2021 Eighth International Conference on Software Defined Systems (SDS)最新文献

筛选
英文 中文
The Eighth International Conference on Software Defined Systems (SDS-2021) [Front matter] 第八届软件定义系统国际会议(SDS-2021)[简报]
2021 Eighth International Conference on Software Defined Systems (SDS) Pub Date : 2021-12-06 DOI: 10.1109/sds54264.2021.9732088
{"title":"The Eighth International Conference on Software Defined Systems (SDS-2021) [Front matter]","authors":"","doi":"10.1109/sds54264.2021.9732088","DOIUrl":"https://doi.org/10.1109/sds54264.2021.9732088","url":null,"abstract":"","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115690093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel File-Checksum Method for Data Duplication Removal of Patients 一种消除病人数据重复的文件校验和方法
2021 Eighth International Conference on Software Defined Systems (SDS) Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732163
Abdul Razaque, Muder Almiani, Bandar Alotaibi, M. Alotaibi, Mohammed Alweshah
{"title":"Novel File-Checksum Method for Data Duplication Removal of Patients","authors":"Abdul Razaque, Muder Almiani, Bandar Alotaibi, M. Alotaibi, Mohammed Alweshah","doi":"10.1109/SDS54264.2021.9732163","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732163","url":null,"abstract":"Nowadays, with rapid technology development, individuals have become capable of storing a large amount of information in virtual storage. Even medical organizations use virtual repositories to store important patient data, including personal data, medical histories, and records for medical services. With the database, medical organizations process the available data and take measures to improve the quality of services. When processing statistical and customer review information, there may be inaccuracies due to duplication of patient data. Duplication of data usually occurs through the mistakes of staff members. In this paper, we introduce a novel checksum method for data duplication (CMDD). The checksum method is implemented using Java Platform. Based on the testing results, we are capable of handling data duplication.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116981131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Joint Controller Placement for Latency and Reliability-Aware Control Plane 时延和可靠性感知控制平面的联合控制器布局评估
2021 Eighth International Conference on Software Defined Systems (SDS) Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9731852
Kurdman Abdulrahman Rasol Rasol, J. Domingo-Pascual
{"title":"Evaluation of Joint Controller Placement for Latency and Reliability-Aware Control Plane","authors":"Kurdman Abdulrahman Rasol Rasol, J. Domingo-Pascual","doi":"10.1109/SDS54264.2021.9731852","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9731852","url":null,"abstract":"The separation of the forwarding and control planes in software-defined networking provides flexibility for network management. The Controller Placement Problem (CPP) is an important issue affecting network performance. This paper presents an evaluation of the Joint Latency and Reliability-aware Controller Placement (LRCP) optimization model. LRCP provides network administrators with flexible choices to simultaneously achieve a trade-off between the switch-to-controller latency and the controller-to-controller latency, including the reliability aspect using alternative backup paths. Control plane latency (CPL) is used as the evaluation metric and it is defined as the sum of average switch-to-controller latency and the average inter-controller latency. For each optimal placement in the network, the control plane latency using the real latencies of the real network topology is computed. Results from the control plane latency metric show how the number and location of controllers influence the reliability of the network. In the event of a single link failure, the real CPL for LRCP placements is computed and assesses how good the LRCP placements are. The CPL metric is used to compare with other models using latency and reliability metrics.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SDS Organizers and Sponsors SDS组织者和发起人
2021 Eighth International Conference on Software Defined Systems (SDS) Pub Date : 2021-12-06 DOI: 10.1109/sds54264.2021.9732110
{"title":"SDS Organizers and Sponsors","authors":"","doi":"10.1109/sds54264.2021.9732110","DOIUrl":"https://doi.org/10.1109/sds54264.2021.9732110","url":null,"abstract":"","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117250590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive and Autonomic IoT System Design 认知与自主物联网系统设计
2021 Eighth International Conference on Software Defined Systems (SDS) Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732121
B. Athamena, Z. Houhamdi
{"title":"Cognitive and Autonomic IoT System Design","authors":"B. Athamena, Z. Houhamdi","doi":"10.1109/SDS54264.2021.9732121","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732121","url":null,"abstract":"Currently, the Internet of Things (IoT) usage observes a drastic growth in several areas and participates in the rapid universe digitalization. Henceforward, the IoT systems next generation will be more difficult to develop and monitor. Gathering real-time data created by IoT triggers some novel opportunities for businesses to take at the right time more accurate and precise decisions. However, several challenges (such as IoT systems complexity and heterogeneous data management, and IoT system scalability) restrain the elaboration of IoT systems that are smart and impel business decision-making. This paper proposes to automatize IoT systems management using an autonomic computing approach. Nevertheless, autonomic computing is insufficient for smart IoT systems development. Actually, a smart IoT system implements cognitive abilities that allow its learning and decision-making in real-time. Therefore, this study proposes a model for designing smart IoT systems. It defines a set of cognitive design patterns that delineate the dynamiccooperation between management processes (MPs) (to handle the requirements evolvement and the system's environment unpredictability) and add cognitive capabilities to IoT systems (to generate new insights, perceive big data, and communicate with users). The study's primary goal is to support the developer in designing smart IoT systems that are flexible by choosing an appropriate pattern (or a set of patterns) to meet complex system requirements.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122945628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Copyright notice] (版权)
2021 Eighth International Conference on Software Defined Systems (SDS) Pub Date : 2021-12-06 DOI: 10.1109/sds54264.2021.9732146
{"title":"[Copyright notice]","authors":"","doi":"10.1109/sds54264.2021.9732146","DOIUrl":"https://doi.org/10.1109/sds54264.2021.9732146","url":null,"abstract":"","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125378403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can the User Help? Leveraging User Actions for Network Profiling 用户能提供帮助吗?利用用户操作进行网络分析
2021 Eighth International Conference on Software Defined Systems (SDS) Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732164
Zorigtbaatar Chuluundorj, Curtis R. Taylor, R. Walls, Craig A. Shue
{"title":"Can the User Help? Leveraging User Actions for Network Profiling","authors":"Zorigtbaatar Chuluundorj, Curtis R. Taylor, R. Walls, Craig A. Shue","doi":"10.1109/SDS54264.2021.9732164","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732164","url":null,"abstract":"Enterprises have difficulty gaining insight into the steps preceding anomalous activity in end-user machines. En-terprises may log events to later reconstruct anomalies to gain insight and determine their causes. Unfortunately, most logs are low-level and lack contextual information, making manual inspection arduous. Accordingly, enterprises may fail to promptly respond to anomalies, leading to outages or security breaches. To help these enterprises, we monitor and log each user's interactions with the machine's user interface (UI) and link them to the resulting network flows. We design, implement, and evaluate an SDN system, called Harbinger, for the Microsoft Windows OS that provides user activity context for flows. Enterprises can use the context we gather to complement traditional analysis. We explore how Harbinger can help differentiate normal and abnormal network traffic. While IP or DNS host name profiling can have error rates between 29%-38 % for URL-based traffic, UI-aware sensors can reduce such errors to 0.2%. We further find that with the help of user action tracking, we can detect errant network traffic 99.1% of the time in our tests. HARBINGERhas good performance, introducing less than 6 milliseconds of delay in 95% of new network flows.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133031394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams 零信任访问控制关注浏览器点击流的不平衡分布
2021 Eighth International Conference on Software Defined Systems (SDS) Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732109
Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Y. Kadobayashi, Doudou Fall
{"title":"Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams","authors":"Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Y. Kadobayashi, Doudou Fall","doi":"10.1109/SDS54264.2021.9732109","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732109","url":null,"abstract":"The further spread of cloud computing and telework has led to an increase in borderless activities, which has expanded the demand for constructing Zero-Trust Access Control (ZTAC). In this context, preventing information leakage is an important issue, and to protect sensitive data and confidential information in a zero-trust, it is necessary to monitor the user's behavior after authentication and make sequential decisions about authorization. In this research, we monitor account's behavior such clickstreams on the browser and incorporate it to evaluation of user's trust in access control system. Through the construction of behavior-based ZTAC system based on clickstreams, we have achieved access control that considers the naturalness of clicks without relying on the results of authentication. Moreover, toward solving the mismatch of click count between the system side and the end-user side, we synchronously updated the clickstream by the user-agent which observing and retrieving the click events in the DOM. As experimental evaluation, we verified that our ZTAC can deal with click count discrepancy and completely prevent various insider threat to sensitive data from even authenticated accounts. Also, we confirmed no significant differences in response time, memory usage, or CPU usage before and after the migration of zero-trust, indicating that it can be deployed in existing enterprise networks.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133656338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication of Mobile IoT Devices using HyperLedger Fabric Blockchain 使用HyperLedger Fabric区块链的移动物联网设备认证
2021 Eighth International Conference on Software Defined Systems (SDS) Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732141
Nathalie Banoun, Nafissatou Diarra
{"title":"Authentication of Mobile IoT Devices using HyperLedger Fabric Blockchain","authors":"Nathalie Banoun, Nafissatou Diarra","doi":"10.1109/SDS54264.2021.9732141","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732141","url":null,"abstract":"The Internet of Things is a rapidly evolving field which gives rise to new needs related to devices management and security. In addition to being intelligent, devices become more and more mobile, and mobility could lead to security and performance issues if not correctly managed. In this paper, we propose an IoT authentication system considering mobile devices and using the Hyperledger Fabric Blockchain as a broker. Our system is scalable, and proproses two ways of managing device mobility. To demonstrate the reliability of our approachs, we provide a proof-of-concept based on a scenario example and an evaluation of the performance obtained.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities 数字签名与椭圆曲线数字签名算法在QR码漏洞验证中的比较分析
2021 Eighth International Conference on Software Defined Systems (SDS) Pub Date : 2021-12-06 DOI: 10.1109/SDS54264.2021.9732150
Abdul Razaque, Vladislav Alexandrov, Muder Almiani, Bandar Alotaibi, M. Alotaibi, Ayman Al-Dmour
{"title":"Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities","authors":"Abdul Razaque, Vladislav Alexandrov, Muder Almiani, Bandar Alotaibi, M. Alotaibi, Ayman Al-Dmour","doi":"10.1109/SDS54264.2021.9732150","DOIUrl":"https://doi.org/10.1109/SDS54264.2021.9732150","url":null,"abstract":"Quick response (QR) codes are currently used ubiq-uitously. Their interaction protocol design is initially unsecured. It forces users to scan QR codes, which makes it harder to differentiate a genuine code from a malicious one. Intruders can change the original QR code and make it fake, which can lead to phishing websites that collect sensitive data. The interaction model can be improved and made more secure by adding some modifications to the backend side of the application. This paper addresses the vulnerabilities of QR codes and recommends improvements in security design. Furthermore, two state-of-the-art algorithms, Digital Signature (DS) and Elliptic Curve Digital Signature (ECDS), are analytically compared to determine their strengths in QR code security.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125452554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信