首页 > 最新文献

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
EEVi - framework for evaluating the effectiveness of visualization in cyber-security EEVi——评估网络安全可视化有效性的框架
Aneesha Sethi, F. Paci, G. Wills
Cyber-security visualization is an up-and-coming area which aims to reduce security analysts' workload by presenting information as visual analytics rather than a string of text and characters. But the adoption of the resultant visualizations has not increased. The literature indicates a research gap of a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a reason for it. Therefore, this research addresses the research gap by developing a framework called EEVi for effective cyber-security visualizations for the performed task. The term ‘effective visualization’ can be defined as the features of visualization that are crucial to perform a certain task successfully. EEVi has been developed by analyzing qualitative data that leads to the formation of cognitive relationships (called links) between data that act as guidelines for effective cyber-security visualization in terms of the performed task. The methodology to develop this framework can be applied to other fields to understand cognitive relationships between data. Additionally, the analysis presents a glimpse into the usage of EEVi in cyber-security visualization.
网络安全可视化是一个新兴的领域,它旨在通过将信息呈现为可视化分析而不是一串文本和字符来减少安全分析人员的工作量。但是,由此产生的可视化的采用并没有增加。文献表明,在网络安全中缺乏有效可视化的指导方针和标准化评估技术是研究空白的原因。因此,本研究通过开发一个名为EEVi的框架来解决研究空白,该框架用于对已执行的任务进行有效的网络安全可视化。术语“有效的可视化”可以定义为可视化的特征,这些特征对成功执行某项任务至关重要。EEVi是通过分析导致数据之间形成认知关系(称为链接)的定性数据而开发的,这些数据作为执行任务方面有效的网络安全可视化的指导方针。开发该框架的方法可以应用于其他领域,以理解数据之间的认知关系。此外,分析还介绍了EEVi在网络安全可视化中的应用。
{"title":"EEVi - framework for evaluating the effectiveness of visualization in cyber-security","authors":"Aneesha Sethi, F. Paci, G. Wills","doi":"10.1109/ICITST.2016.7856726","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856726","url":null,"abstract":"Cyber-security visualization is an up-and-coming area which aims to reduce security analysts' workload by presenting information as visual analytics rather than a string of text and characters. But the adoption of the resultant visualizations has not increased. The literature indicates a research gap of a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a reason for it. Therefore, this research addresses the research gap by developing a framework called EEVi for effective cyber-security visualizations for the performed task. The term ‘effective visualization’ can be defined as the features of visualization that are crucial to perform a certain task successfully. EEVi has been developed by analyzing qualitative data that leads to the formation of cognitive relationships (called links) between data that act as guidelines for effective cyber-security visualization in terms of the performed task. The methodology to develop this framework can be applied to other fields to understand cognitive relationships between data. Additionally, the analysis presents a glimpse into the usage of EEVi in cyber-security visualization.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122295060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Activity Recognition using wearable computing 使用可穿戴计算的活动识别
Neamah Al-Naffakh, N. Clarke, P. Dowland, Fudong Li
A secure, user-convenient approach to authenticate users on their mobile devices is required as current approaches (e.g., PIN or Password) suffer from security and usability issues. Transparent Authentication Systems (TAS) have been introduced to improve the level of security as well as offer continuous and unobtrusive authentication (i.e., user friendly) by using various behavioural biometric techniques. This paper presents the usefulness of using smartwatch motion sensors (i.e., accelerometer and gyroscope) to perform Activity Recognition for the use within a TAS. Whilst previous research in TAS has focused upon its application in computers and mobile devices, little attention is given to the use of wearable devices - which tend to be sensor-rich highly personal technologies. This paper presents a thorough analysis of the current state of the art in transparent and continuous authentication using acceleration and gyroscope sensors and a technology evaluation to determine the basis for such an approach. The best results are average Euclidean distance scores of 5.5 and 11.9 for users' intra acceleration and gyroscope signals respectively and 24.27 and 101.18 for users' inter acceleration and gyroscope activities accordingly. The findings demonstrate that the technology is sufficiently capable and the nature of the signals captured sufficiently discriminative to be useful in performing Activity Recognition.
由于目前的方法(例如PIN或Password)存在安全性和可用性问题,因此需要一种安全、方便的方法来对移动设备上的用户进行身份验证。引入透明认证系统(TAS)是为了提高安全水平,并通过使用各种行为生物识别技术提供连续和不显眼的认证(即用户友好)。本文介绍了使用智能手表运动传感器(即加速度计和陀螺仪)在TAS内执行活动识别的有用性。虽然以前对TAS的研究主要集中在其在计算机和移动设备中的应用,但很少关注可穿戴设备的使用-这些设备往往是富含传感器的高度个性化技术。本文对使用加速度和陀螺仪传感器的透明和连续认证的现状进行了全面分析,并进行了技术评估,以确定这种方法的基础。最佳结果是用户内部加速度和陀螺仪信号的平均欧氏距离得分分别为5.5和11.9,用户内部加速度和陀螺仪活动的平均欧氏距离得分分别为24.27和101.18。研究结果表明,该技术具有足够的能力,并且捕获的信号具有足够的判别性,可以用于执行活动识别。
{"title":"Activity Recognition using wearable computing","authors":"Neamah Al-Naffakh, N. Clarke, P. Dowland, Fudong Li","doi":"10.1109/ICITST.2016.7856695","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856695","url":null,"abstract":"A secure, user-convenient approach to authenticate users on their mobile devices is required as current approaches (e.g., PIN or Password) suffer from security and usability issues. Transparent Authentication Systems (TAS) have been introduced to improve the level of security as well as offer continuous and unobtrusive authentication (i.e., user friendly) by using various behavioural biometric techniques. This paper presents the usefulness of using smartwatch motion sensors (i.e., accelerometer and gyroscope) to perform Activity Recognition for the use within a TAS. Whilst previous research in TAS has focused upon its application in computers and mobile devices, little attention is given to the use of wearable devices - which tend to be sensor-rich highly personal technologies. This paper presents a thorough analysis of the current state of the art in transparent and continuous authentication using acceleration and gyroscope sensors and a technology evaluation to determine the basis for such an approach. The best results are average Euclidean distance scores of 5.5 and 11.9 for users' intra acceleration and gyroscope signals respectively and 24.27 and 101.18 for users' inter acceleration and gyroscope activities accordingly. The findings demonstrate that the technology is sufficiently capable and the nature of the signals captured sufficiently discriminative to be useful in performing Activity Recognition.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127531996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Risk management in payment system architectures 支付系统架构中的风险管理
Sivakumar Niranjan, C. Maxime, Boullier Dominique
Payments architectures are on the verge of a great bifurcation that must be documented in order to be debated. One one hand, actors like Google and Apple are moving towards becoming quasi-banks while they disseminate payment systems over smartphones. At the same time, the blockchain is a distributed ledger that introduces a radical new model of a trusted third-party for payments. The detailed history of credit card systems helps understand why the game of security has always been triggered by a delegation process of risk to third parties and by a cat-and-mouse game of security and fraud. Technologies were designed to solve these issues but have always been closely related to innovations in institutional assemblages. Payments systems shape our social life and the trust that we put in these architectures require an interdisciplinary examination that includes both technical and political concerns.
支付架构正处于一个巨大分歧的边缘,必须记录下来才能进行辩论。一方面,b谷歌和苹果等公司在智能手机上推广支付系统的同时,正朝着准银行的方向发展。与此同时,区块链是一种分布式账本,它引入了一种全新的可信第三方支付模式。信用卡系统的详细历史有助于理解为什么安全游戏总是由将风险委托给第三方的过程以及安全和欺诈的猫捉老鼠游戏触发。技术是为了解决这些问题而设计的,但总是与制度组合的创新密切相关。支付系统塑造了我们的社会生活,我们对这些体系结构的信任需要跨学科的检查,包括技术和政治方面的考虑。
{"title":"Risk management in payment system architectures","authors":"Sivakumar Niranjan, C. Maxime, Boullier Dominique","doi":"10.1109/ICITST.2016.7856759","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856759","url":null,"abstract":"Payments architectures are on the verge of a great bifurcation that must be documented in order to be debated. One one hand, actors like Google and Apple are moving towards becoming quasi-banks while they disseminate payment systems over smartphones. At the same time, the blockchain is a distributed ledger that introduces a radical new model of a trusted third-party for payments. The detailed history of credit card systems helps understand why the game of security has always been triggered by a delegation process of risk to third parties and by a cat-and-mouse game of security and fraud. Technologies were designed to solve these issues but have always been closely related to innovations in institutional assemblages. Payments systems shape our social life and the trust that we put in these architectures require an interdisciplinary examination that includes both technical and political concerns.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127956694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient biometric-based Encryption for fingerprints 高效的基于生物特征的指纹加密
Neyire Deniz Sarier
In this paper, we describe the first generic construction for biometric Identity Based Encryption (IBE) considering two distance measures at the same time. Current protocols for fuzzy/biometric IBE consider either set overlap metric or Euclidean distance. However, the similarity measures for biometric templates can be quite different from those considered in theoretical works. For instance, a fingerprint template usually consists of a set of minutiae, and two templates are considered as similar if more than a certain number of minutiae in one template are near distinct minutiae in the other. In this case, the similarity measure has to consider both Euclidean distance and set difference at the same time. To achieve this property, our generic construction is based on two different biometric IBE systems encoding the same message. Specifically, we combine a fuzzy IBE-type scheme and the recently introduced Distance Based Encryption (DBE) scheme with minimum overhead in terms of public parameters, ciphertext and private key size. Also, we describe an efficient biometric IBE scheme denoted as ordFIBE, which is restricted for biometrics that can be represented as an ordered/grouped set of features. Finally, we instantiate the new construction based on ordFIBE and DBE of [1], which share the same setup phase, in particular, common public parameters.
在本文中,我们描述了同时考虑两个距离度量的基于生物身份的加密(IBE)的第一个通用结构。目前的模糊/生物特征IBE协议考虑集合重叠度量或欧几里得距离。然而,生物特征模板的相似性度量可能与理论工作中考虑的相似性度量有很大不同。例如,指纹模板通常由一组细节组成,如果一个模板中超过一定数量的细节在另一个模板中接近不同的细节,则认为两个模板相似。在这种情况下,相似性度量必须同时考虑欧几里得距离和集差。为了实现这一特性,我们的通用结构基于两个不同的生物识别IBE系统编码相同的消息。具体来说,我们结合了模糊ibe类型方案和最近引入的基于距离的加密(DBE)方案,在公共参数、密文和私钥大小方面的开销最小。此外,我们还描述了一种高效的生物特征IBE方案,称为ordFIBE,该方案仅限于可以表示为有序/分组特征集的生物特征。最后,我们实例化了基于ordFIBE和[1]的DBE的新结构,它们共享相同的设置阶段,特别是公共参数。
{"title":"Efficient biometric-based Encryption for fingerprints","authors":"Neyire Deniz Sarier","doi":"10.1109/ICITST.2016.7856682","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856682","url":null,"abstract":"In this paper, we describe the first generic construction for biometric Identity Based Encryption (IBE) considering two distance measures at the same time. Current protocols for fuzzy/biometric IBE consider either set overlap metric or Euclidean distance. However, the similarity measures for biometric templates can be quite different from those considered in theoretical works. For instance, a fingerprint template usually consists of a set of minutiae, and two templates are considered as similar if more than a certain number of minutiae in one template are near distinct minutiae in the other. In this case, the similarity measure has to consider both Euclidean distance and set difference at the same time. To achieve this property, our generic construction is based on two different biometric IBE systems encoding the same message. Specifically, we combine a fuzzy IBE-type scheme and the recently introduced Distance Based Encryption (DBE) scheme with minimum overhead in terms of public parameters, ciphertext and private key size. Also, we describe an efficient biometric IBE scheme denoted as ordFIBE, which is restricted for biometrics that can be represented as an ordered/grouped set of features. Finally, we instantiate the new construction based on ordFIBE and DBE of [1], which share the same setup phase, in particular, common public parameters.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115599211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Maximizing the wireless sensor networks lifetime 最大化无线传感器网络寿命
Nouredine Seddiki, Amel Douli
The technological developments in microelectronics have enabled the integration of capacity for the achievement of several important tasks for monitoring the environment using very small components named sensors with low cost and low power consumption. A sensor node detects environmental phenomena to obtain data and transmits them to the sink via a single hop or multi-hop path in wireless sensor network applications. For monitoring applications, a topology of tree or forest is often used to collect data of global detection. The tree or forest is built after the initial deploying of nodes and are rebuilt on important topology changes. As the sensor node has limited energy, building a good tree to prolong the lifetime of the network is an important problem. In this paper we propose an approach for optimizing the lifetime of sensors network. First, we divide our network into disjoint sets, where each set represents a tree (tree construction). Then, we optimize the lifetime of network by using an efficient algorithm for balancing weight between trees in the network.
微电子技术的发展使集成能力能够实现几个重要的任务,即使用非常小的元件,称为低成本和低功耗的传感器来监测环境。在无线传感器网络应用中,传感器节点检测环境现象以获取数据,并通过单跳或多跳路径将数据传输到接收器。对于监控应用程序,通常使用树或森林的拓扑结构来收集全局检测数据。树或树林在节点初始部署之后构建,并在重要的拓扑更改时重新构建。由于传感器节点的能量有限,构建良好的树来延长网络的生命周期是一个重要的问题。本文提出了一种优化传感器网络寿命的方法。首先,我们将网络划分为不相交的集合,其中每个集合代表一棵树(树型结构)。然后,我们使用一种有效的算法来平衡网络中树之间的权重,从而优化网络的生存期。
{"title":"Maximizing the wireless sensor networks lifetime","authors":"Nouredine Seddiki, Amel Douli","doi":"10.1109/ICITST.2016.7856719","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856719","url":null,"abstract":"The technological developments in microelectronics have enabled the integration of capacity for the achievement of several important tasks for monitoring the environment using very small components named sensors with low cost and low power consumption. A sensor node detects environmental phenomena to obtain data and transmits them to the sink via a single hop or multi-hop path in wireless sensor network applications. For monitoring applications, a topology of tree or forest is often used to collect data of global detection. The tree or forest is built after the initial deploying of nodes and are rebuilt on important topology changes. As the sensor node has limited energy, building a good tree to prolong the lifetime of the network is an important problem. In this paper we propose an approach for optimizing the lifetime of sensors network. First, we divide our network into disjoint sets, where each set represents a tree (tree construction). Then, we optimize the lifetime of network by using an efficient algorithm for balancing weight between trees in the network.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125357502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure Javascript Object Notation (SecJSON) Enabling granular confidentiality and integrity of JSON documents 安全Javascript对象表示法(SecJSON)支持JSON文档的粒度机密性和完整性
Tiago Santos, C. Serrão
Currently, web and mobile-based systems exchange information with other services, mostly through APIs that extend the functionality and enable multipart interoperable information exchange. Most of this is accomplished through the usage of RESTful APIs and data exchange that is conducted using JSON over the HTTP or HTTPS protocol. In the case of the exchange requires some specific security requirements, SSL/TLS protocol is used to create a secure authenticated channel between the two communication end-points. This is a scenario where all the content of the channels is encrypted and is useful if the sender and the receptor are the only communicating parties, however this may not be the case. The authors of this paper, present a granular mechanism for selectively offering confidentiality and integrity to JSON documents, through the usage of public-key cryptography, based on the mechanisms that have been used also to provide XML security. The paper presents the proposal of the syntax for the SecJSON mechanism and an implementation that was created to offer developers the possibility to offer this security mechanism into their own services and applications.
目前,基于web和移动的系统与其他服务交换信息,主要是通过扩展功能和实现多部分互操作信息交换的api。这大部分是通过使用RESTful api和通过HTTP或HTTPS协议使用JSON进行的数据交换来完成的。在交换需要某些特定安全需求的情况下,使用SSL/TLS协议在两个通信端点之间创建安全的身份验证通道。在这种情况下,通道的所有内容都是加密的,如果发送方和接收方是唯一的通信方,那么这种情况很有用,但情况可能并非如此。本文的作者提出了一种粒度机制,通过使用公钥加密技术选择性地为JSON文档提供机密性和完整性,该机制基于也用于提供XML安全性的机制。本文提出了SecJSON机制的语法建议,并创建了一个实现,为开发人员提供了在他们自己的服务和应用程序中提供这种安全机制的可能性。
{"title":"Secure Javascript Object Notation (SecJSON) Enabling granular confidentiality and integrity of JSON documents","authors":"Tiago Santos, C. Serrão","doi":"10.1109/ICITST.2016.7856724","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856724","url":null,"abstract":"Currently, web and mobile-based systems exchange information with other services, mostly through APIs that extend the functionality and enable multipart interoperable information exchange. Most of this is accomplished through the usage of RESTful APIs and data exchange that is conducted using JSON over the HTTP or HTTPS protocol. In the case of the exchange requires some specific security requirements, SSL/TLS protocol is used to create a secure authenticated channel between the two communication end-points. This is a scenario where all the content of the channels is encrypted and is useful if the sender and the receptor are the only communicating parties, however this may not be the case. The authors of this paper, present a granular mechanism for selectively offering confidentiality and integrity to JSON documents, through the usage of public-key cryptography, based on the mechanisms that have been used also to provide XML security. The paper presents the proposal of the syntax for the SecJSON mechanism and an implementation that was created to offer developers the possibility to offer this security mechanism into their own services and applications.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"10 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122589311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
KiCM: A knowledge-intensive context model 知识密集型上下文模型
Dennis M. Lupiana, F. Mtenzi
A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing devices intuitive and less intrusive. A context model is an abstract and simplified representation of the real world, where the users and their computing devices interact. It is through a context model that knowledge about the real world can be represented in and reasoned by a context-aware architecture. This paper presents a Knowledge-intensive Context Model (KiCM). KiCM improves the existing context models by including knowledge about more entities that are essential for describing an occurrence of users' real context such as a meeting.
上下文模型在开发上下文感知体系结构以及实现上下文感知方面发挥着重要作用,这在当今的动态计算环境中非常重要。这些体系结构监视和分析它们的环境,使上下文感知应用程序能够毫不费力地适当响应用户的计算需求。这些应用程序使计算设备的使用更直观,更少干扰。上下文模型是真实世界的抽象和简化表示,用户和他们的计算设备在其中交互。通过上下文模型,有关现实世界的知识可以用上下文感知架构来表示和推理。本文提出了一种知识密集型上下文模型(KiCM)。KiCM通过包含关于更多实体的知识来改进现有的上下文模型,这些实体对于描述用户的真实上下文(如会议)的发生是必不可少的。
{"title":"KiCM: A knowledge-intensive context model","authors":"Dennis M. Lupiana, F. Mtenzi","doi":"10.1109/ICITST.2016.7856701","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856701","url":null,"abstract":"A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing devices intuitive and less intrusive. A context model is an abstract and simplified representation of the real world, where the users and their computing devices interact. It is through a context model that knowledge about the real world can be represented in and reasoned by a context-aware architecture. This paper presents a Knowledge-intensive Context Model (KiCM). KiCM improves the existing context models by including knowledge about more entities that are essential for describing an occurrence of users' real context such as a meeting.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133049382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A trust structure for detection of sybil attacks in opportunistic networks 在机会主义网络中检测sybil攻击的信任结构
Samaneh Rashidibajgan
Opportunistic networks (OppNet) enable users to connect each other via wireless communication without connecting to the Internet. These networks have fragile structures and the topology of the network is changed frequently, so it is impossible to have a Trust Third Party as a certificate authority. There are many different attacks against these networks and one of them is Sybil Attack. In this paper, we proposed a new trust connection structure for Sybil attacks detection in OppNet. According to the Bayes rules and node's observation, we calculate the utility of nodes in different situations and demonstrated when nodes can trust each other. Furthermore, we considered the probability of receiving incorrect signal, in order to improve accuracy and false positive rate in the network. Results indicate that proposed algorithm improves False Positive Rate and Accuracy of the network.
机会网络(OppNet)允许用户在不连接互联网的情况下通过无线通信相互连接。这些网络具有脆弱的结构,并且网络的拓扑结构经常变化,因此不可能将信任第三方作为证书颁发机构。针对这些网络有许多不同的攻击,其中之一是Sybil攻击。本文提出了一种用于OppNet中Sybil攻击检测的新型信任连接结构。根据贝叶斯规则和节点的观察,计算了节点在不同情况下的效用,并演示了节点在什么情况下可以相互信任。此外,我们还考虑了接收到错误信号的概率,以提高网络的准确率和误报率。结果表明,该算法提高了网络的误报率和准确率。
{"title":"A trust structure for detection of sybil attacks in opportunistic networks","authors":"Samaneh Rashidibajgan","doi":"10.1109/ICITST.2016.7856728","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856728","url":null,"abstract":"Opportunistic networks (OppNet) enable users to connect each other via wireless communication without connecting to the Internet. These networks have fragile structures and the topology of the network is changed frequently, so it is impossible to have a Trust Third Party as a certificate authority. There are many different attacks against these networks and one of them is Sybil Attack. In this paper, we proposed a new trust connection structure for Sybil attacks detection in OppNet. According to the Bayes rules and node's observation, we calculate the utility of nodes in different situations and demonstrated when nodes can trust each other. Furthermore, we considered the probability of receiving incorrect signal, in order to improve accuracy and false positive rate in the network. Results indicate that proposed algorithm improves False Positive Rate and Accuracy of the network.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129350905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Adaptive Policing Algorithms on inbound internet traffic using Generalized Pareto model 基于广义Pareto模型的互联网入站流量自适应监管算法
M. Kassim, Nor Azura Ayop
This paper present an analysis of live internet traffic and development of an Adaptive Policing Algorithms to control burst traffic based on fitted traffic model. Objectives of this research is to characterize inbound IP-based campus internet traffic, then traffic is fitted to 2-parameters Cumulative Distribution Function (CDF) traffic model. A Percentage level Policing and algorithm is developed to control the bandwidth used. Open Distribution Fitting application is used to fit to the collected data. Maximum Log likelihood estimation technique is used to fit the best 2-parameter CDF which are Generalized Pareto, Weibull, Normal and Rician distribution model. Results presents best CDF fitted model is Generalized Pareto which present highest maximum likelihood value for this case. Thus, a percentage level of 5% under original bandwidth used is developed on policing algorithms to control internet bandwidth using Pareto traffic model. Result present performances upgraded around 3% to 5% of time processing and approximately 74% of bandwidth saved with Gen Pareto model. This result help to expand the view of new idea in modelling the tele-traffic algorithm based on bandwidth management and time processing improvement. Control algorithms on bandwidth can be developed especially on new Software Defined Network with this algorithms.
本文对实时网络流量进行了分析,提出了一种基于拟合流量模型的自适应监管算法来控制突发流量。本研究的目的是描述基于ip的校园互联网入站流量,然后将流量拟合到2参数累积分布函数(CDF)流量模型。开发了一种百分比级别的警务和算法来控制带宽的使用。开放分布拟合应用程序用于拟合收集的数据。利用最大对数似然估计技术拟合了广义Pareto、Weibull、Normal和ricar分布模型的最佳2参数CDF。结果表明,对于这种情况,最佳的CDF拟合模型是广义Pareto模型,它给出了最大似然值。因此,在使用帕累托流量模型来控制互联网带宽的警务算法中,开发了原始带宽使用下5%的百分比水平。结果显示,使用Gen Pareto模型,目前的性能提升了大约3%到5%的处理时间,节省了大约74%的带宽。该结果为基于带宽管理和时间处理改进的远程通信算法的建模提供了新的思路。利用该算法可以开发出带宽控制算法,特别是在新的软件定义网络中。
{"title":"Adaptive Policing Algorithms on inbound internet traffic using Generalized Pareto model","authors":"M. Kassim, Nor Azura Ayop","doi":"10.1109/ICITST.2016.7856700","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856700","url":null,"abstract":"This paper present an analysis of live internet traffic and development of an Adaptive Policing Algorithms to control burst traffic based on fitted traffic model. Objectives of this research is to characterize inbound IP-based campus internet traffic, then traffic is fitted to 2-parameters Cumulative Distribution Function (CDF) traffic model. A Percentage level Policing and algorithm is developed to control the bandwidth used. Open Distribution Fitting application is used to fit to the collected data. Maximum Log likelihood estimation technique is used to fit the best 2-parameter CDF which are Generalized Pareto, Weibull, Normal and Rician distribution model. Results presents best CDF fitted model is Generalized Pareto which present highest maximum likelihood value for this case. Thus, a percentage level of 5% under original bandwidth used is developed on policing algorithms to control internet bandwidth using Pareto traffic model. Result present performances upgraded around 3% to 5% of time processing and approximately 74% of bandwidth saved with Gen Pareto model. This result help to expand the view of new idea in modelling the tele-traffic algorithm based on bandwidth management and time processing improvement. Control algorithms on bandwidth can be developed especially on new Software Defined Network with this algorithms.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132374495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identification and recovery of video fragments for forensics file carving 鉴定和恢复法医档案雕刻的视频片段
K. Alghafli, T. Martin
In digital forensics, file carving of video files is an important process in the recovery of video evidence needed for many criminal cases. Traditional carving techniques recover video files based on their file structure. However, these techniques fail in cases where the file is split into several fragments, especially if some of the fragments were overwritten. In this paper, we present a method for identification and recovery process of video fragments if the video Codec specifications were overwritten. It consists of two parts which are detector and validators. The detector looks for sequences of bytes that could be video fragments in forensics image. The validator decides to accept or reject that a given fragment is a part of a video file. Based on the proposed method we implement a prototype which is called VidCarve. We have conducted several experiments to evaluate the proposed method with current video carving tools. Experimental results show that the discussed method can identify video fragments with high rates of precision and recall. The overall performance rate can produce forensically sound evidence and play a vital role in the process of recovery of digital evidence in many criminal cases.
在数字取证中,视频文件刻录是许多刑事案件中需要的视频证据复原的重要环节。传统的雕刻技术是基于视频文件的文件结构来恢复视频文件的。然而,这些技术在文件被分割成几个片段的情况下会失败,特别是当一些片段被覆盖时。本文提出了一种覆盖视频编解码器规范的视频片段识别和恢复方法。它由检测器和验证器两部分组成。检测器在取证图像中寻找可能是视频片段的字节序列。验证器决定接受或拒绝给定片段是视频文件的一部分。基于所提出的方法,我们实现了一个名为VidCarve的原型。我们进行了几次实验,用现有的视频雕刻工具来评估所提出的方法。实验结果表明,该方法具有较高的视频片段识别准确率和召回率。在许多刑事案件中,数字证据的整体完成率可以产生可靠的证据,在数字证据的恢复过程中起着至关重要的作用。
{"title":"Identification and recovery of video fragments for forensics file carving","authors":"K. Alghafli, T. Martin","doi":"10.1109/ICITST.2016.7856710","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856710","url":null,"abstract":"In digital forensics, file carving of video files is an important process in the recovery of video evidence needed for many criminal cases. Traditional carving techniques recover video files based on their file structure. However, these techniques fail in cases where the file is split into several fragments, especially if some of the fragments were overwritten. In this paper, we present a method for identification and recovery process of video fragments if the video Codec specifications were overwritten. It consists of two parts which are detector and validators. The detector looks for sequences of bytes that could be video fragments in forensics image. The validator decides to accept or reject that a given fragment is a part of a video file. Based on the proposed method we implement a prototype which is called VidCarve. We have conducted several experiments to evaluate the proposed method with current video carving tools. Experimental results show that the discussed method can identify video fragments with high rates of precision and recall. The overall performance rate can produce forensically sound evidence and play a vital role in the process of recovery of digital evidence in many criminal cases.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131176925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1