2015 7th International Conference on New Technologies, Mobility and Security (NTMS)最新文献

筛选
英文 中文
Online detection of anomalous network flows with soft clustering 基于软聚类的网络异常流在线检测
M. Zolotukhin, T. Hämäläinen, T. Kokkonen, Jarmo Siltanen
{"title":"Online detection of anomalous network flows with soft clustering","authors":"M. Zolotukhin, T. Hämäläinen, T. Kokkonen, Jarmo Siltanen","doi":"10.1109/NTMS.2015.7266510","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266510","url":null,"abstract":"In this study, we apply an anomaly-based approach to analyze traffic flows transferred over a network to detect the flows related to different types of attacks. Based on the information extracted from network flows a model of normal user behavior is discovered with the help of several clustering techniques. This model is then used to detect anomalies within recent time intervals. Since this approach is based on normal user behavior, it can potentially detect zero-day intrusions. Moreover, such a flow-based intrusion detection approach can be used in high speeds since it is based on information in packet headers, and, therefore, has to handle a considerably lesser amount of data. The proposed framework is tested on the data obtained with the help of a realistic cyber environment (RGCE) that enables one to construct real attack vectors. The simulations show that the proposed method results in a higher accuracy rate when compared to other intrusion detection techniques.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127971479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards reproducible cyber-security research through complex node automation 通过复杂节点自动化实现可重复的网络安全研究
Sebastian Abt, Reinhard Stampp, Harald Baier
{"title":"Towards reproducible cyber-security research through complex node automation","authors":"Sebastian Abt, Reinhard Stampp, Harald Baier","doi":"10.1109/NTMS.2015.7266527","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266527","url":null,"abstract":"Performing cyber-security experiments is challenging as access to necessary data is limited, especially at large-scale. If data is available, sharing is typically not possible due to privacy concerns and contractual requirements. Hence, reproducibility of research and comparability of results is difficult. For a prevailing empirical domain of research, this is a methodological problem. To address this problem, in this paper we propose a data generation toolchain based on automation of complex nodes - cnaf. This system is better suited for performing cyber-security experiments than related work. Especially, as our approach explicitly welcomes and leverages complexity, cnaf is capable of generating realistic data sets.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130004750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A coverage algorithm for intermittently connected delay tolerant wireless sensor networks 一种间歇连接容延迟无线传感器网络的覆盖算法
Israel L. C. Vasconcelos, David H. S. Lima, C. M. Figueiredo, Andre L. L. Aquino
{"title":"A coverage algorithm for intermittently connected delay tolerant wireless sensor networks","authors":"Israel L. C. Vasconcelos, David H. S. Lima, C. M. Figueiredo, Andre L. L. Aquino","doi":"10.1109/NTMS.2015.7266464","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266464","url":null,"abstract":"This work presents a packet drop solution applied to delay tolerant wireless sensor networks. In such networks, when the storage capacity of a node is limited compared to the amount of data to collect, it is common to apply some packet drop strategy based on network layer aspects only. However, such strategies are not suitable for monitoring applications of WSNs where data quality is essential. Alternatively, we propose a drop policy based on global network coverage where the packets that contribute less to the overall network view are chosen to be dropped. In order to evaluate our solution, we executed and compared it with other algorithms in literature. We modelled and simulated scenarios where different events occur. The results show that the algorithm based on network coverage is better than common drop strategies.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114501423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System modeling and risk analysis using AADL for critical infrastructure security 使用AADL进行关键基础设施安全的系统建模和风险分析
Serhat Gezgin, Emel Uras, E. Eroglu, L. Altay, Şerif Bahtiyar, Gürkan Gür
{"title":"System modeling and risk analysis using AADL for critical infrastructure security","authors":"Serhat Gezgin, Emel Uras, E. Eroglu, L. Altay, Şerif Bahtiyar, Gürkan Gür","doi":"10.1109/NTMS.2015.7266523","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266523","url":null,"abstract":"In this work, we present Model Acquisition and Maintenance Tool (MAMAT) for modeling and risk analysis of large-scale ICT systems. It was developed as part of ADAX research project and applied to electronic payment infrastructure for case studies. We also describe the R&D results and lessons learned during this research effort.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132802657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey and comparison of MADM methods for network selection access in heterogeneous networks 异构网络中网络选择接入的MADM方法综述与比较
M. Lahby, Silki Baghla, A. Sekkaki
{"title":"Survey and comparison of MADM methods for network selection access in heterogeneous networks","authors":"M. Lahby, Silki Baghla, A. Sekkaki","doi":"10.1109/NTMS.2015.7266522","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266522","url":null,"abstract":"One of the key features of the the next generation of networks is the coexistence of multiple radio access technologies such as WIFI, WIMAX and LTE. This heterogeneous environment provides to the mobile users the possibility to use different services at any time and any where. Various multiple attribute decision making (MADM) algorithms have been proposed to manage the terminal mobility while ensuring the best continuity of services. Among the most MADM methods which are widely used for solving the network selection problem in the research literature are SAW, MEW, TOPSIS, GRA, VIKOR, DIA, E-TOPSIS and FADM. This paper evaluates the performance of eight MADM methods, that aim to ensure the seamless network selection under the principle always best connected.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133075088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Metadata in SDN API for WSN
M. Schneps-Schneppe, D. Namiot
{"title":"Metadata in SDN API for WSN","authors":"M. Schneps-Schneppe, D. Namiot","doi":"10.1109/NTMS.2015.7266504","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266504","url":null,"abstract":"This paper discusses the system aspects of the development of applied programming interfaces in Software-Defined Networking (SDN). SDN is a prospect software enablement for Wireless Sensor Networks (WSN). So, application layer SDN API will be the main application API for WSN. Almost all existing SDN interfaces use so-called Representational State Transfer (REST) services as a basic model. This model is simple and straightforward for developers, but often does not support the information (metadata) necessary for programming automation. In this article, we cover the issues of representation of metadata in the SDN API.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"59 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128860703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using thermal transients at the outlet of electrical water heaters to recognise consumption patterns for heating schedule optimisation 利用电热水器出水口的热瞬态来识别耗用模式,以优化供热时间表
P. Nel, M. J. Booysen, Brink van der Merwe
{"title":"Using thermal transients at the outlet of electrical water heaters to recognise consumption patterns for heating schedule optimisation","authors":"P. Nel, M. J. Booysen, Brink van der Merwe","doi":"10.1109/NTMS.2015.7266530","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266530","url":null,"abstract":"In the midst of environmental concerns, and soaring energy costs and energy shortages, the efficiency of electrical household water heaters (EWHs) has been identified as an area with significant potential for savings. The benefits of applying optimised scheduling control for EWHs has been proven by various studies, however, little has been done to measure individual behaviour. This paper presents an alternative to the invasive and expensive solution of using water flow meters. A hardware and algorithmic solution is presented that uses thermal transients at the outlet of an EWH to measure consumption patterns. The results show that the approach is able to detect usage events with an accuracy of 91%. Despite the challenges related to thermal inaccuracies, event durations are estimated to within 2 minutes accuracy 79% of the time.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129613215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Serverless lightweight mutual authentication protocol for small mobile computing devices 小型移动计算设备的无服务器轻量级相互认证协议
Collins Mtita, M. Laurent-Maknavicius, Pascal Daragon
{"title":"Serverless lightweight mutual authentication protocol for small mobile computing devices","authors":"Collins Mtita, M. Laurent-Maknavicius, Pascal Daragon","doi":"10.1109/NTMS.2015.7266521","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266521","url":null,"abstract":"Small and inexpensive computing devices are becoming potential players in the Internet arena as they are used for collecting or generating information and later relay them to the designated servers. The information gathered must be adequately protected against all kinds of attacks during storage and communication. However, smart constrained devices have limited resources and unable to run most of the classical protocols that provide robust security. This article presents a lightweight mutual authentication protocol for resource constrained computing devices with high mobility. Our solution is novel as it facilitates resource constrained devices to autonomously perform mutual authentication and establish a session key with other parties without sharing common parameters. Our proposed protocol is lightweight, symmetric and requires few space for storing keys and parameters locally. The protocol is formally verified using AVISPA tool.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129450790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient web services selection based on QoS through a distributed parallel semantic approach 通过分布式并行语义方法实现基于QoS的高效web服务选择
L. H. Nakamura, P. F. Prado, R. M. D. O. Libardi, L. H. Nunes, R. Meneguette, J. C. Estrella, R. Santana, M. J. Santana, S. Reiff-Marganiec
{"title":"Efficient web services selection based on QoS through a distributed parallel semantic approach","authors":"L. H. Nakamura, P. F. Prado, R. M. D. O. Libardi, L. H. Nunes, R. Meneguette, J. C. Estrella, R. Santana, M. J. Santana, S. Reiff-Marganiec","doi":"10.1109/NTMS.2015.7266489","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266489","url":null,"abstract":"This paper proposes a solution to performance issues in the selection of Web services based on Quality of Service (QoS) that uses inference mechanisms from Semantic Web resources. Although several researchers highlight the benefits provided by the use of the Semantic Web techniques for searching and compose Web services with QoS, it can become costly when it depends on the approach adopted. Thus, we present a web service selection that uses QoS information in a replicated and distributed ontologies over different service providers. The results point to a significant improvement in the ontology inference process and thus makes the use of semantic resources viable in distributed systems to provide better QoS.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127614482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BSD-based elliptic curve cryptography for the open Internet of Things 面向开放物联网的基于bsd的椭圆曲线密码
Oriol Pinol Pinol, S. Raza, J. Eriksson, T. Voigt
{"title":"BSD-based elliptic curve cryptography for the open Internet of Things","authors":"Oriol Pinol Pinol, S. Raza, J. Eriksson, T. Voigt","doi":"10.1109/NTMS.2015.7266475","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266475","url":null,"abstract":"The Internet of Things (IoT) is the interconnection of everyday physical objects with the Internet and their representation in the digital world. Due to the connectivity of physical objects with the untrusted Internet, security has become an important pillar for the success of IoT-based services. Things in the IoT are resource-constrained devices with limited processing and storage capabilities. Often, these things are battery powered and connected through lossy wireless links. Therefore, lightweight and efficient ways of providing secure communication in the IoT are needed. In this context, Elliptic Curve Cryptography (ECC) is considered as a strong candidate to provide security in the IoT while being able to function in constrained environments. In this paper we present a lightweight implementation and evaluation of ECC for the Contiki OS. For fast, secure and cost-effective mass development of IoT-based services by different vendors, it is important that the IoT protocols are implemented and released as open source and open licensed. To the best of our knowledge our ECC is the first lightweight BSD-licensed ECC for the IoT devices. We show the feasibility of our implementation by a thorough performance analysis using several implementations and optimization algorithms. Moreover, we evaluate it on a real IoT hardware platform.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117009369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信