{"title":"10 GBPS flow aggregation using commodity hardware","authors":"Lovre Gusar, Ivan Sicic, Karlo Slovenec, M. Mikuc","doi":"10.1109/ConTEL58387.2023.10198970","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10198970","url":null,"abstract":"This paper proposes a flow aggregation application used on general-purpose hardware with a focus on low resource usage. The software is written using DPDK which enables high-speed packet processing on commodity hardware. The solution can handle 10 Gbps line rate traffic with 5 CPU cores while aggregating over 20 different flow metrics. It can handle over 5,000,000 concurrent flows with an upper limit of 12,582,912 concurrent flows stored in its data structures. In this paper, we show the system design choices and technologies used to process such traffic.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125147405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Web Server Logs to Identify and Comprehend Anomalous User Activity","authors":"Lenka Benova, L. Hudec","doi":"10.1109/ConTEL58387.2023.10199092","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199092","url":null,"abstract":"This research paper presents a study for identifying user anomalies in large datasets of web server requests. Using a cybersecurity company's network of web servers as a case study, we propose a technique for analyzing user activity in NGINX logs. The proposed method does not require a labeled dataset and is capable of efficiently identifying different user anomalies in large datasets with millions of daily requests. The results of the analysis provided a deeper understanding of user behavior when seeking updates through web requests and aided in interpreting the findings. Clustering the anomalies helped to produce typical clusters and further supported the interpretation of the results. This work provides valuable insights into user behavior in web server networks and highlights the importance of efficient anomaly detection techniques in large datasets. The findings have potential real-world applications in the field of cybersecurity, particularly in providing network security analysts with an automated and more objective approach to threat analysis. This study showcases the importance of automated methods for analyzing user activity in web server networks and provides a more objective and efficient approach to detecting user anomalies in large datasets. This approach contributes to the development of more effective and precise cybersecurity systems, ultimately improving the protection of network infrastructures from malicious attacks.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123296271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Non-Interfering Radio Communication System for the SKA Astronomy Project: 1570902849 Contel 2023","authors":"R. Wolhuter, Jason Fynn","doi":"10.1109/ConTEL58387.2023.10199029","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199029","url":null,"abstract":"This paper describes the design of a wide area digital mobile radio network intended for use in the Square Kilometer Array radio quiet zone. The stringent limitations on radio frequency emissions are a major design constraint on the system. Three bands of operation are investigated and compared based on their feasibility and potential for radio frequency interference to the astronomical receivers hosted on the site. Various measurement and analysis procedures which characterize the risks presented by the recommended system are described, as well as a field test of a procured test system setup. Finally, an overall systems design is presented. The recommended system has been deemed acceptable to be implemented in the required area.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"163 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129270833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Squeezing the Most Out of Congestion Window for Self-Clocked Rate Adaptation Algorithm in a 5G Environment","authors":"Haider Dhia Zubaydi, A. Jagmagji, S. Molnár","doi":"10.1109/ConTEL58387.2023.10199010","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199010","url":null,"abstract":"The congestion problem arises in current networking paradigms. Researchers seek different approaches to address this issue by proposing algorithms to control or avoid congestion. One of the primary approaches to handling efficient congestion is specifying the amount of data to be transmitted during a period, referred to as the congestion window (cwnd). This paper aims to optimize the congestion window modification by assessing and utilizing the Self-Clocked Rate Adaptation for Multimedia (SCReAM) algorithm's parameters. Our results indicate that we increased the average congestion window by 164.6% in the classic mode and 67.64% in the L4S/ECN mode.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123997695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raghda Samir, Salsabil Adel, Irene Samy, T. Ismail
{"title":"Secure Data Aggregation in Cultural Heritage Monitoring: NMEC Case Study","authors":"Raghda Samir, Salsabil Adel, Irene Samy, T. Ismail","doi":"10.1109/ConTEL58387.2023.10198917","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10198917","url":null,"abstract":"Intelligent management plays a vital role in the preservation and success of cultural heritage, particularly in the context of museums. To ensure the long-term safeguarding of valuable and significant artifacts housed in museums, regular inspections are necessary. In this specific research study, the National Museum of Egyptian Civilization (NMEC) serves as a case study. To effectively monitor the museum's environment and protect its cultural assets, a wireless sensor network (WSN) is proposed. This network comprises various sensors that monitor crucial environmental factors such as temperature, humidity, and light levels. These sensors collect data, which is then aggregated using a cluster-tree-based architecture. During the aggregation process, the trust score of each node is taken into consideration when selecting cluster heads. This trust score serves as a measure of reliability and ensures that the most trustworthy nodes are responsible for data aggregation and transmission. Ultimately, the collected data is transmitted from the cluster heads (CHs) to the sink base station (BS) located outside the cultural site. To determine the optimal route for data transmission, a routing strategy is employed, considering both the path trust score and energy consumption. The path with the highest trust score and the lowest energy consumption is selected for data transmission, ensuring efficient and reliable communication within the network. The research findings indicate that the system's throughput remains stable throughout 50 sensing iterations. However, after 500 iterations, the throughput experiences a gradual decay to approximately 75% of its initial value. Additionally, the energy consumption of the network remains low, with a measurement of less than 0.2J after 500 iterations.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114674890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ivan Sicic, Nikola Petrović, Karlo Slovenec, M. Mikuc
{"title":"Evaluation of Inter-Dataset Generalisability of Autoencoders for Network Intrusion Detection","authors":"Ivan Sicic, Nikola Petrović, Karlo Slovenec, M. Mikuc","doi":"10.1109/ConTEL58387.2023.10199097","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199097","url":null,"abstract":"With the improving sophistication of computer network intrusions and the rising rate of number of novel attacks, the research focus in network intrusion detection has shifted to unsupervised and semi-supervised methods that have better zero-day detection ability and their ability to generalize across different network environments. Recently published datasets that have the same flow features but different network environments and attacks have eased the research on generalisability and improved method comparison abilities. This paper aims to continue the strive towards generalisability by examining the performance of, primarily autoencoder, and PCA, in an inter-dataset network intrusion detection tasks as these methods have not yet been evaluated across different network environments. The results indicate that while the performance of the traditionally used methods does not fully transfer on different network environments, they do perform better than a random classifier.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124622444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Uzunidis, G. Pagiatakis, I. Moscholios, M. Logothetis
{"title":"A Unified Course Module on 5G and Fixed 5G Networks","authors":"D. Uzunidis, G. Pagiatakis, I. Moscholios, M. Logothetis","doi":"10.1109/ConTEL58387.2023.10198907","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10198907","url":null,"abstract":"This paper analyzes a course module on the five Generations of wireless and fixed networks which was presented as a part of the undergraduate course “Broadband Communications”. This course was offered at the Dept. of Electrical & Electronic Engineering, School of Pedagogical & Technological Education (ASPETE), Athens, Greece. The main objective of this module is three-fold. First, to introduce the students to the fixed generations taxonomy, the definition of which is assigned to the currently formed ETSI Industry Specification Group (ISG) F5G. Secondly, to unify the students” knowledge accumulated during their previous telecom-related courses as it was totally decoupled in two parts, either wireless or optical. Finally, to discuss the state-of-the-art technology, paving the way for the students to enter as professionals the fifth-generation era. The course module covered six teaching hours at the final 1.5 week of “Broadband Communications” course. To evaluate the impact of this module, the students were asked to fill a questionnaire upon module completion.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121454571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Modeling of the Influence of Connection Handoff on Blocking Probabilities in 5G Mobile Networks","authors":"M. Głąbowski, M. Sobieraj","doi":"10.1109/ConTEL58387.2023.10198886","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10198886","url":null,"abstract":"The paper proposes an analytical approach to occupancy distribution and blocking probability calculation in 5G mobile networks with connection handoff mechanisms, carrying a mixture of multiple traffic streams generated by multi-service sources. The results of analytical calculations of the blocking probability in a group of 5G cells are compared with the simulation data.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127429454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Secure Variants of the MQTT Protocol on Resource-Constraint Devices for Precision Agriculture","authors":"Mislav Has, M. Kusek, Ivana Podnar Žarko","doi":"10.1109/ConTEL58387.2023.10199102","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199102","url":null,"abstract":"When it comes to securing IoT communication, it is critical to employ secure communication technologies that can ensure that sensitive information exchanged between IoT devices and fog/edge/cloud services remains confidential. Since typical IoT devices are resource-constraint, it is challenging to use and deploy secure IoT protocols on such devices: It is thus critical to study the overhead of such protocols for resource-constrained devices, as it significantly affects the performance of an overall IoT solution. In this paper, we analyze the secure variants of the widely used messaging protocol MQ Telemetry Transport (MQTT), namely MQTT with TLS and MQTT with AES. We report the results of our performance evaluation in the context of an IoT solution for Precision Agriculture using an STM32 microcontroller with an NB-IoT module to compare these variants with plain MQTT and determine the most appropriate options based on the amount of data transmitted and achieved security level.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122904139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vaigai Nayaki Yokar, H. Le‐Minh, Zabih Ghassemlooy, Othman Isam Younus, L. N. Alves, W. Woo, Turky Almutairi
{"title":"Smartphone Beam Profile in a Screen-to-Camera-Based Optical Communication System","authors":"Vaigai Nayaki Yokar, H. Le‐Minh, Zabih Ghassemlooy, Othman Isam Younus, L. N. Alves, W. Woo, Turky Almutairi","doi":"10.1109/ConTEL58387.2023.10199032","DOIUrl":"https://doi.org/10.1109/ConTEL58387.2023.10199032","url":null,"abstract":"This paper presents an experimental investigation of a screen-to-camera-based communication (S2C) system. The study examines the performance of the smartphone transmitter (Tx) screen in terms of power received, beam profile, and Lambertian order as well as evaluates the impact of different transmission conditions such as distance, tilt, and rotation angles. The results demonstrate that for the line of sight (LOS) link, the Tx has an average Lambertian order of 3.5 and a transmission accuracy of over 100%. Overall, the study demonstrates the potential of optical camera communication technology for the development of efficient and reliable S2C systems.","PeriodicalId":311611,"journal":{"name":"2023 17th International Conference on Telecommunications (ConTEL)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127851768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}