{"title":"A Performance Management System for Telecommunication Network Using AI Techniques","authors":"Shaoyan Zhang, Rui Zhang, Jianmin Jiang","doi":"10.1109/DepCoS-RELCOMEX.2008.32","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.32","url":null,"abstract":"Anomaly detection has become more and more difficult for telecommunication network due to the various trends of networking technologies and the growing number of unauthorized activities in the performance data. This paper builds up a performance management system based on the one-class-support vector machine (OCSVM) and k-means clustering algorithm, which achieves not only the automatic detection of network anomalies but also the clustering of the anomalies with different levels. The OCSVM detects the anomalies by solving an optimal problem to separate the nominal data from the anomalies; these detected anomalies are then classified into minor, medium and severe levels using k-means clustering. The real telecommunication performance data are employed in this paper for the investigation, and the numerical results demonstrate the promising performance of this system.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132306110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent Maritime Workplace using IT technologies","authors":"D. Gourgoulis, C. Yakinthos","doi":"10.1109/DepCoS-RELCOMEX.2008.41","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.41","url":null,"abstract":"IT technologies over the past years have shown a rapid growth, on the contrary this increase of e-commerce and e-work in the maritime industry is not as intense as in any other field. E-commerce and e-work is still at its embryonic stages, however, the annual rate of increase suggest that in very few years this share will have grown dramatically. Thus, it is time to get prepared. The aim of the present paper is to present a new maritime intelligent workplace based weather information system and decision support for high-speed maritime transport. It has been achieved by linking fixed/mobile communications with navigation/positioning, efficient transmission and delivery over the geo-information network. These services will allow the shipmaster to have seamless access to, and interaction with intelligent, customised (route based) rich content multimedia information on the efficient and safe navigation passage for passengers, freights and the environment both on board ship and inland.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124478138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dependability Evaluation of Service-oriented Information System Using Computer Simulation and Post-processing Results","authors":"Lukasz Bagrij, K. Michalska, Marek Woda","doi":"10.1109/DepCoS-RELCOMEX.2008.18","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.18","url":null,"abstract":"In times of known hacking techniques as well as malicious software ubiquity, mostly commercialized information systems are seriously threaten. For this reason nowadays network security and dependable operation has become a major priority for design and implementation. Looking for powerful means network engineers started to often use computer simulation technique as a way for better understanding and development of complex computer systems. Therefore, plenitude of specialized development initiatives appeared in last few years. Currently network simulators are tools useful not only for creating new and better protocols, but also become money savers. By extending their functionalities e.g. post-processing capabilities for evaluating security and dependability metrics they turn out to be a fundamental state of the art network management platforms. This paper presents the information system, proposes metrics definitions, and describes the procedure of their evaluation using a simulator and a post-processing module.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"59 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ElGamal Signature Scheme Immune to Fault Analysis","authors":"Maciej Nikodem","doi":"10.1109/DepCoS-RELCOMEX.2008.55","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.55","url":null,"abstract":"Fault attacks have been introduced in late 90's and since then they attracted a lot of attention. Last years many authors have presented that almost all contemporary cryptographic algorithms are susceptible to the fault analysis. Unfortunately, only a few propositions to overcome this threat have been proposed. Moreover most works focus on secret key cryptosystems (e.g. AES, RC6, Blowfish) and the RSA encryption and signing algorithm. On the other hand much less attention have been paid to other signature and identification schemes.In this paper we will investigate the fault attack on the ElGamal signature scheme. We briefly present two attacks on this scheme and propose a modification that ensures immunity to transient and permanent faults. This is achieved without using comparisons, at cost of increased computational overhead similar to signature verification.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126663813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-Centralized Key Pre-Distribution in Computer Networks","authors":"Alexander Frolov, I. Shchurov","doi":"10.1109/DepCoS-RELCOMEX.2008.47","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.47","url":null,"abstract":"The technology of confidential connections in a computer network using key information pre-distributed independently and may be simultaneously in its segments or domains is proposed. Some key pre-distribution schemes are generalized using well-known hashing method. To support the proposed technology the modification of Kerberos-type protocol is considered. The proposal allows us to decrease an amount of secret key information that should be sent from its generator to the network participants. The considered approaches and key pre-distribution schemes correspond to peculiarities of mobile networks owing to the facts that participants should'n implement asymmetric cryptographic systems and the public key certification service; moreover the communication phase don't suppose any interconnection with trusted authority key distribution center.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121752827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decision Diagrams for Reliability Analysis of Multi-State System","authors":"E. Zaitseva, V. Levashenko","doi":"10.1109/DepCoS-RELCOMEX.2008.54","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.54","url":null,"abstract":"Multi-state system (MSS) is one a mathematical model used in reliability analysis to describe a system having some working efficiency. We propose new methods for MSS description by decision diagrams that well know in algebra logic and in multiple-value logic in particular. We propose dynamic reliability indices for estimation of MSS reliability and elaborate algorithms for calculation of dynamic reliability indices on basis of MSS representation by decision diagram.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121798517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Planning Platform Framework for Managing Service-Oriented Information Systems","authors":"Marek Woda, Lukasz Bagrij","doi":"10.1109/DepCoS-RELCOMEX.2008.17","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.17","url":null,"abstract":"Proposed framework provides methodologies and tools for enhancing information systems dependability by assisting in planning the system operations. For that reason the following steps are taken: model the system, analyze its expected behaviour to identify potential problems and weaknesses, and finally automatically generate the system configurations according to various operational modes. The approach postulate for creating: the models and tools to express the policies (dependability, detection and reaction) as well as for describing the target system, its operation modes and threats.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127575851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of SOA Security Metrics Using Attack Graphs","authors":"J. Magott, Marek Woda","doi":"10.1504/IJCCBS.2010.031712","DOIUrl":"https://doi.org/10.1504/IJCCBS.2010.031712","url":null,"abstract":"First, different security metrics are presented. A proposal of risk assessment for service oriented architecture (SOA) is given. This proposal is based on service availability metrics. First metric represents costs (extend of damage), when the service is not available. The second one is a probability that the service is available. Foundations for calculating this probability by simulation using attack graphs are given. The attack graph is a representation of actions that end in a state where an intruder achieved his/her goal. A model of intrusion detection system is given too.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131335065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Prokhorova, V. Kharchenko, S. Ostroumov, S. Yatsenko, Mykola Sidorenko, B. Ostroumov
{"title":"Dependable SoPC-Based On-board Ice Protection System: From Research Project to Implementation","authors":"Y. Prokhorova, V. Kharchenko, S. Ostroumov, S. Yatsenko, Mykola Sidorenko, B. Ostroumov","doi":"10.1109/DepCoS-RELCOMEX.2008.43","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.43","url":null,"abstract":"Both dependability of computer on-board systems (CBS), and the size and the weight limitations are very important characteristics. Basic aviation and aerospace CBSs requirements and some development principles are considered. The multi-version lifecycle of FPGA-based CBS as system-on-programmable-chip (SoPC) is described. The several dependable SoPC architectures are researched and assessed: one-version two-channel, two-version two-channel and two-version four-channel systems. The method of the architectural adaptation is considered as the means for physical and design faults tolerating. Itpsilas based on composition of a few versions embedded to the chip. The checking and reconfiguration block as intellectual property core and elements ofice protection system development and implementation process are given as the practical example of application of proposed technique.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126470702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomy and Cooperation as Factors of Dependability in Wireless Sensor Network","authors":"J. Nikodem","doi":"10.1109/DepCoS-RELCOMEX.2008.50","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.50","url":null,"abstract":"In the paper we explore relationships between autonomy, cooperation and dependability in wireless sensors network (WSN). We consider WSN as a set of sensors deployed insome area. These sensors must act autonomously and cooperatively to achieve both their particular self-interested and global goals. In proposed approach we determine cooperation and autonomy abstractions and consider them in the context of three basic relations (sub-ordination, tolerance, collision). In such way we expand 2D space (autonomy, cooperation) onto 3D partially or totally ordered relational space. Proposed conceptual framework provides a powerful paradigm to conceive, model, support and manage dynamically organising complex systems.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134644439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}