{"title":"Honeypot in the cloud Five years of data analysis","authors":"M. Lihet, V. Dădârlat","doi":"10.1109/ROEDUNET.2018.8514128","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514128","url":null,"abstract":"The current paper is a continuation of a published article and is about the results of implementing a Honeypot in the Cloud. A five years period of raw data is analyzed and explained in the current Cyber Security state and landscape.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131699644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Catalin-Marian Petruti, Bogdan-Alexandru Puiu, I. Ivanciu, V. Dobrota
{"title":"Automatic Management Solution in Cloud Using NtopNG and Zabbix","authors":"Catalin-Marian Petruti, Bogdan-Alexandru Puiu, I. Ivanciu, V. Dobrota","doi":"10.1109/ROEDUNET.2018.8514142","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514142","url":null,"abstract":"This paper presents a web-based application for an automatic management system in a private cloud using NtopNG and Zabbix open-source monitoring tools. The initial objective was to increase the efficiency of the work carried out by the network administrators to control the access to the Intranet/Internet services for a large community of users (e.g., students in a campus). This involved a virtualized platform where the customers had to register (name and password). The next step was to unlock some/ all of the following services they are entitled to use (e.g., FTP, TeamSpeak, Torrent, and VPN). This original solution takes advantage of the graphical features of Zabbix, as well as the detailed configuration capabilities of NtopNG. In the second phase of the work we expanded the applicability of the management solution to devices placed in vehicles and acting as Compute Nodes in a cloud. The strengths of this implementation are the following: the application is easy to use, it can be accessed by fixed and mobile devices, it allows automatic real-time update, server virtualization, and scalability.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134059681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrei Cãlugãru, V. Dădârlat, A. Peculea, E. Cebuc
{"title":"Real Time System for Detecting and Tracking People","authors":"Andrei Cãlugãru, V. Dădârlat, A. Peculea, E. Cebuc","doi":"10.1109/ROEDUNET.2018.8514137","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514137","url":null,"abstract":"The increasing number of surveillance cameras allows for developing video systems for different domains. The paper proposes a real-time distributed system that automatically detects and tracks a person. The system develops a model for network communication which involves image and control message transmission. The project addresses the functionality of detecting and tracking people with efficient network usage and intelligent data processing. Also, by automatically tracking people, it reduces the necessity of human interaction in the surveillance process.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132592031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andreea Bican, Răzvan Deaconescu, W. Chin, Quang-Trung Ta
{"title":"Verification of C Buffer Overflows in C Programs","authors":"Andreea Bican, Răzvan Deaconescu, W. Chin, Quang-Trung Ta","doi":"10.1109/ROEDUNET.2018.8514126","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514126","url":null,"abstract":"Buffer overflow attacks are a persisting security threat in C programs. The C Standard library provides functions for string handling that lack any bound checks. This paper presents astatic approach for buffer overflow detection by identifying the likely vulnerabilities through an analysis of the source code. We defined a set of predicates, based on the function’s specifications, that determine whether the operation is safe or not. This paper describes an implementation of the approach as an extension of HIP/SLEEK, an automated verification system basedon the separation logic. The static buffer overflow detector proved to have good results even in tricky cases, such as pointer aliasing and overlapping memory.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128316211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending Cooja simulator with real weather and soil data","authors":"Alexandru Bumb, B. Iancu, E. Cebuc","doi":"10.1109/ROEDUNET.2018.8514130","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514130","url":null,"abstract":"Modern agriculture needs tools and technologies that can improve production efficiency, product quality, postharvest operations, and reduce their environmental impact. Wireless sensor networks can help monitoring fields, vineyards and orchards, thus helping farmers to prevent damages to their crops and increasing crop production. The paper presents an extension to Cooja simulator, called Weather & soil data provider (WSDP), which offers real weather and soil data at node level, based on nodes’ geographical coordinates. WSDP is helping specialists that want to develop/deploy a WSN at a certain location, to find more details about the environment parameters and to be able to assess the feasibility of their plan.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127348939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of cryptographic primitives on modern microcontroller platforms","authors":"F. Stancu, C. Tranca, Mihai Chiroiu, R. Rughinis","doi":"10.1109/ROEDUNET.2018.8514127","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514127","url":null,"abstract":"Security is an important issue, sometimes critical, when it comes to embedded applications such as industrial, Internet of Things or wearable devices. Due to the limited resources available, adding modern cryptography features may be difficult, even unfeasible in some cases. In this paper, we evaluate the different implementations (mbedTLS, TomCrypt, wolfSSL) of popular cryptographic algorithms (AES, SHA, ChaCha, Poly1305, RSA) on modern, 32-bit microcontrollers. We present the results: space requirements, memory usage, speed and power consumption on three popular, representative ARM Cortex-M platforms. We analyze and compare them to help embedded application developers in choosing the tools without too much compromises in security.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Awada, I. Mocanu, D. Năstac, Dan Benta, Serban Radu
{"title":"Adaptive User Interface for Healthcare Application for People with Dementia","authors":"I. Awada, I. Mocanu, D. Năstac, Dan Benta, Serban Radu","doi":"10.1109/ROEDUNET.2018.8514150","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514150","url":null,"abstract":"Adaptive user interfaces can be more effective in increasing accessibility of the interaction between people and systems, especially for elderly or people with different impairments such as cognitive impairments in people with dementia. There are two possible types of adaptation for interfaces: navigation and content-based adaptation. Both types of adaptation must be made based on the context (devices that are used) and on the user profile. This paper presents a method for interface adaptation using user classification. Users are classified based on their interactions with the interface.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121871796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lucian Paiusescu, M. Barbulescu, Valeriu Vraciu, M. Cărăbaş
{"title":"Efficient Datacenters Management for Network and Security Operations","authors":"Lucian Paiusescu, M. Barbulescu, Valeriu Vraciu, M. Cărăbaş","doi":"10.1109/ROEDUNET.2018.8514148","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514148","url":null,"abstract":"Identity management refers to the process of employing emerging technologies to manage information about the identity of users and control access to organization resources. The goal of identity management is to improve productivity and security while lowering costs associated with managing users and their identities, attributes, and credentials. The purpose of this document is to offer a broad overview of the IAM project that is being developed and tested within RoEduNet’s infrastructure and giving the opportunity to bring a contribution that would benefit the organization. In this paper we are presenting the architecture with the components used and how they integrate as well as the deployment of the application in two locations across the country to provide a fault tolerance high availability scenario.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113975398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Corlatescu, Ionut Cristian Paraschiv, M. Dascalu, Stefan Trausan-Matu, C. Banica
{"title":"Concurrent Processing of Scientific Articles using Cohesion Network Analysis","authors":"D. Corlatescu, Ionut Cristian Paraschiv, M. Dascalu, Stefan Trausan-Matu, C. Banica","doi":"10.1109/ROEDUNET.2018.8514149","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514149","url":null,"abstract":"Execution of complex tasks can be optimized by using parallel computing integrated within specialized frameworks. Thus, the AKKA framework was employed to speed up the processing time of the HUB-TECH platform to recommend semantically relevant articles, starting from a project description. Both parallel and distributed approaches are presented and a speed-up analysis between the two is performed. Distributed architectures enhance the system's performance by computing an increased number of semantic distances in less time. This usually requires more physical resources than parallel processing which is also capable of efficiently exploiting single nodes. The hardware specifications of the machine are relevant when trying to determine the optimal number of actors that can run on a machine in order to produce the maximal throughput. Our results show a 22% decrease in execution time while comparing serial and parallel approaches, a drastic 86% decrease when distributed methods are employed in contrast to serial executions, as well as an 82% improvement when comparing distributed and parallel experiments.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114296946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Processing incoherent open government data: A case-study about Romanian public contracts funded by the European Union","authors":"B. Ghita, Octavian Rinciog, Vlad Posea","doi":"10.1109/ROEDUNET.2018.8514151","DOIUrl":"https://doi.org/10.1109/ROEDUNET.2018.8514151","url":null,"abstract":"Lately many governments have adopted policies and mechanisms for making open data available to citizens, in order to increase the transparency of state administration and institutions. The usage of these data is hampered by the incorrect, incomplete and incoherent nature of the information. The purpose of this paper is to summarize the general steps that are needed in order to transform raw open data that contain errors to consistent data. These steps are used to correct the open data published by the Romanian government regarding public contracts funded by the European Union, offering them to entities interested in creating services using these data.","PeriodicalId":407088,"journal":{"name":"2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123920802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}