{"title":"Insider Threat Detection Using Natural Language Processing and Personality Profiles","authors":"S. Eftimie, Radu Moinescu, C. Racuciu","doi":"10.1109/COMM48946.2020.9141964","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141964","url":null,"abstract":"This work represents an interdisciplinary effort to proactively identify insider threats, using natural language processing and personality profiles. Profiles were developed for the relevant insider threat types using the five-factor model of personality and were used in a proof-of-concept detection system. The system employs a third-party cloud service that uses natural language processing to analyze personality profiles based on personal content. In the end, an assessment was made over the feasibility of the system using a public dataset.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandru Martian, Florin-Lucian Chiper, O. Al-Dulaimi, Mahmood Jalal Ahmad Al Sammarraie, C. Vladeanu, I. Marghescu
{"title":"Comparative Analysis of Software Defined Radio Platforms for Spectrum Sensing Applications","authors":"Alexandru Martian, Florin-Lucian Chiper, O. Al-Dulaimi, Mahmood Jalal Ahmad Al Sammarraie, C. Vladeanu, I. Marghescu","doi":"10.1109/COMM48946.2020.9142024","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142024","url":null,"abstract":"In the context of trying to obtain a solution for using the limited radio spectrum resources in an efficient way, the design of equipment having flexible RF front ends arose as a necessity. The software defined radio (SDR) approach offered such characteristics and several producers developed such platforms in recent years. In the current paper, several SDR platforms are compared from a RF front end receive performance point of view. Several measurements were performed in different frequency bands using the SDR platforms, using a spectrum analyzer as a reference. The results are analyzed and discussed having in mind the use of such a platform for performing spectrum sensing applications, which is a key necessity for the design of dynamic spectrum access (DSA) capable equipment.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117006985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint","authors":"M. Mihailescu, Stefania Loredana Nita","doi":"10.1109/COMM48946.2020.9141956","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141956","url":null,"abstract":"The current paper is proposing a three-factor authentication (3FA) scheme based on three components. In the first component a token and a password will be generated (this module represents the kernel of the three-factor authentication scheme - 3FA). In the second component a pass-code will be generated, using to the token resulted in the first phase. We will use RSA for encryption and decryption of the generated values (token and pass-code). For the token ID and passcode the user will use his smartphone. The third component uses a searchable encryption scheme, whose purpose is to retrieve the documents of the user from the cloud server, based on a keyword and his/her fingerprint. The documents are stored encrypted on a mistrust server (cloud environment) and searchable encryption will help us to search specific information and to access those documents in an encrypted content. We will introduce also a software simulation developed in C# 8.0 for our scheme and a source code analysis for the main algorithms.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Robert Botez, Calin-Marian Iurian, I. Ivanciu, V. Dobrota
{"title":"Deploying a Dockerized Application With Kubernetes on Google Cloud Platform","authors":"Robert Botez, Calin-Marian Iurian, I. Ivanciu, V. Dobrota","doi":"10.1109/COMM48946.2020.9142014","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142014","url":null,"abstract":"The fast development of IoT networks and the integration of these scenarios in everyday life has also led to great diversity of SD-WAN solutions. With the advent of 5G, more and more devices will be connected, which requires careful monitoring especially in crucial situations such as transport scenarios. This paper presents the implementation of a web application based on microservices, each of them running in a dedicated Docker container, which gathers information in real-time from two vehicles. These standalone executable packages of software are orchestrated by Kubernetes and hosted on Google Cloud Platform. The data used during the execution of the project is stored into a Cloud SQL instance. All the necessary resources in order to build the project can be monitored with Stackdriver.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"16 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113980221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SDN controller implementation using OpenDaylight: experiments","authors":"Alexandra Eftimie, E. Borcoci","doi":"10.1109/COMM48946.2020.9142044","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142044","url":null,"abstract":"Software Defined Networking (SDN) is ment to add flexibility to control-plan implementation choices, allowing one to choose between points on the implementation design axis: centralized to distributed, micro-flow to aggregated-flow, reactive to proactive, virtual to physical, and fully-consistent to eventually-consistent. It should be highlighted that the problem of comparing SDN controllers is an extremely challenging one, mainly because it is a multifaceted problem. Additionally, comparative analysis typically helps in 'selecting' a controller to meet a particular or a set of requirements. This paper aims to present the implementation of one open source controller – OpenDaylight – in a small environment. The experiments described can actually help the implementors to develop SDN oriented systems. Pros and cons with regards to implementation and functionalty will be highlighted.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"85 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114128727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Mihai, P. Shah, G. Mapp, Huan Nguyen, R. Trestian
{"title":"Towards Autonomous Driving: A Machine Learning-based Pedestrian Detection System using 16-Layer LiDAR","authors":"Stefan Mihai, P. Shah, G. Mapp, Huan Nguyen, R. Trestian","doi":"10.1109/COMM48946.2020.9142042","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142042","url":null,"abstract":"The advent of driverless and automated vehicle technologies opens up a new era of safe and comfortable transportation. However, one of the most important features that an autonomous vehicle requires, is a reliable pedestrian detection mechanism. Many solutions have been proposed in the literature to achieve this technology, ranging from image processing algorithms applied on a camera feed, to filtering LiDAR scans for points that are reflected off pedestrians. To this extent, this paper proposes a machine learning-based pedestrian detection mechanism using a 16-layer Velodyne Puck LITE LiDAR. The proposed mechanism compensates for the low resolution of the LiDAR through the use of linear interpolation between layers, effectively introducing 15 pseudo-layers to help obtain timely detection at practical distances. The pedestrian candidates are then classified using a Support Vector Machine (SVM), and the algorithm is verified by accuracy testing using real LiDAR frames acquired under different road scenarios.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Teodor Mitrea, Vlad-Cosmin Vasile, M. Borda, C. Nafornita, Alexandru Romaniuc
{"title":"Study of Attacks on Satellite Navigation System Receivers","authors":"Teodor Mitrea, Vlad-Cosmin Vasile, M. Borda, C. Nafornita, Alexandru Romaniuc","doi":"10.1109/COMM48946.2020.9141998","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141998","url":null,"abstract":"Nowadays, there are many important areas in which the positioning information provided by the satellite navigation systems is used, systems whose development has accelerated in recent years. Due to this pace, it seems that the measures to ensure the security of these systems have lagged behind. This article presents the results of various tests that targeted the security of the receivers of the most used commercial satellite navigation systems - those of smart phones and cars and how these receivers behave in the event of spoofing.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122762711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electromagnetic Analysis of Crosstalk in Electronic Digital Modules","authors":"Mircea Nicolaescu, V. Croitoru, L. Tuta","doi":"10.1109/COMM48946.2020.9142036","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142036","url":null,"abstract":"The need for speed and capacity had drawn electronic industry into a race for higher operating frequency. As a result, the dimensions of circuits and the lengths of the connections have become comparable with the wavelengths. As such the transmission line effect must be taken into consideration in the designing process. The paper analyzes one major phenomenon which affects the performances of electronic equipment, namely the crosstalk between two transmission lines which transfer data or control information between two parts of an electronic digital module.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124692119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Vulnerabilities Integrated Management System","authors":"M. Aldea, Daniel Gheorghica, V. Croitoru","doi":"10.1109/COMM48946.2020.9141970","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141970","url":null,"abstract":"In simple terms, a vulnerability can be an error or a flaw in code design which can determine malfunction of an application. Software vulnerabilities are the main cause of computer security problems. In order to avoid an attack or to minimize the damages produced by a cyberattack, a good vulnerability management plan should be implemented. This paper proposes a solution for vulnerability management by implementing a software vulnerabilities integrated management system (SV-IMS) that can perform security test in order to detect software vulnerabilities, the results of vulnerability tests being processed and viewed using a dedicated platform. The SV-IMS has a dedicated database for configuration management.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}