Lydia Bouzar-Benlabiod, S. Benferhat, Thouraya Boubana-Tebibel
{"title":"Integrating security operator knowledge and preferences to the alert correlation process","authors":"Lydia Bouzar-Benlabiod, S. Benferhat, Thouraya Boubana-Tebibel","doi":"10.1109/ICMWI.2010.5648098","DOIUrl":"https://doi.org/10.1109/ICMWI.2010.5648098","url":null,"abstract":"Intrusion Detection Systems (IDS) are necessary for the system monitoring. However they produce a huge quantity of alerts. Alert correlation is a process applied to the IDS alerts in order to reduce their number. In this paper we propose a new approach for alert correlation which enables the integration of new information to the alert correlation process: Security operator's knowledge and preferences. This information concerns the monitoring system and the risk level of each alert in according for instance to the operator's experiences. The representation and the reasoning on these knowledge and preferences are done using the Qualitative Choice Logic (QCL) and its extensions: Prioritized Qualitative Choice Logic (PQCL) and Positive Qualitative Choice Logic (QCL+). Experimental results are achieved on data from a real system monitoring. The result is a set of ordered alerts which satisfies operator's criteria.","PeriodicalId":404577,"journal":{"name":"2010 International Conference on Machine and Web Intelligence","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114673593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From using description logics to handling inconsistency in cooperative intrusion detection","authors":"S. Yahi, S. Benferhat, Tayeb Kenaza","doi":"10.1109/ICMWI.2010.5648177","DOIUrl":"https://doi.org/10.1109/ICMWI.2010.5648177","url":null,"abstract":"Cooperative intrusion detection consists in using several IDS and other analyzers in order to supply an overview of the system under consideration. In this case, the definition of a shared vocabulary describing the different information is prominent. Since these pieces of information are structured, we propose in this paper to use description logics which ensure the reasoning decidability. Besides, the analyzers used in cooperative intrusion detection are not totally reliable. Consequently, the cooperation could easily generate conflicts or inconsistencies. We propose in this paper to handle these inconsistencies using the so-called partial lexicographic inference.","PeriodicalId":404577,"journal":{"name":"2010 International Conference on Machine and Web Intelligence","volume":"765 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123001223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pattern tree-based XOLAP rollup operator for XML complex hierarchies","authors":"Marouane Hachicha, J. Darmont","doi":"10.1109/ICMWI.2010.5648088","DOIUrl":"https://doi.org/10.1109/ICMWI.2010.5648088","url":null,"abstract":"With the rise of XML as a standard for representing business data, XML data warehousing appears as a suitable solution for decision-support applications. In this context, it is necessary to allow OLAP analyses on XML data cubes. Thus, XQuery extensions are needed. To define a formal framework and allow much-needed performance optimizations on analytical queries expressed in XQuery, defining an algebra is desirable. However, XML-OLAP (XOLAP) algebras from the literature still largely rely on the relational model. Hence, we propose in this paper a rollup operator based on a pattern tree in order to handle multidimensional XML data expressed within complex hierarchies.","PeriodicalId":404577,"journal":{"name":"2010 International Conference on Machine and Web Intelligence","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122319639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for summarizing a log of OLAP queries","authors":"Julien Aligon, Patrick Marcel, E. Negre","doi":"10.1109/ICMWI.2010.5648082","DOIUrl":"https://doi.org/10.1109/ICMWI.2010.5648082","url":null,"abstract":"Leveraging query logs benefits the users analyzing large data warehouses. But so far nothing exists to allow the user to have concise and usable representation of what is in the log. In this paper, we propose a framework for summarizing OLAP query logs. This framework is based on the idea that a query can summarize another query and that a log can summarize another log. It includes a simple language to declaratively specify a summary, a measure to assess the quality of a summary and an algorithm for automatically computing a good quality summary of a query log.","PeriodicalId":404577,"journal":{"name":"2010 International Conference on Machine and Web Intelligence","volume":"60 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Genetic algorithm encoding representations for graph partitioning problems","authors":"M. Boulif","doi":"10.1109/ICMWI.2010.5648133","DOIUrl":"https://doi.org/10.1109/ICMWI.2010.5648133","url":null,"abstract":"This paper presents an insight on genetic algorithm (GA) encoding representations applied to graph partitioning problems. Redundancy and blindness, two important features that have a direct impact on the performance of the method, are theoretically investigated and some conclusions are drawn.","PeriodicalId":404577,"journal":{"name":"2010 International Conference on Machine and Web Intelligence","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125680857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid Grasp and Scatter Search for the exam timetabling problem","authors":"D. Hadjidj, H. Drias","doi":"10.1109/ICMWI.2010.5648136","DOIUrl":"https://doi.org/10.1109/ICMWI.2010.5648136","url":null,"abstract":"In this paper we describe a new hybrid evolutionary algorithm and its implementation for the NP hard exam timetabling problem. This approach uses the good features of the Greedy Randomized Adaptive Search Procedure (GRASP) and the evolutionary Scatter Search (SS) approach which uses strategies for search diversification and intensification to maintain and evolve a population of solutions. New solutions are improved before replacing others according to their quality and diversity. The implementation of the algorithm has been experimented on the popular Carter's benchmarks and compared with the best recent results.","PeriodicalId":404577,"journal":{"name":"2010 International Conference on Machine and Web Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128947485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protect user anonymity in query log","authors":"Anissa Mimi, S. N. Bahloul","doi":"10.1109/ICMWI.2010.5648160","DOIUrl":"https://doi.org/10.1109/ICMWI.2010.5648160","url":null,"abstract":"The query logs provide to the research community a large amount of data which reflect the natural behavior of the user on the web. These data have many values and risks on user privacy. The use of these data has prompted several questions: The query logs owners are concerned by the security of their customers. But, academic, governmental and commercial searchers are interested in acquiring a significant amount of data for their research. The challenge is to ensure the user's privacy by reducing the potential risks without depleting the log query utility. In this paper we give an overview on query log data issue and propose a solution to ensure user anonymity. This solution is based on the replacement of terms relied with user identity. We think that replacing identifying terms like names of persons, and names of places with a significant substitutive, improve protection of the user identity by increasing number of possible identities for this user and at the same time, guarantee more utility than if the identifying terms are deleted.","PeriodicalId":404577,"journal":{"name":"2010 International Conference on Machine and Web Intelligence","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WSS-NFP: Tool for web service selection based on non-functional properties using soft computing","authors":"Sunita Tiwari, Saroj Kaushik","doi":"10.1109/ICMWI.2010.5648127","DOIUrl":"https://doi.org/10.1109/ICMWI.2010.5648127","url":null,"abstract":"Web services provide a promising solution to an age old need of fast and flexible information sharing among people and businesses. One of the key research issues in web services is selection of most pertinent web services. Selection of web service has become a tedious job because of the increasing number of service providers providing services with similar functionality. Therefore, a framework for selection and discovery of web service that can meet the non-functional requirements is needed. In this work, we have developed a selection tool (WSS-NFP) for web services which can rank services based on their non functional properties such as performance, delay etc. We have used soft computing techniques for selection and discovery of web services based on non functional properties. These properties are fuzzy in nature. A tool is developed and implemented that is generic in nature and can be customized for any application domain. As a core of this tool, it consists of Fuzzy System for ranking web services and Neural Network for fine tuning the membership functions for linguistic terms. Appropriate and fine tuned membership functions help in minimizing the output error measure and maximizing the performance index of the proposed tool. This tool is basically a Neuro-Fuzzy system for ranking web services of any domain.","PeriodicalId":404577,"journal":{"name":"2010 International Conference on Machine and Web Intelligence","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133610325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic interoperability of Web services: A survey","authors":"Karima Mecheri, L. Souici-Meslati","doi":"10.1109/ICMWI.2010.5647928","DOIUrl":"https://doi.org/10.1109/ICMWI.2010.5647928","url":null,"abstract":"Service Oriented Architectures (SOA) and Web services (WS) are important for creating interoperable information systems. However, these technologies lack of semantics. To overcome this limitation, semantic Web services are necessary. In this paper we present a synthesis of some recent works we estimate interesting in the field of semantic interoperability via Web services. We first present some conceptual and technological tools permitting the semantic interoperability. Then, we try to classify the considered works through a comparative table using some criteria concerning the semantic description approach and language, the integration approach, the functions taken into account (publication, discovery, invocation….), the mediation level and the composition method.","PeriodicalId":404577,"journal":{"name":"2010 International Conference on Machine and Web Intelligence","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128191588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face detection based on a model of the skin color with constraints and template matching","authors":"S. Kherchaoui, A. Houacine","doi":"10.1109/ICMWI.2010.5648043","DOIUrl":"https://doi.org/10.1109/ICMWI.2010.5648043","url":null,"abstract":"Face detection is now a classical problem in detection, and it was addressed through several methods, including global comprehensive image scanning and structural approaches that focus on the facial structures. Face detection is considered in this paper based on combining both a statistical model of skin color and geometrical face characteristics. The system presented is organized in two parts. The first one consists in skin color detection by a statistical method, based on a Gaussian mixture model in the chromatic CbCr color space. The second part is devoted to processing detected skin regions to select those corresponding to faces. A skin region is considered as a face candidate if it verifies a set of geometrical constraints. And then, a template matching is applied to reach the final decision depending on the degree of similarity between the template used and the region under analysis. Both skin detection part and whole face detection system were tested on face databases.","PeriodicalId":404577,"journal":{"name":"2010 International Conference on Machine and Web Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121232819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}