Loading...
Search for:
noferesti--samindokht
0.061 seconds
HB2DS: a behavior-driven high-bandwidth network mining system
, Article Journal of Systems and Software ; Volume 127 , 2017 , Pages 266-277 ; 01641212 (ISSN) ; Jalili, R ; Sharif University of Technology
Elsevier Inc
2017
Abstract
This paper proposes a behavior detection system, HB2DS, to address the behavior-detection challenges in high-bandwidth networks. In HB2DS, a summarization of network traffic is represented through some meta-events. The relationships amongst meta-events are used to mine end-user behaviors. HB2DS satisfies the main constraints exist in analyzing of high-bandwidth networks, namely online learning and outlier handling, as well as one-pass processing, delay, and memory limitations. Our evaluation indicates significant improvement in big data stream analyzing in terms of accuracy and efficiency. © 2016 Elsevier Inc
Inline high-bandwidth network analysis using a robust stream clustering algorithm
, Article IET Information Security ; Volume 13, Issue 5 , 2019 , Pages 486-497 ; 17518709 (ISSN) ; Jalili, R ; Sharif University of Technology
Institution of Engineering and Technology
2019
Abstract
High-bandwidth network analysis is challenging, resource consuming, and inaccurate due to the high volume, velocity, and variety characteristics of the network traffic. The infinite stream of incoming traffic forms a dynamic environment with unexpected changes, which requires analysing approaches to satisfy the high-bandwidth network processing challenges such as incremental learning, inline processing, and outlier handling. This study proposes an inline high-bandwidth network stream clustering algorithm designed to incrementally mine large amounts of continuously transmitting network traffic when some outliers can be dropped before determining the network traffic behaviour. Maintaining...
ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks
, Article Computer Networks ; Volume 166 , 2020 ; Jalili, R ; Sharif University of Technology
Elsevier B.V
2020
Abstract
Today's high-bandwidth networks require adaptive analyzing approaches to recognize the network variable behaviors. The analyzing approaches should be robust against the lack of prior knowledge and provide data to impose more complex policies. In this paper, ACoPE is proposed as an adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks. ACoPE detects and maintains inter-flows relationships to impose complex-policies. It employs a statistical process control technique to monitor accuracy. Whenever the accuracy decreased, ACoPE considers it as a changed behavior and uses data from a deep packet inspection module to adapt itself with the change. The...
Query Correctness Assurance for Outsourced Databases
, M.Sc. Thesis Sharif University of Technology ; Jalili, Rasoul (Supervisor)
Abstract
In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were...
Behavior-Driven Security Policy Enforcement on High Bandwidth Networks
, Ph.D. Dissertation Sharif University of Technology ; Jalili, Rasool (Supervisor)
Abstract
High-bandwidth network analysis is challenging, resource consuming, and inaccurate due to the high volume, velocity, and variety characteristics of the network traffic. Today's high-bandwidth networks require adaptive analyzing approaches to recognize the network variable behaviors. The analyzing approaches should be robust against the lack of prior knowledge and provide data to impose more complex policies.This thesis introduces complex policy relation and proposes a two-layer framework to enforce complex policies, named HB2DS. The proposed framework is equipped with the mechanism and policy layers. The mechanism layer processes network packets header and payload to generate a flow stream....
A signature-based approach of correctness assurance in data outsourcing scenarios
, Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7093 LNCS , 2011 , Pages 374-378 ; 03029743 (ISSN) ; 9783642255595 (ISBN) ; Hadavi, M. A ; Jalili, R ; Sharif University of Technology
2011
Abstract
Correctness assurance of query results in data outsourcing scenarios includes authenticity, completeness, and freshness of the results. Utilizing signature chaining and aggregation, this paper proposes a method to verify the correctness of results returned from an untrusted server. An MHT constructed over attribute values of a tuple is used to provide the authenticity, and timestamp is used to provide the freshness verifiability of results. While our approach supports a wide range of queries, simulation results indicate its efficiency in comparison with some existing methods in terms of communication and computation overhead imposed to execute a query
The Model for Industrialization Feasibility of Projects on the Basis of Sustainable Development
, M.Sc. Thesis Sharif University of Technology ; Mortaheb, Mohammad Mehdi (Supervisor)
Abstract
Pre-fabrication of building components, as a level of industrial building, is an innovative method of construction, which is widely used in developed countries nowadays. However, this method has accounted for a small percentage of the construction in developing countries like Iran. On the other hand, it is essential to consider sustainable development with the incidence of issues such as degradation of natural resources and ecosystems, pollution, over population, injustice procedure, and decrease in quality of human life. Industrial building systems have a significant impact on improvement and expansion of sustainable development laws due to their potential characteristics. Hence, the...
Gas barrier properties of PP/EPDM blend nanocomposites
, Article Journal of Membrane Science ; Volume 282, Issue 1-2 , 2006 , Pages 142-148 ; 03767388 (ISSN) ; Dadbin, S ; Salehpour, Z ; Noferesti, M ; Sharif University of Technology
2006
Abstract
Nanocomposites of polypropylene (PP)/ethylene-propylene-diene rubber (EPDM) blend with montmorillonite-based organoclay were prepared in a solvent blending method. Solvent blending of PP and EPDM in a composition of 50:50 formed a two phase morphology in which EPDM appeared as dispersed phase with irregular shape. The size of dispersed phase reduced significantly to almost spherical domains by addition of the nanoclay. For better dispersion of nanoclay in the PP/EPDM blend, an antioxidant was used as compatibilizer. State of nanoclay dispersion was evaluated by X-ray diffraction (XRD), and also, by a novel method using permeability measurements data in a permeability model. The measured...
Distinguishing attack on bivium
, Article Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010, 29 June 2010 through 1 July 2010, Bradford ; 2010 , Pages 1075-1078 ; 9780769541082 (ISBN) ; Rohani, N ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
2010
Abstract
Bivium is a simplified version of Trivium, a hardware profile finalist of eSTREAM project. Bivium has an internal state of size 177 bits and a key length of 80 bits. In this paper we introduce a distinguishing attack on this cipher. In this method we first find the best linear approximation for the updating function. Then by using this approximation, and optimizing the time delay, we find the distinguisher. The complexity of the attack is O(230.79), which is an improvement to the previous distinguishing attack with a complexity of order O(232)
Distinguishing Attacks on Stream Ciphers
, M.Sc. Thesis Sharif University of Technology ; Aref, Mohammad Reza (Supervisor) ; Mohajeri, Javad (Supervisor)
Abstract
Stream ciphers are cryptographic schemes being widely used in communications as a means of providing security of data. Hence, scrutinizing their level of security against different cryptanalytic methods has obviously turned to be of great importance. Randomness of the keystream is an important requirement for stream ciphers. The cipher should be designed in such a way that the keystream is free of any statistical biases that would let attackers distinguish it from a random sequence. A distinguishing attack on a stream cipher is one that determines whether a given stream of symbols is a truly random sequence or generated by a specific cipher with an unknown key. In this thesis, we focus on...