281 research outputs found

    Micro Grids for Scalable Media Computing and Intelligence in Distributed Scenarios

    Get PDF

    Usability of a telehealth solution based on TV interaction for the elderly: the VITASENIOR-MT case study

    Get PDF
    Remote monitoring of biometric data in the elderly population is an important asset for improving the quality of life and level of independence of elderly people living alone. However, the design and implementation of health technological solutions often disregard the elderly physiological and psychological abilities, leading to low adoption of these technologies. We evaluate the usability of a remote patient monitoring solution, VITASENIOR-MT, which is based on the interaction with a television set. Twenty senior participants (over 64 years) and a control group of 20 participants underwent systematic tests with the health platform and assessed its usability through several questionnaires. Elderly participants scored high on the usability of the platform, very close to the evaluation of the control group. Sensory, motor and cognitive limitations were the issues that most contributed to the difference in usability assessment between the elderly group and the control group. The solution showed high usability and acceptance regardless of age, digital literacy, education and impairments (sensory, motor and cognitive), which shows its effective viability for use and implementation as a consumer product in the senior market.This work has been financially supported by the Portuguese foundation for science and technology (FCT) and European funds through Project VITASENIOR-MT with grant CENTRO-01-0145-FEDER-023659.info:eu-repo/semantics/publishedVersio

    Machine learning based botnet identification traffic

    Get PDF
    The continued growth of the Internet has resulted in the increasing sophistication of toolkit and methods to conduct computer attacks and intrusions that are easy to use and publicly available to download, such as Zeus botnet toolkit. Botnets are responsible for many cyber-attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most of existence botnet toolkits release updates for new features, development and support. This presents challenges in the detection and prevention of bots. Current botnet detection approaches mostly ineffective as botnets change their Command and Control (C&C) server structures, centralized (e.g., IRC, HTTP), distributed (e.g., P2P), and encryption deterrent. In this paper, based on real world data sets we present our preliminary research on predicting the new bots before they launch their attack. We propose a rich set of features of network traffic using Classification of Network Information Flow Analysis (CONIFA) framework to capture regularities in C&C communication channels and malicious traffic. We present a case study of applying the approach to a popular botnet toolkit, Zeus. The experimental evaluation suggest that it is possible to detect effectively botnets during the botnet C&C communication generated from new updated Zeus botnet toolkit by building the classifier using machine learning from an earlier version and before they launch their attacks using traffic behaviors. Also, show that there is similarity in C&C structures various Botnet toolkit versions and that the network characteristics of botnet C&C traffic is different from legitimate network traffic. Such methods could reduce many different resources needed to identify C&C communication channels and malicious traffic

    Fenrir: Blockchain-based Inter-company App-Store for the Automotive Industry

    Get PDF
    International audienceFrom a software evolution perspective, more actors are integrating the in-vehicle software development cycle. In this process, software deployment mechanisms must include more complex techniques to meet the software verification and traceability levels required by industry safety and security constraints. In this context, we propose Fenrir, a public inter-automaker blockchain-based application store framework in which each automaker retains software installability control. This application store also aims to ensure traceability and security, while also keeping the solution light in terms of both energy consumption and computing requirements, to be used in constrained environments. We implemented Fenrir in a heterogeneous architecture composed of both on-board (bearing an ARM Cortex-A53 chipset, already deployed in cars) and off-board (Amazon EC2) nodes for a realistic automotive use-case scenario, in which we evaluated its performance and energy consumption. We demonstrate that the overheads added by our solution for an entire software deployment pipeline-comprising both deployment and usage of already deployed software packages-depends mainly on the verification mechanism, whose impact is not significant, i.e., 3.8% for the worst-case scenario and 0.3% for a typical scenario

    Cyber-offenders versus traditional offenders: An empirical comparison

    Get PDF
    Bernasco, W. [Promotor]Ruiter, S. [Promotor]Gelder, J.-.L. van [Copromotor

    Machine learning based botnet identification traffic

    Get PDF
    The continued growth of the Internet has resulted in the increasing sophistication of toolkit and methods to conduct computer attacks and intrusions that are easy to use and publicly available to download, such as Zeus botnet toolkit. Botnets are responsible for many cyber-attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most of existence botnet toolkits release updates for new features, development and support. This presents challenges in the detection and prevention of bots. Current botnet detection approaches mostly ineffective as botnets change their Command and Control (C&C) server structures, centralized (e.g., IRC, HTTP), distributed (e.g., P2P), and encryption deterrent. In this paper, based on real world data sets we present our preliminary research on predicting the new bots before they launch their attack. We propose a rich set of features of network traffic using Classification of Network Information Flow Analysis (CONIFA) framework to capture regularities in C&C communication channels and malicious traffic. We present a case study of applying the approach to a popular botnet toolkit, Zeus. The experimental evaluation suggest that it is possible to detect effectively botnets during the botnet C&C communication generated from new updated Zeus botnet toolkit by building the classifier using machine learning from an earlier version and before they launch their attacks using traffic behaviors. Also, show that there is similarity in C&C structures various Botnet toolkit versions and that the network characteristics of botnet C&C traffic is different from legitimate network traffic. Such methods could reduce many different resources needed to identify C&C communication channels and malicious traffic

    Deliverable D8.2 First market analysis

    Get PDF
    This deliverable provides an overview of a first market analysis of the IPTV market. It points out possible customers, competitors and the differences between LinkedTV and their competitive firms

    From the Smart City to the Smart Community, Model and Architecture of a Real Project: SensorNet

    Get PDF
    This article presents a conceptual, architectural and organizational model for the realization of a smart city based on a holistic paradigm as its cornerstone and on the new technologies as its enabling tools. The model is based on the concept of integration of the data belonging to different systems, through the development of a middleware, which allows the retrieval of data from various sources and their storage in a standard format in a new centralized database. The article also illustrates a real project concerning the integration of different sensor networks for the environmental monitoring that exemplifies and implements the main topics discussed. The issues related to its "governance" are also highlighted, not only from a strategic point of view, but also, and above all, from the perspective of its maintenance, which is an important and crucial feature for its "survival" over time
    • …
    corecore