Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00009
Bilal Gonen, D. Sawant
Today's software industry is fast moving and has daily changing demands. Many organizations are struggling to cope up with these emerging demands and they are looking for change in software development. Agile is most popular software development strategy in today's software industry, Agile provides different methods, organizations can choose suitable method to implement agility. Among all agile methods, Scrum is the most popular as of today. Although, agile is well suitable for large organization with distributed systems. Agile method such as 'scrum' can be improved further and it can work with other process and automation tools coupled with agile artifacts to improve software development team's performance such a solution can be applied to large scale industries. As no one solution is best suitable for today's business, hence the concept of 'Agile Genome' is becoming more popular, which encourages organizations to use combination of other methods and automation tools that can be used based on the application. Hence there is a need of discussing areas where agile and automation can work together and finding different ways of utilizing full potential of agile methods along with automation tools to achieve maximum benefits for the software industries.
{"title":"Significance of Agile Software Development and SQA Powered by Automation","authors":"Bilal Gonen, D. Sawant","doi":"10.1109/ICICT50521.2020.00009","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00009","url":null,"abstract":"Today's software industry is fast moving and has daily changing demands. Many organizations are struggling to cope up with these emerging demands and they are looking for change in software development. Agile is most popular software development strategy in today's software industry, Agile provides different methods, organizations can choose suitable method to implement agility. Among all agile methods, Scrum is the most popular as of today. Although, agile is well suitable for large organization with distributed systems. Agile method such as 'scrum' can be improved further and it can work with other process and automation tools coupled with agile artifacts to improve software development team's performance such a solution can be applied to large scale industries. As no one solution is best suitable for today's business, hence the concept of 'Agile Genome' is becoming more popular, which encourages organizations to use combination of other methods and automation tools that can be used based on the application. Hence there is a need of discussing areas where agile and automation can work together and finding different ways of utilizing full potential of agile methods along with automation tools to achieve maximum benefits for the software industries.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114260087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00084
Quan Yuan, Quanzhi Qian, Yong Mo, Hao Chen
5G will enter the stage of large-scale commercial deployment. It can be said that "quick deployment of 5G network" is the choice that telecom operators must make now. Due to the need to seize the 5G competition and the smooth evolution of the architecture, most domestic and foreign operators currently adopt the NSA solution. However, how to implement 5G network deployment can achieve accurate delivery of network resources and avoid waste of network resources and investment costs in 5G network deployment. In view of this problem, at the same time, the current 5G is still in the early stage of development, and there is no experience of large-scale planning and deployment. This paper proposes a hybrid planning method of 5G and LTE under the NSA mode. Firstly, the analysis introduces 5G network performance, NSA networking mode, system network planning indicators, and summarizes 5G network planning indicators, business forecasting, frequency planning, capacity planning and so on. Then, through the uplink and downlink budget, the coverage of 5G and LTE is determined. Finally, the grid analysis method is used to deploy the 5G network, and the simulation results are analyzed. The simulation results show that the proposed method can maintain the existing network structure and reduce the cost of network construction, so that operators can quickly deploy 5G on existing LTE sites, which has important guiding significance for the construction and deployment of the previous 5G network.
{"title":"Research on Mixed Planning Method of 5G and LTE","authors":"Quan Yuan, Quanzhi Qian, Yong Mo, Hao Chen","doi":"10.1109/ICICT50521.2020.00084","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00084","url":null,"abstract":"5G will enter the stage of large-scale commercial deployment. It can be said that \"quick deployment of 5G network\" is the choice that telecom operators must make now. Due to the need to seize the 5G competition and the smooth evolution of the architecture, most domestic and foreign operators currently adopt the NSA solution. However, how to implement 5G network deployment can achieve accurate delivery of network resources and avoid waste of network resources and investment costs in 5G network deployment. In view of this problem, at the same time, the current 5G is still in the early stage of development, and there is no experience of large-scale planning and deployment. This paper proposes a hybrid planning method of 5G and LTE under the NSA mode. Firstly, the analysis introduces 5G network performance, NSA networking mode, system network planning indicators, and summarizes 5G network planning indicators, business forecasting, frequency planning, capacity planning and so on. Then, through the uplink and downlink budget, the coverage of 5G and LTE is determined. Finally, the grid analysis method is used to deploy the 5G network, and the simulation results are analyzed. The simulation results show that the proposed method can maintain the existing network structure and reduce the cost of network construction, so that operators can quickly deploy 5G on existing LTE sites, which has important guiding significance for the construction and deployment of the previous 5G network.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131415438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00053
Khaldoon Alshouiliy, Ali AlGhamdi, D. Agrawal
In the era of big data, it would be beneficial for lenders to use modern technology such as machine learning algorithms to analyze and predict customers' creditworthy. In this research, our aim is to analyze LendingClub dataset to make it well understood dataset features. Then, we upload our clean dataset to Microsoft Azure machine learning (AzureML) platform to use for building our model. Which aims to predict whether the customers are going to pay back their loans or not. This model predicts the loan status going to be default or fully paid. Moreover, the LendingClub dataset we used in this work is gathered from 2007 to 2018 used accept loans. We used AzureML platform with Two Jungle algorithm and the Two Decision tree. Thereafter, we assess their performance (algorithms) in terms of Accuracy, Precision, Recall, F1 and AUC. Finally, we compare our work with other researchers and our work shows a good result compared to others.
{"title":"AzureML Based Analysis and Prediction Loan Borrowers Creditworthy","authors":"Khaldoon Alshouiliy, Ali AlGhamdi, D. Agrawal","doi":"10.1109/ICICT50521.2020.00053","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00053","url":null,"abstract":"In the era of big data, it would be beneficial for lenders to use modern technology such as machine learning algorithms to analyze and predict customers' creditworthy. In this research, our aim is to analyze LendingClub dataset to make it well understood dataset features. Then, we upload our clean dataset to Microsoft Azure machine learning (AzureML) platform to use for building our model. Which aims to predict whether the customers are going to pay back their loans or not. This model predicts the loan status going to be default or fully paid. Moreover, the LendingClub dataset we used in this work is gathered from 2007 to 2018 used accept loans. We used AzureML platform with Two Jungle algorithm and the Two Decision tree. Thereafter, we assess their performance (algorithms) in terms of Accuracy, Precision, Recall, F1 and AUC. Finally, we compare our work with other researchers and our work shows a good result compared to others.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00083
Van Nguyen, Derek Mohammed, Marwan Omar, Passard Dean
Net neutrality has been the topic of numerous debates in many countries. People are fighting for what they believe to be a basic right to use the Internet, in which bandwidth throttling and preferable treatments should not be exercised. There are many new developments in the fight for fair Internet access services. In this paper, we conduct a survey on a global scale of laws and regulations regarding net neutrality. We study the prominent countries in four parts of the world: North America, Central and South America, Asia, and Europe to show what laws and regulations are put into action for each country. We also compare how each country implements the net neutrality principles.
{"title":"Net Neutrality Around the Globe: A Survey","authors":"Van Nguyen, Derek Mohammed, Marwan Omar, Passard Dean","doi":"10.1109/ICICT50521.2020.00083","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00083","url":null,"abstract":"Net neutrality has been the topic of numerous debates in many countries. People are fighting for what they believe to be a basic right to use the Internet, in which bandwidth throttling and preferable treatments should not be exercised. There are many new developments in the fight for fair Internet access services. In this paper, we conduct a survey on a global scale of laws and regulations regarding net neutrality. We study the prominent countries in four parts of the world: North America, Central and South America, Asia, and Europe to show what laws and regulations are put into action for each country. We also compare how each country implements the net neutrality principles.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"65 Supplement 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125075600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00034
Dipesh Chand, H. Oğul
With the advancement of science and technology, everything is directly or indirectly related to it. In the same way, the learning method is also changing. Nowadays e-learning is one of the most popular methods of learning where lecture video plays a great role. Although lots of work have been done in the area of lecture video limited work have been done using content-based searching. This paper aims to obtain an overview of the topic of lecture video content-based search. To achieve that, a protocol for systemic literature review has been adapted and subsequently implemented from literature review protocol standards. The objective is to assess the existing inputs and outputs in the literature to create the best lecture video content-based search system. This paper reveals benefits, obstacles and challenges, and data source and contents which can be extracted and utilized for content-based search.
{"title":"Content-Based Search in Lecture Video: A Systematic Literature Review","authors":"Dipesh Chand, H. Oğul","doi":"10.1109/ICICT50521.2020.00034","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00034","url":null,"abstract":"With the advancement of science and technology, everything is directly or indirectly related to it. In the same way, the learning method is also changing. Nowadays e-learning is one of the most popular methods of learning where lecture video plays a great role. Although lots of work have been done in the area of lecture video limited work have been done using content-based searching. This paper aims to obtain an overview of the topic of lecture video content-based search. To achieve that, a protocol for systemic literature review has been adapted and subsequently implemented from literature review protocol standards. The objective is to assess the existing inputs and outputs in the literature to create the best lecture video content-based search system. This paper reveals benefits, obstacles and challenges, and data source and contents which can be extracted and utilized for content-based search.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00075
Sayyed Maisikeli
Understanding perception and risk behavior of citizens in a particular country can influence policies that leads to creation of appropriate cyber laws that guarantees citizens' security and privacy in cyber related transactions. UAE cyber activity and perception data is compared with data from nine developed nations. Results obtained have shown that with respect to monetary loss due to cybercrime versus relative risk, UAE is at par with Canada. Combination of results obtained suggests a need for aggressive promotion of cybersecurity awareness program in UAE. Although digital maturity, access to Internet and cybersecurity awareness in UAE may be low compared to other developed nations, cyber risk behavior is comparatively the same as in other nine developed nations. One major contribution of this research is that methodologies are presented that can be used in developing cybersecurity assessment of cybersecurity risk behaviors, and comparison of cyber related risk behavior among countries.
{"title":"UAE Cybersecurity Perception and Risk Assessments Compared to Other Developed Nations","authors":"Sayyed Maisikeli","doi":"10.1109/ICICT50521.2020.00075","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00075","url":null,"abstract":"Understanding perception and risk behavior of citizens in a particular country can influence policies that leads to creation of appropriate cyber laws that guarantees citizens' security and privacy in cyber related transactions. UAE cyber activity and perception data is compared with data from nine developed nations. Results obtained have shown that with respect to monetary loss due to cybercrime versus relative risk, UAE is at par with Canada. Combination of results obtained suggests a need for aggressive promotion of cybersecurity awareness program in UAE. Although digital maturity, access to Internet and cybersecurity awareness in UAE may be low compared to other developed nations, cyber risk behavior is comparatively the same as in other nine developed nations. One major contribution of this research is that methodologies are presented that can be used in developing cybersecurity assessment of cybersecurity risk behaviors, and comparison of cyber related risk behavior among countries.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116420117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00050
Dominik Schmelz, K. Pinter, Johannes Brottrager, Phillip Niemeier, René Lamber, T. Grechenig
The European Union's General Data Protection Regulation (GDPR) has been effective for more than a year. Even though several million euros have been spent on GDPR projects, companies are insecure about being fully compliant. The status quo is that companies lack processes and infrastructure for several legal responsibilities regarding rights of data subjects. This leads to manual effort and long waiting times for users. Data protection authorities receive complaints about these waiting times, but affected people cannot legally submit a proof for request initiation since these requests are usually done via the companies' platforms or email. This paper presents a technical solution to this problem by installing a blockchain-based application to submit and track requests for data access securely whilst preserving data protection for the subjects to be able to file complaints and ultimately ensure the given data protection rights.
{"title":"Securing the Rights of Data Subjects with Blockchain Technology","authors":"Dominik Schmelz, K. Pinter, Johannes Brottrager, Phillip Niemeier, René Lamber, T. Grechenig","doi":"10.1109/ICICT50521.2020.00050","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00050","url":null,"abstract":"The European Union's General Data Protection Regulation (GDPR) has been effective for more than a year. Even though several million euros have been spent on GDPR projects, companies are insecure about being fully compliant. The status quo is that companies lack processes and infrastructure for several legal responsibilities regarding rights of data subjects. This leads to manual effort and long waiting times for users. Data protection authorities receive complaints about these waiting times, but affected people cannot legally submit a proof for request initiation since these requests are usually done via the companies' platforms or email. This paper presents a technical solution to this problem by installing a blockchain-based application to submit and track requests for data access securely whilst preserving data protection for the subjects to be able to file complaints and ultimately ensure the given data protection rights.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00078
Tjada Nelson, H. Kettani
Cyber espionage groups are sophisticated adversary groups that conduct complex attack campaigns against their targets. As cyber espionage activities increase, there will be an increased pressure on these groups to quickly and effectively conduct their cyber operations against their targets. Using open source hacking tools can allow these groups to meet this demand by lowering resources which would otherwise be used to develop customized tooling. Using a language such as PowerShell which is widely available on target systems, cyber espionage groups can use tools that require less setup and manipulation to operate. Open source PowerShell-written post exploitation frameworks allow cyber espionage groups to leverage open source tooling on the PowerShell platform. This makes an ideal attack platform to conduct cyber operations from. This paper details cyber espionage groups that use open source PowerShell-written post exploitation frameworks and describe how they are used. The goal of this research is to understand how this tooling is used and identify trends that can lead to insights on future usage.
{"title":"Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups","authors":"Tjada Nelson, H. Kettani","doi":"10.1109/ICICT50521.2020.00078","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00078","url":null,"abstract":"Cyber espionage groups are sophisticated adversary groups that conduct complex attack campaigns against their targets. As cyber espionage activities increase, there will be an increased pressure on these groups to quickly and effectively conduct their cyber operations against their targets. Using open source hacking tools can allow these groups to meet this demand by lowering resources which would otherwise be used to develop customized tooling. Using a language such as PowerShell which is widely available on target systems, cyber espionage groups can use tools that require less setup and manipulation to operate. Open source PowerShell-written post exploitation frameworks allow cyber espionage groups to leverage open source tooling on the PowerShell platform. This makes an ideal attack platform to conduct cyber operations from. This paper details cyber espionage groups that use open source PowerShell-written post exploitation frameworks and describe how they are used. The goal of this research is to understand how this tooling is used and identify trends that can lead to insights on future usage.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132256886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00008
Amma Kazuo
Estimating a partial score of item reordering tasks has long been neglected in language testing and education sciences. A psychologically valid means of scoring, MRS (Maximal Relative Sequence) was proposed by the author and transplanted to Excel. As the protocol simply picks up elements in relative ascending order, it made easier the non-specialists’ access to and analysis of the calculation process resulting in educational as well as practical significance. However, since the Excel enumeration replicated each step of MRS precisely, the number of columns consumed explodes as the number of elements increases. Moreover, MRS merely counts the number of elements to be relocated; it fails to consider the distance of relocation for recovery. This paper proposes an alternative solution LM (Linearity Matrix), also executable with Excel’s basic functions, with far fewer columns to consume. Further, LM is advantageous over MRS in that it is a general protocol of estimating relative similarity of two sequences of which Kendall’s tau is a special case; LM is adjustable as to the degree of adjacency constraint by changing the distance weight for all combinations of elements.
{"title":"Partial Scoring of Reordering Tasks Revisited: Linearity Matrix by Excel","authors":"Amma Kazuo","doi":"10.1109/ICICT50521.2020.00008","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00008","url":null,"abstract":"Estimating a partial score of item reordering tasks has long been neglected in language testing and education sciences. A psychologically valid means of scoring, MRS (Maximal Relative Sequence) was proposed by the author and transplanted to Excel. As the protocol simply picks up elements in relative ascending order, it made easier the non-specialists’ access to and analysis of the calculation process resulting in educational as well as practical significance. However, since the Excel enumeration replicated each step of MRS precisely, the number of columns consumed explodes as the number of elements increases. Moreover, MRS merely counts the number of elements to be relocated; it fails to consider the distance of relocation for recovery. This paper proposes an alternative solution LM (Linearity Matrix), also executable with Excel’s basic functions, with far fewer columns to consume. Further, LM is advantageous over MRS in that it is a general protocol of estimating relative similarity of two sequences of which Kendall’s tau is a special case; LM is adjustable as to the degree of adjacency constraint by changing the distance weight for all combinations of elements.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00074
Haissam Badih, Benjamin Bond, J. Rrushi
Second-order detection of malware is frequently more effective than traditional malware detection in that it operates on the basis of a heavily influenced malware behavior. In this paper, we advance second-order detection of webcam spyware through an approach that aims at reaching their behavior at a greater than before depth. We propose decoy user space activity, along with a case study of it, namely a decoy security protocol, to involve malware in a series of interactions that lead them towards accessing a decoy I/O device, i.e. a decoy webcam in this case. In practical terms, decoy user space activity is delivered by a coherent ensemble of decoy I/O devices and decoy processes. This work makes decoy user space activity and decoy I/O indistinguishable from their real counterparts, and therefore increases uncertainty in malware operations on a compromised machine to benefit their detection.
{"title":"On Second-Order Detection of Webcam Spyware","authors":"Haissam Badih, Benjamin Bond, J. Rrushi","doi":"10.1109/ICICT50521.2020.00074","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00074","url":null,"abstract":"Second-order detection of malware is frequently more effective than traditional malware detection in that it operates on the basis of a heavily influenced malware behavior. In this paper, we advance second-order detection of webcam spyware through an approach that aims at reaching their behavior at a greater than before depth. We propose decoy user space activity, along with a case study of it, namely a decoy security protocol, to involve malware in a series of interactions that lead them towards accessing a decoy I/O device, i.e. a decoy webcam in this case. In practical terms, decoy user space activity is delivered by a coherent ensemble of decoy I/O devices and decoy processes. This work makes decoy user space activity and decoy I/O indistinguishable from their real counterparts, and therefore increases uncertainty in malware operations on a compromised machine to benefit their detection.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133924173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}