58 research outputs found

    Towards a Runtime Standard-Based Testing Framework for Dynamic Distributed Information Systems

    Get PDF
    International audienceIn this work, we are interested in testing dynamic distributed information systems. That is we consider a decentralized information system which can evolve over time. For this purpose we propose a runtime standard-based test execution platform. The latter is built upon the normalized TTCN-3 specification and implementation testing language. The proposed platform ensures execution of tests cases at runtime. Moreover it considers both structural and behavioral adaptations of the system under test. In addition, it is equipped with a test isolation layer that minimizes the risk of interference between business and testing processes. The platform also generates a minimal subset of test scenarios to execute after each adaptation. Finally, it proposes an optimal strategy to place the TTCN-3 test components among the system execution nodes

    A New Model-Based Framework for Testing Security of IOT Systems in Smart Cities Using Attack Trees and Price Timed Automata

    Get PDF
    International audienceIn this paper we propose a new model-based framework for testing security properties of Internet of Things in Smart Cities. In general a model-based approach consists in extracting test cases from a formal specification either of the system under test or the environment of the considered system in an automatic fashion. Our framework is mainly built on the use of two formalisms namely Attack Trees and Price Timed Automata. An attack tree allows to describe the strategy adopted by the malicious party which intends to violate the security of the considered IOT system. An attack tree is translated into a network of price timed automata. The product of the constructed price timed automata is then computed using the well known UPPAALL platform. The obtained timed automata product serves as input for the adopted test generation algorithm. Moreover our framework takes advantage of the use of the standardized specification and execution testing language TTCN-3. With this respect, the obtained abstract tests are translated into the TTCN-3 format. Finally we propose a cloud-oriented architecture in order to ensure test execution and to collect the generated verdicts

    Economic Denial of Sustainability Attacks Mitigation in the Cloud

    Get PDF
    Cyber security is one of the most attention seeking issues with the increasing advancement of technology specifically when the network availability is threaten by attacks such as Denial of Service attacks (DoS), Distributed DoS attacks (DDoS), and Economic Denial of Sustainability (EDoS). The loss of the availability and accessibility of cloud services have greater impacts than those in the traditional enterprises networks. This paper introduces a new technique to mitigate the impacts of attacks which is called Enhanced DDoS-Mitigation System (Enhanced DDoS-MS) that helps in overcoming the determined security gap. The proposed technique is evaluated experimentally and the result shows that the proposed method adds lower delays as a result of the enhanced security. The paper also suggests some future directions to improve the proposed framework

    Evaluation of Deep Learning and Conventional Approaches for Image Recaptured Detection in Multimedia Forensics

    Get PDF
    Image recaptured from a high-resolution LED screen or a good quality printer is difficult to distinguish from its original counterpart. The forensic community paid less attention to this type of forgery than to other image alterations such as splicing, copy-move, removal, or image retouching. It is significant to develop secure and automatic techniques to distinguish real and recaptured images without prior knowledge. Image manipulation traces can be hidden using recaptured images. For this reason, being able to detect recapture images becomes a hot research topic for a forensic analyst. The attacker can recapture the manipulated images to fool image forensic system. As far as we know, there is no prior research that has examined the pros and cons of up-to-date image recaptured techniques. The main objective of this survey was to succinctly review the recent outcomes in the field of image recaptured detection and investigated the limitations in existing approaches and datasets. The outcome of this study provides several promising directions for further significant research on image recaptured detection. Finally, some of the challenges in the existing datasets and numerous promising directions on recaptured image detection are proposed to demonstrate how these difficulties might be carried into promising directions for future research. We also discussed the existing image recaptured datasets, their limitations, and dataset collection challenges.publishedVersio

    A New Correlation Coefficient for T-Spherical Fuzzy Sets and Its Application in Multicriteria Decision-Making and Pattern Recognition

    Get PDF
    The goal of this paper is to design a new correlation coefficient for -spherical fuzzy sets (TSFSs), which can accurately measure the nature of correlation (i.e., positive and negative) as well as the degree of relationship between TSFS. In order to formulate our proposed idea, we had taken inspiration from the statistical concept of the correlation coefficient. While doing so, we firstly introduce the variance and covariance of two TSFS and then constructed our scheme using these two newly defined notions. The numerical value of our proposed correlation coefficient lies within the interval , as it should be from a statistical point of view, whereas the existing methods cannot measure the negative correlation between TSFS, as their numerical value falls within the interval , which is not reasonable both statistically and intuitively. This aspect has also been thoroughly demonstrated using some numerical examples. The comparison results witnessed the dominance and upper hand of our proposed method over the existing definitions, with reliable and better results. In order to demonstrate the feasibility, usefulness, and practical application, we applied our proposed scheme to solve technical and scientific problems of multicriteria decision-making and pattern recognition. The numerical results show that our proposed scheme is practically suitable, technically applicable, and intuitively reasonable.publishedVersio

    Machine Learning: The Backbone of Intelligent Trade Credit-Based Systems

    Get PDF
    Technology has turned into a significant differentiator in the money and traditional recordkeeping systems for the financial industry. To depict two customers as potential investors, it is mandatory to give the complex innovation that they anticipate and urge to purchase. In any case, it is difficult to keep on top of and be a specialist in each of the new advancements that are accessible. By reappropriating IT administrations, monetary administrations firms can acquire prompt admittance to the most recent ability and direction. Financial systems, along with machine learning (ML) algorithms, are vital for critical concerns like secure financial transactions and automated trading. These are the key to the provision of financial decisions for investors and stakeholders for the firms which are working with the trade credit (TC) approach, in Small and Medium Industries (SMEs). Huge and very sensitive data is processed in a limited time. The trade credit is a reason for more financial gains. The impact of TC with predictive machine learning algorithms is the reason why intelligent and safe revenue generation is the main target of the proposed study. That is, the combination of financial data and technology (FinTech) domains is a potential reason for sales growth and ultimately more profit.publishedVersio

    In the Direction of Service Guarantees for Virtualized Network Functions

    Get PDF
    The trend of consolidating network functions from specialized hardware to software running on virtualization servers brings significant advantages for reducing costs and simplifying service deployment. However, virtualization techniques have significant limitations when it comes to networking as there is no support for guaranteeing that network functions meet their service requirements. In this paper, we present a design for providing service guarantees to virtualized network functions based on rate control. The design is a combination of rate regulation through token bucket filters and the regular scheduling mechanisms in operating systems. It has the attractive property that traffic profiles are maintained throughout a series of network functions, which makes it well suited for service function chaining. We discuss implementation alternatives for the design and demonstrate how it can be implemented on two virtualization platforms: LXC containers and the KVM hypervisor. To evaluate the design, we conduct experiments where we measure throughput and latency using IP forwarders (routers) as examples of virtual network functions. Two significant factors for performance are investigated: the design of token buckets and the packet clustering effect that comes from scheduling. Finally, we demonstrate how performance guarantees are achieved for rate-controlled virtual routers under different scenarios.publishedVersio
    • …
    corecore