-
Identifying elephant flows using dynamic thresholds in programmable IXP networks J. Internet Serv. Appl. Pub Date : 2020-12-10 Marcus Vinicius Brito da Silva; Jonatas Adilson Marques; Luciano Paschoal Gaspary; Lisandro Zambenedetti Granville
Internet eXchange Points (IXPs) are Internet infrastructures composed of high-performance networks that allow multiple autonomous systems to exchange traffic. Given the challenges of managing the flows that cross an IXP, identifying elephant flows may help improve the quality of services provided to its participants. In this context, we leverage the new flexibility and resources of programmable data
-
Multi-factor authentication for shibboleth identity providers J. Internet Serv. Appl. Pub Date : 2020-12-02 Emerson Ribeiro de Mello; Michelle Silva Wangham; Samuel Bristot Loli; Carlos Eduardo da Silva; Gabriela Cavalcanti da Silva; Shirlei Aparecida de Chaves; Bruno Bristot Loli
The federated identity model provides a solution for user authentication across multiple administrative domains. The academic federations, such as the Brazilian federation, are examples of this model in practice. The majority of institutions that participate in academic federations employ password-based authentication for their users, with an attacker only needing to find out one password in order
-
QoS-driven scheduling in the cloud J. Internet Serv. Appl. Pub Date : 2020-11-11 Giovanni Farias da Silva; Francisco Brasileiro; Raquel Lopes; Fabio Morais; Marcus Carvalho; Daniel Turull
Priority-based scheduling policies are commonly used to guarantee that requests submitted to the different service classes offered by cloud providers achieve the desired Quality of Service (QoS). However, the QoS delivered during resource contention periods may be unfair on certain requests. In particular, lower priority requests may have their resources preempted to accommodate resources associated
-
Ensemble mobility predictor based on random forest and Markovian property using LBSN data J. Internet Serv. Appl. Pub Date : 2020-11-05 Felipe Araújo; Fábio Araújo; Kássio Machado; Denis Rosário; Eduardo Cerqueira; Leandro A. Villas
The ubiquitous connectivity of Location-Based Systems (LBS) allows people to share individual location-related data anytime. In this sense, Location-Based Social Networks (LBSN) provides valuable information to be available in large-scale and low-cost fashion via traditional data collection methods. Moreover, this data contains spatial, temporal, and social features of user activity, enabling a system
-
A survey on data analysis on large-Scale wireless networks: online stream processing, trends, and challenges J. Internet Serv. Appl. Pub Date : 2020-10-19 Dianne S. V. Medeiros; Helio N. Cunha Neto; Martin Andreoni Lopez; Luiz Claudio S. Magalhães; Natalia C. Fernandes; Alex B. Vieira; Edelberto F. Silva; Diogo M. F. Mattos
In this paper we focus on knowledge extraction from large-scale wireless networks through stream processing. We present the primary methods for sampling, data collection, and monitoring of wireless networks and we characterize knowledge extraction as a machine learning problem on big data stream processing. We show the main trends in big data stream processing frameworks. Additionally, we explore the
-
Provision of adaptive guard band in elastic optical networks J. Internet Serv. Appl. Pub Date : 2020-10-14 Neclyeux S. Monteiro; Alexandre C. Fontinele; Divanilson R. Campelo; André Soares
Elastic optical networks are a network infrastructure capable of withstanding the high demand for data traffic from high-speed networks. One of the problems that must be solved to ensure the smooth functioning of the network is called Routing, Modulation Level and Spectrum Assignment (RMLSA). This work aims to propose a new approach to this problem with an algorithm to select the guard band in an adaptive
-
Evaluating flight coordination approaches of UAV squads for WSN data collection enhancing the internet range on WSN data collection J. Internet Serv. Appl. Pub Date : 2020-07-21 Bruno José Olivieri de Souza; Markus Endler
Wireless sensor networks (WSNs) are an important means of collecting data in a variety of situations, such as the monitoring of large or hazardous areas. The retrieval of WSN data can yield better results through the use of unmanned aerial vehicles (UAVs), for example, concerning the increase in the amount of data collected and the decrease in the time between the collection and use of the data. In
-
Adaptive middleware in go - a software architecture-based approach J. Internet Serv. Appl. Pub Date : 2020-05-14 Nelson Rosa; David Cavalcanti; Gláucia Campos; André Silva
Adaptive middleware is essential for developing distributed systems in several applications domains. The design and implementation of this kind of middleware, however, it is still a challenge due to general adaptation issues, such as When to adapt? Where to include the adaptation code? What to adapt?, and How to guarantee safe adaptations?. Current solutions commonly face these challenges at the implementation
-
Dynamic adaptation of service-based applications: a design for adaptation approach J. Internet Serv. Appl. Pub Date : 2020-03-27 Martina De Sanctis; Antonio Bucchiarone; Annapaola Marconi
A key challenge posed by the Next Generation Internet landscape is that modern service-based applications need to cope with open and continuously evolving environments and to operate under dynamic circumstances (e.g., changes in the users requirements, changes in the availability of resources). Indeed, dynamically discover, select and compose the appropriate services in such environment is a challenging
-
A brief survey on replica consistency in cloud environments J. Internet Serv. Appl. Pub Date : 2020-02-21 Robson A. Campêlo; Marco A. Casanova; Dorgival O. Guedes; Alberto H. F. Laender
Cloud computing is a general term that involves delivering hosted services over the Internet. With the accelerated growth of the volume of data used by applications, many organizations have moved their data into cloud servers to provide scalable, reliable and highly available services. A particularly challenging issue that arises in the context of cloud storage systems with geographically-distributed
-
What to expect, and how to improve online discussion forums: the instructors’ perspective J. Internet Serv. Appl. Pub Date : 2019-12-04 Dhanielly P. R. de Lima; Marco A. Gerosa; Tayana U. Conte; José Francisco de M. Netto
Online discussion forums are asynchronous communication tools that are widely used in Learning Management Systems. However, instructors and students face various difficulties, and instructors lack a guide on what strategies they can use to achieve a more participatory forum environment. This work aims to identify benefits and difficulties of using online discussion forums from the instructors’ point
-
DOD-ETL: distributed on-demand ETL for near real-time business intelligence J. Internet Serv. Appl. Pub Date : 2019-11-20 Gustavo V. Machado; Ítalo Cunha; Adriano C. M. Pereira; Leonardo B. Oliveira
The competitive dynamics of the globalized market demand information on the internal and external reality of corporations. Information is a precious asset and is responsible for establishing key advantages to enable companies to maintain their leadership. However, reliable, rich information is no longer the only goal. The time frame to extract information from data determines its usefulness. This work
-
Evaluating CRoS-NDN: a comparative performance analysis of a controller-based routing scheme for named-data networking J. Internet Serv. Appl. Pub Date : 2019-11-09 João Vitor Torres; Igor Drummond Alvarenga; Raouf Boutaba; Otto Carlos Muniz Bandeira Duarte
The huge amount of content names available in Named-Data Networking (NDN) challenges both the required routing table size and the techniques for locating and forwarding information. Content copies and content mobility exacerbate the scalability challenge to reach content in the new locations. We present and analyze the performance of a proposed Controller-based Routing Scheme, named CRoS-NDN, which
-
Upgrading a high performance computing environment for massive data processing J. Internet Serv. Appl. Pub Date : 2019-10-16 Lucas M. Ponce; Walter dos Santos; Wagner Meira; Dorgival Guedes; Daniele Lezzi; Rosa M. Badia
High-performance computing (HPC) and massive data processing (Big Data) are two trends that are beginning to converge. In that process, aspects of hardware architectures, systems support and programming paradigms are being revisited from both perspectives. This paper presents our experience on this path of convergence with the proposal of a framework that addresses some of the programming issues derived
-
Better safe than sorry: a vehicular traffic re-routing based on traffic conditions and public safety issues J. Internet Serv. Appl. Pub Date : 2019-09-11 Allan M. de Souza; Torsten Braun; Leonardo C. Botega; Raquel Cabral; Islene C. Garcia; Leandro A. Villas
Vehicular traffic re-routing is the key to provide better traffic mobility. However, taking into account just traffic-related information to recommend better routes for each vehicle is far from achieving the desired requirements of proper transportation management. In this way, context-aware and multi-objective re-routing approaches will play an important role in traffic management. Yet, most procedures
-
Clustering and reliability-driven mitigation of routing attacks in massive IoT systems J. Internet Serv. Appl. Pub Date : 2019-09-06 Aldri L. Santos; Christian A. V. Cervantes; Michele Nogueira; Burak Kantarci
As an integral component of the 5G communications, the massive Internet of Things (IoT) are vulnerable to various routing attacks due to their dynamic infrastructure, distinct computing resources, and heterogeneity of mobile objects. The sinkhole and selective forwarding attacks stand out among the most destructive ones for infrastructureless networks. Despite the countermeasures introduced by legacy
-
Detecting web attacks with end-to-end deep learning J. Internet Serv. Appl. Pub Date : 2019-08-27 Yao Pan; Fangzhou Sun; Zhongwei Teng; Jules White; Douglas C. Schmidt; Jacob Staples; Lee Krause
Web applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected. Existing implementations of intrusion detection systems usually extract features from network packets or string characteristics of input that are manually selected as
-
Efficient data dissemination protocol based on complex networks’ metrics for urban vehicular networks J. Internet Serv. Appl. Pub Date : 2019-08-03 Joahannes B. D. da Costa; Allan M. de Souza; Denis Rosário; Eduardo Cerqueira; Leandro A. Villas
Services that aim to make the current transportation system more secure, sustainable, and efficient constitute the Traffic Management Systems (TMS). Vehicular Ad hoc Networks (VANETs) exert a strong influence for TMS applications, due to TMS services require data, communication, and processing for operation. Besides, VANET allows direct communication between vehicles, and data are exchanged and processed
-
Thematic series on Social Network Analysis and Mining J. Internet Serv. Appl. Pub Date : 2019-07-22 Rodrigo Pereira dos Santos; Giseli Rabello Lopes
Social networks were first investigated in social, educational and business areas. Academic interest in this field though has been growing since the mid twentieth century, given the increasing interaction among people, data dissemination and exchange of information. As such, the development and evaluation of new techniques for social network analysis and mining (SNAM) is a current key research area
-
A participatory sensing framework to classify road surface quality J. Internet Serv. Appl. Pub Date : 2019-07-09 Davidson E. Nunes; Vinicius F. S. Mota
Participatory sensing networks rely on gathering personal data from mobile devices to infer global knowledge. Participatory sensing has been used for real-time traffic monitoring, where the global traffic conditions are based on information provided by individual devices. However, fewer initiatives address asphalt quality conditions, which is an essential aspect of the route decision process. This
-
An optimization-based approach for efficient network monitoring using in-band network telemetry J. Internet Serv. Appl. Pub Date : 2019-06-25 Jonatas Adilson Marques; Marcelo Caggiani Luizelli; Roberto Irajá Tavares da Costa Filho; Luciano Paschoal Gaspary
In recent years, as a result of the proliferation of non-elastic services and the adoption of novel paradigms, monitoring networks with high level of detail is becoming crucial to correctly identify and characterize situations related to faults, performance, and security. In-band Network Telemetry (INT) emerges in this context as a promising approach to meet this demand, enabling production packets
-
Towards business partnership recommendation using user opinion on Facebook J. Internet Serv. Appl. Pub Date : 2019-06-18 Diego P. Tsutsumi; Amanda T. Fenerich; Thiago H. Silva
The identification of strategic business partnerships can potentially provide competitive advantages for businesses; however, due to the dynamics and uncertainty present in business environments, this task could be challenging. To help businesses in this task, this study presents a similarity model between businesses that consider the opinions of users on content shared by businesses on social media
-
A semantic-based discovery service for the Internet of Things J. Internet Serv. Appl. Pub Date : 2019-05-15 Porfírio Gomes; Everton Cavalcante; Thais Batista; Chantal Taconet; Denis Conan; Sophie Chabridon; Flavia C. Delicato; Paulo F. Pires
With the Internet of Things (IoT), applications should interact with a huge number of devices and retrieve context data produced by those objects, which have to be discovered and selected a priori. Due to the number, heterogeneity, and dynamicity of resources, discovery services are required to consider many selection criteria, e.g., device capabilities, location, context data type, contextual situations
-
Multi-objective routing aware of mixed IoT traffic for low-cost wireless Backhauls J. Internet Serv. Appl. Pub Date : 2019-05-01 Vinícius N. Medeiros; Bruno Silvestre; Vinicius C. M. Borges
The futuristic wireless networks expects to provide adequate support for distinct kind of applications, their diverse requirements, and scenarios for future Internet systems, such as Internet of Things based on multimedia and sensor data, while figuring out low cost solutions to offload the mobile communication core. In this context, Low-cost Wireless Backhauls (LWBs) can be useful, since they are
-
DG2CEP: a near real-time on-line algorithm for detecting spatial clusters large data streams through complex event processing J. Internet Serv. Appl. Pub Date : 2019-04-15 Marcos Roriz Junior; Bruno Olivieri; Markus Endler
Spatial concentrations (or spatial clusters) of moving objects, such as vehicles and humans, is a mobility pattern that is relevant to many applications. Fast detection of this pattern and its evolution, e.g., if the cluster is shrinking or growing, is useful in numerous scenarios, such as detecting the formation of traffic jams or detecting a fast dispersion of people in a music concert. On-Line detection
-
Managing to release early, often and on time in the OpenStack software ecosystem J. Internet Serv. Appl. Pub Date : 2019-04-01 José Apolinário Teixeira; Helena Karsten
The dictum of “Release early, release often.” by Eric Raymond as the Linux modus operandi highlights the importance of release management in open source software development. However, there are very few empirical studies addressing release management in this context. It is already known that most open source software communities adopt either a feature-based or time-based release strategy. Both have
-
An agile and effective network function virtualization infrastructure for the Internet of Things J. Internet Serv. Appl. Pub Date : 2019-03-15 Diogo Menezes Ferrazani Mattos; Pedro Braconnot Velloso; Otto Carlos Muniz Bandeira Duarte
The processing and power-consumption constraints of the Internet of Things devices hinder them to offer more complex network services than the simple data transmission in smart city scenarios. The lack of complex services, such as security and quality of service, can even foster disasters in urban centers. In this paper, we propose the integration of complex network services from the IoT devices till
-
GARSAaaS: group activity recognition and situation analysis as a service J. Internet Serv. Appl. Pub Date : 2019-03-01 Amin B. Abkenar; Seng W. Loke; Arkady Zaslavsky; Wenny Rahayu
Human activity recognition using embedded mobile and embedded sensors is becoming increasingly important. Scaling up from individuals to groups, that is, group activity recognition, has attracted significant attention recently. This paper proposes a model and specification language for group activities called GroupSense-L, and a novel architecture called GARSAaaS (GARSA-as-a-Service) to provide services
-
Improving microservice-based applications with runtime placement adaptation J. Internet Serv. Appl. Pub Date : 2019-02-26 Adalberto R. Sampaio; Julia Rubin; Ivan Beschastnikh; Nelson S. Rosa
Microservices are a popular method to design scalable cloud-based applications. Microservice-based applications (μApps) rely on message passing for communication and to decouple each microservice, allowing the logic in each service to scale independently. Complex μApps can contain hundreds of microservices, complicating the ability of DevOps engineers to reason about and automatically optimize the
-
Adaptive placement & chaining of virtual network functions with NFV-PEAR J. Internet Serv. Appl. Pub Date : 2019-02-04 Gustavo Miotto; Marcelo Caggiani Luizelli; Weverton Luis da Costa Cordeiro; Luciano Paschoal Gaspary
The design of flexible and efficient mechanisms for proper placement and chaining of virtual network functions (VNFs) is key for the success of Network Function Virtualization (NFV). Most state-of-the-art solutions, however, consider fixed (and immutable) flow processing and bandwidth requirements when placing VNFs in the Network Points of Presence (N-PoPs). This limitation becomes critical in NFV-enabled
-
SCOPE: self-adaptive and policy-based data management middleware for federated clouds J. Internet Serv. Appl. Pub Date : 2019-01-30 Ansar Rafique; Dimitri Van Landuyt; Eddy Truyen; Vincent Reniers; Wouter Joosen
A federated cloud storage setup which integrates and utilizes storage resources from multiple cloud storage providers has become an increasingly popular and attractive paradigm for the persistence tier in cloud-based applications (e.g., SaaS applications, IoT applications, etc). However, federated cloud storage setups are prone to run-time dynamicity: many dynamic properties impact the way such a setup
-
Pseudonymization risk analysis in distributed systems J. Internet Serv. Appl. Pub Date : 2019-01-08 Geoffrey K. Neumann; Paul Grace; Daniel Burns; Mike Surridge
In an era of big data, online services are becoming increasingly data-centric; they collect, process, analyze and anonymously disclose growing amounts of personal data in the form of pseudonymized data sets. It is crucial that such systems are engineered to both protect individual user (data subject) privacy and give back control of personal data to the user. In terms of pseudonymized data this means
-
Networking architectures and protocols for smart city systems J. Internet Serv. Appl. Pub Date : 2018-12-20 Imad Jawhar; Nader Mohamed; Jameela Al-Jaroodi
The smart city model is used by many organizations for large cities around the world to significantly enhance and improve the quality of life of the inhabitants, improve the utilization of city resources, and reduce operational costs. This model includes various heterogeneous technologies such as Cyber-Physical Systems (CPS), Internet of Things (IoT), Wireless Sensor Networks (WSNs), Cloud Computing
-
Is it possible to describe television series from online comments? J. Internet Serv. Appl. Pub Date : 2018-12-15 Túlio C. Loures; Pedro O. S. Vaz de Melo; Adriano A. Veloso
Due to the omnipresence of the Internet and Social Media in current society, it has become easy to find groups or communities of people discussing the most varied subjects in discussion forums, social network interactions, or comments on web pages. In this paper, we try to answer the question about whether, even when nothing is explicitly known about the entity referred to in the discussion, it is
-
The computer for the 21st century: present security & privacy challenges J. Internet Serv. Appl. Pub Date : 2018-12-04 Leonardo B. Oliveira; Fernando Magno Quintão Pereira; Rafael Misoczki; Diego F. Aranha; Fábio Borges; Michele Nogueira; Michelle Wangham; Min Wu; Jie Liu
Decades went by since Mark Weiser published his influential work on the computer of the 21st century. Over the years, some of the UbiComp features presented in that paper have been gradually adopted by industry players in the technology market. While this technological evolution resulted in many benefits to our society, it has also posed, along the way, countless challenges that we have yet to surpass
-
Graph mining for the detection of overcrowding and waste of resources in public transport J. Internet Serv. Appl. Pub Date : 2018-11-15 Carlos Caminha; Vasco Furtado; Vládia Pinheiro; Caio Ponte
The imbalance between the quantity of supply and demand in public transport systems causes a series of disruptions in large metropolises. While extremely crowded vehicles are uncomfortable for passengers, virtually empty vehicles generate economic losses for system managers, and this usually comes back to passengers in the form of fare increases. In this article a new data processing methodology will
-
A user-driven free speech application for anonymous and verified online, public group discourse J. Internet Serv. Appl. Pub Date : 2018-11-02 Michael Nekrasov; Danny Iland; Miriam Metzger; Lisa Parks; Elizabeth Belding
Online social networks are major hubs of communications that are used to share information by societies worldwide. However, the ability to freely communicate on these platforms is increasingly restricted in countries across the globe and existing technological solutions do not fully address the needs of affected communities. In this paper we explore the design process of SecurePost, a novel tool that
-
Metrics for network power based on Castells’ Network Theory of Power: a case study on Brazilian elections J. Internet Serv. Appl. Pub Date : 2018-10-17 Letícia Verona; Jonice Oliveira; José Vitor da Cunha Hisse; Maria Luiza Machado Campos
The identification of power groups that act within the political structure is a tool for citizens and also a challenging research topic as an unstable and complex force of interests system. This paper presents metrics based on sociologist Manuel Castells’ Network Theory of Power that reflect key factors for evaluating power: the imbalance between relationships; the ability to program the rules and
-
Who is really in my social circle? J. Internet Serv. Appl. Pub Date : 2018-10-03 Jeancarlo C. Leão; Michele A. Brandão; Pedro O. S. Vaz de Melo; Alberto H. F. Laender
Tie strength allows to classify social relationships and identify different types of them. For instance, social relationships can be classified as persistent and similar based respectively on the regularity with which they occur and the similarity among them. On the other hand, rare and somewhat similar relationships are random and cause noise in a social network, thus hiding the actual structure of
-
Self-adaptive authorisation in OpenStack cloud platform J. Internet Serv. Appl. Pub Date : 2018-09-16 Carlos Eduardo Da Silva; Thomás Diniz; Nelio Cacho; Rogério de Lemos
Although major advances have been made in protection of cloud platforms against malicious attacks, little has been done regarding the protection of these platforms against insider threats. This paper looks into this challenge by introducing self-adaptation as a mechanism to handle insider threats in cloud platforms, and this will be demonstrated in the context of OpenStack. OpenStack is a popular cloud
-
Using sentiment analysis to define twitter political users’ classes and their homophily during the 2016 American presidential election J. Internet Serv. Appl. Pub Date : 2018-09-03 Josemar A. Caetano; Hélder S. Lima; Mateus F. Santos; Humberto T. Marques-Neto
This paper proposes an analysis of political homophily among Twitter users during the 2016 American Presidential Election. We collected 4.9 million tweets of 18,450 users and their contact network from August 2016 to November 2016. We defined six user classes regarding their sentiment towards Donald Trump and Hillary Clinton: whatever, Trump supporter, Hillary supporter, positive, neutral, and negative
-
Organizing for openness: six models for developer involvement in hybrid OSS projects J. Internet Serv. Appl. Pub Date : 2018-08-16 Hanna Mäenpää; Simo Mäkinen; Terhi Kilamo; Tommi Mikkonen; Tomi Männistö; Paavo Ritala
This article examines organization and governance of commercially influenced Open Source Software development communities by presenting a multiple-case study of six contemporary, hybrid OSS projects. The findings provide in-depth understanding on how to design the participatory nature of the software development process, while understanding the factors that influence the delicate balance of openness
-
B-space: dynamic management and assurance of open systems of systems J. Internet Serv. Appl. Pub Date : 2018-08-01 Daniel Schneider; Mario Trapp
Connected cars, freely configurable operating rooms, or autonomous harvesting fleets: dynamically emerging open systems of systems will shape a new generation of systems opening up a vast potential for new kinds of applications. In light of the hard-to-predict structure and behavior of such systems, assuring their safety will require some disruptive changes of established safety paradigms. Combining
-
Fog orchestration for the Internet of Everything: state-of-the-art and research challenges J. Internet Serv. Appl. Pub Date : 2018-07-18 Karima Velasquez; David Perez Abreu; Marcio R. M. Assis; Carlos Senna; Diego F. Aranha; Luiz F. Bittencourt; Nuno Laranjeiro; Marilia Curado; Marco Vieira; Edmundo Monteiro; Edmundo Madeira
Recent developments in telecommunications have allowed drawing new paradigms, including the Internet of Everything, to provide services by the interconnection of different physical devices enabling the exchange of data to enrich and automate people’s daily activities; and Fog computing, which is an extension of the well-known Cloud computing, bringing tasks to the edge of the network exploiting characteristics
-
Conflict-free rerouting scheme through flow splitting for virtual networks using switches J. Internet Serv. Appl. Pub Date : 2018-07-02 Vianney Kengne Tchendji; Yannick Florian Yankam; Jean Frédéric Myoupo
The weaknesses of the Internet led to the creation of a new network paradigm – network virtualization. Virtualization is a very successful technique for sharing and reusing resources, which results in higher efficiency. Despite its advantages, including flexibility in network architecture, virtualization imposes many challenges, such as physical resource allocation to virtual devices. An efficient
-
A comprehensive survey on machine learning for networking: evolution, applications and research opportunities J. Internet Serv. Appl. Pub Date : 2018-06-21 Raouf Boutaba; Mohammad A. Salahuddin; Noura Limam; Sara Ayoubi; Nashid Shahriar; Felipe Estrada-Solano; Oscar M. Caicedo
Machine Learning (ML) has been enjoying an unprecedented surge in applications that solve problems and enable automation in diverse domains. Primarily, this is due to the explosion in the availability of data, significant improvements in ML techniques, and advancement in computing capabilities. Undoubtedly, ML has been applied to various mundane and complex problems arising in network operation and
-
A new approach to deploy a self-adaptive distributed firewall J. Internet Serv. Appl. Pub Date : 2018-06-04 Edmilson P. da Costa Júnior; Carlos Eduardo da Silva; Marcos Pinheiro; Silvio Sampaio
Distributed firewall systems emerged with the proposal of protecting individual hosts against attacks originating from inside the network. In these systems, firewall rules are centrally created, then distributed and enforced on all servers that compose the firewall, restricting which services will be available. However, this approach lacks protection against software vulnerabilities that can make network
-
Insights on the large-scale deployment of a curated Web-of-Trust: the Debian project’s cryptographic keyring J. Internet Serv. Appl. Pub Date : 2018-05-16 Gunnar Wolf; Víctor González Quiroga
The Debian project is one of the largest free software undertakings worldwide. It is geographically distributed, and participation in the project is done on a voluntary basis, without a single formal employee or directly funded person. As we will explain, due to the nature of the project, its authentication needs are very strict - User/password schemes are way surpassed, and centralized trust management
-
Recovering user-interactions of Rich Internet Applications through replaying of HTTP traces J. Internet Serv. Appl. Pub Date : 2018-05-02 Salman Hooshmand; Gregor V. Bochmann; Guy-Vincent Jourdan; Russell Couturier; Iosif-Viorel Onut
In this paper, we study the “Session Reconstruction” problem which is the reconstruction of user interactions from recorded request/response logs of a session. The reconstruction is especially useful when the only available information about the session is its HTTP trace, as could be the case during a forensic analysis of an attack on a website. Solutions to the reconstruction problem do exist for
-
Thematic series on Verification and Composition for the Internet of Services and Things J. Internet Serv. Appl. Pub Date : 2018-04-17 Marco Autili; Dimitra Giannakopoulou; Massimo Tivoli
The Internet of Services and Things is characterized as a distributed computing environment that will be populated by a large number of software services and things. Within this context, software systems will increasingly be built by reusing and composing together software services and things distributed over the Internet. This calls for new integration paradigms and patterns, formal composition theories
-
Security and privacy aware data aggregation on cloud computing J. Internet Serv. Appl. Pub Date : 2018-04-02 Leandro V. Silva; Pedro Barbosa; Rodolfo Marinho; Andrey Brito
The use of cloud computing has become common due to advantages such as low cost and sizing of computing resources according to demand. However, it also raises security and privacy concerns, because critical data – for example, in IoT applications – are stored and processed in the cloud. This paper proposes a software architecture that supports multiple approaches to secure data aggregation. For validation
-
EZ-AG: structure-free data aggregation in MANETs using push-assisted self-repelling random walks J. Internet Serv. Appl. Pub Date : 2018-03-15 V. Kulathumani; M. Nakagawa; A. Arora
This paper describes EZ-AG, a structure-free protocol for duplicate insensitive data aggregation in MANETs. The key idea in EZ-AG is to introduce a token that performs a self-repelling random walk in the network and aggregates information from nodes when they are visited for the first time. A self-repelling random walk of a token on a graph is one in which at each step, the token moves to a neighbor
-
BROAD-RSI – educational recommender system using social networks interactions and linked data J. Internet Serv. Appl. Pub Date : 2018-03-05 Crystiam Kelle Pereira; Fernanda Campos; Victor Ströele; José Maria N. David; Regina Braga
There are several educational resources distributed in different repositories that address to a wide range of subjects and different educational goals. The proper choice of these educational resources is a challenge. Recommendation systems may help users in this task. In order to generate personalized recommendations, it is important to identify information that will help to define user profile and
-
Support mechanisms provided by FLOSS foundations and other entities J. Internet Serv. Appl. Pub Date : 2018-02-22 Juho Lindman; Imed Hammouda
Foundations function as a vital institutional support infrastructure for many of the most successful open-source projects, but the different roles played by these support entities are understudied in Free/Libre and Open Source Software (FLOSS) research. Drawing on Open Hub (formerly known as Ohloh) data, this paper empirically investigates how these entities support projects and interact with other
-
High-performance IP lookup using Intel Xeon Phi: a Bloom filters based approach J. Internet Serv. Appl. Pub Date : 2018-02-19 Alexandre Lucchesi; André C. Drummond; George Teodoro
IP lookup is a core operation in packet forwarding, which is implemented using a Longest Prefix Matching (LPM) algorithm to find the next hop for an input address. This work proposes and evaluates the use of parallel processors to deploy an optimized IP lookup algorithm based on Bloom filters. We target the implementation on the Intel Xeon Phi (Intel Phi) many-core coprocessor and on multi-core CPUs
-
A controller design for mitigation of passive system identification attacks in networked control systems J. Internet Serv. Appl. Pub Date : 2018-02-05 Alan O. de Sá; Luiz F. R. da Costa Carmo; Raphael C. S. Machado
The literature regarding attacks in Networked Control Systems (NCS) indicates that covert and accurate attacks must be designed based on an accurate knowledge about the model of the attacked system. In this context, the literature on NCS presents the Passive System Identification attack as a metaheuristic-based tool to provide the attacker with the required system models. However, the scientific literature
-
Environment for integration of distributed heterogeneous computing systems J. Internet Serv. Appl. Pub Date : 2018-01-16 Thiago W. B. Silva; Daniel C. Morais; Halamo G. R. Andrade; Antonio M. N. Lima; Elmar U. K. Melcher; Alisson V. Brito
Connecting multiple and heterogeneous hardware devices to solve problems raises some challenges, especially in terms of interoperability and communications management. A distributed solution may offer many advantages, like easy use of dispersed resources in a network and potential increase in processing power and data transfer speed. However, integrating devices from different architectures might not
-
A framework for searching encrypted databases J. Internet Serv. Appl. Pub Date : 2018-01-03 Pedro G. M. R. Alves,Diego F. Aranha
Cloud computing is a ubiquitous paradigm responsible for a fundamental change in the way distributed computing is performed. The possibility to outsource the installation, maintenance and scalability of servers, added to competitive prices, makes this platform highly attractive to the computing industry. Despite this, privacy guarantees are still insufficient for data processed in the cloud, since
-
Providing privacy on the tuple space model J. Internet Serv. Appl. Pub Date : 2017-12-20 Edson Floriano,Eduardo Alchieri,Diego F. Aranha,Priscila Solis
Conceptually, tuple spaces are shared memory objects that provide operations to store and retrieve ordered sets of data, called tuples. Tuples stored in a tuple space are accessed by the contents of their fields, working as an associative memory. Although there are some proposals for secure tuple spaces, accessing tuples through field contents makes these systems susceptible to attacks that could impair
-
Design considerations for software-defined wireless networking in heterogeneous cloud radio access networks J. Internet Serv. Appl. Pub Date : 2017-11-28 Marcelo A. Marotta,Maicon Kist,Juliano A. Wickboldt,Lisandro Z. Granville,Juergen Rochol,Cristiano B. Both
The fifth generation (5G) cellular infrastructure is envisaged as a dense and heterogeneous deployment of small cells overlapping with existing macrocells in the Radio Access Network (RAN). Densification and heterogeneity, however, pose new challenges such as dealing with interference, accommodating massive signaling traffic, and managing increased energy consumption. Heterogeneous Cloud Radio Access
Contents have been reproduced by permission of the publishers.