{"title":"IoT Measuring of UDP-Based Distributed Reflective DoS Attack","authors":"L. Huraj, M. Šimon, Tibor Horák","doi":"10.1109/SISY.2018.8524703","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524703","url":null,"abstract":"IoT devices and their fast growth on the Internet cause many cyber-attacks problems. The number of compromised IoT devices can be used by DDoS (Distributed Denial of Service) attackers to imitate valid request packet or to form illegal request packet to the victim with a spoofed source IP addresses to hide themselves, meanwhile giving rise the system collapse, the obstruction of network/traffic, or disrupting of the victim Internet operation. In this article is demonstrated a specific kind of DDoS attack involving usually accessible IoT devices - the UDP-based Distributed Reflective DoS Attack (DRDoS). The packets are flooded by the attacker to the IoT device as a reflector with a source IP address set to the IP address of the victim who obtains the reflected replies and can be overloaded. To examine this kind of attack, there has to be four representatives of heterogeneous IoT devices involved: an IP camera, a smart light-bulb, a network printer, and a small single-board computer Raspberry Pi. This article illustrates the possibility of the IoT devices to be integrated into DRDoS attack and to flood a network as well as their potential to form a targeted attack on a narticular victim machine.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"66 1","pages":"000209-000214"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76983182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Log File Authentication and Storage on Blockchain Network","authors":"David Janos Feher, Barnabás Sándor","doi":"10.1109/SISY.2018.8524848","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524848","url":null,"abstract":"Authentication is the issue most talked about nowadays. Comparing with Blockchain we want to research the justification for the blockchain technology to be used in enterprise log analysis and the appearance of blockchain technology to develop and make remarkable change in enterprise log analysis.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"1 1","pages":"000243-000248"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77279088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Phones Thermo-Ergonomic Analysis","authors":"P. Hell, P. J. Varga, Zsolt Illési","doi":"10.1109/SISY.2018.8524654","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524654","url":null,"abstract":"Our team performs thermo-ergonomic analysis of mobile devices for about a year now. Our added research provides further evidence that the current mobile device architecture has failures and even normal use of mobile devices cause undesirable overheating, which might lead to premature deterioration and inconvenient use. The results of our previous test highlighted the need to review the mobile device test methods, improve it by combining multiple criteria, and perform tests in a homogeneous environment. The revised approach allows us to compare and enhance the usability the test results. In our new piece of research, we fine-tuned the test environment and improved the test method by automating the process. The new software and hardware test environment also enable to conduct a more comprehensive analysis. [1]","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"9 1","pages":"000249-000254"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85392667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demonstrating the Options for Automated Advanced Selective Waste Gathering","authors":"I. Lakatos, A. Titrik, János Hollósi","doi":"10.1109/SISY.2018.8524707","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524707","url":null,"abstract":"Due to continuous developments, the exhausting and unpleasant work done by humans is going to be partly or totally replaced by automated devices. Such developments can be found in the field of transport concerning autonomous and networked vehicles. Although we are at a quite early stage of development, it is highly practical to make plans for a more distant future, i.e. targeting a totally automated selective waste gathering. Apart from the application of smart containers, this study presents alternatives for networked automated selective waste gathering.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"53 1","pages":"000167-000172"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91148579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bi-Capacities Based Pan-Integral","authors":"Milos Todorov, Mirjana Strboja, B. Mihailovic","doi":"10.1109/SISY.2018.8524736","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524736","url":null,"abstract":"In this paper the notion of the discrete bipolar pan-integral is introduced. This new type of integral is based on bi-capacities. The main properties of the bipolar pan-integral and its relations with the bipolar Choquet integral and the bipolar pseudo-integral are considered. Some illustrative examples are presented.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"5 1","pages":"000301-000304"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84308326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Chatbots in Formal Education","authors":"G. Molnár, Zoltán Szűts","doi":"10.1109/SISY.2018.8524609","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524609","url":null,"abstract":"Chatbots appeared in large numbers at the beginning of the current decade. Interactive technology, often combined with artificial intelligence, has rapidly invaded and occupied the world of online chat. Chatbots are not just elements of virtual assistants, but are used by organizations and governments on websites, in applications, and instant messaging platforms to promote products, ideas or services. In this paper, the authors firstly present a theoretical and historical background, then discuss the issues of using chatbots as educational assistants, and finally describe the basic steps and challenges of programming a bot.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"10 1","pages":"000197-000202"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78476262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kincso Tuzes-Boloni, Zsuzsanna Borsay, Csaba Sulyok, Károly Simon
{"title":"Diaspora Mapping and Collaboration Platform for Expatriates","authors":"Kincso Tuzes-Boloni, Zsuzsanna Borsay, Csaba Sulyok, Károly Simon","doi":"10.1109/SISY.2018.8524836","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524836","url":null,"abstract":"In the current globalized world, it is a frequent phenomenon that people from different regions uproot and move to other countries, working and living there temporarily or long-term. But how could the origin regions follow the actual residency of their habitants, and how could they keep the data of the population up to date? The aim of the E-migrated web application is to measure and dynamically visualize the dispersion of specialists originating from a given country. It also gives the opportunity of interconnecting these people and to create a community, encouraging its users to build relationships and cooperate. It is a virtual link for the professionals originating from a common region, independent of current location. This paper aims to present the E-migrated platform, describing the architecture of the system, mentioning the details of the implementation, the main technologies, tools and methods used during the development process. It presents the functionalities of the application, and demonstrates its behavior, using some case studies.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"35 1","pages":"000027-000032"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88171225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Single-Rate and Two-Rate Neural Control Approaches for Coaxial Rotor/Ducted-Fan TUAV for Situational Awareness Applications","authors":"A. Pedai, I. Astrov, A. Udal","doi":"10.1109/SISY.2018.8524720","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524720","url":null,"abstract":"Paper discusses the modeling and control methodologies of a tactical unmanned aerial vehicle (TUAV) of coaxial rotor type with ducted fan via introduction of two-rate control and neural network methods in order to achieve more stabilized flight control. The effectiveness of the proposed single-rate and two-rate control strategies was illustrated and confirmed by numerical simulations of flight maneuvers using programming environment Simulink for chosen model of TUAV. At that earlier developed decomposition methodologies have been applied and adjusted for the actual unmanned aerial vehicle. As the TUAVs are becoming one of the most important information collection devices for the modern situation awareness (SA) systems, the achieved improvements in stabilization of flight trajectories and relevant energy economy enhancements will help to design better SA systems for search, rescue and situation reconnaissance operations.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"4 1","pages":"000063-000068"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91241937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of the Microsoft. Net- and Java-Based Implementation of REST Web Services","authors":"K. Munonye, P. Martinek","doi":"10.1109/SISY.2018.8524705","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524705","url":null,"abstract":"REST APIs could be implemented using Java, Microsoft. Net-based technologies or a PHP framework. This paper compares the performance of REST APIs implemented with Java technologies and Microsoft. Net. Java-based RESTful APIs were implemented using Jersey and deployed on the Apache Tomcat Server. RESTful APIs with the same parameters were implemented also with MS. Net using the. Net Framework 6.0 and were deployed on the Microsoft IIS Server. Performance was evaluated and compared in several test scenarios. The results showed that the. Net API performs better than the Java-based API for the processing of PUT operations. Processing time was 11.6% lower in the case of the. Net API. Contrary the Java-based API gave a better performance for the GET operations by processing 80.36% more records in the same time.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"119 1","pages":"000191-000196"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88536170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Risk Reduction in Operation of Hazardous Programmable Electronic Systems","authors":"D. Gabriska, M. Ölvecký","doi":"10.1109/SISY.2018.8524642","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524642","url":null,"abstract":"Hazardous programmable electronic systems are part of the operating of various industries. The occurrence of unexpected situations or failures in the automated operation environment results in various economic losses as well as possible air pollution or possible health damage. Most of the situations that may affect the work of safety critical systems cause software failures. Therefore, the introduction of hazardous programmable electronic systems into operation is very important for risk analysis, which can contribute to the subsequent reduction of risks.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"67 1","pages":"000123-000126"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78345110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}