{"title":"Training of intelligent intrusion detection system using neuro fuzzy","authors":"Biswajit Panja, Olugbenga Ogunyanwo, Priyanka Meharia","doi":"10.1109/SNPD.2014.6888688","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888688","url":null,"abstract":"Intrusion detection systems classify computer activities into two main categories: normal and suspicious activities. In order to achieve the classification, Intrusion detection systems use software computing techniques including neural networks and neuro fuzzy networks to categorize network activities and specify what category of attack is being generated. Neuro-Fuzzy classifiers are used for the initial classification of the initial network traffic. An inference system, Fuzzy inference systems is further used to determine whether the activity is normal or malicious. Efficient IDS systems are those capable of reducing false positives and generate high rate attack detection. However, fuzzy inference systems use human knowledge to create their fuzzy rule. In order to introduce a more accurate way of classifying network traffic, we introduce the use of Genetic Algorithms in conjunction with ANFIS so as to optimize data classification and obtain the best results. Genetic algorithms use a set of genetic operators such as mutation, crossover and selection on current population to reproduce similar patterns that will be used repeatedly until a particular criterion is met.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122769021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haocheng Wang, Fuzhen Zhuang, Xiang Ao, Qing He, Zhongzhi Shi
{"title":"Scalable bootstrap clustering for massive data","authors":"Haocheng Wang, Fuzhen Zhuang, Xiang Ao, Qing He, Zhongzhi Shi","doi":"10.1109/SNPD.2014.6888693","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888693","url":null,"abstract":"The bootstrap provides a simple and powerful means of improving the accuracy of clustering. However, for today's increasingly large datasets, the computation of bootstrap-based quantities can be prohibitively demanding. In this paper we introduce the Bag of Little Bootstraps Clustering (BLBC), a new procedure which utilizes the Bag of Little Bootstraps technique to obtain a robust, computationally efficient means of clustering for massive data. Moreover, BLBC is suited to implementation on modern parallel and distributed computing architectures which are often used to process large datasets. We investigate empirically the performance characteristics of BLBC and compare to the performances of existing methods via experiments on simulated data and real data. The results show that BLBC has a significantly more favorable computational profile than the bootstrap based clustering while maintaining good statistical correctness.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124224897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayaz H. Khan, M. Al-Mouhamed, A. Almousa, Allam Fatayar, A. Ibrahim, A. Siddiqui
{"title":"AES-128 ECB encryption on GPUs and effects of input plaintext patterns on performance","authors":"Ayaz H. Khan, M. Al-Mouhamed, A. Almousa, Allam Fatayar, A. Ibrahim, A. Siddiqui","doi":"10.1109/SNPD.2014.6888707","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888707","url":null,"abstract":"In the recent years, the Graphics Processing Units (GPUs) have gained popularity for general purpose applications, immensely outperforming traditional optimized CPU based implementations. A class of such applications implemented on GPUs to achieve faster execution than CPUs include cryptographic techniques like the Advanced Encryption Standard (AES) which is a widely deployed symmetric encryption/decryption scheme in various electronic communication domains. With the drastic advancements in electronic communication technology, and growth in the user space, the size of data exchanged electronically has increased substantially. So, such cryptographic techniques become a bottleneck to fast transfers of information. In this work, we implement the AES-128 ECB Encryption on two of the recent and advanced GPUs (NVIDIA Quadro FX 7000 and Tesla K20c) with different memory usage schemes and varying input plaintext sizes and patterns. We obtained a speedup of up to 87x against an advanced CPU (Intel Xeon X5690) based implementation. Moreover, our experiments reveal that the different degrees of pattern repetitions in input plaintext affect the encryption performance on GPU.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129565082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensuring the integrity and non-repudiation of remitting e-invoices in conventional channels with commercially available NFC devices","authors":"Shi-Cho Cha, Yuh-Jzer Joung, Yen-Chung Tseng, Shih-Chieh Huang, Guan-Heng Chen, Chih-Teng Tseng","doi":"10.1109/SNPD.2014.6888705","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888705","url":null,"abstract":"Despite the globally recognized advantages of e-invoicing and various efforts to implement such systems, retailers and stores may still have difficulties in promoting purely paperless e-invoices due to the lack of a convenient and secure way for consumers to receive and retrieve the e-invoices. As such, paper-based invoices may still be issued along with e-invoices, contradicting an important benefit of e-invoicing - paper consumption reduction. Thanks to the advances in smart phones and Near Field Communication (NFC) technologies, e-invoices can be delivered via NFC-enabled smartpones, allowing consumers to examine the content immediately after transactions and to easily retrieve them later on. Still, an extra security mechanism is needed to ensure the integrity and non-repudiation of the content, as invoices may bear some value and thus become the target of a security attack. In this paper, we propose a secure NFC-based e-invoice remitting scheme using standard NFC P2P communications, and discuss how it fulfills major security requirements, including authenticity, integrity, and non-repudiation. The proposed system is also implemented and tested in Taiwan's e-invoicing system.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132674199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An improvement of micro area selection technique for the diffusion of ICT infrastructure","authors":"M. Iwashita, T. Kurosawa, A. Inoue, K. Nishimatsu","doi":"10.1109/SNPD.2014.6888722","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888722","url":null,"abstract":"ICT infrastructures such as wired/wireless information networks are poised to play an important role in meeting these demands, and there is an urgent need to facilitate nationwide ICT infrastructure immediately. Since installation of such ICT infrastructures takes a large amount of time and expenditure, the selection of installation area is an important issue. Low-usage facilities can cause huge problems for businesses in terms of investment efficiency, and it takes time to select areas because we need to consider how to estimate the potential demand and how to diffuse the installation for thousands of municipal areas across the nation. This paper evaluates the micro area selection method which is previously proposed with ICT infrastructure propagating based on commuting flows. A comparison with the performance of a WiMAX service currently in use for several areas induces the improved method.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133969914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eya Ben Ahmed, Wafa Tebourski, W. Karaa, F. Gargouri
{"title":"ONTOSSN: Scientific social network ontology","authors":"Eya Ben Ahmed, Wafa Tebourski, W. Karaa, F. Gargouri","doi":"10.1109/SNPD.2014.6888677","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888677","url":null,"abstract":"During the past decade, the advent of the social network has offered several platforms that promote communication among users on common spaces. Several efforts were devoted to unify the social network domain, particularly the scientific domain through introducing ontology-based modeling of scientific social network. However, the measurement of the researchers standings within the scientific community is generally absent. To overcome this drawback, we propose, in this paper, a scientific social network ontology which includes definitions of main entities and describes main attributes of : Scientific social network concepts aiming to share common understanding of this domain and to reflect the academic career paths.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shota Nakashima, Shenglin Mu, Tatsuya Ichikawa, Hiromasa Tomimoto, S. Okabe, Kanya Tanaka, Yuhki Kitazono, S. Serikawa
{"title":"Detection range fitting of slit type Obrid-Sensor","authors":"Shota Nakashima, Shenglin Mu, Tatsuya Ichikawa, Hiromasa Tomimoto, S. Okabe, Kanya Tanaka, Yuhki Kitazono, S. Serikawa","doi":"10.1109/SNPD.2014.6888738","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888738","url":null,"abstract":"As aging society problem goes severe, systems to confirm to safety of elders in daily life are expected to relieve burdensome safety confirmation tasks of care workers. In this paper, a sensor, which detects person localization without privacy offending, applying Obrid-Sensor is proposed. In the proposed design, the Obrid-Sensor is constructed with a line sensor and a slit to obtain one-dimensional brightness distribution. The proposed sensor is able to obtain one-dimensional brightness distribution that is approximately equal to integration value of each vertical pixel line of two-dimensional image. Meanwhile, the novel slit type Obrid-Sensor, which was constructed without Rod lens, is studied in this research. By employing the proposed sensor, the information of a subject's position and motion can be obtained without using two-dimensional texture image. The effectiveness of the proposed method is confirmed by experiments.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125604292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategy-guided requirements development and validation","authors":"Xiaofeng Cui, R. Paige","doi":"10.1109/SNPD.2014.6888717","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888717","url":null,"abstract":"The ultimate aim of business/mission software is to help implement the business value or mission imperatives. For critical business/mission applications, high-level strategies need to play a crucial role in the development and validation of software requirement, so that the requirements and the produced software can closely align with the business/mission objectives and effectively contribute to the business/mission success. In this paper, we propose a strategy-guided method for the development and validation of requirements. We firstly articulate the dimensions of strategy and concept model for connecting strategies and requirements. We then present the approaches for the requirements development and validation, based on the relationship between the elements of strategies and requirements. This strategy-guided method addresses the paradigms for both the market-oriented and customer-specific software development. We also give an example illustrating the strategy perspectives and the resulting requirements.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134038976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An obfuscation method to build a fake call flow graph by hooking method calls","authors":"Kazumasa Fukuda, Haruaki Tamada","doi":"10.1109/SNPD.2014.6888726","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888726","url":null,"abstract":"This paper proposes an obfuscation method against illegal analysis. The proposed method tries to build a fake call flow graph from debugging tools. The call flow graph represents relations among methods, and helps understanding of a program. The fake call flow graph leads misunderstanding of the program. We focus on a hook mechanism of the method call for changing a callee. We conduct two experiments to evaluate the proposed method. First experiment simulates attacks by existing tools: Soot, jad, Procyon, and Krakatau. The Procyon only succeeded decompilation, the others crashed. Second experiment evaluates understandability of the obfuscated program by the hand. Only one subject in the nine subjects answered the correct value. The experiments shows the proposed method has good tolerance against existing tools, and high difficulty of understanding even if the target program is tiny and simple program.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129377471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cuauhtémoc López Martín, Arturo Chavoya-Pena, M. Meda-Campaña
{"title":"A machine learning technique for predicting the productivity of practitioners from individually developed software projects","authors":"Cuauhtémoc López Martín, Arturo Chavoya-Pena, M. Meda-Campaña","doi":"10.1109/SNPD.2014.6888690","DOIUrl":"https://doi.org/10.1109/SNPD.2014.6888690","url":null,"abstract":"Context: Productivity management of software developers is a challenge in Information and Communication Technology. Predictions of productivity can be useful to determine corrective actions and to assist managers in evaluating improvement alternatives. Productivity prediction models have been based on statistical regressions, statistical time series, fuzzy logic, and machine learning. Goal: To propose a machine learning model termed general regression neural network (GRNN) for predicting the productivity of software practitioners. Hypothesis: Prediction accuracy of a GRNN is better than a statistical regression model when these two models are applied for predicting productivity of software practitioners who have individually developed their software projects. Method: A sample obtained from 396 software projects developed between the years 2005 and 2011 by 99 practitioners was used for training the models, whereas a sample of 60 projects developed by 15 practitioners in the first months of 2012 was used for testing the models. All projects were developed based upon a disciplined development process within a controlled environment. The accuracy of the GRNN was compared against that of a multiple regression model (MLR). The criteria for evaluating the accuracy of these two models were the Magnitude of Error Relative to the estimate and a t-paired statistical test. Results: Prediction accuracy of an GRNN was statistically better than that of an MLR model at the 99% confidence level. Conclusion: An GRNN could be applied for predicting the productivity of practitioners when New and Changed lines of code, reused code, and programming language experience of practitioners are used as independent variables.","PeriodicalId":272932,"journal":{"name":"15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124203797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}