27 research outputs found

    A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash

    Full text link
    This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the possible attacks against GPSR and security solutions proposed by different research teams working on ad hoc network security. Then, we propose a solution to secure GPSR packet by adding a digital signature based on symmetric cryptography generated using the AES algorithm and the MD5 hash function more suited to a mobile environment

    Interaction signatures and action templates in the ODP computational viewpoint

    Get PDF
    International audienceIn this work we raise two issues that we came across when aiming to formalize both interaction signatures and action templates within the ODP computational viewpoint. We discuss these two concepts and present a way to formalize them by introducing a new term to formal descriptions of interaction signatures. In the same spirit as other works, our aim is to address issues concerning how concepts of the ODP computational viewpoint are currently defined as we present some solutions to their formalisation. If required, our work aim to serve as a step to help improve or change the current process of formalizing the ODP computational viewpoint concepts using the UML language

    Towards a refinement of the open distributed systems interactions signatures

    Get PDF
    International audienceThe ODP framework defines a set of concepts and an architecture for the construction of ODP systems in terms of five viewpoints. The computational viewpoint supports three models of interaction, each of which has an associated kind of computational interface: signals and signal interfaces, flows and stream interfaces, operations and operation interfaces. In this paper we address both the functional decomposition and constraints specification on interactions signatures. We show how to refine an operation signature into a signal signature. And finally, we use OCL to express constraints on interaction signatures refinements. The result is an UML model which can serve as a basis to define end-to-end QoS in open distributed systems, and the operation of multi-party binding and bindings between different kinds of interfaces (e.g. stream to operation interface bindings). That is, QoS require-ments on interactions in the computational viewpoint might be specified just using signals. We are investigating this issue

    A Binary-based MapReduce Analysis for Cloud Logs

    Get PDF
    Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in size and variety of formats. In this paper, we propose a binary-based approach for frequency mining correlated attacks in log data. This approach is conceived to work using the MapReduce programming model. Initial experimental results are presented and they serve as the subject of a data mining algorithm to help us predict the likelihood of correlated attacks taking place

    A Binary-based MapReduce Analysis for Cloud Logs

    Get PDF
    Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in size and variety of formats. In this paper, we propose a binary-based approach for frequency mining correlated attacks in log data. This approach is conceived to work using the MapReduce programming model. Initial experimental results are presented and they serve as the subject of a data mining algorithm to help us predict the likelihood of correlated attacks taking place

    Contribution Ă  la SĂ©curisation du protocole de routage ‘’Greedy Perimeter Stateless Routing ‘’ Ă  l'aide de l'algorithme AES et du hachage MD5

    Get PDF
    Ce travail prĂ©sente une contribution pour sĂ©curiser le protocole de routage GPSR (Greedy Perimeter Stateless Routing ) pour les rĂ©seaux ad hoc vĂ©hiculaire, nous examinons dans un premier temps les attaques possibles contre GPSR et les solutions de sĂ©curitĂ© proposĂ©es par les diffĂ©rentes Ă©quipes de recherche travaillant sur la sĂ©curitĂ© des rĂ©seaux ad hoc. Ensuite, nous proposons une solution pour sĂ©curiser GPSR en ajoutant au paquet GPSR une signature numĂ©rique basĂ©e sur la cryptographie symĂ©trique gĂ©nĂ©rĂ©es Ă  l’aide de l’algorithme AES et la fonction de hachage MD5 plus adaptĂ© Ă  un environnement mobile

    A novel approach in detecting intrusions using NSLKDD database and MapReduce programming

    Get PDF
    Due to the increasing usage of the cloud computing architecture, computer systems are facing many security challenges that render sensitive data visible and available to be counterfeited by malicious users and especially intruders. Log files are generated at every level of the computing infrastructure and represent a valuable source of information in detecting attacks. The main goal of this work is the identifiction and prediction of attacks and malicious behaviors by analyzing, classifying and labeling recorded activities in log files. This paper uses MapReduce programming to prior each user behavior, it also employs K-Means algorithm to cluster unknown events and K-NN supervised learning on NSLKDD database to define unlabelled classes

    Hybrid Email Spam Detection Model Using Artificial Intelligence

    Get PDF
    The growing volume of spam Emails has generated the need for a more precise anti-spam filter to detect unsolicited Emails. One of the most common representations used in spam filters is the Bag-of-Words (BOW). Although BOW is very effective in the classification of the emails, it has a number of weaknesses. In this paper, we present a hybrid approach to spam filtering based on the Neural Network model Paragraph Vector-Distributed Memory (PV-DM). We use PV-DM to build up a compact representation of the context of an email and also of its pertinent features. This methodology represents a more comprehensive filter for classifying Emails. Furthermore, we have conducted an empirical experiment using Enron spam and Ling spam datasets, the results of which indicate that our proposed filter outperforms the PV-DM and the BOW email classification methods

    Specification formelle du controle d'acces a des documents electroniques et implementation en prolog

    No full text
    SIGLEINIST T 76587 / INIST-CNRS - Institut de l'Information Scientifique et TechniqueFRFranc
    corecore