{"title":"Subspace selection in high-dimensional big data using genetic algorithm in apache spark","authors":"Fatemeh Cheraghchi, Arash Iranzad, B. Raahemi","doi":"10.1145/3018896.3018950","DOIUrl":"https://doi.org/10.1145/3018896.3018950","url":null,"abstract":"In high-dimensional space with large amounts of data, distances between data points tend to become relatively uniform. The notion of the nearest neighbours of a data point thus becomes meaningless, a phenomenon known as \"curse of dimensionality.\" Identifying outliers (data points with statistical characteristics significantly different than the majority of the data) in such a high-dimensional space can be a significant challenge. Mining for outliers in subspaces with relevant attributes is one of approaches for this problem, and identifying these attributes is the main objective of this work. In this paper, we scale a grid-based solution to search for subspaces that are candidates for outlier detection with regard to the subset of features in the subspace. We specify a population and a fitness function for a distributed genetic algorithm to heuristically search the subspaces within the high dimensional data, and find the subspace with maximal sparsity. We designed and implemented our proposed subspace selection algorithm in Apache Spark, a fast in-memory engine for large-scale data processing. The initial experimental results on a large dataset (77,000 records and 1,379 attributes) confirm that our proposed method can identify the most relevant subspaces for outlier detection.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123874604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Breno Sousa, Zair Abdelouahab, D. Lopes, Natalia Costa Soeiro, Willian França Ribeiro
{"title":"An intrusion detection system for denial of service attack detection in internet of things","authors":"Breno Sousa, Zair Abdelouahab, D. Lopes, Natalia Costa Soeiro, Willian França Ribeiro","doi":"10.1145/3018896.3018962","DOIUrl":"https://doi.org/10.1145/3018896.3018962","url":null,"abstract":"The paradigm of the Internet of Things came to allow intercommunication between different objects via Internet, and thereby facilitate the form of how the end user will interact with a wide variety of devices that surround him in everyday life. The availability of features that these devices have is a factor that deserves great attention because the use of such resources inappropriately can cause serious damage. Therefore, since such devices are connected to the internet, they are vulnerable to various threats, such as denial-of-service attack (DoS). In accordance with such threats it has been proposed the development of IDS-IoT, which is an Intrusion Detection System (IDS) which aims the detection of certain types of DoS attacks.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122784931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Bruschi, F. Davoli, L. Galluccio, P. Lago, A. Lombardo, C. Lombardo, C. Rametta, G. Schembra
{"title":"Virtualization of set-top-box devices in next generation SDN-NFV networks: the input project perspective","authors":"R. Bruschi, F. Davoli, L. Galluccio, P. Lago, A. Lombardo, C. Lombardo, C. Rametta, G. Schembra","doi":"10.1145/3018896.3152304","DOIUrl":"https://doi.org/10.1145/3018896.3152304","url":null,"abstract":"Due to the emergence of Software Defined Networking (SDN) and Network Functions Virtualization (NFV) paradigms, coupled with a hyper-connectivity communication paradigm, the \"softwarization\" of the Internet infrastructure and of its network management framework is gaining increasing popularity. This is the target of the INPUT platform, a novel infrastructure and paradigm supporting Future Internet personal cloud services in a more scalable and sustainable way, and with innovative added-value capabilities. The INPUT technologies enable next-generation cloud applications to go beyond classical service models, and even replace physical Smart Devices, usually placed in users' homes (e.g., set-top boxes), with their virtual images, providing them to users \"as a Service\". In this paper we present the Virtual set-top box from both architectural and functional points of view, demonstrating the feasibility of the softwarized SDN/NFV paradigm joined with the fog-computing approach to support personal cloud services. 1","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132741092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT sandbox: to analysis IoT malware Zollard","authors":"Kai-Chi Chang, R. Tso, Min-Chun Tsai","doi":"10.1145/3018896.3018898","DOIUrl":"https://doi.org/10.1145/3018896.3018898","url":null,"abstract":"As we know, we are already facing IoT threat and under IoT attacks. However, there are only a few discussions on, how to analyze this kind of cyber threat and malwares. In this paper, we propose IoT sandbox which can support different type of CPU architecture. It can be used to analyze IoT malwares, collect network packets, identify spread method and record malwares behaviors. To make sure our IoT sandbox can be functional, we implement it and use the Zollard botnet for experiment. According to our experimental data, we found that at least 71,148 IP have been compromised. Some of them are IoT devices (DVR, Web Camera, Router WiFi Disk, Set-top box) and others are ICS devices (Heat pump and ICS data acquisition server). Based on our IoT sandbox technology, we can discover an IoT malware in an early stage. This could help IT manager or security experts to analysis and determine IDS rules. We hope this research can prevent IoT threat and enhance IoT Security in the near future.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134202021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A mitigation system for ARP cache poisoning attacks","authors":"B. Prabadevi, N. Jeyanthi","doi":"10.1145/3018896.3018915","DOIUrl":"https://doi.org/10.1145/3018896.3018915","url":null,"abstract":"Though the telecommunication protocol ARP provides the most prominent service for data transmission in the network by providing the physical layer address for any host's network layer address, its stateless nature remains one of the most well-known opportunities for the attacker community and ultimate threat for the hosts in the network. ARP cache poisoning results in numerous attacks, of which the most noteworthy ones MITM, host impersonation and DoS attacks. This paper presents various recent mitigation methods and proposes a novel mitigation system for ARP cache Poisoning Attacks. The proposed system works as follows: for any ARP Request or Reply messages a time stamp is generated. When it is received or sent by a host, the host will make cross layer inspection and IP-MAC pair matching with ARP table Entry. If ARP table entry matches and cross layer consistency is ensured then ARP reply with Time Stamp is sent. If in both the cases evaluated to be bogus packet, then the IP-MAC pair is added to the untrusted list and further packet inspection is done to ensure no attack has been deployed onto the network. The time is also noted for each entry made into the ARP table which makes ARP stateful. The system is evaluated based on criteria specified by the researchers.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124124617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A systematic classification of requirements engineering approaches for adaptive systems","authors":"Adnane Ghannem, M. Hamdi, H. Ammar, M. Soui","doi":"10.1145/3018896.3018939","DOIUrl":"https://doi.org/10.1145/3018896.3018939","url":null,"abstract":"Requirements Engineering for Adaptive Systems (REAS) is a wide-open research area that aims to improve the adaptation of the systems according to the requirements known (adaptability) or newly detected (adaptivity). While existing work proposed methodologies to deal with the adaptivity problem, few of them have classified and evaluated these proposals in order to give insight for system development in application domains such as Smart City Operations (SCO's). In this paper, we investigate the modeling methodologies, Requirements Engineering (RE) activities, and application domains based on relevant papers that tackled REAS in the literature. To this end, we conduct a systematic literature review by searching relevant papers and extracting data in order to answer specific research questions. We provide an updated review of the state of the art, supporting researchers to better understand trends in REAS in general and SCO's in particular.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126214140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical research on distribution characteristics of online news comment","authors":"Ting Jin, Jian Wan, Huayou Si, Yajie Qi, Yongjian Ren","doi":"10.1145/3018896.3018931","DOIUrl":"https://doi.org/10.1145/3018896.3018931","url":null,"abstract":"\"No comments, no news.\" Readers' online comments have become an important part of online news. Over the last few years, researches and applications on online news comments have been carried out. However, there are a few of researches about the distribution characteristics of online news comments. In this paper, first, we collect about one hundred thousand online news with their comments from six news websites in a given time period, and then study the online news comments'spatial distribution among online news and temporal distribution during their appearance. The result shows that the distribution of online news comments is greatly uneven. A small amount of news possess the vast majority of comments, and most of the news only have a few of online comments or even have no following comments. In addition, it shows the growth rate of online comments drops rapidly during a news conference. The findings can provide theoretical support to collection of online news comments, analysis of hot issues and the concern-specific behaviors characteristics of general public.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126307396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing contact center performance using cloud computing: a case study on telecom contact centers","authors":"B. Jose, Madhu Kumar, A. Cuzzocrea","doi":"10.1145/3018896.3056801","DOIUrl":"https://doi.org/10.1145/3018896.3056801","url":null,"abstract":"Cloud adoption is a critical strategic decision for many organizations. The high growth potential of the cloud computing services market attract telecom service providers into this new investment area for sustainable revenue growth, as it offers a means to supplement the declining traditional services revenues as well as profit from their core businesses such as voice and messaging. Telecom service providers can play many potential roles in cloud ecosystem including those of a cloud customer, enabler, partner and/or broker by using their inherent advantages that give them an edge over other traditional cloud computing service providers. There are two main reasons why telecom service providers should consider becoming engaged in cloud computing- to reap the benefits of cloud computing for IT optimization and to exploit new business opportunities. This work is focused on potential impact of cloud computing on operational performance in a telecom contact center through IT optimization.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emergency response systems: research directions and current challenges","authors":"A. Y. Shahrah, M. Al-Mashari","doi":"10.1145/3018896.3056778","DOIUrl":"https://doi.org/10.1145/3018896.3056778","url":null,"abstract":"Emergency response is the most critical phase in emergency management. This primarily returns to the importance of direct interference right after the incident occurrence to save lives and protect properties. Therefore, decision making and resource coordination in such situations are very challenging. Information systems to support emergency response have been existing since decades. However, due to the complexity nature of emergency response, most of these systems still inadequate to effectively support all the required capabilities of emergency response. This paper aims to provide non-comprehensive classifications of the major research works related to the development of emergency response systems (ERSs). Specifically, this paper classifies the identified research works into generic themes (directions) to help in understanding the variety of approaches and technologies used to support the emergency response. In addition, this paper attempts to highlight the major current challenges and research gaps that can help in defining a future research agenda and encouraging further work in this domain.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resource efficiency in container-instance clusters","authors":"Uchechukwu Awada, A. Barker","doi":"10.1145/3018896.3056798","DOIUrl":"https://doi.org/10.1145/3018896.3056798","url":null,"abstract":"Cloud computing providers have recently begun offering container instances, which provide an efficient route to application deployment within a lightweight, isolated and well-defined execution environment. Cloud providers currently offer Container Service Platforms (CSPs), which support the flexible orchestration of containerised applications. Existing CSP frameworks do not offer any form of intelligent resource scheduling: applications are usually scheduled individually, rather than taking a holistic view of all registered applications and available resources in the cloud. This can result in increased execution times for applications, resource wastage through underutilized container-instances, and a reduction in the number of applications that can be deployed, given the available resources. This paper presents a cloud-based Container Management Service (CMS) framework, which offers increased deployment density, scalability and resource efficiency for containerised applications. CMS extends the state-of-the-art by providing additional functionalities for orchestrating containerised applications by joint optimisation of sets of containerised applications and resource pool on the cloud. We evaluate CMS on a cloud-based CSP i.e., Amazon EC2 Container Management Service (ECS) and conducted extensive experiments using sets of CPU and Memory intensive containerised applications against the direct deployment strategy of Amazon ECS. The results show that CMS achieves up to 25% higher cluster utilisation and up to 2.5 times faster execution times.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122469863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}