首页 > 最新文献

Journal of Internet Services and Applications最新文献

英文 中文
A survey on data analysis on large-Scale wireless networks: online stream processing, trends, and challenges 大规模无线网络数据分析研究:在线流处理、趋势和挑战
IF 3.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-03-18 DOI: 10.21203/rs.3.rs-17789/v1
Dianne S. V. Medeiros, H. N. C. Neto, Martin Andreoni Lopez, Luiz Claudio S. Magalhães, N. Fernandes, A. Vieira, E. F. Silva, D. M. F. Mattos
In this paper we focus on knowledge extraction from large-scale wireless networks through stream processing. We present the primary methods for sampling, data collection, and monitoring of wireless networks and we characterize knowledge extraction as a machine learning problem on big data stream processing. We show the main trends in big data stream processing frameworks. Additionally, we explore the data preprocessing, feature engineering, and the machine learning algorithms applied to the scenario of wireless network analytics. We address challenges and present research projects in wireless network monitoring and stream processing. Finally, future perspectives, such as deep learning and reinforcement learning in stream processing, are anticipated.
本文主要研究了基于流处理的大规模无线网络知识提取。我们提出了无线网络采样、数据收集和监测的主要方法,并将知识提取描述为大数据流处理中的机器学习问题。我们展示了大数据流处理框架的主要趋势。此外,我们还探讨了应用于无线网络分析场景的数据预处理、特征工程和机器学习算法。我们提出了无线网络监测和流处理方面的挑战和研究项目。最后,展望了流处理中的深度学习和强化学习等未来前景。
{"title":"A survey on data analysis on large-Scale wireless networks: online stream processing, trends, and challenges","authors":"Dianne S. V. Medeiros, H. N. C. Neto, Martin Andreoni Lopez, Luiz Claudio S. Magalhães, N. Fernandes, A. Vieira, E. F. Silva, D. M. F. Mattos","doi":"10.21203/rs.3.rs-17789/v1","DOIUrl":"https://doi.org/10.21203/rs.3.rs-17789/v1","url":null,"abstract":"In this paper we focus on knowledge extraction from large-scale wireless networks through stream processing. We present the primary methods for sampling, data collection, and monitoring of wireless networks and we characterize knowledge extraction as a machine learning problem on big data stream processing. We show the main trends in big data stream processing frameworks. Additionally, we explore the data preprocessing, feature engineering, and the machine learning algorithms applied to the scenario of wireless network analytics. We address challenges and present research projects in wireless network monitoring and stream processing. Finally, future perspectives, such as deep learning and reinforcement learning in stream processing, are anticipated.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"11 1","pages":"1-48"},"PeriodicalIF":3.5,"publicationDate":"2020-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41494300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A brief survey on replica consistency in cloud environments 云环境中副本一致性的简要概述
IF 3.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-02-21 DOI: 10.1186/s13174-020-0122-y
Robson A. Campêlo, Marco A. Casanova, Dorgival O. Guedes, Alberto H. F. Laender
Cloud computing is a general term that involves delivering hosted services over the Internet. With the accelerated growth of the volume of data used by applications, many organizations have moved their data into cloud servers to provide scalable, reliable and highly available services. A particularly challenging issue that arises in the context of cloud storage systems with geographically-distributed data replication is how to reach a consistent state for all replicas. This survey reviews major aspects related to consistency issues in cloud data storage systems, categorizing recently proposed methods into three categories: (1) fixed consistency methods, (2) configurable consistency methods and (3) consistency monitoring methods.
云计算是一个通用术语,涉及通过Internet交付托管服务。随着应用程序使用的数据量的加速增长,许多组织已将其数据转移到云服务器中,以提供可扩展、可靠和高可用性的服务。在具有地理分布式数据复制的云存储系统上下文中出现的一个特别具有挑战性的问题是如何为所有副本达到一致状态。本文回顾了云数据存储系统中与一致性问题相关的主要方面,并将最近提出的方法分为三类:(1)固定一致性方法,(2)可配置一致性方法和(3)一致性监控方法。
{"title":"A brief survey on replica consistency in cloud environments","authors":"Robson A. Campêlo, Marco A. Casanova, Dorgival O. Guedes, Alberto H. F. Laender","doi":"10.1186/s13174-020-0122-y","DOIUrl":"https://doi.org/10.1186/s13174-020-0122-y","url":null,"abstract":"Cloud computing is a general term that involves delivering hosted services over the Internet. With the accelerated growth of the volume of data used by applications, many organizations have moved their data into cloud servers to provide scalable, reliable and highly available services. A particularly challenging issue that arises in the context of cloud storage systems with geographically-distributed data replication is how to reach a consistent state for all replicas. This survey reviews major aspects related to consistency issues in cloud data storage systems, categorizing recently proposed methods into three categories: (1) fixed consistency methods, (2) configurable consistency methods and (3) consistency monitoring methods.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"33 1","pages":""},"PeriodicalIF":3.5,"publicationDate":"2020-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
What to expect, and how to improve online discussion forums: the instructors’ perspective 期望什么,以及如何改进在线讨论论坛:教师的观点
IF 3.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-12-01 DOI: 10.1186/s13174-019-0120-0
Dhanielly P. R. de Lima, M. Gerosa, T. Conte, José Francisco de M. Netto
{"title":"What to expect, and how to improve online discussion forums: the instructors’ perspective","authors":"Dhanielly P. R. de Lima, M. Gerosa, T. Conte, José Francisco de M. Netto","doi":"10.1186/s13174-019-0120-0","DOIUrl":"https://doi.org/10.1186/s13174-019-0120-0","url":null,"abstract":"","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"10 1","pages":""},"PeriodicalIF":3.5,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13174-019-0120-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65834162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Evaluating CRoS-NDN: a comparative performance analysis of a controller-based routing scheme for named-data networking 评估cross - ndn:命名数据网络中基于控制器的路由方案的比较性能分析
IF 3.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-11-09 DOI: 10.1186/s13174-019-0119-6
João Vitor Torres, Igor Drummond Alvarenga, Raouf Boutaba, Otto Carlos Muniz Bandeira Duarte
The huge amount of content names available in Named-Data Networking (NDN) challenges both the required routing table size and the techniques for locating and forwarding information. Content copies and content mobility exacerbate the scalability challenge to reach content in the new locations. We present and analyze the performance of a proposed Controller-based Routing Scheme, named CRoS-NDN, which preserves NDN features using the same interest and data packets. CRoS-NDN supports content mobility and provides fast content recovery from copies that do not belong to the consumer-producer path because it splits identity from location without incurring FIB size explosion or supposing prefix aggregation. It provides features similar to Content Distribution Networks (CDN) in NDN, and improves the routing efficiency. We compare our proposal with similar routing protocols and derive analytical expressions for lower-bound efficiency and upper-bound latency. We also conduct extensive simulations to evaluate results in data delivery efficiency and delay. The results show the robust behavior of the proposed scheme achieving the best efficiency and delay performance for a wide range of scenarios. Furthermore, CRoS-NDN results in low use of processing time and memory for a growing number of prefixes.
命名数据网络(NDN)中可用的大量内容名称既挑战了所需的路由表大小,也挑战了定位和转发信息的技术。内容复制和内容移动性加剧了在新位置访问内容的可伸缩性挑战。我们提出并分析了一种名为CRoS-NDN的基于控制器的路由方案的性能,该方案使用相同的兴趣和数据包保留了NDN的特征。cross - ndn支持内容移动性,并从不属于消费者-生产者路径的副本中提供快速的内容恢复,因为它将身份从位置分离,而不会导致FIB大小爆炸或假设前缀聚合。它提供了与NDN中的CDN (Content Distribution Networks)相似的特性,提高了路由效率。我们将我们的提议与类似的路由协议进行比较,并推导出下限效率和上限延迟的解析表达式。我们还进行了大量的模拟来评估数据传递效率和延迟的结果。结果表明,该方案具有良好的鲁棒性,可在多种场景下获得最佳的效率和延迟性能。此外,对于越来越多的前缀,cross - ndn导致处理时间和内存的使用减少。
{"title":"Evaluating CRoS-NDN: a comparative performance analysis of a controller-based routing scheme for named-data networking","authors":"João Vitor Torres, Igor Drummond Alvarenga, Raouf Boutaba, Otto Carlos Muniz Bandeira Duarte","doi":"10.1186/s13174-019-0119-6","DOIUrl":"https://doi.org/10.1186/s13174-019-0119-6","url":null,"abstract":"The huge amount of content names available in Named-Data Networking (NDN) challenges both the required routing table size and the techniques for locating and forwarding information. Content copies and content mobility exacerbate the scalability challenge to reach content in the new locations. We present and analyze the performance of a proposed Controller-based Routing Scheme, named CRoS-NDN, which preserves NDN features using the same interest and data packets. CRoS-NDN supports content mobility and provides fast content recovery from copies that do not belong to the consumer-producer path because it splits identity from location without incurring FIB size explosion or supposing prefix aggregation. It provides features similar to Content Distribution Networks (CDN) in NDN, and improves the routing efficiency. We compare our proposal with similar routing protocols and derive analytical expressions for lower-bound efficiency and upper-bound latency. We also conduct extensive simulations to evaluate results in data delivery efficiency and delay. The results show the robust behavior of the proposed scheme achieving the best efficiency and delay performance for a wide range of scenarios. Furthermore, CRoS-NDN results in low use of processing time and memory for a growing number of prefixes.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"1 1","pages":"1-24"},"PeriodicalIF":3.5,"publicationDate":"2019-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Upgrading a high performance computing environment for massive data processing 升级高性能计算环境,处理海量数据
IF 3.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-10-16 DOI: 10.1186/s13174-019-0118-7
Lucas M. Ponce, Walter dos Santos, Wagner Meira, Dorgival Guedes, Daniele Lezzi, Rosa M. Badia
High-performance computing (HPC) and massive data processing (Big Data) are two trends that are beginning to converge. In that process, aspects of hardware architectures, systems support and programming paradigms are being revisited from both perspectives. This paper presents our experience on this path of convergence with the proposal of a framework that addresses some of the programming issues derived from such integration. Our contribution is the development of an integrated environment that integretes (i) COMPSs, a programming framework for the development and execution of parallel applications for distributed infrastructures; (ii) Lemonade, a data mining and analysis tool; and (iii) HDFS, the most widely used distributed file system for Big Data systems. To validate our framework, we used Lemonade to create COMPSs applications that access data through HDFS, and compared them with equivalent applications built with Spark, a popular Big Data framework. The results show that the HDFS integration benefits COMPSs by simplifying data access and by rearranging data transfer, reducing execution time. The integration with Lemonade facilitates COMPSs’s use and may help its popularization in the Data Science community, by providing efficient algorithm implementations for experts from the data domain that want to develop applications with a higher level abstraction.
高性能计算(HPC)和海量数据处理(Big data)是两个开始融合的趋势。在这个过程中,硬件架构、系统支持和编程范例的各个方面正在从两个角度重新审视。本文介绍了我们在这条收敛路径上的经验,并提出了一个框架,该框架解决了源自这种集成的一些编程问题。我们的贡献是开发一个集成环境,它集成了(1)COMPSs,一种用于开发和执行分布式基础设施并行应用程序的编程框架;柠檬水,数据挖掘和分析工具;(iii) HDFS,大数据系统中使用最广泛的分布式文件系统。为了验证我们的框架,我们使用Lemonade创建了通过HDFS访问数据的COMPSs应用程序,并将它们与使用流行的大数据框架Spark构建的等效应用程序进行了比较。结果表明,通过简化数据访问和重新安排数据传输,减少执行时间,HDFS集成使comps受益。与Lemonade的集成促进了COMPSs的使用,并可能有助于它在数据科学社区的普及,因为它为数据领域的专家提供了高效的算法实现,这些专家希望开发具有更高抽象层次的应用程序。
{"title":"Upgrading a high performance computing environment for massive data processing","authors":"Lucas M. Ponce, Walter dos Santos, Wagner Meira, Dorgival Guedes, Daniele Lezzi, Rosa M. Badia","doi":"10.1186/s13174-019-0118-7","DOIUrl":"https://doi.org/10.1186/s13174-019-0118-7","url":null,"abstract":"High-performance computing (HPC) and massive data processing (Big Data) are two trends that are beginning to converge. In that process, aspects of hardware architectures, systems support and programming paradigms are being revisited from both perspectives. This paper presents our experience on this path of convergence with the proposal of a framework that addresses some of the programming issues derived from such integration. Our contribution is the development of an integrated environment that integretes (i) COMPSs, a programming framework for the development and execution of parallel applications for distributed infrastructures; (ii) Lemonade, a data mining and analysis tool; and (iii) HDFS, the most widely used distributed file system for Big Data systems. To validate our framework, we used Lemonade to create COMPSs applications that access data through HDFS, and compared them with equivalent applications built with Spark, a popular Big Data framework. The results show that the HDFS integration benefits COMPSs by simplifying data access and by rearranging data transfer, reducing execution time. The integration with Lemonade facilitates COMPSs’s use and may help its popularization in the Data Science community, by providing efficient algorithm implementations for experts from the data domain that want to develop applications with a higher level abstraction.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"176 2 1","pages":"1-18"},"PeriodicalIF":3.5,"publicationDate":"2019-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Better safe than sorry: a vehicular traffic re-routing based on traffic conditions and public safety issues 安全总比后悔好:根据交通状况和公共安全问题重新规划车辆交通路线
IF 3.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-09-11 DOI: 10.1186/s13174-019-0116-9
A. M. Souza, T. Braun, L. C. Botega, R. Cabral, Islene C. Garcia, L. Villas
{"title":"Better safe than sorry: a vehicular traffic re-routing based on traffic conditions and public safety issues","authors":"A. M. Souza, T. Braun, L. C. Botega, R. Cabral, Islene C. Garcia, L. Villas","doi":"10.1186/s13174-019-0116-9","DOIUrl":"https://doi.org/10.1186/s13174-019-0116-9","url":null,"abstract":"","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"6 1","pages":""},"PeriodicalIF":3.5,"publicationDate":"2019-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13174-019-0116-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65834126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Clustering and reliability-driven mitigation of routing attacks in massive IoT systems 大规模物联网系统中路由攻击的集群和可靠性驱动缓解
IF 3.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-09-06 DOI: 10.1186/s13174-019-0117-8
Aldri L. Santos, Christian A. V. Cervantes, Michele Nogueira, Burak Kantarci
As an integral component of the 5G communications, the massive Internet of Things (IoT) are vulnerable to various routing attacks due to their dynamic infrastructure, distinct computing resources, and heterogeneity of mobile objects. The sinkhole and selective forwarding attacks stand out among the most destructive ones for infrastructureless networks. Despite the countermeasures introduced by legacy intrusion detection systems (IDS), the massive IoT seeks novel solutions to address their unique requirements. This paper introduces DeTection of SinkHole And SelecTive ForwArding for Supporting SeCure routing for Internet of THIngs (THATACHI), a new IDS against sinkhole and selective forwarding attacks that target routing mechanism in massive and mobile IoT networks. To cope with the density and mobility challenges in the detection of attackers and ensuring reliability, THATACHI exploits watchdog, reputation and trust strategies. Our performance evaluation under an urban scenario shows that THATACHI can perform with a 99% detection rate, 6% of false negative and false positive rates. Moreover, when compared to its closest predecessor against sinkhole attacks for IoT, THATACHI runs with at least 50% less energy consumption.
海量物联网作为5G通信的重要组成部分,由于其基础设施的动态性、计算资源的差异性和移动对象的异质性,容易受到各种路由攻击。天坑攻击和选择性转发攻击是对无基础设施网络最具破坏性的攻击之一。尽管传统入侵检测系统(IDS)引入了对策,但大规模物联网寻求新的解决方案来满足其独特的需求。本文介绍了支持物联网安全路由的沉降洞检测和选择性转发(THATACHI),这是一种针对大规模和移动物联网路由机制的沉降洞和选择性转发攻击的新型IDS。为了应对在检测攻击者和确保可靠性方面的密度和移动性挑战,THATACHI利用了看门狗,声誉和信任策略。我们在城市场景下的性能评估表明,THATACHI的检测率为99%,假阴性和假阳性率为6%。此外,与其最接近的前身相比,针对物联网的天坑攻击,THATACHI的能耗至少降低了50%。
{"title":"Clustering and reliability-driven mitigation of routing attacks in massive IoT systems","authors":"Aldri L. Santos, Christian A. V. Cervantes, Michele Nogueira, Burak Kantarci","doi":"10.1186/s13174-019-0117-8","DOIUrl":"https://doi.org/10.1186/s13174-019-0117-8","url":null,"abstract":"As an integral component of the 5G communications, the massive Internet of Things (IoT) are vulnerable to various routing attacks due to their dynamic infrastructure, distinct computing resources, and heterogeneity of mobile objects. The sinkhole and selective forwarding attacks stand out among the most destructive ones for infrastructureless networks. Despite the countermeasures introduced by legacy intrusion detection systems (IDS), the massive IoT seeks novel solutions to address their unique requirements. This paper introduces DeTection of SinkHole And SelecTive ForwArding for Supporting SeCure routing for Internet of THIngs (THATACHI), a new IDS against sinkhole and selective forwarding attacks that target routing mechanism in massive and mobile IoT networks. To cope with the density and mobility challenges in the detection of attackers and ensuring reliability, THATACHI exploits watchdog, reputation and trust strategies. Our performance evaluation under an urban scenario shows that THATACHI can perform with a 99% detection rate, 6% of false negative and false positive rates. Moreover, when compared to its closest predecessor against sinkhole attacks for IoT, THATACHI runs with at least 50% less energy consumption.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"60 1","pages":"1-17"},"PeriodicalIF":3.5,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Detecting web attacks with end-to-end deep learning 端到端深度学习检测网络攻击
IF 3.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-08-27 DOI: 10.1186/s13174-019-0115-x
Yao Pan, Fangzhou Sun, Zhongwei Teng, Jules White, Douglas C. Schmidt, Jacob Staples, Lee Krause
Web applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected. Existing implementations of intrusion detection systems usually extract features from network packets or string characteristics of input that are manually selected as relevant to attack analysis. Manually selecting features, however, is time-consuming and requires in-depth security domain knowledge. Moreover, large amounts of labeled legitimate and attack request data are needed by supervised learning algorithms to classify normal and abnormal behaviors, which is often expensive and impractical to obtain for production web applications. This paper provides three contributions to the study of autonomic intrusion detection systems. First, we evaluate the feasibility of an unsupervised/semi-supervised approach for web attack detection based on the Robust Software Modeling Tool (RSMT), which autonomically monitors and characterizes the runtime behavior of web applications. Second, we describe how RSMT trains a stacked denoising autoencoder to encode and reconstruct the call graph for end-to-end deep learning, where a low-dimensional representation of the raw features with unlabeled request data is used to recognize anomalies by computing the reconstruction error of the request data. Third, we analyze the results of empirically testing RSMT on both synthetic datasets and production applications with intentional vulnerabilities. Our results show that the proposed approach can efficiently and accurately detect attacks, including SQL injection, cross-site scripting, and deserialization, with minimal domain knowledge and little labeled training data.
Web应用程序是网络攻击的热门目标,因为它们可以通过网络访问并且通常包含漏洞。入侵检测系统监视web应用程序,并在检测到攻击企图时发出警报。现有的入侵检测系统通常是从网络数据包或输入的字符串特征中提取特征,这些特征是人工选择的,与攻击分析相关。然而,手动选择特性非常耗时,并且需要深入的安全领域知识。此外,监督学习算法需要大量标记的合法和攻击请求数据来对正常和异常行为进行分类,这对于生产web应用程序来说通常是昂贵且不切实际的。本文对自主入侵检测系统的研究提供了三个贡献。首先,我们评估了基于鲁棒软件建模工具(RSMT)的无监督/半监督web攻击检测方法的可行性,RSMT可以自动监控和表征web应用程序的运行时行为。其次,我们描述了RSMT如何训练堆叠去噪自编码器来编码和重建端到端深度学习的调用图,其中使用带有未标记请求数据的原始特征的低维表示来通过计算请求数据的重建误差来识别异常。第三,我们分析了在合成数据集和具有故意漏洞的生产应用程序上对RSMT进行实证测试的结果。研究结果表明,该方法可以有效、准确地检测SQL注入、跨站脚本和反序列化等攻击,并且只需要很少的领域知识和标记训练数据。
{"title":"Detecting web attacks with end-to-end deep learning","authors":"Yao Pan, Fangzhou Sun, Zhongwei Teng, Jules White, Douglas C. Schmidt, Jacob Staples, Lee Krause","doi":"10.1186/s13174-019-0115-x","DOIUrl":"https://doi.org/10.1186/s13174-019-0115-x","url":null,"abstract":"Web applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected. Existing implementations of intrusion detection systems usually extract features from network packets or string characteristics of input that are manually selected as relevant to attack analysis. Manually selecting features, however, is time-consuming and requires in-depth security domain knowledge. Moreover, large amounts of labeled legitimate and attack request data are needed by supervised learning algorithms to classify normal and abnormal behaviors, which is often expensive and impractical to obtain for production web applications. This paper provides three contributions to the study of autonomic intrusion detection systems. First, we evaluate the feasibility of an unsupervised/semi-supervised approach for web attack detection based on the Robust Software Modeling Tool (RSMT), which autonomically monitors and characterizes the runtime behavior of web applications. Second, we describe how RSMT trains a stacked denoising autoencoder to encode and reconstruct the call graph for end-to-end deep learning, where a low-dimensional representation of the raw features with unlabeled request data is used to recognize anomalies by computing the reconstruction error of the request data. Third, we analyze the results of empirically testing RSMT on both synthetic datasets and production applications with intentional vulnerabilities. Our results show that the proposed approach can efficiently and accurately detect attacks, including SQL injection, cross-site scripting, and deserialization, with minimal domain knowledge and little labeled training data.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"2 1","pages":"1-22"},"PeriodicalIF":3.5,"publicationDate":"2019-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Efficient data dissemination protocol based on complex networks’ metrics for urban vehicular networks 基于复杂网络度量的城市车辆网络高效数据传播协议
IF 3.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-08-03 DOI: 10.1186/s13174-019-0114-y
Joahannes B. D. da Costa, Allan M. de Souza, Denis Rosário, Eduardo Cerqueira, Leandro A. Villas
Services that aim to make the current transportation system more secure, sustainable, and efficient constitute the Traffic Management Systems (TMS). Vehicular Ad hoc Networks (VANETs) exert a strong influence for TMS applications, due to TMS services require data, communication, and processing for operation. Besides, VANET allows direct communication between vehicles, and data are exchanged and processed between them. Several TMS services require disseminated information among decision-making vehicles. However, such dissemination is a challenging task, due to the specific characteristics of VANETs, such as short-range communication and high node mobility, resulting in several variations in their topology. In this article, we introduce an extensive analysis of our proposed data dissemination protocol based on complex networks’ metrics for urban VANET scenarios, called DDRX. Each vehicle must build a subgraph to identify the relay node to continue the dissemination process. Based on the local graph, it is possible to select the relay nodes based on complex networks’ metrics. Simulation results show that DDRX offers high efficiency in terms of coverage, number of transmitted packets, delay, and packet collisions compared to well-known data dissemination protocols. Also, DDRX provides significant improvements to a TMS that needs efficient data dissemination.
旨在使当前交通系统更加安全、可持续和高效的服务构成交通管理系统(TMS)。由于TMS服务需要数据、通信和处理才能运行,车辆自组织网络(vanet)对TMS应用产生了很大的影响。此外,VANET允许车辆之间直接通信,并在它们之间交换和处理数据。一些TMS服务需要在决策工具之间传播信息。然而,这种传播是一项具有挑战性的任务,由于vanet的特定特性,如短距离通信和高节点移动性,导致其拓扑结构发生了几种变化。在本文中,我们对我们提出的基于城市VANET场景的复杂网络指标的数据传播协议(称为DDRX)进行了广泛的分析。每辆车必须建立一个子图来识别中继节点,以继续传播过程。在局部图的基础上,可以根据复杂网络的指标选择中继节点。仿真结果表明,与现有的数据传播协议相比,DDRX在覆盖范围、传输包数、时延和包冲突等方面都具有较高的效率。此外,DDRX为需要有效数据传播的TMS提供了重大改进。
{"title":"Efficient data dissemination protocol based on complex networks’ metrics for urban vehicular networks","authors":"Joahannes B. D. da Costa, Allan M. de Souza, Denis Rosário, Eduardo Cerqueira, Leandro A. Villas","doi":"10.1186/s13174-019-0114-y","DOIUrl":"https://doi.org/10.1186/s13174-019-0114-y","url":null,"abstract":"Services that aim to make the current transportation system more secure, sustainable, and efficient constitute the Traffic Management Systems (TMS). Vehicular Ad hoc Networks (VANETs) exert a strong influence for TMS applications, due to TMS services require data, communication, and processing for operation. Besides, VANET allows direct communication between vehicles, and data are exchanged and processed between them. Several TMS services require disseminated information among decision-making vehicles. However, such dissemination is a challenging task, due to the specific characteristics of VANETs, such as short-range communication and high node mobility, resulting in several variations in their topology. In this article, we introduce an extensive analysis of our proposed data dissemination protocol based on complex networks’ metrics for urban VANET scenarios, called DDRX. Each vehicle must build a subgraph to identify the relay node to continue the dissemination process. Based on the local graph, it is possible to select the relay nodes based on complex networks’ metrics. Simulation results show that DDRX offers high efficiency in terms of coverage, number of transmitted packets, delay, and packet collisions compared to well-known data dissemination protocols. Also, DDRX provides significant improvements to a TMS that needs efficient data dissemination.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"1 1","pages":"1-13"},"PeriodicalIF":3.5,"publicationDate":"2019-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Thematic series on Social Network Analysis and Mining 社会网络分析和挖掘专题系列
IF 3.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-22 DOI: 10.1186/s13174-019-0113-z
Rodrigo Pereira dos Santos, Giseli Rabello Lopes
Social networks were first investigated in social, educational and business areas. Academic interest in this field though has been growing since the mid twentieth century, given the increasing interaction among people, data dissemination and exchange of information. As such, the development and evaluation of new techniques for social network analysis and mining (SNAM) is a current key research area for Internet services and applications. Key topics include contextualized analysis of social and information networks, crowdsourcing and crowdfunding, economics in networks, extraction and treatment of social data, mining techniques, modeling of user behavior and social networks, and software ecosystems. These topics have important areas of application in a wide range of fields, such as academia, politics, security, business, marketing, and science.
社会网络首先在社会、教育和商业领域进行调查。自20世纪中期以来,由于人与人之间的互动、数据的传播和信息的交换日益增多,学术界对这一领域的兴趣一直在增长。因此,社会网络分析与挖掘(SNAM)新技术的开发与评估是当前互联网服务与应用的一个重点研究领域。关键主题包括社会和信息网络的情境化分析、众包和众筹、网络经济学、社会数据的提取和处理、挖掘技术、用户行为和社会网络建模以及软件生态系统。这些主题在学术、政治、安全、商业、营销和科学等领域都有重要的应用领域。
{"title":"Thematic series on Social Network Analysis and Mining","authors":"Rodrigo Pereira dos Santos, Giseli Rabello Lopes","doi":"10.1186/s13174-019-0113-z","DOIUrl":"https://doi.org/10.1186/s13174-019-0113-z","url":null,"abstract":"Social networks were first investigated in social, educational and business areas. Academic interest in this field though has been growing since the mid twentieth century, given the increasing interaction among people, data dissemination and exchange of information. As such, the development and evaluation of new techniques for social network analysis and mining (SNAM) is a current key research area for Internet services and applications. Key topics include contextualized analysis of social and information networks, crowdsourcing and crowdfunding, economics in networks, extraction and treatment of social data, mining techniques, modeling of user behavior and social networks, and software ecosystems. These topics have important areas of application in a wide range of fields, such as academia, politics, security, business, marketing, and science.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"1 1","pages":"1-4"},"PeriodicalIF":3.5,"publicationDate":"2019-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138517522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Internet Services and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1