点间的协作是移动自组网(manet)顺利运行的必要条件。参与节点可能会因为没有从其服务中获得任何直接利益而拒绝为其他节点的利益而耗尽其资源。表现出这种行为的节点被称为自私或非合作节点。非合作节点会严重影响manet的性能。manet中节点的非合作行为可能导致网络分区。在本文中,我们通过将模糊逻辑的概念与信任的概念紧密结合来解决非合作行为的问题。采用基于模糊分析的方法区分非合作行为节点和可信节点。提出了一种基于模糊算法的多网非合作节点检测和隔离方案。在提出的方案中,网络中的每个节点不断地监视其一跳邻居的行为。每个节点计算观察到的邻居的信任。这些信任值被传递给映射到不同类的模糊函数。生成的类显示观察到的节点的信任级别。在计算信任值的基础上,检测出非合作节点,并将其从MANET的活动路由中隔离出来。所提出的基于模糊的方案在检测网络中的丢包攻击方面具有足够的鲁棒性。结果表明,该方案能有效检测非合作节点,且假阳性率低。此外,该方案还提高了网络中存在非合作节点时的数据包传输率和吞吐量。
{"title":"Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs","authors":"Z. Ullah, Muhammad Saleem Khan, Idrees Ahmed, N. Javaid, M. Khan","doi":"10.1109/AINA.2016.142","DOIUrl":"https://doi.org/10.1109/AINA.2016.142","url":null,"abstract":"Cooperation among nodes is mandatory for smooth operation of Mobile Ad Hoc Networks (MANETs) in terms of data routing. A participating node may refuse to deplete its resources for the benefit of others because of not getting any direct advantage for its service. Nodes showing such behavior are called selfish or non-cooperative nodes. Non-cooperative nodes can severely affect the performance of MANETs. Non-cooperative behavior of nodes in the MANETs may lead to network partitioning. In this paper, we address the issue of non-cooperative behavior by incorporating the concept of fuzzy logic closely coupled with the concept of trust. Fuzzy-based analyzer is used to distinguish between the non-cooperative behavior nodes and trustworthy nodes. We propose a fuzzy-based scheme to detect and isolate non-cooperative nodes in MANETs. In the proposed scheme, every node in the network constantly monitors its one-hop neighbors for their actions. Every node computes the trust of the observed neighbors. These trust values are passed on to a fuzzy function which is mapped into different classes. The resulting classes show the trust levels of the observed nodes. On the basis of the calculated trust value, the non-cooperative nodes are detected and isolated from the active routes of the MANET. Proposed fuzzy-based scheme is robust enough in terms of detecting packet drop attack in the network. Results show that proposed scheme detects non-cooperative nodes effectively with low false positives rate. Moreover, proposed scheme increases the packet delivery ratio and throughput in the presence of non-cooperative nodes in the network.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125809209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Accelerating Packet Processing in a Xen Environment with OpenDataPlane 使用OpenDataPlane加速Xen环境下的数据包处理
Tarek Rabia, Othmen Braham, G. Pujolle
Over recent years, packet processing acceleration has become a hot topic. Indeed, several software solutions have been developed to offer the best possible performance. Recently, a new open source project has started called OpenDataPlane (ODP), this framework provides a set of APIs, configuration files, and other functions to accelerate packet processing and manage effectively the networking data plane. In this paper, we present our new Xen architecture, implemented within Metamorphic Networks "MNet" platform that integrates ODP in a privileged domain, called driver domain. This architecture allows us to associate ODP with virtual CPU cores in order to accelerate packet processing and improve the performance of our platform, without adding overhead in physical processors. The results of our experiments show that our new architecture improves packet processing performance by 15%, only using the virtual CPU resources.
近年来,包处理加速已成为一个热门话题。实际上,已经开发了一些软件解决方案来提供最好的性能。最近,一个名为OpenDataPlane (ODP)的新开源项目已经启动,该框架提供了一组api、配置文件和其他功能,以加速数据包处理并有效地管理网络数据平面。在本文中,我们提出了我们的新的Xen架构,在Metamorphic Networks“MNet”平台中实现,将ODP集成在一个特权域,称为驱动域。该体系结构允许我们将ODP与虚拟CPU内核相关联,以便加速数据包处理并改进平台的性能,而不会增加物理处理器的开销。实验结果表明,在仅使用虚拟CPU资源的情况下,我们的新架构将数据包处理性能提高了15%。
{"title":"Accelerating Packet Processing in a Xen Environment with OpenDataPlane","authors":"Tarek Rabia, Othmen Braham, G. Pujolle","doi":"10.1109/AINA.2016.27","DOIUrl":"https://doi.org/10.1109/AINA.2016.27","url":null,"abstract":"Over recent years, packet processing acceleration has become a hot topic. Indeed, several software solutions have been developed to offer the best possible performance. Recently, a new open source project has started called OpenDataPlane (ODP), this framework provides a set of APIs, configuration files, and other functions to accelerate packet processing and manage effectively the networking data plane. In this paper, we present our new Xen architecture, implemented within Metamorphic Networks \"MNet\" platform that integrates ODP in a privileged domain, called driver domain. This architecture allows us to associate ODP with virtual CPU cores in order to accelerate packet processing and improve the performance of our platform, without adding overhead in physical processors. The results of our experiments show that our new architecture improves packet processing performance by 15%, only using the virtual CPU resources.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126841822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining and Visualizing Social Data to Inform Marketing Decisions 挖掘和可视化社会数据,为营销决策提供信息
J. Treboux, Fabian Cretton, Florian Evéquoz, A. Calvé, D. Genoud
Most of today's commercial companies heavily rely on social media and community management tools to interact with their clients and analyze their online behaviour. Nonetheless, these tools still lack evolved data mining and visualization features to tailor the analysis in order to support useful marketing decisions. We present an original methodology that aims at formalizing the marketing need of the company and develop a tool that can support it. The methodology is derived from the Cross-Industry Standard Process for Data Mining (CRISP-DM) and includes additional steps dedicated to the design and development of visualizations of mined data. We followed the methodology in two use cases with Swiss companies. First, we developed a prototype that aims at understanding the needs of tourists based on Flickr and Instagram data. In that use case, we extend the existing literature by enriching hashtags analysis methods with a semantic network based on Linked Data. Second, we analyzed internal customer data of an online discount retailer to help them define guerilla marketing measures. We report on the challenges of integrating Facebook data in the process. Informal feedback from domain experts confirms the strong potential of such advanced analytic features based on social data to inform marketing decisions.
如今,大多数商业公司都严重依赖社交媒体和社区管理工具与客户互动,并分析他们的在线行为。尽管如此,这些工具仍然缺乏先进的数据挖掘和可视化功能来定制分析,以支持有用的营销决策。我们提出了一种原始的方法,旨在将公司的营销需求正规化,并开发出一种可以支持它的工具。该方法源自数据挖掘跨行业标准流程(CRISP-DM),并包括专门用于设计和开发挖掘数据可视化的附加步骤。我们在瑞士公司的两个用例中遵循了该方法。首先,我们基于Flickr和Instagram的数据开发了一个原型,旨在了解游客的需求。在该用例中,我们通过使用基于关联数据的语义网络丰富标签分析方法来扩展现有文献。其次,我们分析了一家在线折扣零售商的内部客户数据,以帮助他们确定游击营销措施。我们报道了在这个过程中整合Facebook数据所面临的挑战。来自领域专家的非正式反馈证实了这种基于社交数据的高级分析功能的强大潜力,可以为营销决策提供信息。
{"title":"Mining and Visualizing Social Data to Inform Marketing Decisions","authors":"J. Treboux, Fabian Cretton, Florian Evéquoz, A. Calvé, D. Genoud","doi":"10.1109/AINA.2016.130","DOIUrl":"https://doi.org/10.1109/AINA.2016.130","url":null,"abstract":"Most of today's commercial companies heavily rely on social media and community management tools to interact with their clients and analyze their online behaviour. Nonetheless, these tools still lack evolved data mining and visualization features to tailor the analysis in order to support useful marketing decisions. We present an original methodology that aims at formalizing the marketing need of the company and develop a tool that can support it. The methodology is derived from the Cross-Industry Standard Process for Data Mining (CRISP-DM) and includes additional steps dedicated to the design and development of visualizations of mined data. We followed the methodology in two use cases with Swiss companies. First, we developed a prototype that aims at understanding the needs of tourists based on Flickr and Instagram data. In that use case, we extend the existing literature by enriching hashtags analysis methods with a semantic network based on Linked Data. Second, we analyzed internal customer data of an online discount retailer to help them define guerilla marketing measures. We report on the challenges of integrating Facebook data in the process. Informal feedback from domain experts confirms the strong potential of such advanced analytic features based on social data to inform marketing decisions.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123533278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random Walk 基于TCP/IP包交叉匹配和rtt的随机漫步抵抗箔条攻击
Jianhua Yang
Many approaches have been proposed to detect stepping-stone intrusion, but few of them can effectively be resistant to intruders' manipulation, such as chaff perturbation, and time-jittering evasion techniques. In this paper, we propose a new approach to not only detect stepping-stone intrusion, but also resist intruders' chaff attack evasion through TCP/IP packet cross-matching and random walk. Unlike other approaches which can just resist intruders' chaff attack to a certain degree, this approach can be immune to any number packets injected. The theory analysis and simulation results show that more injection packets, the higher the probability that the chaff attack is detected.
目前已经提出了许多检测踏脚石入侵的方法,但很少有方法能够有效地抵抗入侵者的操纵,如箔条摄动和时间抖动逃避技术。本文提出了一种新的方法,通过TCP/IP包交叉匹配和随机漫步,既可以检测踏石入侵,又可以抵抗入侵者的箔条攻击规避。与其他只能在一定程度上抵抗入侵者箔条攻击的方法不同,该方法可以对注入的任何数量的数据包免疫。理论分析和仿真结果表明,注入报文越多,检测到箔条攻击的概率越高。
{"title":"Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random Walk","authors":"Jianhua Yang","doi":"10.1109/AINA.2016.17","DOIUrl":"https://doi.org/10.1109/AINA.2016.17","url":null,"abstract":"Many approaches have been proposed to detect stepping-stone intrusion, but few of them can effectively be resistant to intruders' manipulation, such as chaff perturbation, and time-jittering evasion techniques. In this paper, we propose a new approach to not only detect stepping-stone intrusion, but also resist intruders' chaff attack evasion through TCP/IP packet cross-matching and random walk. Unlike other approaches which can just resist intruders' chaff attack to a certain degree, this approach can be immune to any number packets injected. The theory analysis and simulation results show that more injection packets, the higher the probability that the chaff attack is detected.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"20 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129639354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Examination of the Implementation Method of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations 多组织间通用的基于云型虚拟策略的网络管理方案实施方法研究
Kazuya Odagiri, Shogo Shimizu, N. Ishii, M. Takizawa
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the course between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. As the second step of the second phase for the last goal, we examine the implementation method of the cloud type virtual PBNM which can be used by plural organizations in this paper.
在目前的互联网系统中,存在着许多使用网络通信匿名性的问题,如个人信息泄露和利用互联网系统犯罪。这就是Internet系统中使用的TCP/IP协议在通信数据上没有用户身份信息的原因,很难对用户进行上述行为的即时监督。基于策略的网络管理(PBNM)就是为了解决上述问题而进行的研究。这是一种通过对每个用户的通信控制来管理整个局域网(LAN)的方案。在这种PBNM中,存在两种类型的方案。第一部分是通过在网络服务器和客户端之间的过程中定位通信控制机制来管理整个局域网的方案。二是通过在客户端上定位通信控制机制来管理整个局域网的方案。作为第二种方案,我们对目的寻址控制系统(DACS)方案进行了理论研究。将该DACS方案应用于Internet系统管理,实现基于策略的Internet系统管理。作为最后一个目标第二阶段的第二步,本文研究了可用于多个组织的云型虚拟PBNM的实现方法。
{"title":"Examination of the Implementation Method of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations","authors":"Kazuya Odagiri, Shogo Shimizu, N. Ishii, M. Takizawa","doi":"10.1109/AINA.2016.13","DOIUrl":"https://doi.org/10.1109/AINA.2016.13","url":null,"abstract":"In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the course between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. As the second step of the second phase for the last goal, we examine the implementation method of the cloud type virtual PBNM which can be used by plural organizations in this paper.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering as New Parameter Sustained Communication Time 考虑持续通信时间新参数的JXTA-Overlay P2P平台模糊可靠性系统
Yi Liu, Shinji Sakamoto, Evjola Spaho, Keita Matsuo, L. Barolli, F. Xhafa
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform considering as a new parameter the sustained communication time. In our system, we considered four input parameters: Data Download Speed (DDS), Local Score (LS), Number of Interactions (NI) and Sustained Communication Time (SCT) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results have shown that the proposed system has a good performance and can choose reliable peers to connect in JXTA-Overlay platform.
本文以持续通信时间为新参数,提出并评价了一种新的基于模糊的JXTA-Overlay P2P通信可靠性系统。在我们的系统中,我们考虑了四个输入参数:数据下载速度(DDS)、本地评分(LS)、交互次数(NI)和持续通信时间(SCT)来决定对等可靠性(PR)。我们通过计算机模拟对所提出的系统进行了评估。仿真结果表明,该系统具有良好的性能,能够在JXTA-Overlay平台上选择可靠的对等体进行连接。
{"title":"A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering as New Parameter Sustained Communication Time","authors":"Yi Liu, Shinji Sakamoto, Evjola Spaho, Keita Matsuo, L. Barolli, F. Xhafa","doi":"10.1109/AINA.2016.44","DOIUrl":"https://doi.org/10.1109/AINA.2016.44","url":null,"abstract":"In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform considering as a new parameter the sustained communication time. In our system, we considered four input parameters: Data Download Speed (DDS), Local Score (LS), Number of Interactions (NI) and Sustained Communication Time (SCT) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results have shown that the proposed system has a good performance and can choose reliable peers to connect in JXTA-Overlay platform.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132643336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Healthcare Analytics: The Importance of Anomaly Detection 物联网医疗分析:异常检测的重要性
A. Ukil, S. Bandyopadhyay, Chetanya Puri, A. Pal
Healthcare data is quite rich and often contains human survival related information. Analyzing healthcare data is of prime importance particularly considering the immense potential of saving human life and improving quality of life. Furthermore, IoT revolution has redefined modern health care systems and management. IoT offers its greatest promise to deliver excellent progress in healthcare domain. In this talk, proactive healthcare analytics specifically for cardiac disease prevention will be discussed. Anomaly detection plays a prominent role in healthcare analytics. In fact, the anomalous events are to be accurately detected with low false negative alarms often under high noise (low SNR) condition. An exemplary case of smartphone based cardiac anomaly detection will be presented.
医疗保健数据非常丰富,通常包含与人类生存相关的信息。分析医疗保健数据至关重要,特别是考虑到挽救人类生命和提高生活质量的巨大潜力。此外,物联网革命重新定义了现代医疗保健系统和管理。物联网为在医疗保健领域取得卓越进展提供了最大的希望。在本次演讲中,我们将讨论针对心脏病预防的主动医疗分析。异常检测在医疗保健分析中扮演着重要的角色。实际上,通常在高噪声(低信噪比)条件下,用低虚负报警来准确检测异常事件。将介绍一个基于智能手机的心脏异常检测的示例案例。
{"title":"IoT Healthcare Analytics: The Importance of Anomaly Detection","authors":"A. Ukil, S. Bandyopadhyay, Chetanya Puri, A. Pal","doi":"10.1109/AINA.2016.158","DOIUrl":"https://doi.org/10.1109/AINA.2016.158","url":null,"abstract":"Healthcare data is quite rich and often contains human survival related information. Analyzing healthcare data is of prime importance particularly considering the immense potential of saving human life and improving quality of life. Furthermore, IoT revolution has redefined modern health care systems and management. IoT offers its greatest promise to deliver excellent progress in healthcare domain. In this talk, proactive healthcare analytics specifically for cardiac disease prevention will be discussed. Anomaly detection plays a prominent role in healthcare analytics. In fact, the anomalous events are to be accurately detected with low false negative alarms often under high noise (low SNR) condition. An exemplary case of smartphone based cardiac anomaly detection will be presented.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134467250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 129
Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures 防止企业基础设施中的传递哈希和类似的模拟攻击
Alexander Oberle, Pedro Larbig, R. Marx, F. Weber, D. Scheuermann, D. Fages, F. Thomas
Industrial espionage through complex cyber attacks such as Advanced Persistent Threats (APT) is an increasing risk in any business segment. Combining any available attack vector professional attackers infiltrate their targets progressively, e.g. through combining social engineering with technical hacking. The most relevant targets of APT are internal enterprise and production networks providing access to top-secret information. This work focuses on preventing Pass-the-Hash, one of the biggest and most long-standing security flaws present in enterprise domain networks. The introduced approach can be applied further to make password theft pointless for attackers in general, and is capable of extending network protocols, that are unprotected by themselves, with approved security mechanisms. The protocols do not need to be modified and already existing network services can stay untouched when integrating the solution into enterprise infrastructures.
通过高级持续威胁(APT)等复杂网络攻击进行的工业间谍活动在任何业务部门都是日益增加的风险。结合任何可用的攻击向量,专业攻击者逐步渗透目标,例如通过将社会工程与技术黑客相结合。APT最相关的目标是提供绝密信息访问的企业内部和生产网络。这项工作的重点是防止传递哈希,这是企业域网络中存在的最大和最长期的安全漏洞之一。所引入的方法可以进一步应用,使密码盗窃对攻击者来说毫无意义,并且能够扩展网络协议,这些协议本身不受保护,具有经过批准的安全机制。在将解决方案集成到企业基础设施中时,不需要修改协议,并且可以保持现有的网络服务不变。
{"title":"Preventing Pass-the-Hash and Similar Impersonation Attacks in Enterprise Infrastructures","authors":"Alexander Oberle, Pedro Larbig, R. Marx, F. Weber, D. Scheuermann, D. Fages, F. Thomas","doi":"10.1109/AINA.2016.101","DOIUrl":"https://doi.org/10.1109/AINA.2016.101","url":null,"abstract":"Industrial espionage through complex cyber attacks such as Advanced Persistent Threats (APT) is an increasing risk in any business segment. Combining any available attack vector professional attackers infiltrate their targets progressively, e.g. through combining social engineering with technical hacking. The most relevant targets of APT are internal enterprise and production networks providing access to top-secret information. This work focuses on preventing Pass-the-Hash, one of the biggest and most long-standing security flaws present in enterprise domain networks. The introduced approach can be applied further to make password theft pointless for attackers in general, and is capable of extending network protocols, that are unprotected by themselves, with approved security mechanisms. The protocols do not need to be modified and already existing network services can stay untouched when integrating the solution into enterprise infrastructures.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123823008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1