Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476095
Reham Al-Dayil, M. H. Dahshan
With the rapidly growing development of cellular networks and powerful smartphones, botnets have invaded the mobile domain. Social media, like Twitter, Facebook, and YouTube have created a new communication channel for attackers. Recently, bot masters started to exploit social media for different malicious activity, such as sending spam, recruitment of new bots, and botnet command and control. In this paper we propose a detection technique for social mediabased mobile botnets using Twitter. The proposed method combines the correlation between tweeting and user activity, such as clicks or taps, and an Artificial Immune System detector, to detect tweets caused by bots and differentiate them from tweets generated by user or by user-approved applications. This detector creates a signature of the tweet and compares it with a dynamically updated signature library of bot behavior signatures. The proposed system has been fully implemented on Android platform and tested under several sets of generated tweets. The test results show that the proposed method has a very high accuracy in detecting bot tweets with about 95% detection ratio.
{"title":"Detecting social media mobile botnets using user activity correlation and artificial immune system","authors":"Reham Al-Dayil, M. H. Dahshan","doi":"10.1109/IACS.2016.7476095","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476095","url":null,"abstract":"With the rapidly growing development of cellular networks and powerful smartphones, botnets have invaded the mobile domain. Social media, like Twitter, Facebook, and YouTube have created a new communication channel for attackers. Recently, bot masters started to exploit social media for different malicious activity, such as sending spam, recruitment of new bots, and botnet command and control. In this paper we propose a detection technique for social mediabased mobile botnets using Twitter. The proposed method combines the correlation between tweeting and user activity, such as clicks or taps, and an Artificial Immune System detector, to detect tweets caused by bots and differentiate them from tweets generated by user or by user-approved applications. This detector creates a signature of the tweet and compares it with a dynamically updated signature library of bot behavior signatures. The proposed system has been fully implemented on Android platform and tested under several sets of generated tweets. The test results show that the proposed method has a very high accuracy in detecting bot tweets with about 95% detection ratio.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"1 1","pages":"109-114"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82059872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476108
Suzan Al-Zoubi, Rami Mohaisen, M. Al-Mistarihi, Sari Khatalin, M. Khodeir
This paper proposes a method for transmitting data through a best relay selection technique in a cooperative network over Nakagami-m fading channels. The selection of the best relay among multiple decode and forward relays is based on the minimum outage probability criterion. Therefore, only the relay with the lowest outage probability will transfer the data to the destination. A closed-form expression is derived for the outage probability of the best relay selection with the decode and forward technique. Numerical examples are presented here for demonstration.
{"title":"On the outage probability in DF relay selection cooperative wireless networks over Nakagami-m fading channels","authors":"Suzan Al-Zoubi, Rami Mohaisen, M. Al-Mistarihi, Sari Khatalin, M. Khodeir","doi":"10.1109/IACS.2016.7476108","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476108","url":null,"abstract":"This paper proposes a method for transmitting data through a best relay selection technique in a cooperative network over Nakagami-m fading channels. The selection of the best relay among multiple decode and forward relays is based on the minimum outage probability criterion. Therefore, only the relay with the lowest outage probability will transfer the data to the destination. A closed-form expression is derived for the outage probability of the best relay selection with the decode and forward technique. Numerical examples are presented here for demonstration.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"24 1","pages":"186-189"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79306178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476065
H. Tri, A. Alsadoon, P. Prasad, A. Elchouemi
Agile software development methods have emerged to Australian organizations in recent years. This paper is a survey of agile method employments found in information technology industries, educational courses and research programs. The survey aims to collect, compare, analyze and determine the movement of agile methods in several countries and focuses on Australia. The analysis of each collected agile method is based on three main factors. The first factor is the agile values of a method, which are related with the agile manifesto. The next two analyses compare the agile methods on their management practice values and engineering practice values. The results indicate that agile software development methods only support certain phases of the software development life cycle. Also, most agile methods in this survey do not provide sufficient support for project management. At the end, Universal Dynamic System Development Method (UDSDM) and universal agile software development framework have proposed based on the analyses done in this survey.
{"title":"Progress of agile movements in Australia: Propose a Universal Dynamic System Development Method (UDSDM) and universal framework","authors":"H. Tri, A. Alsadoon, P. Prasad, A. Elchouemi","doi":"10.1109/IACS.2016.7476065","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476065","url":null,"abstract":"Agile software development methods have emerged to Australian organizations in recent years. This paper is a survey of agile method employments found in information technology industries, educational courses and research programs. The survey aims to collect, compare, analyze and determine the movement of agile methods in several countries and focuses on Australia. The analysis of each collected agile method is based on three main factors. The first factor is the agile values of a method, which are related with the agile manifesto. The next two analyses compare the agile methods on their management practice values and engineering practice values. The results indicate that agile software development methods only support certain phases of the software development life cycle. Also, most agile methods in this survey do not provide sufficient support for project management. At the end, Universal Dynamic System Development Method (UDSDM) and universal agile software development framework have proposed based on the analyses done in this survey.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"30 1","pages":"282-285"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88438831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476119
Shashank Gupta, B. B. Gupta
This paper presents a robust framework deployed in the settings of cloud environment that alleviates the propagation of JS worms from Web applications. The proposed framework automates the process of detecting the hidden injection points from the OSN-based web applications. In addition, it also detects the partial JavaScript injection by the attacker and performs the sanitization on the detected JavaScript attack vectors in a context-aware manner. The prototype of our framework was developed in java and installed in the virtual machines of cloud platforms as a Google Chrome extension. The testing of our framework is performed on the platform of real world OSN-based web applications in cloud platform. The performance analysis and experimental results reveal that our framework detects the partial JS worms with low false negative rate and acceptable false positive rate. We have also optimized the sanitization process in a context-aware manner in contrast to the methods adopted by existing defensive methodologies.
{"title":"Alleviating the proliferation of JavaScript worms from online social network in cloud platforms","authors":"Shashank Gupta, B. B. Gupta","doi":"10.1109/IACS.2016.7476119","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476119","url":null,"abstract":"This paper presents a robust framework deployed in the settings of cloud environment that alleviates the propagation of JS worms from Web applications. The proposed framework automates the process of detecting the hidden injection points from the OSN-based web applications. In addition, it also detects the partial JavaScript injection by the attacker and performs the sanitization on the detected JavaScript attack vectors in a context-aware manner. The prototype of our framework was developed in java and installed in the virtual machines of cloud platforms as a Google Chrome extension. The testing of our framework is performed on the platform of real world OSN-based web applications in cloud platform. The performance analysis and experimental results reveal that our framework detects the partial JS worms with low false negative rate and acceptable false positive rate. We have also optimized the sanitization process in a context-aware manner in contrast to the methods adopted by existing defensive methodologies.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"27 1","pages":"246-251"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81485078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476073
M. Al-Ayyoub, Huda Al-Sarhan, Majd Al-So'ud, Mohammad Al-Smadi, Y. Jararweh
This paper aims at fostering the domain of Arabic affective news analysis through providing: (a) a benchmark annotated Arabic dataset of news for affective news analysis, (b) an aspect-based sentiment analysis (ABSA) approach for evaluating the sentimental affect of Arabic news posts on the reader, and (c) a baseline approach with a common evaluation framework to compare future research results with the baseline ones.
{"title":"Framework for affective news analysis of Arabic news: 2014 Gaza attacks case study","authors":"M. Al-Ayyoub, Huda Al-Sarhan, Majd Al-So'ud, Mohammad Al-Smadi, Y. Jararweh","doi":"10.1109/IACS.2016.7476073","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476073","url":null,"abstract":"This paper aims at fostering the domain of Arabic affective news analysis through providing: (a) a benchmark annotated Arabic dataset of news for affective news analysis, (b) an aspect-based sentiment analysis (ABSA) approach for evaluating the sentimental affect of Arabic news posts on the reader, and (c) a baseline approach with a common evaluation framework to compare future research results with the baseline ones.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"41 1","pages":"327-332"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74371464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476090
Khaled Balhaf, M. Shehab, Walaa Al-Sarayrah, M. Al-Ayyoub, Mohammed I. Al-Saleh, Y. Jararweh
Sequence comparison problems such as sequence alignment and approximate string matching are part of the fundamental problems in many fields such as natural language processing, data mining and bioinformatics. However, the algorithms proposed to address these problems suffer from high computational complexities prohibiting them from being widely used in practical large-scale settings. Many researchers used parallel programming to reduce the execution time of these algorithms. In this paper, we follow this approach and use the parallelism capabilities of the Graphics Processing Unit (GPU) to accelerate one of the most common algorithms to compute the edit distance between two strings, which is known as the Levenshtein distance. To take full advantage of the large number of cores in a GPU, we employ a diagonal-based tracing technique which results in even greater improvements in terms of the running time. In fact, our CUDA implementation of the Levenshtein algorithm is about 11X faster than the sequential implementation. This is achieved without affecting the accuracy.
{"title":"Using GPUs to speed-up Levenshtein edit distance computation","authors":"Khaled Balhaf, M. Shehab, Walaa Al-Sarayrah, M. Al-Ayyoub, Mohammed I. Al-Saleh, Y. Jararweh","doi":"10.1109/IACS.2016.7476090","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476090","url":null,"abstract":"Sequence comparison problems such as sequence alignment and approximate string matching are part of the fundamental problems in many fields such as natural language processing, data mining and bioinformatics. However, the algorithms proposed to address these problems suffer from high computational complexities prohibiting them from being widely used in practical large-scale settings. Many researchers used parallel programming to reduce the execution time of these algorithms. In this paper, we follow this approach and use the parallelism capabilities of the Graphics Processing Unit (GPU) to accelerate one of the most common algorithms to compute the edit distance between two strings, which is known as the Levenshtein distance. To take full advantage of the large number of cores in a GPU, we employ a diagonal-based tracing technique which results in even greater improvements in terms of the running time. In fact, our CUDA implementation of the Levenshtein algorithm is about 11X faster than the sequential implementation. This is achieved without affecting the accuracy.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"18 1","pages":"80-84"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74613384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Service integration is one of the most critical issues affecting e-government implementations in Jordan and all over the world. Providing integrated services to citizens, businesses, and all other stakeholders involved in e-government at "one stop portal" is considered to be a big opportunity for governments to improve their services' efficiency and effectiveness. This paper aims to provide a general background and theoretical foundation towards understanding the importance of service integration in e-government implementations. To achieve this aim, a comprehensive literature review of e-government, in general, and service integration issue in particular, has been conducted. The paper has shed a new light on the main concepts, definitions, objectives, benefits, challenges, explanations and analytical bases for the topic. As a result of the comprehensive literature review included, a model that clarifies the importance of service integration in e-government implementations is proposed.
{"title":"Importance of service integration in e-government implementations","authors":"As'ad As'ad, Babak Khazaei, Babak Akhgar, Ja'far Alqatawna","doi":"10.1109/IACS.2016.7476086","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476086","url":null,"abstract":"Service integration is one of the most critical issues affecting e-government implementations in Jordan and all over the world. Providing integrated services to citizens, businesses, and all other stakeholders involved in e-government at \"one stop portal\" is considered to be a big opportunity for governments to improve their services' efficiency and effectiveness. This paper aims to provide a general background and theoretical foundation towards understanding the importance of service integration in e-government implementations. To achieve this aim, a comprehensive literature review of e-government, in general, and service integration issue in particular, has been conducted. The paper has shed a new light on the main concepts, definitions, objectives, benefits, challenges, explanations and analytical bases for the topic. As a result of the comprehensive literature review included, a model that clarifies the importance of service integration in e-government implementations is proposed.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"20 1","pages":"56-61"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73348873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476099
Amal Al-Rasheed, J. Berri
Best practice (BP) refers to proven practices used by experts in performing a task. A detailed review of previous research shows that knowledge management of BPs is critically important for the success of knowledge sharing and reuse within communities as it will leverage existing knowledge and will facilitate duplicating success experiences. The objective of this paper is to present a BP life cycle development methodology that specifies the required steps for engineering BP to facilitate transforming individual knowledge into public knowledge and making it available to all practitioners. BPs can be successfully shared by establishing an environment in which users, experts and communities can interact and cooperate. The proposed development methodology is implemented as a knowledge management system that promotes and values user contributions. In this paper we present the application of the methodology to the field of education through an implemented system that allow a convenient elicitation and sharing of best practices in teaching.
{"title":"Engineering domain expertise through best practices management: Application to the field of education","authors":"Amal Al-Rasheed, J. Berri","doi":"10.1109/IACS.2016.7476099","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476099","url":null,"abstract":"Best practice (BP) refers to proven practices used by experts in performing a task. A detailed review of previous research shows that knowledge management of BPs is critically important for the success of knowledge sharing and reuse within communities as it will leverage existing knowledge and will facilitate duplicating success experiences. The objective of this paper is to present a BP life cycle development methodology that specifies the required steps for engineering BP to facilitate transforming individual knowledge into public knowledge and making it available to all practitioners. BPs can be successfully shared by establishing an environment in which users, experts and communities can interact and cooperate. The proposed development methodology is implemented as a knowledge management system that promotes and values user contributions. In this paper we present the application of the methodology to the field of education through an implemented system that allow a convenient elicitation and sharing of best practices in teaching.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"2 1","pages":"133-138"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74815887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476069
Isabel Braga Sampaio, Luis Barbosa
It is known that code readability has an impact on software quality. This paper introduces a preliminary list of 33 good practices for code readability that could be taught in object oriented programming courses of informatics programs. In this set are included practices with both positive and negative impact, the latter mainly from bad smells. A survey was made with OOP teachers in order to assess the significance of teaching a set of good practices. The results showed that teachers consider it important to teach the defined set. Such result was statistically significant. Still, the same level of significance was not awarded to all practices. Some additional results are presented.
{"title":"Software readability practices and the importance of their teaching","authors":"Isabel Braga Sampaio, Luis Barbosa","doi":"10.1109/IACS.2016.7476069","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476069","url":null,"abstract":"It is known that code readability has an impact on software quality. This paper introduces a preliminary list of 33 good practices for code readability that could be taught in object oriented programming courses of informatics programs. In this set are included practices with both positive and negative impact, the latter mainly from bad smells. A survey was made with OOP teachers in order to assess the significance of teaching a set of good practices. The results showed that teachers consider it important to teach the defined set. Such result was statistically significant. Still, the same level of significance was not awarded to all practices. Some additional results are presented.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"37 1","pages":"304-309"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81743154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-04-05DOI: 10.1109/IACS.2016.7476085
Naser Al Madi, J. Khan
This study is focusing on learning performance and cognitive activity during text comprehension and multimedia comprehension. We use Electroencephalography (EEG Alpha, Beta, and Theta bands) to monitor cognitive load and emotions during each presentation, and computational modeling of comprehension to measure learning performance. We collected the data set for our experiment through a human study. We have applied this study on sixteen participants, in which their EEG activity and learning progress were recorded during text and multimedia comprehension. The results showed measurable differences in Alpha and Beta bands power between text and multimedia presentations. Furthermore, measurements of experienced emotions revealed that multimedia presentation induced positive emotions in a higher magnitude than text as expected. Simultaneously, text presentation created higher cognitive load than multimedia.
{"title":"Measuring learning performance and cognitive activity during multimodal comprehension","authors":"Naser Al Madi, J. Khan","doi":"10.1109/IACS.2016.7476085","DOIUrl":"https://doi.org/10.1109/IACS.2016.7476085","url":null,"abstract":"This study is focusing on learning performance and cognitive activity during text comprehension and multimedia comprehension. We use Electroencephalography (EEG Alpha, Beta, and Theta bands) to monitor cognitive load and emotions during each presentation, and computational modeling of comprehension to measure learning performance. We collected the data set for our experiment through a human study. We have applied this study on sixteen participants, in which their EEG activity and learning progress were recorded during text and multimedia comprehension. The results showed measurable differences in Alpha and Beta bands power between text and multimedia presentations. Furthermore, measurements of experienced emotions revealed that multimedia presentation induced positive emotions in a higher magnitude than text as expected. Simultaneously, text presentation created higher cognitive load than multimedia.","PeriodicalId":6579,"journal":{"name":"2016 7th International Conference on Information and Communication Systems (ICICS)","volume":"23 1","pages":"50-55"},"PeriodicalIF":0.0,"publicationDate":"2016-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85574224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}