Proceedings of the 4th International Conference on Future Networks and Distributed Systems最新文献

筛选
英文 中文
Improve the Firewall Accuracy By using Dynamic Ontology 利用动态本体提高防火墙的准确性
Qossay Ismail, Osama Saleh, Mohammed Hashayka, Ahmed Awad, Amjad Hawash, O. Othman
{"title":"Improve the Firewall Accuracy By using Dynamic Ontology","authors":"Qossay Ismail, Osama Saleh, Mohammed Hashayka, Ahmed Awad, Amjad Hawash, O. Othman","doi":"10.1145/3440749.3442607","DOIUrl":"https://doi.org/10.1145/3440749.3442607","url":null,"abstract":"Data is considered an important asset for organizations, companies, and even people. Crucial decisions depend mainly on data. Exchanging data is essential in order to negotiate ideas, thoughts, and decisions. Networks are the communication channels of data exchange although data is exposed to different attacks, threats, and loss. Because of this, data security has become a key concern for different parties through their daily data manipulation. There are different ways to ensure data security. Paying attention to network threats, data encryption, and using strong passwords are all examples. However, a firewall represents the first defense line against malicious traffic throughout the network. Firewalls have a set of rules to be applied in the time of data exchange between inside and outside of data networks. Some of the firewalls apply such rules in a sequential manner, which degrades the performance of the firewall. In this work, we are utilizing a dynamic ontology of different firewall rules managed by SPARQL queries, so that the rules are applied faster, and thus, increasing the firewall performance. Experimental results show that our proposed methodology totally eliminates the anomalies in the firewall rules as a result of conducting longest matching with proper rules from the dynamically constructed ontology.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124226365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using mathematical forecasting methods to estimate the load on the computing power of the IoT network 采用数学预测方法对物联网网络的计算能力负荷进行估计
A. Krasov, I. Pestov, A. Gelfand, A. Kazantsev, Anna Polyanicheva
{"title":"Using mathematical forecasting methods to estimate the load on the computing power of the IoT network","authors":"A. Krasov, I. Pestov, A. Gelfand, A. Kazantsev, Anna Polyanicheva","doi":"10.1145/3440749.3442605","DOIUrl":"https://doi.org/10.1145/3440749.3442605","url":null,"abstract":"The size of the network, the number of nodes and connected devices are exponentially increasing due to the development of the Internet of Things (IoT). It becomes difficult to administer the monitoring of heterogeneous networks. It is necessary to use predictive models (Model Predictive Control) to deploy decision support systems related to the IoT network security. The article examines three popular mathematical forecasting methods, evaluates their accuracy and their using possibility in predictive models to solve the problem of assessing the load on the computing power of IoT devices, including servers and services.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time DDoS flood Attack Monitoring and Detection (RT-AMD) Model for Cloud Computing 云计算实时DDoS flood攻击监控与检测(RT-AMD)模型
Alaa Alsaeedi, O. Bamasag, A. Munshi
{"title":"Real-Time DDoS flood Attack Monitoring and Detection (RT-AMD) Model for Cloud Computing","authors":"Alaa Alsaeedi, O. Bamasag, A. Munshi","doi":"10.1145/3440749.3442606","DOIUrl":"https://doi.org/10.1145/3440749.3442606","url":null,"abstract":"In recent years, the advent of cloud computing has transformed the field of computing and information technology. It enabled customers to rent virtual instances and take advantage of various services on-demand with the lowest costs. Despite the advantages offered by cloud computing, it faces several threats; an example is DDoS attack which is considered one of the most serious ones. This paper proposes a real-time monitoring and detection of DDoS attacks on the cloud using machine learning approach. Naïve Bayes, K-Nearest Neighbor, and Random Forest machine learning classifiers have been selected to build predictive models. This model will be evaluated on the cloud for its accuracy and efficiency.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121744331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On The Radon–Nikodym Machine Learning Parallelization Radon-Nikodym机器学习并行化研究
A. Bobyl, Vadim V. Davydov, V. Malyshkin
{"title":"On The Radon–Nikodym Machine Learning Parallelization","authors":"A. Bobyl, Vadim V. Davydov, V. Malyshkin","doi":"10.1145/3440749.3442604","DOIUrl":"https://doi.org/10.1145/3440749.3442604","url":null,"abstract":"A novel Radon–Nikodym approach to machine learning (ML) is developed, implemented numerically, tested on various datasets, and it’s parallelization is discussed. It consists in building a “wavefunction” ψ(x), a linear function on input attributes x then constructing a classificator of the form ⟨ψ2f⟩/⟨ψ2⟩. The solution is obtained from a generalized eigenproblem |f|ψ[i]⟩ = λ[i]|ψ[i]⟩ with left– and right– hand side matrices calculated from the input dataset. A solution to classification problem (predict f on an unseen x) is found without using a norm testing how predicted f differs from the one observed. Possible outcomes and their probabilities are obtained separately using the Lebesgue quadrature technique, this makes the method robust to input data with outliers, spikes, etc. A remarkable feature is the knowledge of the invariant group (what input attributes transforms do not change the solution). Radon–Nikodym approach is typically slower than the other methods used, this is the cost of being a “norm–free”. A parallel implementation is expected to improve this deficiency.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132868082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge Computing Resource Allocation Orchestration System for Autonomous Vehicles 自动驾驶汽车边缘计算资源分配编排系统
A. Khakimov, Aleksandr Loborchuk, Ibodulaev Ibodullokhodzha, Dmitry Poluektov, I. Elgendy, A. Muthanna
{"title":"Edge Computing Resource Allocation Orchestration System for Autonomous Vehicles","authors":"A. Khakimov, Aleksandr Loborchuk, Ibodulaev Ibodullokhodzha, Dmitry Poluektov, I. Elgendy, A. Muthanna","doi":"10.1145/3440749.3442594","DOIUrl":"https://doi.org/10.1145/3440749.3442594","url":null,"abstract":"Edge computing is the key to building 5G Networks and Future 2030 Networks. Edge computing extends the cloud computing paradigm by placing resources close to the network edges to cope with the upcoming growth of connected devices. Future applications: health monitoring and predictive services within the framework of the Smart City, Internet of things (IoT), vehicular ad hoc network, autonomous vehicles present a new set of strict requirements, such as low latency. In this paper, we develop a set of methods for managing and orchestrating new intelligent services in a new network and computing infrastructure. In addition, we consider a new prototype using an orchestration system for managing the autonomous vehicles’ resources in comparison with the existing approaches to the design of high-load networks. This orchestration platform is based on independent Docker containers that running the orchestration system. The main goal of our proposed system is to build an efficient network architecture with a minimum delay to process the information based on neural networks. Finally, simulation results proved that the proposed system can significantly not only reduce the overall network load but also increase the quality of the transmitted stream across the network in comparison with traditional network architectures.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of multifunctional system for controlling user access to the Internet 控制用户访问Internet的多功能系统的开发
Arseniy D. Prosvirin, Vadim V. Davydov, A. Moroz
{"title":"Development of multifunctional system for controlling user access to the Internet","authors":"Arseniy D. Prosvirin, Vadim V. Davydov, A. Moroz","doi":"10.1145/3440749.3442618","DOIUrl":"https://doi.org/10.1145/3440749.3442618","url":null,"abstract":"Today nearly everyone needs strong and reliable access to the Internet. Usually, such access is provided by Internet-providers. They lay lines of communication and hire specialists. This costs money so customers should pay for the access. Accordingly, the provider wants to distinguish between clients who paid for access and those who do not. That is why providers require methods to control access with usage of authentication. Sometimes, one provider gets hardware of another provider under own control. However, there are a lot of different authentication protocols developed. The target of that work is to connect such authentication methods on hardware with providers services, such as user access control panel (billing). The result of the work is development of running software which can control users’ authentication depending on rules applied in billing panel.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"553 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generation and Search for the Shortest Path in Two-dimensional Labyrinths as A Model for Optimizing Routing Processes in the Packet Switching Network 二维迷宫中最短路径的生成与搜索——分组交换网络中路由过程优化模型
A. Dagaev, Y. Borodyansky, A. Pomogalova
{"title":"Generation and Search for the Shortest Path in Two-dimensional Labyrinths as A Model for Optimizing Routing Processes in the Packet Switching Network","authors":"A. Dagaev, Y. Borodyansky, A. Pomogalova","doi":"10.1145/3440749.3442636","DOIUrl":"https://doi.org/10.1145/3440749.3442636","url":null,"abstract":"The algorithms for generating and finding the shortest path in two-dimensional labyrinths and their characteristics are considered. The aim of the study is to determine the dependence of the working time of the shortest path search algorithms on the characteristics of mazes. This may allow these algorithms to be used to optimise routing processes in packet switching networks. All of the characteristics of the algorithms under consideration are described in detail. These search algorithms also allow for paralleling, so they can be used when creating games or any special applications. Such generation algorithms have been selected, the resulting mazes of which have different characteristics, thus making it possible to determine the required dependence. The peculiarity of applying the result of this research is that the fastest search algorithm can be selected for the generation algorithm or for specific characteristics of an already generated maze. The search algorithms can be improved to find paths in mazes in N-dimensional spaces. This search extension possibility can be widely used not only for working with mazes, but also with any other structure of a given coordinate system.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124333087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FlexNGIA - Towards the Cloudification of the Internet FlexNGIA -迈向互联网的云化
M. Zhani
{"title":"FlexNGIA - Towards the Cloudification of the Internet","authors":"M. Zhani","doi":"10.1145/3440749.3442649","DOIUrl":"https://doi.org/10.1145/3440749.3442649","url":null,"abstract":"Virtual reality and teleportation, to telepresence, augmented reality, and remotely‑controlled robotics are future applications that are bound to achieve unprecedented development for society, economics and culture and to revolutionize the way we live, learn, work and play. Unfortunately, today’s Internet is simply not able to provide the stringent performance requirements needed by such applications to run smoothly and to offer a perfect quality of experience. This is due to several fundamental limitations in the design of the current network architecture and communication protocols. As a result, it is now the time to put into question the tenets of today’s Internet and think novel architecture and protocols that take into account recent technological advances in cloud computing, virtualization and network softwarization to design the future Tactile Internet. In this talk, we start by analyzing the characteristics and requirements of future networking applications and highlight the limitations of the today’s Internet architecture and protocols. We then provide an overview of FlexNGIA, a Flexible Next-Generation Internet Architecture that leverages cloud computing infrastructures, services and technologies as the keystone of the future Internet providing high performance and fully flexibility for future Internet applications and services. We also discuss through some use-cases how FlexNGIA could ensure the performance guarantees required by some of the future network applications.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical modelling of the operation of a multistage flood control system using parallel computations 用并行计算建立多级防洪系统运行的数学模型
N. Podgornov, R. Davydov, D. Zotov, V. Antonov, V. Maslikov, E. Maslikova
{"title":"Mathematical modelling of the operation of a multistage flood control system using parallel computations","authors":"N. Podgornov, R. Davydov, D. Zotov, V. Antonov, V. Maslikov, E. Maslikova","doi":"10.1145/3440749.3442616","DOIUrl":"https://doi.org/10.1145/3440749.3442616","url":null,"abstract":"Due to the increase in the number of floods, the urgent task is to reduce the risk of flooding the important areas. The existing hydraulic structures for flood accumulation may no longer be enough; therefore, it is necessary to place new objects in the river basin. The paper proposes an improved previous mathematical model for the analysis and selection of the location and basic parameters of self-regulating hydroelectric systems in a river basin using computer modelling with the possibility of parallel computations. It is possible to quickly evaluate the results of adding new structures and their contribution to reducing the risk of floods.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123529596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain, Internet of Things and Digital Twins in Trustless Security of Critical National Infrastructure 区块链、物联网和数字孪生在关键国家基础设施无信任安全中的应用
Mohammad Hammoudeh
{"title":"Blockchain, Internet of Things and Digital Twins in Trustless Security of Critical National Infrastructure","authors":"Mohammad Hammoudeh","doi":"10.1145/3440749.3442650","DOIUrl":"https://doi.org/10.1145/3440749.3442650","url":null,"abstract":"The advent of communication technologies and smart storage gave rise to the concept of smart cities. One of the key enabling technologies of smart living is the Internet of Things (IoT). In recent years, IoT has developed into many areas of application including critical national infrastructure (CNI) such as transport, hospitals and power distribution grid. The proliferation in IoT applications raised many serious security and privacy concerns to citizens, businesses and governments. CNI systems depend heavily on IoT devices and Cyber Physical Systems (CPS) to perform autonomous actions or inform human decision makers through the exchange and processing of data. Recently, blockchain has been advocated as a solution for secure data storage and sharing. Blockchain cryptographically offers a secure platform for maintaining a decentralised, ”append-only”, publicly verifiable and immutable data structure, which is timestamped and sequentially ordered by its reference to previous block hashes. The immutability and security of blockchain can improve the CNI protection. Two specific smart CNI enabling technologies that would highly benefit from blockchain are IoT and CPS. Digital twins are virtual replica of the network and logic layer of physical system. A digital twin provides a platform to solve major IoT related CNI cybersecurity challenges in tomorrow’s secure infrastructure, energy distribution, smart cities, smart manufacturing (Industrial IoT and Industry4.0) and autonomous transit systems. This key note discussion outlines how to implement blockchain as a fundamental theory for trustless security for connected CNI. It will investigate technologies which can be utilised to achieve a trustless matrix such as blockchain and peer-distributed security systems, for instance onion-routing, with the wider aim of defining trustless security further. The research also considers the feasibility of trustless IoT security systems and their application in CNI. It investigate the present state-of-the-art in cybersecurity as it relates to trustless security technologies and blockchain and what is the present state of the art of cybersecurity in IoT-enabled CNI systems.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117030068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信