Jie Cui, Lingbiao Kong, Hong Zhong, Xiuwen Sun, Chengjie Gu, Jianfeng Ma
{"title":"Scalable QoS-Aware Multicast for SVC Streams in Software-Defined Networks","authors":"Jie Cui, Lingbiao Kong, Hong Zhong, Xiuwen Sun, Chengjie Gu, Jianfeng Ma","doi":"10.1109/ISCC53001.2021.9631505","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631505","url":null,"abstract":"Because network nodes are transparent in media streaming applications, traditional networks cannot utilize the scalability feature of Scalable video coding (SVC). Compared with the traditional network, SDN supports various flows in a more fine-grained and scalable manner via the OpenFlow protocol, making QoS requirements easier and more feasible. In previous studies, a Ternary Content-Addressable Memory (TCAM) space in the switch has not been considered. This paper proposes a scalable QoS-aware multicast scheme for SVC streams, and formulates the scalable QoS-aware multicast routing problem as a nonlinear programming model. Then, we design heuristic algorithms that reduce the TCAM space consumption and construct the multicast tree for SVC layers according to video streaming requests. To alleviate video quality degradation, a dynamic layered multicast routing algorithm is proposed. Our experimental results demonstrate the performance of this method in terms of the packet loss ratio, scalability, the average satisfaction, and system utility.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133103322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BS-Net: A Behavior Sequence Network for Insider Threat Detection","authors":"Dali Zhu, Hongju Sun, Nan Li, Baoxin Mi, Tong Xi","doi":"10.1109/ISCC53001.2021.9631445","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631445","url":null,"abstract":"In view of the concealment and destructiveness of insider threats, to detect insider threats is very important for protecting the security of enterprises and organizations. However, it is still a challenge to design a practical detection scheme which can accurately mine abnormal clues and has a high level of automation. In this paper, we propose the Behavior Sequence Network (BS-Net) which applies the one-class support vector machine and the recurrent neural network to the insider threat detection problem. The BS-Net is a detection framework based on user behavior portrait that learns representative features from the raw log data and then makes discrimination by a unified standard. Through a flow sequence division method, the original data flow is divided into short sequences. After behavior feature extraction and sequence matching, behavior sequences are sent into two anomaly detection models to analyze the occurrence possibility of behaviors from local detail features and the global dependence relationship between businesses respectively. We conduct experiments based on the CERT dataset and the results show that BS-Net achieves an excellent performance (recall rate of 0.94, accuracy of 0.94, and FPR of 0.12) and outperforms the state-of-the-art methods.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114365328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Flores-Martín, J. García-Alonso, J. Berrocal, L. Foschini, J. Rodríguez
{"title":"Context-Dependent Services Selection in Smart Environments","authors":"Daniel Flores-Martín, J. García-Alonso, J. Berrocal, L. Foschini, J. Rodríguez","doi":"10.1109/ISCC53001.2021.9631437","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631437","url":null,"abstract":"The current trend of smart environments is leading towards a world where everything is considered as a service. Internet-connected smart devices make these environments largely manageable and controllable through services. In these environments, not only devices offer services, but lately, people through their smartphones can also offer services such as personal information provided by the name, the preferences, or the location, promoting the offer of almost anything as a service. However, this high supply of services makes it more difficult for IoT systems to identify which services to use to solve a particular need. This paper proposes a solution to characterize services homogeneously and a service selection mechanism is outlined considering the properties of the services and the context in which they are found. With this proposal, services are defined commonly to facilitate a smart selection by IoT applications.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128686648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UrbanVG: A Gamification Encouraging Urban Vegetable Garden Platform","authors":"Mateus T. Kawazoe, André G. Lauer, N. B. F. Silva","doi":"10.1109/ISCC53001.2021.9631525","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631525","url":null,"abstract":"Urban vegetable gardens are spaces in urban landscapes devoted to cultivating food by communities or individuals. It has several advantages to cities since it improves environmental awareness and can create social ties in communities, despite being a sustainable way to produce food. Its use can also take advantage of the Internet of Things (IoT) paradigm, with several studies proposing the monitoring of urban gardens with humidity, luminosity, and temperature sensors. However, most of them focus on the automation of the cultivation. Differently, this paper aims to present a Web platform designed with gamification techniques to incentive urban garden development. The gamification is applied to encourage volunteer work through competitiveness among users and a reward system. Moreover, the system also enables disseminating information about plant cultivation by the users that receive experiences points based on its interaction. Moreover, the results show an experimental setup developed to validate the platform integration with ThingSpeak to allow users to follow their sensor data.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134230065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"firm VulSeeker: BERT and Siamese based Vulnerability for Embedded Device Firmware Images","authors":"Yingchao Yu, Shuitao Gan, Xiaojun Qin","doi":"10.1109/ISCC53001.2021.9631481","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631481","url":null,"abstract":"In this paper, we propose firmVulSeeker-a vulnerability search tool for embedded firmware images, based on BERT and Siamese network. It first builds a BERT MLM task to observe and learn the semantics of different instructions in their context in a very large unlabeled binary corpus. Then, a finetune mode based on Siamese network is constructed to guide training and matching semantically similar functions using the knowledge learned from the first stage. Finally, it will use a function embedding generated from the fine-tuned model to search in the targeted corpus and find the most similar function which will be confirmed whether it's a real vulnerability manually. We evaluate the accuracy, robustness, scalability and vulnerability search capability of firmVulSeeker. Results show that it can greatly improve the accuracy of matching semantically similar functions, and can successfully find more real vulnerabilities in real-world firmware than other tools.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134389192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
David Monschein, José Antonio Peregrina Pérez, Tim Piotrowski, Zoltán Nochta, O. P. Waldhorst, Christian Zirpins
{"title":"Towards a Peer-to-Peer Federated Machine Learning Environment for Continuous Authentication","authors":"David Monschein, José Antonio Peregrina Pérez, Tim Piotrowski, Zoltán Nochta, O. P. Waldhorst, Christian Zirpins","doi":"10.1109/ISCC53001.2021.9631491","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631491","url":null,"abstract":"The in-depth consideration of security aspects in modern web infrastructures has become essential to stay competitive. In this context, continuous authentication is a promising approach to prevent the misuse of digital identities. To this end, machine learning (ML) models are well suited to analyze user behavior and to detect anomalies, due to their ability to identify complex patterns and trends that usually cannot be reflected by static rule-based approaches. However, the training of powerful ML models requires large amounts of data, which are often not available within a single organization. Consequently, a federated training of these models by cooperating organizations offers a promising solution, but leads to concerns about coordination, regulations, and quality assurance. To tackle these challenges, we present an approach that combines three research areas: (1) the establishment of continuous user authentication based on (2) a ML model trained by an organized peer-to-peer federation involving different organizations that is underpinned by (3) federated data governance ensuring regulatory compliance and quality of resulting artefacts.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134277794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paolo Zampognaro, Giovanni Paragliola, Vincenzo Falanga
{"title":"A FHIR based architecture of a multiprotocol IoT Home Gateway supporting dynamic plug of new devices within instrumented environments","authors":"Paolo Zampognaro, Giovanni Paragliola, Vincenzo Falanga","doi":"10.1109/ISCC53001.2021.9631446","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631446","url":null,"abstract":"Internet of Things (IoT) technologies have become a milestone advancement in the digital healthcare domain, since the number of IoT medical devices is grown exponentially, and it is now anticipated that by 2020 there will be over 161 million of them connected worldwide. Therefore, in an era of continuous growth, IoT healthcare faces various challenges, such as the collection over multiple protocols (e.g, Bluetooth, MQTT, CoAP, ZigBEE etc.) the interpretation, as well as the harmonization of the data format that derive from the existing huge amounts of heterogeneous IoT medical devices. In this respect this study aims at proposing an advanced Home Gateway architecture that offers a unique data collection module, supporting direct data acquisition over multiple protocols (i.e. BLE, MQTT) and indirect data retrieval from cloud health services (i.e, GoogleFit). Moreover the solution propose a mechanism to automatically convert the original data format, carried over BLE, in HL7 FHIR by exploiting device capabilities semantic annotation implemented by means of FHIR resource as well. The adoption of such annotation enables the dynamic plug of new sensors within the instrumented environment without the need to stop and adapt the gateway. This simplifies the dynamic devices landscape customization requested by the several telemedicine applications contexts (e.g. CVD, Diabetes) and demonstrate, for the first time, a concrete example of using the FHIR standard not only (as usual) for health resources representation and storage but also as instrument to enable seamless integration of IoT devices. The proposed solution also relies on mobile phone technology which is widely adopted aiming at reducing any obstacle for a larger adoption.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling Optimization of Charging UAV in Wireless Rechargeable Sensor Networks","authors":"Yanheng Liu, Hongyang Pan, Geng Sun, Aimin Wang","doi":"10.1109/ISCC53001.2021.9631448","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631448","url":null,"abstract":"Wireless rechargeable sensor networks (WRSNs) with a charging UAV (CUAV) have the broad application prospects for the power supply of the rechargeable sensor nodes (SNs). However, how to schedule the CUAV so that improving the charging efficiency of the whole system is still a vital problem. In this paper, we formulate a scheduling optimization problem of CUAV (SOPCUAV) to jointly reduce the hovering number of the CUAV and the duplicate coverage of SNs for enhancing the charging performance. Then, we propose an improved particle swarm optimization (IPSO) algorithm with the flexible dimension mechanism, using K - means operator to find the hovering position of CUAV and punishment and compensation mechanism to solve the formulated SOPCUAV. Simulation results demonstrate the effectiveness and performance of the proposed algorithm.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121894856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Player Assignment in MEC Gaming for Social Interactivity and Server Provisioning Optimization","authors":"Athanasios Tsipis, K. Oikonomou","doi":"10.1109/ISCC53001.2021.9631480","DOIUrl":"https://doi.org/10.1109/ISCC53001.2021.9631480","url":null,"abstract":"In Mobile Edge Computing (MEC), edge servers are deployed on Base Stations (BSs) to provide high accessibility to nearby users, alleviating the computational burden of the remote cloud and significantly reducing network delays. Still, for distributed interactive applications (DIAs), such as cloud games, where players team up and form social communities, one fundamental challenge is the discovery of the most suitable player-to-server assignment, that achieves a balanced tradeoff between low-delay social interactivity and low-cost server provisioning, under strict proximity and capacity constraints. In this paper, we formally model the problem via mixed-integer linear programming. However, its solution is complex falling under the category of existing capacitated facility location problems. Thus, we present the “Interactivity-based Edge Server Allocation” (IESA) algorithm, a novel heuristic approach to efficiently assign and then iteratively improve the player-to-server allocation. IESA is evaluated using trace-driven simulations that demonstrate how it outperforms the baseline and state-of-the-art assignment alternatives.","PeriodicalId":270786,"journal":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123544434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}