Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00023
Hee-Cheon Park, Joshus DeNio, Jeongyun Choi, Hanku Lee
For the last two decades, Python has become one of the most popular programming languages and been used to develop and analyze data-intensive scientific and engineering applications and in the areas such as Bigdata Analytics, Social Media, Data Science, Physics, Psychology, Healthcare, Political Science, etc. Moreover, demand of supporting Python data-parallel applications for those areas is rapidly growing. There have been international efforts to produce a message passing interface for Python bindings to support parallel computing, but specific challenges still remain to improve Python bindings. The main purpose of this paper is to introduce our MPI Python binding, called mpiPython, with the MPI standard communication API. In this paper, we first will discuss the design issues of the mpiPython API, associated with its development. In the second part of the paper, we will discuss node/parallel performance to compare mpiPython to other MPI bindings on a Linux cluster and can expect mpiPython achieves quite acceptable performance.
{"title":"mpiPython: A Robust Python MPI Binding","authors":"Hee-Cheon Park, Joshus DeNio, Jeongyun Choi, Hanku Lee","doi":"10.1109/ICICT50521.2020.00023","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00023","url":null,"abstract":"For the last two decades, Python has become one of the most popular programming languages and been used to develop and analyze data-intensive scientific and engineering applications and in the areas such as Bigdata Analytics, Social Media, Data Science, Physics, Psychology, Healthcare, Political Science, etc. Moreover, demand of supporting Python data-parallel applications for those areas is rapidly growing. There have been international efforts to produce a message passing interface for Python bindings to support parallel computing, but specific challenges still remain to improve Python bindings. The main purpose of this paper is to introduce our MPI Python binding, called mpiPython, with the MPI standard communication API. In this paper, we first will discuss the design issues of the mpiPython API, associated with its development. In the second part of the paper, we will discuss node/parallel performance to compare mpiPython to other MPI bindings on a Linux cluster and can expect mpiPython achieves quite acceptable performance.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134435268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00027
Alaa Darabseh, Doyel Pal
Authentication is the process of verifying the identity of a user. Biometric authentication assures user identity by identifying users physiological or behavioral traits. Keystroke dynamics is a behavioral biometric based on users typing pattern. It can be used to authenticate legitimate users based on their unique typing style on the keyboard. From a pattern recognition point of view, user authentication using keystroke dynamics is a challenging task. It can be accomplished by using classification algorithms - two-class and one-class classification algorithms. In this paper, we study and evaluate the effectiveness of using the one-class classification algorithms over the two-class classification algorithms for keystroke dynamics authentication system. We implemented and evaluated 18 classification algorithms (both two-class and one-class) from the literature of keystroke dynamics and pattern recognition. The result of our experiments is evaluated using 28 subjects with the total of 378 unique comparisons for each classifier. Our results show that the top-performing classifiers of one-class are not very different from two-class classifiers and can be considered to use in the real-world authentication systems.
{"title":"Performance Analysis of Keystroke Dynamics Using Classification Algorithms","authors":"Alaa Darabseh, Doyel Pal","doi":"10.1109/ICICT50521.2020.00027","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00027","url":null,"abstract":"Authentication is the process of verifying the identity of a user. Biometric authentication assures user identity by identifying users physiological or behavioral traits. Keystroke dynamics is a behavioral biometric based on users typing pattern. It can be used to authenticate legitimate users based on their unique typing style on the keyboard. From a pattern recognition point of view, user authentication using keystroke dynamics is a challenging task. It can be accomplished by using classification algorithms - two-class and one-class classification algorithms. In this paper, we study and evaluate the effectiveness of using the one-class classification algorithms over the two-class classification algorithms for keystroke dynamics authentication system. We implemented and evaluated 18 classification algorithms (both two-class and one-class) from the literature of keystroke dynamics and pattern recognition. The result of our experiments is evaluated using 28 subjects with the total of 378 unique comparisons for each classifier. Our results show that the top-performing classifiers of one-class are not very different from two-class classifiers and can be considered to use in the real-world authentication systems.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00053
Khaldoon Alshouiliy, Ali AlGhamdi, D. Agrawal
In the era of big data, it would be beneficial for lenders to use modern technology such as machine learning algorithms to analyze and predict customers' creditworthy. In this research, our aim is to analyze LendingClub dataset to make it well understood dataset features. Then, we upload our clean dataset to Microsoft Azure machine learning (AzureML) platform to use for building our model. Which aims to predict whether the customers are going to pay back their loans or not. This model predicts the loan status going to be default or fully paid. Moreover, the LendingClub dataset we used in this work is gathered from 2007 to 2018 used accept loans. We used AzureML platform with Two Jungle algorithm and the Two Decision tree. Thereafter, we assess their performance (algorithms) in terms of Accuracy, Precision, Recall, F1 and AUC. Finally, we compare our work with other researchers and our work shows a good result compared to others.
{"title":"AzureML Based Analysis and Prediction Loan Borrowers Creditworthy","authors":"Khaldoon Alshouiliy, Ali AlGhamdi, D. Agrawal","doi":"10.1109/ICICT50521.2020.00053","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00053","url":null,"abstract":"In the era of big data, it would be beneficial for lenders to use modern technology such as machine learning algorithms to analyze and predict customers' creditworthy. In this research, our aim is to analyze LendingClub dataset to make it well understood dataset features. Then, we upload our clean dataset to Microsoft Azure machine learning (AzureML) platform to use for building our model. Which aims to predict whether the customers are going to pay back their loans or not. This model predicts the loan status going to be default or fully paid. Moreover, the LendingClub dataset we used in this work is gathered from 2007 to 2018 used accept loans. We used AzureML platform with Two Jungle algorithm and the Two Decision tree. Thereafter, we assess their performance (algorithms) in terms of Accuracy, Precision, Recall, F1 and AUC. Finally, we compare our work with other researchers and our work shows a good result compared to others.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00083
Van Nguyen, Derek Mohammed, Marwan Omar, Passard Dean
Net neutrality has been the topic of numerous debates in many countries. People are fighting for what they believe to be a basic right to use the Internet, in which bandwidth throttling and preferable treatments should not be exercised. There are many new developments in the fight for fair Internet access services. In this paper, we conduct a survey on a global scale of laws and regulations regarding net neutrality. We study the prominent countries in four parts of the world: North America, Central and South America, Asia, and Europe to show what laws and regulations are put into action for each country. We also compare how each country implements the net neutrality principles.
{"title":"Net Neutrality Around the Globe: A Survey","authors":"Van Nguyen, Derek Mohammed, Marwan Omar, Passard Dean","doi":"10.1109/ICICT50521.2020.00083","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00083","url":null,"abstract":"Net neutrality has been the topic of numerous debates in many countries. People are fighting for what they believe to be a basic right to use the Internet, in which bandwidth throttling and preferable treatments should not be exercised. There are many new developments in the fight for fair Internet access services. In this paper, we conduct a survey on a global scale of laws and regulations regarding net neutrality. We study the prominent countries in four parts of the world: North America, Central and South America, Asia, and Europe to show what laws and regulations are put into action for each country. We also compare how each country implements the net neutrality principles.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"65 Supplement 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125075600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00034
Dipesh Chand, H. Oğul
With the advancement of science and technology, everything is directly or indirectly related to it. In the same way, the learning method is also changing. Nowadays e-learning is one of the most popular methods of learning where lecture video plays a great role. Although lots of work have been done in the area of lecture video limited work have been done using content-based searching. This paper aims to obtain an overview of the topic of lecture video content-based search. To achieve that, a protocol for systemic literature review has been adapted and subsequently implemented from literature review protocol standards. The objective is to assess the existing inputs and outputs in the literature to create the best lecture video content-based search system. This paper reveals benefits, obstacles and challenges, and data source and contents which can be extracted and utilized for content-based search.
{"title":"Content-Based Search in Lecture Video: A Systematic Literature Review","authors":"Dipesh Chand, H. Oğul","doi":"10.1109/ICICT50521.2020.00034","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00034","url":null,"abstract":"With the advancement of science and technology, everything is directly or indirectly related to it. In the same way, the learning method is also changing. Nowadays e-learning is one of the most popular methods of learning where lecture video plays a great role. Although lots of work have been done in the area of lecture video limited work have been done using content-based searching. This paper aims to obtain an overview of the topic of lecture video content-based search. To achieve that, a protocol for systemic literature review has been adapted and subsequently implemented from literature review protocol standards. The objective is to assess the existing inputs and outputs in the literature to create the best lecture video content-based search system. This paper reveals benefits, obstacles and challenges, and data source and contents which can be extracted and utilized for content-based search.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125549687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00075
Sayyed Maisikeli
Understanding perception and risk behavior of citizens in a particular country can influence policies that leads to creation of appropriate cyber laws that guarantees citizens' security and privacy in cyber related transactions. UAE cyber activity and perception data is compared with data from nine developed nations. Results obtained have shown that with respect to monetary loss due to cybercrime versus relative risk, UAE is at par with Canada. Combination of results obtained suggests a need for aggressive promotion of cybersecurity awareness program in UAE. Although digital maturity, access to Internet and cybersecurity awareness in UAE may be low compared to other developed nations, cyber risk behavior is comparatively the same as in other nine developed nations. One major contribution of this research is that methodologies are presented that can be used in developing cybersecurity assessment of cybersecurity risk behaviors, and comparison of cyber related risk behavior among countries.
{"title":"UAE Cybersecurity Perception and Risk Assessments Compared to Other Developed Nations","authors":"Sayyed Maisikeli","doi":"10.1109/ICICT50521.2020.00075","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00075","url":null,"abstract":"Understanding perception and risk behavior of citizens in a particular country can influence policies that leads to creation of appropriate cyber laws that guarantees citizens' security and privacy in cyber related transactions. UAE cyber activity and perception data is compared with data from nine developed nations. Results obtained have shown that with respect to monetary loss due to cybercrime versus relative risk, UAE is at par with Canada. Combination of results obtained suggests a need for aggressive promotion of cybersecurity awareness program in UAE. Although digital maturity, access to Internet and cybersecurity awareness in UAE may be low compared to other developed nations, cyber risk behavior is comparatively the same as in other nine developed nations. One major contribution of this research is that methodologies are presented that can be used in developing cybersecurity assessment of cybersecurity risk behaviors, and comparison of cyber related risk behavior among countries.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116420117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00050
Dominik Schmelz, K. Pinter, Johannes Brottrager, Phillip Niemeier, René Lamber, T. Grechenig
The European Union's General Data Protection Regulation (GDPR) has been effective for more than a year. Even though several million euros have been spent on GDPR projects, companies are insecure about being fully compliant. The status quo is that companies lack processes and infrastructure for several legal responsibilities regarding rights of data subjects. This leads to manual effort and long waiting times for users. Data protection authorities receive complaints about these waiting times, but affected people cannot legally submit a proof for request initiation since these requests are usually done via the companies' platforms or email. This paper presents a technical solution to this problem by installing a blockchain-based application to submit and track requests for data access securely whilst preserving data protection for the subjects to be able to file complaints and ultimately ensure the given data protection rights.
{"title":"Securing the Rights of Data Subjects with Blockchain Technology","authors":"Dominik Schmelz, K. Pinter, Johannes Brottrager, Phillip Niemeier, René Lamber, T. Grechenig","doi":"10.1109/ICICT50521.2020.00050","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00050","url":null,"abstract":"The European Union's General Data Protection Regulation (GDPR) has been effective for more than a year. Even though several million euros have been spent on GDPR projects, companies are insecure about being fully compliant. The status quo is that companies lack processes and infrastructure for several legal responsibilities regarding rights of data subjects. This leads to manual effort and long waiting times for users. Data protection authorities receive complaints about these waiting times, but affected people cannot legally submit a proof for request initiation since these requests are usually done via the companies' platforms or email. This paper presents a technical solution to this problem by installing a blockchain-based application to submit and track requests for data access securely whilst preserving data protection for the subjects to be able to file complaints and ultimately ensure the given data protection rights.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132216385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00078
Tjada Nelson, H. Kettani
Cyber espionage groups are sophisticated adversary groups that conduct complex attack campaigns against their targets. As cyber espionage activities increase, there will be an increased pressure on these groups to quickly and effectively conduct their cyber operations against their targets. Using open source hacking tools can allow these groups to meet this demand by lowering resources which would otherwise be used to develop customized tooling. Using a language such as PowerShell which is widely available on target systems, cyber espionage groups can use tools that require less setup and manipulation to operate. Open source PowerShell-written post exploitation frameworks allow cyber espionage groups to leverage open source tooling on the PowerShell platform. This makes an ideal attack platform to conduct cyber operations from. This paper details cyber espionage groups that use open source PowerShell-written post exploitation frameworks and describe how they are used. The goal of this research is to understand how this tooling is used and identify trends that can lead to insights on future usage.
{"title":"Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups","authors":"Tjada Nelson, H. Kettani","doi":"10.1109/ICICT50521.2020.00078","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00078","url":null,"abstract":"Cyber espionage groups are sophisticated adversary groups that conduct complex attack campaigns against their targets. As cyber espionage activities increase, there will be an increased pressure on these groups to quickly and effectively conduct their cyber operations against their targets. Using open source hacking tools can allow these groups to meet this demand by lowering resources which would otherwise be used to develop customized tooling. Using a language such as PowerShell which is widely available on target systems, cyber espionage groups can use tools that require less setup and manipulation to operate. Open source PowerShell-written post exploitation frameworks allow cyber espionage groups to leverage open source tooling on the PowerShell platform. This makes an ideal attack platform to conduct cyber operations from. This paper details cyber espionage groups that use open source PowerShell-written post exploitation frameworks and describe how they are used. The goal of this research is to understand how this tooling is used and identify trends that can lead to insights on future usage.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132256886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00008
Amma Kazuo
Estimating a partial score of item reordering tasks has long been neglected in language testing and education sciences. A psychologically valid means of scoring, MRS (Maximal Relative Sequence) was proposed by the author and transplanted to Excel. As the protocol simply picks up elements in relative ascending order, it made easier the non-specialists’ access to and analysis of the calculation process resulting in educational as well as practical significance. However, since the Excel enumeration replicated each step of MRS precisely, the number of columns consumed explodes as the number of elements increases. Moreover, MRS merely counts the number of elements to be relocated; it fails to consider the distance of relocation for recovery. This paper proposes an alternative solution LM (Linearity Matrix), also executable with Excel’s basic functions, with far fewer columns to consume. Further, LM is advantageous over MRS in that it is a general protocol of estimating relative similarity of two sequences of which Kendall’s tau is a special case; LM is adjustable as to the degree of adjacency constraint by changing the distance weight for all combinations of elements.
{"title":"Partial Scoring of Reordering Tasks Revisited: Linearity Matrix by Excel","authors":"Amma Kazuo","doi":"10.1109/ICICT50521.2020.00008","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00008","url":null,"abstract":"Estimating a partial score of item reordering tasks has long been neglected in language testing and education sciences. A psychologically valid means of scoring, MRS (Maximal Relative Sequence) was proposed by the author and transplanted to Excel. As the protocol simply picks up elements in relative ascending order, it made easier the non-specialists’ access to and analysis of the calculation process resulting in educational as well as practical significance. However, since the Excel enumeration replicated each step of MRS precisely, the number of columns consumed explodes as the number of elements increases. Moreover, MRS merely counts the number of elements to be relocated; it fails to consider the distance of relocation for recovery. This paper proposes an alternative solution LM (Linearity Matrix), also executable with Excel’s basic functions, with far fewer columns to consume. Further, LM is advantageous over MRS in that it is a general protocol of estimating relative similarity of two sequences of which Kendall’s tau is a special case; LM is adjustable as to the degree of adjacency constraint by changing the distance weight for all combinations of elements.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-01DOI: 10.1109/ICICT50521.2020.00074
Haissam Badih, Benjamin Bond, J. Rrushi
Second-order detection of malware is frequently more effective than traditional malware detection in that it operates on the basis of a heavily influenced malware behavior. In this paper, we advance second-order detection of webcam spyware through an approach that aims at reaching their behavior at a greater than before depth. We propose decoy user space activity, along with a case study of it, namely a decoy security protocol, to involve malware in a series of interactions that lead them towards accessing a decoy I/O device, i.e. a decoy webcam in this case. In practical terms, decoy user space activity is delivered by a coherent ensemble of decoy I/O devices and decoy processes. This work makes decoy user space activity and decoy I/O indistinguishable from their real counterparts, and therefore increases uncertainty in malware operations on a compromised machine to benefit their detection.
{"title":"On Second-Order Detection of Webcam Spyware","authors":"Haissam Badih, Benjamin Bond, J. Rrushi","doi":"10.1109/ICICT50521.2020.00074","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00074","url":null,"abstract":"Second-order detection of malware is frequently more effective than traditional malware detection in that it operates on the basis of a heavily influenced malware behavior. In this paper, we advance second-order detection of webcam spyware through an approach that aims at reaching their behavior at a greater than before depth. We propose decoy user space activity, along with a case study of it, namely a decoy security protocol, to involve malware in a series of interactions that lead them towards accessing a decoy I/O device, i.e. a decoy webcam in this case. In practical terms, decoy user space activity is delivered by a coherent ensemble of decoy I/O devices and decoy processes. This work makes decoy user space activity and decoy I/O indistinguishable from their real counterparts, and therefore increases uncertainty in malware operations on a compromised machine to benefit their detection.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133924173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}