Ijaz Ahmad, Suneth Namal, M. Ylianttila, A. Gurtov
{"title":"Towards software defined cognitive networking","authors":"Ijaz Ahmad, Suneth Namal, M. Ylianttila, A. Gurtov","doi":"10.1109/NTMS.2015.7266528","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266528","url":null,"abstract":"Cognitive networking has the potential to enable autonomic network management by empowering the network components to automatically adjust to the changing network environment. However, strict isolation between the layers of the currently used communication model and static nature of networking equipment have delimited the deployment of cognitive networks. Software Defined Networking (SDN) separates the network architecture from its infrastructure to enable programmatic control of networking equipment from logically centralized servers. By adopting the principles of SDN, we propose software defined cognitive networking (SDCoN) to integrate the dynamism of cognitive networking and programmatic control of SDN. In this paper, we present the SDCoN framework and initial results from the SDCoN testbed that reveal the success of the proposed SDN-based cognitive networking architecture.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116163233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuichi Kumano, S. Ata, N. Nakamura, Y. Nakahira, I. Oka
{"title":"Enhancing immediacy of identification with multi-stage application identification","authors":"Yuichi Kumano, S. Ata, N. Nakamura, Y. Nakahira, I. Oka","doi":"10.1109/NTMS.2015.7266492","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266492","url":null,"abstract":"The identification of network application is important for network management such as traffic controls and anomaly traffic detection. To apply application-based traffic control promptly, the technique to progressive application identification is important. We previously proposed a method of timeliness identification of application, which can achieve to use first several packets of flow to identify applications with high accuracy whatever the traffic is encrypted or unencrypted. However, our previous method still has a challenge in terms of timeliness because it uses a single classifier with same traffic features to identify all applications, though some traffic features can be used earlier. In this paper, we propose a method of multistage application identification, which classifies progressively applications into groups with different granularity of groups. We first demonstrate that the accuracy of existing application identification is getting worse significantly, by increasing the number of application to identify. Second, propose a method of multistage identification method, and then explain group classification algorithm to classify applications into groups. Our experiment shows that our proposed method can identify applications earlier than a method of identification using a single classifier.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of lane keeping assist system for autonomous vehicles","authors":"A. Mammeri, Guangqiang Lu, A. Boukerche","doi":"10.1109/NTMS.2015.7266483","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266483","url":null,"abstract":"Lane detection and tracking and departure warning systems are important components of Intelligent Transportation Systems. They have particularly attracted great interest from industry and academia. Many architectures and commercial systems have been proposed in the literature. In this paper, we discuss the design of such systems regarding the following stages: pre-processing, detection, and tracking. For each stage, a short description of its working principle as well as their advantages and shortcomings are introduced. Our paper may possibly help in designing new systems that overcome and improve the shortcomings of current architectures.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128766722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Belqasmi, M. Barachi, J. A. Calero, M. Badra, O. Alfandi
{"title":"NGNaaS: NGNs as cloud computing services","authors":"F. Belqasmi, M. Barachi, J. A. Calero, M. Badra, O. Alfandi","doi":"10.1109/NTMS.2015.7266508","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266508","url":null,"abstract":"Next Generation Networks are the future mobile telecommunication networks, capable of provisioning universal access to services (anytime, anywhere, using any device). Cloud computing is an emerging networking paradigm with several inherent advantages including easy introduction of new services, efficient resource use, scalability, and pay-per-use. Cloud computing is ubiquitous in the Internet domain, but its use in the telecommunications context is still in its infancy. Offering next generation networks as cloud computing services will facilitate their deployment and enable deployment and management cost sharing. We envision that many network operators and service providers will soon support this sharing idea, as demonstrated by a number of ongoing agreements and investigation initiatives (e.g. between Rogers and Videotron in Canada, and between Etisalat and DU in the UAE). However, many issues need to be solved before this vision becomes a reality. This position paper presents our vision for offering next generation networks as cloud services, sketches an early business model, identifies the research issues, and presents a roadmap.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concept for a security investigation framework","authors":"M. Ussath, Feng Cheng, C. Meinel","doi":"10.1109/NTMS.2015.7266478","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266478","url":null,"abstract":"The number of detected and analyzed Advanced Persistent Threat (APT) campaigns increased over the last years. Two of the main objectives of such campaigns are to maintain long-term access to the environment of the target and to stay undetected. To achieve these goals the attackers use sophisticated and customized techniques for the lateral movement, to ensure that these activities are not detected by existing security systems. During an investigation of an APT campaign all stages of it are relevant to clarify important details like the initial infection vector or the compromised systems and credentials. Most of the currently used approaches, which are utilized within security systems, are not able to detect the different stages of a complex attack and therefore a comprehensive security investigation is needed. In this paper we describe a concept for a Security Investigation Framework (SIF) that supports the analysis and the tracing of multi-stage APTs. The concept includes different automatic and semi-automatic approaches that support the investigation of such attacks. Furthermore, the framework leverages different information sources, like log files and details from forensic investigations and malware analyses, to give a comprehensive overview of the different stages of an attack. The overall objective of the SIF is to improve the efficiency of investigations and reveal undetected details of an attack.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127683274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diulie J. Freitas, Tiago B. Marcondes, L. H. Nakamura, J. Ueyama, P. Gomes, R. Meneguette
{"title":"Combining cell phones and WSNs for preventing accidents in smart-homes with disabled people","authors":"Diulie J. Freitas, Tiago B. Marcondes, L. H. Nakamura, J. Ueyama, P. Gomes, R. Meneguette","doi":"10.1109/NTMS.2015.7266477","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266477","url":null,"abstract":"Smart homes provide automatic services through a combination of wireless sensor networks (WSNs) and wireless devices that allow monitoring operations in the home. These smart homes have been increasingly studied not only by the academic community but also by industry on account of the great potential they have, especially in applications that can help people with some type of physical disability such as visual or hearing impairment. This kind of application can give them independence and make their lives safer and more comfortable. Thus, in this paper we propose a Health Smart Home system for disabled people that can warn them about possible accidents that can occur in a particular location of their house. In other words, the system anticipates possible accidents that may occur somewhere in the house. We implemented a preliminary prototype that monitors rooms and issues a warning whenever it detects a potential hazard. Our proposal relies on low-cost cutting-edge technology and includes the following: Raspberry Pi boards, motion sensors, cameras and a central server. The server will handle the data that has been captured by sensors and send warnings through smartphones to people with physical impairments.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of XACML policies with ASP","authors":"D. Ayed, Marie-Noëlle Lepareux, Cyrille Martins","doi":"10.1109/NTMS.2015.7266473","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266473","url":null,"abstract":"Security policy administrators face difficulties to ensure that the policies they specify in XACML correspond to what they intend to formulate and to understand their overall effect. This paper proposes a logic-based XACML3.0 analysis solution using Answer Set Programming (ASP) where Ansprolog is used to model the XACML decision process and an ASP solver is employed in an innovative way to perform logical reasoning on access control policies such as detecting conflicts in a multi-organizational context.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115911349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Kullback-Leibler divergence as an estimate of reproducibility of numerical results","authors":"F. Calvayrac","doi":"10.1109/NTMS.2015.7266501","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266501","url":null,"abstract":"In large software projects using numerical solutions of equations, small changes in compiler options or parallelization methods can induce slight variations in the last digits of floating point numerical results, due for instance to the non-commutativity of operations. Unfortunate changes in the code (bugs) can induce even larger deviations in the results. We propose to use the Kullback-Leibler divergence estimated from the compression ratio of the results compared to reference results in order to automatically quantify those changes and automatize regression tests of numerical codes in software forges. We use the TDDFT PW-TELEMAN project as an example.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121923756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. J. Chaves, Vitor Marge Eichemberger, Islene C. Garcia, E. Madeira
{"title":"Integrating OpenFlow to LTE: Some issues toward software-defined mobile networks","authors":"L. J. Chaves, Vitor Marge Eichemberger, Islene C. Garcia, E. Madeira","doi":"10.1109/NTMS.2015.7266498","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266498","url":null,"abstract":"The world is witnessing a rapid growth in mobile communication, and operators have been forced to handle network traffic more resourcefully. Many works point to the use of Software-Defined Networking (SDN) as an enabling technology to overcome current limitations, making possible upcoming 5G networks. In this paper we discuss how the OpenFlow protocol can be integrated into existing Long-Term Evolution (LTE) networks, going through state-of-the-art solutions and highlighting open issues. We also introduce a novel OpenFlow module for ns-3 simulator, allowing reliable simulations of LTE-SDN integrated networks, as illustrate in a case study example.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127108098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The design of a rateless channel coding scheme for deep-space communication","authors":"Shaolei Chen, Chuangmu Yao, Rui Dai","doi":"10.1109/NTMS.2015.7266524","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266524","url":null,"abstract":"In this paper, a rateless channel coding scheme is proposed for deep-space communication. Unlike the traditional fixed-rate coding schemes, in our scheme the coding rate is not designed as a fixed value before transmission, but adaptive to the channel variations resulted from the dynamically varied transmission distance and complex atmospheric conditions. Specifically, a Raptor code which is provided by a cascade structure is adopted for the data transmission. The pre-code of Raptor code is encoded with a linear-time progressive edge-growth algorithm which avoids tedious calculations by matrix transformation. Moreover, based on a joint iterative decoding method, the output degree distribution of our Raptor code is optimized so as to obtain good decoding performances. Comparisons are provided with respect to the fixed-rate coding schemes by numerical simulation, which shows that our proposed rateless coding scheme has better performance and is adaptively capacity-approaching for the deep-space data transmission.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126597729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}