28 research outputs found
A Contribution to Secure the Routing Protocol "Greedy Perimeter Stateless Routing" Using a Symmetric Signature-Based AES and MD5 Hash
This work presents a contribution to secure the routing protocol GPSR (Greedy
Perimeter Stateless Routing) for vehicular ad hoc networks, we examine the
possible attacks against GPSR and security solutions proposed by different
research teams working on ad hoc network security. Then, we propose a solution
to secure GPSR packet by adding a digital signature based on symmetric
cryptography generated using the AES algorithm and the MD5 hash function more
suited to a mobile environment
Interaction signatures and action templates in the ODP computational viewpoint
International audienceIn this work we raise two issues that we came across when aiming to formalize both interaction signatures and action templates within the ODP computational viewpoint. We discuss these two concepts and present a way to formalize them by introducing a new term to formal descriptions of interaction signatures. In the same spirit as other works, our aim is to address issues concerning how concepts of the ODP computational viewpoint are currently defined as we present some solutions to their formalisation. If required, our work aim to serve as a step to help improve or change the current process of formalizing the ODP computational viewpoint concepts using the UML language
Towards a refinement of the open distributed systems interactions signatures
International audienceThe ODP framework defines a set of concepts and an architecture for the construction of ODP systems in terms of five viewpoints. The computational viewpoint supports three models of interaction, each of which has an associated kind of computational interface: signals and signal interfaces, flows and stream interfaces, operations and operation interfaces. In this paper we address both the functional decomposition and constraints specification on interactions signatures. We show how to refine an operation signature into a signal signature. And finally, we use OCL to express constraints on interaction signatures refinements. The result is an UML model which can serve as a basis to define end-to-end QoS in open distributed systems, and the operation of multi-party binding and bindings between different kinds of interfaces (e.g. stream to operation interface bindings). That is, QoS require-ments on interactions in the computational viewpoint might be specified just using signals. We are investigating this issue
A Binary-based MapReduce Analysis for Cloud Logs
Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in size and variety of formats. In this paper, we propose a binary-based approach for frequency mining correlated attacks in log data. This approach is conceived to work using the MapReduce programming model. Initial experimental results are presented and they serve as the subject of a data mining algorithm to help us predict the likelihood of correlated attacks taking place
A Binary-based MapReduce Analysis for Cloud Logs
Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in size and variety of formats. In this paper, we propose a binary-based approach for frequency mining correlated attacks in log data. This approach is conceived to work using the MapReduce programming model. Initial experimental results are presented and they serve as the subject of a data mining algorithm to help us predict the likelihood of correlated attacks taking place
Contribution Ă la SĂ©curisation du protocole de routage ââGreedy Perimeter Stateless Routing ââ Ă l'aide de l'algorithme AES et du hachage MD5
Ce travail prĂ©sente une contribution pour sĂ©curiser le protocole de routage GPSR (Greedy Perimeter Stateless Routing ) pour les rĂ©seaux ad hoc vĂ©hiculaire, nous examinons dans un premier temps les attaques possibles contre GPSR et les solutions de sĂ©curitĂ© proposĂ©es par les diffĂ©rentes Ă©quipes de recherche travaillant sur la sĂ©curitĂ© des rĂ©seaux ad hoc. Ensuite, nous proposons une solution pour sĂ©curiser GPSR en ajoutant au paquet GPSR une signature numĂ©rique basĂ©e sur la cryptographie symĂ©trique gĂ©nĂ©rĂ©es Ă lâaide de lâalgorithme AES et la fonction de hachage MD5 plus adaptĂ© Ă un environnement mobile
A novel approach in detecting intrusions using NSLKDD database and MapReduce programming
Due to the increasing usage of the cloud computing architecture, computer systems are facing many security challenges that render sensitive data visible and available to be counterfeited by malicious users and especially intruders. Log files are generated at every level of the computing infrastructure and represent a valuable source of information in detecting attacks. The main goal of this work is the identifiction and prediction of attacks and malicious behaviors by analyzing, classifying and labeling recorded activities in log files. This paper uses MapReduce programming to prior each user behavior, it also employs K-Means algorithm to cluster unknown events and K-NN supervised learning on NSLKDD database to define unlabelled classes
Hybrid Email Spam Detection Model Using Artificial Intelligence
The growing volume of spam Emails has generated the need for a more precise anti-spam filter to detect unsolicited Emails. One of the most common representations used in spam filters is the Bag-of-Words (BOW). Although BOW is very effective in the classification of the emails, it has a number of weaknesses. In this paper, we present a hybrid approach to spam filtering based on the Neural Network model Paragraph Vector-Distributed Memory (PV-DM). We use PV-DM to build up a compact representation of the context of an email and also of its pertinent features. This methodology represents a more comprehensive filter for classifying Emails. Furthermore, we have conducted an empirical experiment using Enron spam and Ling spam datasets, the results of which indicate that our proposed filter outperforms the PV-DM and the BOW email classification methods
Specification formelle du controle d'acces a des documents electroniques et implementation en prolog
SIGLEINIST T 76587 / INIST-CNRS - Institut de l'Information Scientifique et TechniqueFRFranc