Napoleon Paxton, Dae-il Jang, I. S. Moskowitz, Gail-Joon Ahn, S. Russell
{"title":"Discovering and analyzing deviant communities: Methods and experiments","authors":"Napoleon Paxton, Dae-il Jang, I. S. Moskowitz, Gail-Joon Ahn, S. Russell","doi":"10.4108/ICST.COLLABORATECOM.2014.257262","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257262","url":null,"abstract":"Botnets continue to threaten the security landscape of computer networks worldwide. This is due in part to the time lag present between discovery of botnet traffic and identification of actionable intelligence derived from the traffic analysis. In this article we present a novel method to fill such a gap by segmenting botnet traffic into communities and identifying the category of each community member. This information can be used to identify attack members (bot nodes), command and control members (Command and Control nodes), botnet controller members (botmaster nodes), and victim members (victim nodes). All of which can be used immediately in forensics or in defense of future attacks. The true novelty of our approach is the segmentation of the malicious network data into relational communities and not just spatially based clusters. The relational nature of the communities allows us to discover the community roles without a deep analysis of the entire network. We discuss the feasibility and practicality of our method through experiments with real-world botnet traffic. Our experimental results show a high detection rate with a low false positive rate, which gives encouragement that our approach can be a valuable addition to a defense in depth strategy.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133272462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amir Abdolrashidi, Lakshmish Ramaswamy, David S. Narron
{"title":"Performance modeling of computation and communication tradeoffs in vertex-centric graph processing clusters","authors":"Amir Abdolrashidi, Lakshmish Ramaswamy, David S. Narron","doi":"10.4108/ICST.COLLABORATECOM.2014.257474","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257474","url":null,"abstract":"Distributed vertex-centric graph processing systems have been recently proposed to perform different types of analytics on large graphs. These systems utilize the parallelism of shared nothing clusters. In this work we propose a novel model for the performance cost of such clusters.We also define novel metrics related to the workload balance and network communication cost of clusters processing massive real graph datasets. We empirically investigate the effects of different graph partitioning mechanisms and their tradeoff for two different categories of graph processing algorithms.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126452564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model for collaborative and adaptive multimedia content delivery in a collaborative m-learning environment","authors":"Aleksandar Karadimce, D. Davcev","doi":"10.4108/ICST.COLLABORATECOM.2014.257231","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257231","url":null,"abstract":"Smart mobile devices are already used for everyday communication between people. They have become ubiquitous devices for receiving and sharing important information, but they poses limited capability of storing and processing multimedia content. Considering that mobile devices will always have these mentioned limitations, the proposed solution is to use collaborative, adaptive multimedia content delivery and the cloud computing technology. In order to gain increased perception of quality of m-learning systems, the proposed model delivers three services for selection, transcoding and authoring multimedia content, which should be hosted by SaaS cloud computing model. The proposed model for collaborative and adaptive multimedia content delivery will provide the mobile learners with cloud-based services. These services will facilitate the delivery of the preferred multimedia content across heterogeneous network to various types of mobile devices that learners are using. The advantage of the proposed framework is proved by using a sample mobile application for our case study, which estimates the operation of the service for multimedia content selection and authoring service.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125355273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct transmission vs relay transmission for information dissemination in a MANet: an analytical study","authors":"S. Chaumette, Jonathan Ouoba","doi":"10.4108/ICST.COLLABORATECOM.2014.257313","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257313","url":null,"abstract":"It is acknowledged that in a mobile environment the wireless technologies that are available at each node can be exploited so as to achieve efficient peer-to-peer communications. Therefore we have developed a multilevel platform the goal of which is to allow a set of mobile terminals to securely communicate in a peer-to-peer manner by using the most appropriate available technology according to the context at hand. The scenario that we have chosen to focus on targets information sharing for collaboration purpose between the mobile nodes of the network. The study of this scenario led us to identify the main operations that are required to achieve it, the central process being the publication of profiles. This operation is meant to allow a node to publish a description (that we call a profile) of the information it is willing to share with the other nodes. Two approaches, direct transmission and relay transmission, are considered so that the publication of profiles can be performed in the most efficient way (according to the available communication technologies and the dynamics of the network). In this paper, we first present the target environments that we consider and the approach that we have chosen to implement in our multilevel platform. We then focus on the publication of profiles and we highlight the two transmission modes (direct transmission and relay transmission) that we have chosen to consider. We analytically study and compare them in terms of the probability to successfully deliver a given message in the target context defined above. We conclude with future research directions.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic mapping rules and OWL ontology extraction for the OBDA Ontop","authors":"Fayez Khazalah, Zaki Malik, A. Rezgui","doi":"10.4108/ICST.COLLABORATECOM.2014.257493","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257493","url":null,"abstract":"Extracting Ontop mapping rules and OWL ontology manually from a relational schema is a tedious task. We present an automatic approach for extracting Ontop mappings and OWL ontology from an existing database schema. The end users can access the underlying data source through SPARQL queries. A SPARQL query is written according to the extracted ontology and the end user does not need to know about the underlying data source and its schema. The proposed approach takes into consideration the different relationships between entities of the database schema. Instead of extracting a flat ontology that is an exact copy of the database schema, it extracts a rich ontology. The extracted ontology can also be used as an intermediate between a domain ontology and the underlying database schema. The experiment results indicate that the extracted mappings and ontology are accurate. i.e., end users can query all data (using SPARQL) from the underlying database source in the same way as if they have written SQL queries.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dave Murray-Rust, Ognjen Scekic, P. Papapanagiotou, Hong Linh Truong, D. Robertson, S. Dustdar
{"title":"A collaboration model for community-based Software Development with social machines","authors":"Dave Murray-Rust, Ognjen Scekic, P. Papapanagiotou, Hong Linh Truong, D. Robertson, S. Dustdar","doi":"10.4108/ICST.COLLABORATECOM.2014.257245","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257245","url":null,"abstract":"Today's crowdsourcing systems are predominantly used for processing independent tasks with simplistic coordination. As such, they offer limited support for handling complex, intellectually and organizationally challenging labour types, such as software development. In order to support crowdsourcing of the software development processes, the system needs to enact coordination mechanisms which integrate human creativity with machine support. While workflows can be used to handle highly-structured and predictable labour processes, they are less suitable for software development methodologies where unpredictability is an unavoidable part the process. This is especially true in phases of requirement elicitation and feature development, when both the client and development communities change with time. In this paper we present models and techniques for coordination of human workers in crowdsourced software development environments. The techniques augment the existing Social Compute Unit (SCU) concept-a general framework for management of ad-hoc human worker teams-with versatile coordination protocols expressed in the Lightweight Social Calculus (LSC). This approach allows us to combine coordination and quality constraints with dynamic assessments of software-user's desires, while dynamically choosing appropriate software development coordination models.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influencing data availability in IoT enabled cloud based e-health in a 30 day readmission context","authors":"Rajesh Vargheese, Y. Viniotis","doi":"10.4108/ICST.COLLABORATECOM.2014.257621","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257621","url":null,"abstract":"The US healthcare Affordable Care Act established the 30 day readmission protection program as one of the base lines of measuring quality of care at hospitals and post discharge. With reduced payment penalties for hospitals with excessive readmissions, hospitals have increased their focus on managing post discharge care. With the emphasis on prevention and proactive care, integrated approaches that have the ability to collect relevant data from patients, process it efficiently and timely and predict risk patterns in advance and enable seamless collaboration between the patients and the care team is required. This allows care teams to proactively manage the care of the patient and limit complications and readmissions. Internet of things enabled collaborative cloud based e-health is evolving as one of the key transformation approaches in helping to address the 30 day readmission avoidance efforts. While the sensors provide critical data, there are significant constraints in terms of processing, power, storage and overall context. The power and capabilities of the cloud can augment the local visibility of sensors by providing capabilities that the sensors lack. In this work, we define these capabilities as the five P's: Provisioning, Policy Management, Processing, Protection and Prediction. We argue that by bringing these elements together, the e-health architecture is able to take the data from sensors securely and transfer it to the cloud and generate insights and actions that help improve healthcare outcomes in a timely manner. The Cloud management plays a critical role in ensuring the integrity and availability of vital information. The blind spots in the unavailability of data or compromised data can result in missed opportunities for proactive care; ours proposed architecture ensures data availability, processing availability and integrity and thus is very important in a 30 day readmission context.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Establishing global policies over decentralized online social networks","authors":"Zhe Wang, N. Minsky","doi":"10.4108/ICST.COLLABORATECOM.2014.257584","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257584","url":null,"abstract":"Conventional online social networks (OSNs) are implemented in a centralized manner. Although centralization is a convenient way for implementing OSNs, it has several well known drawbacks. Chief among them are the risks they pose to the security and privacy of the information maintained by the OSN; and the loss of control over the information contributed by individual members. These concerns prompted several attempts to create decentralized OSNs, or DOSNs. The basic idea underlying these attempts, is that each member of a social network keeps its data under its own control, instead of surrendering it to a central host; providing access to it to other members of the OSN according to its own access-control policy. Unfortunately all existing DOSN projects have a very serious limitation. Namely, they are unable to subject the membership of a DOSN, and the interaction between its members, to any global policy. We adopt the decentralization idea underlying DOSNs, complementing it with a means for specifying and enforcing a wide range of policies over the membership of a social community, and over the interaction between its disparate distributed members. And we do so in a scalable fashion.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129875910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}