Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717890
R. Nielek, Bogdan Ksiezopolski, A. Wierzbicki, Lukasz Anwajler
The development of the Internet is sustainable because of existing business models. Among them one of the most common is currently pay-per-click which is based on recording users' behaviors (in particular clicks but it may also be actions) and charging advertisers according to this information. On the other hand registering users clicks causes a serious threat for privacy. Additionally part of this business process is conducted outside an environment that can be controlled by organization and, thus, increases uncertainty of the whole solution. In this paper we propose a simple privacy protection method which prevent advertising companies form recording users' click and, thus, as a side effect break the corresponding business process. This method can be use on a voluntarily basis but also as the XSS-based attack against particular companies (e.g. these considered by activists as bad behaving). We show a method to estimate potential losses for global advertising company as the cause of this attack. Although it is very difcult to counteract this type of attack we have proposed some actions which can be taken to monitor and, to some extend, limit possible losses. We also consider a use of external intermediary who may help convince user that they clicks are not traced.
{"title":"Surprising Consequences of Simple Privacy Protection Method","authors":"R. Nielek, Bogdan Ksiezopolski, A. Wierzbicki, Lukasz Anwajler","doi":"10.1109/ICITCS.2013.6717890","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717890","url":null,"abstract":"The development of the Internet is sustainable because of existing business models. Among them one of the most common is currently pay-per-click which is based on recording users' behaviors (in particular clicks but it may also be actions) and charging advertisers according to this information. On the other hand registering users clicks causes a serious threat for privacy. Additionally part of this business process is conducted outside an environment that can be controlled by organization and, thus, increases uncertainty of the whole solution. In this paper we propose a simple privacy protection method which prevent advertising companies form recording users' click and, thus, as a side effect break the corresponding business process. This method can be use on a voluntarily basis but also as the XSS-based attack against particular companies (e.g. these considered by activists as bad behaving). We show a method to estimate potential losses for global advertising company as the cause of this attack. Although it is very difcult to counteract this type of attack we have proposed some actions which can be taken to monitor and, to some extend, limit possible losses. We also consider a use of external intermediary who may help convince user that they clicks are not traced.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121377241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717773
Jeong-Seok Jang, Min Soo Kang, Kyounghak Lee
By using radio propagation predictions of Rec. ITU-R P.1546 combined with geographic information, formulations for field calculation and interference analysis are presented in the VHF and UHF bands. To illustrate some computational results for given system parameters, virtual geographic information data are taken into account.
{"title":"A Development of Prediction Program for Electric Field Strength Using the ITU-R. P.1546 Recommendation with Geographic Information","authors":"Jeong-Seok Jang, Min Soo Kang, Kyounghak Lee","doi":"10.1109/ICITCS.2013.6717773","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717773","url":null,"abstract":"By using radio propagation predictions of Rec. ITU-R P.1546 combined with geographic information, formulations for field calculation and interference analysis are presented in the VHF and UHF bands. To illustrate some computational results for given system parameters, virtual geographic information data are taken into account.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717785
Do-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim
As new non-volatile memories are emerging, it is the right time to re-evaluate the conventional memory hierarchy by considering the potential of utilizing new non-volatile memory components. This research is to design a new PRAM-based main memory structure, supporting the advantages of PRAM while providing performance similar to that of conventional DRAM main memory. To replace conventional DRAMs with non- volatile PRAMs as the main memory components, comparable memory access latency and memory cell endurance should be supported. For these goals, we propose a space effective DRAM adapter for PRAM based main memory system. The DRAM adapter consists of two page-block buffers to assure better use of spatial locality and two filtering buffers for better use of temporal locality. The proposed structure is evaluated by a trace-driven simulator using SPEC CPU 2006 traces. Experimental results show that the proposed DRAM adapter can reduce the access latency by around 60% and can increase lifetime of PRAM by around 20 times in comparison with the PRAM-based main memory without any adapter. Thus, our proposed memory architecture can be used to replace the current DRAM-based main memory system.
{"title":"A Space Effective DRAM Adapter for PRAM-Based Main Memory System","authors":"Do-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim","doi":"10.1109/ICITCS.2013.6717785","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717785","url":null,"abstract":"As new non-volatile memories are emerging, it is the right time to re-evaluate the conventional memory hierarchy by considering the potential of utilizing new non-volatile memory components. This research is to design a new PRAM-based main memory structure, supporting the advantages of PRAM while providing performance similar to that of conventional DRAM main memory. To replace conventional DRAMs with non- volatile PRAMs as the main memory components, comparable memory access latency and memory cell endurance should be supported. For these goals, we propose a space effective DRAM adapter for PRAM based main memory system. The DRAM adapter consists of two page-block buffers to assure better use of spatial locality and two filtering buffers for better use of temporal locality. The proposed structure is evaluated by a trace-driven simulator using SPEC CPU 2006 traces. Experimental results show that the proposed DRAM adapter can reduce the access latency by around 60% and can increase lifetime of PRAM by around 20 times in comparison with the PRAM-based main memory without any adapter. Thus, our proposed memory architecture can be used to replace the current DRAM-based main memory system.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130619994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717860
M. Pyo, Sangwook Bae, Sunyoung Han
Cloud computing has become the most attractive technology in distributed computing and a variety of cloud services have been introduced. However, there is still no widely accepted standard format to satisfy cloud service providers and users requests. Consequently, it caused the issue of interoperability among them. This paper proposes a cloud service orchestration protocol based on multicast. This protocol separates the network view of service information and the application view of service information when exchanging service information to support interoperability and it uses multicast at various point of protocol to support scalability. Cloud system may have a lot of services and users to communicate with each other. Hence, there are some needs for effective transfer method and the multicast is one of the ideal solutions for this problem. This protocol helps to interoperate with various cloud services like web services and embedded devices.
{"title":"Multicast Based Service Orchestration Protocol","authors":"M. Pyo, Sangwook Bae, Sunyoung Han","doi":"10.1109/ICITCS.2013.6717860","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717860","url":null,"abstract":"Cloud computing has become the most attractive technology in distributed computing and a variety of cloud services have been introduced. However, there is still no widely accepted standard format to satisfy cloud service providers and users requests. Consequently, it caused the issue of interoperability among them. This paper proposes a cloud service orchestration protocol based on multicast. This protocol separates the network view of service information and the application view of service information when exchanging service information to support interoperability and it uses multicast at various point of protocol to support scalability. Cloud system may have a lot of services and users to communicate with each other. Hence, there are some needs for effective transfer method and the multicast is one of the ideal solutions for this problem. This protocol helps to interoperate with various cloud services like web services and embedded devices.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133341000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717802
M. Chuah, Kee-Luen Wong
In new century, Business Intelligence (BI) is play important role in organizations. BI enables manager to visualize business performance in handy way and hence improve decision making. Despite aware of how essential of BI implementation, many organizations still struggle to achieve higher level of implementation. This paper proposes an Enterprise Business Maturity Model (EBI2M) and evaluates in the six companies in Malaysia.
{"title":"An Enterprise Business Intelligence Maturity Model: Case Study Approach","authors":"M. Chuah, Kee-Luen Wong","doi":"10.1109/ICITCS.2013.6717802","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717802","url":null,"abstract":"In new century, Business Intelligence (BI) is play important role in organizations. BI enables manager to visualize business performance in handy way and hence improve decision making. Despite aware of how essential of BI implementation, many organizations still struggle to achieve higher level of implementation. This paper proposes an Enterprise Business Maturity Model (EBI2M) and evaluates in the six companies in Malaysia.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131852744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717873
H. Yamaguchi, M. Gotaishi, P. Sheu, S. Tsujii
A natural language-based problem solving schemes are expected as a key-issue of knowledge-intensive service functions in the Cloud computing environment. In the meanwhile, the privacy preserving issues are crucial due to involvement of expertise (such as knowledge, experience, idea, etc.) in the problems and its solution. We propose the cryptographic protocols preserving the privacy of users and confidentiality of the problem solving servers.
{"title":"Privacy Preserving Problem Solving Scheme","authors":"H. Yamaguchi, M. Gotaishi, P. Sheu, S. Tsujii","doi":"10.1109/ICITCS.2013.6717873","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717873","url":null,"abstract":"A natural language-based problem solving schemes are expected as a key-issue of knowledge-intensive service functions in the Cloud computing environment. In the meanwhile, the privacy preserving issues are crucial due to involvement of expertise (such as knowledge, experience, idea, etc.) in the problems and its solution. We propose the cryptographic protocols preserving the privacy of users and confidentiality of the problem solving servers.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132307488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717799
Chi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang-Hyung Lee, Choong-Ho Cho
We propose the adaptive handover parameter adjustment algorithm in order to provide improved end-user experience as well as increased network capacity. This is done by automatically adapting cell parameters to adjust handover boundaries based on feedback of performance indicators. This paper focuses on an adaptation of actual level of cell individual offset according to the position of the user in a cell. Evaluations of proposal in term of efficiency of the redundant Radio Link Failure reduction as well as an impact on the user`s throughput are carried out. The results show significant reduction of RLF while reducing the impact on the throughput.
{"title":"Adaptive Mobility Robustness Adjustment Scheme for LTE-Femto System","authors":"Chi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang-Hyung Lee, Choong-Ho Cho","doi":"10.1109/ICITCS.2013.6717799","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717799","url":null,"abstract":"We propose the adaptive handover parameter adjustment algorithm in order to provide improved end-user experience as well as increased network capacity. This is done by automatically adapting cell parameters to adjust handover boundaries based on feedback of performance indicators. This paper focuses on an adaptation of actual level of cell individual offset according to the position of the user in a cell. Evaluations of proposal in term of efficiency of the redundant Radio Link Failure reduction as well as an impact on the user`s throughput are carried out. The results show significant reduction of RLF while reducing the impact on the throughput.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121420769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717779
N. Wattanapongsakorn, E. Wonghirunsombat, C. Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew
Many incidents of network attacks and security threats have been previously reported. Damages caused by network attacks and malware tend to be high. In this paper, we present a network-based Intrusion Detection and Prevention System (IDPS), which can detect network attacks and Internet Worms. The proposed system can immediately classify network attack types (i.e. DoS, Probe) and Internet worm from normal network traffic by using traffic classification technique and selected well-known machine learning algorithms (i.e. Decision TreeC4.5, Random Forest, Ripple Rule, Bayesian Network, Back Propagation Neural Network) in both standalone mode and distributed mode. The proposed IDPS also allows system administrator to update existing rule sets or learn new trained data sets with a user-friendly graphic user interface. In our experiments, we can correctly detect and prevent network attacks with high accuracy, more than 99%.
{"title":"A Network-Based Internet Worm Intrusion Detection and Prevention System","authors":"N. Wattanapongsakorn, E. Wonghirunsombat, C. Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew","doi":"10.1109/ICITCS.2013.6717779","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717779","url":null,"abstract":"Many incidents of network attacks and security threats have been previously reported. Damages caused by network attacks and malware tend to be high. In this paper, we present a network-based Intrusion Detection and Prevention System (IDPS), which can detect network attacks and Internet Worms. The proposed system can immediately classify network attack types (i.e. DoS, Probe) and Internet worm from normal network traffic by using traffic classification technique and selected well-known machine learning algorithms (i.e. Decision TreeC4.5, Random Forest, Ripple Rule, Bayesian Network, Back Propagation Neural Network) in both standalone mode and distributed mode. The proposed IDPS also allows system administrator to update existing rule sets or learn new trained data sets with a user-friendly graphic user interface. In our experiments, we can correctly detect and prevent network attacks with high accuracy, more than 99%.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121426594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717771
Young Chun Kwon, Nakhoon Baek
It is not so easy for amateur astronomers or ordinary persons to find a specific celestial body on the night sky. We represent a celestial map rendering program which reproduces the night sky at the specific time and location. With the OpenGL-based full 3D-graphics features, our system brings a sense of spatial realism. For the more accurate celestial map rendering, we referred to a set of star catalogues including Messier list, Yale Catalog of Bright Stars, and others. Since it is developed on typical PC's, our system can provide accurate celestial maps in an interactive manner, without any special equipment.
对于业余天文学家或普通人来说,要在夜空中找到一个特定的天体并不容易。我们代表了一个天体地图绘制程序,它再现了特定时间和地点的夜空。借助基于opengl的全3d图形功能,我们的系统带来了空间真实感。为了更准确地绘制天体图,我们参考了一套恒星目录,包括Messier list, Yale Catalog of Bright Stars等。由于该系统是在典型的PC上开发的,因此不需要任何特殊的设备,我们的系统可以以交互式的方式提供精确的天体地图。
{"title":"A Celestial Map Renderer Based on 3D Graphics System","authors":"Young Chun Kwon, Nakhoon Baek","doi":"10.1109/ICITCS.2013.6717771","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717771","url":null,"abstract":"It is not so easy for amateur astronomers or ordinary persons to find a specific celestial body on the night sky. We represent a celestial map rendering program which reproduces the night sky at the specific time and location. With the OpenGL-based full 3D-graphics features, our system brings a sense of spatial realism. For the more accurate celestial map rendering, we referred to a set of star catalogues including Messier list, Yale Catalog of Bright Stars, and others. Since it is developed on typical PC's, our system can provide accurate celestial maps in an interactive manner, without any special equipment.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128603437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717820
Sangwon Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im
Mobile coupon is an electronic ticket and is currently used for a financial discount and rebate. NFC is a short range wireless standard and has an advantage that the communication is very simple. In this paper, we propose a NFC-based mobile coupon for small traders and enterprisers. Since it is expensive for small shops to create and distribute their own coupons, NFC communication is only used to send the customer's identification. Users can receive and check coupon information from their mobile phones. In addition, our platform provides some community service that the small merchants work together.
{"title":"Design and Implementation of NFC-Based Mobile Coupon for Small Traders and Enterprisers","authors":"Sangwon Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im","doi":"10.1109/ICITCS.2013.6717820","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717820","url":null,"abstract":"Mobile coupon is an electronic ticket and is currently used for a financial discount and rebate. NFC is a short range wireless standard and has an advantage that the communication is very simple. In this paper, we propose a NFC-based mobile coupon for small traders and enterprisers. Since it is expensive for small shops to create and distribute their own coupons, NFC communication is only used to send the customer's identification. Users can receive and check coupon information from their mobile phones. In addition, our platform provides some community service that the small merchants work together.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}