Cognitive Packet Network with Software Defined Networks using the Random Neur...SerIoT project
Presentation of Cognitive Packet Network with Software Defined Networks using the Random Neural Network developed during the SerIoT project. More: https://www.seriot-project.eu
Cognitive Packet Network with Software Defined Networks using the Random Neur...SerIoT project
Presentation of Cognitive Packet Network with Software Defined Networks using the Random Neural Network developed during the SerIoT project. More: https://www.seriot-project.eu
Cyberattacks often begin with a port scan attack, which attackers use to find exploitable vulnerabilities on targeted systems. In SerIoT, we demonstrate, how a port scan attack is detected by the honeypot that is installed in a SDN controller SerIoT network. In particular it uses a light weight algorithm to detect this attack. As soon as a port scan is detected with sufficient evidence the honeypot informs the SerIoT Routing Engine (precisely, the SDN controller) about this malicious activity. Thus, SDN controller immediately generates a new routing rule to block/prevent malicious traffic from entering the SerIoT network for a pre-defined (configurable) amount of time. Thanks to the configurable routing technology by SDN router, a honeypot can be leveraged to detect attackers in real-time and thus, safe and secure routing rules can be dynamically generated to allow/prevent traffic from any node inside or outside the network
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
This presentation discussed Learning from the past: Systematization for Attacks and Countermeasures on Mobile Networks. The presentation was given at ITU Workshop on 5G Security in Geneva, Switzerland, on 19 March 2018. Find more information about this workshop here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180319/Pages/programme.aspx
Take Most Advanced "5G Training" From Tonex TrainingBryan Len
Tonex Training is one of the most popular company in 5G Wireless Training, 5G Technical Fundamentals training platform. Tonex Training offers Most Advanced "5G Training" to improve your 5g technology skills. It's a 3 days training with $2,499.00 price.
5G wireless training (5th generation wireless systems or mobile networks) covers next major period of wireless and mobile telecommunications standards past the current 4G/IMT-Advanced standards. 5G wireless training presents most predominant advances and structures in close future which make 5G innovation.
5G networks are expected to take off extensively after 2020. Check Also our new 3GPP 5G Mobile Broadband Transformation Training Bootcamp, 3GPP 5G Transformation and 5G Wireless Training Crash Course. NEW 2-Day 5G Air Interface Course: 5G New Radio Training (NR), 5G NR.
Course Content:
What is 5G Wireless Communication?
5G Wireless Requirements, Applications, and Services
5G Vision
5G Wireless Use Cases and Applications
Key Capabilities in IMT-2020
Overview of current & Past 5G Wireless Standardization / Projects
5G Technology Enablers
5G Challenges and Requirements
5G Wireless Air Interface
3GPP Evolution to 5G: LTE-Advanced Pro
The 5G Operational Scenarios
3GPP Standardization and Enabling Technologies for 5G
Request more information. Visit Tonex training course link
Take Most Advanced "5G Training" From Tonex Training
https://www.tonex.com/training-courses/5g-wireless-training/
Part 0: Course Outline - 5G for Absolute Beginners3G4G
An introductory training on 5G for newbies available on Udemy - http://bit.ly/udemy5G
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Part 10: 5G Use cases - 5G for Absolute Beginners3G4G
An introductory training on 5G for newbies available on Udemy - http://bit.ly/udemy5G
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
5G has been projected as a catalyst in driving the adoption of AI, IoT and robotics. The security environment as we know in a pre-5G world is already relatively complex. Various discussions over its security concern are being raised, in anticipation of 5G especially in its use in IoT and autonomous systems.
The speaker intends to place the application of 5G in perspective of enterprise ecosystem. By breaking down the ecosystem into components, reviewing the concerns and requirements, the resolution and implementation of security controls could be mapped into respective roles, such as telco engineer, IoT developer, security professional and enterprise architect. Bringing us to a shared responsibility model, the key to creating a more secure 5G and IoT environment.
Misc: Connected and Autonomous Vehicles (CAVs)3G4G
A short introduction to what do we mean by Connected vehicles and Autonomous vehicles which are often combined together and referred to as CAVs
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Cybersecurity and continuous intelligenceNISIInstituut
Welcome to the cybersecurity & continuous intelligence knowledge slidedeck of NISI (Nederlands Instituut voor de Software Industrie).
Cybersecurity & Continuous Intelligence is a broad topic, covering rules & regulation, internet, cyberwar, software, machine learning and society & trust.
This slidedeck offers you a more in-depth view of this exciting area.
Please contact us directly for more information via email info@nisi.nl or the contact on form on nisi.nl.
Nederlands Instituut voor de Software Industrie
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...e-SIDES.eu
The following presentation was given by Alessandro Bruni, Legal Researcher at KU Leuven, during the e-SIDES workshop "Towards Value-Centric Big Data" held on April 2, 2019 in Brussels.
Cyberattacks often begin with a port scan attack, which attackers use to find exploitable vulnerabilities on targeted systems. In SerIoT, we demonstrate, how a port scan attack is detected by the honeypot that is installed in a SDN controller SerIoT network. In particular it uses a light weight algorithm to detect this attack. As soon as a port scan is detected with sufficient evidence the honeypot informs the SerIoT Routing Engine (precisely, the SDN controller) about this malicious activity. Thus, SDN controller immediately generates a new routing rule to block/prevent malicious traffic from entering the SerIoT network for a pre-defined (configurable) amount of time. Thanks to the configurable routing technology by SDN router, a honeypot can be leveraged to detect attackers in real-time and thus, safe and secure routing rules can be dynamically generated to allow/prevent traffic from any node inside or outside the network
Learning from the past: Systematization for Attacks and Countermeasures on Mo...ITU
This presentation discussed Learning from the past: Systematization for Attacks and Countermeasures on Mobile Networks. The presentation was given at ITU Workshop on 5G Security in Geneva, Switzerland, on 19 March 2018. Find more information about this workshop here: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20180319/Pages/programme.aspx
Take Most Advanced "5G Training" From Tonex TrainingBryan Len
Tonex Training is one of the most popular company in 5G Wireless Training, 5G Technical Fundamentals training platform. Tonex Training offers Most Advanced "5G Training" to improve your 5g technology skills. It's a 3 days training with $2,499.00 price.
5G wireless training (5th generation wireless systems or mobile networks) covers next major period of wireless and mobile telecommunications standards past the current 4G/IMT-Advanced standards. 5G wireless training presents most predominant advances and structures in close future which make 5G innovation.
5G networks are expected to take off extensively after 2020. Check Also our new 3GPP 5G Mobile Broadband Transformation Training Bootcamp, 3GPP 5G Transformation and 5G Wireless Training Crash Course. NEW 2-Day 5G Air Interface Course: 5G New Radio Training (NR), 5G NR.
Course Content:
What is 5G Wireless Communication?
5G Wireless Requirements, Applications, and Services
5G Vision
5G Wireless Use Cases and Applications
Key Capabilities in IMT-2020
Overview of current & Past 5G Wireless Standardization / Projects
5G Technology Enablers
5G Challenges and Requirements
5G Wireless Air Interface
3GPP Evolution to 5G: LTE-Advanced Pro
The 5G Operational Scenarios
3GPP Standardization and Enabling Technologies for 5G
Request more information. Visit Tonex training course link
Take Most Advanced "5G Training" From Tonex Training
https://www.tonex.com/training-courses/5g-wireless-training/
Part 0: Course Outline - 5G for Absolute Beginners3G4G
An introductory training on 5G for newbies available on Udemy - http://bit.ly/udemy5G
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Part 10: 5G Use cases - 5G for Absolute Beginners3G4G
An introductory training on 5G for newbies available on Udemy - http://bit.ly/udemy5G
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
5G has been projected as a catalyst in driving the adoption of AI, IoT and robotics. The security environment as we know in a pre-5G world is already relatively complex. Various discussions over its security concern are being raised, in anticipation of 5G especially in its use in IoT and autonomous systems.
The speaker intends to place the application of 5G in perspective of enterprise ecosystem. By breaking down the ecosystem into components, reviewing the concerns and requirements, the resolution and implementation of security controls could be mapped into respective roles, such as telco engineer, IoT developer, security professional and enterprise architect. Bringing us to a shared responsibility model, the key to creating a more secure 5G and IoT environment.
Misc: Connected and Autonomous Vehicles (CAVs)3G4G
A short introduction to what do we mean by Connected vehicles and Autonomous vehicles which are often combined together and referred to as CAVs
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
5G Page: https://www.3g4g.co.uk/5G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Cybersecurity and continuous intelligenceNISIInstituut
Welcome to the cybersecurity & continuous intelligence knowledge slidedeck of NISI (Nederlands Instituut voor de Software Industrie).
Cybersecurity & Continuous Intelligence is a broad topic, covering rules & regulation, internet, cyberwar, software, machine learning and society & trust.
This slidedeck offers you a more in-depth view of this exciting area.
Please contact us directly for more information via email info@nisi.nl or the contact on form on nisi.nl.
Nederlands Instituut voor de Software Industrie
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...e-SIDES.eu
The following presentation was given by Alessandro Bruni, Legal Researcher at KU Leuven, during the e-SIDES workshop "Towards Value-Centric Big Data" held on April 2, 2019 in Brussels.
FinTech and InsuranceTech case studies digitally transforming Europe's future with BigData and AI
The new data-driven industrial revolution highlights the need for big data technologies to unlock the potential in various application domains. The insurance and finance services industry is rapidly transformed by data-intensive operations and applications. FinTech and InsuranceTech combine very large datasets from legacy banking systems with other data sources such as financial markets data, regulatory datasets, real-time retail transactions, and more, improving financial services and activities for customers.
This presentation contains the information regarding the outcomes from the scalability and replicability analysis conducted in InteGrid. Additionally, the replication roadmap identified in InteGrid is presented through its replication paths based on the lessons learned and the best practices (recommendations) identified.
RECAP’s coordinator, Jörg Domaschka, presented the slides at the 'Added Value of EU-funded Collaborative Research' session at the YERUN Launch Event in Brussels, Belgium on 7 November 2017.
The Young European Research University Network (YERUN) is an organisation to strengthen and facilitate cooperation in the areas of scientific research, academic education and services of use to society among a cluster of highly-ranked young universities in Europe.
Learn more: https://www.yerun.eu/events/yerunlaunchevent/
Opportunities of non-thermal plasma applications on wooden façadesSebastian Dahle
The use of wooden façades as an element of charm and aesthetics is becoming increasingly popular on newly built or renovated houses. In this role, expectations for wooden façades are high regarding longevity, resistance to weather and retention of aesthetic properties. Non-thermal plasma treatments offer ways to improve all of these features. In the presentation, a brief overview on atmospheric non-thermal plasmas, the availability of the respective technologies, as well as the benefits and limitations of these will be given. Selected examples for all available technologies will be presented to highlight the forms of implementation, typical applications, and the resulting improvements and functionalities.
Dr. Sebastian Dahle is working on the position of a scientific associate and as an assistant professor at the Department of Wood Science and Technology, Biotechnical Faculty, University of Ljubljana. Further, he leads the Plasma Center at the Biotechnical Faculty, which was established in 2019. His research activities include applications of non-thermal plasmas for surface functionalization, enhanced coating performance, improvement of adhesion, multi-material composites and for plasma deposition. A particular focus of his research lies with the use and improvement of bio-based materials and bio-based composites. Moreover, his research includes plasma applications for processing and cleaning of various gases as well as the development of open plasma equipment.
This presentation contains the information with regard to the scalability and replicability analysis performed in InteGrid (H2020 project) in addition to the replication roadmap and best practices (recommendations) identified.
n all the dialects where the Industry 4.0 language is spoken, Industrial Internet of Things, Additive Manufacturing and Robotics from the technology side and Mass Customization, Product-Service Systems and Sustainable Manufacturing from the business side, represent key cornerstones and top priority challenges.
FASTEN will demonstrate an open and standardized framework to produce and deliver tailored-designed products, capable to run autonomously and deliver fast and low-cost additive manufactured products.
The new data-driven industrial revolution highlights the need for big data technologies to unlock the potential in various application domains. The insurance and finance services industry is rapidly transformed by data-intensive operations and applications. FinTech and InsuranceTech combine very large datasets from legacy banking systems with other data sources such as financial markets data, regulatory datasets, real-time retail transactions, and more, improving financial services and activities for customers.
The new data-driven industrial revolution highlights the need for big data technologies to unlock the potential in various application domains. The insurance and finance services industry is rapidly transformed by data-intensive operations and applications. FinTech and InsuranceTech combine very large datasets from legacy banking systems with other data sources such as financial markets data, regulatory datasets, real-time retail transactions, and more, improving financial services and activities for customers.
The webinar provided background information on various call topics and on support available for both UK and European organisations in how to apply for funding and search for partners. KTN hosted this event on behalf of Innovate UK and was delivered by Elenaor Brash, UK5G, Stafford Lloyd, National Contact Point ICT, Innovate UK, Mythri Hunukumbure, Principal Research Engineer, Samsung, and Viola Hay, Knowledge Transfer Manager - European Programmes, KTN.
The webinar gave an overview of H2020 5G Call topics, and support available for UK organisations in how to apply for funding, as well as information on Brexit and the continuation of UK participation in H2020. This enabled attendees to gain an insight into the benefits of participating, guidelines for preparing a project outline and the support and collaboration tools available.
In summary, the webinar covered:
- Open and Forthcoming 5G Call Topics
- Support for UK Organisations
- UK participation in Horizon 2020
Find out more about the 5G Special Interest Group at https://ktn-uk.co.uk/interests/5g
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteGoogle
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
👉👉 Click Here To Get More Info 👇👇
https://sumonreview.com/ai-pilot-review/
AI Pilot Review: Key Features
✅Deploy AI expert bots in Any Niche With Just A Click
✅With one keyword, generate complete funnels, websites, landing pages, and more.
✅More than 85 AI features are included in the AI pilot.
✅No setup or configuration; use your voice (like Siri) to do whatever you want.
✅You Can Use AI Pilot To Create your version of AI Pilot And Charge People For It…
✅ZERO Manual Work With AI Pilot. Never write, Design, Or Code Again.
✅ZERO Limits On Features Or Usages
✅Use Our AI-powered Traffic To Get Hundreds Of Customers
✅No Complicated Setup: Get Up And Running In 2 Minutes
✅99.99% Up-Time Guaranteed
✅30 Days Money-Back Guarantee
✅ZERO Upfront Cost
See My Other Reviews Article:
(1) TubeTrivia AI Review: https://sumonreview.com/tubetrivia-ai-review
(2) SocioWave Review: https://sumonreview.com/sociowave-review
(3) AI Partner & Profit Review: https://sumonreview.com/ai-partner-profit-review
(4) AI Ebook Suite Review: https://sumonreview.com/ai-ebook-suite-review
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Utilocate offers a comprehensive solution for locate ticket management by automating and streamlining the entire process. By integrating with Geospatial Information Systems (GIS), it provides accurate mapping and visualization of utility locations, enhancing decision-making and reducing the risk of errors. The system's advanced data analytics tools help identify trends, predict potential issues, and optimize resource allocation, making the locate ticket management process smarter and more efficient. Additionally, automated ticket management ensures consistency and reduces human error, while real-time notifications keep all relevant personnel informed and ready to respond promptly.
The system's ability to streamline workflows and automate ticket routing significantly reduces the time taken to process each ticket, making the process faster and more efficient. Mobile access allows field technicians to update ticket information on the go, ensuring that the latest information is always available and accelerating the locate process. Overall, Utilocate not only enhances the efficiency and accuracy of locate ticket management but also improves safety by minimizing the risk of utility damage through precise and timely locates.
Developing Distributed High-performance Computing Capabilities of an Open Sci...Globus
COVID-19 had an unprecedented impact on scientific collaboration. The pandemic and its broad response from the scientific community has forged new relationships among public health practitioners, mathematical modelers, and scientific computing specialists, while revealing critical gaps in exploiting advanced computing systems to support urgent decision making. Informed by our team’s work in applying high-performance computing in support of public health decision makers during the COVID-19 pandemic, we present how Globus technologies are enabling the development of an open science platform for robust epidemic analysis, with the goal of collaborative, secure, distributed, on-demand, and fast time-to-solution analyses to support public health.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
GraphSummit Paris - The art of the possible with Graph TechnologyNeo4j
Sudhir Hasbe, Chief Product Officer, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Cyaniclab : Software Development Agency Portfolio.pdfCyanic lab
CyanicLab, an offshore custom software development company based in Sweden,India, Finland, is your go-to partner for startup development and innovative web design solutions. Our expert team specializes in crafting cutting-edge software tailored to meet the unique needs of startups and established enterprises alike. From conceptualization to execution, we offer comprehensive services including web and mobile app development, UI/UX design, and ongoing software maintenance. Ready to elevate your business? Contact CyanicLab today and let us propel your vision to success with our top-notch IT solutions.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Unleash Unlimited Potential with One-Time Purchase
BoxLang is more than just a language; it's a community. By choosing a Visionary License, you're not just investing in your success, you're actively contributing to the ongoing development and support of BoxLang.
1. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Secure and Safe Internet ofThings (SerIoT)
1 Horizon 2020, Project No. 780139
Traffic Generator and
Detector of malicious traffic
S. Evmorfos, G. Vlachodimitropoulos, N. Bakalos (ICCS) and E. Gelenbe (IITIS)
2. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Relevant References
2 Horizon 2020, Project No. 780139
S. Evmorfos, G. Vlachodimitropoulos, N. Bakalos and E. Gelenbe,
“Neural network architectures for the detection of SYN flood
attacks,”
in IoT systems, PETRA 2020: The 13th International Conference on
PErvasive Technologies Related to Assistive Technologies, pp. 69:1-
69:4 (2020), ACM https://dl.acm.org/doi/10.1145/3389189.3398000
Prior Related Work:
O. Brun, Y. Yin and E. Gelenbe,
“ Deep Learning with dense random neural network for detecting
attacks against IoT-connected home environments, “
Procedia Computer Science 134: 458-463 (2018)
3. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Attack Traffic Generator
3 Horizon 2020, Project No. 780139
Use of VirtualBox:
Creation of a number of VMs (18.04 compatibility)
NAT network configuration enables the created VMs to connect to the Internet
VM-1 : Client IP->192.168.56.100 script b9generator.py
VM-2 : Server IP->192.168.56.101 script server.py
4. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Attack Traffic Generator
4 Horizon 2020, Project No. 780139
FIRST COMMUNICATION CAPTURED
Two scripts running on each VM (server.py on server VM, b9generator.py on client
VM)
400 Full TCP connections established
Communication captured using Wireshark -> b9traffic.pcap
5. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Attack Traffic Generator
5 Horizon 2020, Project No. 780139
All the traffic generated by the bot network: captured by Wireshark
Realtimesenario.pcap
*observation: The server was running short on its resources and its capability to
handle requests was massively inhibited
Realtimesenario.pcap :annotated as such -> 5sec windows and every window is
assigned to a metric (half opened TCP connections)
6. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Attack Traffic Generator
6 Horizon 2020, Project No. 780139
After a while the attack
is in full effect.
Therefore the ability of
the server to handle
requests is massively
inhibited. So, Wireshark
shows a number of
retransmissions.
7. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Neural Network Architectures for the Detection
of SYN flood attacks in IoT systems
7 Horizon 2020, Project No. 780139
Presentation Overview:
• IoT – new Era
• New security challenges
• Our approach
• Results - Comparison
8. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
IoT new era
8 Horizon 2020, Project No. 780139
IoT: More devices connected in the Internet than people
9. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
IoT new era
9 Horizon 2020, Project No. 780139
IoT is the interconnection of WAN and proximity networks
Scope: Providing complex services
10. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
New security challenges
10 Horizon 2020, Project No. 780139
Nothing new comes without cost:
Cybersecurity methodologies cannot solve the existing Security risks
New reality: Need to reassess our notion of network security
11. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
New security challenges
11 Horizon 2020, Project No. 780139
Where the problem is located:
Securing the Sensor and actuator networks from Denial of Service
Security challenges in the border of WAN and Proximity networks
IoT gateways
Hubs
Fog
12. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
New security challenges
12 Horizon 2020, Project No. 780139
SYN flood attack (DDoS):
The attacker initializes many TCP connections with the
target, but never establishes them
Result: The target node cannot handle new requests
13. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Our approach
(by steps)
13 Horizon 2020, Project No. 780139
1. Set up neural networks as regressors
2. Train them with normal traffic (non malicious in the sense that there is no SYN
attack being launced)
3. The model predicts the next part of the communication Sequence
4. If predicted and upcoming sequence diverge “significantly” : node under attack
14. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Our approach
14 Horizon 2020, Project No. 780139
Comparison of two different Neural Network architectures:
LSTM (Recurrent)
Gelenbe Network (feedforward)
15. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Our Approach
15 Horizon 2020, Project No. 780139
16. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Our Approach
16 Horizon 2020, Project No. 780139
HOW TO DETECT
• Deep learning model for handling time series
• The model is being trained on time series produced by non malicious pcap
extracts ( as a regressor )
• The trained model predicts the next data point (the number of incomplete TCP
connections for the next window)
• If the actual value diverges significantly from the predicted ( predefined
Threshold ), the IP is considered to be under attack
17. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Results - Comparison
17 Horizon 2020, Project No. 780139
No need for much storage and computing resources
Real time response
18. This project has received funding from
the European Union’s Horizon 2020
Research and Innovation programme
under grant agreement No. 780139
Results - Comparison
18 Horizon 2020, Project No. 780139
Accuracy False Positives False negatives
LSTM 62.7% 37.3% 0%
Gelenbe 80.7% 19.3% 0%
The Random Neural Network (Gelenbe-Network) seems to be more adamant
in capturing the nuances of normal traffic