2018 IEEE Symposium on Computers and Communications (ISCC)最新文献

筛选
英文 中文
High Threat Alarms Mining for Effective Security Management: Modeling, Experiment and Application 面向有效安全管理的高威胁告警挖掘:建模、实验与应用
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538535
Yongwei Meng, Tao Qin, Yukun Liu, Chao He
{"title":"High Threat Alarms Mining for Effective Security Management: Modeling, Experiment and Application","authors":"Yongwei Meng, Tao Qin, Yukun Liu, Chao He","doi":"10.1109/ISCC.2018.8538535","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538535","url":null,"abstract":"Intrusion Prevention System (IPS) is important for network security management as it can help the administrator by generating alarms corresponding to different attacks. But there are many false alarms due to their running mechanism, which greatly reduces its usability. In this paper, we develop a hierarchical framework to mine high threat alarms from raw massive logs. We first divide the raw alarms into two parts based on their attributes, the first part mainly include alarms from several kinds of serious attacks while others constitute the second part. To mine high threat alarms from the first part, we proposed a similar alarm mining method based on Choquet Integral to cluster and rank the results of clustering. The potential threats are mixed with many false alarms in the second part, to reduce effect from false alarms, we employ the frequent pattern mining algorithm to mine correlation rules and employ them to filter the false alarms. Following we qualify the threat degree of those alarms based on the features extracted from characteristics of alarms themselves. Experimental results based on the data collected from the campus network of Xi’an Jiaotong University verify the efficiency and accuracy of the developed methods. Based on the mining and ranking results, administrators can deal with the high threats with their limited time and energy to keep the network under control.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121516337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EFM: Improving DCNs throughput using the transmission rates of elephant flows EFM:使用大象流的传输速率提高DCNs吞吐量
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538633
André Luiz Beltrami Rocha, F. Verdi
{"title":"EFM: Improving DCNs throughput using the transmission rates of elephant flows","authors":"André Luiz Beltrami Rocha, F. Verdi","doi":"10.1109/ISCC.2018.8538633","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538633","url":null,"abstract":"One of the major issues in Data Center Networks (DCNs) is related to elephant flows. These flows typically are primarily responsible for network congestion, causing impacts on applications that are intolerant to delays. Although there are several works in the literature that analyze this type of traffic, none of them consider the impact of elephant flow size on the throughput and on the Flow Completion Time (FCT). This article presents the EFM (Elephant Flow Manager) as a complete solution for monitoring and re-routing elephant flows in DCNs, by observing the size of these flows in the network. The tests performed show that the size of the elephant flows influences the throughput and the FCT of the applications and, therefore, deserves to be observed. The evaluation of the solution was performed comparing the joint use of EFM with ECMP (EqualCost Multi-path). In all tests, our re-routing solution proved to be better when compared to pure routing solely with ECMP. Then, this paper presents three main contributions: (1) it compares our solution with the ECMP, (2) highlights the importance of the size of the elephant flows in the re-routing of these in DCNs and (3) preliminary tests indicate that due to the decrease in FCT, it is possible to reduce the energy consumption in the data center.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dependability Evaluation of a Blockchain-as-a-Service Environment 区块链即服务环境的可靠性评估
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538752
Carlos Melo, J. Dantas, Danilo Oliveira, Iure Fé, Rúbens de Souza Matos Júnior, R. Dantas, Ronierison Maciel, P. Maciel
{"title":"Dependability Evaluation of a Blockchain-as-a-Service Environment","authors":"Carlos Melo, J. Dantas, Danilo Oliveira, Iure Fé, Rúbens de Souza Matos Júnior, R. Dantas, Ronierison Maciel, P. Maciel","doi":"10.1109/ISCC.2018.8538752","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538752","url":null,"abstract":"The blockchain shared ledger emerged as an alternative to the bureaucratic banking system that may take days to confirm a payment or a transfer between clients. The blockchain concept evolved and became viable for various applications beyond the domain of financial transactions. Blockchains become a way to reach better relationships through contract validation, documents transfer, and personal and business data security. Recently, the blockchain-as-a-service has debuted on Microsoft Data Centers, and now many share an infrastructure that can change and improve their security routines. This paper evaluates the feasibility of a blockchain-as-a-service infrastructure and helps those who plan to deploy or sell blockchains. A modeling methodology based on Dynamical Reliability Block Diagrams (DRBD) is adopted to evaluate two dependability attributes: system’s reliability and availability. The proposed infrastructure contains the minimum requirements to deploy the Hyperledger Cello, a platform to create and manage blockchains. The availability results pointed out a system downtime of 121 hours per year and reliability issues that must be addressed when building blockchain-as-a-service infrastructures.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124171544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems 基于区块链的分布式RFID系统互认证安全协议
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538567
Siye Wang, Shao-yi Zhu, Yanfang Zhang
{"title":"Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems","authors":"Siye Wang, Shao-yi Zhu, Yanfang Zhang","doi":"10.1109/ISCC.2018.8538567","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538567","url":null,"abstract":"Since radio frequency identification (RFID) technology has been used in various scenarios such as supply chain, access control system and credit card, tremendous efforts have been made to improve the authentication between tags and readers to prevent potential attacks. Though effective in certain circumstances, these existing methods usually require a server to maintain a database of identity related information for every tag, which makes the system vulnerable to the SQL injection attack and not suitable for distributed environment. To address these problems, we now propose a novel blockchain-based mutual authentication security protocol. In this new scheme, there is no need for the trusted third parties to provide security and privacy for the system. Authentication is executed as an unmodifiable transaction based on blockchain rather than database, which applies to distributed RFID systems with high security demand and relatively low real-time requirement. Analysis shows that our protocol is logically correct and can prevent multiple attacks.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125663496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Functional Diversity applied to the false positive reduction in breast tissues based on digital mammography 功能多样性应用于基于数字乳房x线摄影的乳腺组织假阳性降低
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538658
William Torres, Antonio Oseas, A. Sousa, Francisco Airton Silva
{"title":"Functional Diversity applied to the false positive reduction in breast tissues based on digital mammography","authors":"William Torres, Antonio Oseas, A. Sousa, Francisco Airton Silva","doi":"10.1109/ISCC.2018.8538658","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538658","url":null,"abstract":"Breast cancer is currently the most common in female patients and the second with the highest mortality rate. The primary responsibility for these alarming statistical data, which has been growing in recent years, are still factors of external risks such as excessive consumption of alcohol, tobacco, processed foods, sedentary lifestyle, obesity or any item associated with an unbalanced lifestyle. Also, another major impact factor is related to late diagnosis and treatment. With this, several mechanisms, such as CAD systems, are being developed to assist specialists in rapid and early diagnosis. This work proposes an approach to reduce false positives. To evaluate and validate the proposed methodology regions extracted from the DDSM database using a CAD system were used. In the proposed methodology used texture descriptors based on functional diversity indexes for the extraction of characteristics, followed by the classification of regions of interest in mass and non-mass. The results were promising, reaching rates of accuracy, sensitivity, specificity, kappa index and area under the ROC curve of 92.29%, 90.15%, 95.65%, 0.841 and 0.939, respectively.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"11 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132542227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Confidentiality-Aware Decision on Handoffs under Uncertainty on Heterogeneous Wireless Networks 异构无线网络中不确定切换的保密性感知决策
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538677
Alisson Puska, M. N. Lima, A. Santos
{"title":"Confidentiality-Aware Decision on Handoffs under Uncertainty on Heterogeneous Wireless Networks","authors":"Alisson Puska, M. N. Lima, A. Santos","doi":"10.1109/ISCC.2018.8538677","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538677","url":null,"abstract":"The handoff process in heterogeneous wireless networks (HetNets) focuses on the maintenance of mobile users connectivity, seeking to keep them continuously connected to the best available network. By supporting a better user connectivity on HetNets, handoff decision methods should take into account in the choice procedure both QoS and security issues jointly with performance. Unfortunately, such methods have slightly addressed security by ignoring its properties, and such fragility can lead to risky set up for user's data confidentiality transmission. Particularly, handoff decision methods ignore the existing uncertainty in HetNets. But, uncertain information is common when handling wireless networks transition. Therefore, this work presents a method to support confidentiality-aware decision making in the mobile device handoff process by adapting the expected-utility theory. Simulation results show how this method brings advantages to the user connectivity providing both less risky choices and low handoff cost.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130026480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tensorial Lucas-Kanade: An Optical Flow Estimator Based on Tensorial Color Representation and Tensorial Algebra 张量Lucas-Kanade:基于张量颜色表示和张量代数的光流估计
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538466
Fetnanda Tamy Ishii, F. C. Flores, L. Rittner
{"title":"Tensorial Lucas-Kanade: An Optical Flow Estimator Based on Tensorial Color Representation and Tensorial Algebra","authors":"Fetnanda Tamy Ishii, F. C. Flores, L. Rittner","doi":"10.1109/ISCC.2018.8538466","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538466","url":null,"abstract":"Color data and optical flow estimation are important attributes to be processed in color image sequence. To deal with this, it is important to define methods for color information measure and strategies to solve the well-known Aperture Problem. This work proposes a new optical flow estimation approach for color image sequences called Tensorial Lucas-Kanade Technique. The technique proposed is based on tensorial color representation, tensorial morphological gradient and Lucas-Kanade optical flow estimation technique. Experimental results, comparing to ground truth optical flow by two different criteria, demonstrate the accuracy of its application in several sequences of synthetic color images. Four different tensorial dissimilarity measures were used to evaluate the technique. Comparing to the Lucas-Kanade’s, tensorial technique had smaller average error in 94% of cases, with different dissimilarity measures and in 47% of cases, using the Frobenius norm.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134226921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Clustering-based Thresholding Method for Human Skin Segmentation Using HSV Color Space 基于HSV颜色空间的聚类阈值分割方法
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538604
R. D. F. Feitosa, A. S. Soares, Lucas Calabrez Pereyra
{"title":"A New Clustering-based Thresholding Method for Human Skin Segmentation Using HSV Color Space","authors":"R. D. F. Feitosa, A. S. Soares, Lucas Calabrez Pereyra","doi":"10.1109/ISCC.2018.8538604","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538604","url":null,"abstract":"Skin detection based on color can be applied in eHealth systems for preventive healthcare and computer-aided diagnosis. These algorithms could be incorporated in acquisition and preprocessing steps of the applications that assist with skincare, as prevention and detection of melanoma. In this paper we present the results of a study that investigated the reduction of the color spectrum in the HSV system for sample-based skin detection of individuals of different ages and ethnicities. The proposed HSV filter reduced the color spectrum by 97.4648{%} so as to select candidates for human skin tones. It achieved low sensitivity (54.6333{%}) and high specificity (92.6390{%}) in human skin detection in color digital images when compared to the performance of other algorithms proposed in the literature. Different from other filters described in the literature which propose a single interval for human skin in the HSV system, this model presents and discusses 13 intervals in the possible spectrum which present a well-defined variation in terms of tone.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130704932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of gap filling algorithms to smart surveillance environment 智能监控环境下的间隙填充算法分析
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538768
M. Peixoto, Igo Souza, Matheus Barbosa, G. Lecomte, Dionisio Machado Leite Filho, Bruno Guazzelli, B. Kuehne
{"title":"Analysis of gap filling algorithms to smart surveillance environment","authors":"M. Peixoto, Igo Souza, Matheus Barbosa, G. Lecomte, Dionisio Machado Leite Filho, Bruno Guazzelli, B. Kuehne","doi":"10.1109/ISCC.2018.8538768","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538768","url":null,"abstract":"There are a large number of cameras distributed throughout smart cities. As amount as the number of cameras increases, a huge streaming workload is produced. Although Fog computing has been used to reduce latency and jitter, Gateways IoT are unable to identify whether the data produced is invalid or absent, affecting the quality of service. Therefore, this paper presents an analysis of gap filling algorithms to smart surveillance environment. Our study shows that it is possible to maximize the accuracy of data imputation. Performance evaluation shows significant improvements in the imputation of missing data using Singular Spectrum Analysis (SSA), increasing the accuracy in the estimation of the Streaming video, and thus improving the quality of service.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Crowdsensing Campaign and Data Analytics for Assisting Urban Mobility Pattern Determination 帮助确定城市交通模式的群体感知活动和数据分析
2018 IEEE Symposium on Computers and Communications (ISCC) Pub Date : 2018-06-01 DOI: 10.1109/ISCC.2018.8538483
M. Buosi, Marco Cilloni, Antonio Corradi, Carlos Roberto de Rolt, J. S. Dias, L. Foschini, R. Montanari, P. Zito
{"title":"A Crowdsensing Campaign and Data Analytics for Assisting Urban Mobility Pattern Determination","authors":"M. Buosi, Marco Cilloni, Antonio Corradi, Carlos Roberto de Rolt, J. S. Dias, L. Foschini, R. Montanari, P. Zito","doi":"10.1109/ISCC.2018.8538483","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538483","url":null,"abstract":"The ever-progressing advancements in urban growth and technological development in recent decades have caused a noticeable increase of the phenomenon of socialenvironmental deterioration, leading to a decline in quality of life, reduction of social welfare and difficult urban mobility for people living in cities. The concept of Smart City can be used to mitigate several of the challenges arising from the aforementioned issues, relying on multiple tools and techniques (such as crowdsensing) to gather essential context data about how actual citizens consume resources and commute throughout their everyday lives. In this paper, we show how an urban mobility data analytics tool may help to determine the most visited regions and interconnections in an urban area. This information has been obtained using data gathered from a pool of users participating in a crowdsensing campaign, using the ParticipAct Brazil platform. The obtained results confirm the reliability of the information produced, highlighting the regions with the highest concentration of people during the geolocation monitoring process and their connections; therefore, this data may be used to plan possible future changes to how the city allocates its resources, to better suit the mobility needs of its citizens.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133080122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信