Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524703
L. Huraj, M. Šimon, Tibor Horák
IoT devices and their fast growth on the Internet cause many cyber-attacks problems. The number of compromised IoT devices can be used by DDoS (Distributed Denial of Service) attackers to imitate valid request packet or to form illegal request packet to the victim with a spoofed source IP addresses to hide themselves, meanwhile giving rise the system collapse, the obstruction of network/traffic, or disrupting of the victim Internet operation. In this article is demonstrated a specific kind of DDoS attack involving usually accessible IoT devices - the UDP-based Distributed Reflective DoS Attack (DRDoS). The packets are flooded by the attacker to the IoT device as a reflector with a source IP address set to the IP address of the victim who obtains the reflected replies and can be overloaded. To examine this kind of attack, there has to be four representatives of heterogeneous IoT devices involved: an IP camera, a smart light-bulb, a network printer, and a small single-board computer Raspberry Pi. This article illustrates the possibility of the IoT devices to be integrated into DRDoS attack and to flood a network as well as their potential to form a targeted attack on a narticular victim machine.
物联网设备及其在互联网上的快速增长引发了许多网络攻击问题。被入侵的物联网设备数量可以被DDoS (Distributed Denial of Service,分布式拒绝服务)攻击者利用伪造的源IP地址,模仿有效的请求报文,或向受害者形成非法请求报文,以隐藏自己,同时导致系统崩溃,网络/流量受阻,或受害者互联网运行中断。本文演示了一种特定类型的DDoS攻击,涉及通常可访问的物联网设备——基于udp的分布式反射式DoS攻击(DRDoS)。攻击者以反射器的形式将报文淹没到物联网设备,源IP地址设置为受害者的IP地址,受害者获得反射的回复,可以过载。要检查这种攻击,必须有四个异构物联网设备的代表:IP摄像机,智能灯泡,网络打印机和小型单板计算机树莓派。本文说明了将物联网设备集成到ddos攻击中并淹没网络的可能性,以及它们对非特定受害者机器形成有针对性攻击的可能性。
{"title":"IoT Measuring of UDP-Based Distributed Reflective DoS Attack","authors":"L. Huraj, M. Šimon, Tibor Horák","doi":"10.1109/SISY.2018.8524703","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524703","url":null,"abstract":"IoT devices and their fast growth on the Internet cause many cyber-attacks problems. The number of compromised IoT devices can be used by DDoS (Distributed Denial of Service) attackers to imitate valid request packet or to form illegal request packet to the victim with a spoofed source IP addresses to hide themselves, meanwhile giving rise the system collapse, the obstruction of network/traffic, or disrupting of the victim Internet operation. In this article is demonstrated a specific kind of DDoS attack involving usually accessible IoT devices - the UDP-based Distributed Reflective DoS Attack (DRDoS). The packets are flooded by the attacker to the IoT device as a reflector with a source IP address set to the IP address of the victim who obtains the reflected replies and can be overloaded. To examine this kind of attack, there has to be four representatives of heterogeneous IoT devices involved: an IP camera, a smart light-bulb, a network printer, and a small single-board computer Raspberry Pi. This article illustrates the possibility of the IoT devices to be integrated into DRDoS attack and to flood a network as well as their potential to form a targeted attack on a narticular victim machine.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"66 1","pages":"000209-000214"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76983182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524848
David Janos Feher, Barnabás Sándor
Authentication is the issue most talked about nowadays. Comparing with Blockchain we want to research the justification for the blockchain technology to be used in enterprise log analysis and the appearance of blockchain technology to develop and make remarkable change in enterprise log analysis.
{"title":"Log File Authentication and Storage on Blockchain Network","authors":"David Janos Feher, Barnabás Sándor","doi":"10.1109/SISY.2018.8524848","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524848","url":null,"abstract":"Authentication is the issue most talked about nowadays. Comparing with Blockchain we want to research the justification for the blockchain technology to be used in enterprise log analysis and the appearance of blockchain technology to develop and make remarkable change in enterprise log analysis.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"1 1","pages":"000243-000248"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77279088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524654
P. Hell, P. J. Varga, Zsolt Illési
Our team performs thermo-ergonomic analysis of mobile devices for about a year now. Our added research provides further evidence that the current mobile device architecture has failures and even normal use of mobile devices cause undesirable overheating, which might lead to premature deterioration and inconvenient use. The results of our previous test highlighted the need to review the mobile device test methods, improve it by combining multiple criteria, and perform tests in a homogeneous environment. The revised approach allows us to compare and enhance the usability the test results. In our new piece of research, we fine-tuned the test environment and improved the test method by automating the process. The new software and hardware test environment also enable to conduct a more comprehensive analysis. [1]
{"title":"Mobile Phones Thermo-Ergonomic Analysis","authors":"P. Hell, P. J. Varga, Zsolt Illési","doi":"10.1109/SISY.2018.8524654","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524654","url":null,"abstract":"Our team performs thermo-ergonomic analysis of mobile devices for about a year now. Our added research provides further evidence that the current mobile device architecture has failures and even normal use of mobile devices cause undesirable overheating, which might lead to premature deterioration and inconvenient use. The results of our previous test highlighted the need to review the mobile device test methods, improve it by combining multiple criteria, and perform tests in a homogeneous environment. The revised approach allows us to compare and enhance the usability the test results. In our new piece of research, we fine-tuned the test environment and improved the test method by automating the process. The new software and hardware test environment also enable to conduct a more comprehensive analysis. [1]","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"9 1","pages":"000249-000254"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85392667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524707
I. Lakatos, A. Titrik, János Hollósi
Due to continuous developments, the exhausting and unpleasant work done by humans is going to be partly or totally replaced by automated devices. Such developments can be found in the field of transport concerning autonomous and networked vehicles. Although we are at a quite early stage of development, it is highly practical to make plans for a more distant future, i.e. targeting a totally automated selective waste gathering. Apart from the application of smart containers, this study presents alternatives for networked automated selective waste gathering.
{"title":"Demonstrating the Options for Automated Advanced Selective Waste Gathering","authors":"I. Lakatos, A. Titrik, János Hollósi","doi":"10.1109/SISY.2018.8524707","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524707","url":null,"abstract":"Due to continuous developments, the exhausting and unpleasant work done by humans is going to be partly or totally replaced by automated devices. Such developments can be found in the field of transport concerning autonomous and networked vehicles. Although we are at a quite early stage of development, it is highly practical to make plans for a more distant future, i.e. targeting a totally automated selective waste gathering. Apart from the application of smart containers, this study presents alternatives for networked automated selective waste gathering.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"53 1","pages":"000167-000172"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91148579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524736
Milos Todorov, Mirjana Strboja, B. Mihailovic
In this paper the notion of the discrete bipolar pan-integral is introduced. This new type of integral is based on bi-capacities. The main properties of the bipolar pan-integral and its relations with the bipolar Choquet integral and the bipolar pseudo-integral are considered. Some illustrative examples are presented.
{"title":"Bi-Capacities Based Pan-Integral","authors":"Milos Todorov, Mirjana Strboja, B. Mihailovic","doi":"10.1109/SISY.2018.8524736","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524736","url":null,"abstract":"In this paper the notion of the discrete bipolar pan-integral is introduced. This new type of integral is based on bi-capacities. The main properties of the bipolar pan-integral and its relations with the bipolar Choquet integral and the bipolar pseudo-integral are considered. Some illustrative examples are presented.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"5 1","pages":"000301-000304"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84308326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524609
G. Molnár, Zoltán Szűts
Chatbots appeared in large numbers at the beginning of the current decade. Interactive technology, often combined with artificial intelligence, has rapidly invaded and occupied the world of online chat. Chatbots are not just elements of virtual assistants, but are used by organizations and governments on websites, in applications, and instant messaging platforms to promote products, ideas or services. In this paper, the authors firstly present a theoretical and historical background, then discuss the issues of using chatbots as educational assistants, and finally describe the basic steps and challenges of programming a bot.
{"title":"The Role of Chatbots in Formal Education","authors":"G. Molnár, Zoltán Szűts","doi":"10.1109/SISY.2018.8524609","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524609","url":null,"abstract":"Chatbots appeared in large numbers at the beginning of the current decade. Interactive technology, often combined with artificial intelligence, has rapidly invaded and occupied the world of online chat. Chatbots are not just elements of virtual assistants, but are used by organizations and governments on websites, in applications, and instant messaging platforms to promote products, ideas or services. In this paper, the authors firstly present a theoretical and historical background, then discuss the issues of using chatbots as educational assistants, and finally describe the basic steps and challenges of programming a bot.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"10 1","pages":"000197-000202"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78476262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524836
Kincso Tuzes-Boloni, Zsuzsanna Borsay, Csaba Sulyok, Károly Simon
In the current globalized world, it is a frequent phenomenon that people from different regions uproot and move to other countries, working and living there temporarily or long-term. But how could the origin regions follow the actual residency of their habitants, and how could they keep the data of the population up to date? The aim of the E-migrated web application is to measure and dynamically visualize the dispersion of specialists originating from a given country. It also gives the opportunity of interconnecting these people and to create a community, encouraging its users to build relationships and cooperate. It is a virtual link for the professionals originating from a common region, independent of current location. This paper aims to present the E-migrated platform, describing the architecture of the system, mentioning the details of the implementation, the main technologies, tools and methods used during the development process. It presents the functionalities of the application, and demonstrates its behavior, using some case studies.
{"title":"Diaspora Mapping and Collaboration Platform for Expatriates","authors":"Kincso Tuzes-Boloni, Zsuzsanna Borsay, Csaba Sulyok, Károly Simon","doi":"10.1109/SISY.2018.8524836","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524836","url":null,"abstract":"In the current globalized world, it is a frequent phenomenon that people from different regions uproot and move to other countries, working and living there temporarily or long-term. But how could the origin regions follow the actual residency of their habitants, and how could they keep the data of the population up to date? The aim of the E-migrated web application is to measure and dynamically visualize the dispersion of specialists originating from a given country. It also gives the opportunity of interconnecting these people and to create a community, encouraging its users to build relationships and cooperate. It is a virtual link for the professionals originating from a common region, independent of current location. This paper aims to present the E-migrated platform, describing the architecture of the system, mentioning the details of the implementation, the main technologies, tools and methods used during the development process. It presents the functionalities of the application, and demonstrates its behavior, using some case studies.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"35 1","pages":"000027-000032"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88171225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524720
A. Pedai, I. Astrov, A. Udal
Paper discusses the modeling and control methodologies of a tactical unmanned aerial vehicle (TUAV) of coaxial rotor type with ducted fan via introduction of two-rate control and neural network methods in order to achieve more stabilized flight control. The effectiveness of the proposed single-rate and two-rate control strategies was illustrated and confirmed by numerical simulations of flight maneuvers using programming environment Simulink for chosen model of TUAV. At that earlier developed decomposition methodologies have been applied and adjusted for the actual unmanned aerial vehicle. As the TUAVs are becoming one of the most important information collection devices for the modern situation awareness (SA) systems, the achieved improvements in stabilization of flight trajectories and relevant energy economy enhancements will help to design better SA systems for search, rescue and situation reconnaissance operations.
{"title":"Comparison of Single-Rate and Two-Rate Neural Control Approaches for Coaxial Rotor/Ducted-Fan TUAV for Situational Awareness Applications","authors":"A. Pedai, I. Astrov, A. Udal","doi":"10.1109/SISY.2018.8524720","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524720","url":null,"abstract":"Paper discusses the modeling and control methodologies of a tactical unmanned aerial vehicle (TUAV) of coaxial rotor type with ducted fan via introduction of two-rate control and neural network methods in order to achieve more stabilized flight control. The effectiveness of the proposed single-rate and two-rate control strategies was illustrated and confirmed by numerical simulations of flight maneuvers using programming environment Simulink for chosen model of TUAV. At that earlier developed decomposition methodologies have been applied and adjusted for the actual unmanned aerial vehicle. As the TUAVs are becoming one of the most important information collection devices for the modern situation awareness (SA) systems, the achieved improvements in stabilization of flight trajectories and relevant energy economy enhancements will help to design better SA systems for search, rescue and situation reconnaissance operations.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"4 1","pages":"000063-000068"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91241937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524705
K. Munonye, P. Martinek
REST APIs could be implemented using Java, Microsoft. Net-based technologies or a PHP framework. This paper compares the performance of REST APIs implemented with Java technologies and Microsoft. Net. Java-based RESTful APIs were implemented using Jersey and deployed on the Apache Tomcat Server. RESTful APIs with the same parameters were implemented also with MS. Net using the. Net Framework 6.0 and were deployed on the Microsoft IIS Server. Performance was evaluated and compared in several test scenarios. The results showed that the. Net API performs better than the Java-based API for the processing of PUT operations. Processing time was 11.6% lower in the case of the. Net API. Contrary the Java-based API gave a better performance for the GET operations by processing 80.36% more records in the same time.
{"title":"Performance Analysis of the Microsoft. Net- and Java-Based Implementation of REST Web Services","authors":"K. Munonye, P. Martinek","doi":"10.1109/SISY.2018.8524705","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524705","url":null,"abstract":"REST APIs could be implemented using Java, Microsoft. Net-based technologies or a PHP framework. This paper compares the performance of REST APIs implemented with Java technologies and Microsoft. Net. Java-based RESTful APIs were implemented using Jersey and deployed on the Apache Tomcat Server. RESTful APIs with the same parameters were implemented also with MS. Net using the. Net Framework 6.0 and were deployed on the Microsoft IIS Server. Performance was evaluated and compared in several test scenarios. The results showed that the. Net API performs better than the Java-based API for the processing of PUT operations. Processing time was 11.6% lower in the case of the. Net API. Contrary the Java-based API gave a better performance for the GET operations by processing 80.36% more records in the same time.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"119 1","pages":"000191-000196"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88536170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524642
D. Gabriska, M. Ölvecký
Hazardous programmable electronic systems are part of the operating of various industries. The occurrence of unexpected situations or failures in the automated operation environment results in various economic losses as well as possible air pollution or possible health damage. Most of the situations that may affect the work of safety critical systems cause software failures. Therefore, the introduction of hazardous programmable electronic systems into operation is very important for risk analysis, which can contribute to the subsequent reduction of risks.
{"title":"Analysis and Risk Reduction in Operation of Hazardous Programmable Electronic Systems","authors":"D. Gabriska, M. Ölvecký","doi":"10.1109/SISY.2018.8524642","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524642","url":null,"abstract":"Hazardous programmable electronic systems are part of the operating of various industries. The occurrence of unexpected situations or failures in the automated operation environment results in various economic losses as well as possible air pollution or possible health damage. Most of the situations that may affect the work of safety critical systems cause software failures. Therefore, the introduction of hazardous programmable electronic systems into operation is very important for risk analysis, which can contribute to the subsequent reduction of risks.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"67 1","pages":"000123-000126"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78345110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}