2018
Autores
Sousa, JS; Vilela, JP;
Publicação
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Abstract
Current physical-layer security techniques typically rely on a degraded eavesdropper, thus warranting some sort of advantage that can be relied upon to achieve higher levels of security. We consider instead non-degraded eavesdroppers that possess equal or better capabilities than legitimate receivers. Under this challenging setup, most of the current physical-layer security techniques become hard to administer and new dimensions to establish advantageous periods of communication are needed. For that, we consider employing a spread spectrum uncoordinated frequency hopping (UFH) scheme aided by friendly jammers for improved secrecy. We characterize the secrecy level of this spread spectrum scheme, by devising a stochastic geometry mathematical model to assess the secure packet throughput (probability of secure communication) of devices operating under UFH that accommodates the impact of friendly jammers. We further implement and evaluate these techniques in a real-world test-bed of software-defined radios. Results show that although UFH with jamming leads to low secure packet throughput values, by exploiting frequency diversity, these methods may be used for establishing secret keys. We propose a method for secret-key establishment that builds on the advantage provided by UFH and jamming to establish secret keys, notably against non-degraded adversary eavesdroppers that may appear in advantageous situations.
2018
Autores
Cunha M.; Laranjeiro N.;
Publicação
Proceedings - 2018 14th European Dependable Computing Conference, EDCC 2018
Abstract
Service applications are increasingly being deployed in virtualized environments, such as virtual machines (VMs) as a means to provide elasticity and to allow fast recovery from failures. The recent trend is now to deploy applications in containers (e.g., Docker or RKT containers), which allow, among many other benefits, to further reduce recovery time, since containers are much more lightweight than VMs. Although several performance benchmarks exist for web services (e.g., TPC-App and SPEC SPECjEnterprise2010) or even virtualized environments (e.g., SPEC Cloud IaaS 2016, TPCx-V), understanding the behavior of containerized services in the presence of faults has been generally disregarded. This paper proposes an experimental approach for evaluating the performance of containerized services in presence of operator faults. The approach is based on the injection of a simple set of operator faults targeting the containers and middleware. Results show noticeable differences regarding the impact of operator faults in Docker and RKT, with the latter one allowing for faster recovery, despite showing the lowest throughput.
2018
Autores
Freitas, T; Rodrigues, J; Bogas, D; Coimbra, M; Martins, R;
Publicação
2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2018)
Abstract
The increasing capabilities of smartphones is paving way to novel applications through the crowd-sourcing of these untapped resources, to form hyperlocal meshes commonly known as edge-clouds. While a relevant body-of-work is already available for the underlying networking, computing and storage facilities, security and privacy remain second class citizens. In this paper we present Panoptic, an edge-cloud system that enables the search for missing people, similar to the commonly known Amber alert system, in high density scenarios where wireless infrastructure might be limited (WiFi and LTE), e.g. concerts, while featuring privacy and security by design. Since the limited resources present in the mobile devices, namely battery capacity, Panoptic offers a computing offloading that tries to minimize data leakage while offering acceptable levels of performance. Our results show that it is achievable to run these algorithms in an edge-cloud configuration and that it is beneficial to use this architecture to lower data transfer through the wireless infrastructure while enforcing privacy. Results from our experimental evaluation show that the security layer does not impose a significant overhead, and only accounts for 2% of the total execution time for an edge cloud comprised by, but not limited to, 8 devices.
2017
Autores
Figueira, A; Guimarães, N;
Publicação
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31 - August 03, 2017
Abstract
The expansion of social networks has contributed to the propagation of information relevant to general audiences. However, this is small percentage compared to all the data shared in such online platforms, which also includes private/personal information, simple chat messages and the recent called ‘fake news’. In this paper, we make an exploratory analysis on two social networks to extract features that are indicators of relevant information in social network messages. Our goal is to build accurate machine learning models that are capable of detecting what is journalistically relevant. We conducted two experiments on CrowdFlower to build a solid ground truth for the models, by comparing the number of evaluations per post against the number of posts classified. The results show evidence that increasing the number of samples will result in a better performance on the relevancy classification task, even when relaxing in the number of evaluations per post. In addition, results show that there are significant correlations between the relevance of a post and its interest and whether is meaningfully for the majority of people. Finally, we achieve approximately 80% accuracy in the task of relevance detection using a small set of learning algorithms. © 2017 Copyright is held by the owner/author(s).
2017
Autores
Sandim, M; Fortuna, P; Figueira, A; Oliveira, L;
Publicação
COMPLEX NETWORKS & THEIR APPLICATIONS V
Abstract
Social networks are becoming a wide repository of information, some of which may be of interest for general audiences. In this study we investigate which features may be extracted from single posts propagated throughout a social network, and that are indicative of its relevance, from a journalistic perspective. We then test these features with a set of supervised learning algorithms in order to evaluate our hypothesis. The main results indicate that if a text fragment is pointed out as being interesting, meaningful for the majority of people, reliable and with a wide scope, then it is more likely to be considered as relevant. This approach also presents promising results when validated with several well-known learning algorithms.
2017
Autores
Pinto, A; Oliveira, HG; Figueira, A; Alves, AO;
Publicação
NEW GENERATION COMPUTING
Abstract
An overwhelming quantity of messages is posted in social networks every minute. To make the utilization of these platforms more productive, it is imperative to filter out information that is irrelevant to the general audience, such as private messages, personal opinions or well-known facts. This work is focused on the automatic classification of public social text according to its potential relevance, from a journalistic point of view, hopefully improving the overall experience of using a social network. Our experiments were based on a set of posts with several criteria, including the journalistic relevance, assessed by human judges. To predict the latter, we rely exclusively on linguistic features, extracted by Natural Language Processing tools, regardless the author of the message and its profile information. In our first approach, different classifiers and feature engineering methods were used to predict relevance directly from the selected features. In a second approach, relevance was predicted indirectly, based on an ensemble of classifiers for other key criteria when defining relevance-controversy, interestingness, meaningfulness, novelty, reliability and scope-also in the dataset. The first approach achieved a F (1)-score of 0.76 and an Area under the ROC curve (AUC) of 0.63. But the best results were achieved by the second approach, with the best learned model achieving a F (1)-score of 0.84 with an AUC of 0.78. This confirmed that journalistic relevance can indeed be predicted by the combination of the selected criteria, and that linguistic features can be exploited to classify the latter.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.