{"title":"DDoS Attacks Detection in Multi-Controller Based Software Defined Network","authors":"Parisa Valizadeh, Ahmad Taghinezhad-Niar","doi":"10.1109/ICWR54782.2022.9786246","DOIUrl":"https://doi.org/10.1109/ICWR54782.2022.9786246","url":null,"abstract":"With the rapid growth of computer devices, network communication faced different challenges from network management to traffic engineering. Software-Defined Networking (SDN) is a well-known solution for optimizing these communications. SDN is a new networking architecture to simplify network management that separates the control plane from the data plane. The central controller is the major advantage of SDN; however, it has security vulnerabilities such as being unreachable in Distributed Denial-of-Service attacks (DDoS). Consequently, it is very important to protect SDN from DDoS attacks. In this paper, we proposed an algorithm for DDoS attack detection and reducing its impact in SDN architecture with multiple distributed controllers. We presented two methods 1) the entropy of destination IP addresses and 2) Packet window initiation rate for early detection of DDoS. We used Mininet and floodlight to simulate our algorithm in different scenarios. The result shows that our algorithm outperforms other works in various network configurations and multi-victim attacks.","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129304974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Random Walk Sampling, Inspired by Two Methods of Choosing Seed Node And No-Retracing With Combination of them with Page Rank Algorithm","authors":"Ali Kheradbeygi Moghadam, A. Bastanfard","doi":"10.1109/ICWR54782.2022.9786241","DOIUrl":"https://doi.org/10.1109/ICWR54782.2022.9786241","url":null,"abstract":"One of the algorithms used for sampling complex networks is the classical random walk algorithm, which has been considered due to its good performance. But speed and energy consumption can also be improved by reducing size of input data. In this study, two random walk algorithms inspired by two methods, choosing seed node, and no-retracing algorithm which obtained by changing the classical random walk algorithm, and combining these three algorithms with google page rank algorithm, are discussed. This is done to preserve important nodes and reduce the size of the input data. This sampling was done from the United States flight network database. Also, important characteristics obtained in sampling, such as sampling efficiency, degree distribution, average degree, and average clustering coefficient have been investigated. The algorithms studied in this research each have their own advantages and disadvantages. For example, the no-retracing shows better performance in terms of time and average clustering coefficient. This efficiency is even greater when we use a combination of no-retracing algorithm with google page ranking algorithm. These algorithms can be used when speed is important in decision making, such as deciding on airlines and public transportation, etc. These algorithms are also more energy efficient than the studied algorithms.","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129551424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distance Learning: Education Giving Chances and Crises through Modern E-Globalization","authors":"Yasser Kareem Al-Rikabi, G. Montazer","doi":"10.1109/ICWR54782.2022.9786235","DOIUrl":"https://doi.org/10.1109/ICWR54782.2022.9786235","url":null,"abstract":"Education mainly contributes to the spread of knowledge and plays an effective role in eliminating ignorance and illiteracy in the world. Through education, some countries have been able to achieve wealth and civilization, which made them one of the developed countries. Education is a need and a necessity for all human beings, to achieve the dreams and ambition of studying and acquiring knowledge in various educational institutions that are not available in a particular country, based on this principle, so-called distance learning appeared, but today, for the continuation of the educational process under the critical conditions and various crises especially corona crisis, distance learning has formed the rescue gate for the continuation of the education process in the whole world. This study aims to analysis and illustrated that distance learning from a global and local perspective as ideal solve for continue the educational process through the various crisis and the donor for giving and providing chances for all the learners.","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127070096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ExaPPC: a Large-Scale Persian Paraphrase Detection Corpus","authors":"Reyhaneh Sadeghi, Hamed Karbasi, Ahmad Akbari","doi":"10.1109/ICWR54782.2022.9786243","DOIUrl":"https://doi.org/10.1109/ICWR54782.2022.9786243","url":null,"abstract":"This paper describes the creation of Exa Persian Paraphrase Corpus (ExaPPC), a large paraphrase corpus consisting of monolingual sentence-level paraphrases using different sources. ExaPPC is the first large-scale paraphrase dataset used in Persian paraphrase detection to the best of our knowledge. There are 2.3M labeled sentence pairs in the corpus consisting of a 1M paraphrase label and 1.3M non-paraphrase label. Efforts were made manually and semi-automatically to construct this corpus using techniques such as subtitle alignment, translating existing parallel English-Persian corpus and similarity corpus on English tweets. In addition to enriching the corpus, candidate sentence pairs among tweets have been extracted via NLP tools and labeled by two Persian native speakers. The advantages of this corpus compared to the existing ones are the number of pair sentences, sentence Length variation and textual diversity, including formal and dialogue sentences. The result on the provided test corpus shows that ExaPPC achieves 94% accuracy on paraphrase detection task. The corpus is publicly available11https://github.com/exaco/exappc","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128113875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abolfazl Younesi, Hamed Shahbazi Fard, Alireza Belal Yengikand, Vahid Pezeshki
{"title":"Survey on IoT-based waste Management Systems","authors":"Abolfazl Younesi, Hamed Shahbazi Fard, Alireza Belal Yengikand, Vahid Pezeshki","doi":"10.1109/ICWR54782.2022.9786239","DOIUrl":"https://doi.org/10.1109/ICWR54782.2022.9786239","url":null,"abstract":"The increasing population has led to a disruption of health status due to the waste management system. Waste management in the form of smart cities has created a kind of concern and is an activity that can provide environmental, health, and social benefits. Waste management is a technique to prevent the accumulation of waste. If it is not managed properly, it will lead to a series of unhealthy and unsanitary conditions in the city. Therefore, to prevent and reduce waste it is needed an intelligent waste management system and one of the newest platforms in this basin is the Internet of Things (IoT) platform. The IoT has revolutionized the waste management system. Different governments are trying to meet this great challenge by creating different IoTbased waste management systems and for this purpose different technologies and sensors such as Bluetooth ultrasonic sensors, RFID tags, etc. are used in their architectures to receive real-time information. Due to the benefit of the use of the IoT in waste management, this article analyzes some of the most recent methods for managing and reducing waste based on the Internet of Things, as well as evaluating various barriers, challenges, and solutions. Also, the characteristics of each method and the advantages and disadvantages are stated.","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123343914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encrypted Network Traffic Classification Using Deep Learning Method","authors":"Seyedeh Bahareh Banihashemi, Ehsan Aktharkavan","doi":"10.1109/ICWR54782.2022.9786247","DOIUrl":"https://doi.org/10.1109/ICWR54782.2022.9786247","url":null,"abstract":"With growing use of internet and online applications, network traffic classification could be much more useful nowadays, because managing network services and quality assurance, two key points in network structure, could be done easily using this kind of classification. Different methods are used for this task, including port-based classification, machine learning and some other algorithms that each of them had its own advantages and disadvantages. For eliminating such disadvantages, deep learning methods are new ways for doing this task due to the power and excellent performance they showed. Furthermore, most of the work done in this field are using non-encrypted traffic or encrypted traffic in mobile networks, but as we know, privacy of data is very important these days. In this article, with the use of deep learning neural network, encrypted traffic of non-mobile data is being classified. For this purpose, we use the UNB ISCX VPN-non-VPN dataset that includes encrypted and unencrypted traffic of different applications. Then we design an algorithm based on DNN that could classify these traffics effectively. Performance of the model was evaluated and 0.86 accuracy and 0.78 fl-score showed that model works well compared to other algorithms used in this area.","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130375517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Identifying Personality Traits in Telegram","authors":"M. Shayegan, Mohaddese Valizadeh","doi":"10.1109/ICWR54782.2022.9786253","DOIUrl":"https://doi.org/10.1109/ICWR54782.2022.9786253","url":null,"abstract":"Accessing people’s personality traits has always been a challenging task. On the other hand, acquiring personality traits based on behavioral data is one of the growing interests of human beings. Numerous researches showed that people spend a lot of time on social networks and show behaviors that create some personality patterns in cyberspace. One of these social networks that have been widely welcomed in some countries, including Iran, is Telegram. The basis of this research is automatically identifying users’ personalities based on their behavior on Telegram. For this purpose, messages from Telegram group users are collected, and then the personality traits of each member according to the famous NEO Personality Inventory (NEO PI-R) are identified. For personality analysis, the study employed three methods, including; Cosine Similarity, Bayes, and MLP algorithms.","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116470268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Multiple Emotions in Texts Using Long Short-Term Memory Recurrent Neural Networks","authors":"Sepideh Saeedi Majd, Habib Izadkhah, S. Lotfi","doi":"10.1109/ICWR54782.2022.9786225","DOIUrl":"https://doi.org/10.1109/ICWR54782.2022.9786225","url":null,"abstract":"Recognizing emotions from text applies to every part of our lives, like enhancing human-computer interaction, mental health monitoring, recognizing public sentiment about any national, international, or political event. Given the importance of emotion analysis, especially the classification of multi-labeled emotions, this paper proposes a deep learningbased system to address the issue of classifying multi-labeled emotions in texts. Toward this aim, by combining several datasets, a dataset first created which all samples are multilabeled, and then, using the long short-term memory recurrent neural network (LSTM), a new network is designed to detect multiple emotions from the texts. The GloVe and FastText have been used to find semantic, syntactic, and related words. Moreover, the attention property is utilized to improve the accuracy of the network. The comparative results indicated that the proposed model performs better compared to the existing methods in terms of accuracy.","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116739137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indirect Website Evaluation: Currently Available Tools","authors":"Hamidreza Saeidnia, Marcin Kozak, Sara Saeidnia","doi":"10.1109/ICWR54782.2022.9786252","DOIUrl":"https://doi.org/10.1109/ICWR54782.2022.9786252","url":null,"abstract":"For most institutions, the World Wide Web has been the main source of information in recent years. Evaluation of a website reveals the overall and actual performance of that website. Identifying a website’s strengths and weaknesses is significantly important to any institution. Therefore, in this study, we seek the answer to the question “When evaluating a website, what kind of questionnaires can be used?” The purpose of this article is to give an overview of different questionnaires for the evaluation of web pages. In addition, it explains how these questionnaires can be used. To do this, we used a simple review of the internet to find questionnaires that evaluate the quality of websites.","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129310443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provide an Improved Model for Detecting Persian SMS Spam by Integrating Deep Learning and Machine Learning Models","authors":"Roya Khorashadizadeh, S. J. Jassbi, Alireza Yari","doi":"10.1109/ICWR54782.2022.9786238","DOIUrl":"https://doi.org/10.1109/ICWR54782.2022.9786238","url":null,"abstract":"Spam is an example of unwanted content sent by unknown users and causing problems for mobile phone users. Disadvantages of spam include the inconvenience to the user, the loss of network traffic, the imposition of a calculation fee, the occupation of the physical space of the mobile phone, the misuse and fraud of the recipient. For this reason, the automatic detection of annoying text messages can be fundamental. Also, recognizing intelligently generated text messages is a challenge. Nevertheless, the current methods in this field face obstacles, such as the lack of appropriate Persian datasets. Experiences have shown that approaches based on deep and combined learning have better results in uncovering the annoying text messages. Accordingly, this study has attempted to provide an efficient method for detecting SMS spam by integrating machine learning classification algorithms and deep learning models. In the proposed method, after performing preprocessing on our collected dataset, two convolutional neural network layers and one LSTM layer and a fully connected layer are applied to extract the features are applied on the data which forms the deep learning part of the proposed method. The Support vector machine then utilizes the extracted information and features to perform the final classification, which is a part of the Machine Learning methods. The results show that the proposed model implements better than other algorithms and 97. 7% accuracy was achieved.","PeriodicalId":355187,"journal":{"name":"2022 8th International Conference on Web Research (ICWR)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}