71 research outputs found

    Network-Aware AutoML Framework for Software-Defined Sensor Networks

    Full text link
    As the current detection solutions of distributed denial of service attacks (DDoS) need additional infrastructures to handle high aggregate data rates, they are not suitable for sensor networks or the Internet of Things. Besides, the security architecture of software-defined sensor networks needs to pay attention to the vulnerabilities of both software-defined networks and sensor networks. In this paper, we propose a network-aware automated machine learning (AutoML) framework which detects DDoS attacks in software-defined sensor networks. Our framework selects an ideal machine learning algorithm to detect DDoS attacks in network-constrained environments, using metrics such as variable traffic load, heterogeneous traffic rate, and detection time while preventing over-fitting. Our contributions are two-fold: (i) we first investigate the trade-off between the efficiency of ML algorithms and network/traffic state in the scope of DDoS detection. (ii) we design and implement a software architecture containing open-source network tools, with the deployment of multiple ML algorithms. Lastly, we show that under the denial of service attacks, our framework ensures the traffic packets are still delivered within the network with additional delays

    Information Technology Firms: Creating Value through Digital Disruption

    Get PDF
    Information technology (IT) firms compose the majority of the most highly valued corporations in the world based on market capitalization. To date, only Apple and Amazon—both IT companies—have reached or nearly reached a USD trillion-dollar market capitalization. The value that IT provides speaks to how managers exploit disruptive technologies to create value in both IT and non-IT firms. A panel held at the 2018 Americas Conference on Information Systems (AMCIS) discussed various ways in firms build value around IT through successful management. This paper reports on the panel discussion from a variety of perspectives, which include practitioner and researcher worldviews. This panel report also provides a sample frame that researchers can use in quantitative research involving IT firms and advocates for increased research to understand the wide range of strategies IT firms use to create value

    Malicious node detection using machine learning and distributed data storage using blockchain in WSNs

    Get PDF
    In the proposed work, blockchain is implemented on the Base Stations (BSs) and Cluster Heads (CHs) to register the nodes using their credentials and also to tackle various security issues. Moreover, a Machine Learning (ML) classifier, termed as Histogram Gradient Boost (HGB), is employed on the BSs to classify the nodes as malicious or legitimate. In case, the node is found to be malicious, its registration is revoked from the network. Whereas, if a node is found to be legitimate, then its data is stored in an Interplanetary File System (IPFS). IPFS stores the data in the form of chunks and generates hash for the data, which is then stored in blockchain. In addition, Verifiable Byzantine Fault Tolerance (VBFT) is used instead of Proof of Work (PoW) to perform consensus and validate transactions. Also, extensive simulations are performed using the Wireless Sensor Network (WSN) dataset, referred as WSN-DS. The proposed model is evaluated both on the original dataset and the balanced dataset. Furthermore, HGB is compared with other existing classifiers, Adaptive Boost (AdaBoost), Gradient Boost (GB), Linear Discriminant Analysis (LDA), Extreme Gradient Boost (XGB) and ridge, using different performance metrics like accuracy, precision, recall, micro-F1 score and macro-F1 score. The performance evaluation of HGB shows that it outperforms GB, AdaBoost, LDA, XGB and Ridge by 2-4%, 8-10%, 12-14%, 3-5% and 14-16%, respectively. Moreover, the results with balanced dataset are better than those with original dataset. Also, VBFT performs 20-30% better than PoW. Overall, the proposed model performs efficiently in terms of malicious node detection and secure data storage. © 2013 IEEE

    TaDaa: real time Ticket Assignment Deep learning Auto Advisor for customer support, help desk, and issue ticketing systems

    Full text link
    This paper proposes TaDaa: Ticket Assignment Deep learning Auto Advisor, which leverages the latest Transformers models and machine learning techniques quickly assign issues within an organization, like customer support, help desk and alike issue ticketing systems. The project provides functionality to 1) assign an issue to the correct group, 2) assign an issue to the best resolver, and 3) provide the most relevant previously solved tickets to resolvers. We leverage one ticketing system sample dataset, with over 3k+ groups and over 10k+ resolvers to obtain a 95.2% top 3 accuracy on group suggestions and a 79.0% top 5 accuracy on resolver suggestions. We hope this research will greatly improve average issue resolution time on customer support, help desk, and issue ticketing systems

    Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030

    Get PDF
    The transition of the networks to support forthcoming beyond 5G (B5G) and 6G services introduces a number of important architectural challenges that force an evolution of existing operational frameworks. Current networks have introduced technical paradigms such as network virtualization, programmability and slicing, being a trend known as network softwarization. Forthcoming B5G and 6G services imposing stringent requirements will motivate a new radical change, augmenting those paradigms with the idea of smartness, pursuing an overall optimization on the usage of network and compute resources in a zero-trust environment. This paper presents a modular architecture under the concept of Convergent and UBiquitous Intelligent Connectivity (CUBIC), conceived to facilitate the aforementioned transition. CUBIC intends to investigate and innovate on the usage, combination and development of novel technologies to accompany the migration of existing networks towards Convergent and Ubiquitous Intelligent Connectivity (CUBIC) solutions, leveraging Artificial Intelligence (AI) mechanisms and Machine Learning (ML) tools in a totally secure environment

    The role of sentiment analysis in forecasting successful ICOs

    Get PDF
    I explored the potential of Sentiment Analysis (SA) infore casting successful initial coin offerings (ICOs). The aim is to determine if the SA and Twitter data alone, and in combination with TORD, a publicly available database Paul P. 2021, can evaluate the success of ICOs. Hence, I provided background information on the initial coin offering (ICO) market and cryptocurrencies, followed by a thorough literature review on SA and the main success factors of ICOs.Then, I finally presented the research project results, including the use of SA methodologies, data cleaning, graphical, and predictive analysis. Along with the conclusions with personal insights on the result

    Artificial intelligence and blockchain integration in business: Trends from a bibliometric-content analysis

    Get PDF
    YesArtificial intelligence (AI) and blockchain are the two disruptive technologies emerging from the Fourth Industrial Revolution (IR4.0) that have introduced radical shifts in the industry. The amalgamation of AI and blockchain holds tremendous potential to create new business models enabled through digitalization. Although research on the application and convergence of AI and blockchain exists, our understanding of the utility of its integration for business remains fragmented. To address this gap, this study aims to characterize the applications and benefits of integrated AI and blockchain platforms across different verticals of business. Using bibliometric analysis, this study reveals the most influential articles on the subject based on their publications, citations, and importance in the intellectual network. Using content analysis, this study sheds light on the subject’s intellectual structure, which is underpinned by four major thematic clusters focusing on supply chains, healthcare, secure transactions, and finance and accounting. The study concludes with 10 application areas in business that can benefit from these technologies

    19th SC@RUG 2022 proceedings 2021-2022

    Get PDF

    19th SC@RUG 2022 proceedings 2021-2022

    Get PDF
    • …
    corecore