5 Aralık 2017 Salı

Data Stream


Data stream is data that is continuously generated from thousands of data sources and arrives simultaneously as small data packets. The data stream can include data from various sources such as log files, e-commerce data, click flow data, social media data, financial transactions and location services data generated by customers.

The data stream consists of fast and infinite series of data. Due to these two characteristics of the data stream, it is seen that today's computers are insufficient to process the flowing data in terms of both their memory potential and processing capacity. In order to overcome this problem, either the old batch processing algorithms need to be modified and rewritten, or new methods, algorithms and platforms need to be developed for the data stream.


Real-time data stream mining is slightly different from conventional batch processing. Because the entire data cannot be accessed at any time t. Due to this nature of the data stream, there are some difficulties in processing the data:
·         The data stream is continuous and infinite. It is impossible to store and process such large data in memory. Therefore, mechanisms that can process large-scale data with less memory should be developed.
·         It is necessary to process the incoming data with high speeds and give real-time responses. For this reason, generally single pass strategy is used in the data processing. However, traditional methods can access data several times. That is, while conventional methods can make random access, it is not possible for data stream.
·         Data stream may evolve (drift) over time. Thus, there may be inconsistency between the first and subsequent data.
·         In many algorithms, parameters are determined by expert opinion. Setting these parameters is even more difficult for  data stream, due to the lack of whole data.
·         Algorithms that run on data stream have to relearn a repeating pattern.
·         Concept drifts need to be accurately detected. it is not only necessary to detect concept drifts, but also to manage them.

4 Ekim 2017 Çarşamba

Security Of IoT


The Internet of Things (IoT) has entered our lives and has opened the doors for a new set of security threats. Have you ever thought about what could happen if your IoT-connected refrigerator was hacked? A kettle that you can turn on remotely using your phone. A refrigerator that tells you what food is on its shelves. The trainers who tell you the distance you jogging. We can easily give an examples of IoT in our lives.  But have you ever considered their safety?

For example, suppose you purchased an IoT-connected kettle with a standard default password and user name. You do not change the password and the manufacturer does not warn you; Suppose that the necessary security and data encryption measures are in place. What can a hacker do to detect this fundamental vulnerability and install malicious software on your kettle? Your attacked kettle can then be used to attack a targeted website, and what you perceive as a inanimate object can create a security nightmare.



The recent DDoS (distributed denial of service) Dyn attack also showed the need for an IoT security wake-up call. The October 21st attack included a cyber weapon called Mirai botnet, an IoT device used to bomb Dyn servers, such as digital cameras and DVR players. After the attack, a senior member of cyber security at the Council on Foreign Relations; David Fidler noted:

“We have a serious security issue with cyber security of IoT devices and we have no real strategy to combat it. Imagine what a well-sourced state actor can do with unsafe IoT devices.” Accordingly, security experts predicted the rise of the "Security of Objects" of the current year - new solutions, software and tools are needed to solve the security problems of smart devices.

What is really worrying is that IoT device owners are often not aware of the attacks. The reason for this is that once a device has been intercepted, it is impossible to say that they were attacked because they normally continue to function. When these devices, the targeted system, corporate servers, and even the same network with confidential government data are located, new scenes behind the problems continue to emerge. The point is that there is no way to develop an adequate security strategy without knowing which devices are exchanging data on a particular network or the Internet as a whole. In theory, each device added to a network needs to be evaluated for security.

8 Şubat 2017 Çarşamba

What İs Internet Of Thıngs (IoT)?


Internet of things (IoT) technology is the interaction of smart devices and communication. Today, the Internet of things extends from small household appliances to smart cities. The data obtained from these systems called as big data. IOT refers to all systems capable of transmitting data over a network without the need for interconnected computing devices, mechanical and digital machines, objects, animals, or people provided with unique identifiers (UIDs).


Increasingly, organizations in various industries use IoT technology to work more efficiently, provide better customer service, improve decision making and increase business value, and better understand customers. For example; Suppose that you have a smart watch on your arm. This smart watch need sensors that detect the distance you take, the steps you take and how your heart beats while doing these activities. The data collected here is analyzed by a client (computer, mobile phone, etc.) and helps us to streamline our lives. The communication between these two devices is the most fundamental feature that makes up the internet of objects.

Industrial IoT system consists of:
  • Intelligent beings that perceive, transmit and store information about themselves. So applications, controllers, sensors and security components.
  • Data communication infrastructure such as cloud systems.
  • Analytics and applications and people who produce business information from raw data.

IOT devices share the sensor data they collect by connecting it to an IOT gateway or to a terminal other than the cloud from which the data is sent to the cloud for local analysis or analyzed locally. Sometimes these devices communicate with other relevant devices and act on the information they receive from each other. Devices do most of the work without human intervention, but people can interact with the devices. For example, setting them up, giving instructions, or accessing data. The connectivity, network, and communication protocols used with these web-enabled devices depend largely on the specific IoT applications deployed.

Advantages Of IoT:

The Internet of Things provides organizations with a number of advantages that enable them to:
·         Monitor general business processes.
·         Improve customer experience.
·         To save time and money.
·         Improve employee productivity.
·         Integrate and adapt business models.
·         Make better business decisions.
·         To earn more income.