{"title":"Distributed Denial of Wallet Attack on Serverless Pay-as-you-go Model","authors":"D. Mileski, Hristina Mihajloska","doi":"10.1109/TELFOR56187.2022.9983732","DOIUrl":"https://doi.org/10.1109/TELFOR56187.2022.9983732","url":null,"abstract":"The serverless pay-as-you-go model in the cloud enables payment of services during execution and resources used at the smallest, most granular level, as was the initial idea when setting the foundations and concepts of the pay-as-you-go model in the cloud. The disadvantage of this method of payment during execution and the resources used is that it is subject to financial damage if we have an attack on serverless services. This paper defines notions for three types of attacks that can cause financial damage to the serverless pay-as-you-go model and are experimentally validated. The first attack is Blast DDoW - Distributed Denial of Wallet, the second attack is Continual Inconspicuous DDoW, and the third one is Background Chained DDoW. We discussed financial damages and the consequences of each type of attack.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122171525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development Perspectives in Modern Education","authors":"D. Lacrama, A. Náaji, F. A. Pintea, F. Alexa","doi":"10.1109/TELFOR56187.2022.9983699","DOIUrl":"https://doi.org/10.1109/TELFOR56187.2022.9983699","url":null,"abstract":"This paper debates the changes in modern education caused by the accelerated development of computers & telecommunication. This evolution was enhanced by the Covid-19 pandemic and the modifications in students’ preferences about learning. Three main directions of development are presented and compared. A practical implementation of a learning site is given as an illustrative example.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129265141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Haris Turkmanović, Dragomir M. El Mezeni, Vladimir L. Petrović, L. Saranovac
{"title":"Profiling of GNU Radio DVB-S2X transmitter using multi-core CPU and hardware accelerators","authors":"Haris Turkmanović, Dragomir M. El Mezeni, Vladimir L. Petrović, L. Saranovac","doi":"10.1109/TELFOR56187.2022.9983695","DOIUrl":"https://doi.org/10.1109/TELFOR56187.2022.9983695","url":null,"abstract":"Software defined radio (SDR) brought flexibility and easier development to the design of telecommunication systems. However, achieving real-time performance with SDR using general purpose processors (GPP) is still a challenging topic. We have examined performance of SDR DVB-S2X transmitter implemented in GNU Radio framework using a multi-core processor with 32 cores. We have found that GNU Radio framework cannot fully utilize this processor since overheads of parallelization become bottleneck. When FEC blocks are offloaded to hardware accelerator, transmitter achieved the largest throughput for just 8 CPU cores. This means that there exists optimal number of processing cores for specific SDR architecture. Maximal achieved throughput for accelerated DVB-S2X transmitter was 3.4 Gbps. Also, accelerated architecture provides throughput of 1.8 Gbps for 4 CPU cores which is higher than 1.3 Gbps achieved for 32 CPU cores and full software implementation.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129523657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stojancho Tudjarski, Aleksandar Stankovski, Biljana Risteska Stojkoska, M. Gusev
{"title":"From Continuous ECG Signals to Extracted Features for Machine Learning Models and Arrhythmia Annotations","authors":"Stojancho Tudjarski, Aleksandar Stankovski, Biljana Risteska Stojkoska, M. Gusev","doi":"10.1109/TELFOR56187.2022.9983663","DOIUrl":"https://doi.org/10.1109/TELFOR56187.2022.9983663","url":null,"abstract":"This paper describes the process of transforming an ECG signal as a continuous stream of numbers representing measured electrical voltages between the ECG electrodes into an output indicating the existence of arrhythmia. The ECG data stream is a structured array of converted analog signal values to digital data. Although this stream uses a continuous structure of numbers within a given range that depends on the bit resolution during conversion, it is still unstructured as a representation of the appearance of arrhythmia since it does not contain information about detected arrhythmia. This paper presents how to process ECG data, detect heartbeat annotations, and calculate various parameters for tabular-based data with a fixed number of columns to be used as input into ML-based algorithms. Our use case addresses an ML algorithm to detect atrial fibrillation arrhythmia, as an irregular heart rhythm. Practically a set of numbers in the ECG samples, which do not have structured arrhythmia annotations, is transformed into structured annotations. Experiments are conducted on the well-known ECG benchmark MIT-BIH Arrhythmia Database. The input data is resampled from 360 Hz to 125 Hz signal, and a signal processing algorithm is used to detect heartbeats, extracting a fixed set of features, and systematically forwarded to the feature selection ML methodologies to obtain atrial fibrillation annotations.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125296803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Python Software Transactional Memory Supporting Publish-Subscribe Pattern","authors":"M. Popovic, B. Kordic, I. Basicevic, M. Popovic","doi":"10.1109/TELFOR56187.2022.9983693","DOIUrl":"https://doi.org/10.1109/TELFOR56187.2022.9983693","url":null,"abstract":"The original Distributed Python Software Transactional Memory (DPSTM) supports transactions on inmemory transactional variables. In this paper, we extended the DPSTM architecture with the Pub/Sub subsystem, in order to additionally support the publish-subscribe pattern. The new architecture, called DPSTM-PS, supports transactions and notifications on consequent transactional variables’ updates. The Pub/Sub subsystem comprises: publish-subscribe server, registrar server, and message broker. The DPSTM-PS was successfully validated on the wired Ethernet and on the wireless WiFi home networks.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121019080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation analysis of an unusual reflection in a microwave Line-of-Sight link within A1 Serbia transport network","authors":"Stefana Krivokuća","doi":"10.1109/TELFOR56187.2022.9983667","DOIUrl":"https://doi.org/10.1109/TELFOR56187.2022.9983667","url":null,"abstract":"Transport networks within a telecommunications operator are largely based on fiber optics as a way of transmission. However, there are still microwave line-of-sight links present in the network. Consequently, a transport network planner must ensure their undisturbed operation. To do so, he must foresee possible interferers, and include that information during the process of planning the link. One of the less substantial causes of signal degradation is reflection. This research proposes a simulation analysis of the effects of reflection from an unusual reflective surface.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131509137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amera Sinanovic, Emir Meskovic, A. Mujčić, N. Suljanovic
{"title":"Smart city use case development based on FIWARE technology","authors":"Amera Sinanovic, Emir Meskovic, A. Mujčić, N. Suljanovic","doi":"10.1109/TELFOR56187.2022.9983683","DOIUrl":"https://doi.org/10.1109/TELFOR56187.2022.9983683","url":null,"abstract":"The growing urban population drives implementation of smart city concept in various domains such as health, energy consumption, water management and air pollution systems. This paper describes smart city use case development utilizing FIWARE technology as an open-source efficient, standardized and secure smart city platform. While some basic details about FIWARE is provided, the paper is focused on the smart city architecture and use case development founded on this technology.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128424031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building a Tic-tac-toe Playing Robotic Arm","authors":"R. Szabó, Radu-Stefan Ricman","doi":"10.1109/TELFOR56187.2022.9983737","DOIUrl":"https://doi.org/10.1109/TELFOR56187.2022.9983737","url":null,"abstract":"The aim of this paper is to create a robotic arm with artificial intelligence to play tic-tac-toe against a human player. The robotic arm would actually place X or 0, when will be its turn. The human also places X or 0 when will be his turn. The robotic arm should have a tic-tac-toe algorithm implemented to try to beat the human player. The whole setup it a fusion of robotics, computer vision, artificial intelligence, electronics and mechanics. The main task is to beat the human player as much times as possible. The hardest part seems to be the artificial intelligence or the tic-tac-toe algorithm, but actually the mechanical building of such a robotic arm can be a challenging task too.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133087276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Machine Learning Traffic Flows Analysis for Network Attacks Detection","authors":"V. Timčenko, S. Gajin","doi":"10.1109/TELFOR56187.2022.9983780","DOIUrl":"https://doi.org/10.1109/TELFOR56187.2022.9983780","url":null,"abstract":"This research focuses on network behavior analysis and provides a comprehensive flow-based anomaly detection proposal, which is based on combined machine learning and entropy-based anomaly detection techniques. The entropy-based analysis can capture the behavior of the biggest contributors, and of a large number of minor appearances in the feature distribution, thus it is applied for the needs of easier detection of rare traffic patterns. Then, the range of the machine learning algorithms can be applied in order to process the detected unusual traffic. The approach relies on the understanding of legitimate traffic behavior characteristics, which is further used to efficiently detect anomalous traffic patterns and deviations that cause performance issues or indicate a breach. This way, it is possible to provide near real-time alerting and visibility of potential network security threats. This approach allows the detection of unknown threats, zero-day attacks, and suspicious behavior while providing performance optimization possibilities.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simona Stamenkova, Pance Cavkovski, K. Trivodaliev, Biljana Risteska Stojkoska
{"title":"Smart city solution for early flood detection","authors":"Simona Stamenkova, Pance Cavkovski, K. Trivodaliev, Biljana Risteska Stojkoska","doi":"10.1109/TELFOR56187.2022.9983748","DOIUrl":"https://doi.org/10.1109/TELFOR56187.2022.9983748","url":null,"abstract":"Most of the world population is expected to live in urban areas in the future, therefore, there is an evident need for general smart city solutions, especially for big cities. The aim of this paper is: (i) to present an architecture for general smart city solution that collects different environmental parameters from different sites in a big city; (ii) to present implementation details of a separate module for flood detection that works on the top of the general solution; and (iii) to present a smart city application that monitors flood related parameters and informs residents if there is a flooded underpass, or increased water levels on a particular river or lake. The system collects environmental measurements using The Things Network, through LoRaWAN base stations.","PeriodicalId":277553,"journal":{"name":"2022 30th Telecommunications Forum (TELFOR)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121180389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}