Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866686
E. Popovici, Liviu A. Stancu, Ovidiu G. Guta, Stefan Arseni, O. Fratu
In this paper we propose several solutions to combine the use of two algorithms for patterns recognition and user validation, both intended to be used in the same time to improve the overall performance of the validation process in a continuous authentication system based on keystroke dynamics. The first one is based on a Multi Layer Perceptron (MLP) Neural Network and the second one relies on a trust algorithm that uses the Bhattacharyya coefficient. For both we present some new evaluation result and conclusions.
{"title":"Combined use of pattern recognition algorithms for keystroke-based continuous authentication system","authors":"E. Popovici, Liviu A. Stancu, Ovidiu G. Guta, Stefan Arseni, O. Fratu","doi":"10.1109/ICCOMM.2014.6866686","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866686","url":null,"abstract":"In this paper we propose several solutions to combine the use of two algorithms for patterns recognition and user validation, both intended to be used in the same time to improve the overall performance of the validation process in a continuous authentication system based on keystroke dynamics. The first one is based on a Multi Layer Perceptron (MLP) Neural Network and the second one relies on a trust algorithm that uses the Bhattacharyya coefficient. For both we present some new evaluation result and conclusions.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114984831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866702
T. Costachioiu, R. Constantinescu, M. Datcu
In this paper we focus on the extraction and analysis of long-term satellite image time series, and on applications in urban development monitoring. A Satellite Image Time Series (SITS) comprised of more than 100 data sets, covering a time span of over 25 years is extracted from the current Landsat data archives, Then we create stacks of intra-annual images, which are analyzed by applying a series of direct multidate classifications in order to extract the annual built-up surface. The evolution of the built-up areas is then compared against population dynamics for the studied area.
{"title":"Multitemporal Satellite Image Time Series analysis of urban development in Bucharest and Ilfov areas","authors":"T. Costachioiu, R. Constantinescu, M. Datcu","doi":"10.1109/ICCOMM.2014.6866702","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866702","url":null,"abstract":"In this paper we focus on the extraction and analysis of long-term satellite image time series, and on applications in urban development monitoring. A Satellite Image Time Series (SITS) comprised of more than 100 data sets, covering a time span of over 25 years is extracted from the current Landsat data archives, Then we create stacks of intra-annual images, which are analyzed by applying a series of direct multidate classifications in order to extract the annual built-up surface. The evolution of the built-up areas is then compared against population dynamics for the studied area.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124807725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866678
Poussy A. Amr, Nashwa Abdelbaki
IPv4 address exhaustion pushed IETF to create IPv6, the improved substitute of IPv4. The Internet complexity and its enormous size prolong the transition from IPv4 to IPv6 process. This means that both versions will necessarily co-exist. Meanwhile, tunneling appears as a solution trend. The tunneling is a transition technique that is considered temporary till all ISPs would support IPv6. At this paper, we compare the routing convergence of two tunnel types, 6to4 and Manually Configured versus the conventional IPv4 and IPv6 protocols. We analyze the network resources consumed during cold start phase. Bandwidths occupied by routing traffic and convergence duration are measured. Finally we propose tunnel recommendations for different range of network resources.
{"title":"Convergence study of IPv6 tunneling techniques","authors":"Poussy A. Amr, Nashwa Abdelbaki","doi":"10.1109/ICCOMM.2014.6866678","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866678","url":null,"abstract":"IPv4 address exhaustion pushed IETF to create IPv6, the improved substitute of IPv4. The Internet complexity and its enormous size prolong the transition from IPv4 to IPv6 process. This means that both versions will necessarily co-exist. Meanwhile, tunneling appears as a solution trend. The tunneling is a transition technique that is considered temporary till all ISPs would support IPv6. At this paper, we compare the routing convergence of two tunnel types, 6to4 and Manually Configured versus the conventional IPv4 and IPv6 protocols. We analyze the network resources consumed during cold start phase. Bandwidths occupied by routing traffic and convergence duration are measured. Finally we propose tunnel recommendations for different range of network resources.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123525754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866665
Dalia Battikh, S. E. Assad, B. Bakhache, O. Déforges, Mohamad Khalil
Hiding information in a cover image can be regarded as introducing some stego-noise. These alterations may produce some form of degradation or some unusual characteristics and can then be exploited for the sake of detecting the hidden message. In this paper, we analyze the security of a chaos-based steganographic method, namely the Chaotic Edge adaptive Least Significant Bit Matching Revisited (Chaotic EA-LSBMR). We focus on the universal image steganalysis method which uses the higher-order statistics as features taken from the wavelet multiresolution approach. A Fisher Linear Discriminant classifier is used to classify cover and stego images.
{"title":"Steganalysis of a chaos-based steganographic method","authors":"Dalia Battikh, S. E. Assad, B. Bakhache, O. Déforges, Mohamad Khalil","doi":"10.1109/ICCOMM.2014.6866665","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866665","url":null,"abstract":"Hiding information in a cover image can be regarded as introducing some stego-noise. These alterations may produce some form of degradation or some unusual characteristics and can then be exploited for the sake of detecting the hidden message. In this paper, we analyze the security of a chaos-based steganographic method, namely the Chaotic Edge adaptive Least Significant Bit Matching Revisited (Chaotic EA-LSBMR). We focus on the universal image steganalysis method which uses the higher-order statistics as features taken from the wavelet multiresolution approach. A Fisher Linear Discriminant classifier is used to classify cover and stego images.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123682199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866688
O. Avadanei, M. Banciu, L. Nedelcu
The aim of the paper is to identify the modes that can be excited by a wide microstrip line, in a cylindrical DRA situated symmetrically above it, to study the radiating performances of these modes and to present their radiating patterns. We managed to identify thirteen high-order modes; among these modes, four of them: HEM112, TMme311, TEme112, and TEme121 have high transmission performances.
{"title":"High-order modes in high permittivity cylindrical dielectric resonator antenna excited by a wide microstrip line","authors":"O. Avadanei, M. Banciu, L. Nedelcu","doi":"10.1109/ICCOMM.2014.6866688","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866688","url":null,"abstract":"The aim of the paper is to identify the modes that can be excited by a wide microstrip line, in a cylindrical DRA situated symmetrically above it, to study the radiating performances of these modes and to present their radiating patterns. We managed to identify thirteen high-order modes; among these modes, four of them: HEM112, TMme311, TEme112, and TEme121 have high transmission performances.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122438655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866707
Adrian Pauna, I. Bica
The wide spread of cyber-attacks made the need of gathering as much information as possible about them, a real demand in nowadays global context. The honeypot systems have become a powerful tool on the way to accomplish that. Researchers have already focused on the development of various honeypot systems but the fact that their administration is time consuming made clear the need of self-adaptive honeypot system capable of learning from their interaction with attackers. This paper presents a self-adaptive honeypot system we are developing that tries to overlap some of the disadvantaged that existing systems have. The proposed honeypot is a medium interaction system developed using Python and it emulates a SSH (Secure Shell) server. The system is capable of interacting with the attackers by means of reinforcement learning algorithms.
{"title":"RASSH - Reinforced adaptive SSH honeypot","authors":"Adrian Pauna, I. Bica","doi":"10.1109/ICCOMM.2014.6866707","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866707","url":null,"abstract":"The wide spread of cyber-attacks made the need of gathering as much information as possible about them, a real demand in nowadays global context. The honeypot systems have become a powerful tool on the way to accomplish that. Researchers have already focused on the development of various honeypot systems but the fact that their administration is time consuming made clear the need of self-adaptive honeypot system capable of learning from their interaction with attackers. This paper presents a self-adaptive honeypot system we are developing that tries to overlap some of the disadvantaged that existing systems have. The proposed honeypot is a medium interaction system developed using Python and it emulates a SSH (Secure Shell) server. The system is capable of interacting with the attackers by means of reinforcement learning algorithms.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125456434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866767
V. Poenaru, S. Obreja, R. Badea, E. Borcoci
This paper presents an analysis of the performance of resource management in a distributed, multi-domain, multimedia oriented network architecture, which establishes end-to-end network pipes over a virtual network of content-aware domains. Bandwidth allocation and routing is done using a QoS optimizing algorithm with the network topology given as input, in a distributed, on-demand, manner by the other resource managers. The analysis is done in a simulated environment with all the domain managers running on one machine, but without the other elements of the complete system architecture. The purpose of the analysis is to determine if such a system is scalable over bigger networks, and how much, if the processing is in line with the amount of possible resource reservation requests of a real life usage situation, all that while discussing the current limitations of the implementation and suggesting possibilities for improvement. The resource manager, as analyzed in the paper, was designed and implemented in FP7 European project, ALICANTE.
{"title":"A performance analysis for a resource manager of a content aware network","authors":"V. Poenaru, S. Obreja, R. Badea, E. Borcoci","doi":"10.1109/ICCOMM.2014.6866767","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866767","url":null,"abstract":"This paper presents an analysis of the performance of resource management in a distributed, multi-domain, multimedia oriented network architecture, which establishes end-to-end network pipes over a virtual network of content-aware domains. Bandwidth allocation and routing is done using a QoS optimizing algorithm with the network topology given as input, in a distributed, on-demand, manner by the other resource managers. The analysis is done in a simulated environment with all the domain managers running on one machine, but without the other elements of the complete system architecture. The purpose of the analysis is to determine if such a system is scalable over bigger networks, and how much, if the processing is in line with the amount of possible resource reservation requests of a real life usage situation, all that while discussing the current limitations of the implementation and suggesting possibilities for improvement. The resource manager, as analyzed in the paper, was designed and implemented in FP7 European project, ALICANTE.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127708011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866735
A. Enescu, Bogdan-Mihai Sandoi, Cosmin-Gabriel Dinu
This paper deals with the estimation of the bit error rate inside a WCDMA digital receiver. We propose a hybrid algorithm which primarily is based on a simple signal to noise estimator and whose performance is enhanced by using an estimator of the probability density function. Our algorithm proves to have performances required by the specifications, while still maintaining a low complexity, making it suitable for implementation on a digital signal processor.
{"title":"A low-complexity bit error rate estimation algorithm for wireless digital receivers","authors":"A. Enescu, Bogdan-Mihai Sandoi, Cosmin-Gabriel Dinu","doi":"10.1109/ICCOMM.2014.6866735","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866735","url":null,"abstract":"This paper deals with the estimation of the bit error rate inside a WCDMA digital receiver. We propose a hybrid algorithm which primarily is based on a simple signal to noise estimator and whose performance is enhanced by using an estimator of the probability density function. Our algorithm proves to have performances required by the specifications, while still maintaining a low complexity, making it suitable for implementation on a digital signal processor.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127585557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866675
Xiao Luo, Qiaozhi Xu, Junxing Zhang
Digital watermarking is a technique of embedding special information into media data. It is often used in the copyright protection and integrity verification of digital images, audio, video, and other media data. Based on the Chinese remainder theorem, we propose an image watermarking algorithm that embedding secret information into an image. We have implemented the algorithm in Matlab. Our experiment results show that the algorithm has high robustness against common modifications or attacks, such as JPEG compression, adding noise, median filtering, and cutting.
{"title":"A digital watermarking algorithm based on Chinese remainder theorem","authors":"Xiao Luo, Qiaozhi Xu, Junxing Zhang","doi":"10.1109/ICCOMM.2014.6866675","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866675","url":null,"abstract":"Digital watermarking is a technique of embedding special information into media data. It is often used in the copyright protection and integrity verification of digital images, audio, video, and other media data. Based on the Chinese remainder theorem, we propose an image watermarking algorithm that embedding secret information into an image. We have implemented the algorithm in Matlab. Our experiment results show that the algorithm has high robustness against common modifications or attacks, such as JPEG compression, adding noise, median filtering, and cutting.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133549720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866764
C. Costache, F. Sandu, T. Balan, A. Nedelcu, A. Covei
Industrial communications are influenced by the emerging Cloud trend, being more and more service-oriented. The access model to on-demand provisioned infrastructure is generic considered hereby as driven by VISA (Virtual Instrumentation Software Architecture) and being an extension of the “Measurement-as-a-Service”. Aggregation of the industrial instrumentation into the Cloud is based on the business execution logic. This paper describes a method for exposing as web services the VISA instruments, and proposes an architecture, based on BPEL (Business Process Execution Language) and ESB (Enterprise Service Bus), to integrate, at business level, the Cloud provisioned elements based on the models of virtual instrumentation extended as IaaS (Infrastructure-as-a-Service).
{"title":"Business integration of industrial communications with Cloud computing","authors":"C. Costache, F. Sandu, T. Balan, A. Nedelcu, A. Covei","doi":"10.1109/ICCOMM.2014.6866764","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866764","url":null,"abstract":"Industrial communications are influenced by the emerging Cloud trend, being more and more service-oriented. The access model to on-demand provisioned infrastructure is generic considered hereby as driven by VISA (Virtual Instrumentation Software Architecture) and being an extension of the “Measurement-as-a-Service”. Aggregation of the industrial instrumentation into the Cloud is based on the business execution logic. This paper describes a method for exposing as web services the VISA instruments, and proposes an architecture, based on BPEL (Business Process Execution Language) and ESB (Enterprise Service Bus), to integrate, at business level, the Cloud provisioned elements based on the models of virtual instrumentation extended as IaaS (Infrastructure-as-a-Service).","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130504950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}