Revue de l'Information Scientifique et Technique

Information processing at the digital age

Description

The review aims at publishing research papers on any topic related to information processing at the digital age which includes but is not limited to: digital Libraries, Digital Humanities and Heritage, Artificial Intelligence, Natural Language Processing, Semantic Web Technologies, Linked Data, Databases, big data, Machine Learning, deep learning, computer vision, ... and other issues related to information access, ethics and privacy. The review welcomes papers in English, French and and Arabic from native Arabic speakers. Director of publication Nadjib Badache (CERIST, Algeria) Executive editor Hassina Aliane, (CERIST, Algeria) Editorial Board Abdelhak Lakhouadja (Mohamed First University, Morocco) Ahmed Abdelali (QCRI, Qatar) Ahmed Guessoum (USTHB, Algeria) Abdelfattah Hamdani (IERA, Morocco) Abdelkrim Meziane (CERIST, Algeria) Alexander Gelbukh (IPN, Mexico) Alexis Neme (Paris-8 University, France) Ali Farghaly (Oracle, USA) Amine Riadh Maouch (Boumerdes University, Algeria) Azzedine Maredj (CERIST, Algeria) Azzedine Mazraoui (Mohamed First University, Morocco) Eric Atwell (University of Leeds, UK) Eric Laporte (Paris-8 Univeristy, France) Farid Meziane (Salford, UK) Fatiha Sadat (UQAM, Canada) Fatma Zohra Bessai (CERIS, Algeria) Federico Boschetti (ICL A. Zampolli, Italy) Hadda Cherroun (Laghouat, University, Algeria) Hamid Azzoune (USTHB, Algeria) Hassina Aliane (CERIST, Algeria) Ismail biskri (Université Trois Rivières, Canada) Kais Haddar (University of Sfax, Tunis) Kamel Boukhalfa (USTHB, Algeria) Kamel Smaili (Loria, France) Kareem Darwich (QCRI, Qatar) Karim bouzoubaa (EMI, Morocco) Karima Akli, (USTHB, Algeria) Khaled Shaalan (British University of Dubai, UAE) Khaldoun Zreik (Paris-8 University, France) Lamia Hadrich Belguith (University of Sfax, Tunis) Mariem Gzara (Monastir, Tunis) Mathieu Lafoucarde (Montpellier University, France) Mohamed Benmohamed (Constantine University, Algeria) Mounir Zrigui (Monastir, Tunis) Mourad Loukam (Chlef University, Algeria) Mustapha Jarrar (Birzeit University, Palestine) Nadia Nouali (CERIST, Algeria) Nadjia Benblidia (Blida University, Algeria) Patrice Bellot (Aix- Marseille University, France) Philippe Blache (Aix- Marseille University, France) Omar Larouk (ENSSIB, France) Omar Nouali (CERIST, Algeria) Rabah Imache, (Boumerdes University, Algeria) Ruslan Mitkov (University of Wolverhampton, UK) Sahbi Sidhom (LORIA, France) Nasredine Semmar (CEA-LIST, France) Violetta Cavalli Sforza (Al Akhawayn University in Ifrane, Morocco) Vito Perelli (ICL A. Zampolli, Italy) Zaia Alimazighi (USTHB, Algeria)

21

Volumes

36

Numéros

304

Articles


Resistance against DoS attacks in VANETs using the IDS Snort

Rahal Rabah,  Kahya Noudjoud,  Ghoualmi-zine Nacira, 

Résumé: The Denial of Service (DoS) attack represents one of the most dangerous problems in the field of computer security. It purpose is to threaten the availability of a service or a system. Its application in a network like VANET (vehicular ad-hoc networks) could even cause fatal accidents. To combat this kind of vulnerability, we propose the use of an intrusion detection system (IDS) known as Snort. This IDS will allow us to detect it and fight it by applying a Tcp reset attack against the attacker, which is a computer attack that can be used for a beneficial reason. In this paper, we will implement Snort in a real vehicular network established at the University of Badji Mokhtar Annaba, Algeria. We will apply a DoS attack on a target vehicle. We will extract information about the throughput problems in order to create an image on the damages brought by the attacker on the target machine. We will study the effectiveness of Snort in fighting against the applied attack. Finally, we will study the impact of speed on Snort's effectiveness. The results shows the efficiency of Snort, were it decreased the rate of throughput problems caused by DoS with 51% at a speed of 20 km/h.

Mots clés: VANET ; Security ; DoS ; IDS ; Snort ; Tcp-reset ; Test-bed


Acknowledgment-based Approach for Coping with Node Misbehavior in Mobile Ad hoc Network

Bounouni Mahdi,  Bouallouche-medjkoune Louiza,  Choulak Elhadi,  Chiker Mehdi, 

Résumé: A mobile ad hoc network (MANET) is a collection of nodes that are able to communicate without the help of a pre-existing infrastructure or a centralized administration. Several routing protocols have been proposed to ensure communication between nodes based on the assumption that all nodes are willing to cooperate to forward data packets from a source node to a destination node. However, such cooperation cannot be guaran-teed because some nodes may behave maliciously by dropping packets destined to be forwarded. To cope with the malicious behavior of nodes, we have proposed an acknowledgment-based approach called IAACK (Improved AACK). IAACK approach is organized around three components. The monitoring component is responsible for monitoring the correct forwarding of data packets in order to detect eventual dropping activities of nodes. The reputation component evaluates the nodes trustworthiness by computing the nodes reputation instead of the links reputation. Nodes are classified into different cooperation category according to their reputation values. Thus, the reputation value of a node is updated according to its cooperation category. The isolation component punishes nodes having the reputation values smaller than the reputation threshold. The simulation results demonstrate that our approach IAACK improves the throughput and reduces the dropping ratio of malicious nodes.

Mots clés: MANET ; Malicious nodes ; Reputation ; Security ; Network simulator


On public key cryptosystems based on Thue Monoid Morphism Interpretation (TMMI)

ناضر غصبان, 

Résumé: The asymmetric encryption methods are based on difficult problems in mathematics. Let Σ^* be the free monoid over a finite alphabet Σ and R a binary relation on Σ^*. The pair (Σ,R) is called a Thue system. The congruence generated by R is defined as follows: xuy⟷_R xvy, whenever x,y∈Σ^*and uRv or vRu. w〖⟷_R〗^* w', whenever u_0,u_1,…,u_n∈Σ^*with, u_0=w,u_i ⟷_R u_(i+1),∀0≤i≤n-1,u_n=w^'. The word problem for R on Σ^* is then following : given two words w_1,w_2∈Σ^*, do we have〖 w〗_1 〖⟷_R〗^* w_2 ? [7] In this paper we investigate on a public key cryptosystems based on the difficult word problem in free monoid, introduced by Wagner and Magyarik in 1985. It's well known that the word problem is undecidable in general, meaning that there is no algorithm to solve it. We introduce some cryptosystems based on the Thue Monoid Morphism Interpresentation where the word problem is decidable in linear time.

Mots clés: Free monoid, Thue system, Finitely presented monoids, Word problem in monoid, Public key cryptography


A new deep learning-based chatbot system for the Customer service companies

طاهر مهني,  نجم الدين بوجلال, 

Résumé: People want to communicate with technology in the same manner they communicate with other human beings, and the communication between brands and their clients has never been so intense as it is nowadays. With the rapid development of technology, the customer experience is changing dramatically. Customers want more autonomy and self-service options, preferring to make a purchase or get information without interacting with the human representative of the brand. Therefore, the use of chatbots in customer service can be a solution to the crucial issue of improving customer-brand communication. Companies are using this technology to create better engagement with their clients with the help of messaging platforms, to offer a regular chat function, in-message purchasing, and many other advanced functions. In our work, we have explored two deferent chatbot systems, the first bot is an open domain deep learning chatbot that has been trained on our personal computer, and the second one is a customer service chatbot that designed and trained in Google cloud platform.

Mots clés: Deep learning ; chatbot ; customer service ; Dialogflow ; sequence-to-sequence ; TensorFlow


A Neural Model for content-based XML Information Retrieval

Bessai-mechmache Fatma Zohra,  Abdi Tariq,  Hadibi Abdennour, 

Résumé: The aim of content-based XML information retrieval system is to select relevant XML elements according to user query expressed by keywords. The main issue for this system is how to select relevant XML elements belonging to various XML document sources in relation to a given query. To do this, we propose a neural XML information retrieval model using Kohonen self-organizing maps. Kohonen self-organizing map produces density map that form the foundations of the XML information retrieval system

Mots clés: Neural Networks; Self-organizing maps; heterogeneous XML data; XML Information Retrieval.


A pivot language based approach to multilingual document representation and information retrieval including Arabic

بوشام سهيلة, 

Résumé: Arabic language has become an increasing interest in the field of Multilingual Information Retrieval (MIR). We deal in this work with the problem of Information Retrieval in a trilingual containing corpus documents in Arabic, French and English languages. We propose a language independent approach based on a pivot language. The proposed approach combines a surface analysis and the Latent Semantic Analysis (LSA) statistical algorithm in a new way to break the terms of LSA down into units which correspond more closely to morphemes. These morphemes are the variable length character n-gram candidates extracted from different fragments separated by borders. The obtained results are encouraging and competitive with state of the art results in multilingual field.

Mots clés: multilingual document representation ; multilingual information retrieval including Arabic ; virtual document ; principle of border ; fragments and variable length character n-grams ; parallel corpus ; surface analysis and the LSA statistical algorithm ; concept types ; pivot language


Resistance against DoS attacks in VANETs using the IDS Snort

Rahal Rabah,  Kahya Noudjoud,  Ghoualmi-zine Nacira, 

Résumé: The Denial of Service (DoS) attack represents one of the most dangerous problems in the field of computer security. It purpose is to threaten the availability of a service or a system. Its application in a network like VANET (vehicular ad-hoc networks) could even cause fatal accidents. To combat this kind of vulnerability, we propose the use of an intrusion detection system (IDS) known as Snort. This IDS will allow us to detect it and fight it by applying a Tcp reset attack against the attacker, which is a computer attack that can be used for a beneficial reason. In this paper, we will implement Snort in a real vehicular network established at the University of Badji Mokhtar Annaba, Algeria. We will apply a DoS attack on a target vehicle. We will extract information about the throughput problems in order to create an image on the damages brought by the attacker on the target machine. We will study the effectiveness of Snort in fighting against the applied attack. Finally, we will study the impact of speed on Snort's effectiveness. The results shows the efficiency of Snort, were it decreased the rate of throughput problems caused by DoS with 51% at a speed of 20 km/h.

Mots clés: VANET ; Security ; DoS ; IDS ; Snort ; Tcp-reset ; Test-bed


SINECDS: Secure Initial Network based on Elliptic Curve key exchange with Digital Signature in IEEE 802.16

Kahya Noudjoud, 

Résumé: The initial network process is the begin step to start communication between Mobil station (MS) and Base station (BS). This process is exceptionally critical and must be secure. After, we have studied the initial network process we find that there are many messages send in this process are not encrypted nor authenticated, by consequence several attacks are possible like Denial Of Service, Replay, Reflection, and Man-In-The-Middle. The weakness for this process has attracted a number of researchers. For our part, we propose a new solution called Secure Initial Network based on Elliptic Curve key exchanges with Digital Signature (SINECDS). According to formal verification tool AVISPA, the results show that (SINECDS) preserves all the basic security features like authentication, confidentiality, perfect forward security, and can resist to denial of service, prevents Men In The Middle, Replay, Reflection attacks, and grants no Repudiation. SINECDS improve performance greatly because it reduce the number of messages exchanged between Mobil Station and Base Station, with less computation complexity and perfect security. Using our proposition not only solves the ranging process but also secure Negotiation basic capabilities and authentication and key exchange process.

Mots clés: EEE 802.16 ; Security ; Initial Network Entry ; SINECDS ; Formal Verification ; AVISPA