You are on page 1of 54

Advances in Information and

Communication Networks: Proceedings


of the 2018 Future of Information and
Communication Conference (FICC), Vol.
2 Kohei Arai
Visit to download the full and correct content document:
https://textbookfull.com/product/advances-in-information-and-communication-network
s-proceedings-of-the-2018-future-of-information-and-communication-conference-ficc-
vol-2-kohei-arai/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Advances in Information and Communication Networks:


Proceedings of the 2018 Future of Information and
Communication Conference (FICC), Vol. 1 Kohei Arai

https://textbookfull.com/product/advances-in-information-and-
communication-networks-proceedings-of-the-2018-future-of-
information-and-communication-conference-ficc-vol-1-kohei-arai/

Proceedings of the Future Technologies Conference FTC


2018 Volume 2 Kohei Arai

https://textbookfull.com/product/proceedings-of-the-future-
technologies-conference-ftc-2018-volume-2-kohei-arai/

Proceedings of the Future Technologies Conference FTC


2018 Volume 1 Kohei Arai

https://textbookfull.com/product/proceedings-of-the-future-
technologies-conference-ftc-2018-volume-1-kohei-arai/

Intelligent Computing: Proceedings of the 2018


Computing Conference, Volume 2 Kohei Arai

https://textbookfull.com/product/intelligent-computing-
proceedings-of-the-2018-computing-conference-volume-2-kohei-arai/
Proceedings of the Future Technologies Conference (FTC)
2020, Volume 1 Kohei Arai

https://textbookfull.com/product/proceedings-of-the-future-
technologies-conference-ftc-2020-volume-1-kohei-arai/

Advances in Information and Communication Technologies:


Processing and Control in Information and Communication
Systems Mykhailo Ilchenko

https://textbookfull.com/product/advances-in-information-and-
communication-technologies-processing-and-control-in-information-
and-communication-systems-mykhailo-ilchenko/

Advances in Information Communication Technology and


Computing Proceedings of AICTC 2019 Vishal Goar

https://textbookfull.com/product/advances-in-information-
communication-technology-and-computing-proceedings-of-
aictc-2019-vishal-goar/

Intelligent Computing Proceedings of the 2020 Computing


Conference Volume 2 Kohei Arai

https://textbookfull.com/product/intelligent-computing-
proceedings-of-the-2020-computing-conference-volume-2-kohei-arai/

Recent Advances in Information and Communication


Technology 2019: Proceedings of the 15th International
Conference on Computing and Information Technology
(IC2IT 2019) Pongsarun Boonyopakorn
https://textbookfull.com/product/recent-advances-in-information-
and-communication-technology-2019-proceedings-of-the-15th-
international-conference-on-computing-and-information-technology-
Advances in Intelligent Systems and Computing 887

Kohei Arai
Supriya Kapoor
Rahul Bhatia Editors

Advances in
Information and
Communication
Networks
Proceedings of the 2018 Future of
Information and Communication
Conference (FICC), Vol. 2
Advances in Intelligent Systems and Computing

Volume 887

Series editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
e-mail: kacprzyk@ibspan.waw.pl
The series “Advances in Intelligent Systems and Computing” contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all
disciplines such as engineering, natural sciences, computer and information science, ICT, economics,
business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the
areas of modern intelligent systems and computing such as: computational intelligence, soft computing
including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms,
social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and
society, cognitive science and systems, Perception and Vision, DNA and immune based systems,
self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics including
human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent
data analysis, knowledge management, intelligent agents, intelligent decision making and support,
intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings
of important conferences, symposia and congresses. They cover significant recent developments in the
field, both of a foundational and applicable character. An important characteristic feature of the series is
the short publication time and world-wide distribution. This permits a rapid and broad dissemination of
research results.

Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: nikhil@isical.ac.in
Members
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing, Universidad Central de Las Villas, Santa
Clara, Cuba
e-mail: rbellop@uclv.edu.cu
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: escorchado@usal.es
Hani Hagras, School of Computer Science & Electronic Engineering, University of Essex, Colchester, UK
e-mail: hani@essex.ac.uk
László T. Kóczy, Department of Information Technology, Faculty of Engineering Sciences, Győr, Hungary
e-mail: koczy@sze.hu
Vladik Kreinovich, Department of Computer Science, University of Texas at El Paso, El Paso, TX, USA
e-mail: vladik@utep.edu
Chin-Teng Lin, Department of Electrical Engineering, National Chiao Tung University, Hsinchu, Taiwan
e-mail: ctlin@mail.nctu.edu.tw
Jie Lu, Faculty of Engineering and Information, University of Technology Sydney, Sydney, NSW, Australia
e-mail: Jie.Lu@uts.edu.au
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: epmelin@hafsamx.org
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: nadia@eng.uerj.br
Ngoc Thanh Nguyen, Wrocław University of Technology, Wrocław, Poland
e-mail: Ngoc-Thanh.Nguyen@pwr.edu.pl
Jun Wang, Department of Mechanical and Automation, The Chinese University of Hong Kong, Shatin,
Hong Kong
e-mail: jwang@mae.cuhk.edu.hk

More information about this series at http://www.springer.com/series/11156


Kohei Arai Supriya Kapoor

Rahul Bhatia
Editors

Advances in Information
and Communication
Networks
Proceedings of the 2018 Future of Information
and Communication Conference (FICC),
Vol. 2

123
Editors
Kohei Arai Rahul Bhatia
Faculty of Science and Engineering The Science and Information
Saga University (SAI) Organization
Saga, Japan New Delhi, India

Supriya Kapoor
The Science and Information
(SAI) Organization
Bradford, West Yorkshire, UK

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-3-030-03404-7 ISBN 978-3-030-03405-4 (eBook)
https://doi.org/10.1007/978-3-030-03405-4

Library of Congress Control Number: 2018959425

© Springer Nature Switzerland AG 2019


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

On behalf of the organizing committee of the Future of Information and


Communication Conference (FICC), it is an honour and a great pleasure to wel-
come you to the FICC 2018 which was held from 5 to 6 April 2018 in Singapore.
The Conference is organized by the SAI Conferences, a group of annual con-
ferences produced by The Science and Information (SAI) Organization, based in the
UK.
The digital services nowadays are changing the lives of people across the globe.
So is the Information and Communication which plays a significant role in our
society. The Future of Information and Communication Conference (FICC), 2018,
focuses on opportunities for the researchers from all over the world. Bringing
together experts from both industry and academia, this Information and
Communication Conference delivers programmes of latest research contributions
and future vision (inspired by the issues of the day) in the field and potential impact
across industries.
FICC 2018 attracted a total of 361 submissions from many academic pioneering
researchers, scientists, industrial engineers, students from all around the world.
These submissions underwent a double-blind peer-review process. Of those 361
submissions, 104 submissions (including 9 poster papers) have been selected to be
included in this proceedings. It covers several hot topics which include ambient
intelligence, communication, computing, data science, intelligent systems, Internet
of things, machine learning, networking, security and privacy. The Conference held
over two days hosted paper presentations, poster presentations as well as project
demonstrations.
Many thanks go to the Keynote Speakers for sharing their knowledge and
expertise with us and to all the authors who have spent the time and effort to
contribute significantly to this Conference. We are also indebted to the organizing
committee for their great efforts in ensuring the successful implementation of the
Conference. In particular, we would like to thank the technical committee for their
constructive and enlightening reviews on the manuscripts.

v
vi Preface

We are pleased to present the first proceedings of this Conference as its pub-
lished record. Our sincere thanks to all the sponsors, press, print and electronic
media for their excellent coverage of this Conference.
Hope to see you in 2019, in our next Future of Information and Communication
Conference but with the same amplitude, focus and determination.

Kohei Arai
Contents

Hybrid Data Mining to Reduce False Positive and False Negative


Prediction in Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . . 1
Bala Palanisamy, Biswajit Panja, and Priyanka Meharia
Adblock Usage in Web Advertisement in Poland . . . . . . . . . . . . . . . . . . 13
Artur Strzelecki, Edyta Abramek, and Anna Sołtysik-Piorunkiewicz
Open Algorithms for Identity Federation . . . . . . . . . . . . . . . . . . . . . . . . 24
Thomas Hardjono and Alex Pentland
A Hybrid Anomaly Detection System for Electronic Control
Units Featuring Replicator Neural Networks . . . . . . . . . . . . . . . . . . . . . 43
Marc Weber, Felix Pistorius, Eric Sax, Jonas Maas, and Bastian Zimmer
Optimizing Noise Level for Perturbing Geo-location Data . . . . . . . . . . . 63
Abhinav Palia and Rajat Tandon
Qualitative Analysis for Platform Independent Forensics Process
Model (PIFPM) for Smartphones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
F. Chevonne Thomas Dancer
Privacy Preserving Computation in Home Loans Using the
FRESCO Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Fook Mun Chan, Quanqing Xu, Hao Jian Seah, Sye Loong Keoh,
Zhaohui Tang, and Khin Mi Mi Aung
Practically Realisable Anonymisation of Bitcoin Transactions
with Improved Efficiency of the Zerocoin Protocol . . . . . . . . . . . . . . . . 108
Jestine Paul, Quanqing Xu, Shao Fei, Bharadwaj Veeravalli,
and Khin Mi Mi Aung
Walsh Sampling with Incomplete Noisy Signals . . . . . . . . . . . . . . . . . . . 131
Yi Janet Lu

vii
viii Contents

Investigating the Effective Use of Machine Learning Algorithms


in Network Intruder Detection Systems . . . . . . . . . . . . . . . . . . . . . . . . . 145
Intisar S. Al-Mandhari, L. Guan, and E. A. Edirisinghe
Anonymization of System Logs for Preserving Privacy
and Reducing Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Siavash Ghiasvand and Florina M. Ciorba
Detecting Target-Area Link-Flooding DDoS Attacks Using Traffic
Analysis and Supervised Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Mostafa Rezazad, Matthias R. Brust, Mohammad Akbari, Pascal Bouvry,
and Ngai-Man Cheung
Intrusion Detection System Based on a Deterministic Finite
Automaton for Smart Grid Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Nadia Boumkheld and Mohammed El Koutbi
The Detection of Fraud Activities on the Stock Market Through
Forward Analysis Methodology of Financial Discussion Boards . . . . . . . 212
Pei Shyuan Lee, Majdi Owda, and Keeley Crockett
Security Enhancement of Internet of Things Using Service Level
Agreements and Lightweight Security . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Shu-Ching Wang, Ya-Jung Lin, Kuo-Qin Yan, and Ching-Wei Chen
Enhancing the Usability of Android Application Permission Model . . . . 236
Zeeshan Haider Malik, Habiba Farzand, and Zahra Shafiq
MUT-APR: MUTation-Based Automated Program Repair
Research Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Fatmah Y. Assiri and James M. Bieman
GPU_MF_SGD: A Novel GPU-Based Stochastic Gradient Descent
Method for Matrix Factorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Mohamed A. Nassar, Layla A. A. El-Sayed, and Yousry Taha
Effective Local Reconstruction Codes Based on Regeneration
for Large-Scale Storage Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Quanqing Xu, Hong Wai Ng, Weiya Xi, and Chao Jin
Blockchain-Based Distributed Compliance in Multinational
Corporations’ Cross-Border Intercompany Transactions . . . . . . . . . . . . 304
Wenbin Zhang, Yuan Yuan, Yanyan Hu, Karthik Nandakumar,
Anuj Chopra, Sam Sim, and Angelo De Caro
HIVE-EC: Erasure Code Functionality in HIVE
Through Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Aatish Chiniah and Mungur Utam Avinash Einstein
Contents ix

Self and Regulated Governance Simulation . . . . . . . . . . . . . . . . . . . . . . 331


Hock Chuan Lim
Emergency Departments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
Salman Alharethi, Abdullah Gani, and Mohd Khalit Othman
Benchmarking the Object Storage Services for Amazon and Azure . . . . 359
Wedad Ahmed, Hassan Hajjdiab, and Farid Ibrahim
An Improvement of the Standard Hough Transform Method Based
on Geometric Shapes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
Abdoulaye Sere, Frédéric T. Ouedraogo, and Boureima Zerbo
Recognition of Fingerprint Biometric System Access Control
for Car Memory Settings Through Artificial Neural Networks . . . . . . . 385
Abdul Rafay, Yumnah Hasan, and Adnan Iqbal
Haar Cascade Classifier and Lucas–Kanade Optical Flow Based
Realtime Object Tracker with Custom Masking Technique . . . . . . . . . . 398
Karishma Mohiuddin, Mirza Mohtashim Alam, Amit Kishor Das,
Md. Tahsir Ahmed Munna, Shaikh Muhammad Allayear,
and Md. Haider Ali
Modified Adaptive Neuro-Fuzzy Inference System Trained by
Scoutless Artificial Bee Colony . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Mohd Najib Mohd Salleh, Norlida Hassan, Kashif Hussain, Noreen Talpur,
and Shi Cheng
Conditional Image Synthesis Using Stacked Auxiliary Classifier
Generative Adversarial Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Zhongwei Yao, Hao Dong, Fangde Liu, and Yike Guo
Intelligent Time Series Forecasting Through Neighbourhood
Search Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
Murphy Choy and Ma Nang Laik
SmartHealth Simulation Representing a Hybrid Architecture Over
Cloud Integrated with IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Sarah Shafqat, Almas Abbasi, Tehmina Amjad, and Hafiz Farooq Ahmad
SDWM: Software Defined Wi-Fi Mobility for Smart IoT Carriers . . . . 461
Walaa F. Elsadek and Mikhail N. Mikhail
Smart Eco-Friendly Traffic Light for Mauritius . . . . . . . . . . . . . . . . . . . 475
Avinash Mungur, Abdel Sa’d Bin Anwar Bheekarree,
and Muhammad Bilaal Abdel Hassan
Logistics Exceptions Monitoring for Anti-counterfeiting
in RFID-Enabled Supply Chains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488
Xiaoming Yao, Xiaoyi Zhou, and Jixin Ma
x Contents

Precision Dairy Edge, Albeit Analytics Driven: A Framework


to Incorporate Prognostics and Auto Correction Capabilities
for Dairy IoT Sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506
Santosh Kedari, Jaya Shankar Vuppalapati, Anitha Ilapakurti,
Chandrasekar Vuppalapati, Sharat Kedari, and Rajasekar Vuppalapati
An IoT System for Smart Building . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522
Khoumeri El-Hadi, Cheggou Rabea, Farhah Kamila, and Rezzouk Hanane
Aiding Autobiographical Memory by Using Wearable Devices . . . . . . . 534
Jingyi Wang and Jiro Tanaka
Intelligent Communication Between IoT Devices on Edges
in Retail Sector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546
M. Saravanan and N. C. Srinidhi Srivatsan
A Survey on SDN Based Security in Internet of Things . . . . . . . . . . . . . 563
Renuga Kanagavelu and Khin Mi Mi Aung
Cerebral Blood Flow Monitoring Using IoT Enabled
Cloud Computing for mHealth Applications . . . . . . . . . . . . . . . . . . . . . 578
Beulah Preethi Vallur, Krishna Murthy Kattiyan Ramamoorthy,
Shahnam Mirzaei, and Shahram Mirzai
When Siri Knows How You Feel: Study of Machine Learning
in Automatic Sentiment Recognition from Human Speech . . . . . . . . . . . 591
L. Zhang and E. Y. K. Ng
A Generic Multi-modal Dynamic Gesture Recognition System Using
Machine Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
G. Gautham Krishna, Karthik Subramanian Nathan, B. Yogesh Kumar,
Ankith A. Prabhu, Ajay Kannan, and Vineeth Vijayaraghavan
A Prediction Survival Model Based on Support Vector Machine
and Extreme Learning Machine for Colorectal Cancer . . . . . . . . . . . . . 616
Preeti, Rajni Bala, and Ram Pal Singh
Sentiment Classification of Customer’s Reviews About Automobiles
in Roman Urdu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 630
Moin Khan and Kamran Malik
Hand Gesture Authentication Using Depth Camera . . . . . . . . . . . . . . . . 641
Jinghao Zhao and Jiro Tanaka
FSL-BM: Fuzzy Supervised Learning with Binary Meta-Feature
for Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
Kamran Kowsari, Nima Bari, Roman Vichr, and Farhad A. Goodarzi
A Novel Method for Stress Measuring Using EEG Signals . . . . . . . . . . 671
Vinayak Bairagi and Sanket Kulkarni
Contents xi

Fog-Based CDN Architecture Using ICN Approach for Efficient


Large-Scale Content Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
Fatimah Alghamdi, Ahmed Barnawi, and Saoucene Mahfoudh
Connectivity Patterns for Supporting BPM in Healthcare . . . . . . . . . . . 697
Amos Harris and Craig Kuziemsky
A Systematic Review of Adaptive and Responsive Design
Approaches for World Wide Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704
Nazish Yousaf, Wasi Haider Butt, Farooque Azam,
and Muhammad Waseem Anwar
Quantum Adiabatic Evolution with a Special Kind
of Interpolating Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718
Jie Sun, Songfeng Lu, and Chao Gao
Extraction, Segmentation and Recognition of Vehicle’s License
Plate Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724
Douglas Chai and Yangfan Zuo
A Comparison of Canny Edge Detection Implementations
with Hadoop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733
Josiah Smalley and Suely Oliveira
Analysis and Prediction About the Relationship of Foreign Exchange
Market Sentiment and Exchange Rate Trend . . . . . . . . . . . . . . . . . . . . 744
Wanyu Du and Mengji Zhang
Effectiveness of NEdT and Band 10 (8.3 lm) of ASTER/TIR
on SSST Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750
Kohei Arai
Raspberry Pi Based Smart Control of Home Appliance System . . . . . . . 759
Cheggou Rabea, Khoumeri El-Hadi, Farhah Kamila, and Rezzouk Hanane
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
Hybrid Data Mining to Reduce False Positive
and False Negative Prediction in Intrusion
Detection System

Bala Palanisamy(&), Biswajit Panja, and Priyanka Meharia

Department of Computer Science, Eastern Michigan University,


Ypsilanti, MI 48197, USA
{bpalanis,bpanja,pmeharia}@emich.edu

Abstract. This paper proposes an approach of data mining machine learning


methods for reducing the false positive and false negative predictions in existing
Intrusion Detection Systems (IDS). It describes our proposal for building a
confidential strong intelligent intrusion detection system which can save data
and networks from potential attacks, having recognized movement or
infringement regularly reported ahead or gathered midway. We have addressed
different data mining methodologies and presented some recommended
approaches which can be built together to enhance security of the system. The
approach will reduce the overhead of administrators, who can be less concerned
about the alerts as they have been already classified and filtered with less false
positive and false negative alerts. Here we have made use of KDD-99 IDS
dataset for details analysis of the procedures and algorithms which can be
implemented.

Keywords: Intrusion Detection Systems  Data mining  Intrusion detection


Anomaly detection  SVM  KNN  ANN

1 Introduction

With rapid developments and innovations in computer technology and networks, the
number of people using technology to commit cyber-attacks is also increasing. In order
to prevent this, we must take preventive measures to stop these crimes and stay secure.
A strong computer system can prevent potential attacks by having a good Intrusion
Detection System (IDS) in place. Intrusion Detection Systems are used to preserve data
availability over the network by detecting patterns of known attacks which are defined
by experts. These patterns are usually defined by a set of rules which are validated with
a set of common occurring events and probable intrusion sequences. There are many
Intrusion Detection Systems available in the market, based on which environment and
system they are used for. IDSs can be used in small home networks or in huge
organizations which have large systems in multiple locations across the globe. Some of
the well-known IDSs are Snort, NetSim, AIDE, Hybrid IDS, Samhain, etc.
The Internet has become an indispensable tool for exchanging information among
users and organizations, and security is an essential aspect in this type of

© Springer Nature Switzerland AG 2019


K. Arai et al. (Eds.): FICC 2018, AISC 887, pp. 1–12, 2019.
https://doi.org/10.1007/978-3-030-03405-4_1
2 B. Palanisamy et al.

communication. IDSs are often used to sniff network packets to provide a better
understanding of what is happening in a particular network. Two mainstream prefer-
ences for IDSs are (1) host-based IDSs, and (2) network-based IDSs. Correspondingly,
the detection methods used in IDS are anomaly based and misuse based (also called
signature or knowledge based), each having their own advantages and restrictions. In
misuse-based detection, data gathered from the system is compared to a set of rules or
patterns, also known as signatures, to describe network attacks. The core difference
between these two techniques is that anomaly-based IDS uses collections of data
containing examples of normal behavior and builds a model of familiarity, therefore,
any action that deviates from the model is considered suspicious and is classified as an
intrusion in misuse-based detection, attacks are represented by signatures or patterns.
However, this approach does not contribute much in terms of zero-day attack detection.
The main issue is how to build permanent signatures that have all the possible varia-
tions and non-intrusive activities to lower the false-negative and false-positive alarms.
An Intrusion Detection System screens a computer system or networks for any
malignant movement, crime, or illegal violation over the network. Any recognized
infringement is regularly reported ahead or gathered midway. It consolidates activities
from different sources, and uses alerting methods to distinguish malignant movement
from false alarms. One way of building a highly secure system is by using a very good
Intrusion Detection System by recognizing Illegal utilization of those systems. These
systems work by monitoring strange or suspicious actions that are most likely indi-
cators of crime activity.
Although an extensive variety of approaches are used to secure data in today’s
composed environment, these systems regularly fail. An early acknowledgment of such
occasions is the key for recovering lost or affected data without much adaptable quality
issues. As of now, IDSs have numerous false cautions and repetition alerts. Our
approach is to reduce the number of false positive and false negative alerts from the
Intrusion Detection System by improving the system’s proficiency and precision. In
such scenarios the global rule set will not be applicable to some of the common usage
pattern in some surroundings. Separating approved and unapproved acts is a trouble-
some issue. Marks pointing to an intrusion may also correspond to approved system
use, bringing about false alerts. This is especially troublesome while implementing
business sector corresponding Intrusion Detection Systems.
Here we propose the design of an intelligent Intrusion Detection System which
makes use of Data Mining techniques to detect and identify the possible threats from
the threats suggested by a currently implemented Intrusion Detection System by
reducing the False Positive and False Negative alerts. We apply data mining techniques
such as Decision Trees, Naïve Bayes Probability classifier, Artificial Neural Networks
(ANN), and K-Nearest Neighbor’s algorithm (KNN). Data mining is helpful in iden-
tifying obtrusive behavior and typical normal behavior.
Currently we can differentiate between normal actions and illegal or strange acts
from data mining continuous information updates. The administrators can be less
concerned about the alerts as they have been already classified and filtered. We also
allow making rapid addition and acquiring of knowledge which will be more helpful in
terms of maintenance and operational administration of Intrusion Detection System.
Hybrid Data Mining to Reduce False Positive and False Negative Prediction 3

Today’s developments in technology have created huge breakthroughs in internet


networks which have also increased computer related crime. Thus there is a huge
demand for developments in cyber security to preserve our data, detect any security
threats and make corrections to enhance the security over the sharing networks. We
must make our environments secure with use of secured firewall and antivirus software,
and a highly sophisticated Intrusion Detection System. Some of the common types of
attacks in a secured network are Probe or Scan, Remote to Local, User to Root, and
Denial of Service attacks. Organizations make use of IDSs to preserve data availability
from these attacks.
The current Intrusion Detection Systems send a security alert whenever any
sequence of events occurs that is similar to the ruleset defined for the common generic
environment. Large organizations which use these systems quite often receive
numerous alerts which are false alarms, because it is of a generic type, which may be
the organization’s common and typical work sequence. This means the administrators
must validate a large number of sequences. For example: An online marketing com-
pany is vulnerable of internet attacks and is also entirely dependent on the live values
of the items. Due to this reason they face problem of security alerts raised very often
saying the possibility of an attack on network. But the heavy user traffic is a typical part
of their operation during starting and end of the day scenario. Having a generic
Intrusion Detection System in place causes an overhead for the network administrators
due to frequent false positive and false negative alarms and also they do not have an
ability to identify new unknown attacks. So there is a need for an Intelligent Intrusion
Detection System which can overcome this problem with less false positive and false
negative cases.
In this proposed approach we have applied data mining techniques to common
generic predictions made by the Intrusion Detection system. This allows us to further
analyze the current system and try to classify and cluster our predictions and improve
them on the system events. Using such a system will create an intelligent IDS, which
can provide more stable predictions and the flexibility of having customizable systems
based on specific business sectors of an organizations, allowing it to better identify a
possible attack on the system.
In order to build a data mining machine learning system, we must have the data
evidently which has clearly labeled or collected data from the Intrusion Detection
System. IDSs usually have a huge amount of data available, regarding type of attack,
current network traffic, source port, destination port, type of service, region, traffic
sequence number, acknowledge number, message length, activity time, etc. This data
must be collected on normal working scenarios over a period of time and can then be
used to identify events and determine whether they are regular traffic or an actual
intrusion and attack on the system.
Data mining operations are done by two approaches in the proposed approach:
supervised and unsupervised learning. Supervised learning, also known as classifica-
tion, is a method that uses training data obtained from observations and measurements
classify events. This requires clearly labeled data indicating the operation type and
class of severity of the action which triggered event. Unsupervised learning, also
known as clustering, is a method used when the training data is unclear and only
consisting of observations and measurements. It identifies clusters in data and uses a
4 B. Palanisamy et al.

technique called clustering to find patterns in the high-dimensional unlabeled data. It is


a non-supervised pattern encounter method whenever the data is assembled together
with a comparison quantity.
For analyzing our proposed approach, we have used KDD 99 IDS dataset. This
database contains a standard set of data to be audited, which includes a wide variety of
intrusions simulated in a military network environment.
The 1998 DARPA Intrusion Detection Evaluation Program was prepared and
managed by MIT Lincoln Labs. The objective was to survey and evaluate research in
intrusion detection. It provided a standard set of data to be audited, which included a
wide variety of intrusions simulated in a military network environment. The 1999 KDD
intrusion detection contest uses a version of this dataset.
Attacks in the dataset fall into four main categories: DOS: denial-of-service, e.g.
syn flood; R2L: unauthorized access from a remote machine, e.g. guessing password;
U2R: unauthorized access to local super user (root) privileges, e.g., various “buffer
overflow” attacks; Probing: surveillance and other probing, e.g., port scanning.

2 Related Work

Xu et al. [1] discussed privacy preserving data mining (PPDM) in this paper, where the
basic idea is to do data mining approach efficiently devoid of conceding data. A
protected data like ID card numbers and cellphone numbers which shouldn’t be used
with mining and results which is disclosed will consequence in confidentiality defile-
ment. Data Provider is the source for the data which is chosen through the data mining
task. The provider must handle the sensitive data which some time he may hide. Data
collector has major role on protecting sensitive data. They suggest making use of
association rule mining or decision tree mining technique to predict the customer
buying habits by spending associations between different items that customers or to
make random substitutions using decision trees.
Yu et al. [2] proposes approach for the prevention of crimes by predicting the
hotspots and time where crime can happen using datamining classification techniques
using existing crime data. Classification is made on the data set to identify the hotspots
and heating up location in the grid. They are classified as either sociological norms or
the social signal. The predictions are made based from the probability of crime inci-
dents that happened in previous month or pattern. The variation of hotspot and cold
spot are identified based on the no True positives and False positives & negatives.
Hajian et al. [3] discussed usage of data mining machine techniques effectively on
the datasets which are commonly used in intrusion detection systems (IDS) applica-
tions by avoiding the data factors in datasets that causes discrimination (gender, age,
race, etc.). They introduce anti-discrimination with cyber security and proposes its
ideas of its success in judgment prevention with its data feature. Discrimination dis-
covery is the identification of the discriminating factors that influence the decisions and
the degree of discrimination which is affected by every factor. So they calculate the
probability of occurrence of a decision which is derived as the support and confident
factor for each discrimination factors used from the dataset.
Hybrid Data Mining to Reduce False Positive and False Negative Prediction 5

Xu et al. [4] concentrates on the identification of malware or any security violation


by using data mining technique for mobile application. They propose solution to the
problem with a cloud computing platform implemented with data mining which
analyses the android apps with (ASEF) which is an automated tool which works as a
virtual machine and can install applications on it and (SAAF) analysis method which
provides information on applications. They have described ways to static and dynamic
behavior analysis patterns of applications and then they apply machine learning
technique to analyze and classify the Android software by monitoring things happening
on kernel level. They have used PART, Prism and nNb classifiers to identify the
software either it is original or malicious.

3 Data Normalization and Pre Processing

Data from real-time systems will often be mostly unformatted, and in case of network
data the data usually consists of multiple formats and ranges. It is therefore necessary to
convert the data into a uniform range, which can help the classifier to make better
predictions. Data cleaning is required to filter accurate information from invalid or
unimportant data and distinguish important data fields from insignificant ones [5]. In
cases where organizations use multiple systems we must remove the redundant data
from the data set consolidated from the different systems. Missing value estimation
must also be performed for some of the fields which are not available. In many cases,
when we collect the data from the Intrusion Detection System we will have certain data
fields missing based on the particular sequence of events or scenarios. Missing value
estimation can be used to estimate probable values for those missing fields; however
information sections with excessively numerous missing qualities are probably not
going to convey much helpful data. Subsequently, information sections with a number
of missing qualities that exceeds a given limit can be expelled. The more stringent this
limit is, the more data that is expelled.
The KDD Cup99 dataset available in three different files, the KDD Full Dataset
which contains 4,898,431 instances, the KDD Cup 10% dataset which contains
494,021 instances, and the KDD Corrected dataset which contains 311,029 instances.
Each sample of the dataset represents a connection between two network hosts
according to network protocols. The connection is described by 41 attributes, 38 of
which are continuous or discrete numerical quantities and 3 of which are categorical
qualities. Each sample is labeled as either a normal sequence or a specific attack. The
dataset contains 23 class labels, 1 for normally occurring events and the remainder for
different attacks. The total 22 attack labels fall into the four attack categories: DOS,
R2L, U2R, and Probing.
Preprocessing this data consists of two steps, removing duplicate records and
normalizing the data. In the first step, we removed 3,823,439 duplicate records from the
4,898,431 instances of the KDD Full Dataset, leaving 1,074,992 distinct records.
Similarly, 348,435 duplicate records were removed from the KDD Cup 10% dataset’s
494,021 instances, obtaining 145,586 distinct records, a reduction of about 70%.
Data Normalization was performed by performing substitution for the columns
pertaining to protocol type, service, flag, and land. We replaced the different types of
6 B. Palanisamy et al.

attack classes with the 4 main classes, DOS, R2L, U2R and probing. We then per-
formed min–max normalization based on the values in respective columns, as the data
was discontinuous with different ranges for each column. The attributes were then
scaled to a range of 0–1.

4 Feature Selection

We currently have 41 features in KDD Dataset [9, 10] which are to be studied and
selected to obtain better performance by reducing the false positive and false negative
errors in the prediction and improve the accuracy. We can identify the most important
features and other least important features to improve our accuracy and prediction. We
first noted that several columns, including Num_outbound_cmds, and Is_hot_login,
were zero valued for all the records, so these columns could be omitted when per-
forming the data analysis.
We also studied the entropy of each column with a list of features for which the
class is most relevant, and selected the important features which were good indicators
for identifying the class of the attacks.

5 Dimension Reduction of Data

Having a large dataset makes predictability an issue as many of the data fields have
different scales of variability. Hence, in order to make the parameter rescaling easier we
make use of dimensional reduction. Figure 1 provides architecture of network intrusion
detection system.

Fig. 1. Network intrusion detection system data mining process diagram.

5.1 Principal Component Analysis


Dimensional reduction is a measurable methodology that orthogonally changes the first
n directions of an information set into another arrangement of n directions. As an
aftereffect of the change [6], the primary part has the biggest conceivable fluctuation of
values each succeeding segment has the most elevated conceivable difference under the
Hybrid Data Mining to Reduce False Positive and False Negative Prediction 7

limitation that it is orthogonal to the previous segments. Keeping just the main m < n
segments diminishes the information dimensionality while holding the vast majority of
the variety in the information.

5.2 Random Forests/Ensemble Trees


Random forests/Ensemble trees are one of the possible ways to deal with dimensional
reduction. It is implemented by reducing a vast decision tree, built in arrangement of
trees against an objective trait and based on every nodes utilization measurements to
locate the most instructive subset of components. In particular, we can produce a huge
set of decision trees, with every tree being prepared on a little portion of the aggregate
number of qualities. On the off chance that a trait is frequently chosen as best part, it is
in all probability an instructive element to hold. A score computed on the characteristic
utilization insights in the irregular branch which shows in respect to alternative qual-
ities – which are the most prescient properties.
Once the preparation of the data is finished we can apply the supervised
classification.
This paper proposes to use well known data mining classification algorithms such
as Artificial neural network [7–9] (ANN), Decision tree learning (DT), Naïve Bayes
classifier(NBC), Support vector machines (SVM), Nearest Neighbor Algorithm
(KNN). There are many significant reasons for combining multiple methods in our
analysis, mainly it provides a better performance and prediction supported by several
methods will give us better accuracy and will reduce false positive and false negative
cases.
After we have specific data we need to separate the data sets into the training
dataset and the testing dataset. Training datasets are used for learning the patterns of the
system to classify or cluster the data, and testing datasets are used to test the accuracy
of the system which we have trained.
Step 1: Convert the symbolic attributes protocol, service, and flag to numerical
ones.
Step 2: Normalize data to [0, 1]
Step 3: Separate the instances of 10% KDD training dataset into five categories:
Normal, DoS, Probe, R2L, and U2R.
Step 4: Apply modified K - means on each category and create new training
datasets.
Step 5: Train SVM and others with these new training datasets.
Step 6: Test model with corrected KDD dataset.
TN (True Negatives): Indicates the number of normal events successfully labeled
as normal.
FP (False Positives): Refer to the number of normal events being predicted as
attacks.
FN (False Negatives): The number of attack events incorrectly predicted as normal.
TP (True Positives): The number of attack events correctly predicted as attack.
8 B. Palanisamy et al.

6 Classification Process
6.1 Naïve Bayesian Classifier
Naïve Bayesian classifier uses the Bayes theorem to apply the posterior probability of
one event on other. It accepts that the impact of a probability on a given class is
autonomous of the estimations of different characteristics. Given a case, a Bayesian
classifier can anticipate the likelihood that the tuple has a place with a specific class.
Bayesian system or network system is a probability based graphical approach that
speaks to the factors and the connections between each of the classes. The system is
developed with hubs representing the different or constant arbitrary factors and coor-
dinated classes as the connections within them, setting up a coordinated non-cyclic
diagram. Bayesian systems are fabricated utilizing master learning or utilizing pro-
ductive calculations that perform surmising.
When we use the Naive Bayes, we must assume the dataset fields and features are
independent for each event and it is the most accurate because it is based on the
probability and can be represented as Bayesian network by combining graph theory and
probability. Bayesian networks can be used for learning the inference between the real
time intrusion scenarios and common regular scenarios.

6.2 Support Vector Machine


Support Vector Machine (SVM) is a well-known classification method. SVM utilizes a
nonlinear mapping to change the first train data into a higher measurement. Inside this
new measurement, SVM hunt down a direct ideal isolating class distribution by uti-
lizing support vectors and edges. The SVM is a classifier in light of finding an isolating
class distribution in the component space between two classes in a manner that the
separation between the class distribution and the nearest information purposes of every
class is improved.
The approach depends on a minimized classification chance instead of on ideal
order. SVMs are outstanding for their speculation capacity and are especially valuable
when the quantity of components, m is high and the quantity of information focuses, n
is low (the value of m greater than n). At the point when the two entities are not
distinguishable, loose factors are included and a cost feature is relegated for the cov-
ering information focuses. SVM among quick calculations is not stable when the
quantity of qualities is high.
We need to perform SVM classification training by selecting the features such that
it maximizes the prediction, picking the feature which is mutual from the attack case
and common case.
Here we have used a subset of KDD Dataset after multiple levels of normalization
we have now classified using the complete dataset and we have now able to obtain a
96% accuracy in prediction of dataset classes as normal or an intrusion scenario.
Hybrid Data Mining to Reduce False Positive and False Negative Prediction 9

6.3 Artificial Neural Networks


Artificial Neural Networks is a well-known methodology based on how the neurons in
our brain works. It consists of interconnected fake neurons equipped for specific cal-
culations on their information sources. The data information actuates the neuron net-
work nodes in the main layer of the system whose yield is passed to another node of
neurons in the system. Every layer transfers its yield to the next node and the final node
yields the outcome. Nodes in the middle of the info and yield nodes are alluded to as
concealed layers. At the point which an Artificial Neural Network is utilized as a
classifier, the yield nodes produce the last order classification.
ANN can create nonlinear models. The back-engendering highlight of the ANN
makes it conceivable to create an EX-OR rationale. When modifying in this node with
intermittent, feed forward, and convolutional NNs, ANNs are picking up in ubiquity
once more, and in the meantime winning many leads in late scenarios acknowledging
the. Since the propelled adaptations of ANNs require much additionally handling
power, they are actualized ordinarily on graph making units.
When ANN was applied to the 10% KDD Dataset, we were able to obtain an
accuracy of 94% when trained with the complete dataset.

6.4 K-Nearest Neighbours


KNN is a non-parametric classification algorithm which makes use of regression. It
attributes the closest neighbors grouping, the yield is a particular class classification.
KNN is example based learning, or slow realizing, where the capacity is just
approximated locally and all calculation is conceded until characterization.
The k-NN calculation [11, 12] is a relatively simple machine learning calculation.
In the training phase, it saves only the vectors and the field types, using the most
frequent data to influence the major decisions in this algorithm. This algorithm can be
varied by selecting different values for k, the neighbor limit number to a particular
sequence of data.
When KNN was applied to the 10% KDD Dataset, we were able to obtain an
accuracy of 70% when trained with the complete dataset with parameters k = 5.

6.5 Decision Trees


A decision tree is a simple algorithm which resembles a tree and branches in its
connections of elements and groupings. A model is ordered by testing its quality values
against the branches of the tree. At a particular node when constructing the decision
tree and at every hub of the tree, we must pick the appropriate element that is most
successfully suitable in its arrangement of cases into sub nodes. The leaf node is the
standardized data and where the quantity with the most elevated standardized data pick
up is settled on the root. The decision trees are the common representation where we
can denote high order precision, and straightforward execution. The fundamental
hindrance is that for information incorporating clear cut factors with an alternate
number of levels, data pick up qualities are one-sided for elements with high density of
10 B. Palanisamy et al.

branches. The decision tree is implemented by improving the data reachability at every
branch, results in data rank hierarchy.
Once the data is classified, we must compare the results. Our proposal is to have a
comparison graphs with the Accuracy, Classification limits, Time taken for the Model
which is known and Time taken for model that is unknown sequence of data.
Several models have been proposed to design multi-level IDS. Some models
classified DoS and Probe attacks at the first level, Normal category at the second level,
and both R2L and U2R categories at the third or last level. By contrast, other models
classified Normal, DoS, and Probe at the first level and R2L and U2R at the second
level. Figure 2 shows the scattered plot and Fig. 3 parallel coordinate plots. Table 1
show that SVM is more accurate than KNN and ANN.

Fig. 2. Scatter plot of results of KDD 10% Dataset where normal sets are in blue color and
intrusion sets are in red color.

Fig. 3. Parallel coordinate plot of data value distribution of 39 different features.

Table 1. Accuracy of KNN, ANN, SVM


KDD 10% Dataset Results
with each algorithm
KNN ANN SVM
Accuracy 70% 94% 96%
Hybrid Data Mining to Reduce False Positive and False Negative Prediction 11

7 Conclusion

In this paper we have discussed data mining techniques which all we can be applied to
build a strong and intelligent Intrusion Detection System. We have mainly targeted data
mining procedures to reduce false positive and false negative alerts, which will reduce
the overhead of a network administrator in an organization. It is also a very difficult to
collect the training dataset which is a crucial task for building the system. Even though
our methodology has not been proved for cybercrimes and attacks, this approach will
help us to build custom sector based Intrusion Detection System rather than having a
generic system which can be very confusing to handle.
The ideas which we have presented are introductory and in progress, so there must
be significant investment of further work to detail procedures on how to normalize the
data and how unrelated details of some of the specific attack scenarios can be filtered.
There are also additional methods to reduce the dimensions of the data that can be
explored. Sometimes it also depends on the type of intrusion detection systems as they
have a variety of formats that they can produce as the report and we also have to see
how we can extract the report to a data set which can used for mining. The classifi-
cation methods Naïve Bayes and Decision Trees will produce a straight forward results
though in terms of other methods K-Nearest Neighbors we have a difficulty of selecting
a proper k value which may have a lots of testing cases to be run to identify the right
value similar difficulties will also be for support vector and artificial neural network
method.

References
1. Xu, L., Jiang, C., Wang, J., Yuan, J., Ren, Y.: Information security in big data: privacy and
data mining. IEEE Access 2, 1149–1176 (2014)
2. Yu, C.H., Ward, M.W., Morabito, M., Ding, W.: Crime forecasting using data mining
techniques. In: 2011 IEEE 11th International Conference on Data Mining Workshops,
pp. 779–786. IEEE (2011)
3. Hajian, S., Domingo-Ferrer, J., Martinez-Balleste, A.: Discrimination prevention in data
mining for intrusion and crime detection. In: 2011 IEEE Symposium on Computational
Intelligence in Cyber Security (CICS), pp. 47–54. IEEE (2011)
4. Xu, J., Yu, Y., Chen, Z., Cao, B., Dong, W., Guo, Y., Cao, J.: Mobsafe: cloud computing
based forensic analysis for massive mobile applications using data mining. Tsinghua Sci.
Technol. 18(4), 418–427 (2013)
5. Bhattacharyya, S., Jha, S., Tharakunnel, K., Westland, J.C.: Data mining for credit card
fraud: a comparative study. Decis. Support Syst. 50(3), 602–613 (2011)
6. Hu, Y., Panda, B.: A data mining approach for database intrusion detection. In: Proceedings
of the 2004 ACM Symposium on Applied Computing, pp. 711–716. ACM (2004)
7. Ravisankar, P., Ravi, V., Rao, G.R., Bose, I.: Detection of financial statement fraud and
feature selection using data mining techniques. Decis. Support Syst. 50(2), 491–500 (2011)
8. Erskine, J.R., Peterson, G.L., Mullins, B.E., Grimaila, M.R.: Developing cyberspace data
understanding: using CRISP-DM for host-based IDS feature mining. In: Proceedings of the
Sixth Annual Workshop on Cyber Security and Information Intelligence Research, p. 74.
ACM (2010)
12 B. Palanisamy et al.

9. Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection
models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999,
pp. 120–132. IEEE (1999)
10. Feng, W., Zhang, Q., Hu, G., Huang, J.X.: Mining network data for intrusion detection
through combining SVMs with ant colony networks. Future Gener. Comput. Syst. 37, 127–
140 (2014)
11. Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In:
Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001)
(2001)
12. Julisch, K., Dacier, M.: Mining intrusion detection alarms for actionable knowledge. In:
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, pp. 366–375. ACM (2002)
Adblock Usage in Web
Advertisement in Poland

Artur Strzelecki(&), Edyta Abramek,


and Anna Sołtysik-Piorunkiewicz

Department of Informatics, University of Economics in Katowice,


Katowice, Poland
{artur.strzelecki,edyta.abramek,
anna.soltysik-piorunkiewicz}@ue.katowice.pl

Abstract. Research concerning users blocking advertisements constitutes a


new research area both in the scope of analysis of collected data regarding that
topic, determinants concerning users blocking advertisements and IT tools. The
paper refers to this and systematizes knowledge in the scope of types of online
advertisements and methods for blocking them using an adblock, and it iden-
tifies reasons and main categories of reasons for users blocking advertisements.
The research presented in the paper was confronted with results of an analysis of
application of adblocks. The obtained results will facilitate conducting further,
more thorough research. Considerations included in the paper can constitute a
set of recommendations for publishers displaying advertisements on websites
and they can be useful for drawing conclusions and preparing guidelines for
projects supporting sustainable development in the scope of online advertising.

Keywords: Adblock  Ads blocking  Web advertisement

1 Introduction

During the early years of development of the internet, advertisements displayed on


websites were not considered as invasive. Usually, they were presented in the form of
static or dynamic banners which included graphic designs. As technology developed
and IT solutions became more available, the manner in which advertisements were
shown on websites also developed. Currently, there are numerous new advertising
formats available, most of which are considered as invasive, i.e. they affect the
reception of content displayed in a web browser. Such advertisement formats include
automatically displayed advertisements, formats of pictures covering the entire screen
or expandable graphic advertisements.
Development of modern technologies on the internet, in particular tracking the
activity of users of web browsers and displaying advertisements for such users causes
an increase of users’ social interest in the development and use of tools enabling
prevention of tracking and display of advertisements. This prevents online content from
being surrounded with advertisements which may distract the reader and, at the same
time, scripts tracking web browser user’s activity are turned off or their operation is
limited. These tools ensure that consumption of online content remains attractive,

© Springer Nature Switzerland AG 2019


K. Arai et al. (Eds.): FICC 2018, AISC 887, pp. 13–23, 2019.
https://doi.org/10.1007/978-3-030-03405-4_2
14 A. Strzelecki et al.

websites are not loaded with advertising items and user’s privacy is better protected.
The conducted study is aimed at getting acquainted with the activity of online browser
users in the scope of use of software which blocks the display of advertisements and
limits the tracking of user’s activity.
Additional programs which may be installed as an extension of the basic set of
functions offered by a web browser, which add the function of blocking unwanted
advertisements are becoming increasingly popular among users. Users use such pro-
grams not only to block displayed advertisements but also to improve the protection of
data stored in a web browser and to increase the comfort of use and the performance of
web browsers. Thus, the empirical objective of the paper is to identify the reasons for
blocking online advertisements. The methodological objective of the paper is to
identify IT technologies supporting advertisement blocking and criteria for their
selection. The practical objective of the paper is to study adblock usage in Poland based
on research.
The three research questions were formulated:
• RQ1: What are the reasons for users blocking advertisements?
• RQ2: What are the methods for blocking web advertisements?
• RQ3: What is the state of adblock usage in Poland?
The objectives of the paper were achieved as a result of application of the following
research methodology: study of literature, comparative analyses of reports and a survey
analysis.
First, we introduce the theoretical justification of the ads blocking problem and
systematize knowledge in the scope of reasons for blocking online advertisements
using an adblock.
Second, we identify methods and tools for blocking advertisements in web brow-
sers. Adblock programs offer a broad range of options for adjusting them to user’s
preferences and creating one’s own set of functions which are launched by default as
well as preferences for blocking advertisements. Many users use the possibility to
configure advertisement blocking programs and adjust their functions to their
preferences.
Third, we analyze dataset collected through a survey. There were 774 participants
in the exploratory research project. The participants responded to 14 questions in a
survey concerning the use of software for blocking advertisements (adblock programs).
The paper contains a literature review, a presentation of methodology used for the
study and an analysis of obtained results. The paper includes final conclusions from the
conducted study and directions for further research in the area of blocking displayed
advertisements and privacy protection.

2 Related Work

Over the course of recent years there were several studies conducted with regard to the
use of adblock programs by internet users. They involved, inter alia, an analysis of legal
measures which can be undertaken by content publishers who are fighting off the activity
of adblock programs. Content publishers lose advertising income which they could have
Adblock Usage in Web Advertisement in Poland 15

generated, if their advertisements were displayed or clicked by users [11, 28]. Also, the
possibility to expand the functions of extensions for blocking advertisements [13] and
the influence of functions blocking advertisements on battery performance in mobile
devices [16] or a decrease of internet connection load [15] was examined. The
researchers have also studied the manner in which content publishers detect the use of
adblock programs and how many of them do it [14]. The research also shows that
adblock programs can be used to reduce the tracking of personal data [3] and do not leave
any trace of their use [17]. Some of the researchers have conducted surveys on students at
a single university [19] or extensive research involving numerous countries and thou-
sands of respondents [21, 22]. A state of the art analysis was conducted in 2009 as well.
However, many things have changed since then with regard to advertisement display
technology and development of user tracking scripts [20].
The characterized advertisements, despite their great popularity, are no longer as
efficient as they used to be during the initial period of development of the internet. This
is mainly due to the fact that users became resistant to various “persistent” forms of
promotion of products or services. Reaching potential clients with advertisements is
becoming more complicated and creators of advertisements must consider limited
access through the online marketing channel. Poland is one of the leaders in the global
ranking of countries with the highest percentage of internet users blocking advertise-
ments using plugins containing adblock software. A less aggressive solution with
regard to previously used, conventional advertisements, which addresses the needs of
advertisers, is native advertising, i.e. interesting and unobtrusive advertising material
intertwined with the content of an article posted on a blog, in social media or on a
website.

3 Systematization

3.1 Identification of Factors Determining the Adblock Usage


Blocking advertisements is a complex problem in the contemporary world, which
requires the following:
• Firstly, aspects connected with privacy [3], security [30], user experience (pace of
work, comfort, quality and other factors) [15, 19] as well as economic aspects
should be integrated.
• Secondly, the issue of balance between them and advertisements should be
analyzed.
Thus, it is necessary to mention the sustainable development theory (the term was
defined for the first time in a report of the World Commission for Environment and
Development at the UN: Our Common Future in 1987 [18]), because it is not about
publishers and users “getting in each other’s way”, but rather about them starting to
cooperate with each other. Their common good should motivate such activities.
Numerous discussions among internet users include descriptions of cases [10] in
which website publishers tried to prevent users from blocking advertisements, e.g.
16 A. Strzelecki et al.

• On the basis of legal regulations (online publishers wanted to introduce a ban on


users blocking advertisements using programs for blocking them by invoking the
right to maintain the integrity of their work or, in other words, the right to invio-
lability of content and form of their work. The act of blocking advertisements was
interpreted as introducing changes to the work) [11, 28].
• By establishing cooperation with creators of programs for blocking advertisements
(the cooperation allowed the publishers to create advertisements which users were
unable to filter). To use an adblock, it needs to be installed first, and then a filter
subscription must be added.
According to the sustainable development principle, the following principles
should be thus adopted:
• Publishers and users, as well as advertisers should jointly attempt to guarantee the
best solutions by ensuring that none of the components constitutes a threat to others.
• Publishers should use users’ knowledge and experience and propose advertise-
ments, if they constitute their source of income, but they need to ensure that they do
not disturb user’s work and allow users to decide what they want to view and which
form suits them as well as to choose their form.
• Appropriate conditions should be ensured to allow users to perceive advertisements
in a manner different than the current one (as invasive, ubiquitous, badly adjusted,
not interesting, harassing and heavy on processing power).
Relationships between factors of the problem being the blocking of advertisements
by internet users are nonlinear and they are in the form of feedback loops. On the one
hand, there are website owners who want users to avoid blocking advertisements. They
offer free access to their content but expect users to view advertisements apart from the
primary content. The number of views of the publisher’s website grows, just as
advertising income grows (positive feedback). Viewing advertisements in that case can
be considered as a type of an online currency. Advertisements allow publishers to
generate income. However, some users do not want to view advertisements, and thus
they block them. If users block advertisements, publishers are forced to introduce paid
access to content (negative feedback). As the number of website visitors drops, its
popularity decreases, and thus publishers receive fewer advertising orders. To under-
take activities aimed at compensating for the negative feedback, one should identify
reasons for blocking advertisements.
According to PageFair-2017 report [22], the main reason for blocking advertise-
ments using an adblock was security (Fig. 1). Women usually mentioned that they
were afraid of viruses and malware. On the other hand, men claimed that the greatest
nuisance was the interference of advertising in continuous browsing of online content.
Over 70% of respondents chose more than one reason as “the most important one” in
connection with their use of an adblock. Apart from security and interference, users’
motivation was not significantly different with regard to users’ age.
The largest number of internet users in Europe who block advertisements is in
Greece, Poland and Germany (Fig. 2).
Adblock Usage in Web Advertisement in Poland 17

Fig. 1. Motivation behind adblock usage [22].

Fig. 2. Usage of ad blocking software in selected European countries [21, 22].

According to PageFair’s report [21, 22], the index for Poland in 2015 amounted to
34.9%, while in 2017 it maintains the level of 33%. Apparently, the reason for this
phenomenon is that websites are overloaded with advertisements. Users who do not
like advertisements simply block them in advance. Others indicate protection of their
privacy and security as the reason for doing so.
The general conclusion of the reports was as follows: the growing use of adblock
programs is fuelled by particular problems connected with provision of online adver-
tisements by publishers rather than digital advertising itself. It was interesting that it
was indicated that users do not mind advertisements as such, and they are bothered
rather by their aggressive form, such as a sudden sound or an advertisement suddenly
covering the browsed content and, additionally, the advertisement not allowing to be
skipped or closed. The obtained results allow us to evaluate which problems are most
frequently faced by users when advertisements are displayed.
Users increasingly frequently care for privacy of their data and confidentiality of
their online activities, and due to that personalised advertisements are perceived as a
threat, while aggressive advertisements or those which put them at risk of additional
costs (using data transmission packages), are simply blocked. Therefore, it is necessary
to look for new ways for users to stop blocking advertisements.
Another random document with
no related content on Scribd:
“The number of immigrants of all nations was 720,045 in 1881. Of
these 20,711 were Chinese. There is no record in the Bureau of
Statistics of the number who departed within the year. But a very
high anti-Chinese authority places it above 10,000. Perhaps the
expectation that the hostile legislation under the treaty would not
affect persons who entered before it took effect stimulated somewhat
their coming. But the addition to the Chinese population was less
than one seventy-second of the whole immigration. All the Chinese
in the country do not exceed the population of its sixteenth city. All
the Chinese in California hardly surpass the number which is easily
governed in Shanghai by a police of one hundred men. There are as
many pure blooded Gypsies wandering about the country as there
are Chinese in California. What an insult to American intelligence to
ask leave of China to keep out her people, because this little handful
of almond-eyed Asiatics threaten to destroy our boasted civilization.
We go boasting of our democracy, and our superiority, and our
strength. The flag bears the stars of hope to all nations. A hundred
thousand Chinese land in California and everything is changed. God
has not made of one blood all the nations any longer. The self-
evident truth becomes a self-evident lie. The golden rule does not
apply to the natives of the continent where it was first uttered. The
United States surrender to China, the Republic to the despot,
America to Asia, Jesus to Joss.
“There is another most remarkable example of this prejudice of
race which has happily almost died out here, which has come down
from the dark ages and which survives with unabated ferocity in
Eastern Europe. I mean the hatred of the Jew. The persecution of the
Hebrew has never, so far as I know, taken the form of an affront to
labor. In every other particular the reproaches which for ten
centuries have been leveled at him are reproduced to do service
against the Chinese. The Hebrew, so it was said, was not a Christian.
He did not affiliate or assimilate into the nations where he dwelt. He
was an unclean thing, a dog, to whom the crime of the crucifixion of
his Saviour was never to be forgiven. The Chinese quarter of San
Francisco had its type in every city of Europe. If the Jew ventured
from his hiding-place he was stoned. His wealth made him the prey
of the rapacity of the noble, and his poverty and weakness the victim
of the rabble. Yet how has this Oriental conquered Christendom by
the sublimity of his patience? The great poet of New England, who
sits by every American fireside a beloved and perpetual guest, in that
masterpiece of his art, the Jewish Cemetery at Newport, has
described the degradation and the triumph of these persecuted
children of God.
How came they here? What burst of Christian hate,
What persecution, merciless and blind,
Drove o’er the sea—that desert desolate—
These Ishmaels and Hagars of mankind?
They lived in narrow streets and lanes obscure,
Ghetto and Judenstrass, in mirk and mire;
Taught in the school of patience to endure
The life of anguish and the death of fire.

· · · · ·

Anathema maranatha! was the cry


That rang from town to town, from street to street;
At every gate the accursed Mordecai
Was mocked and jeered, and spurned by Christian feet.

Pride and humiliation hand in hand


Walked with them through the world where’er they went;
Trampled and beaten were they as the sand,
And yet unshaken as the continent.

Forty years ago—


Says Lord Beaconsfield, that great Jew who held England in the
hollow of his hand, and who played on her aristocracy as on an
organ, who made himself the master of an alien nation, its ruler, its
oracle, and through it, and in despite of it, for a time the master of
Europe—
Forty years ago—not a longer period than the children of Israel
were wandering in the desert—the two most dishonored races in
Europe were the Attic and the Hebrew. The world has probably by
this discovered that it is impossible to destroy the Jews. The attempt
to extirpate them has been made under the most favorable auspices
and on the largest scale; the most considerable means that man
could command have been pertinaciously applied to this object for
the longest period of recorded time. Egyptian Pharaohs, Assyrian
kings, Roman emperors, Scandinavian crusaders, Gothic princes,
and holy inquisitors, have alike devoted their energies to the
fulfillment of this common purpose. Expatriation, exile, captivity,
confiscation, torture on the most ingenious and massacre on the
most extensive scale, a curious system of degrading customs and
debasing laws which would have broken the heart of any other
people, have been tried, and in vain.
“Lord Beaconsfield admits that the Jews contribute more than
their proportion to the aggregate of the vile; that the lowest class of
Jews are obdurate, malignant, odious, and revolting. And yet this
race of dogs, as it has been often termed in scorn, furnishes Europe
to-day its masters in finance and oratory and statesmanship and art
and music. Rachel, Mozart, Mendelssohn, Disraeli, Rothschild,
Benjamin, Heine, are but samples of the intellectual power of a race
which to-day controls the finance and the press of Europe.
“I do not controvert the evidence which is relied upon to show that
there are great abuses, great dangers, great offenses, which have
grown out of the coming of this people. Much of the evil I believe
might be cured by State and municipal authority. Congress may
rightfully be called upon to go to the limit of the just exercise of the
powers of government in rendering its aid.
“We should have capable and vigilant consular officers in the
Asiatic ports from which these immigrants come, without whose
certificate they should not be received on board ship, and who should
see to it that no person except those of good character and no person
whose labor is not his own property be allowed to come over.
Especially should the trade in human labor under all disguises be
suppressed. Filthy habits of living must surely be within the control
of municipal regulation. Every State may by legislation or by
municipal ordinance in its towns and cities prescribe the dimension
of dwellings and limit the number who may occupy the same
tenement.
“But it is urged—and this in my judgment is the greatest argument
for the bill—that the introduction of the labor of the Chinese reduces
the wages of the American laborer. ‘We are ruined by Chinese cheap
labor’ is a cry not limited to the class to whose representative the
brilliant humorist of California first ascribed it. I am not in favor of
lowering any where the wages of any American labor, skilled or
unskilled. On the contrary, I believe the maintenance and the
increase of the purchasing power of the wages of the American
working man should be the one principal object of our legislation.
The share in the product of agriculture or manufacture which goes to
labor should, and I believe will, steadily increase. For that, and for
that only, exists our protective system. The acquisition of wealth,
national or individual, is to be desired only for that. The statement of
the accomplished Senator from California on this point meets my
heartiest concurrence. I have no sympathy with any men, if such
there be, who favor high protection and cheap labor.
“But I believe that the Chinese, to whom the terms of the
California Senator attribute skill enough to displace the American in
every field requiring intellectual vigor, will learn very soon to insist
on his full share of the product of his work. But whether that be true
or not, the wealth he creates will make better and not worse the
condition of every higher class of labor. There may be trouble or
failure in adjusting new relations. But sooner or later every new class
of industrious and productive laborers elevates the class it displaces.
The dread of an injury to our labor from the Chinese rests on the
same fallacy that opposed the introduction of labor-saving
machinery, and which opposed the coming of the Irishman and the
German and the Swede. Within my memory in New England all the
lower places in factories, all places of domestic service, were filled by
the sons and daughters of American farmers. The Irishmen came
over to take their places; but the American farmer’s son and
daughter did not suffer; they were only elevated to a higher plane. In
the increased wealth of the community their share is much greater.
The Irishman rose from the bog or the hovel of his native land to the
comfort of a New England home, and placed his children in a New
England school. The Yankee rises from the loom and the spinning-
jenny to be the teacher, the skilled laborer in the machine shop, the
inventor, the merchant, or the opulent landholder and farmer of the
West.”

A letter from F. A. Bee, Chinese Consul, approving the


management of the estate, accompanied the report of the referee:
“Mr. President, I will not detain the Senate by reading the
abundant testimony, of which this is but the sample, of the
possession by the people of this race of the possibility of a
development of every quality of intellect, art, character, which fits
them for citizenship, for republicanism, for Christianity.
“Humanity, capable of infinite depths of degradation, is capable
also of infinite heights of excellence. The Chinese, like all other races,
has given us its examples of both. To rescue humanity from this
degradation is, we are taught to believe, the great object of God’s
moral government on earth. It is not by injustice, exclusion, caste,
but by reverence for the individual soul that we can aid in this
consummation. It is not by Chinese policies that China is to be
civilized. I believe that the immortal truths of the Declaration of
Independence came from the same source with the Golden Rule and
the Sermon on the Mount. We can trust Him who promulgated these
laws to keep the country safe that obeys them. The laws of the
universe have their own sanction. They will not fail. The power that
causes the compass to point to the north, that dismisses the star on
its pathway through the skies, promising that in a thousand years it
shall return again true to its hour and keep His word, will vindicate
His own moral law. As surely as the path on which our fathers
entered a hundred years ago led to safety, to strength, to glory, so
surely will the path on which we now propose to enter ring us to
shame, to weakness, and to peril.”
On the 3d of March the debate was renewed. Senator Farley
protested that unless Chinese immigration is prohibited it will be
impossible to protect the Chinese on the Pacific coast. The feeling
against them now is such that restraint is difficult, as the people,
forced out of employment by them, and irritated by their constantly
increasing numbers, are not in a condition to submit to the
deprivations they suffer by the presence of a Chinese population
imported as slaves and absorbing to their own benefit the labor of
the country. A remark of Mr. Farley about the Chinese led Mr. Hoar
to ask if they were not the inventors of the printing press and of
gunpowder. To this question Mr. Jones, of Nevada, made a brief
speech, which was considered remarkable, principally because it was
one of the very few speeches of any length that he has made since he
became a Senator. Instead of agreeing with Mr. Hoar that the
Chinese had invented the printing press and gunpowder, he said that
information he had received led him to believe that the Chinese were
not entitled to the credit of either of these inventions. On the
contrary, they had stolen them from Aryans or Caucasians who
wandered into the kingdom. Mr. Hoar smiled incredulously and
made a remark to the effect that he had never heard of those Aryans
or Caucasians before.
Continuing his remarks, Mr. Farley expressed his belief that
should the Mongolian population increase and the Chinese come in
contact with the Africans, the contact would result in demoralization
and bloodshed which the laws could not prevent. Pig-tailed
Chinamen would take the place everywhere of the working girl unless
Congress extended its protection to California and her white people,
who had by their votes demanded a prohibition of Chinese
immigration. Mr. Maxey, interpreting the Constitution in such a way
as to bring out of it an argument against Chinese immigration, said
he found nothing in it to justify the conclusion that the framers of it
intended to bring into this country all nations and races. The only
people the fathers had in view as citizens were those of the Caucasian
race, and they contemplated naturalization only for such, for they
had distinctly set forth that the heritage of freedom was to be for
their posterity. Nobody would pretend to express the opinion that it
was expected that the American people should become mixed up
with all sorts of races and call the result “our posterity.” While the
American people had, in consequence of their Anglo-Saxon origin,
been able to withstand the contact with the African, the Africans
would never stand before the Chinese. Mr. Maxey opposed the
Chinese because they do not come here to be citizens, because the
lower classes of Chinese alone are immigrants, and because by
contact they poison the minds of the less intelligent.
Mr. Saulsbury had something to say in favor of the bill, and Mr.
Garland, who voted against the last bill because the treaty had not
been modified, expressed his belief that the Government could
exercise properly all the powers proposed to be bestowed by this bill.
Some time was consumed by Mr. Ingalls in advocacy of an
amendment offered by him, proposing to limit the suspension of
immigration to 10 instead of 20 years. Mr. Miller and Mr. Bayard
opposed the amendment, Mr. Bayard taking the ground that
Congress ought not to disregard the substantially unanimous wish of
the people of California, as expressed at the polls, for absolute
prohibition. The debate was interrupted by a motion for an executive
session, and the bill went over until Monday, to be taken up then as
the unfinished business.
On March 6th a vote was ordered on Senator Ingalls’ amendment.
It was defeated on a tie vote—yeas 23, nays 23.
The vote in detail is as follows:
Yeas—Messrs. Aldrich, Allison, Blair, Brown, Cockrell, Conger,
Davis of Illinois, Dawes, Edmunds, Frye, Harris, Hoar, Ingalls,
Jackson, Lapham, McDill, McMillan, Mitchell, Morrell, Saunders,
Sewell, Sherman and Teller—23.
Nays—Messrs. Bayard, Beck, Call, Cameron of Wisconsin, Coke,
Fair, Farley, Garland, George, Hale, Hampton, Hill of Colorado,
Jonas, Jones of Nevada, McPherson, Marcy, Miller of California,
Miller of New York, Morgan, Ransom, Slater, Vest and Walker—23.
Pairs were announced between Davis, of West Virginia, Saulsbury,
Butler, Johnson, Kellogg, Jones, of Florida, and Grover, against the
amendment, and Messrs. Windom, Ferry, Hawley, Platt, Pugh,
Rollins and Van Wyck in the affirmative. Mr. Camden was also
paired.
Mr. Edmunds, partially in reply to Mr. Hoar argued that the right
to decide what constitutes the moral law was one inherent in the
Government, and by analogy the right to regulate the character of the
people who shall come into it belonged to a Government. This
depended upon national polity and the fact as to most of the ancient
republics that they did not possess homogeneity was the cause of
their fall. As to the Swiss Republic, it was untrue that it was not
homogeneous. The difference there was not one of race but of
different varieties of the same race, all of which are analogous and
consistent with each other. It would not be contended that it is an
advantage to a republic that its citizens should be made of diverse
races, with diverse views and diverse obligations as to what the
common prosperity of all required. Therefore there was no
foundation for the charge of a violation of moral and public law in
our making a distinction as to the foreigners we admit. He
challenged Mr. Hoar to produce an authority on national law which
denied the right of one nation to declare what people of other nations
should come among them. John Hancock and Samuel Adams, not
unworthy citizens of Massachusetts, joined in asserting in the
Declaration of Independence the right of the colonies to establish for
themselves, not for other peoples, a Government of their own, not
the Government of somebody else. The declaration asserted the
family or consolidated right of a people within any Territory to
determine the conditions upon which they would go on, and this
included the matter of receiving the people from other shores into
their family. This idea was followed in the Constitution by requiring
naturalization. The Chinaman may be with us, but he is not of us.
One of the conditions of his naturalization is that he must be friendly
to the institutions and intrinsic polity of our Government. Upon the
theory of the Massachusetts Senators, that there is a universal
oneness of one human being with every other human being on the
globe, this traditional and fundamental principle was entirely
ignored. Such a theory as applied to Government was contrary to all
human experience, to all discussion, and to every step of the
founders of our Government. He said that Mr. Sumner, the
predecessor of Mr. Hoar, was the author of the law on the coolie
traffic, which imposes fines and penalties more severe than those in
this bill upon any master of an American vessel carrying a Chinaman
who is a servant. The present bill followed that legislation. Mr.
Edmunds added that he would vote against the bill if the twenty-year
clause was retained, but would maintain the soundness of principle
he had enunciated.
Mr. Hoar argued in reply that the right of expatriation carried with
it the right to a home for the citizen in the country to which he
comes, and that the bill violated not only this but the principles of
the Fourteenth and Fifteenth Amendments which made citizenship
the birthright of every one born on our soil, and prohibited an
abridgement of the suffrage because of race, color, etc.
Mr. Ingalls moved an amendment postponing the time at which
the act shall take effect until sixty days after information of its
passage has been communicated to China.
After remarks by Messrs. Dawes, Teller and Bayard, at the
suggestion of Mr. Brown Mr. Ingalls modified his amendment by
providing that the act shall not go into effect until ninety days after
its passage, and the amendment was adopted.
On motion of Mr. Bayard, amendments were adopted making the
second section read as follows: “That any master of any vessel of
whatever nationality, who shall knowingly on such vessel bring
within the jurisdiction of the United States and permit to be landed
any Chinese laborer,” &c.
Mr. Hoar moved to amend by adding the following: “Provided,
that this bill shall not apply to any skilled laborer who shall establish
that he comes to this country without any contract beyond which his
labor is the property of any person besides himself.”
Mr. Farley suggested that all the Chinese would claim to be skilled
laborers.
Mr. Hoar replied that it would test whether the bill struck at
coolies or at skilled labor.
The amendment was rejected—Yeas, 17; nays, 27.
Mr. Call moved to strike out the section which forfeits the vessel
for the offense of the master. Lost.
Mr. Hoar moved to amend by inserting: “Provided that any laborer
who shall receive a certificate from the U.S. Consul at the port where
he shall embark that he is an artisan coming to this country at his
own expense and of his own will, shall not be affected by this bill.”
Lost—yeas 19, nays 24.
On motion of Mr. Miller, of California, the provision directing the
removal of any Chinese unlawfully found in a Customs Collection
district by the Collector, was amended to direct that he shall be
removed to the place from whence he came.
On motion of Mr. Brown an amendment was adopted providing
that the mark of a Chinese immigrant, duly attested by a witness,
may be taken as his signature upon the certificate of resignation or
registration issued to him.
The question then recurred on the amendment offered by Mr.
Farley that hereafter no State Court or United States Court shall
admit Chinese to citizenship.
Mr. Hawley, of Conn., on the following day spoke against what he
denounced as “a bill of iniquities.”
On the 9th of March what proved a long and interesting debate
was closed, the leading speech being made by Senator Jones (Rep.)
of Nevada, in favor of the bill. After showing the disastrous effects of
the influx of the Chinese upon the Pacific coast and answering some
of the arguments of the opponents of restriction, Mr. Jones said that
he had noticed that most of those favoring Chinese immigration were
advocates of a high tariff to protect American labor. But, judging
from indications, it is not the American laborer, but the lordly
manufacturing capitalist who is to be protected as against the
European capitalist, and who is to sell everything he has to sell in an
American market, one in which other capitalists cannot compete
with him, while he buys that which he has to buy—the labor of men—
in the most open market. He demands for the latter free trade in its
broadest sense, and would have not only free trade in bringing in
laborers of our own race, but the Chinese, the most skilful and
cunning laborers of the world. The laborer, however, is to buy from
his capitalist master in a protective market, but that which he himself
has to sell, his labor, and which he must sell every day (for he cannot
wait, like the capitalist, for better times or travel here and there to
dispose of it), he must sell in the openest market of the world. When
the artisans of this country shall be made to understand that the
market in which they sell the only thing they have to sell is an open
one they will demand, as one of the conditions of their existence, that
they shall have an open market in which to buy what they want. As
the Senator from Massachusetts (Mr. Dawes) said he wanted the
people to know that the bill was a blow struck at labor, Mr. Jones
said he reiterated the assertion with the qualification that it was not a
blow at our own, but at underpaid pauper labor. That cheap labor
produces national wealth is a fallacy, as shown by the home
condition of the 350,000,000 of Chinamen.
“Was the bringing of the little brown man a sort of counter balance
to the trades unions of this country? If he may be brought here, why
may not the products of his toil come in? Now, when the laborer is
allowed to get that share from his labor that civilization has decided
he shall have, the little brown man is introduced. He (Mr. Jones)
believed in protection, and had no prejudice against the capitalist,
but he would have capital and labor equally protected. Enlarging
upon the consideration that the intelligence or creative genius of a
country in overcoming obstacles, not its material resources,
constitutes its wealth, and that the low wages of the Chinese, while
benefiting individual employers, would ultimately impoverish the
country by removing the stimulant to create labor-saving machinery
and like inventions. Mr. Jones spoke of what he called the dearth of
intellectual activity in the South in every department but one, that of
politics.
“This was because of the presence of a servile race there. The
absence of Southern names in the Patent Office is an illustration. We
would not welcome the Africans here. Their presence was not a
blessing to us, but an impediment in our way. The relations of the
white and colored races of the South were now no nearer adjustment
than they were years ago. He would prophesy that the African race
would never be permitted to dominate any State of the South. The
experiment to that end had been a dismal failure, and a failure not
because we have not tried to make it succeed, but because laws away
above human laws have placed the one race superior to and far above
the other. The votes of the ignorant class might preponderate, but
intellect, not numbers, is the superior force in this world. We clothed
the African in the Union blue and the belief that he was one day to be
free was the candle-light in his soul, but it is one thing to aspire to be
free and another thing to have the intelligence and sterling qualities
of character that can maintain free government. Mr. Jones here
expressed his belief that, if left alone to maintain a government, the
negro would gradually retrograde and go back to the methods of his
ancestors. This, he added, may be heresy, but I believe it to be the
truth. If, when the first ship-load of African slaves came to this
country the belief had spread that they would be the cause of political
agitation, a civil war, and the future had been foreseen, would they
have been allowed to land?
“How much of this country would now be worth preserving if the
North had been covered by Africans as is South Carolina to-day, in
view of their non-assimilative character? The wisest policy would
have been to exclude them at the outset. So we say of the Chinese to-
day, he exclaimed, and for greater reason, because their skill makes
them more formidable competitors than the negro. Subtle and adept
in manipulation, the Chinaman can be put into almost any kind of a
factory. His race is as obnoxious to us and as impossible for us to
assimilate with as was the negro race. His race has outlived every
other because it is homogeneous, and for that reason alone. It has
imposed its religion and peculiarities upon its conquerors and still
lived. If the immigration is not checked now, when it is within
manageable limits, it will be too late to check it. What do we find in
the condition of the Indian or the African to induce us to admit
another race into our midst? It is because the Pacific coast favor our
own civilization, not that of another race, that they discourage the
coming of these people. They believe in the homogeneity of our race,
and that upon this depends the progress of our institutions and
everything on which we build our hopes.
Mr. Morill, (Rep.) of Vt., said he appreciated the necessity of
restricting Chinese immigration, but desired that the bill should
strictly conform to treaty requirements and be so perfected that
questions arising under it might enable it to pass the ordeal of
judicial scrutiny.
Mr. Sherman, (Rep.) of Ohio, referring to the passport system,
said the bill adopted some of the most offensive features of European
despotism. He was averse to hot haste in applying a policy foreign to
the habits of our people, and regarded the measure as too sweeping
in many of its provisions and as reversing our immigration policy.
After remarks by Messrs. Ingalls, Farley, Maxey, Brown and Teller,
the amendment of Mr. Farley, which provides that hereafter no court
shall admit Chinese to citizenship, was adopted—yeas 25, nays 22.
The following is the vote:
Yeas—Messrs. Bayard, Beck, Call, Cameron of Wisconsin, Cockrell,
Coke, Fair, Farley, Garland, George, Gorman, Harris, Jackson,
Jonas, Jones of Nevada, Maxey, Morgan, Pugh, Ransom, Slater,
Teller, Vance, Vest, Voorhees and Walker—25.
Nays—Messrs. Aldrich, Allison, Blair, Brown, Conger, Davis of
Illinois, Dawes, Edmunds, Frye, Hale, Hill of Colorado, Hoar,
Ingalls, Lapham, McDill, McMillan, Miller of New York, Mitchell,
Morrill, Plumb, Saunders and Sawyer—22.
Mr. Grover’s amendment construing the words “Chinese laborers,”
wherever used in the act, to mean both skilled and unskilled laborers
and Chinese employed in mining prevailed by the same vote—yeas
25, nays 22.
Mr. Brown, (Dem.) of Ga., moved to strike out the requirement
for the production of passports by the permitted classes whenever
demanded by the United States authorities. Carried on a viva voce
vote, the Chair (Mr. Davis, of Illinois) creating no little merriment by
announcing, “The nays are loud but there are not many of them.”
MR. INGALLS’ AMENDMENT.

Upon the bill being reported to the Senate from the Committee of
the Whole Mr. Ingalls again moved to limit the suspension of the
coming of Chinese laborers to ten years.
Mr. Jones, of Nevada, said this limit would hardly have the effect
of allaying agitation on the subject as the discussion would be
resumed in two or three years, and ten years, he feared, would not
even be a long enough period to enable Congress intelligently to base
upon it any future policy.
Mr. Miller, of California, also urged that the shorter period would
not measurably relieve the business interest of the Pacific slope,
inasmuch as the white immigrants, who were so much desired,
would not come there if they believed the Chinese were to be again
admitted in ten years. Being interrupted by Mr. Hoar, he asserted
that that Senator and other republican leaders, as also the last
republican nominee for President, had heretofore given the people of
the Pacific slope good reason to believe that they would secure to
them the relief they sought by the bill.
Mr. Hoar, (Rep.) of Mass., briefly replied.
The amendment was lost—yeas 20, nays 21.
The vote is as follows:
Yeas—Messrs. Aldrich, Allison, Blair, Brown, Conger, Davis of
Illinois, Dawes, Edmunds, Frye, Hale, Hoar, Ingalls, Lapham,
McDill, McMillan, Mahone, Morrill, Plumb, Sawyer and Teller—20.
Nays—Messrs. Bayard, Beck, Call, Cameron of Wisconsin, Coke,
Fair, Farley, Garland, George, Gorman, Jackson, Jonas, Jones of
Nevada, Miller of California, Miller of New York, Morgan, Ransom,
Slater, Yance, Voorhees and Walker—21.
Messrs. Butler, Camden, McPherson, Johnston, Davis of West
Virginia, Pendleton and Ransom were paired with Messrs. Hawley,
Anthony, Sewell, Platt, Van Wyck, Windom and Sherman.
Messrs. Hampton, Pugh, Vest, Rollins and Jones of Florida were
paired with absentees.

PASSAGE OF THE BILL.


The question recurred on the final passage of the bill, and Mr.
Edmunds closed the debate. He would vote against the bill as it now
stood, because he believed it to be an infraction of good faith as
pledged by the last treaty; because he believed it injurious to the
welfare of the people of the United States, and particularly the people
on the Pacific coast, by preventing the development of our great
trade with China.
The vote was then taken and the bill was passed—yeas 29, nays 15.
The following is the vote in detail:—
Yeas—Messrs. Bayard, Beck, Call, Cameron of Wisconsin, Cockrell,
Coke, Fair, Farley, Garland, George, Gorman, Hale, Harris, Hill of
Colorado, Jackson, Jonas, Jones of Nevada, Miller of California,
Miller of New York, Morgan, Pugh, Ransom, Sawyer, Teller, Vance,
Vest, Voorhees and Walker—29.
Nays—Messrs. Aldrich, Allison, Blair, Brown, Conger, Davis of
Illinois, Dawes, Edmunds, Frye, Hoar, Ingalls, Lapham, McDill,
McMillan and Morrill—15.
Pairs were announced of Messrs. Camden, Davis of West Virginia,
Grover, Hampton, Butler, McPherson, Johnston, Jones of Florida
and Pendleton in favor of the bill, with Messrs. Anthony, Windom,
Van Wyck, Mitchell, Hawley, Sewell, Platt, Rollins and Sherman
against it.
Mr. Frye, (Rep.) of Me., in casting his vote, stated that he was
paired with Mr. Hill, of Georgia, on all political questions, but that he
did not consider this a political question, and besides, had express
permission from Senator Hill to vote upon it.
Mr. Mitchell, (Rep.) of Pa., in announcing his pair with Mr.
Hampton stated that had it not been for that fact he would vote
against the bill, regarding it as un-American and inconsistent with
the principles which had obtained in the government.
The title of the bill was amended so as to read, “An act to execute
certain treaty stipulations relating to Chinese,” though Mr. Hoar
suggested that “execute” ought to be stricken out and “violate”
inserted.
The Senate then, at twenty minutes to six, adjourned until to-
morrow.
PROVISIONS OF THE BILL.

The Chinese Immigration bill as passed provides that from and


after the expiration of ninety days after the passage of this act and
until the expiration of twenty years after its passage the coming of
Chinese laborers to the United States shall be suspended, and
prescribes a penalty of imprisonment not exceeding one year and a
fine of not more than $500 against the master of any vessel who
brings any Chinese laborer to this country during that period. It
further provides that the classes of Chinese excepted by the treaty
from such prohibition—such as merchants, teachers, students,
travelers, diplomatic agents and Chinese laborers who were in the
United States on the 17th of November, 1880—shall be required, as a
condition for their admission, to procure passports from the
government of China personally identifying them and showing that
they individually belong to one of the permitted classes, which
passports must have been indorsed by the diplomatic representative
of the United States in China or by the United States Consul at the
port of departure. It also provides elaborate machinery for carrying
out the purposes of the act, and additional sections prohibit the
admission of Chinese to citizenship by any United States or State
court and construes the words “Chinese laborers” to mean both
skilled and unskilled laborers and Chinese employed in mining.
The sentiment in favor of the passage of this bill has certainly
greatly increased since the control of the issue has passed to abler
hands than those of Kearney and Kalloch, whose conduct intensified
the opposition of the East to the measure, which in 1879 was
denounced as “violating the conscience of the nation.” Mr. Blaine’s
advocacy of the first bill limiting emigrants to fifteen on each vessel,
at the time excited much criticism in the Eastern states, and was
there a potent weapon against him in the nominating struggle for the
Presidency in 1880; but on the other hand it is believed that it gave
him strength in the Pacific States.
Chinese immigration and the attempt to restrict it presents a
question of the gravest importance, and was treated as such in the
Senate debate. The friends of the bill, under the leadership of
Senators Miller and Jones, certainly stood in a better and stronger
attitude than ever before.
The anti-Chinese bill passed the House just as it came from the
Senate, after a somewhat extended debate, on the 23d of March,
1882. Yeas 167, nays 65, (party lines not being drawn) as follows:
Yeas—Messrs. Aikin, Aldrich, Armfield, Atkins, Bayne, Belford,
Belmont, Berry, Bingham, Blackburn, Blanchard, Bliss, Blount,
Brewer, Brumm, Buckner, Burrows, of Missouri; Butterworth,
Cabell, Caldwell, Calkins, Campbell, Cannon, Casserley, Caswell,
Chalmers, Chapman, Clark, Clements, Cobb, Converse, Cook,
Cornell, Cox, of New York; Cox, of North Carolina; Covington,
Cravens, Culbertson, Curtin, Darrell, Davidson; Davis, of Illinois;
Davis, of Missouri; Demotte, Deuster, Dezendorf, Dibble, Dibrell,
Dowd, Dugro, Ermentrout, Errett, Farwell, of Illinois; Finley,
Flowers, Ford, Forney, Fulkerson, Garrison, Geddes, George, Gibson,
Guenther, Gunter, Hammond, of Georgia; Hardy, Harmer, Harris, of
New Jersey; Haseltine, Hatch, Hazelton, Heilman, Herndon, Hewitt,
of New York; Hill, Hiscock, Hoblitzell, Hoge, Hollman, Horr, Houk,
House, Hubbell, Hubbs, Hutchins, Jones, of Texas; Jones, of
Arkansas; Jorgenson, Kenna, King, Klotz, Knott, Ladd, Leedom,
Lewis, Marsh, Martin, Matson, McClure, McCook, McKenzie,
McKinley, McLane, McMillan, Miller, Mills, of Texas; Money, Morey,
Moulton, Murch, Mutchler, O’Neill, Pacheco, Page, Paul, Payson,
Pealse, Phelps, Phister, Pound, Randall, Reagan, Rice of Missouri,
Richardson, Robertson, Robinson, Rosecrans, Scranton,
Shallenberger, Sherwin, Simonton, Singleton, of Mississippi, Smith
of Pennsylvania, Smith of Illinois, Smith of New York, Sparks,
Spaulding, Spear, Springer, Stockslager, Strait, Talbott, Thomas,
Thompson of Kentucky, Tillman, Townsend of Ohio, Townsend of
Illinois, Tucker, Turner of Georgia, Turner of Kentucky, Updegraff,
of Ohio, Upson, Valentine, Vance, Van Horn, Warner, Washburne,
Webber, Welborn, Whitthorne, Williams of Alabama, Willis, Willetts,
Wilson, Wise of Pennsylvania, Wise of Virginia, and W. A. Wood of
New York—167.
The nays were Messrs. Anderson, Barr, Bragg, Briggs, Brown,
Buck, Camp, Candler, Carpenter, Chase, Crapo, Cullen, Dawes,
Deering, Dingley, Dunnell, Dwight, Farwell of Iowa, Grant, Hall,
Hammond, of New York, Hardenburgh, Harris, of Massachusetts,
Haskell, Hawk, Henderson, Hepburn, Hooker, Humphrey, Jacobs,
Jones of New Jersey, Joyce, Kasson, Ketchum, Lord, McCoid, Morse,
Norcross, Orth, Parker, Ramsey, Rice of Ohio, Rice of Massachusetts,
Rich, Richardson of New York, Ritchie, Robinson of Massachusetts,
Russel, Ryan, Shultz, Skinner, Scooner, Stone, Taylor, Thompson of
Iowa, Tyler, Updegraff of Iowa, Urner, Wadsworth, Wait, Walker,
Ward, Watson, White and Williams of Wisconsin—65.
In the House the debate was participated in by Messrs.
Richardson, of South Carolina; Wise and Brumm, of Pennsylvania;
Joyce, of Vermont; Dunnell, of Minnesota; Orth, of Indiana;
Sherwin, of Illinois; Hazelton, of Wisconsin; Pacheco, of California,
and Townsend, of Illinois, and others. An amendment offered by Mr.
Butterworth, of Ohio, reducing the period of suspension to fifteen
years, was rejected. Messrs. Robinson, of Massachusetts; Curtin, of
Pennsylvania, and Cannon, of Illinois, spoke upon the bill, the two
latter supporting it. The speech of Ex-Governor Curtin was strong
and attracted much attention. Mr. Page closed the debate in favor of
the measure. An amendment offered by Mr. Kasson, of Iowa,
reducing the time of suspension to ten years, was rejected—yeas 100,
nays 131—and the bill was passed exactly as it came from the Senate
by a vote of 167 to 65. The House then adjourned.
Our Merchant Marine.

An important current issue is the increase of the Navy and the


improvement of the Merchant Marine, and to these questions the
National Administration has latterly given attention. The New York
Herald has given much editorial ability and research to the advocacy
of an immediate change for the better in these respects, and in its
issue of March 10th, 1882, gave the proceedings of an important
meeting of the members of the United States Naval Institute held at
Annapolis the day before, on which occasion a prize essay on the
subject—“Our Merchant Marine; the Cause of its Decline and the
Means to be Taken for its Revival,” was read. The subject was chosen
nearly a year ago, because it was the belief of the members of the
institute that a navy cannot exist without a merchant marine. The
naval institute was organized in 1873 for the advancement of
professional and scientific knowledge in the navy. It has on its roll
500 members, principally naval officers, and its proceedings are
published quarterly. Rear Admiral C. R. P. Rodgers is president;
Captain J. M. Ramsay, vice president; Lieutenant Commander C. M.
Thomas, secretary; Lieutenant Murdock, corresponding secretary,
and Paymaster R. W. Allen, treasurer. There were eleven competitors
for the prize, which is of $100, and a gold medal valued at $50. The
judges were Messrs. Hamilton Fish, A. A. Low and J. D. Jones. They
awarded the prize to Lieutenant J. D. J. Kelley, U. S. N., whose motto
was “Nil Clarius Æquore,” and designated Master C. T. Calkins, U. S.
N., whose motto was “Mais il faut cultiver notre jardin” as next in the
order of merit, and further mentioned the essays of Lieutenant R.
Wainwright, United States Navy, whose motto was “Causa latet, vis
est notissima,” and Lieutenant Commander J. E. Chadwick, United
States Navy, whose motto was “Spes Meliora,” as worthy of
honorable mention, without being entirely agreed as to their
comparative merits.
STRIKING PASSAGES FROM THE PRIZE ESSAY.

From Lieut. Kelley’s prize essay many valuable facts can be


gathered, and such of these as contain information of permanent
value we quote:
“So far as commerce influences this country has a vital interest in
the carrying trade, let theorists befog the cool air as they may. Every
dollar paid for freight imported or exported in American vessels
accrues to American labor and capital, and the enterprise is as much
a productive industry as the raising of wheat, the spinning of fibre or
the smelting of ore. Had the acquired, the ‘full’ trade of 1860 been
maintained without increase $80,000,000 would have been added
last year to the national wealth, and the loss from diverted
shipbuilding would have swelled the sum to a total of $100,000,000.
“Our surplus products must find foreign markets, and to retain
them ships controlled by and employed in exclusively American
interests are essential instrumentalities. Whatever tends to stimulate
competition and to prevent combination benefits the producer, and
as the prices abroad establish values here, the barter we obtain for
the despised one tenth of exports—$665,000,000 in 1880—
determines the profit or loss of the remainder in the home market.
During the last fiscal year 11,500,000 gross tons of grain, oil, cotton,
tobacco, precious metals, &c., were exported from the United States,
and this exportation increases at the rate of 1,500,000 tons annually;
3,800,000 tons of goods are imported, or in all about 15,000,000
tons constitute the existing commerce of this country.
“If only one-half of the business of carrying our enormous wealth
of surplus products could be secured for American ships, our
tonnage would be instantly doubled, and we would have a greater
fleet engaged in a foreign trade, legitimately our own, than Great
Britain has to-day. The United States makes to the ocean carrying
trade its most valuable contribution, no other nation giving to
commerce so many bulky tons of commodities to be transported
those long voyages which in every age have been so eagerly coveted
by marine peoples. Of the 17,000 ships which enter and clear at
American ports every year, 4,600 seek a cargo empty and but 2,000
sail without obtaining it.
“Ships are profitable abroad and can be made profitable here, and
in truth during the last thirty years no other branch of industry has
made such progress as the carrying trade. To establish this there are
four points of comparison—commerce, railways, shipping tonnage
and carrying power of the world, limited to the years between 1850
and 1880:—

Increase Per
1850. 1880. Cent.
Commerce of all
nations $4,280,000,000 $14,405,000,000 240
Railways (miles
open) 44,400 222,600 398
Shipping tonnage 6,905,000 18,720,000 171
Carrying tonnage 8,464,000 34,280,060 304

“In 1850, therefore, for every $5,000,000 of international


commerce there were fifty-four miles of railway and a maritime
carrying power of 9,900 tons; and in 1880 the respective ratios had
risen to seventy-seven miles and 12,000 tons; this has saved one-
fourth freight and brought producer and consumers into such
contact that we no longer hear “of the earth’s products being wasted,
of wheat rotting in La Mancha, wool being used to mend wads and
sheep being burned for fuel in the Argentine Republic.” England has
mainly profited by this enormous development, the shipping of the
United Kingdom earning $300,000,000 yearly, and employing
200,000 seamen, whose industry is therefore equivalent to £300 per
man, as compared with £190 for each of the factory operatives. The
freight earned by all flags for sea-borne merchandise is
$500,000,000, or about 8 per cent. of the value transported. Hence
the toll which all nations pay to England for the carrying trade is
equal to 4 per cent. (nearly) of the exported values of the earth’s
products and manufactures; and pessimists who declare that ship
owners are losing money or making small profits must be wrong, for
the merchant marine is expanding every year.
“The maximum tonnage of this country at any time registered in
the foreign trade was in 1861, and then amounted to 5,539,813 tons;
Great Britain in the same year owning 5,895,369 tons, and all the

You might also like