Skip to main content

Showing 1–18 of 18 results for author: Jourjon, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.04429  [pdf, other

    cs.NI cs.LG

    NetDiffus: Network Traffic Generation by Diffusion Models through Time-Series Imaging

    Authors: Nirhoshan Sivaroopan, Dumindu Bandara, Chamara Madarasingha, Guilluame Jourjon, Anura Jayasumana, Kanchana Thilakarathna

    Abstract: Network data analytics are now at the core of almost every networking solution. Nonetheless, limited access to networking data has been an enduring challenge due to many reasons including complexity of modern networks, commercial sensitivity, privacy and regulatory constraints. In this work, we explore how to leverage recent advancements in Diffusion Models (DM) to generate synthetic network traff… ▽ More

    Submitted 23 September, 2023; originally announced October 2023.

    Comments: 9 pages and 8 figures

  2. arXiv:2006.02231  [pdf, other

    cs.CR cs.CV cs.NE

    A Multi-modal Neural Embeddings Approach for Detecting Mobile Counterfeit Apps: A Case Study on Google Play Store

    Authors: Naveen Karunanayake, Jathushan Rajasegaran, Ashanie Gunathillake, Suranga Seneviratne, Guillaume Jourjon

    Abstract: Counterfeit apps impersonate existing popular apps in attempts to misguide users to install them for various reasons such as collecting personal information or spreading malware. Many counterfeits can be identified once installed, however even a tech-savvy user may struggle to detect them before installation. To this end, this paper proposes to leverage the recent advances in deep learning methods… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1804.09882

  3. arXiv:1903.08856  [pdf, other

    cs.PF cs.CR cs.NI

    Impact of network delays on Hyperledger Fabric

    Authors: Thanh Son Lam Nguyen, Guillaume Jourjon, Maria Potop-Butucaru, Kim Thai

    Abstract: Blockchain has become one of the most attractive technologies for applications, with a large range of deployments such as production, economy, or banking. Under the hood, Blockchain technology is a type of distributed database that supports untrusted parties. In this paper we focus Hyperledger Fabric, the first blockchain in the market tailored for a private environment, allowing businesses to cre… ▽ More

    Submitted 21 March, 2019; originally announced March 2019.

  4. arXiv:1902.10244  [pdf, other

    cs.CR cs.DC cs.NI

    The Attack of the Clones Against Proof-of-Authority

    Authors: Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon

    Abstract: In this paper, we explore vulnerabilities and countermeasures of the recently proposed blockchain consensus based on proof-of-authority. The proof-of-work blockchains, like Bitcoin and Ethereum, have been shown both theoretically and empirically vulnerable to double spending attacks. This is why Byzantine fault tolerant consensus algorithms have gained popularity in the blockchain context for thei… ▽ More

    Submitted 24 September, 2019; v1 submitted 26 February, 2019; originally announced February 2019.

  5. arXiv:1810.04699  [pdf, other

    cs.CY

    Blockchain-based Smart Contracts - Applications and Challenges

    Authors: Yining Hu, Madhusanka Liyanage, Ahsan Mansoor, Kanchana Thilakarathna, Guillaume Jourjon, Aruna Seneviratne

    Abstract: A blockchain-based smart contract or a "smart contract" for short, is a computer program intended to digitally facilitate the negotiation or contractual terms directly between users when certain conditions are met. With the advance in blockchain technology, smart contracts are being used to serve a wide range of purposes ranging from self-managed identities on public blockchains to automating busi… ▽ More

    Submitted 8 June, 2019; v1 submitted 26 September, 2018; originally announced October 2018.

  6. arXiv:1805.05004  [pdf, other

    cs.CR cs.DC cs.NI

    Double-Spending Risk Quantification in Private, Consortium and Public Ethereum Blockchains

    Authors: Parinya Ekparinya, Vincent Gramoli, Guillaume Jourjon

    Abstract: Recently, several works conjectured the vulnerabilities of mainstream blockchains under several network attacks. All these attacks translate into showing that the assumptions of these blockchains can be violated in theory or under simulation at best. Unfortunately, previous results typically omit both the nature of the network under which the blockchain code runs and whether blockchains are privat… ▽ More

    Submitted 13 May, 2018; originally announced May 2018.

  7. arXiv:1804.09882  [pdf, other

    cs.CR cs.LG cs.NE

    A Neural Embeddings Approach for Detecting Mobile Counterfeit Apps

    Authors: Jathushan Rajasegaran, Suranga Seneviratne, Guillaume Jourjon

    Abstract: Counterfeit apps impersonate existing popular apps in attempts to misguide users to install them for various reasons such as collecting personal information, spreading malware, or simply to increase their advertisement revenue. Many counterfeits can be identified once installed, however even a tech-savvy user may struggle to detect them before installation as app icons and descriptions can be quit… ▽ More

    Submitted 25 April, 2018; originally announced April 2018.

  8. arXiv:1801.10295  [pdf, other

    cs.CY cs.CR

    A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain

    Authors: Yining Hu, Ahsan Manzoor, Parinya Ekparinya, Madhusanka Liyanage, Kanchana Thilakarathna, Guillaume Jourjon, Aruna Seneviratne, Mika E Ylianttila

    Abstract: Banking as an essential service can be hard to access in remote, rural regions where the network connectivity is intermittent. Although micro-banking has been made possible by SMS or USSD messages in some places, their security flaws and session-based nature prevent them from a wider adoption. Global level cryptocurrencies enable low-cost, secure and pervasive money transferring among distributed… ▽ More

    Submitted 30 January, 2018; originally announced January 2018.

  9. arXiv:1707.00190  [pdf, other

    cs.CR cs.SI

    Measuring, Characterizing, and Detecting Facebook Like Farms

    Authors: Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Dali Kaafar, M. Zubair Shafiq

    Abstract: Social networks offer convenient ways to seamlessly reach out to large audiences. In particular, Facebook pages are increasingly used by businesses, brands, and organizations to connect with multitudes of users worldwide. As the number of likes of a page has become a de-facto measure of its popularity and profitability, an underground market of services artificially inflating page likes, aka like… ▽ More

    Submitted 4 July, 2017; v1 submitted 1 July, 2017; originally announced July 2017.

    Comments: To appear in ACM Transactions on Privacy and Security (TOPS)

  10. arXiv:1608.05140  [pdf, other

    cs.NI

    Are Today's SDN Controllers Ready for Primetime?

    Authors: Stephen Mallon, Vincent Gramoli, Guillaume Jourjon

    Abstract: SDN efficiency is driven by the ability of controllers to process small packets based on a global view of the network. The goal of such controllers is thus to treat new flows coming from hundreds of switches in a timely fashion. In this paper, we show this ideal remains impossible through the most extensive evaluation of SDN controllers. We evaluated five state-of-the-art SDN controllers and disco… ▽ More

    Submitted 17 August, 2016; originally announced August 2016.

  11. arXiv:1608.04579  [pdf, other

    cs.NI

    Endpoint-transparent Multipath Transport with Software-defined Networks

    Authors: Dario Banfi, Olivier Mehani, Guillaume Jourjon, Lukas Schwaighofer, Ralph Holz

    Abstract: Multipath forwarding consists of using multiple paths simultaneously to transport data over the network. While most such techniques require endpoint modifications, we investigate how multipath forwarding can be done inside the network, transparently to endpoint hosts. With such a network-centric approach, packet reordering becomes a critical issue as it may cause critical performance degradation.… ▽ More

    Submitted 16 August, 2016; originally announced August 2016.

    ACM Class: C.2.1; C.2.2

  12. arXiv:1506.00506  [pdf, other

    cs.SI cs.CR

    Combating Fraud in Online Social Networks: Detecting Stealthy Facebook Like Farms

    Authors: Muhammad Ikram, Lucky Onwuzurike, Shehroze Farooqi, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohammad Ali Kaafar, M. Zubair Shafiq

    Abstract: As businesses increasingly rely on social networking sites to engage with their customers, it is crucial to understand and counter reputation manipulation activities, including fraudulently boosting the number of Facebook page likes using like farms. To this end, several fraud detection algorithms have been proposed and some deployed by Facebook that use graph co-clustering to distinguish between… ▽ More

    Submitted 9 May, 2016; v1 submitted 1 June, 2015; originally announced June 2015.

  13. arXiv:1505.01637  [pdf, other

    cs.CY cs.CR

    Characterizing Key Stakeholders in an Online Black-Hat Marketplace

    Authors: Shehroze Farooqi, Muhammad Ikram, Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq, Fareed Zaffar

    Abstract: Over the past few years, many black-hat marketplaces have emerged that facilitate access to reputation manipulation services such as fake Facebook likes, fraudulent search engine optimization (SEO), or bogus Amazon reviews. In order to deploy effective technical and legal countermeasures, it is important to understand how these black-hat marketplaces operate, shedding light on the services they of… ▽ More

    Submitted 4 April, 2017; v1 submitted 7 May, 2015; originally announced May 2015.

    Comments: 12th IEEE/APWG Symposium on Electronic Crime Research (eCrime 2017)

  14. arXiv:1410.4296  [pdf, other

    cs.NI

    Can SDN Mitigate Disasters?

    Authors: Vincent Gramoli, Guillaume Jourjon, Olivier Mehani

    Abstract: Datacenter networks and services are at risk in the face of disasters. Existing fault-tolerant storage services cannot even achieve a nil recovery point objective (RPO) as client-generated data may get lost before the termination of their migration across geo-replicated datacenters. SDN has proved instrumental in exploiting application-level information to optimise the routing of information. In t… ▽ More

    Submitted 20 October, 2014; v1 submitted 16 October, 2014; originally announced October 2014.

  15. arXiv:1410.1681  [pdf, other

    cs.NI

    Repeatable Experiments with LabWiki

    Authors: Thierry Rakotoarivelo, Guillaume Jourjon, Olivier Mehani, Maximilian Ott, Mike Zink

    Abstract: The ability to repeat the experiments from a research study and obtain similar results is a corner stone in experiment-based scientific discovery. This essential feature has been often ignored by the distributed computing and networking community. There are many reasons for that, such as the complexity of provisioning, configuring, and orchestrating the resources used by experiments, their multipl… ▽ More

    Submitted 7 October, 2014; originally announced October 2014.

  16. arXiv:1409.2097  [pdf, other

    cs.SI cs.CR physics.soc-ph

    Paying for Likes? Understanding Facebook Like Fraud Using Honeypots

    Authors: Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq

    Abstract: Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform. Recently, the number of likes of a Facebook page has become a measure of its popularity and profitability, and an underground market of services boosting page likes, aka like farms, has emerged. Some reports have suggested that like farms use a network of pro… ▽ More

    Submitted 4 October, 2014; v1 submitted 7 September, 2014; originally announced September 2014.

    Comments: To appear in IMC 2014

  17. arXiv:1310.5446  [pdf, other

    cs.NI

    Rate Control Adaptation for Heterogeneous Handovers

    Authors: Olivier Mehani, Roksana Boreli, Guillaume Jourjon, Thierry Ernst

    Abstract: We present enhancements to the TCP-Friendly Rate Control mechanism (TFRC) designed to better handle the intermittent connectivity occurring in mobility situations. Our aim is to quickly adapt to new network conditions and better support real-time applications for which the user-perceived quality depends on the immediate transmission rate. We propose to suspend the transmission before disconnection… ▽ More

    Submitted 21 October, 2013; originally announced October 2013.

    Comments: Also available from http://www.nicta.com.au/pub?id=6163

    Report number: NICTA TR-6163 MSC Class: 20.010 20.070 20.100

  18. arXiv:1205.3846  [pdf, other

    cs.PF cs.NI

    A Method for the Characterisation of Observer Effects and its Application to OML

    Authors: Olivier Mehani, Guillaume Jourjon, Thierry Rakotoarivelo

    Abstract: In all measurement campaigns, one needs to assert that the instrumentation tools do not significantly impact the system being monitored. This is critical to future claims based on the collected data and is sometimes overseen in experimental studies. We propose a method to evaluate the potential "observer effect" of an instrumentation system, and apply it to the OMF Measurement Library (OML). OML a… ▽ More

    Submitted 17 May, 2012; originally announced May 2012.

    Comments: 24 pages, submitted to ACM MSWIM 2012

    Report number: NICTA technical report number 5895