Mitigation techniques employed by attackers has meant that traditional Network Intrusion Detection Systems (NIDS) are no longer able to reliably protect a network in the face of ever more sophisticated attacks. Security Information and Event Management (SIEM) systems monitor network systems by analyzing the logs they produce. In this paper, we propose a method of visualizing attacks by aggregating, normalizing and analyzing alerts raised by SIEM-based IDS (SIDS) systems as well as NIDS systems in real-time. We present the results of our proposed visualization technique when applied to different attack scenarios. In many cases, our approach allows for the path an attacker takes during their attack to be visualized.
{"title":"Towards Better Attack Path Visualizations Based on Deep Normalization of Host/Network IDS Alerts","authors":"Amir Azodi, Feng Cheng, C. Meinel","doi":"10.1109/AINA.2016.129","DOIUrl":"https://doi.org/10.1109/AINA.2016.129","url":null,"abstract":"Mitigation techniques employed by attackers has meant that traditional Network Intrusion Detection Systems (NIDS) are no longer able to reliably protect a network in the face of ever more sophisticated attacks. Security Information and Event Management (SIEM) systems monitor network systems by analyzing the logs they produce. In this paper, we propose a method of visualizing attacks by aggregating, normalizing and analyzing alerts raised by SIEM-based IDS (SIDS) systems as well as NIDS systems in real-time. We present the results of our proposed visualization technique when applied to different attack scenarios. In many cases, our approach allows for the path an attacker takes during their attack to be visualized.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In today's modern world, a simple malware attack can result catastrophically and can cause havoc. In spite of numerous types of antiviruses available in the market, there is a dearth in detection techniques of these antiviruses. This paper proposes a complete system, which is a combination of conventional and new techniques for detecting malware. We first evaluate the antiviruses against 10,000+ malware samples to highlight their weaknesses and then propose, implement, and benchmark the cloud-based system against some defined parameters. We have tested the effectiveness and efficiency of the proposed system by monitoring the detection rate and processing power it consumes in order to operate in a host machine.
{"title":"A Cloud-Based Energy Efficient System for Enhancing the Detection and Prevention of Modern Malware","authors":"Q. A. K. Mirza, Ghulam Mohi Ud Din, I. Awan","doi":"10.1109/AINA.2016.133","DOIUrl":"https://doi.org/10.1109/AINA.2016.133","url":null,"abstract":"In today's modern world, a simple malware attack can result catastrophically and can cause havoc. In spite of numerous types of antiviruses available in the market, there is a dearth in detection techniques of these antiviruses. This paper proposes a complete system, which is a combination of conventional and new techniques for detecting malware. We first evaluate the antiviruses against 10,000+ malware samples to highlight their weaknesses and then propose, implement, and benchmark the cloud-based system against some defined parameters. We have tested the effectiveness and efficiency of the proposed system by monitoring the detection rate and processing power it consumes in order to operate in a host machine.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of Things (IoT) can connect a large numberof things (or agents) through communication networks for varioustypes of applications. Like in many other applications, it isvery important for all the agents in IoT systems to collaboratewith each other following predefined protocols. In this paper, we proposed a general trust management framework aiming tohelp agents to evaluate their partners' trustworthiness. We run asimulation for a food nutrition analysis example. It shows that byusing trust, the analysis error can be reduced. Also, we illustratetwo possible types of attacks, and show how to use different trustfactors or environments together to alleviate the damage.
{"title":"Trust Management Framework for Internet of Things","authors":"Yefeng Ruan, A. Durresi, L. Alfantoukh","doi":"10.1109/AINA.2016.136","DOIUrl":"https://doi.org/10.1109/AINA.2016.136","url":null,"abstract":"Internet of Things (IoT) can connect a large numberof things (or agents) through communication networks for varioustypes of applications. Like in many other applications, it isvery important for all the agents in IoT systems to collaboratewith each other following predefined protocols. In this paper, we proposed a general trust management framework aiming tohelp agents to evaluate their partners' trustworthiness. We run asimulation for a food nutrition analysis example. It shows that byusing trust, the analysis error can be reduced. Also, we illustratetwo possible types of attacks, and show how to use different trustfactors or environments together to alleviate the damage.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114210619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdul Majid, Irfan Azam, Abdul Waheed, Muhammad Zain-ul-Abidin, Taimur Hafeez, Z. Khan, U. Qasim, N. Javaid
In Underwater Wireless Sensor Networks (UWSNs) nodes are equipped with limited battery power and battery replacement is expensive due to underwater harsh environment. Therefore, we propose EBECRP an energy Efficient and Balanced Energy consumption Cluster based Routing Protocol for UWSNs. In depth base routing protocols nodes near the sink (low depth nodes) die in no time because of high load. We avoid depth base routing in our proposed scheme and use mobile sinks to balance load on all nodes. We also use the concept of clustering to reduce multi hoping which results in more energy consumption. The selected Cluster Heads (CHs) collect data from one hope neighbor nodes to reduce global communication into locally compressed communication. Simulation results show that EBECRP achieves maximum stability period and network life time.
{"title":"An Energy Efficient and Balanced Energy Consumption Cluster Based Routing Protocol for Underwater Wireless Sensor Networks","authors":"Abdul Majid, Irfan Azam, Abdul Waheed, Muhammad Zain-ul-Abidin, Taimur Hafeez, Z. Khan, U. Qasim, N. Javaid","doi":"10.1109/AINA.2016.165","DOIUrl":"https://doi.org/10.1109/AINA.2016.165","url":null,"abstract":"In Underwater Wireless Sensor Networks (UWSNs) nodes are equipped with limited battery power and battery replacement is expensive due to underwater harsh environment. Therefore, we propose EBECRP an energy Efficient and Balanced Energy consumption Cluster based Routing Protocol for UWSNs. In depth base routing protocols nodes near the sink (low depth nodes) die in no time because of high load. We avoid depth base routing in our proposed scheme and use mobile sinks to balance load on all nodes. We also use the concept of clustering to reduce multi hoping which results in more energy consumption. The selected Cluster Heads (CHs) collect data from one hope neighbor nodes to reduce global communication into locally compressed communication. Simulation results show that EBECRP achieves maximum stability period and network life time.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121713935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper will present new possibilities of information sharing with the use of biometric techniques. Various biometric techniques used in personal identification processes will constitute the basis for new data classification solutions. The process of data classification will be possible owing to the use of cryptographic techniques of sharing information, enriched by elements of biometric processes of personal identification. This type of solutions will serve to support the processes of managing strategic information.
{"title":"Bio-Inspired Cryptographic Techniques in Information Management Applications","authors":"L. Ogiela, M. Ogiela","doi":"10.1109/AINA.2016.161","DOIUrl":"https://doi.org/10.1109/AINA.2016.161","url":null,"abstract":"This paper will present new possibilities of information sharing with the use of biometric techniques. Various biometric techniques used in personal identification processes will constitute the basis for new data classification solutions. The process of data classification will be possible owing to the use of cryptographic techniques of sharing information, enriched by elements of biometric processes of personal identification. This type of solutions will serve to support the processes of managing strategic information.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"23 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sawada, Hiroki Kataoka, Dilawaer Duolikun, T. Enokido, M. Takizawa
It is now critical to reduce electric energy consumed in a cluster of servers, especially scalable systems like cloud computing systems. In clusters, most application processes like web applications use not only CPU resources but also files and databases. In this paper, we consider storage processes which read and write data in files in addition to computation processes. We propose a PCS model (power consumption model for a storage server) which shows how much electric power a server consumes to perform storage and computation processes. We also propose a CS model (a computation model for storage server) which shows how long it is expected to take to perform storage processes and computation processes. By using the PCS and CS models, we propose a local energy-aware (LEA) algorithm to select a server for a request process in a cluster so that the total electric energy consumption of the servers can be reduced. We evaluate the LEA algorithm in terms of total electric energy consumption of the servers. We show the electric energy consumed by servers to perform computation and storage processes can be reduced in the LEA algorithm.
{"title":"Energy-Aware Clusters of Servers for Storage and Computation Applications","authors":"A. Sawada, Hiroki Kataoka, Dilawaer Duolikun, T. Enokido, M. Takizawa","doi":"10.1109/AINA.2016.157","DOIUrl":"https://doi.org/10.1109/AINA.2016.157","url":null,"abstract":"It is now critical to reduce electric energy consumed in a cluster of servers, especially scalable systems like cloud computing systems. In clusters, most application processes like web applications use not only CPU resources but also files and databases. In this paper, we consider storage processes which read and write data in files in addition to computation processes. We propose a PCS model (power consumption model for a storage server) which shows how much electric power a server consumes to perform storage and computation processes. We also propose a CS model (a computation model for storage server) which shows how long it is expected to take to perform storage processes and computation processes. By using the PCS and CS models, we propose a local energy-aware (LEA) algorithm to select a server for a request process in a cluster so that the total electric energy consumption of the servers can be reduced. We evaluate the LEA algorithm in terms of total electric energy consumption of the servers. We show the electric energy consumed by servers to perform computation and storage processes can be reduced in the LEA algorithm.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Available bandwidth (ABW) estimation in wireless networks is a critical issue for quality-of-service (QoS) provisioning. Nowadays, a network path often contains at least one wireless link e.g., mobile users having wireless connection to the Internet through laptop PCs or smartphones. Most of the existing tools for measuring ABW have been developed and evaluated in wired networks. Since the characteristics of wired links and wireless links differ in many respects, such as fluctuations incapacity and stability due to the shared and unreliable nature of the wireless links, ABW estimation tools also need to be evaluated for network paths containing at least one wireless link. In this paper, we have extended our previous work, New Enhanced Available Bandwidth Estimation Technique (NEXT) by introducing a parameter-independent curve-fitting technique to detect the ABW from a one-way queuing delay signature and conducted a real test over a radio interface in a 4G/LTE mobile communication network. For the experiments, a commercial 4G/LTE mobile network of a Japanese mobile operator was used. Extensive simulations over an IEEE 802.11 network were also performed. Simulation results as well as real-world experimental results demonstrate that it is feasible to achieve reliable estimates under certain circumstances. Our extended approach, which we call NEXT -- FIT, has very good ABW estimation results under conditions of different packet sizes, dynamic wireless link rates, and channel noises.
{"title":"NEXT-FIT: Available Bandwidth Measurement over 4G/LTE Networks -- A Curve-Fitting Approach","authors":"A. Paul, Atsuo Tachibana, T. Hasegawa","doi":"10.1109/AINA.2016.24","DOIUrl":"https://doi.org/10.1109/AINA.2016.24","url":null,"abstract":"Available bandwidth (ABW) estimation in wireless networks is a critical issue for quality-of-service (QoS) provisioning. Nowadays, a network path often contains at least one wireless link e.g., mobile users having wireless connection to the Internet through laptop PCs or smartphones. Most of the existing tools for measuring ABW have been developed and evaluated in wired networks. Since the characteristics of wired links and wireless links differ in many respects, such as fluctuations incapacity and stability due to the shared and unreliable nature of the wireless links, ABW estimation tools also need to be evaluated for network paths containing at least one wireless link. In this paper, we have extended our previous work, New Enhanced Available Bandwidth Estimation Technique (NEXT) by introducing a parameter-independent curve-fitting technique to detect the ABW from a one-way queuing delay signature and conducted a real test over a radio interface in a 4G/LTE mobile communication network. For the experiments, a commercial 4G/LTE mobile network of a Japanese mobile operator was used. Extensive simulations over an IEEE 802.11 network were also performed. Simulation results as well as real-world experimental results demonstrate that it is feasible to achieve reliable estimates under certain circumstances. Our extended approach, which we call NEXT -- FIT, has very good ABW estimation results under conditions of different packet sizes, dynamic wireless link rates, and channel noises.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122913837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sahar Rahim, Z. Iqbal, Nusrat Shaheen, Z. Khan, U. Qasim, S. A. Khan, N. Javaid
In this paper, we introduce a generic architecture for demand side management (DSM) and use combined model of time of use tariff and inclined block rates. The problem formulation is carried via multiple knapsack and its solution is obtained via ant colony optimization (ACO). Simulation results show that the designed model for energy management achieves our objectives, it is proven as a cost-effective solution to increase sustainability of smart grid. The ACO based energy management controller performs more efficiently than energy management controller without ACO based scheduling in terms of electricity bill reduction, peak to average ratio minimization and user comfort level maximization.
{"title":"Ant Colony Optimization Based Energy Management Controller for Smart Grid","authors":"Sahar Rahim, Z. Iqbal, Nusrat Shaheen, Z. Khan, U. Qasim, S. A. Khan, N. Javaid","doi":"10.1109/AINA.2016.163","DOIUrl":"https://doi.org/10.1109/AINA.2016.163","url":null,"abstract":"In this paper, we introduce a generic architecture for demand side management (DSM) and use combined model of time of use tariff and inclined block rates. The problem formulation is carried via multiple knapsack and its solution is obtained via ant colony optimization (ACO). Simulation results show that the designed model for energy management achieves our objectives, it is proven as a cost-effective solution to increase sustainability of smart grid. The ACO based energy management controller performs more efficiently than energy management controller without ACO based scheduling in terms of electricity bill reduction, peak to average ratio minimization and user comfort level maximization.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"29 6 Suppl 19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takamichi Saito, Kazushi Takahashi, K. Yasuda, Takayuki Ishikawa, Ko Takasu, Tomotaka Yamada, Naoki Takei, Rio Hosoi
Recently, some commercial websites collect browsing history and device information for use in services they provide. In this paper, we focused on font information that can be obtained via a web browser to determine what kind of software can be identified about a given device. According to existing research, it is possible to identify installed applications such as the Adobe Flash Player and Microsoft Office using such font information. Thus, we have examined the fonts installed by operating systems (OS) and applications. Our results show that font information on a device can be used to identify installed applications and OS type and version.
{"title":"OS and Application Identification by Installed Fonts","authors":"Takamichi Saito, Kazushi Takahashi, K. Yasuda, Takayuki Ishikawa, Ko Takasu, Tomotaka Yamada, Naoki Takei, Rio Hosoi","doi":"10.1109/AINA.2016.55","DOIUrl":"https://doi.org/10.1109/AINA.2016.55","url":null,"abstract":"Recently, some commercial websites collect browsing history and device information for use in services they provide. In this paper, we focused on font information that can be obtained via a web browser to determine what kind of software can be identified about a given device. According to existing research, it is possible to identify installed applications such as the Adobe Flash Player and Microsoft Office using such font information. Thus, we have examined the fonts installed by operating systems (OS) and applications. Our results show that font information on a device can be used to identify installed applications and OS type and version.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133400174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In context aware settings, if one or more services are unavailable, it may be useful to look for a set of services whose combined effect would be functionally equivalent to a given request. We show that the notion of functional equivalence is quite useful in some real world scenarios. In this paper, we suggest a method to obtain a composed service whose effect is functionally equivalent to the given request. The algorithm has been implemented on some domains and the results are promising.
{"title":"An Ontology Based Approach for Satisfying User Requests in Context Aware Settings","authors":"Sujata Swain, R. Niyogi","doi":"10.1109/AINA.2016.121","DOIUrl":"https://doi.org/10.1109/AINA.2016.121","url":null,"abstract":"In context aware settings, if one or more services are unavailable, it may be useful to look for a set of services whose combined effect would be functionally equivalent to a given request. We show that the notion of functional equivalence is quite useful in some real world scenarios. In this paper, we suggest a method to obtain a composed service whose effect is functionally equivalent to the given request. The algorithm has been implemented on some domains and the results are promising.","PeriodicalId":438655,"journal":{"name":"2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133168522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}