Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351943
Saad Fehis, O. Nouali, Mohand Tahar Kechadi
To controlling the information flows between the competing companies (CC) in the cloud computing (Multi-tenancy) or in the social network, the Chinese wall security policy (CWSP) is very interesting solution. Its rule is the building of the walls between the CC. The CWSPs idea, is the building of impenetrable wall among subject, and this to controlling the information flow between the CC, caused by the subjects. However, the preview proposed models [1-6]; they have a set of errors and they can't fix the composite information flows (CIF) problem between the CC (a malicious Trojan horses problem). In this article; we will propose a new approach based on the access query type of the subject to the objects and the philosophy of the CWSP. In our model we have two types walls placement, the first are built around the subject, and the second around the object; which, we can't find inside each once wall two competing objects data.
{"title":"A new Chinese wall security policy model based on the subject's wall and object's wall","authors":"Saad Fehis, O. Nouali, Mohand Tahar Kechadi","doi":"10.1109/ANTI-CYBERCRIME.2015.7351943","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351943","url":null,"abstract":"To controlling the information flows between the competing companies (CC) in the cloud computing (Multi-tenancy) or in the social network, the Chinese wall security policy (CWSP) is very interesting solution. Its rule is the building of the walls between the CC. The CWSPs idea, is the building of impenetrable wall among subject, and this to controlling the information flow between the CC, caused by the subjects. However, the preview proposed models [1-6]; they have a set of errors and they can't fix the composite information flows (CIF) problem between the CC (a malicious Trojan horses problem). In this article; we will propose a new approach based on the access query type of the subject to the objects and the philosophy of the CWSP. In our model we have two types walls placement, the first are built around the subject, and the second around the object; which, we can't find inside each once wall two competing objects data.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"42 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114043926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351931
Adrian Haase
This article highlights the challenges for the global community when harmonizing substantive cybercrime legislation. At the example of EU-Directive 2013/40/EU and the Council of Europe's Convention on Cybercrime the benefits of a model law over a binding international treaty are pointed out. Protecting critical infrastructures is recognized as most crucial and their vulnerability of digital attacks with trans-boundary effects is identified. Eventually the EU-Directive is proposed as a potential model law for international harmonization regarding core cybercrimes.
{"title":"Harmonizing substantive cybercrime law through European union directive 2013/40/EU — From European legislation to international model law?","authors":"Adrian Haase","doi":"10.1109/ANTI-CYBERCRIME.2015.7351931","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351931","url":null,"abstract":"This article highlights the challenges for the global community when harmonizing substantive cybercrime legislation. At the example of EU-Directive 2013/40/EU and the Council of Europe's Convention on Cybercrime the benefits of a model law over a binding international treaty are pointed out. Protecting critical infrastructures is recognized as most crucial and their vulnerability of digital attacks with trans-boundary effects is identified. Eventually the EU-Directive is proposed as a potential model law for international harmonization regarding core cybercrimes.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125954571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351942
Asma K. Al-Khamis, Ayman Khalafallah
Electronic transactions rank the top on our daily transactions. Internet became invaluable for government, business, and personal use. This occurred in synchronization with the great increase in online attacks, particularly the development of newest forms from known attacks such as Tabnabbing. Thus, users' confidentiality and personal information must be protected using information security. Tabnabbing is a new form of phishing. The attacker needs nothing to steal credentials except users' preoccupation with other work and exploitation of human memory weakness. The impact of this malicious attempt begins with identity theft and ends with financial loss. That has encouraged some security specialists and researchers to tackle tabnabbing attack, but their studies are still in their infancy and not sufficient. The work done here focuses on developing an effective anti-tabnabbing extension for the Google Chrome browser to protect Internet users from been victims as well as raise their awareness. The system developed has a novel significance due to its effectiveness in detecting a tabnabbing attack and the combination of two famous approaches used to combat online attacks. The success of the system was examined by performance measurements such as confusion matrix and ROC. The system produces promising results.
{"title":"Secure Internet on Google Chrome: Client side anti-tabnabbing extension","authors":"Asma K. Al-Khamis, Ayman Khalafallah","doi":"10.1109/ANTI-CYBERCRIME.2015.7351942","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351942","url":null,"abstract":"Electronic transactions rank the top on our daily transactions. Internet became invaluable for government, business, and personal use. This occurred in synchronization with the great increase in online attacks, particularly the development of newest forms from known attacks such as Tabnabbing. Thus, users' confidentiality and personal information must be protected using information security. Tabnabbing is a new form of phishing. The attacker needs nothing to steal credentials except users' preoccupation with other work and exploitation of human memory weakness. The impact of this malicious attempt begins with identity theft and ends with financial loss. That has encouraged some security specialists and researchers to tackle tabnabbing attack, but their studies are still in their infancy and not sufficient. The work done here focuses on developing an effective anti-tabnabbing extension for the Google Chrome browser to protect Internet users from been victims as well as raise their awareness. The system developed has a novel significance due to its effectiveness in detecting a tabnabbing attack and the combination of two famous approaches used to combat online attacks. The success of the system was examined by performance measurements such as confusion matrix and ROC. The system produces promising results.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123709684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-10DOI: 10.1109/ANTI-CYBERCRIME.2015.7351945
Z. Jan, Nazia Azeem, Faryal Zahoor
Tine to the widespread use of multimedia data over the internet, it has become important to protect the data from unauthorized access and make the information secure. Digital watermarking is the solution to prevent unauthorized access and to protect the copyright. In this paper, a naive watermarking scheme has been proposed. The authors for the first time have introduced Ranklets which is a new domain for watermarking along with discrete wavelet transform (DWT). To achieve better robustness and imperceptibility, the proposed scheme makes use of the Ranklets to select the mid-rank coefficients for watermark embedding. The wilxon statistics have been used for dispersion in Rank transform. Extensive experiments have been carried out to prove the claim of better robustness and imperceptibility.
{"title":"Digital watermarking using combination of Ranklets and wavelets","authors":"Z. Jan, Nazia Azeem, Faryal Zahoor","doi":"10.1109/ANTI-CYBERCRIME.2015.7351945","DOIUrl":"https://doi.org/10.1109/ANTI-CYBERCRIME.2015.7351945","url":null,"abstract":"Tine to the widespread use of multimedia data over the internet, it has become important to protect the data from unauthorized access and make the information secure. Digital watermarking is the solution to prevent unauthorized access and to protect the copyright. In this paper, a naive watermarking scheme has been proposed. The authors for the first time have introduced Ranklets which is a new domain for watermarking along with discrete wavelet transform (DWT). To achieve better robustness and imperceptibility, the proposed scheme makes use of the Ranklets to select the mid-rank coefficients for watermark embedding. The wilxon statistics have been used for dispersion in Rank transform. Extensive experiments have been carried out to prove the claim of better robustness and imperceptibility.","PeriodicalId":220556,"journal":{"name":"2015 First International Conference on Anti-Cybercrime (ICACC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}