Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866663
Alecsandru Patrascu, E. Simion
Cyber threats and the field of computer cyber defense are gaining more and more an increased importance in our lives. Starting from our regular personal computers and ending with thin clients such as netbooks or smartphones we find ourselves bombarded with constant malware attacks. In this paper we will present a new and novel way in which we can detect these kinds of attacks by using elements of modern game theory. We will present the effects and benefits of game theory and we will talk about a defence exercise model that can be used to train cyber response specialists.
{"title":"Applied cybersecurity using game theory elements","authors":"Alecsandru Patrascu, E. Simion","doi":"10.1109/ICCOMM.2014.6866663","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866663","url":null,"abstract":"Cyber threats and the field of computer cyber defense are gaining more and more an increased importance in our lives. Starting from our regular personal computers and ending with thin clients such as netbooks or smartphones we find ourselves bombarded with constant malware attacks. In this paper we will present a new and novel way in which we can detect these kinds of attacks by using elements of modern game theory. We will present the effects and benefits of game theory and we will talk about a defence exercise model that can be used to train cyber response specialists.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114414399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866746
Mihai-Gabriel Ionita, V. Patriciu
The only suitable option for risk assessment systems designed with real-time constraints in mind, in the present seems to be the one based on attack graphs. Even though it is not computationally feasible for every circumstance, it is elastic enough for the usual use case. Paper [8] proposes an interesting approach based on attack graphs. An attack graph is a graph that represents all possible sequences of the attacker's actions that lead him/her to the established goals. These action sequences are also called attack traces. The main disadvantage of this approach is its high computational complexity. Thus, attack modeling needs to represent not only the sequences of actions, but also the attack impact, as well as how countermeasures can mitigate this impact and at which cost. However, the human body, based on the immune system, calculates risk every second for offering the correct manner of immune response to foreign threats, without hampering normal cell operation. Why don't we use this behavior in cyber defense systems? Applying Matzinger's danger theory, with the key concept of a distress signal, involved in risk assessment seems to be the logical decision, due to its lite resource consumption and categorical nature, which rapidly defines an attack surface, when correlating information gathered from local agents dispersed on protected hosts. As a proof of concept in favor of supporting this idea, a feed-forward backward-propagating neural network was setup to correlate threat data from agents installed on remote protected hosts. This intelligent system assesses the risk of a cyber-attack taking place and bringing the defense systems to an alarmed state in a timely manner, which can help offer a quick response against an attacker.
{"title":"Biologically inspired risk assessment in cyber security using neural networks","authors":"Mihai-Gabriel Ionita, V. Patriciu","doi":"10.1109/ICCOMM.2014.6866746","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866746","url":null,"abstract":"The only suitable option for risk assessment systems designed with real-time constraints in mind, in the present seems to be the one based on attack graphs. Even though it is not computationally feasible for every circumstance, it is elastic enough for the usual use case. Paper [8] proposes an interesting approach based on attack graphs. An attack graph is a graph that represents all possible sequences of the attacker's actions that lead him/her to the established goals. These action sequences are also called attack traces. The main disadvantage of this approach is its high computational complexity. Thus, attack modeling needs to represent not only the sequences of actions, but also the attack impact, as well as how countermeasures can mitigate this impact and at which cost. However, the human body, based on the immune system, calculates risk every second for offering the correct manner of immune response to foreign threats, without hampering normal cell operation. Why don't we use this behavior in cyber defense systems? Applying Matzinger's danger theory, with the key concept of a distress signal, involved in risk assessment seems to be the logical decision, due to its lite resource consumption and categorical nature, which rapidly defines an attack surface, when correlating information gathered from local agents dispersed on protected hosts. As a proof of concept in favor of supporting this idea, a feed-forward backward-propagating neural network was setup to correlate threat data from agents installed on remote protected hosts. This intelligent system assesses the risk of a cyber-attack taking place and bringing the defense systems to an alarmed state in a timely manner, which can help offer a quick response against an attacker.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116453477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866693
I. Ivanciu, Andrei Ciprian Hosu, Z. Polgar, V. Dobrota
This paper presents a capacity and Available Transfer Rate evaluation mechanism which can be used in a heterogeneous wireless network. This is needed to perform load balancing over several wireless links in order to fulfill the transfer rate and connectivity requirements of Next Generation Network services. The implemented measurement tool is based on WBest and the experiments considered different values of the received signal level and background traffic of the wireless network.
{"title":"Capacity and Available Transfer Rate evaluation for wireless links","authors":"I. Ivanciu, Andrei Ciprian Hosu, Z. Polgar, V. Dobrota","doi":"10.1109/ICCOMM.2014.6866693","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866693","url":null,"abstract":"This paper presents a capacity and Available Transfer Rate evaluation mechanism which can be used in a heterogeneous wireless network. This is needed to perform load balancing over several wireless links in order to fulfill the transfer rate and connectivity requirements of Next Generation Network services. The implemented measurement tool is based on WBest and the experiments considered different values of the received signal level and background traffic of the wireless network.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123762181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866754
Mihai Gavrilescu
In this paper we describe the architecture of a fully integrated modular neural network-based automatic facial emotion recognition (FER) system able to recognize emotions based on the Facial Action Code System (FACS). The proposed framework makes use of a neural network to combine the recognition results from different sources, improving the integration of different types of classifiers, in order to provide better facial emotion recognition results. We present the architecture and the implementation details, as well as results and possible improvements that can be brought to the current framework.
{"title":"Proposed architecture of a fully integrated modular neural network-based automatic facial emotion recognition system based on Facial Action Coding System","authors":"Mihai Gavrilescu","doi":"10.1109/ICCOMM.2014.6866754","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866754","url":null,"abstract":"In this paper we describe the architecture of a fully integrated modular neural network-based automatic facial emotion recognition (FER) system able to recognize emotions based on the Facial Action Code System (FACS). The proposed framework makes use of a neural network to combine the recognition results from different sources, improving the integration of different types of classifiers, in order to provide better facial emotion recognition results. We present the architecture and the implementation details, as well as results and possible improvements that can be brought to the current framework.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121963824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866763
R. Curpen, T. Balan, F. Sandu, C. Costache, Calin Cerchez
The mobile technology 4G, known as Long Term Evolution (LTE), offers very high peak data, but, since it was designed specifically for data traffic, voice support is absent. So one problematic aspect is providing voice support or having voice continuity when the user moves out of LTE coverage. The most feasible solutions are CS fallback, Voice over LTE via Generic Access (VoLGA), Single Radio Voice Call Continuity (SRVCC) and third party voice service like Skype. These solutions are discussed and compared. There are also suggested the best options for providing voice over LTE, depending on the different types of network that an operator has already deployed. Since 2 out of 4 solutions described in this paper interact with IMS, in order to demonstrate the concepts, we have designed a testing configuration, based on our own-developed LTE network simulator, 4GSim and OpenIMS Core.
{"title":"Demonstrator for voice communication over LTE","authors":"R. Curpen, T. Balan, F. Sandu, C. Costache, Calin Cerchez","doi":"10.1109/ICCOMM.2014.6866763","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866763","url":null,"abstract":"The mobile technology 4G, known as Long Term Evolution (LTE), offers very high peak data, but, since it was designed specifically for data traffic, voice support is absent. So one problematic aspect is providing voice support or having voice continuity when the user moves out of LTE coverage. The most feasible solutions are CS fallback, Voice over LTE via Generic Access (VoLGA), Single Radio Voice Call Continuity (SRVCC) and third party voice service like Skype. These solutions are discussed and compared. There are also suggested the best options for providing voice over LTE, depending on the different types of network that an operator has already deployed. Since 2 out of 4 solutions described in this paper interact with IMS, in order to demonstrate the concepts, we have designed a testing configuration, based on our own-developed LTE network simulator, 4GSim and OpenIMS Core.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124783440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866710
Mihai Enache, Dan Stoica, A. Szilagyi
Nowadays EMI shielding solutions, like most of electronic industry trends, are getting oriented to economical and friendly-environmental technologies. The classical EMI protection solutions consist in standard electromagnetic shielded enclosures designed as the product chassis. The particular situations were classic electronic equipment is placed in a hard EMI environment, are treated by using a special design equipment or a large Faraday enclosure to place the equipment. Both solutions mentioned above involve high costs and sometimes the start date of specific activity is postponed in that hard environment. Our work was to design a special enclosure, using lightweight materials, adapted to equipment in order to maintain product performances and functionality. The technologies analyzed during our studies were represented by conductive coatings and fabrics applied to different types of dielectric substratum by deposition and multi-layer techniques.
{"title":"Lightweight materials optimization for EMI protection applications","authors":"Mihai Enache, Dan Stoica, A. Szilagyi","doi":"10.1109/ICCOMM.2014.6866710","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866710","url":null,"abstract":"Nowadays EMI shielding solutions, like most of electronic industry trends, are getting oriented to economical and friendly-environmental technologies. The classical EMI protection solutions consist in standard electromagnetic shielded enclosures designed as the product chassis. The particular situations were classic electronic equipment is placed in a hard EMI environment, are treated by using a special design equipment or a large Faraday enclosure to place the equipment. Both solutions mentioned above involve high costs and sometimes the start date of specific activity is postponed in that hard environment. Our work was to design a special enclosure, using lightweight materials, adapted to equipment in order to maintain product performances and functionality. The technologies analyzed during our studies were represented by conductive coatings and fabrics applied to different types of dielectric substratum by deposition and multi-layer techniques.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124174905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866758
A. Diaconu, C. Balan
It is well known the fact that, in reality, reception's point electromagnetic status may change considerably over time and thus, the radio receiver must adapt its structure, resp., its characteristics, as to ensure optimal reception conditions of the useful signal. Generally, radio receiver's adapting methods to the electromagnetic status are closely related to its dynamic range limits, as they determine its sensitivity and nonlinear properties. Radio receiver's adaption involves adjusting transfer coefficients, disturbance thresholds, sensitivity, pass band etc., based on some well-established criteria that lead to automatic adjustment of the dynamic range limits. In this paper a broadband amplifier, which can automatically change its transfer coefficients, depending on input signal's level (whilst no attenuators are used within its constructional stages), is proposed and assessed. Thus, during the followings, it is proven that the amplifier allows a high dynamic range of the input signal, while reducing the dynamic range of the output signal bellow the 1 dB compression point, recommending its usage either within a tuner or an active antenna, in MF, HF or VHF ranges.
{"title":"Broadband amplifier with self adaptability to the electromagnetic status","authors":"A. Diaconu, C. Balan","doi":"10.1109/ICCOMM.2014.6866758","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866758","url":null,"abstract":"It is well known the fact that, in reality, reception's point electromagnetic status may change considerably over time and thus, the radio receiver must adapt its structure, resp., its characteristics, as to ensure optimal reception conditions of the useful signal. Generally, radio receiver's adapting methods to the electromagnetic status are closely related to its dynamic range limits, as they determine its sensitivity and nonlinear properties. Radio receiver's adaption involves adjusting transfer coefficients, disturbance thresholds, sensitivity, pass band etc., based on some well-established criteria that lead to automatic adjustment of the dynamic range limits. In this paper a broadband amplifier, which can automatically change its transfer coefficients, depending on input signal's level (whilst no attenuators are used within its constructional stages), is proposed and assessed. Thus, during the followings, it is proven that the amplifier allows a high dynamic range of the input signal, while reducing the dynamic range of the output signal bellow the 1 dB compression point, recommending its usage either within a tuner or an active antenna, in MF, HF or VHF ranges.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130329349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866695
S. Stubberud, K. Kramer
GPS security is becoming a major concern. In this paper, an evidence accrual system that looks to identify when a GPS navigation system may be compromised is discussed. The techniques use a novel fuzzy Kalman filter to drive the evidence generation. The technique has been modified for a more realistic set of operations that considers possibilities, including variations on jamming or spoofing and the detection capabilities that can be used.
{"title":"Analysis of fuzzy evidence accrual security approach To GPS systems","authors":"S. Stubberud, K. Kramer","doi":"10.1109/ICCOMM.2014.6866695","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866695","url":null,"abstract":"GPS security is becoming a major concern. In this paper, an evidence accrual system that looks to identify when a GPS navigation system may be compromised is discussed. The techniques use a novel fuzzy Kalman filter to drive the evidence generation. The technique has been modified for a more realistic set of operations that considers possibilities, including variations on jamming or spoofing and the detection capabilities that can be used.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129262048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866725
E. Pop
In this paper a client server platform for integrated electronic services providing to mobile users is considered. A stock market exchange service is presented, as a demo example. The platform's functional model allows mobile users to access e-business type informational content. The data transmission is performed using mobile or wireless communications channels, using TCP/IP protocol. The stock market exchange service is published for the mobile users using a web service, which is more efficient from the data traffic volume and cost, with respect to an access solution based on WEB browsing. The client software applications are suitable for PDA and Smartphone devices.
{"title":"E - business platform for mobile users","authors":"E. Pop","doi":"10.1109/ICCOMM.2014.6866725","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866725","url":null,"abstract":"In this paper a client server platform for integrated electronic services providing to mobile users is considered. A stock market exchange service is presented, as a demo example. The platform's functional model allows mobile users to access e-business type informational content. The data transmission is performed using mobile or wireless communications channels, using TCP/IP protocol. The stock market exchange service is published for the mobile users using a web service, which is more efficient from the data traffic volume and cost, with respect to an access solution based on WEB browsing. The client software applications are suitable for PDA and Smartphone devices.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127727097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-29DOI: 10.1109/ICCOMM.2014.6866676
C. Leca, C. Rîncu
Elliptic curve cryptosystems have gained increase attention and have become an intense area of research, mainly because of their shorter key length when compared to other public key cryptosystems such as RSA. Shorter key length brings advantages such as reduced computation effort, power consumption and storage requirements, making it possible to increase the available security for portable devices, smartcards and other power strained devices. ECC manages to cover all the significant cryptographic operations such as key exchange and agreement or digital signature with greater efficiency than previous systems. These operations rely heavily on point multiplication which is also the most time-consuming operation. This paper evaluates point operations (doubling, tripling, quadrupling, and addition) and proposes an algorithm for combining the operations in order to achieve faster scalar multiplication when compared to the standard algorithm for scalar multiplication of double and add.
{"title":"Combining point operations for efficient elliptic curve cryptography scalar multiplication","authors":"C. Leca, C. Rîncu","doi":"10.1109/ICCOMM.2014.6866676","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866676","url":null,"abstract":"Elliptic curve cryptosystems have gained increase attention and have become an intense area of research, mainly because of their shorter key length when compared to other public key cryptosystems such as RSA. Shorter key length brings advantages such as reduced computation effort, power consumption and storage requirements, making it possible to increase the available security for portable devices, smartcards and other power strained devices. ECC manages to cover all the significant cryptographic operations such as key exchange and agreement or digital signature with greater efficiency than previous systems. These operations rely heavily on point multiplication which is also the most time-consuming operation. This paper evaluates point operations (doubling, tripling, quadrupling, and addition) and proposes an algorithm for combining the operations in order to achieve faster scalar multiplication when compared to the standard algorithm for scalar multiplication of double and add.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129659769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}